URL
https://opencores.org/ocsvn/openrisc_me/openrisc_me/trunk
Subversion Repositories openrisc_me
[/] [openrisc/] [trunk/] [gnu-src/] [gdb-6.8/] [gdb/] [doc/] [gdb.info-3] - Rev 178
Go to most recent revision | Compare with Previous | Blame | View Log
This is gdb.info, produced by makeinfo version 4.8 from../.././gdb/doc/gdb.texinfo.INFO-DIR-SECTION Software developmentSTART-INFO-DIR-ENTRY* Gdb: (gdb). The GNU debugger.END-INFO-DIR-ENTRYThis file documents the GNU debugger GDB.This is the Ninth Edition, of `Debugging with GDB: the GNUSource-Level Debugger' for GDB Version 6.8.Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996,1998,1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006Free Software Foundation, Inc.Permission is granted to copy, distribute and/or modify this documentunder the terms of the GNU Free Documentation License, Version 1.1 orany later version published by the Free Software Foundation; with theInvariant Sections being "Free Software" and "Free Software Needs FreeDocumentation", with the Front-Cover Texts being "A GNU Manual," andwith the Back-Cover Texts as in (a) below.(a) The FSF's Back-Cover Text is: "You are free to copy and modifythis GNU Manual. Buying copies from GNU Press supports the FSF indeveloping GNU and promoting software freedom."File: gdb.info, Node: GDB/MI Command Description Format, Next: GDB/MI Breakpoint Commands, Prev: GDB/MI Simple Examples, Up: GDB/MI24.6 GDB/MI Command Description Format======================================The remaining sections describe blocks of commands. Each block ofcommands is laid out in a fashion similar to this section.Motivation----------The motivation for this collection of commands.Introduction------------A brief introduction to this collection of commands as a whole.Commands--------For each command in the block, the following is described:Synopsis........-command ARGS...Result......GDB Command...........The corresponding GDB CLI command(s), if any.Example.......Example(s) formatted for readability. Some of the described commandshave not been implemented yet and these are labeled N.A. (notavailable).File: gdb.info, Node: GDB/MI Breakpoint Commands, Next: GDB/MI Program Context, Prev: GDB/MI Command Description Format, Up: GDB/MI24.7 GDB/MI Breakpoint Commands===============================This section documents GDB/MI commands for manipulating breakpoints.The `-break-after' Command--------------------------Synopsis........-break-after NUMBER COUNTThe breakpoint number NUMBER is not in effect until it has been hitCOUNT times. To see how this is reflected in the output of the`-break-list' command, see the description of the `-break-list' commandbelow.GDB Command...........The corresponding GDB command is `ignore'.Example.......(gdb)-break-insert main^done,bkpt={number="1",addr="0x000100d0",file="hello.c",fullname="/home/foo/hello.c",line="5",times="0"}(gdb)-break-after 1 3~^done(gdb)-break-list^done,BreakpointTable={nr_rows="1",nr_cols="6",hdr=[{width="3",alignment="-1",col_name="number",colhdr="Num"},{width="14",alignment="-1",col_name="type",colhdr="Type"},{width="4",alignment="-1",col_name="disp",colhdr="Disp"},{width="3",alignment="-1",col_name="enabled",colhdr="Enb"},{width="10",alignment="-1",col_name="addr",colhdr="Address"},{width="40",alignment="2",col_name="what",colhdr="What"}],body=[bkpt={number="1",type="breakpoint",disp="keep",enabled="y",addr="0x000100d0",func="main",file="hello.c",fullname="/home/foo/hello.c",line="5",times="0",ignore="3"}]}(gdb)The `-break-condition' Command------------------------------Synopsis........-break-condition NUMBER EXPRBreakpoint NUMBER will stop the program only if the condition inEXPR is true. The condition becomes part of the `-break-list' output(see the description of the `-break-list' command below).GDB Command...........The corresponding GDB command is `condition'.Example.......(gdb)-break-condition 1 1^done(gdb)-break-list^done,BreakpointTable={nr_rows="1",nr_cols="6",hdr=[{width="3",alignment="-1",col_name="number",colhdr="Num"},{width="14",alignment="-1",col_name="type",colhdr="Type"},{width="4",alignment="-1",col_name="disp",colhdr="Disp"},{width="3",alignment="-1",col_name="enabled",colhdr="Enb"},{width="10",alignment="-1",col_name="addr",colhdr="Address"},{width="40",alignment="2",col_name="what",colhdr="What"}],body=[bkpt={number="1",type="breakpoint",disp="keep",enabled="y",addr="0x000100d0",func="main",file="hello.c",fullname="/home/foo/hello.c",line="5",cond="1",times="0",ignore="3"}]}(gdb)The `-break-delete' Command---------------------------Synopsis........-break-delete ( BREAKPOINT )+Delete the breakpoint(s) whose number(s) are specified in theargument list. This is obviously reflected in the breakpoint list.GDB Command...........The corresponding GDB command is `delete'.Example.......(gdb)-break-delete 1^done(gdb)-break-list^done,BreakpointTable={nr_rows="0",nr_cols="6",hdr=[{width="3",alignment="-1",col_name="number",colhdr="Num"},{width="14",alignment="-1",col_name="type",colhdr="Type"},{width="4",alignment="-1",col_name="disp",colhdr="Disp"},{width="3",alignment="-1",col_name="enabled",colhdr="Enb"},{width="10",alignment="-1",col_name="addr",colhdr="Address"},{width="40",alignment="2",col_name="what",colhdr="What"}],body=[]}(gdb)The `-break-disable' Command----------------------------Synopsis........-break-disable ( BREAKPOINT )+Disable the named BREAKPOINT(s). The field `enabled' in the breaklist is now set to `n' for the named BREAKPOINT(s).GDB Command...........The corresponding GDB command is `disable'.Example.......(gdb)-break-disable 2^done(gdb)-break-list^done,BreakpointTable={nr_rows="1",nr_cols="6",hdr=[{width="3",alignment="-1",col_name="number",colhdr="Num"},{width="14",alignment="-1",col_name="type",colhdr="Type"},{width="4",alignment="-1",col_name="disp",colhdr="Disp"},{width="3",alignment="-1",col_name="enabled",colhdr="Enb"},{width="10",alignment="-1",col_name="addr",colhdr="Address"},{width="40",alignment="2",col_name="what",colhdr="What"}],body=[bkpt={number="2",type="breakpoint",disp="keep",enabled="n",addr="0x000100d0",func="main",file="hello.c",fullname="/home/foo/hello.c",line="5",times="0"}]}(gdb)The `-break-enable' Command---------------------------Synopsis........