URL
https://opencores.org/ocsvn/openrisc/openrisc/trunk
Subversion Repositories openrisc
[/] [openrisc/] [trunk/] [gnu-old/] [gdb-7.1/] [gdb/] [doc/] [gdbint.info-1] - Rev 842
Compare with Previous | Blame | View Log
This is gdbint.info, produced by makeinfo version 4.8 from./gdbint.texinfo.INFO-DIR-SECTION Software developmentSTART-INFO-DIR-ENTRY* Gdb-Internals: (gdbint). The GNU debugger's internals.END-INFO-DIR-ENTRYCopyright (C) 1990, 1991, 1992, 1993, 1994, 1996, 1998, 1999, 2000,2001, 2002, 2003, 2004, 2005, 2006, 2008, 2009, 2010 Free SoftwareFoundation, Inc. Contributed by Cygnus Solutions. Written by JohnGilmore. Second Edition by Stan Shebs.Permission is granted to copy, distribute and/or modify this documentunder the terms of the GNU Free Documentation License, Version 1.1 orany later version published by the Free Software Foundation; with noInvariant Sections, with no Front-Cover Texts, and with no Back-CoverTexts. A copy of the license is included in the section entitled "GNUFree Documentation License".This file documents the internals of the GNU debugger GDB.Copyright (C) 1990, 1991, 1992, 1993, 1994, 1996, 1998, 1999, 2000,2001, 2002, 2003, 2004, 2005, 2006, 2008, 2009, 2010 Free SoftwareFoundation, Inc. Contributed by Cygnus Solutions. Written by JohnGilmore. Second Edition by Stan Shebs.Permission is granted to copy, distribute and/or modify this documentunder the terms of the GNU Free Documentation License, Version 1.1 orany later version published by the Free Software Foundation; with noInvariant Sections, with no Front-Cover Texts, and with no Back-CoverTexts. A copy of the license is included in the section entitled "GNUFree Documentation License".File: gdbint.info, Node: Top, Next: Summary, Up: (dir)Scope of this Document**********************This document documents the internals of the GNU debugger, GDB. Itincludes description of GDB's key algorithms and operations, as well asthe mechanisms that adapt GDB to specific hosts and targets.* Menu:* Summary::* Overall Structure::* Algorithms::* User Interface::* libgdb::* Values::* Stack Frames::* Symbol Handling::* Language Support::* Host Definition::* Target Architecture Definition::* Target Descriptions::* Target Vector Definition::* Native Debugging::* Support Libraries::* Coding::* Porting GDB::* Versions and Branches::* Start of New Year Procedure::* Releasing GDB::* Testsuite::* Hints::* GDB Observers:: GDB Currently available observers* GNU Free Documentation License:: The license for this documentation* Index::File: gdbint.info, Node: Summary, Next: Overall Structure, Prev: Top, Up: Top1 Summary********** Menu:* Requirements::* Contributors::File: gdbint.info, Node: Requirements, Next: Contributors, Up: Summary1.1 Requirements================Before diving into the internals, you should understand the formalrequirements and other expectations for GDB. Although some of thesemay seem obvious, there have been proposals for GDB that have runcounter to these requirements.First of all, GDB is a debugger. It's not designed to be a frontpanel for embedded systems. It's not a text editor. It's not a shell.It's not a programming environment.GDB is an interactive tool. Although a batch mode is available,GDB's primary role is to interact with a human programmer.GDB should be responsive to the user. A programmer hot on the trailof a nasty bug, and operating under a looming deadline, is going to bevery impatient of everything, including the response time to debuggercommands.GDB should be relatively permissive, such as for expressions. Whilethe compiler should be picky (or have the option to be made picky),since source code lives for a long time usually, the programmer doingdebugging shouldn't be spending time figuring out to mollify thedebugger.GDB will be called upon to deal with really large programs.Executable sizes of 50 to 100 megabytes occur regularly, and we'veheard reports of programs approaching 1 gigabyte in size.GDB should be able to run everywhere. No other debugger isavailable for even half as many configurations as GDB supports.File: gdbint.info, Node: Contributors, Prev: Requirements, Up: Summary1.2 Contributors================The first edition of this document was written by John Gilmore ofCygnus Solutions. The current second edition was written by Stan Shebsof Cygnus Solutions, who continues to update the manual.Over the years, many others have made additions and changes to thisdocument. This section attempts to record the significant contributorsto that effort. One of the virtues of free software is that everyone isfree to contribute to it; with regret, we cannot actually acknowledgeeveryone here._Plea:_ This section has only been added relatively recently (fouryears after publication of the second edition). Additions to thissection are particularly welcome. If you or your friends (orenemies, to be evenhanded) have been unfairly omitted from thislist, we would like to add your names!A document such as this relies on being kept up to date by numeroussmall updates by contributing engineers as they make changes to thecode base. The file `ChangeLog' in the GDB distribution approximates ablow-by-blow account. The most prolific contributors to this important,but low profile task are Andrew Cagney (responsible for over half theentries), Daniel Jacobowitz, Mark Kettenis, Jim Blandy and EliZaretskii.Eli Zaretskii and Daniel Jacobowitz wrote the sections documentingwatchpoints.Jeremy Bennett updated the sections on initializing a newarchitecture and register representation, and added the section onFrame Interpretation.File: gdbint.info, Node: Overall Structure, Next: Algorithms, Prev: Summary, Up: Top2 Overall Structure*******************GDB consists of three major subsystems: user interface, symbol handling(the "symbol side"), and target system handling (the "target side").The user interface consists of several actual interfaces, plussupporting code.The symbol side consists of object file readers, debugging infointerpreters, symbol table management, source language expressionparsing, type and value printing.The target side consists of execution control, stack frame analysis,and physical target manipulation.The target side/symbol side division is not formal, and there are anumber of exceptions. For instance, core file support involves symbolicelements (the basic core file reader is in BFD) and target elements (itsupplies the contents of memory and the values of registers). Instead,this division is useful for understanding how the minor subsystemsshould fit together.2.1 The Symbol Side===================The symbolic side of GDB can be thought of as "everything you can do inGDB without having a live program running". For instance, you can lookat the types of variables, and evaluate many kinds of expressions.2.2 The Target Side===================The target side of GDB is the "bits and bytes manipulator". Althoughit may make reference to symbolic info here and there, most of thetarget side will run with only a stripped executable available--or evenno executable at all, in remote debugging cases.Operations such as disassembly, stack frame crawls, and registerdisplay, are able to work with no symbolic info at all. In some cases,such as disassembly, GDB will use symbolic info to present addressesrelative to symbols rather than as raw numbers, but it will work eitherway.2.3 Configurations=================="Host" refers to attributes of the system where GDB runs. "Target"refers to the system where the program being debugged executes. Inmost cases they are the same machine, in which case a third type of"Native" attributes come into play.Defines and include files needed to build on the host are hostsupport. Examples are tty support, system defined types, host byteorder, host float format. These are all calculated by `autoconf' whenthe debugger is built.Defines and information needed to handle the target format are targetdependent. Examples are the stack frame format, instruction set,breakpoint instruction, registers, and how to set up and tear down thestack to call a function.Information that is only needed when the host and target are thesame, is native dependent. One example is Unix child process support;if the host and target are not the same, calling `fork' to start thetarget process is a bad idea. The various macros needed for finding theregisters in the `upage', running `ptrace', and such are all in thenative-dependent files.Another example of native-dependent code is support for features thatare really part of the target environment, but which require `#include'files that are only available on the host system. Core file handlingand `setjmp' handling are two common cases.When you want to make GDB work as the traditional native debugger ona system, you will need to supply both target and native information.2.4 Source Tree Structure=========================The GDB source directory has a mostly flat structure--there are only afew subdirectories. A file's name usually gives a hint as to what itdoes; for example, `stabsread.c' reads stabs, `dwarf2read.c' readsDWARF 2, etc.Files that are related to some common task have names that sharecommon substrings. For example, `*-thread.c' files deal with debuggingthreads on various platforms; `*read.c' files deal with reading variouskinds of symbol and object files; `inf*.c' files deal with directcontrol of the "inferior program" (GDB parlance for the program beingdebugged).There are several dozens of files in the `*-tdep.c' family. `tdep'stands for "target-dependent code"--each of these files implementsdebug support for a specific target architecture (sparc, mips, etc).Usually, only one of these will be used in a specific GDB configuration(sometimes two, closely related).Similarly, there are many `*-nat.c' files, each one for nativedebugging on a specific system (e.g., `sparc-linux-nat.c' is for nativedebugging of Sparc machines running the Linux kernel).The few subdirectories of the source tree are:`cli'Code that implements "CLI", the GDB Command-Line Interpreter.*Note Command Interpreter: User Interface.`gdbserver'Code for the GDB remote server.`gdbtk'Code for Insight, the GDB TK-based GUI front-end.`mi'The "GDB/MI", the GDB Machine Interface interpreter.`signals'Target signal translation code.`tui'Code for "TUI", the GDB Text-mode full-screen User Interface.*Note TUI: User Interface.File: gdbint.info, Node: Algorithms, Next: User Interface, Prev: Overall Structure, Up: Top3 Algorithms************GDB uses a number of debugging-specific algorithms. They are often notvery complicated, but get lost in the thicket of special cases andreal-world issues. This chapter describes the basic algorithms andmentions some of the specific target definitions that they use.3.1 Prologue Analysis=====================To produce a backtrace and allow the user to manipulate older frames'variables and arguments, GDB needs to find the base addresses of olderframes, and discover where those frames' registers have been saved.Since a frame's "callee-saves" registers get saved by younger frames ifand when they're reused, a frame's registers may be scatteredunpredictably across younger frames. This means that changing thevalue of a register-allocated variable in an older frame may actuallyentail writing to a save slot in some younger frame.Modern versions of GCC emit Dwarf call frame information ("CFI"),which describes how to find frame base addresses and saved registers.But CFI is not always available, so as a fallback GDB uses a techniquecalled "prologue analysis" to find frame sizes and saved registers. Aprologue analyzer disassembles the function's machine code startingfrom its entry point, and looks for instructions that allocate framespace, save the stack pointer in a frame pointer register, saveregisters, and so on. Obviously, this can't be done accurately ingeneral, but it's tractable to do well enough to be very helpful.Prologue analysis predates the GNU toolchain's support for CFI; at onetime, prologue analysis was the only mechanism GDB used for stackunwinding at all, when the function calling conventions didn't specifya fixed frame layout.In the olden days, function prologues were generated by hand-written,target-specific code in GCC, and treated as opaque and untouchable byoptimizers. Looking at this code, it was usually straightforward towrite a prologue analyzer for GDB that would accurately understand allthe prologues GCC would generate. However, over time GCC became moreaggressive about instruction scheduling, and began to understand moreabout the semantics of the prologue instructions themselves; inresponse, GDB's analyzers became more complex and fragile. Keeping theprologue analyzers working as GCC (and the instruction sets themselves)evolved became a substantial task.To try to address this problem, the code in `prologue-value.h' and`prologue-value.c' provides a general framework for writing prologueanalyzers that are simpler and more robust than ad-hoc analyzers. Whenwe analyze a prologue using the prologue-value framework, we're reallydoing "abstract interpretation" or "pseudo-evaluation": running thefunction's code in simulation, but using conservative approximations ofthe values registers and memory would hold when the code actually runs.For example, if our function starts with the instruction:addi r1, 42 # add 42 to r1we don't know exactly what value will be in `r1' after executingthis instruction, but we do know it'll be 42 greater than its originalvalue.If we then see an instruction like:addi r1, 22 # add 22 to r1we still don't know what `r1's' value is, but again, we can say itis now 64 greater than its original value.If the next instruction were:mov r2, r1 # set r2 to r1's valuethen we can say that `r2's' value is now the original value of `r1'plus 64.It's common for prologues to save registers on the stack, so we'llneed to track the values of stack frame slots, as well as theregisters. So after an instruction like this:mov (fp+4), r2then we'd know that the stack slot four bytes above the frame pointerholds the original value of `r1' plus 64.And so on.Of course, this can only go so far before it gets unreasonable. Ifwe wanted to be able to say anything about the value of `r1' after theinstruction:xor r1, r3 # exclusive-or r1 and r3, place result in r1then things would get pretty complex. But remember, we're just doinga conservative approximation; if exclusive-or instructions aren'trelevant to prologues, we can just say `r1''s value is now "unknown".We can ignore things that are too complex, if that loss of informationis acceptable for our application.So when we say "conservative approximation" here, what we mean is anapproximation that is either accurate, or marked "unknown", but neverinaccurate.Using this framework, a prologue analyzer is simply an interpreterfor machine code, but one that uses conservative approximations for thecontents of registers and memory instead of actual values. Startingfrom the function's entry point, you simulate instructions up to thecurrent PC, or an instruction that you don't know how to simulate. Nowyou can examine the state of the registers and stack slots you've kepttrack of.* To see how large your stack frame is, just check the value of thestack pointer register; if it's the original value of the SP minusa constant, then that constant is the stack frame's size. If theSP's value has been marked as "unknown", then that means theprologue has done something too complex for us to track, and wedon't know the frame size.* To see where we've saved the previous frame's registers, we justsearch the values we've tracked -- stack slots, usually, butregisters, too, if you want -- for something equal to theregister's original value. If the calling conventions suggest astandard place to save a given register, then we can check therefirst, but really, anything that will get us back the originalvalue will probably work.This does take some work. But prologue analyzers aren'tquick-and-simple pattern patching to recognize a few fixed prologueforms any more; they're big, hairy functions. Along with inferiorfunction calls, prologue analysis accounts for a substantial portion ofthe time needed to stabilize a GDB port. So it's worthwhile to lookfor an approach that will be easier to understand and maintain. In theapproach described above:* It's easier to see that the analyzer is correct: you just seewhether the analyzer properly (albeit conservatively) simulatesthe effect of each instruction.* It's easier to extend the analyzer: you can add support for newinstructions, and know that you haven't broken anything thatwasn't already broken before.