-break-enable ( BREAKPOINT )+Enable (previously disabled) BREAKPOINT(s).GDB Command...........The corresponding GDB command is `enable'.Example.......(gdb)-break-enable 2^done(gdb)-break-list^done,BreakpointTable={nr_rows="1",nr_cols="6",hdr=[{width="3",alignment="-1",col_name="number",colhdr="Num"},{width="14",alignment="-1",col_name="type",colhdr="Type"},{width="4",alignment="-1",col_name="disp",colhdr="Disp"},{width="3",alignment="-1",col_name="enabled",colhdr="Enb"},{width="10",alignment="-1",col_name="addr",colhdr="Address"},{width="40",alignment="2",col_name="what",colhdr="What"}],body=[bkpt={number="2",type="breakpoint",disp="keep",enabled="y",addr="0x000100d0",func="main",file="hello.c",fullname="/home/foo/hello.c",line="5",times="0"}]}(gdb)The `-break-info' Command-------------------------Synopsis........-break-info BREAKPOINTGet information about a single breakpoint.GDB Command...........The corresponding GDB command is `info break BREAKPOINT'.Example.......N.A.The `-break-insert' Command---------------------------Synopsis........-break-insert [ -t ] [ -h ] [ -f ][ -c CONDITION ] [ -i IGNORE-COUNT ][ -p THREAD ] [ LOCATION ]If specified, LOCATION, can be one of:* function* filename:linenum* filename:function* *addressThe possible optional parameters of this command are:`-t'Insert a temporary breakpoint.`-h'Insert a hardware breakpoint.`-c CONDITION'Make the breakpoint conditional on CONDITION.`-i IGNORE-COUNT'Initialize the IGNORE-COUNT.`-f'If LOCATION cannot be parsed (for example if it refers to unknownfiles or functions), create a pending breakpoint. Without thisflag, GDB will report an error, and won't create a breakpoint, ifLOCATION cannot be parsed.Result......The result is in the form:^done,bkpt={number="NUMBER",type="TYPE",disp="del"|"keep",enabled="y"|"n",addr="HEX",func="FUNCNAME",file="FILENAME",fullname="FULL_FILENAME",line="LINENO",[thread="THREADNO,]times="TIMES"}where NUMBER is the GDB number for this breakpoint, FUNCNAME is thename of the function where the breakpoint was inserted, FILENAME is thename of the source file which contains this function, LINENO is thesource line number within that file and TIMES the number of times thatthe breakpoint has been hit (always 0 for -break-insert but may begreater for -break-info or -break-list which use the same output).Note: this format is open to change.GDB Command...........The corresponding GDB commands are `break', `tbreak', `hbreak',`thbreak', and `rbreak'.Example.......(gdb)-break-insert main^done,bkpt={number="1",addr="0x0001072c",file="recursive2.c",fullname="/home/foo/recursive2.c,line="4",times="0"}(gdb)-break-insert -t foo^done,bkpt={number="2",addr="0x00010774",file="recursive2.c",fullname="/home/foo/recursive2.c,line="11",times="0"}(gdb)-break-list^done,BreakpointTable={nr_rows="2",nr_cols="6",hdr=[{width="3",alignment="-1",col_name="number",colhdr="Num"},{width="14",alignment="-1",col_name="type",colhdr="Type"},{width="4",alignment="-1",col_name="disp",colhdr="Disp"},{width="3",alignment="-1",col_name="enabled",colhdr="Enb"},{width="10",alignment="-1",col_name="addr",colhdr="Address"},{width="40",alignment="2",col_name="what",colhdr="What"}],body=[bkpt={number="1",type="breakpoint",disp="keep",enabled="y",addr="0x0001072c", func="main",file="recursive2.c",fullname="/home/foo/recursive2.c,"line="4",times="0"},bkpt={number="2",type="breakpoint",disp="del",enabled="y",addr="0x00010774",func="foo",file="recursive2.c",fullname="/home/foo/recursive2.c",line="11",times="0"}]}(gdb)-break-insert -r foo.*~int foo(int, int);^done,bkpt={number="3",addr="0x00010774",file="recursive2.c,"fullname="/home/foo/recursive2.c",line="11",times="0"}(gdb)The `-break-list' Command-------------------------Synopsis........-break-listDisplays the list of inserted breakpoints, showing the followingfields:`Number'number of the breakpoint`Type'type of the breakpoint: `breakpoint' or `watchpoint'`Disposition'should the breakpoint be deleted or disabled when it is hit: `keep'or `nokeep'`Enabled'is the breakpoint enabled or no: `y' or `n'`Address'memory location at which the breakpoint is set`What'logical location of the breakpoint, expressed by function name,file name, line number`Times'number of times the breakpoint has been hitIf there are no breakpoints or watchpoints, the `BreakpointTable'`body' field is an empty list.GDB Command...........The corresponding GDB command is `info break'.Example.......(gdb)-break-list^done,BreakpointTable={nr_rows="2",nr_cols="6",hdr=[{width="3",alignment="-1",col_name="number",colhdr="Num"},{width="14",alignment="-1",col_name="type",colhdr="Type"},{width="4",alignment="-1",col_name="disp",colhdr="Disp"},{width="3",alignment="-1",col_name="enabled",colhdr="Enb"},{width="10",alignment="-1",col_name="addr",colhdr="Address"},{width="40",alignment="2",col_name="what",colhdr="What"}],body=[bkpt={number="1",type="breakpoint",disp="keep",enabled="y",addr="0x000100d0",func="main",file="hello.c",line="5",times="0"},bkpt={number="2",type="breakpoint",disp="keep",enabled="y",addr="0x00010114",func="foo",file="hello.c",fullname="/home/foo/hello.c",line="13",times="0"}]}(gdb)Here's an example of the result when there are no breakpoints:(gdb)-break-list^done,BreakpointTable={nr_rows="0",nr_cols="6",hdr=[{width="3",alignment="-1",col_name="number",colhdr="Num"},{width="14",alignment="-1",col_name="type",colhdr="Type"},{width="4",alignment="-1",col_name="disp",colhdr="Disp"},{width="3",alignment="-1",col_name="enabled",colhdr="Enb"},{width="10",alignment="-1",col_name="addr",colhdr="Address"},{width="40",alignment="2",col_name="what",colhdr="What"}],body=[]}(gdb)The `-break-watch' Command--------------------------Synopsis........-break-watch [ -a | -r ]Create a watchpoint. With the `-a' option it will create an"access" watchpoint, i.e., a watchpoint that triggers either on a readfrom or on a write to the memory location. With the `-r' option, thewatchpoint created is a "read" watchpoint, i.e., it will trigger onlywhen the memory location is accessed for reading. Without either ofthe options, the watchpoint created is a regular watchpoint, i.e., itwill trigger when the memory location is accessed for writing. *NoteSetting Watchpoints: Set Watchpoints.Note that `-break-list' will report a single list of watchpoints andbreakpoints inserted.GDB Command...........The corresponding GDB commands are `watch', `awatch', and `rwatch'.Example.......Setting a watchpoint on a variable in the `main' function:(gdb)-break-watch x^done,wpt={number="2",exp="x"}(gdb)-exec-continue^running(gdb)*stopped,reason="watchpoint-trigger",wpt={number="2",exp="x"},value={old="-268439212",new="55"},frame={func="main",args=[],file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="5"}(gdb)Setting a watchpoint on a variable local to a function. GDB willstop the program execution twice: first for the variable changingvalue, then for the watchpoint going out of scope.(gdb)-break-watch C^done,wpt={number="5",exp="C"}(gdb)-exec-continue^running(gdb)*stopped,reason="watchpoint-trigger",wpt={number="5",exp="C"},value={old="-276895068",new="3"},frame={func="callee4",args=[],file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/bar/devo/gdb/testsuite/gdb.mi/basics.c",line="13"}(gdb)-exec-continue^running(gdb)*stopped,reason="watchpoint-scope",wpnum="5",frame={func="callee3",args=[{name="strarg",value="0x11940 \"A string argument.\""}],file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/bar/devo/gdb/testsuite/gdb.mi/basics.c",line="18"}(gdb)Listing breakpoints and watchpoints, at different points in theprogram execution. Note that once the watchpoint goes out of scope, itis deleted.(gdb)-break-watch C^done,wpt={number="2",exp="C"}(gdb)-break-list^done,BreakpointTable={nr_rows="2",nr_cols="6",hdr=[{width="3",alignment="-1",col_name="number",colhdr="Num"},{width="14",alignment="-1",col_name="type",colhdr="Type"},{width="4",alignment="-1",col_name="disp",colhdr="Disp"},{width="3",alignment="-1",col_name="enabled",colhdr="Enb"},{width="10",alignment="-1",col_name="addr",colhdr="Address"},{width="40",alignment="2",col_name="what",colhdr="What"}],body=[bkpt={number="1",type="breakpoint",disp="keep",enabled="y",addr="0x00010734",func="callee4",file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/devo/gdb/testsuite/gdb.mi/basics.c"line="8",times="1"},bkpt={number="2",type="watchpoint",disp="keep",enabled="y",addr="",what="C",times="0"}]}(gdb)-exec-continue^running(gdb)*stopped,reason="watchpoint-trigger",wpt={number="2",exp="C"},value={old="-276895068",new="3"},frame={func="callee4",args=[],file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/bar/devo/gdb/testsuite/gdb.mi/basics.c",line="13"}(gdb)-break-list^done,BreakpointTable={nr_rows="2",nr_cols="6",hdr=[{width="3",alignment="-1",col_name="number",colhdr="Num"},{width="14",alignment="-1",col_name="type",colhdr="Type"},{width="4",alignment="-1",col_name="disp",colhdr="Disp"},{width="3",alignment="-1",col_name="enabled",colhdr="Enb"},{width="10",alignment="-1",col_name="addr",colhdr="Address"},{width="40",alignment="2",col_name="what",colhdr="What"}],body=[bkpt={number="1",type="breakpoint",disp="keep",enabled="y",addr="0x00010734",func="callee4",file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/devo/gdb/testsuite/gdb.mi/basics.c",line="8",times="1"},bkpt={number="2",type="watchpoint",disp="keep",enabled="y",addr="",what="C",times="-5"}]}(gdb)-exec-continue^running^done,reason="watchpoint-scope",wpnum="2",frame={func="callee3",args=[{name="strarg",value="0x11940 \"A string argument.\""}],file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/bar/devo/gdb/testsuite/gdb.mi/basics.c",line="18"}(gdb)-break-list^done,BreakpointTable={nr_rows="1",nr_cols="6",hdr=[{width="3",alignment="-1",col_name="number",colhdr="Num"},{width="14",alignment="-1",col_name="type",colhdr="Type"},{width="4",alignment="-1",col_name="disp",colhdr="Disp"},{width="3",alignment="-1",col_name="enabled",colhdr="Enb"},{width="10",alignment="-1",col_name="addr",colhdr="Address"},{width="40",alignment="2",col_name="what",colhdr="What"}],body=[bkpt={number="1",type="breakpoint",disp="keep",enabled="y",addr="0x00010734",func="callee4",file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/devo/gdb/testsuite/gdb.mi/basics.c",line="8",times="1"}]}(gdb)File: gdb.info, Node: GDB/MI Program Context, Next: GDB/MI Thread Commands, Prev: GDB/MI Breakpoint Commands, Up: GDB/MI24.8 GDB/MI Program Context============================The `-exec-arguments' Command-----------------------------Synopsis........-exec-arguments ARGSSet the inferior program arguments, to be used in the next`-exec-run'.GDB Command...........The corresponding GDB command is `set args'.Example.......Don't have one around.The `-exec-show-arguments' Command----------------------------------Synopsis........-exec-show-argumentsPrint the arguments of the program.GDB Command...........The corresponding GDB command is `show args'.Example.......N.A.The `-environment-cd' Command-----------------------------Synopsis........-environment-cd PATHDIRSet GDB's working directory.GDB Command...........The corresponding GDB command is `cd'.Example.......(gdb)-environment-cd /kwikemart/marge/ezannoni/flathead-dev/devo/gdb^done(gdb)The `-environment-directory' Command------------------------------------Synopsis........-environment-directory [ -r ] [ PATHDIR ]+Add directories PATHDIR to beginning of search path for source files.If the `-r' option is used, the search path is reset to the defaultsearch path. If directories PATHDIR are supplied in addition to the`-r' option, the search path is first reset and then addition occurs asnormal. Multiple directories may be specified, separated by blanks.Specifying multiple directories in a single command results in thedirectories added to the beginning of the search path in the same orderthey were presented in the command. If blanks are needed as part of adirectory name, double-quotes should be used around the name. In thecommand output, the path will show up separated by the systemdirectory-separator character. The directory-separator character mustnot be used in any directory name. If no directories are specified,the current search path is displayed.GDB Command...........The corresponding GDB command is `dir'.Example.......