* It's orthogonal: to gather new information, you don't need tocomplicate the code for each instruction. As long as your domainof conservative values is already detailed enough to tell you whatyou need, then all the existing instruction simulations arealready gathering the right data for you.The file `prologue-value.h' contains detailed comments explainingthe framework and how to use it.3.2 Breakpoint Handling=======================In general, a breakpoint is a user-designated location in the programwhere the user wants to regain control if program execution ever reachesthat location.There are two main ways to implement breakpoints; either as"hardware" breakpoints or as "software" breakpoints.Hardware breakpoints are sometimes available as a builtin debuggingfeatures with some chips. Typically these work by having dedicatedregister into which the breakpoint address may be stored. If the PC(shorthand for "program counter") ever matches a value in a breakpointregisters, the CPU raises an exception and reports it to GDB.Another possibility is when an emulator is in use; many emulatorsinclude circuitry that watches the address lines coming out from theprocessor, and force it to stop if the address matches a breakpoint'saddress.A third possibility is that the target already has the ability to dobreakpoints somehow; for instance, a ROM monitor may do its ownsoftware breakpoints. So although these are not literally "hardwarebreakpoints", from GDB's point of view they work the same; GDB need notdo anything more than set the breakpoint and wait for something tohappen.Since they depend on hardware resources, hardware breakpoints may belimited in number; when the user asks for more, GDB will start tryingto set software breakpoints. (On some architectures, notably the32-bit x86 platforms, GDB cannot always know whether there's enoughhardware resources to insert all the hardware breakpoints andwatchpoints. On those platforms, GDB prints an error message only whenthe program being debugged is continued.)Software breakpoints require GDB to do somewhat more work. Thebasic theory is that GDB will replace a program instruction with atrap, illegal divide, or some other instruction that will cause anexception, and then when it's encountered, GDB will take the exceptionand stop the program. When the user says to continue, GDB will restorethe original instruction, single-step, re-insert the trap, and continueon.Since it literally overwrites the program being tested, the programarea must be writable, so this technique won't work on programs in ROM.It can also distort the behavior of programs that examine themselves,although such a situation would be highly unusual.Also, the software breakpoint instruction should be the smallestsize of instruction, so it doesn't overwrite an instruction that mightbe a jump target, and cause disaster when the program jumps into themiddle of the breakpoint instruction. (Strictly speaking, thebreakpoint must be no larger than the smallest interval betweeninstructions that may be jump targets; perhaps there is an architecturewhere only even-numbered instructions may jumped to.) Note that it'spossible for an instruction set not to have any instructions usable fora software breakpoint, although in practice only the ARC has failed todefine such an instruction.Basic breakpoint object handling is in `breakpoint.c'. However,much of the interesting breakpoint action is in `infrun.c'.`target_remove_breakpoint (BP_TGT)'`target_insert_breakpoint (BP_TGT)'Insert or remove a software breakpoint at address`BP_TGT->placed_address'. Returns zero for success, non-zero forfailure. On input, BP_TGT contains the address of the breakpoint,and is otherwise initialized to zero. The fields of the `structbp_target_info' pointed to by BP_TGT are updated to contain otherinformation about the breakpoint on output. The field`placed_address' may be updated if the breakpoint was placed at arelated address; the field `shadow_contents' contains the realcontents of the bytes where the breakpoint has been inserted, ifreading memory would return the breakpoint instead of theunderlying memory; the field `shadow_len' is the length of memorycached in `shadow_contents', if any; and the field `placed_size'is optionally set and used by the target, if it could differ from`shadow_len'.For example, the remote target `Z0' packet does not requireshadowing memory, so `shadow_len' is left at zero. However, thelength reported by `gdbarch_breakpoint_from_pc' is cached in`placed_size', so that a matching `z0' packet can be used toremove the breakpoint.`target_remove_hw_breakpoint (BP_TGT)'`target_insert_hw_breakpoint (BP_TGT)'Insert or remove a hardware-assisted breakpoint at address`BP_TGT->placed_address'. Returns zero for success, non-zero forfailure. See `target_insert_breakpoint' for a description of the`struct bp_target_info' pointed to by BP_TGT; the`shadow_contents' and `shadow_len' members are not used forhardware breakpoints, but `placed_size' may be.3.3 Single Stepping===================3.4 Signal Handling===================3.5 Thread Handling===================3.6 Inferior Function Calls===========================3.7 Longjmp Support===================GDB has support for figuring out that the target is doing a `longjmp'and for stopping at the target of the jump, if we are stepping. Thisis done with a few specialized internal breakpoints, which are visiblein the output of the `maint info breakpoint' command.To make this work, you need to define a function called`gdbarch_get_longjmp_target', which will examine the `jmp_buf'structure and extract the `longjmp' target address. Since `jmp_buf' istarget specific and typically defined in a target header not availableto GDB, you will need to determine the offset of the PC manually andreturn that; many targets define a `jb_pc_offset' field in the tdepstructure to save the value once calculated.3.8 Watchpoints===============Watchpoints are a special kind of breakpoints (*note breakpoints:Algorithms.) which break when data is accessed rather than when someinstruction is executed. When you have data which changes without yourknowing what code does that, watchpoints are the silver bullet to huntdown and kill such bugs.Watchpoints can be either hardware-assisted or not; the latter typeis known as "software watchpoints." GDB always uses hardware-assistedwatchpoints if they are available, and falls back on softwarewatchpoints otherwise. Typical situations where GDB will use softwarewatchpoints are:* The watched memory region is too large for the underlying hardwarewatchpoint support. For example, each x86 debug register canwatch up to 4 bytes of memory, so trying to watch data structureswhose size is more than 16 bytes will cause GDB to use softwarewatchpoints.* The value of the expression to be watched depends on data held inregisters (as opposed to memory).* Too many different watchpoints requested. (On some architectures,this situation is impossible to detect until the debugged programis resumed.) Note that x86 debug registers are used both forhardware breakpoints and for watchpoints, so setting too manyhardware breakpoints might cause watchpoint insertion to fail.* No hardware-assisted watchpoints provided by the targetimplementation.Software watchpoints are very slow, since GDB needs to single-stepthe program being debugged and test the value of the watchedexpression(s) after each instruction. The rest of this section ismostly irrelevant for software watchpoints.When the inferior stops, GDB tries to establish, among otherpossible reasons, whether it stopped due to a watchpoint being hit. Itfirst uses `STOPPED_BY_WATCHPOINT' to see if any watchpoint was hit.If not, all watchpoint checking is skipped.Then GDB calls `target_stopped_data_address' exactly once. Thismethod returns the address of the watchpoint which triggered, if thetarget can determine it. If the triggered address is available, GDBcompares the address returned by this method with each watched memoryaddress in each active watchpoint. For data-read and data-accesswatchpoints, GDB announces every watchpoint that watches the triggeredaddress as being hit. For this reason, data-read and data-accesswatchpoints _require_ that the triggered address be available; if not,read and access watchpoints will never be considered hit. Fordata-write watchpoints, if the triggered address is available, GDBconsiders only those watchpoints which match that address; otherwise,GDB considers all data-write watchpoints. For each data-writewatchpoint that GDB considers, it evaluates the expression whose valueis being watched, and tests whether the watched value has changed.Watchpoints whose watched values have changed are announced as hit.GDB uses several macros and primitives to support hardwarewatchpoints:`TARGET_CAN_USE_HARDWARE_WATCHPOINT (TYPE, COUNT, OTHER)'Return the number of hardware watchpoints of type TYPE that arepossible to be set. The value is positive if COUNT watchpoints ofthis type can be set, zero if setting watchpoints of this type isnot supported, and negative if COUNT is more than the maximumnumber of watchpoints of type TYPE that can be set. OTHER isnon-zero if other types of watchpoints are currently enabled (thereare architectures which cannot set watchpoints of different typesat the same time).`TARGET_REGION_OK_FOR_HW_WATCHPOINT (ADDR, LEN)'Return non-zero if hardware watchpoints can be used to watch aregion whose address is ADDR and whose length in bytes is LEN.`target_insert_watchpoint (ADDR, LEN, TYPE)'`target_remove_watchpoint (ADDR, LEN, TYPE)'Insert or remove a hardware watchpoint starting at ADDR, for LENbytes. TYPE is the watchpoint type, one of the possible values ofthe enumerated data type `target_hw_bp_type', defined by`breakpoint.h' as follows:enum target_hw_bp_type{hw_write = 0, /* Common (write) HW watchpoint */hw_read = 1, /* Read HW watchpoint */hw_access = 2, /* Access (read or write) HW watchpoint */hw_execute = 3 /* Execute HW breakpoint */};These two macros should return 0 for success, non-zero for failure.`target_stopped_data_address (ADDR_P)'If the inferior has some watchpoint that triggered, place theaddress associated with the watchpoint at the location pointed toby ADDR_P and return non-zero. Otherwise, return zero. This isrequired for data-read and data-access watchpoints. It is notrequired for data-write watchpoints, but GDB uses it to improvehandling of those also.GDB will only call this method once per watchpoint stop,immediately after calling `STOPPED_BY_WATCHPOINT'. If thetarget's watchpoint indication is sticky, i.e., stays set afterresuming, this method should clear it. For instance, the x86 debugcontrol register has sticky triggered flags.`target_watchpoint_addr_within_range (TARGET, ADDR, START, LENGTH)'Check whether ADDR (as returned by `target_stopped_data_address')lies within the hardware-defined watchpoint region described bySTART and LENGTH. This only needs to be provided if thegranularity of a watchpoint is greater than one byte, i.e., if thewatchpoint can also trigger on nearby addresses outside of thewatched region.`HAVE_STEPPABLE_WATCHPOINT'If defined to a non-zero value, it is not necessary to disable awatchpoint to step over it. Like`gdbarch_have_nonsteppable_watchpoint', this is usually set whenwatchpoints trigger at the instruction which will perform aninteresting read or write. It should be set if there is atemporary disable bit which allows the processor to step over theinteresting instruction without raising the watchpoint exceptionagain.`int gdbarch_have_nonsteppable_watchpoint (GDBARCH)'If it returns a non-zero value, GDB should disable a watchpoint tostep the inferior over it. This is usually set when watchpointstrigger at the instruction which will perform an interesting reador write.`HAVE_CONTINUABLE_WATCHPOINT'If defined to a non-zero value, it is possible to continue theinferior after a watchpoint has been hit. This is usually setwhen watchpoints trigger at the instruction following aninteresting read or write.`CANNOT_STEP_HW_WATCHPOINTS'If this is defined to a non-zero value, GDB will remove allwatchpoints before stepping the inferior.`STOPPED_BY_WATCHPOINT (WAIT_STATUS)'Return non-zero if stopped by a watchpoint. WAIT_STATUS is of thetype `struct target_waitstatus', defined by `target.h'. Normally,this macro is defined to invoke the function pointed to by the`to_stopped_by_watchpoint' member of the structure (of the type`target_ops', defined on `target.h') that describes thetarget-specific operations; `to_stopped_by_watchpoint' ignores theWAIT_STATUS argument.GDB does not require the non-zero value returned by`STOPPED_BY_WATCHPOINT' to be 100% correct, so if a target cannotdetermine for sure whether the inferior stopped due to awatchpoint, it could return non-zero "just in case".3.8.1 Watchpoints and Threads-----------------------------GDB only supports process-wide watchpoints, which trigger in allthreads. GDB uses the thread ID to make watchpoints act as if theywere thread-specific, but it cannot set hardware watchpoints that onlytrigger in a specific thread. Therefore, even if the target supportsthreads, per-thread debug registers, and watchpoints which only affecta single thread, it should set the per-thread debug registers for allthreads to the same value. On GNU/Linux native targets, this isaccomplished by using `ALL_LWPS' in `target_insert_watchpoint' and`target_remove_watchpoint' and by using `linux_set_new_thread' toregister a handler for newly created threads.GDB's GNU/Linux support only reports a single event at a time,although multiple events can trigger simultaneously for multi-threadedprograms. When multiple events occur, `linux-nat.c' queues subsequentevents and returns them the next time the program is resumed. Thismeans that `STOPPED_BY_WATCHPOINT' and `target_stopped_data_address'only need to consult the current thread's state--the thread indicatedby `inferior_ptid'. If two threads have hit watchpointssimultaneously, those routines will be called a second time for thesecond thread.3.8.2 x86 Watchpoints---------------------The 32-bit Intel x86 (a.k.a. ia32) processors feature special debugregisters designed to facilitate debugging. GDB provides a genericlibrary of functions that x86-based ports can use to implement supportfor watchpoints and hardware-assisted breakpoints. This subsectiondocuments the x86 watchpoint facilities in GDB.(At present, the library functions read and write debug registersdirectly, and are thus only available for native configurations.)To use the generic x86 watchpoint support, a port should do thefollowing:* Define the macro `I386_USE_GENERIC_WATCHPOINTS' somewhere in thetarget-dependent headers.* Include the `config/i386/nm-i386.h' header file _after_ defining`I386_USE_GENERIC_WATCHPOINTS'.* Add `i386-nat.o' to the value of the Make variable `NATDEPFILES'(*note NATDEPFILES: Native Debugging.).* Provide implementations for the `I386_DR_LOW_*' macros describedbelow. Typically, each macro should call a target-specificfunction which does the real work.The x86 watchpoint support works by maintaining mirror images of thedebug registers. Values are copied between the mirror images and thereal debug registers via a set of macros which each target needs toprovide:`I386_DR_LOW_SET_CONTROL (VAL)'Set the Debug Control (DR7) register to the value VAL.`I386_DR_LOW_SET_ADDR (IDX, ADDR)'Put the address ADDR into the debug register number IDX.`I386_DR_LOW_RESET_ADDR (IDX)'Reset (i.e. zero out) the address stored in the debug registernumber IDX.`I386_DR_LOW_GET_STATUS'Return the value of the Debug Status (DR6) register. This value isused immediately after it is returned by `I386_DR_LOW_GET_STATUS',so as to support per-thread status register values.For each one of the 4 debug registers (whose indices are from 0 to 3)that store addresses, a reference count is maintained by GDB, to allowsharing of debug registers by several watchpoints. This allows usersto define several watchpoints that watch the same expression, but withdifferent conditions and/or commands, without wasting debug registerswhich are in short supply. GDB maintains the reference countsinternally, targets don't have to do anything to use this feature.The x86 debug registers can each watch a region that is 1, 2, or 4bytes long. The ia32 architecture requires that each watched region beappropriately aligned: 2-byte region on 2-byte boundary, 4-byte regionon 4-byte boundary. However, the x86 watchpoint support in GDB canwatch unaligned regions and regions larger than 4 bytes (up to 16bytes) by allocating several debug registers to watch a single region.This allocation of several registers per a watched region is also doneautomatically without target code intervention.The generic x86 watchpoint support provides the following API for theGDB's application code:`i386_region_ok_for_watchpoint (ADDR, LEN)'The macro `TARGET_REGION_OK_FOR_HW_WATCHPOINT' is set to call thisfunction. It counts the number of debug registers required towatch a given region, and returns a non-zero value if that numberis less than 4, the number of debug registers available to x86processors.