(gdb)-environment-directory /kwikemart/marge/ezannoni/flathead-dev/devo/gdb^done,source-path="/kwikemart/marge/ezannoni/flathead-dev/devo/gdb:$cdir:$cwd"(gdb)-environment-directory ""^done,source-path="/kwikemart/marge/ezannoni/flathead-dev/devo/gdb:$cdir:$cwd"(gdb)-environment-directory -r /home/jjohnstn/src/gdb /usr/src^done,source-path="/home/jjohnstn/src/gdb:/usr/src:$cdir:$cwd"(gdb)-environment-directory -r^done,source-path="$cdir:$cwd"(gdb)The `-environment-path' Command-------------------------------Synopsis........-environment-path [ -r ] [ PATHDIR ]+Add directories PATHDIR to beginning of search path for object files.If the `-r' option is used, the search path is reset to the originalsearch path that existed at gdb start-up. If directories PATHDIR aresupplied in addition to the `-r' option, the search path is first resetand then addition occurs as normal. Multiple directories may bespecified, separated by blanks. Specifying multiple directories in asingle command results in the directories added to the beginning of thesearch path in the same order they were presented in the command. Ifblanks are needed as part of a directory name, double-quotes should beused around the name. In the command output, the path will show upseparated by the system directory-separator character. Thedirectory-separator character must not be used in any directory name.If no directories are specified, the current path is displayed.GDB Command...........The corresponding GDB command is `path'.Example.......(gdb)-environment-path^done,path="/usr/bin"(gdb)-environment-path /kwikemart/marge/ezannoni/flathead-dev/ppc-eabi/gdb /bin^done,path="/kwikemart/marge/ezannoni/flathead-dev/ppc-eabi/gdb:/bin:/usr/bin"(gdb)-environment-path -r /usr/local/bin^done,path="/usr/local/bin:/usr/bin"(gdb)The `-environment-pwd' Command------------------------------Synopsis........-environment-pwdShow the current working directory.GDB Command...........The corresponding GDB command is `pwd'.Example.......(gdb)-environment-pwd^done,cwd="/kwikemart/marge/ezannoni/flathead-dev/devo/gdb"(gdb)File: gdb.info, Node: GDB/MI Thread Commands, Next: GDB/MI Program Execution, Prev: GDB/MI Program Context, Up: GDB/MI24.9 GDB/MI Thread Commands===========================The `-thread-info' Command--------------------------Synopsis........-thread-infoGDB Command...........No equivalent.Example.......N.A.The `-thread-list-all-threads' Command--------------------------------------Synopsis........-thread-list-all-threadsGDB Command...........The equivalent GDB command is `info threads'.Example.......N.A.The `-thread-list-ids' Command------------------------------Synopsis........-thread-list-idsProduces a list of the currently known GDB thread ids. At the endof the list it also prints the total number of such threads.GDB Command...........Part of `info threads' supplies the same information.Example.......No threads present, besides the main process:(gdb)-thread-list-ids^done,thread-ids={},number-of-threads="0"(gdb)Several threads:(gdb)-thread-list-ids^done,thread-ids={thread-id="3",thread-id="2",thread-id="1"},number-of-threads="3"(gdb)The `-thread-select' Command----------------------------Synopsis........-thread-select THREADNUMMake THREADNUM the current thread. It prints the number of the newcurrent thread, and the topmost frame for that thread.GDB Command...........The corresponding GDB command is `thread'.Example.......(gdb)-exec-next^running(gdb)*stopped,reason="end-stepping-range",thread-id="2",line="187",file="../../../devo/gdb/testsuite/gdb.threads/linux-dp.c"(gdb)-thread-list-ids^done,thread-ids={thread-id="3",thread-id="2",thread-id="1"},number-of-threads="3"(gdb)-thread-select 3^done,new-thread-id="3",frame={level="0",func="vprintf",args=[{name="format",value="0x8048e9c \"%*s%c %d %c\\n\""},{name="arg",value="0x2"}],file="vprintf.c",line="31"}(gdb)File: gdb.info, Node: GDB/MI Program Execution, Next: GDB/MI Stack Manipulation, Prev: GDB/MI Thread Commands, Up: GDB/MI24.10 GDB/MI Program Execution==============================These are the asynchronous commands which generate the out-of-bandrecord `*stopped'. Currently GDB only really executes asynchronouslywith remote targets and this interaction is mimicked in other cases.The `-exec-continue' Command----------------------------Synopsis........-exec-continueResumes the execution of the inferior program until a breakpoint isencountered, or until the inferior exits.GDB Command...........The corresponding GDB corresponding is `continue'.Example.......-exec-continue^running(gdb)@Hello world*stopped,reason="breakpoint-hit",bkptno="2",frame={func="foo",args=[],file="hello.c",fullname="/home/foo/bar/hello.c",line="13"}(gdb)The `-exec-finish' Command--------------------------Synopsis........-exec-finishResumes the execution of the inferior program until the currentfunction is exited. Displays the results returned by the function.GDB Command...........The corresponding GDB command is `finish'.Example.......Function returning `void'.-exec-finish^running(gdb)@hello from foo*stopped,reason="function-finished",frame={func="main",args=[],file="hello.c",fullname="/home/foo/bar/hello.c",line="7"}(gdb)Function returning other than `void'. The name of the internal GDBvariable storing the result is printed, together with the value itself.-exec-finish^running(gdb)*stopped,reason="function-finished",frame={addr="0x000107b0",func="foo",args=[{name="a",value="1"],{name="b",value="9"}},file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},gdb-result-var="$1",return-value="0"(gdb)The `-exec-interrupt' Command-----------------------------Synopsis........-exec-interruptInterrupts the background execution of the target. Note how thetoken associated with the stop message is the one for the executioncommand that has been interrupted. The token for the interrupt itselfonly appears in the `^done' output. If the user is trying to interrupta non-running program, an error message will be printed.GDB Command...........The corresponding GDB command is `interrupt'.Example.......(gdb)111-exec-continue111^running(gdb)222-exec-interrupt222^done(gdb)111*stopped,signal-name="SIGINT",signal-meaning="Interrupt",frame={addr="0x00010140",func="foo",args=[],file="try.c",fullname="/home/foo/bar/try.c",line="13"}(gdb)(gdb)-exec-interrupt^error,msg="mi_cmd_exec_interrupt: Inferior not executing."