`i386_stopped_data_address (ADDR_P)'The target function `target_stopped_data_address' is set to callthis function. This function examines the breakpoint conditionbits in the DR6 Debug Status register, as returned by the`I386_DR_LOW_GET_STATUS' macro, and returns the address associatedwith the first bit that is set in DR6.`i386_stopped_by_watchpoint (void)'The macro `STOPPED_BY_WATCHPOINT' is set to call this function.The argument passed to `STOPPED_BY_WATCHPOINT' is ignored. Thisfunction examines the breakpoint condition bits in the DR6 DebugStatus register, as returned by the `I386_DR_LOW_GET_STATUS'macro, and returns true if any bit is set. Otherwise, false isreturned.`i386_insert_watchpoint (ADDR, LEN, TYPE)'`i386_remove_watchpoint (ADDR, LEN, TYPE)'Insert or remove a watchpoint. The macros`target_insert_watchpoint' and `target_remove_watchpoint' are setto call these functions. `i386_insert_watchpoint' first looks fora debug register which is already set to watch the same region forthe same access types; if found, it just increments the referencecount of that debug register, thus implementing debug registersharing between watchpoints. If no such register is found, thefunction looks for a vacant debug register, sets its mirroredvalue to ADDR, sets the mirrored value of DR7 Debug Controlregister as appropriate for the LEN and TYPE parameters, and thenpasses the new values of the debug register and DR7 to theinferior by calling `I386_DR_LOW_SET_ADDR' and`I386_DR_LOW_SET_CONTROL'. If more than one debug register isrequired to cover the given region, the above process is repeatedfor each debug register.`i386_remove_watchpoint' does the opposite: it resets the addressin the mirrored value of the debug register and its read/write andlength bits in the mirrored value of DR7, then passes these newvalues to the inferior via `I386_DR_LOW_RESET_ADDR' and`I386_DR_LOW_SET_CONTROL'. If a register is shared by severalwatchpoints, each time a `i386_remove_watchpoint' is called, itdecrements the reference count, and only calls`I386_DR_LOW_RESET_ADDR' and `I386_DR_LOW_SET_CONTROL' when thecount goes to zero.`i386_insert_hw_breakpoint (BP_TGT)'`i386_remove_hw_breakpoint (BP_TGT)'These functions insert and remove hardware-assisted breakpoints.The macros `target_insert_hw_breakpoint' and`target_remove_hw_breakpoint' are set to call these functions.The argument is a `struct bp_target_info *', as described in thedocumentation for `target_insert_breakpoint'. These functionswork like `i386_insert_watchpoint' and `i386_remove_watchpoint',respectively, except that they set up the debug registers to watchinstruction execution, and each hardware-assisted breakpointalways requires exactly one debug register.`i386_cleanup_dregs (void)'This function clears all the reference counts, addresses, andcontrol bits in the mirror images of the debug registers. Itdoesn't affect the actual debug registers in the inferior process.*Notes:*1. x86 processors support setting watchpoints on I/O reads or writes.However, since no target supports this (as of March 2001), andsince `enum target_hw_bp_type' doesn't even have an enumerationfor I/O watchpoints, this feature is not yet available to GDBrunning on x86.2. x86 processors can enable watchpoints locally, for the current taskonly, or globally, for all the tasks. For each debug register,there's a bit in the DR7 Debug Control register that determineswhether the associated address is watched locally or globally. Thecurrent implementation of x86 watchpoint support in GDB alwayssets watchpoints to be locally enabled, since global watchpointsmight interfere with the underlying OS and are probablyunavailable in many platforms.3.9 Checkpoints===============In the abstract, a checkpoint is a point in the execution history ofthe program, which the user may wish to return to at some later time.Internally, a checkpoint is a saved copy of the program state,including whatever information is required in order to restore theprogram to that state at a later time. This can be expected to includethe state of registers and memory, and may include external state suchas the state of open files and devices.There are a number of ways in which checkpoints may be implementedin gdb, e.g. as corefiles, as forked processes, and as some opaquemethod implemented on the target side.A corefile can be used to save an image of target memory and registerstate, which can in principle be restored later -- but corefiles do nottypically include information about external entities such as openfiles. Currently this method is not implemented in gdb.A forked process can save the state of user memory and registers, aswell as some subset of external (kernel) state. This method is used toimplement checkpoints on Linux, and in principle might be used on othersystems.Some targets, e.g. simulators, might have their own built-in methodfor saving checkpoints, and gdb might be able to take advantage of thatcapability without necessarily knowing any details of how it is done.3.10 Observing changes in GDB internals=======================================In order to function properly, several modules need to be notified whensome changes occur in the GDB internals. Traditionally, these moduleshave relied on several paradigms, the most common ones being hooks andgdb-events. Unfortunately, none of these paradigms was versatileenough to become the standard notification mechanism in GDB. The factthat they only supported one "client" was also a strong limitation.A new paradigm, based on the Observer pattern of the `DesignPatterns' book, has therefore been implemented. The goal was to providea new interface overcoming the issues with the notification mechanismspreviously available. This new interface needed to be strongly typed,easy to extend, and versatile enough to be used as the standardinterface when adding new notifications.See *Note GDB Observers:: for a brief description of the observerscurrently implemented in GDB. The rationale for the currentimplementation is also briefly discussed.File: gdbint.info, Node: User Interface, Next: libgdb, Prev: Algorithms, Up: Top4 User Interface****************GDB has several user interfaces, of which the traditional command-lineinterface is perhaps the most familiar.4.1 Command Interpreter=======================The command interpreter in GDB is fairly simple. It is designed toallow for the set of commands to be augmented dynamically, and also hasa recursive subcommand capability, where the first argument to acommand may itself direct a lookup on a different command list.For instance, the `set' command just starts a lookup on the`setlist' command list, while `set thread' recurses to the`set_thread_cmd_list'.To add commands in general, use `add_cmd'. `add_com' adds to themain command list, and should be used for those commands. The usualplace to add commands is in the `_initialize_XYZ' routines at the endsof most source files.To add paired `set' and `show' commands, use `add_setshow_cmd' or`add_setshow_cmd_full'. The former is a slightly simpler interfacewhich is useful when you don't need to further modify the new commandstructures, while the latter returns the new command structures formanipulation.Before removing commands from the command set it is a good idea todeprecate them for some time. Use `deprecate_cmd' on commands oraliases to set the deprecated flag. `deprecate_cmd' takes a `structcmd_list_element' as it's first argument. You can use the return valuefrom `add_com' or `add_cmd' to deprecate the command immediately afterit is created.The first time a command is used the user will be warned and offereda replacement (if one exists). Note that the replacement string passedto `deprecate_cmd' should be the full name of the command, i.e., theentire string the user should type at the command line.4.2 UI-Independent Output--the `ui_out' Functions=================================================The `ui_out' functions present an abstraction level for the GDB outputcode. They hide the specifics of different user interfaces supportedby GDB, and thus free the programmer from the need to write severalversions of the same code, one each for every UI, to produce output.4.2.1 Overview and Terminology------------------------------In general, execution of each GDB command produces some sort of output,and can even generate an input request.Output can be generated for the following purposes:* to display a _result_ of an operation;* to convey _info_ or produce side-effects of a requested operation;* to provide a _notification_ of an asynchronous event (includingprogress indication of a prolonged asynchronous operation);* to display _error messages_ (including warnings);* to show _debug data_;* to _query_ or prompt a user for input (a special case).This section mainly concentrates on how to build result output,although some of it also applies to other kinds of output.Generation of output that displays the results of an operationinvolves one or more of the following:* output of the actual data* formatting the output as appropriate for console output, to make iteasily readable by humans* machine oriented formatting-a more terse formatting to allow foreasy parsing by programs which read GDB's output* annotation, whose purpose is to help legacy GUIs to identifyinteresting parts in the outputThe `ui_out' routines take care of the first three aspects.Annotations are provided by separate annotation routines. Note that useof annotations for an interface between a GUI and GDB is deprecated.Output can be in the form of a single item, which we call a "field";a "list" consisting of identical fields; a "tuple" consisting ofnon-identical fields; or a "table", which is a tuple consisting of aheader and a body. In a BNF-like form:`<table> ==>'`<header> <body>'`<header> ==>'`{ <column> }'`<column> ==>'`<width> <alignment> <title>'`<body> ==>'`{<row>}'4.2.2 General Conventions-------------------------Most `ui_out' routines are of type `void', the exceptions are`ui_out_stream_new' (which returns a pointer to the newly createdobject) and the `make_cleanup' routines.The first parameter is always the `ui_out' vector object, a pointerto a `struct ui_out'.The FORMAT parameter is like in `printf' family of functions. Whenit is present, there must also be a variable list of argumentssufficient used to satisfy the `%' specifiers in the supplied format.When a character string argument is not used in a `ui_out' functioncall, a `NULL' pointer has to be supplied instead.4.2.3 Table, Tuple and List Functions-------------------------------------This section introduces `ui_out' routines for building lists, tuplesand tables. The routines to output the actual data items (fields) arepresented in the next section.To recap: A "tuple" is a sequence of "fields", each field containinginformation about an object; a "list" is a sequence of fields whereeach field describes an identical object.Use the "table" functions when your output consists of a list ofrows (tuples) and the console output should include a heading. Use thiseven when you are listing just one object but you still want the header.Tables can not be nested. Tuples and lists can be nested up to amaximum of five levels.The overall structure of the table output code is something likethis:ui_out_table_beginui_out_table_header...ui_out_table_bodyui_out_tuple_beginui_out_field_*...ui_out_tuple_end...ui_out_table_endHere is the description of table-, tuple- and list-related `ui_out'functions:-- Function: void ui_out_table_begin (struct ui_out *UIOUT, intNBROFCOLS, int NR_ROWS, const char *TBLID)The function `ui_out_table_begin' marks the beginning of the outputof a table. It should always be called before any other `ui_out'function for a given table. NBROFCOLS is the number of columns inthe table. NR_ROWS is the number of rows in the table. TBLID isan optional string identifying the table. The string pointed toby TBLID is copied by the implementation of `ui_out_table_begin',so the application can free the string if it was `malloc'ed.The companion function `ui_out_table_end', described below, marksthe end of the table's output.-- Function: void ui_out_table_header (struct ui_out *UIOUT, intWIDTH, enum ui_align ALIGNMENT, const char *COLHDR)`ui_out_table_header' provides the header information for a singletable column. You call this function several times, one each forevery column of the table, after `ui_out_table_begin', but before`ui_out_table_body'.The value of WIDTH gives the column width in characters. Thevalue of ALIGNMENT is one of `left', `center', and `right', and itspecifies how to align the header: left-justify, center, orright-justify it. COLHDR points to a string that specifies thecolumn header; the implementation copies that string, so columnheader strings in `malloc'ed storage can be freed after the call.-- Function: void ui_out_table_body (struct ui_out *UIOUT)This function delimits the table header from the table body.-- Function: void ui_out_table_end (struct ui_out *UIOUT)This function signals the end of a table's output. It should becalled after the table body has been produced by the list andfield output functions.There should be exactly one call to `ui_out_table_end' for eachcall to `ui_out_table_begin', otherwise the `ui_out' functionswill signal an internal error.The output of the tuples that represent the table rows must followthe call to `ui_out_table_body' and precede the call to`ui_out_table_end'. You build a tuple by calling `ui_out_tuple_begin'and `ui_out_tuple_end', with suitable calls to functions which actuallyoutput fields between them.-- Function: void ui_out_tuple_begin (struct ui_out *UIOUT, const char*ID)This function marks the beginning of a tuple output. ID points toan optional string that identifies the tuple; it is copied by theimplementation, and so strings in `malloc'ed storage can be freedafter the call.-- Function: void ui_out_tuple_end (struct ui_out *UIOUT)This function signals an end of a tuple output. There should beexactly one call to `ui_out_tuple_end' for each call to`ui_out_tuple_begin', otherwise an internal GDB error will besignaled.-- Function: struct cleanup * make_cleanup_ui_out_tuple_begin_end(struct ui_out *UIOUT, const char *ID)This function first opens the tuple and then establishes a cleanup(*note Cleanups: Coding.) to close the tuple. It provides aconvenient and correct implementation of the non-portable(1) codesequence:struct cleanup *old_cleanup;ui_out_tuple_begin (uiout, "...");old_cleanup = make_cleanup ((void(*)(void *)) ui_out_tuple_end,uiout);-- Function: void ui_out_list_begin (struct ui_out *UIOUT, const char*ID)This function marks the beginning of a list output. ID points toan optional string that identifies the list; it is copied by theimplementation, and so strings in `malloc'ed storage can be freedafter the call.-- Function: void ui_out_list_end (struct ui_out *UIOUT)This function signals an end of a list output. There should beexactly one call to `ui_out_list_end' for each call to`ui_out_list_begin', otherwise an internal GDB error will besignaled.-- Function: struct cleanup * make_cleanup_ui_out_list_begin_end(struct ui_out *UIOUT, const char *ID)Similar to `make_cleanup_ui_out_tuple_begin_end', this functionopens a list and then establishes cleanup (*note Cleanups: Coding.)that will close the list.4.2.4 Item Output Functions---------------------------The functions described below produce output for the actual data items,or fields, which contain information about the object.Choose the appropriate function accordingly to your particular needs.-- Function: void ui_out_field_fmt (struct ui_out *UIOUT, char*FLDNAME, char *FORMAT, ...)This is the most general output function. It produces therepresentation of the data in the variable-length argument listaccording to formatting specifications in FORMAT, a `printf'-likeformat string. The optional argument FLDNAME supplies the name ofthe field. The data items themselves are supplied as additionalarguments after FORMAT.This generic function should be used only when it is not possibleto use one of the specialized versions (see below).-- Function: void ui_out_field_int (struct ui_out *UIOUT, const char*FLDNAME, int VALUE)This function outputs a value of an `int' variable. It uses the`"%d"' output conversion specification. FLDNAME specifies thename of the field.-- Function: void ui_out_field_fmt_int (struct ui_out *UIOUT, intWIDTH, enum ui_align ALIGNMENT, const char *FLDNAME, intVALUE)This function outputs a value of an `int' variable. It differsfrom `ui_out_field_int' in that the caller specifies the desiredWIDTH and ALIGNMENT of the output. FLDNAME specifies the name ofthe field.-- Function: void ui_out_field_core_addr (struct ui_out *UIOUT, constchar *FLDNAME, struct gdbarch *GDBARCH, CORE_ADDR ADDRESS)This function outputs an address as appropriate for GDBARCH.-- Function: void ui_out_field_string (struct ui_out *UIOUT, constchar *FLDNAME, const char *STRING)This function outputs a string using the `"%s"' conversionspecification.Sometimes, there's a need to compose your output piece by piece usingfunctions that operate on a stream, such as `value_print' or`fprintf_symbol_filtered'. These functions accept an argument of thetype `struct ui_file *', a pointer to a `ui_file' object used to storethe data stream used for the output. When you use one of thesefunctions, you need a way to pass their results stored in a `ui_file'object to the `ui_out' functions. To this end, you first create a`ui_stream' object by calling `ui_out_stream_new', pass the `stream'member of that `ui_stream' object to `value_print' and similarfunctions, and finally call `ui_out_field_stream' to output the fieldyou constructed. When the `ui_stream' object is no longer needed, youshould destroy it and free its memory by calling `ui_out_stream_delete'.-- Function: struct ui_stream * ui_out_stream_new (struct ui_out*UIOUT)This function creates a new `ui_stream' object which uses the sameoutput methods as the `ui_out' object whose pointer is passed inUIOUT. It returns a pointer to the newly created `ui_stream'object.-- Function: void ui_out_stream_delete (struct ui_stream *STREAMBUF)This functions destroys a `ui_stream' object specified bySTREAMBUF.-- Function: void ui_out_field_stream (struct ui_out *UIOUT, constchar *FIELDNAME, struct ui_stream *STREAMBUF)This function consumes all the data accumulated in`streambuf->stream' and outputs it like `ui_out_field_string'does. After a call to `ui_out_field_stream', the accumulated datano longer exists, but the stream is still valid and may be usedfor producing more fields.*Important:* If there is any chance that your code could bail outbefore completing output generation and reaching the point where`ui_out_stream_delete' is called, it is necessary to set up a cleanup,to avoid leaking memory and other resources. Here's a skeleton code todo that:struct ui_stream *mybuf = ui_out_stream_new (uiout);struct cleanup *old = make_cleanup (ui_out_stream_delete, mybuf);...do_cleanups (old);If the function already has the old cleanup chain set (for otherkinds of cleanups), you just have to add your cleanup to it:mybuf = ui_out_stream_new (uiout);make_cleanup (ui_out_stream_delete, mybuf);Note that with cleanups in place, you should not call`ui_out_stream_delete' directly, or you would attempt to free the samebuffer twice.4.2.5 Utility Output Functions-------------------------------- Function: void ui_out_field_skip (struct ui_out *UIOUT, const char*FLDNAME)This function skips a field in a table. Use it if you have toleave an empty field without disrupting the table alignment. Theargument FLDNAME specifies a name for the (missing) filed.-- Function: void ui_out_text (struct ui_out *UIOUT, const char*STRING)This function outputs the text in STRING in a way that makes iteasy to be read by humans. For example, the consoleimplementation of this method filters the text through a built-inpager, to prevent it from scrolling off the visible portion of thescreen.Use this function for printing relatively long chunks of textaround the actual field data: the text it produces is not alignedaccording to the table's format. Use `ui_out_field_string' tooutput a string field, and use `ui_out_message', described below,to output short messages.-- Function: void ui_out_spaces (struct ui_out *UIOUT, int NSPACES)This function outputs NSPACES spaces. It is handy to align thetext produced by `ui_out_text' with the rest of the table or list.-- Function: void ui_out_message (struct ui_out *UIOUT, int VERBOSITY,const char *FORMAT, ...)This function produces a formatted message, provided that thecurrent verbosity level is at least as large as given byVERBOSITY. The current verbosity level is specified by the userwith the `set verbositylevel' command.(2)-- Function: void ui_out_wrap_hint (struct ui_out *UIOUT, char *INDENT)This function gives the console output filter (a paging filter) ahint of where to break lines which are too long. Ignored for allother output consumers. INDENT, if non-`NULL', is the string tobe printed to indent the wrapped text on the next line; it mustremain accessible until the next call to `ui_out_wrap_hint', oruntil an explicit newline is produced by one of the otherfunctions. If INDENT is `NULL', the wrapped text will not beindented.-- Function: void ui_out_flush (struct ui_out *UIOUT)This function flushes whatever output has been accumulated so far,if the UI buffers output.4.2.6 Examples of Use of `ui_out' functions-------------------------------------------This section gives some practical examples of using the `ui_out'functions to generalize the old console-oriented code in GDB. Theexamples all come from functions defined on the `breakpoints.c' file.This example, from the `breakpoint_1' function, shows how to producea table.The original code was:if (!found_a_breakpoint++){annotate_breakpoints_headers ();annotate_field (0);printf_filtered ("Num ");annotate_field (1);printf_filtered ("Type ");annotate_field (2);printf_filtered ("Disp ");annotate_field (3);printf_filtered ("Enb ");if (addressprint){annotate_field (4);printf_filtered ("Address ");}annotate_field (5);printf_filtered ("What\n");annotate_breakpoints_table ();}Here's the new version:nr_printable_breakpoints = ...;if (addressprint)ui_out_table_begin (ui, 6, nr_printable_breakpoints, "BreakpointTable");elseui_out_table_begin (ui, 5, nr_printable_breakpoints, "BreakpointTable");if (nr_printable_breakpoints > 0)annotate_breakpoints_headers ();if (nr_printable_breakpoints > 0)annotate_field (0);ui_out_table_header (uiout, 3, ui_left, "number", "Num"); /* 1 */if (nr_printable_breakpoints > 0)annotate_field (1);ui_out_table_header (uiout, 14, ui_left, "type", "Type"); /* 2 */if (nr_printable_breakpoints > 0)annotate_field (2);ui_out_table_header (uiout, 4, ui_left, "disp", "Disp"); /* 3 */if (nr_printable_breakpoints > 0)annotate_field (3);ui_out_table_header (uiout, 3, ui_left, "enabled", "Enb"); /* 4 */if (addressprint){if (nr_printable_breakpoints > 0)annotate_field (4);if (print_address_bits <= 32)ui_out_table_header (uiout, 10, ui_left, "addr", "Address");/* 5 */elseui_out_table_header (uiout, 18, ui_left, "addr", "Address");/* 5 */}if (nr_printable_breakpoints > 0)annotate_field (5);ui_out_table_header (uiout, 40, ui_noalign, "what", "What"); /* 6 */ui_out_table_body (uiout);if (nr_printable_breakpoints > 0)annotate_breakpoints_table ();This example, from the `print_one_breakpoint' function, shows how toproduce the actual data for the table whose structure was defined inthe above example. The original code was:annotate_record ();annotate_field (0);printf_filtered ("%-3d ", b->number);annotate_field (1);if ((int)b->type > (sizeof(bptypes)/sizeof(bptypes[0]))|| ((int) b->type != bptypes[(int) b->type].type))internal_error ("bptypes table does not describe type #%d.",(int)b->type);printf_filtered ("%-14s ", bptypes[(int)b->type].description);annotate_field (2);printf_filtered ("%-4s ", bpdisps[(int)b->disposition]);annotate_field (3);printf_filtered ("%-3c ", bpenables[(int)b->enable]);...This is the new version:annotate_record ();ui_out_tuple_begin (uiout, "bkpt");annotate_field (0);ui_out_field_int (uiout, "number", b->number);annotate_field (1);if (((int) b->type > (sizeof (bptypes) / sizeof (bptypes[0])))|| ((int) b->type != bptypes[(int) b->type].type))internal_error ("bptypes table does not describe type #%d.",(int) b->type);ui_out_field_string (uiout, "type", bptypes[(int)b->type].description);annotate_field (2);ui_out_field_string (uiout, "disp", bpdisps[(int)b->disposition]);annotate_field (3);ui_out_field_fmt (uiout, "enabled", "%c", bpenables[(int)b->enable]);...This example, also from `print_one_breakpoint', shows how to producea complicated output field using the `print_expression' functions whichrequires a stream to be passed. It also shows how to automate streamdestruction with cleanups. The original code was:annotate_field (5);print_expression (b->exp, gdb_stdout);The new version is:struct ui_stream *stb = ui_out_stream_new (uiout);struct cleanup *old_chain = make_cleanup_ui_out_stream_delete (stb);...annotate_field (5);print_expression (b->exp, stb->stream);ui_out_field_stream (uiout, "what", local_stream);This example, also from `print_one_breakpoint', shows how to use`ui_out_text' and `ui_out_field_string'. The original code was:annotate_field (5);if (b->dll_pathname == NULL)printf_filtered ("<any library> ");elseprintf_filtered ("library \"%s\" ", b->dll_pathname);It became:annotate_field (5);if (b->dll_pathname == NULL){ui_out_field_string (uiout, "what", "<any library>");ui_out_spaces (uiout, 1);}else{ui_out_text (uiout, "library \"");ui_out_field_string (uiout, "what", b->dll_pathname);ui_out_text (uiout, "\" ");}The following example from `print_one_breakpoint' shows how to use`ui_out_field_int' and `ui_out_spaces'. The original code was:annotate_field (5);if (b->forked_inferior_pid != 0)printf_filtered ("process %d ", b->forked_inferior_pid);It became:annotate_field (5);if (b->forked_inferior_pid != 0){ui_out_text (uiout, "process ");ui_out_field_int (uiout, "what", b->forked_inferior_pid);ui_out_spaces (uiout, 1);}Here's an example of using `ui_out_field_string'. The original codewas:annotate_field (5);if (b->exec_pathname != NULL)printf_filtered ("program \"%s\" ", b->exec_pathname);It became:annotate_field (5);if (b->exec_pathname != NULL){ui_out_text (uiout, "program \"");ui_out_field_string (uiout, "what", b->exec_pathname);ui_out_text (uiout, "\" ");}Finally, here's an example of printing an address. The originalcode:annotate_field (4);printf_filtered ("%s ",hex_string_custom ((unsigned long) b->address, 8));It became:annotate_field (4);ui_out_field_core_addr (uiout, "Address", b->address);4.3 Console Printing====================4.4 TUI=======---------- Footnotes ----------(1) The function cast is not portable ISO C.(2) As of this writing (April 2001), setting verbosity level is notyet implemented, and is always returned as zero. So calling`ui_out_message' with a VERBOSITY argument more than zero will causethe message to never be printed.File: gdbint.info, Node: libgdb, Next: Values, Prev: User Interface, Up: Top5 libgdb********5.1 libgdb 1.0==============`libgdb' 1.0 was an abortive project of years ago. The theory was toprovide an API to GDB's functionality.5.2 libgdb 2.0==============`libgdb' 2.0 is an ongoing effort to update GDB so that is better ableto support graphical and other environments.Since `libgdb' development is on-going, its architecture is stillevolving. The following components have so far been identified:* Observer - `gdb-events.h'.* Builder - `ui-out.h'* Event Loop - `event-loop.h'* Library - `gdb.h'The model that ties these components together is described below.5.3 The `libgdb' Model======================A client of `libgdb' interacts with the library in two ways.* As an observer (using `gdb-events') receiving notifications from`libgdb' of any internal state changes (break point changes, runstate, etc).* As a client querying `libgdb' (using the `ui-out' builder) toobtain various status values from GDB.Since `libgdb' could have multiple clients (e.g., a GUI supportingthe existing GDB CLI), those clients must co-operate when controlling`libgdb'. In particular, a client must ensure that `libgdb' is idle(i.e. no other client is using `libgdb') before responding to a`gdb-event' by making a query.5.4 CLI support===============At present GDB's CLI is very much entangled in with the core of`libgdb'. Consequently, a client wishing to include the CLI in theirinterface needs to carefully co-ordinate its own and the CLI'srequirements.It is suggested that the client set `libgdb' up to be bi-modal(alternate between CLI and client query modes). The notes below sketchout the theory:* The client registers itself as an observer of `libgdb'.* The client create and install `cli-out' builder using its ownversions of the `ui-file' `gdb_stderr', `gdb_stdtarg' and`gdb_stdout' streams.* The client creates a separate custom `ui-out' builder that is onlyused while making direct queries to `libgdb'.When the client receives input intended for the CLI, it simplypasses it along. Since the `cli-out' builder is installed by default,all the CLI output in response to that command is routed (pronouncedrooted) through to the client controlled `gdb_stdout' et. al. streams.At the same time, the client is kept abreast of internal changes byvirtue of being a `libgdb' observer.The only restriction on the client is that it must wait until`libgdb' becomes idle before initiating any queries (using the client'scustom builder).5.5 `libgdb' components=======================Observer - `gdb-events.h'-------------------------`gdb-events' provides the client with a very raw mechanism that can beused to implement an observer. At present it only allows for oneobserver and that observer must, internally, handle the need to delaythe processing of any event notifications until after `libgdb' hasfinished the current command.Builder - `ui-out.h'--------------------`ui-out' provides the infrastructure necessary for a client to create abuilder. That builder is then passed down to `libgdb' when doing anyqueries.Event Loop - `event-loop.h'---------------------------`event-loop', currently non-re-entrant, provides a simple event loop.A client would need to either plug its self into this loop or,implement a new event-loop that GDB would use.The event-loop will eventually be made re-entrant. This is so thatGDB can better handle the problem of some commands blocking instead ofreturning.Library - `gdb.h'-----------------`libgdb' is the most obvious component of this system. It provides thequery interface. Each function is parameterized by a `ui-out' builder.The result of the query is constructed using that builder before thequery function returns.File: gdbint.info, Node: Values, Next: Stack Frames, Prev: libgdb, Up: Top6 Values********6.1 Values==========GDB uses `struct value', or "values", as an internal abstraction forthe representation of a variety of inferior objects and GDB convenienceobjects.Values have an associated `struct type', that describes a virtualview of the raw data or object stored in or accessed through the value.A value is in addition discriminated by its lvalue-ness, given its`enum lval_type' enumeration type:``not_lval''This value is not an lval. It can't be assigned to.``lval_memory''This value represents an object in memory.``lval_register''This value represents an object that lives in a register.``lval_internalvar''Represents the value of an internal variable.``lval_internalvar_component''Represents part of a GDB internal variable. E.g., a structurefield.