(gdb)The `-exec-next' Command------------------------Synopsis........-exec-nextResumes execution of the inferior program, stopping when thebeginning of the next source line is reached.GDB Command...........The corresponding GDB command is `next'.Example.......-exec-next^running(gdb)*stopped,reason="end-stepping-range",line="8",file="hello.c"(gdb)The `-exec-next-instruction' Command------------------------------------Synopsis........-exec-next-instructionExecutes one machine instruction. If the instruction is a functioncall, continues until the function returns. If the program stops at aninstruction in the middle of a source line, the address will be printedas well.GDB Command...........The corresponding GDB command is `nexti'.Example.......(gdb)-exec-next-instruction^running(gdb)*stopped,reason="end-stepping-range",addr="0x000100d4",line="5",file="hello.c"(gdb)The `-exec-return' Command--------------------------Synopsis........-exec-returnMakes current function return immediately. Doesn't execute theinferior. Displays the new current frame.GDB Command...........The corresponding GDB command is `return'.Example.......(gdb)200-break-insert callee4200^done,bkpt={number="1",addr="0x00010734",file="../../../devo/gdb/testsuite/gdb.mi/basics.c",line="8"}(gdb)000-exec-run000^running(gdb)000*stopped,reason="breakpoint-hit",bkptno="1",frame={func="callee4",args=[],file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/bar/devo/gdb/testsuite/gdb.mi/basics.c",line="8"}(gdb)205-break-delete205^done(gdb)111-exec-return111^done,frame={level="0",func="callee3",args=[{name="strarg",value="0x11940 \"A string argument.\""}],file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/bar/devo/gdb/testsuite/gdb.mi/basics.c",line="18"}(gdb)The `-exec-run' Command-----------------------Synopsis........-exec-runStarts execution of the inferior from the beginning. The inferiorexecutes until either a breakpoint is encountered or the program exits.In the latter case the output will include an exit code, if theprogram has exited exceptionally.GDB Command...........The corresponding GDB command is `run'.Examples........(gdb)-break-insert main^done,bkpt={number="1",addr="0x0001072c",file="recursive2.c",line="4"}(gdb)-exec-run^running(gdb)*stopped,reason="breakpoint-hit",bkptno="1",frame={func="main",args=[],file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="4"}(gdb)Program exited normally:(gdb)-exec-run^running(gdb)x = 55*stopped,reason="exited-normally"(gdb)Program exited exceptionally:(gdb)-exec-run^running(gdb)x = 55*stopped,reason="exited",exit-code="01"(gdb)Another way the program can terminate is if it receives a signalsuch as `SIGINT'. In this case, GDB/MI displays this:(gdb)*stopped,reason="exited-signalled",signal-name="SIGINT",signal-meaning="Interrupt"The `-exec-step' Command------------------------Synopsis........-exec-stepResumes execution of the inferior program, stopping when thebeginning of the next source line is reached, if the next source lineis not a function call. If it is, stop at the first instruction of thecalled function.GDB Command...........The corresponding GDB command is `step'.Example.......Stepping into a function:-exec-step^running(gdb)*stopped,reason="end-stepping-range",frame={func="foo",args=[{name="a",value="10"},{name="b",value="0"}],file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="11"}(gdb)Regular stepping:-exec-step^running(gdb)*stopped,reason="end-stepping-range",line="14",file="recursive2.c"(gdb)The `-exec-step-instruction' Command------------------------------------Synopsis........-exec-step-instructionResumes the inferior which executes one machine instruction. Theoutput, once GDB has stopped, will vary depending on whether we havestopped in the middle of a source line or not. In the former case, theaddress at which the program stopped will be printed as well.GDB Command...........The corresponding GDB command is `stepi'.Example.......(gdb)-exec-step-instruction^running(gdb)*stopped,reason="end-stepping-range",frame={func="foo",args=[],file="try.c",fullname="/home/foo/bar/try.c",line="10"}(gdb)-exec-step-instruction^running(gdb)*stopped,reason="end-stepping-range",frame={addr="0x000100f4",func="foo",args=[],file="try.c",fullname="/home/foo/bar/try.c",line="10"}(gdb)The `-exec-until' Command-------------------------Synopsis........-exec-until [ LOCATION ]Executes the inferior until the LOCATION specified in the argumentis reached. If there is no argument, the inferior executes until asource line greater than the current one is reached. The reason forstopping in this case will be `location-reached'.GDB Command...........The corresponding GDB command is `until'.Example.......(gdb)-exec-until recursive2.c:6^running(gdb)x = 55*stopped,reason="location-reached",frame={func="main",args=[],file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="6"}(gdb)File: gdb.info, Node: GDB/MI Stack Manipulation, Next: GDB/MI Variable Objects, Prev: GDB/MI Program Execution, Up: GDB/MI24.11 GDB/MI Stack Manipulation Commands========================================The `-stack-info-frame' Command-------------------------------Synopsis........-stack-info-frameGet info on the selected frame.GDB Command...........The corresponding GDB command is `info frame' or `frame' (withoutarguments).Example.......(gdb)-stack-info-frame^done,frame={level="1",addr="0x0001076c",func="callee3",file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/bar/devo/gdb/testsuite/gdb.mi/basics.c",line="17"}(gdb)The `-stack-info-depth' Command-------------------------------Synopsis........-stack-info-depth [ MAX-DEPTH ]Return the depth of the stack. If the integer argument MAX-DEPTH isspecified, do not count beyond MAX-DEPTH frames.GDB Command...........There's no equivalent GDB command.Example.......For a stack with frame levels 0 through 11:(gdb)-stack-info-depth^done,depth="12"(gdb)-stack-info-depth 4^done,depth="4"(gdb)-stack-info-depth 12^done,depth="12"(gdb)-stack-info-depth 11^done,depth="11"(gdb)-stack-info-depth 13^done,depth="12"(gdb)The `-stack-list-arguments' Command-----------------------------------Synopsis........-stack-list-arguments SHOW-VALUES[ LOW-FRAME HIGH-FRAME ]Display a list of the arguments for the frames between LOW-FRAME andHIGH-FRAME (inclusive). If LOW-FRAME and HIGH-FRAME are not provided,list the arguments for the whole call stack. If the two arguments areequal, show the single frame at the corresponding level. It is anerror if LOW-FRAME is larger than the actual number of frames. On theother hand, HIGH-FRAME may be larger than the actual number of frames,in which case only existing frames will be returned.The SHOW-VALUES argument must have a value of 0 or 1. A value of 0means that only the names of the arguments are listed, a value of 1means that both names and values of the arguments are printed.GDB Command...........GDB does not have an equivalent command. `gdbtk' has a `gdb_get_args'command which partially overlaps with the functionality of`-stack-list-arguments'.Example.......(gdb)-stack-list-frames^done,stack=[frame={level="0",addr="0x00010734",func="callee4",file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/bar/devo/gdb/testsuite/gdb.mi/basics.c",line="8"},frame={level="1",addr="0x0001076c",func="callee3",file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/bar/devo/gdb/testsuite/gdb.mi/basics.c",line="17"},frame={level="2",addr="0x0001078c",func="callee2",file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/bar/devo/gdb/testsuite/gdb.mi/basics.c",line="22"},frame={level="3",addr="0x000107b4",func="callee1",file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/bar/devo/gdb/testsuite/gdb.mi/basics.c",line="27"},frame={level="4",addr="0x000107e0",func="main",file="../../../devo/gdb/testsuite/gdb.mi/basics.c",fullname="/home/foo/bar/devo/gdb/testsuite/gdb.mi/basics.c",line="32"}](gdb)-stack-list-arguments 0^done,stack-args=[frame={level="0",args=[]},frame={level="1",args=[name="strarg"]},frame={level="2",args=[name="intarg",name="strarg"]},frame={level="3",args=[name="intarg",name="strarg",name="fltarg"]},frame={level="4",args=[]}](gdb)-stack-list-arguments 1^done,stack-args=[frame={level="0",args=[]},frame={level="1",args=[{name="strarg",value="0x11940 \"A string argument.\""}]},frame={level="2",args=[{name="intarg",value="2"},{name="strarg",value="0x11940 \"A string argument.\""}]},{frame={level="3",args=[{name="intarg",value="2"},{name="strarg",value="0x11940 \"A string argument.\""},{name="fltarg",value="3.5"}]},frame={level="4",args=[]}](gdb)-stack-list-arguments 0 2 2^done,stack-args=[frame={level="2",args=[name="intarg",name="strarg"]}](gdb)-stack-list-arguments 1 2 2^done,stack-args=[frame={level="2",args=[{name="intarg",value="2"},{name="strarg",value="0x11940 \"A string argument.\""}]}](gdb)The `-stack-list-frames' Command--------------------------------Synopsis........-stack-list-frames [ LOW-FRAME HIGH-FRAME ]List the frames currently on the stack. For each frame it displaysthe following info:`LEVEL'The frame number, 0 being the topmost frame, i.e., the innermostfunction.`ADDR'The `$pc' value for that frame.`FUNC'Function name.`FILE'File name of the source file where the function lives.`LINE'Line number corresponding to the `$pc'.If invoked without arguments, this command prints a backtrace for thewhole stack. If given two integer arguments, it shows the frames whoselevels are between the two arguments (inclusive). If the two argumentsare equal, it shows the single frame at the corresponding level. It isan error if LOW-FRAME is larger than the actual number of frames. Onthe other hand, HIGH-FRAME may be larger than the actual number offrames, in which case only existing frames will be returned.GDB Command...........The corresponding GDB commands are `backtrace' and `where'.Example.......Full stack backtrace:(gdb)-stack-list-frames^done,stack=[frame={level="0",addr="0x0001076c",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="11"},frame={level="1",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},frame={level="2",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},frame={level="3",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},frame={level="4",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},frame={level="5",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},frame={level="6",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},frame={level="7",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},frame={level="8",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},frame={level="9",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},frame={level="10",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},frame={level="11",addr="0x00010738",func="main",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="4"}](gdb)Show frames between LOW_FRAME and HIGH_FRAME:(gdb)-stack-list-frames 3 5^done,stack=[frame={level="3",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},frame={level="4",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"},frame={level="5",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"}](gdb)Show a single frame:(gdb)-stack-list-frames 3 3^done,stack=[frame={level="3",addr="0x000107a4",func="foo",file="recursive2.c",fullname="/home/foo/bar/recursive2.c",line="14"}](gdb)The `-stack-list-locals' Command--------------------------------Synopsis........-stack-list-locals PRINT-VALUESDisplay the local variable names for the selected frame. IfPRINT-VALUES is 0 or `--no-values', print only the names of thevariables; if it is 1 or `--all-values', print also their values; andif it is 2 or `--simple-values', print the name, type and value forsimple data types and the name and type for arrays, structures andunions. In this last case, a frontend can immediately display thevalue of simple data types and create variable objects for other datatypes when the user wishes to explore their values in more detail.GDB Command...........`info locals' in GDB, `gdb_get_locals' in `gdbtk'.Example.......(gdb)-stack-list-locals 0^done,locals=[name="A",name="B",name="C"](gdb)-stack-list-locals --all-values^done,locals=[{name="A",value="1"},{name="B",value="2"},{name="C",value="{1, 2, 3}"}]-stack-list-locals --simple-values^done,locals=[{name="A",type="int",value="1"},{name="B",type="int",value="2"},{name="C",type="int [3]"}](gdb)The `-stack-select-frame' Command---------------------------------Synopsis........