``lval_computed''These are "computed" values. They allow creating specialized valueobjects for specific purposes, all abstracted away from the corevalue support code. The creator of such a value writes specializedfunctions to handle the reading and writing to/from the value'sbackend data, and optionally, a "copy operator" and a "destructor".Pointers to these functions are stored in a `struct lval_funcs'instance (declared in `value.h'), and passed to the`allocate_computed_value' function, as in the example below.static voidnil_value_read (struct value *v){/* This callback reads data from some backend, and stores it in V.In this case, we always read null data. You'll want to fill insomething more interesting. */memset (value_contents_all_raw (v),value_offset (v),TYPE_LENGTH (value_type (v)));}static voidnil_value_write (struct value *v, struct value *fromval){/* Takes the data from FROMVAL and stores it in the backend of V. */to_oblivion (value_contents_all_raw (fromval),value_offset (v),TYPE_LENGTH (value_type (fromval)));}static struct lval_funcs nil_value_funcs ={nil_value_read,nil_value_write};struct value *make_nil_value (void){struct type *type;struct value *v;type = make_nils_type ();v = allocate_computed_value (type, &nil_value_funcs, NULL);return v;}See the implementation of the `$_siginfo' convenience variable in`infrun.c' as a real example use of lval_computed.File: gdbint.info, Node: Stack Frames, Next: Symbol Handling, Prev: Values, Up: Top7 Stack Frames**************A frame is a construct that GDB uses to keep track of calling andcalled functions.GDB's frame model, a fresh design, was implemented with the need tosupport DWARF's Call Frame Information in mind. In fact, the term"unwind" is taken directly from that specification. Developers wishingto learn more about unwinders, are encouraged to read the DWARFspecification, available from `http://www.dwarfstd.org'.GDB's model is that you find a frame's registers by "unwinding" themfrom the next younger frame. That is, `get_frame_register' whichreturns the value of a register in frame #1 (the next-to-youngestframe), is implemented by calling frame #0's `frame_register_unwind'(the youngest frame). But then the obvious question is: how do youaccess the registers of the youngest frame itself?To answer this question, GDB has the "sentinel" frame, the "-1st"frame. Unwinding registers from the sentinel frame gives you thecurrent values of the youngest real frame's registers. If F is asentinel frame, then `get_frame_type (F) == SENTINEL_FRAME'.7.1 Selecting an Unwinder=========================The architecture registers a list of frame unwinders (`structframe_unwind'), using the functions `frame_unwind_prepend_unwinder' and`frame_unwind_append_unwinder'. Each unwinder includes a sniffer.Whenever GDB needs to unwind a frame (to fetch the previous frame'sregisters or the current frame's ID), it calls registered sniffers inorder to find one which recognizes the frame. The first time a snifferreturns non-zero, the corresponding unwinder is assigned to the frame.7.2 Unwinding the Frame ID==========================Every frame has an associated ID, of type `struct frame_id'. The IDincludes the stack base and function start address for the frame. TheID persists through the entire life of the frame, including while othercalled frames are running; it is used to locate an appropriate `structframe_info' from the cache.Every time the inferior stops, and at various other times, the framecache is flushed. Because of this, parts of GDB which need to keeptrack of individual frames cannot use pointers to `struct frame_info'.A frame ID provides a stable reference to a frame, even when theunwinder must be run again to generate a new `struct frame_info' forthe same frame.The frame's unwinder's `this_id' method is called to find the ID.Note that this is different from register unwinding, where the nextframe's `prev_register' is called to unwind this frame's registers.Both stack base and function address are required to identify theframe, because a recursive function has the same function address fortwo consecutive frames and a leaf function may have the same stackaddress as its caller. On some platforms, a third address is part ofthe ID to further disambiguate frames--for instance, on IA-64 theseparate register stack address is included in the ID.An invalid frame ID (`outer_frame_id') returned from the `this_id'method means to stop unwinding after this frame.`null_frame_id' is another invalid frame ID which should be usedwhen there is no frame. For instance, certain breakpoints are attachedto a specific frame, and that frame is identified through its frame ID(we use this to implement the "finish" command). Using `null_frame_id'as the frame ID for a given breakpoint means that the breakpoint is notspecific to any frame. The `this_id' method should never return`null_frame_id'.7.3 Unwinding Registers=======================Each unwinder includes a `prev_register' method. This method takes aframe, an associated cache pointer, and a register number. It returnsa `struct value *' describing the requested register, as saved by thisframe. This is the value of the register that is current in thisframe's caller.The returned value must have the same type as the register. It mayhave any lvalue type. In most circumstances one of these routines willgenerate the appropriate value:`frame_unwind_got_optimized'This register was not saved.`frame_unwind_got_register'This register was copied into another register in this frame. Thisis also used for unchanged registers; they are "copied" into thesame register.`frame_unwind_got_memory'This register was saved in memory.`frame_unwind_got_constant'This register was not saved, but the unwinder can compute theprevious value some other way.`frame_unwind_got_address'Same as `frame_unwind_got_constant', except that the value is atarget address. This is frequently used for the stack pointer,which is not explicitly saved but has a known offset from thisframe's stack pointer. For architectures with a flat unifiedaddress space, this is generally the same as`frame_unwind_got_constant'.File: gdbint.info, Node: Symbol Handling, Next: Language Support, Prev: Stack Frames, Up: Top8 Symbol Handling*****************Symbols are a key part of GDB's operation. Symbols include variables,functions, and types.Symbol information for a large program can be truly massive, andreading of symbol information is one of the major performancebottlenecks in GDB; it can take many minutes to process it all.Studies have shown that nearly all the time spent is computational,rather than file reading.One of the ways for GDB to provide a good user experience is tostart up quickly, taking no more than a few seconds. It is simply notpossible to process all of a program's debugging info in that time, andso we attempt to handle symbols incrementally. For instance, we create"partial symbol tables" consisting of only selected symbols, and onlyexpand them to full symbol tables when necessary.8.1 Symbol Reading==================GDB reads symbols from "symbol files". The usual symbol file is thefile containing the program which GDB is debugging. GDB can bedirected to use a different file for symbols (with the `symbol-file'command), and it can also read more symbols via the `add-file' and`load' commands. In addition, it may bring in more symbols whileloading shared libraries.Symbol files are initially opened by code in `symfile.c' using theBFD library (*note Support Libraries::). BFD identifies the type ofthe file by examining its header. `find_sym_fns' then uses thisidentification to locate a set of symbol-reading functions.Symbol-reading modules identify themselves to GDB by calling`add_symtab_fns' during their module initialization. The argument to`add_symtab_fns' is a `struct sym_fns' which contains the name (or nameprefix) of the symbol format, the length of the prefix, and pointers tofour functions. These functions are called at various times to processsymbol files whose identification matches the specified prefix.The functions supplied by each module are:`XYZ_symfile_init(struct sym_fns *sf)'Called from `symbol_file_add' when we are about to read a newsymbol file. This function should clean up any internal state(possibly resulting from half-read previous files, for example)and prepare to read a new symbol file. Note that the symbol filewhich we are reading might be a new "main" symbol file, or mightbe a secondary symbol file whose symbols are being added to theexisting symbol table.The argument to `XYZ_symfile_init' is a newly allocated `structsym_fns' whose `bfd' field contains the BFD for the new symbolfile being read. Its `private' field has been zeroed, and can bemodified as desired. Typically, a struct of private informationwill be `malloc''d, and a pointer to it will be placed in the`private' field.There is no result from `XYZ_symfile_init', but it can call`error' if it detects an unavoidable problem.`XYZ_new_init()'Called from `symbol_file_add' when discarding existing symbols.This function needs only handle the symbol-reading module'sinternal state; the symbol table data structures visible to therest of GDB will be discarded by `symbol_file_add'. It has noarguments and no result. It may be called after`XYZ_symfile_init', if a new symbol table is being read, or may becalled alone if all symbols are simply being discarded.`XYZ_symfile_read(struct sym_fns *sf, CORE_ADDR addr, int mainline)'Called from `symbol_file_add' to actually read the symbols from asymbol-file into a set of psymtabs or symtabs.`sf' points to the `struct sym_fns' originally passed to`XYZ_sym_init' for possible initialization. `addr' is the offsetbetween the file's specified start address and its true address inmemory. `mainline' is 1 if this is the main symbol table beingread, and 0 if a secondary symbol file (e.g., shared library ordynamically loaded file) is being read.In addition, if a symbol-reading module creates psymtabs whenXYZ_symfile_read is called, these psymtabs will contain a pointer to afunction `XYZ_psymtab_to_symtab', which can be called from any point inthe GDB symbol-handling code.`XYZ_psymtab_to_symtab (struct partial_symtab *pst)'Called from `psymtab_to_symtab' (or the `PSYMTAB_TO_SYMTAB' macro)if the psymtab has not already been read in and had its`pst->symtab' pointer set. The argument is the psymtab to befleshed-out into a symtab. Upon return, `pst->readin' should havebeen set to 1, and `pst->symtab' should contain a pointer to thenew corresponding symtab, or zero if there were no symbols in thatpart of the symbol file.8.2 Partial Symbol Tables=========================GDB has three types of symbol tables:* Full symbol tables ("symtabs"). These contain the maininformation about symbols and addresses.* Partial symbol tables ("psymtabs"). These contain enoughinformation to know when to read the corresponding part of the fullsymbol table.* Minimal symbol tables ("msymtabs"). These contain informationgleaned from non-debugging symbols.This section describes partial symbol tables.A psymtab is constructed by doing a very quick pass over anexecutable file's debugging information. Small amounts of informationare extracted--enough to identify which parts of the symbol table willneed to be re-read and fully digested later, when the user needs theinformation. The speed of this pass causes GDB to start up veryquickly. Later, as the detailed rereading occurs, it occurs in smallpieces, at various times, and the delay therefrom is mostly invisible tothe user.The symbols that show up in a file's psymtab should be, roughly,those visible to the debugger's user when the program is not runningcode from that file. These include external symbols and types, staticsymbols and types, and `enum' values declared at file scope.The psymtab also contains the range of instruction addresses that thefull symbol table would represent.The idea is that there are only two ways for the user (or much of thecode in the debugger) to reference a symbol:* By its address (e.g., execution stops at some address which isinside a function in this file). The address will be noticed tobe in the range of this psymtab, and the full symtab will be readin. `find_pc_function', `find_pc_line', and other `find_pc_...'functions handle this.* By its name (e.g., the user asks to print a variable, or set abreakpoint on a function). Global names and file-scope names willbe found in the psymtab, which will cause the symtab to be pulledin. Local names will have to be qualified by a global name, or afile-scope name, in which case we will have already read in thesymtab as we evaluated the qualifier. Or, a local symbol can bereferenced when we are "in" a local scope, in which case the firstcase applies. `lookup_symbol' does most of the work here.The only reason that psymtabs exist is to cause a symtab to be readin at the right moment. Any symbol that can be elided from a psymtab,while still causing that to happen, should not appear in it. Sincepsymtabs don't have the idea of scope, you can't put local symbols inthem anyway. Psymtabs don't have the idea of the type of a symbol,either, so types need not appear, unless they will be referenced byname.It is a bug for GDB to behave one way when only a psymtab has beenread, and another way if the corresponding symtab has been read in.Such bugs are typically caused by a psymtab that does not contain allthe visible symbols, or which has the wrong instruction address ranges.The psymtab for a particular section of a symbol file (objfile)could be thrown away after the symtab has been read in. The symtabshould always be searched before the psymtab, so the psymtab will neverbe used (in a bug-free environment). Currently, psymtabs are allocatedon an obstack, and all the psymbols themselves are allocated in a pairof large arrays on an obstack, so there is little to be gained bytrying to free them unless you want to do a lot more work.8.3 Types=========Fundamental Types (e.g., `FT_VOID', `FT_BOOLEAN').--------------------------------------------------These are the fundamental types that GDB uses internally. Fundamentaltypes from the various debugging formats (stabs, ELF, etc) are mappedinto one of these. They are basically a union of all fundamental typesthat GDB knows about for all the languages that GDB knows about.Type Codes (e.g., `TYPE_CODE_PTR', `TYPE_CODE_ARRAY').------------------------------------------------------Each time GDB builds an internal type, it marks it with one of thesetypes. The type may be a fundamental type, such as `TYPE_CODE_INT', ora derived type, such as `TYPE_CODE_PTR' which is a pointer to anothertype. Typically, several `FT_*' types map to one `TYPE_CODE_*' type,and are distinguished by other members of the type struct, such aswhether the type is signed or unsigned, and how many bits it uses.Builtin Types (e.g., `builtin_type_void', `builtin_type_char').---------------------------------------------------------------These are instances of type structs that roughly correspond tofundamental types and are created as global types for GDB to use forvarious ugly historical reasons. We eventually want to eliminatethese. Note for example that `builtin_type_int' initialized in`gdbtypes.c' is basically the same as a `TYPE_CODE_INT' type that isinitialized in `c-lang.c' for an `FT_INTEGER' fundamental type. Thedifference is that the `builtin_type' is not associated with anyparticular objfile, and only one instance exists, while `c-lang.c'builds as many `TYPE_CODE_INT' types as needed, with each oneassociated with some particular objfile.8.4 Object File Formats=======================8.4.1 a.out-----------The `a.out' format is the original file format for Unix. It consistsof three sections: `text', `data', and `bss', which are for programcode, initialized data, and uninitialized data, respectively.The `a.out' format is so simple that it doesn't have any reservedplace for debugging information. (Hey, the original Unix hackers used`adb', which is a machine-language debugger!) The only debuggingformat for `a.out' is stabs, which is encoded as a set of normalsymbols with distinctive attributes.The basic `a.out' reader is in `dbxread.c'.8.4.2 COFF----------The COFF format was introduced with System V Release 3 (SVR3) Unix.COFF files may have multiple sections, each prefixed by a header. Thenumber of sections is limited.The COFF specification includes support for debugging. Although thiswas a step forward, the debugging information was woefully limited.For instance, it was not possible to represent code that came from anincluded file. GNU's COFF-using configs often use stabs-type info,encapsulated in special sections.The COFF reader is in `coffread.c'.8.4.3 ECOFF-----------ECOFF is an extended COFF originally introduced for Mips and Alphaworkstations.The basic ECOFF reader is in `mipsread.c'.8.4.4 XCOFF-----------The IBM RS/6000 running AIX uses an object file format called XCOFF.The COFF sections, symbols, and line numbers are used, but debuggingsymbols are `dbx'-style stabs whose strings are located in the `.debug'section (rather than the string table). For more information, see*Note Top: (stabs)Top.The shared library scheme has a clean interface for figuring out whatshared libraries are in use, but the catch is that everything whichrefers to addresses (symbol tables and breakpoints at least) needs to berelocated for both shared libraries and the main executable. At leastusing the standard mechanism this can only be done once the program hasbeen run (or the core file has been read).8.4.5 PE--------Windows 95 and NT use the PE ("Portable Executable") format for theirexecutables. PE is basically COFF with additional headers.While BFD includes special PE support, GDB needs only the basic COFFreader.8.4.6 ELF---------The ELF format came with System V Release 4 (SVR4) Unix. ELF issimilar to COFF in being organized into a number of sections, but itremoves many of COFF's limitations. Debugging info may be either stabsencapsulated in ELF sections, or more commonly these days, DWARF.The basic ELF reader