-stack-select-frame FRAMENUMChange the selected frame. Select a different frame FRAMENUM on thestack.GDB Command...........The corresponding GDB commands are `frame', `up', `down',`select-frame', `up-silent', and `down-silent'.Example.......(gdb)-stack-select-frame 2^done(gdb)File: gdb.info, Node: GDB/MI Variable Objects, Next: GDB/MI Data Manipulation, Prev: GDB/MI Stack Manipulation, Up: GDB/MI24.12 GDB/MI Variable Objects=============================Introduction to Variable Objects--------------------------------Variable objects are "object-oriented" MI interface for examining andchanging values of expressions. Unlike some other MI interfaces thatwork with expressions, variable objects are specifically designed forsimple and efficient presentation in the frontend. A variable objectis identified by string name. When a variable object is created, thefrontend specifies the expression for that variable object. Theexpression can be a simple variable, or it can be an arbitrary complexexpression, and can even involve CPU registers. After creating avariable object, the frontend can invoke other variable objectoperations--for example to obtain or change the value of a variableobject, or to change display format.Variable objects have hierarchical tree structure. Any variableobject that corresponds to a composite type, such as structure in C, hasa number of child variable objects, for example corresponding to eachelement of a structure. A child variable object can itself havechildren, recursively. Recursion ends when we reach leaf variableobjects, which always have built-in types. Child variable objects arecreated only by explicit request, so if a frontend is not interested inthe children of a particular variable object, no child will be created.For a leaf variable object it is possible to obtain its value as astring, or set the value from a string. String value can be alsoobtained for a non-leaf variable object, but it's generally a stringthat only indicates the type of the object, and does not list itscontents. Assignment to a non-leaf variable object is not allowed.A frontend does not need to read the values of all variable objectseach time the program stops. Instead, MI provides an update commandthat lists all variable objects whose values has changed since the lastupdate operation. This considerably reduces the amount of data thatmust be transferred to the frontend. As noted above, children variableobjects are created on demand, and only leaf variable objects have areal value. As result, gdb will read target memory only for leafvariables that frontend has created.The automatic update is not always desirable. For example, afrontend might want to keep a value of some expression for futurereference, and never update it. For another example, fetching memoryis relatively slow for embedded targets, so a frontend might want todisable automatic update for the variables that are either not visibleon the screen, or "closed". This is possible using so called "frozenvariable objects". Such variable objects are never implicitly updated.The following is the complete set of GDB/MI operations defined toaccess this functionality:*Operation* *Description*`-var-create' create a variable object`-var-delete' delete the variable object and/or itschildren`-var-set-format' set the display format of this variable`-var-show-format' show the display format of this variable`-var-info-num-children' tells how many children this object has`-var-list-children' return a list of the object's children`-var-info-type' show the type of this variable object`-var-info-expression' print parent-relative expression that thisvariable object represents`-var-info-path-expression' print full expression that this variableobject represents`-var-show-attributes' is this variable editable? does it existhere?`-var-evaluate-expression' get the value of this variable`-var-assign' set the value of this variable`-var-update' update the variable and its children`-var-set-frozen' set frozeness attributeIn the next subsection we describe each operation in detail andsuggest how it can be used.Description And Use of Operations on Variable Objects-----------------------------------------------------The `-var-create' Command-------------------------Synopsis........-var-create {NAME | "-"}{FRAME-ADDR | "*"} EXPRESSIONThis operation creates a variable object, which allows themonitoring of a variable, the result of an expression, a memory cell ora CPU register.The NAME parameter is the string by which the object can bereferenced. It must be unique. If `-' is specified, the varobj systemwill generate a string "varNNNNNN" automatically. It will be uniqueprovided that one does not specify NAME on that format. The commandfails if a duplicate name is found.The frame under which the expression should be evaluated can bespecified by FRAME-ADDR. A `*' indicates that the current frame shouldbe used.EXPRESSION is any expression valid on the current language set (mustnot begin with a `*'), or one of the following:* `*ADDR', where ADDR is the address of a memory cell* `*ADDR-ADDR' -- a memory address range (TBD)* `$REGNAME' -- a CPU register nameResult......This operation returns the name, number of children and the type of theobject created. Type is returned as a string as the ones generated bythe GDB CLI:name="NAME",numchild="N",type="TYPE"The `-var-delete' Command-------------------------Synopsis........-var-delete [ -c ] NAMEDeletes a previously created variable object and all of its children.With the `-c' option, just deletes the children.Returns an error if the object NAME is not found.The `-var-set-format' Command-----------------------------Synopsis........-var-set-format NAME FORMAT-SPECSets the output format for the value of the object NAME to beFORMAT-SPEC.The syntax for the FORMAT-SPEC is as follows:FORMAT-SPEC ==>{binary | decimal | hexadecimal | octal | natural}The natural format is the default format choosen automatically basedon the variable type (like decimal for an `int', hex for pointers,etc.).For a variable with children, the format is set only on the variableitself, and the children are not affected.The `-var-show-format' Command------------------------------Synopsis........