is in `elfread.c'.8.4.7 SOM---------SOM is HP's object file and debug format (not to be confused with IBM'sSOM, which is a cross-language ABI).The SOM reader is in `somread.c'.8.5 Debugging File Formats==========================This section describes characteristics of debugging information thatare independent of the object file format.8.5.1 stabs-----------`stabs' started out as special symbols within the `a.out' format.Since then, it has been encapsulated into other file formats, such asCOFF and ELF.While `dbxread.c' does some of the basic stab processing, includingfor encapsulated versions, `stabsread.c' does the real work.8.5.2 COFF----------The basic COFF definition includes debugging information. The level ofsupport is minimal and non-extensible, and is not often used.8.5.3 Mips debug (Third Eye)----------------------------ECOFF includes a definition of a special debug format.The file `mdebugread.c' implements reading for this format.8.5.4 DWARF 2-------------DWARF 2 is an improved but incompatible version of DWARF 1.The DWARF 2 reader is in `dwarf2read.c'.8.5.5 Compressed DWARF 2------------------------Compressed DWARF 2 is not technically a separate debugging format, butmerely DWARF 2 debug information that has been compressed. In thisformat, every object-file section holding DWARF 2 debugging informationis compressed and prepended with a header. (The section is alsotypically renamed, so a section called `.debug_info' in a DWARF 2binary would be called `.zdebug_info' in a compressed DWARF 2 binary.)The header is 12 bytes long:* 4 bytes: the literal string "ZLIB"* 8 bytes: the uncompressed size of the section, in big-endian byteorder.The same reader is used for both compressed an normal DWARF 2 info.Section decompression is done in `zlib_decompress_section' in`dwarf2read.c'.8.5.6 DWARF 3-------------DWARF 3 is an improved version of DWARF 2.8.5.7 SOM---------Like COFF, the SOM definition includes debugging information.8.6 Adding a New Symbol Reader to GDB=====================================If you are using an existing object file format (`a.out', COFF, ELF,etc), there is probably little to be done.If you need to add a new object file format, you must first add it toBFD. This is beyond the scope of this document.You must then arrange for the BFD code to provide access to thedebugging symbols. Generally GDB will have to call swapping routinesfrom BFD and a few other BFD internal routines to locate the debugginginformation. As much as possible, GDB should not depend on the BFDinternal data structures.For some targets (e.g., COFF), there is a special transfer vectorused to call swapping routines, since the external data structures onvarious platforms have different sizes and layouts. Specializedroutines that will only ever be implemented by one object file formatmay be called directly. This interface should be described in a file`bfd/libXYZ.h', which is included by GDB.8.7 Memory Management for Symbol Files======================================Most memory associated with a loaded symbol file is stored on its`objfile_obstack'. This includes symbols, types, namespace data, andother information produced by the symbol readers.Because this data lives on the objfile's obstack, it is automaticallyreleased when the objfile is unloaded or reloaded. Therefore oneobjfile must not reference symbol or type data from another objfile;they could be unloaded at different times.User convenience variables, et cetera, have associated types.Normally these types live in the associated objfile. However, when theobjfile is unloaded, those types are deep copied to global memory, sothat the values of the user variables and history items are not lost.File: gdbint.info, Node: Language Support, Next: Host Definition, Prev: Symbol Handling, Up: Top9 Language Support******************GDB's language support is mainly driven by the symbol reader, althoughit is possible for the user to set the source language manually.GDB chooses the source language by looking at the extension of thefile recorded in the debug info; `.c' means C, `.f' means Fortran, etc.It may also use a special-purpose language identifier if the debugformat supports it, like with DWARF.9.1 Adding a Source Language to GDB===================================To add other languages to GDB's expression parser, follow the followingsteps:_Create the expression parser._This should reside in a file `LANG-exp.y'. Routines for buildingparsed expressions into a `union exp_element' list are in`parse.c'.Since we can't depend upon everyone having Bison, and YACC producesparsers that define a bunch of global names, the following lines*must* be included at the top of the YACC parser, to prevent thevarious parsers from defining the same global names:#define yyparse LANG_parse#define yylex LANG_lex#define yyerror LANG_error#define yylval LANG_lval#define yychar LANG_char#define yydebug LANG_debug#define yypact LANG_pact#define yyr1 LANG_r1#define yyr2 LANG_r2#define yydef LANG_def#define yychk LANG_chk#define yypgo LANG_pgo#define yyact LANG_act#define yyexca LANG_exca#define yyerrflag LANG_errflag#define yynerrs LANG_nerrsAt the bottom of your parser, define a `struct language_defn' andinitialize it with the right values for your language. Define an`initialize_LANG' routine and have it call`add_language(LANG_language_defn)' to tell the rest of GDB thatyour language exists. You'll need some other supporting variablesand functions, which will be used via pointers from your`LANG_language_defn'. See the declaration of `structlanguage_defn' in `language.h', and the other `*-exp.y' files, formore information._Add any evaluation routines, if necessary_If you need new opcodes (that represent the operations of thelanguage), add them to the enumerated type in `expression.h'. Addsupport code for these operations in the `evaluate_subexp' functiondefined in the file `eval.c'. Add cases for new opcodes in twofunctions from `parse.c': `prefixify_subexp' and`length_of_subexp'. These compute the number of `exp_element'sthat a given operation takes up._Update some existing code_Add an enumerated identifier for your language to the enumeratedtype `enum language' in `defs.h'.Update the routines in `language.c' so your language is included.These routines include type predicates and such, which (in somecases) are language dependent. If your language does not appearin the switch statement, an error is reported.Also included in `language.c' is the code that updates the variable`current_language', and the routines that translate the`language_LANG' enumerated identifier into a printable string.Update the function `_initialize_language' to include yourlanguage. This function picks the default language upon startup,so is dependent upon which languages that GDB is built for.Update `allocate_symtab' in `symfile.c' and/or symbol-reading codeso that the language of each symtab (source file) is set properly.This is used to determine the language to use at each stack framelevel. Currently, the language is set based upon the extension ofthe source file. If the language can be better inferred from thesymbol information, please set the language of the symtab in thesymbol-reading code.Add helper code to `print_subexp' (in `expprint.c') to handle anynew expression opcodes you have added to `expression.h'. Also,add the printed representations of your operators to`op_print_tab'._Add a place of call_Add a call to `LANG_parse()' and `LANG_error' in `parse_exp_1'(defined in `parse.c')._Edit `Makefile.in'_Add dependencies in `Makefile.in'. Make sure you update the macrovariables such as `HFILES' and `OBJS', otherwise your code may notget linked in, or, worse yet, it may not get `tar'red into thedistribution!File: gdbint.info, Node: Host Definition, Next: Target Architecture Definition, Prev: Language Support, Up: Top10 Host Definition******************With the advent of Autoconf, it's rarely necessary to have hostdefinition machinery anymore. The following information is provided,mainly, as an historical reference.10.1 Adding a New Host======================GDB's host configuration support normally happens via Autoconf. Newhost-specific definitions should not be needed. Older hosts GDB stilluse the host-specific definitions and files listed below, but thesemostly exist for historical reasons, and will eventually disappear.`gdb/config/ARCH/XYZ.mh'This file is a Makefile fragment that once contained both host andnative configuration information (*note Native Debugging::) for themachine XYZ. The host configuration information is now handled byAutoconf.Host configuration information included definitions for `CC',`SYSV_DEFINE', `XM_CFLAGS', `XM_ADD_FILES', `XM_CLIBS',`XM_CDEPS', etc.; see `Makefile.in'.New host-only configurations do not need this file.(Files named `gdb/config/ARCH/xm-XYZ.h' were once used to definehost-specific macros, but were no longer needed and have all beenremoved.)Generic Host Support Files--------------------------There are some "generic" versions of routines that can be used byvarious systems.`ser-unix.c'This contains serial line support for Unix systems. It isincluded by default on all Unix-like hosts.`ser-pipe.c'This contains serial pipe support for Unix systems. It isincluded by default on all Unix-like hosts.`ser-mingw.c'This contains serial line support for 32-bit programs running underWindows using MinGW.`ser-go32.c'This contains serial line support for 32-bit programs runningunder DOS, using the DJGPP (a.k.a. GO32) execution environment.`ser-tcp.c'This contains generic TCP support using sockets. It is included bydefault on all Unix-like hosts and with MinGW.10.2 Host Conditionals======================When GDB is configured and compiled, various macros are defined or leftundefined, to control compilation based on the attributes of the hostsystem. While formerly they could be set in host-specific headerfiles, at present they can be changed only by setting `CFLAGS' whenbuilding, or by editing the source code.These macros and their meanings (or if the meaning is not documentedhere, then one of the source files where they are used is indicated)are:`GDBINIT_FILENAME'The default name of GDB's initialization file (normally`.gdbinit').`SIGWINCH_HANDLER'If your host defines `SIGWINCH', you can define this to be the nameof a function to be called if `SIGWINCH' is received.`SIGWINCH_HANDLER_BODY'Define this to expand into code that will define the functionnamed by the expansion of `SIGWINCH_HANDLER'.`CRLF_SOURCE_FILES'Define this if host files use `\r\n' rather than `\n' as a lineterminator. This will cause source file listings to omit `\r'characters when printing and it will allow `\r\n' line endings offiles which are "sourced" by gdb. It must be possible to openfiles in binary mode using `O_BINARY' or, for fopen, `"rb"'.`DEFAULT_PROMPT'The default value of the prompt string (normally `"(gdb) "').`DEV_TTY'The name of the generic TTY device, defaults to `"/dev/tty"'.`ISATTY'Substitute for isatty, if not available.`FOPEN_RB'Define this if binary files are opened the same way as text files.`CC_HAS_LONG_LONG'Define this if the host C compiler supports `long long'. This isset by the `configure' script.`PRINTF_HAS_LONG_LONG'Define this if the host can handle printing of long long integersvia the printf format conversion specifier `ll'. This is set bythe `configure' script.`LSEEK_NOT_LINEAR'Define this if `lseek (n)' does not necessarily move to byte number`n' in the file. This is only used when reading source files. Itis normally faster to define `CRLF_SOURCE_FILES' when possible.`NORETURN'If defined, this should be one or more tokens, such as `volatile',that can be used in both the declaration and definition offunctions to indicate that they never return. The default isalready set correctly if compiling with GCC. This will almostnever need to be defined.`ATTR_NORETURN'If defined, this should be one or more tokens, such as`__attribute__ ((noreturn))', that can be used in the declarationsof functions to indicate that they never return. The default isalready set correctly if compiling with GCC. This will almostnever need to be defined.`lint'Define this to help placate `lint' in some situations.`volatile'Define this to override the defaults of `__volatile__' or `/**/'.File: gdbint.info, Node: Target Architecture Definition, Next: Target Descriptions, Prev: Host Definition, Up: Top11 Target Architecture Definition*********************************GDB's target architecture defines what sort of machine-languageprograms GDB can work with, and how it works with them.The target architecture object is implemented as the C structure`struct gdbarch *'. The structure, and its methods, are generatedusing the Bourne shell script `gdbarch.sh'.* Menu:* OS ABI Variant Handling::* Initialize New Architecture::* Registers and Memory::* Pointers and Addresses::* Address Classes::* Register Representation::* Frame Interpretation::* Inferior Call Setup::* Adding support for debugging core files::* Defining Other Architecture Features::* Adding a New Target::File: gdbint.info, Node: OS ABI Variant Handling, Next: Initialize New Architecture, Up: Target Architecture Definition11.1 Operating System ABI Variant Handling==========================================GDB provides a mechanism for handling variations in OS ABIs. An OS ABIvariant may have influence over any number of variables in the targetarchitecture definition. There are two major components in the OS ABImechanism: sniffers and handlers.A "sniffer" examines a file matching a BFD architecture/flavour pair(the architecture may be wildcarded) in an attempt to determine the OSABI of that file. Sniffers with a wildcarded architecture areconsidered to be "generic", while sniffers for a specific architectureare considered to be "specific". A match from a specific snifferoverrides a match from a generic sniffer. Multiple sniffers for anarchitecture/flavour may exist, in order to differentiate between twodifferent operating systems which use the same basic file format. TheOS ABI framework provides a generic sniffer for ELF-format files whichexamines the `EI_OSABI' field of the ELF header, as well as notesections known to be used by several operating systems.A "handler" is used to fine-tune the `gdbarch' structure for theselected OS ABI. There may be only one handler for a given OS ABI foreach BFD architecture.The following OS ABI variants are defined in `defs.h':`GDB_OSABI_UNINITIALIZED'Used for struct gdbarch_info if ABI is still uninitialized.`GDB_OSABI_UNKNOWN'The ABI of the inferior is unknown. The default `gdbarch'settings for the architecture will be used.`GDB_OSABI_SVR4'UNIX System V Release 4.`GDB_OSABI_HURD'GNU using the Hurd kernel.`GDB_OSABI_SOLARIS'Sun Solaris.`GDB_OSABI_OSF1'OSF/1, including Digital UNIX and Compaq Tru64 UNIX.`GDB_OSABI_LINUX'GNU using the Linux kernel.`GDB_OSABI_FREEBSD_AOUT'FreeBSD using the `a.out' executable format.`GDB_OSABI_FREEBSD_ELF'FreeBSD using the ELF executable format.`GDB_OSABI_NETBSD_AOUT'NetBSD using the `a.out' executable format.`GDB_OSABI_NETBSD_ELF'NetBSD using the ELF executable format.`GDB_OSABI_OPENBSD_ELF'OpenBSD using the ELF executable format.`GDB_OSABI_WINCE'Windows CE.`GDB_OSABI_GO32'DJGPP.`GDB_OSABI_IRIX'Irix.`GDB_OSABI_INTERIX'Interix (Posix layer for MS-Windows systems).`GDB_OSABI_HPUX_ELF'HP/UX using the ELF executable format.`GDB_OSABI_HPUX_SOM'HP/UX using the SOM executable format.`GDB_OSABI_QNXNTO'QNX Neutrino.`GDB_OSABI_CYGWIN'Cygwin.`GDB_OSABI_AIX'AIX.Here are the functions that make up the OS ABI framework:-- Function: const char * gdbarch_osabi_name (enum gdb_osabi OSABI)Return the name of the OS ABI corresponding to OSABI.-- Function: void gdbarch_register_osabi (enum bfd_architecture ARCH,unsigned long MACHINE, enum gdb_osabi OSABI, void(*INIT_OSABI)(struct gdbarch_info INFO, struct gdbarch*GDBARCH))Register the OS ABI handler specified by INIT_OSABI for thearchitecture, machine type and OS ABI specified by ARCH, MACHINEand OSABI. In most cases, a value of zero for the machine type,which implies the architecture's default machine type, willsuffice.-- Function: void gdbarch_register_osabi_sniffer (enumbfd_architecture ARCH, enum bfd_flavour FLAVOUR, enumgdb_osabi (*SNIFFER)(bfd *ABFD))Register the OS ABI file sniffer specified by SNIFFER for the BFDarchitecture/flavour pair specified by ARCH and FLAVOUR. If ARCHis `bfd_arch_unknown', the sniffer is considered to be generic,and is allowed to examine FLAVOUR-flavoured files for anyarchitecture.-- Function: enum gdb_osabi gdbarch_lookup_osabi (bfd *ABFD)Examine the file described by ABFD to determine its OS ABI. Thevalue `GDB_OSABI_UNKNOWN' is returned if the OS ABI cannot bedetermined.-- Function: void gdbarch_init_osabi (struct gdbarch info INFO, structgdbarch *GDBARCH, enum gdb_osabi OSABI)Invoke the OS ABI handler corresponding to OSABI to fine-tune the`gdbarch' structure specified by GDBARCH. If a handlercorresponding to OSABI has not been registered for GDBARCH'sarchitecture, a warning will be issued and the debugging sessionwill continue with the defaults already established for GDBARCH.-- Function: void generic_elf_osabi_sniff_abi_tag_sections (bfd *ABFD,asection *SECT, void *OBJ)Helper routine for ELF file sniffers. Examine the file describedby ABFD and look at ABI tag note sections to determine the OS ABIfrom the note. This function should be called via`bfd_map_over_sections'.File: gdbint.info, Node: Initialize New Architecture, Next: Registers and Memory, Prev: OS ABI Variant Handling, Up: Target Architecture Definition11.2 Initializing a New Architecture====================================* Menu:* How an Architecture is Represented::* Looking Up an Existing Architecture::* Creating a New Architecture::File: gdbint.info, Node: How an Architecture is Represented, Next: Looking Up an Existing Architecture, Up: Initialize New Architecture11.2.1 How an Architecture is Represented-----------------------------------------Each `gdbarch' is associated with a single BFD architecture, via a`bfd_arch_ARCH' in the `bfd_architecture' enumeration. The `gdbarch'is registered by a call to `register_gdbarch_init', usually from thefile's `_initialize_FILENAME' routine, which will be automaticallycalled during GDB startup. The arguments are a BFD architectureconstant and an initialization function.A GDB description for a new architecture, ARCH is created bydefining a global function `_initialize_ARCH_tdep', by convention inthe source file `ARCH-tdep.c'. For example, in the case of theOpenRISC 1000, this function is called `_initialize_or1k_tdep' and isfound in the file `or1k-tdep.c'.The resulting object files containing the implementation of the`_initialize_ARCH_tdep' function are specified in the GDB`configure.tgt' file, which includes a large case statement patternmatching against the `--target' option of the `configure' script. Thenew `struct gdbarch' is created within the `_initialize_ARCH_tdep'function by calling `gdbarch_register':void gdbarch_register (enum bfd_architecture ARCHITECTURE,gdbarch_init_ftype *INIT_FUNC,gdbarch_dump_tdep_ftype *TDEP_DUMP_FUNC);The ARCHITECTURE will identify the unique BFD to be associated withthis `gdbarch'. The INIT_FUNC funciton is called to create and returnthe new `struct gdbarch'. The TDEP_DUMP_FUNC function will dump thetarget specific details associated with this architecture.For example the function `_initialize_or1k_tdep' creates itsarchitecture for 32-bit OpenRISC 1000 architectures by calling:gdbarch_register (bfd_arch_or32, or1k_gdbarch_init, or1k_dump_tdep);File: gdbint.info, Node: Looking Up an Existing Architecture, Next: Creating a New Architecture, Prev: How an Architecture is Represented, Up: Initialize New Architecture11.2.2 Looking Up an Existing Architecture------------------------------------------The initialization function has this prototype:static struct gdbarch *ARCH_gdbarch_init (struct gdbarch_info INFO,struct gdbarch_list *ARCHES)The INFO argument contains parameters used to select the correctarchitecture, and ARCHES is a list of architectures which have alreadybeen created with the same `bfd_arch_ARCH' value.The initialization function should first make sure that INFO isacceptable, and return `NULL' if it is not. Then, it should searchthrough ARCHES for an exact match to INFO, and return one if found.Lastly, if no exact match was found, it should create a newarchitecture based on INFO and return it.The lookup is done using `gdbarch_list_lookup_by_info'. It ispassed the list of existing architectures, ARCHES, and the `structgdbarch_info', INFO, and returns the first matching architecture itfinds, or `NULL' if none are found. If an architecture is found it canbe returned as the result from the initialization function, otherwise anew `struct gdbach' will need to be created.The struct gdbarch_info has the following components:struct gdbarch_info{const struct bfd_arch_info *bfd_arch_info;int byte_order;bfd *abfd;struct gdbarch_tdep_info *tdep_info;enum gdb_osabi osabi;const struct target_desc *target_desc;};The `bfd_arch_info' member holds the key details about thearchitecture. The `byte_order' member is a value in an enumerationindicating the endianism. The `abfd' member is a pointer to the fullBFD, the `tdep_info' member is additional custom target specificinformation, `osabi' identifies which (if any) of a number of operatingspecific ABIs are used by this architecture and the `target_desc'member is a set of name-value pairs with information about registerusage in this target.When the `struct gdbarch' initialization function is called, not allthe fields are provided--only those which can be deduced from the BFD.The `struct gdbarch_info', INFO is used as a look-up key with the listof existing architectures, ARCHES to see if a suitable architecturealready exists. The TDEP_INFO, OSABI and TARGET_DESC fields may beadded before this lookup to refine the search.Only information in INFO should be used to choose the newarchitecture. Historically, INFO could be sparse, and defaults wouldbe collected from the first element on ARCHES. However, GDB now fillsin INFO more thoroughly, so new `gdbarch' initialization functionsshould not take defaults from ARCHES.File: gdbint.info, Node: Creating a New Architecture, Prev: Looking Up an Existing Architecture, Up: Initialize New Architecture11.2.3 Creating a New Architecture----------------------------------If no architecture is found, then a new architecture must be created,by calling `gdbarch_alloc' using the supplied `struct gdbarch_info' andany additional custom target specific information in a `structgdbarch_tdep'. The prototype for `gdbarch_alloc' is:struct gdbarch *gdbarch_alloc (const struct gdbarch_info *INFO,struct gdbarch_tdep *TDEP);The newly created struct gdbarch must then be populated. Althoughthere are default values, in most cases they are not what is required.For each element, X, there is are a pair of corresponding accessorfunctions, one to set the value of that element, `set_gdbarch_X', thesecond to either get the value of an element (if it is a variable) orto apply the element (if it is a function), `gdbarch_X'. Note thatboth accessor functions take a pointer to the `struct gdbarch' as firstargument. Populating the new `gdbarch' should use the `set_gdbarch'functions.The following sections identify the main elements that should be setin this way. This is not the complete list, but represents thefunctions and elements that must commonly be specified for a newarchitecture. Many of the functions and variables are described in theheader file `gdbarch.h'.This is the main work in defining a new architecture. Implementingthe set of functions to populate the `struct gdbarch'.`struct gdbarch_tdep' is not defined within GDB--it is up to theuser to define this struct if it is needed to hold custom targetinformation that is not covered by the standard `struct gdbarch'. Forexample with the OpenRISC 1000 architecture it is used to hold thenumber of matchpoints available in the target (along with otherinformation).If there is no additional target specific information, it can be setto `NULL'.File: gdbint.info, Node: Registers and Memory, Next: Pointers and Addresses, Prev: Initialize New Architecture, Up: Target Architecture Definition11.3 Registers and Memory=========================GDB's model of the target machine is rather simple. GDB assumes themachine includes a bank of registers and a block of memory. Eachregister may have a different size.GDB does not have a magical way to match up with the compiler's ideaof which registers are which; however, it is critical that they domatch up accurately. The only way to make this work is to get accurateinformation about the order that the compiler uses, and to reflect thatin the `gdbarch_register_name' and related functions.GDB can handle big-endian, little-endian, and bi-endianarchitectures.File: gdbint.info, Node: Pointers and Addresses, Next: Address Classes, Prev: Registers and Memory, Up: Target Architecture Definition11.4 Pointers Are Not Always Addresses======================================On almost all 32-bit architectures, the representation of a pointer isindistinguishable from the representation of some fixed-length numberwhose value is the byte address of the object pointed to. On suchmachines, the words "pointer" and "address" can be used interchangeably.However, architectures with smaller word sizes are often cramped foraddress space, so they may choose a pointer representation that breaksthis identity, and allows a larger code address space.For example, the Renesas D10V is a 16-bit VLIW processor whoseinstructions are 32 bits long(1). If the D10V used ordinary byteaddresses to refer to code locations, then the processor would only beable to address 64kb of instructions. However, since instructions mustbe aligned on four-byte boundaries, the low two bits of any validinstruction's byte address are always zero--byte addresses waste twobits. So instead of byte addresses, the D10V uses word addresses--byteaddresses shifted right two bits--to refer to code. Thus, the D10V canuse 16-bit words to address 256kb of code space.However, this means that code pointers and data pointers havedifferent forms on the D10V. The 16-bit word `0xC020' refers to byteaddress `0xC020' when used as a data address, but refers to byte address`0x30080' when used as a code address.(The D10V also uses separate code and data address spaces, which alsoaffects the correspondence between pointers and addresses, but we'regoing to ignore that here; this example is already too long.)To cope with architectures like this--the D10V is not the onlyone!--GDB tries to distinguish between "addresses", which are bytenumbers, and "pointers", which are the target's representation of anaddress of a particular type of data. In the example above, `0xC020'is the pointer, which refers to one of the addresses `0xC020' or`0x30080', depending on the type imposed upon it. GDB providesfunctions for turning a pointer into an address and vice versa, in theappropriate way for the current architecture.Unfortunately, since addresses and pointers are identical on almostall processors, this distinction tends to bit-rot pretty quickly. Thus,each time you port GDB to an architecture which does distinguishbetween pointers and addresses, you'll probably need to clean up somearchitecture-independent code.Here are functions which convert between pointers and addresses:-- Function: CORE_ADDR extract_typed_address (void *BUF, struct type*TYPE)Treat the bytes at BUF as a pointer or reference of type TYPE, andreturn the address it represents, in a manner appropriate for thecurrent architecture. This yields an address GDB can use to readtarget memory, disassemble, etc. Note that BUF refers to a bufferin GDB's memory, not the inferior's.For example, if the current architecture is the Intel x86, thisfunction extracts a little-endian integer of the appropriatelength from BUF and returns it. However, if the currentarchitecture is the D10V, this function will return a 16-bitinteger extracted from BUF, multiplied by four if TYPE is apointer to a function.If TYPE is not a pointer or reference type, then this functionwill signal an internal error.-- Function: CORE_ADDR store_typed_address (void *BUF, struct type*TYPE, CORE_ADDR ADDR)Store the address ADDR in BUF, in the proper format for a pointerof type TYPE in the current architecture. Note that BUF refers toa buffer in GDB's memory, not the inferior's.For example, if the current architecture is the Intel x86, thisfunction stores ADDR unmodified as a little-endian integer of theappropriate length in BUF. However, if the current architectureis the D10V, this function divides ADDR by four if TYPE is apointer to a function, and then stores it in BUF.If TYPE is not a pointer or reference type, then this functionwill signal an internal error.-- Function: CORE_ADDR value_as_address (struct value *VAL)Assuming that VAL is a pointer, return the address it represents,as appropriate for the current architecture.This function actually works on integral values, as well aspointers. For pointers, it performs architecture-specificconversions as described above for `extract_typed_address'.-- Function: CORE_ADDR value_from_pointer (struct type *TYPE,CORE_ADDR ADDR)Create and return a value representing a pointer of type TYPE tothe address ADDR, as appropriate for the current architecture.This function performs architecture-specific conversions asdescribed above for `store_typed_address'.Here are two functions which architectures can define to indicate therelationship between pointers and addresses. These have defaultdefinitions, appropriate for architectures on which all pointers aresimple unsigned byte addresses.-- Function: CORE_ADDR gdbarch_pointer_to_address (struct gdbarch*GDBARCH, struct type *TYPE, char *BUF)Assume that BUF holds a pointer of type TYPE, in the appropriateformat for the current architecture. Return the byte address thepointer refers to.This function may safely assume that TYPE is either a pointer or aC++ reference type.-- Function: void gdbarch_address_to_pointer (struct gdbarch *GDBARCH,struct type *TYPE, char *BUF, CORE_ADDR ADDR)Store in BUF a pointer of type TYPE representing the address ADDR,in the appropriate format for the current architecture.This function may safely assume that TYPE is either a pointer or aC++ reference type.---------- Footnotes ----------(1) Some D10V instructions are actually pairs of 16-bitsub-instructions. However, since you can't jump into the middle ofsuch a pair, code addresses can only refer to full 32 bit instructions,which is what matters in this explanation.File: gdbint.info, Node: Address Classes, Next: Register Representation, Prev: Pointers and Addresses, Up: Target Architecture Definition11.5 Address Classes====================Sometimes information about different kinds of addresses is availablevia the debug information. For example, some programming environmentsdefine addresses of several different sizes. If the debug informationdistinguishes these kinds of address classes through either the sizeinfo (e.g, `DW_AT_byte_size' in DWARF 2) or through an explicit addressclass attribute (e.g, `DW_AT_address_class' in DWARF 2), the followingmacros should be defined in order to disambiguate these types withinGDB as well as provide the added information to a GDB user whenprinting type expressions.-- Function: int gdbarch_address_class_type_flags (struct gdbarch*GDBARCH, int BYTE_SIZE, int DWARF2_ADDR_CLASS)Returns the type flags needed to construct a pointer type whosesize is BYTE_SIZE and whose address class is DWARF2_ADDR_CLASS.This function is normally called from within a symbol reader. See`dwarf2read.c'.-- Function: char * gdbarch_address_class_type_flags_to_name (structgdbarch *GDBARCH, int TYPE_FLAGS)Given the type flags representing an address class qualifier,return its name.-- Function: int gdbarch_address_class_name_to_type_flags (structgdbarch *GDBARCH, int NAME, int *TYPE_FLAGS_PTR)Given an address qualifier name, set the `int' referenced byTYPE_FLAGS_PTR to the type flags for that address class qualifier.Since the need for address classes is rather rare, none of theaddress class functions are defined by default. Predicate functionsare provided to detect when they are defined.Consider a hypothetical architecture in which addresses are normally32-bits wide, but 16-bit addresses are also supported. Furthermore,suppose that the DWARF 2 information for this architecture simply usesa `DW_AT_byte_size' value of 2 to indicate the use of one of these"short" pointers. The following functions could be defined toimplement the address class functions:somearch_address_class_type_flags (int byte_size,int dwarf2_addr_class){if (byte_size == 2)return TYPE_FLAG_ADDRESS_CLASS_1;elsereturn 0;}static char *somearch_address_class_type_flags_to_name (int type_flags){if (type_flags & TYPE_FLAG_ADDRESS_CLASS_1)return "short";elsereturn NULL;}intsomearch_address_class_name_to_type_flags (char *name,int *type_flags_ptr){if (strcmp (name, "short") == 0){*type_flags_ptr = TYPE_FLAG_ADDRESS_CLASS_1;return 1;}elsereturn 0;}The qualifier `@short' is used in GDB's type expressions to indicatethe presence of one of these "short" pointers. For example if thedebug information indicates that `short_ptr_var' is one of these shortpointers, GDB might show the following behavior:(gdb) ptype short_ptr_vartype = int * @shortFile: gdbint.info, Node: Register Representation, Next: Frame Interpretation, Prev: Address Classes, Up: Target Architecture Definition11.6 Register Representation============================* Menu:* Raw and Cooked Registers::* Register Architecture Functions & Variables::* Register Information Functions::* Register and Memory Data::* Register Caching::File: gdbint.info, Node: Raw and Cooked Registers, Next: Register Architecture Functions & Variables, Up: Register Representation11.6.1 Raw and Cooked Registers-------------------------------GDB considers registers to be a set with members numbered linearly from0 upwards. The first part of that set corresponds to real physicalregisters, the second part to any "pseudo-registers". Pseudo-registershave no independent physical existence, but are useful representationsof information within the architecture. For example the OpenRISC 1000architecture has up to 32 general purpose registers, which aretypically represented as 32-bit (or 64-bit) integers. However the GPRsare also used as operands to the floating point operations, and itcould be convenient to define a set of pseudo-registers, to show theGPRs represented as floating point values.For any architecture, the implementer will decide on a mapping fromhardware to GDB register numbers. The registers corresponding to realhardware are referred to as "raw" registers, the remaining registers are"pseudo-registers". The total register set (raw and pseudo) is calledthe "cooked" register set.File: gdbint.info, Node: Register Architecture Functions & Variables, Next: Register Information Functions, Prev: Raw and Cooked Registers, Up: Register Representation11.6.2 Functions and Variables Specifying the Register Architecture-------------------------------------------------------------------These `struct gdbarch' functions and variables specify the number andtype of registers in the architecture.-- Architecture Function: CORE_ADDR read_pc (struct regcache *REGCACHE)-- Architecture Function: void write_pc (struct regcache *REGCACHE,CORE_ADDR VAL)Read or write the program counter. The default value of bothfunctions is `NULL' (no function available). If the programcounter is just an ordinary register, it can be specified in`struct gdbarch' instead (see `pc_regnum' below) and it will beread or written using the standard routines to access registers.This function need only be specified if the program counter is notan ordinary register.Any register information can be obtained using the suppliedregister cache, REGCACHE. *Note Register Caching: RegisterCaching.-- Architecture Function: void pseudo_register_read (struct gdbarch*GDBARCH, struct regcache *REGCACHE, int REGNUM, constgdb_byte *BUF)-- Architecture Function: void pseudo_register_write (struct gdbarch*GDBARCH, struct regcache *REGCACHE, int REGNUM, constgdb_byte *BUF)These functions should be defined if there are anypseudo-registers. The default value is `NULL'. REGNUM is thenumber of the register to read or write (which will be a "cooked"register number) and BUF is the buffer where the value read will beplaced, or from which the value to be written will be taken. Thevalue in the buffer may be converted to or from a signed orunsigned integral value using one of the utility functions (*noteUsing Different Register and Memory Data Representations: Registerand Memory Data.).The access should be for the specified architecture, GDBARCH. Anyregister information can be obtained using the supplied registercache, REGCACHE. *Note Register Caching: Register Caching.-- Architecture Variable: int sp_regnumThis specifies the register holding the stack pointer, which maybe a raw or pseudo-register. It defaults to -1 (not defined), butit is an error for it not to be defined.The value of the stack pointer register can be accessed withingGDB as the variable `$sp'.-- Architecture Variable: int pc_regnumThis specifies the register holding the program counter, which maybe a raw or pseudo-register. It defaults to -1 (not defined). If`pc_regnum' is not defined, then the functions `read_pc' and`write_pc' (see above) must be defined.The value of the program counter (whether defined as a register, orthrough `read_pc' and `write_pc') can be accessed withing GDB asthe variable `$pc'.-- Architecture Variable: int ps_regnumThis specifies the register holding the processor status (oftencalled the status register), which may be a raw orpseudo-register. It defaults to -1 (not defined).If defined, the value of this register can be accessed withing GDBas the variable `$ps'.-- Architecture Variable: int fp0_regnumThis specifies the first floating point register. It defaults to0. `fp0_regnum' is not needed unless the target offers supportfor floating point.File: gdbint.info, Node: Register Information Functions, Next: Register and Memory Data, Prev: Register Architecture Functions & Variables, Up: Register Representation11.6.3 Functions Giving Register Information--------------------------------------------These functions return information about registers.-- Architecture Function: const char * register_name (struct gdbarch*GDBARCH, int REGNUM)This function should convert a register number (raw or pseudo) to aregister name (as a C `const char *'). This is used both todetermine the name of a register for output and to work out themeaning of any register names used as input. The function mayalso return `NULL', to indicate that REGNUM is not a validregister.For example with the OpenRISC 1000, GDB registers 0-31 are theGeneral Purpose Registers, register 32 is the program counter andregister 33 is the supervision register (i.e. the processor statusregister), which map to the strings `"gpr00"' through `"gpr31"',`"pc"' and `"sr"' respectively. This means that the GDB command`print $gpr5' should print the value of the OR1K general purposeregister 5(1).The default value for this function is `NULL', meaning undefined.It should always be defined.The access should be for the specified architecture, GDBARCH.-- Architecture Function: struct type * register_type (struct gdbarch*GDBARCH, int REGNUM)Given a register number, this function identifies the type of datait may be holding, specified as a `struct type'. GDB allowscreation of arbitrary types, but a number of built in types areprovided (`builtin_type_void', `builtin_type_int32' etc), togetherwith functions to derive types from these.Typically the program counter will have a type of "pointer tofunction" (it points to code), the frame pointer and stack pointerwill have types of "pointer to void" (they point to data on thestack) and all other integer registers will have a type of 32-bitinteger or 64-bit integer.This information guides the formatting when displaying registerinformation. The default value is `NULL' meaning no information isavailable to guide formatting when displaying registers.-- Architecture Function: void print_registers_info (struct gdbarch*GDBARCH, struct ui_file *FILE, struct frame_info *FRAME, intREGNUM, int ALL)Define this function to print out one or all of the registers forthe GDB `info registers' command. The default value is thefunction `default_print_registers_info', which uses the registertype information (see `register_type' above) to determine how eachregister should be printed. Define a custom version of thisfunction for fuller control over how the registers are displayed.The access should be for the specified architecture, GDBARCH, withoutput to the the file specified by the User Interface IndependentOutput file handle, FILE (*note UI-Independent Output--the`ui_out' Functions: UI-Independent Output.).The registers should show their values in the frame specified byFRAME. If REGNUM is -1 and ALL is zero, then all the"significant" registers should be shown (the implementer shoulddecide which registers are "significant"). Otherwise only thevalue of the register specified by REGNUM should be output. IfREGNUM is -1 and ALL is non-zero (true), then the value of allregisters should be shown.By default `default_print_registers_info' prints one register perline, and if ALL is zero omits floating-point registers.-- Architecture Function: void print_float_info (struct gdbarch*GDBARCH, struct ui_file *FILE, struct frame_info *FRAME,const char *ARGS)Define this function to provide output about the floating pointunit and registers for the GDB `info float' command respectively.The default value is `NULL' (not defined), meaning no informationwill be provided.The GDBARCH and FILE and FRAME arguments have the same meaning asin the `print_registers_info' function above. The string ARGScontains any supplementary arguments to the `info float' command.Define this function if the target supports floating pointoperations.-- Architecture Function: void print_vector_info (struct gdbarch*GDBARCH, struct ui_file *FILE, struct frame_info *FRAME,const char *ARGS)Define this function to provide output about the vector unit andregisters for the GDB `info vector' command respectively. Thedefault value is `NULL' (not defined), meaning no information willbe provided.The GDBARCH, FILE and FRAME arguments have the same meaning as inthe `print_registers_info' function above. The string ARGScontains any supplementary arguments to the `info vector' command.Define this function if the target supports vector operations.-- Architecture Function: int register_reggroup_p (struct gdbarch*GDBARCH, int REGNUM, struct reggroup *GROUP)GDB groups registers into different categories (general, vector,floating point etc). This function, given a register, REGNUM, andgroup, GROUP, returns 1 (true) if the register is in the group and0 (false) otherwise.The information should be for the specified architecture, GDBARCHThe default value is the function `default_register_reggroup_p'which will do a reasonable job based on the type of the register(see the function `register_type' above), with groups for generalpurpose registers, floating point registers, vector registers andraw (i.e not pseudo) registers.---------- Footnotes ----------(1) Historically, GDB always had a concept of a frame pointerregister, which could be accessed via the GDB variable, `$fp'. Thatconcept is now deprecated, recognizing that not all architectures havea frame pointer. However if an architecture does have a frame pointerregister, and defines a register or pseudo-register with the name`"fp"', then that register will be used as the value of the `$fp'variable.File: gdbint.info, Node: Register and Memory Data, Next: Register Caching, Prev: Register Information Functions, Up: Register Representation11.6.4 Using Different Register and Memory Data Representations---------------------------------------------------------------Some architectures have different representations of data objects,depending whether the object is held in a register or memory. Forexample:* The Alpha architecture can represent 32 bit integer values infloating-point registers.* The x86 architecture supports 80-bit floating-point registers. The`long double' data type occupies 96 bits in memory but only 80bits when stored in a register.In general, the register representation of a data type is determinedby the architecture, or GDB's interface to the architecture, while thememory representation is determined by the Application Binary Interface.For almost all data types on almost all architectures, the tworepresentations are identical, and no special handling is needed.However, they do occasionally differ. An architecture may define thefollowing `struct gdbarch' functions to request conversions between theregister and memory representations of a data type:-- Architecture Function: int gdbarch_convert_register_p (structgdbarch *GDBARCH, int REG)Return non-zero (true) if the representation of a data valuestored in this register may be different to the representation ofthat same data value when stored in memory. The default value is`NULL' (undefined).If this function is defined and returns non-zero, the `structgdbarch' functions `gdbarch_register_to_value' and`gdbarch_value_to_register' (see below) should be used to performany necessary conversion.If defined, this function should return zero for the register'snative type, when no conversion is necessary.-- Architecture Function: void gdbarch_register_to_value (structgdbarch *GDBARCH, int REG, struct type *TYPE, char *FROM,char *TO)Convert the value of register number REG to a data object of typeTYPE. The buffer at FROM holds the register's value in rawformat; the converted value should be placed in the buffer at TO._Note:_ `gdbarch_register_to_value' and`gdbarch_value_to_register' take their REG and TYPE argumentsin different orders.`gdbarch_register_to_value' should only be used with registers forwhich the `gdbarch_convert_register_p' function returns a non-zerovalue.-- Architecture Function: void gdbarch_value_to_register (structgdbarch *GDBARCH, struct type *TYPE, int REG, char *FROM,char *TO)Convert a data value of type TYPE to register number REG' rawformat._Note:_ `gdbarch_register_to_value' and`gdbarch_value_to_register' take their REG and TYPE argumentsin different orders.`gdbarch_value_to_register' should only be used with registers forwhich the `gdbarch_convert_register_p' function returns a non-zerovalue.File: gdbint.info, Node: Register Caching, Prev: Register and Memory Data, Up: Register Representation11.6.5 Register Caching-----------------------Caching of registers is used, so that the target does not need to beaccessed and reanalyzed multiple times for each register incircumstances where the register value cannot have changed.GDB provides `struct regcache', associated with a particular `structgdbarch' to hold the cached values of the raw registers. A set offunctions is provided to access both the raw registers (with `raw' intheir name) and the full set of cooked registers (with `cooked' intheir name). Functions are provided to ensure the register cache iskept synchronized with the values of the actual registers in the target.Accessing registers through the `struct regcache' routines willensure that the appropriate `struct gdbarch' functions are called whennecessary to access the underlying target architecture. In generalusers should use the "cooked" functions, since these will map to the"raw" functions automatically as appropriate.The two key functions are `regcache_cooked_read' and`regcache_cooked_write' which read or write a register from or to abyte buffer (type `gdb_byte *'). For convenience the wrapper functions`regcache_cooked_read_signed', `regcache_cooked_read_unsigned',`regcache_cooked_write_signed' and `regcache_cooked_write_unsigned' areprovided, which read or write the value using the buffer and convert toor from an integral value as appropriate.File: gdbint.info, Node: Frame Interpretation, Next: Inferior Call Setup, Prev: Register Representation, Up: Target Architecture Definition11.7 Frame Interpretation=========================* Menu:* All About Stack Frames::* Frame Handling Terminology::* Prologue Caches::* Functions and Variable to Analyze Frames::* Functions to Access Frame Data::* Analyzing Stacks---Frame Sniffers::File: gdbint.info, Node: All About Stack Frames, Next: Frame Handling Terminology, Up: Frame Interpretation11.7.1 All About Stack Frames-----------------------------GDB needs to understand the stack on which local (automatic) variablesare stored. The area of the stack containing all the local variablesfor a function invocation is known as the "stack frame" for thatfunction (or colloquially just as the "frame"). In turn the functionthat called the function will have its stack frame, and so on backthrough the chain of functions that have been called.Almost all architectures have one register dedicated to point to theend of the stack (the "stack pointer"). Many have a second registerwhich points to the start of the currently active stack frame (the"frame pointer"). The specific arrangements for an architecture are akey part of the ABI.A diagram helps to explain this. Here is a simple program to computefactorials:#include <stdio.h>int fact (int n){if (0 == n){return 1;}else{return n * fact (n - 1);}}main (){int i;for (i = 0; i < 10; i++){int f = fact (i);printf ("%d! = %d\n", i, f);}}Consider the state of the stack when the code reaches line 6 afterthe main program has called `fact (3)'. The chain of function callswill be `main ()', `fact (3)', `fact (2)', `fact (1)' and `fact (0)'.In this illustration the stack is falling (as used for example by theOpenRISC 1000 ABI). The stack pointer (SP) is at the end of the stack(lowest address) and the frame pointer (FP) is at the highest addressin the current stack frame. The following diagram shows how the stacklooks.