-var-show-format NAMEReturns the format used to display the value of the object NAME.FORMAT ==>FORMAT-SPECThe `-var-info-num-children' Command------------------------------------Synopsis........-var-info-num-children NAMEReturns the number of children of a variable object NAME:numchild=NThe `-var-list-children' Command--------------------------------Synopsis........-var-list-children [PRINT-VALUES] NAMEReturn a list of the children of the specified variable object andcreate variable objects for them, if they do not already exist. With asingle argument or if PRINT-VALUES has a value for of 0 or`--no-values', print only the names of the variables; if PRINT-VALUESis 1 or `--all-values', also print their values; and if it is 2 or`--simple-values' print the name and value for simple data types andjust the name for arrays, structures and unions.Example.......(gdb)-var-list-children n^done,numchild=N,children=[{name=NAME,numchild=N,type=TYPE},(repeats N times)](gdb)-var-list-children --all-values n^done,numchild=N,children=[{name=NAME,numchild=N,value=VALUE,type=TYPE},(repeats N times)]The `-var-info-type' Command----------------------------Synopsis........-var-info-type NAMEReturns the type of the specified variable NAME. The type isreturned as a string in the same format as it is output by the GDB CLI:type=TYPENAMEThe `-var-info-expression' Command----------------------------------Synopsis........-var-info-expression NAMEReturns a string that is suitable for presenting this variableobject in user interface. The string is generally not valid expressionin the current language, and cannot be evaluated.For example, if `a' is an array, and variable object `A' was createdfor `a', then we'll get this output:(gdb) -var-info-expression A.1^done,lang="C",exp="1"Here, the values of `lang' can be `{"C" | "C++" | "Java"}'.Note that the output of the `-var-list-children' command alsoincludes those expressions, so the `-var-info-expression' command is oflimited use.The `-var-info-path-expression' Command---------------------------------------Synopsis........-var-info-path-expression NAMEReturns an expression that can be evaluated in the current contextand will yield the same value that a variable object has. Compare thiswith the `-var-info-expression' command, which result can be used onlyfor UI presentation. Typical use of the `-var-info-path-expression'command is creating a watchpoint from a variable object.For example, suppose `C' is a C++ class, derived from class `Base',and that the `Base' class has a member called `m_size'. Assume avariable `c' is has the type of `C' and a variable object `C' wascreated for variable `c'. Then, we'll get this output:(gdb) -var-info-path-expression C.Base.public.m_size^done,path_expr=((Base)c).m_size)The `-var-show-attributes' Command----------------------------------Synopsis........-var-show-attributes NAMEList attributes of the specified variable object NAME:status=ATTR [ ( ,ATTR )* ]where ATTR is `{ { editable | noneditable } | TBD }'.The `-var-evaluate-expression' Command--------------------------------------Synopsis........-var-evaluate-expression NAMEEvaluates the expression that is represented by the specifiedvariable object and returns its value as a string. The format of thestring can be changed using the `-var-set-format' command.value=VALUENote that one must invoke `-var-list-children' for a variable beforethe value of a child variable can be evaluated.The `-var-assign' Command-------------------------Synopsis........-var-assign NAME EXPRESSIONAssigns the value of EXPRESSION to the variable object specified byNAME. The object must be `editable'. If the variable's value isaltered by the assign, the variable will show up in any subsequent`-var-update' list.Example.......(gdb)-var-assign var1 3^done,value="3"(gdb)-var-update *^done,changelist=[{name="var1",in_scope="true",type_changed="false"}](gdb)The `-var-update' Command-------------------------Synopsis........-var-update [PRINT-VALUES] {NAME | "*"}Reevaluate the expressions corresponding to the variable object NAMEand all its direct and indirect children, and return the list ofvariable objects whose values have changed; NAME must be a rootvariable object. Here, "changed" means that the result of`-var-evaluate-expression' before and after the `-var-update' isdifferent. If `*' is used as the variable object names, all existingvariable objects are updated, except for frozen ones (*note-var-set-frozen::). The option PRINT-VALUES determines whether bothnames and values, or just names are printed. The possible values ofthis options are the same as for `-var-list-children' (*note-var-list-children::). It is recommended to use the `--all-values'option, to reduce the number of MI commands needed on each program stop.Example.......(gdb)-var-assign var1 3^done,value="3"(gdb)-var-update --all-values var1^done,changelist=[{name="var1",value="3",in_scope="true",type_changed="false"}](gdb)The field in_scope may take three values:`"true"'The variable object's current value is valid.`"false"'The variable object does not currently hold a valid value but itmay hold one in the future if its associated expression comes backinto scope.`"invalid"'The variable object no longer holds a valid value. This can occurwhen the executable file being debugged has changed, eitherthrough recompilation or by using the GDB `file' command. Thefront end should normally choose to delete these variable objects.In the future new values may be added to this list so the frontshould be prepared for this possibility. *Note GDB/MI Development andFront Ends: GDB/MI Development and Front Ends.The `-var-set-frozen' Command-----------------------------Synopsis........-var-set-frozen NAME FLAGSet the frozenness flag on the variable object NAME. The FLAGparameter should be either `1' to make the variable frozen or `0' tomake it unfrozen. If a variable object is frozen, then neither itself,nor any of its children, are implicitly updated by `-var-update' of aparent variable or by `-var-update *'. Only `-var-update' of thevariable itself will update its value and values of its children.After a variable object is unfrozen, it is implicitly updated by allsubsequent `-var-update' operations. Unfreezing a variable does notupdate it, only subsequent `-var-update' does.Example.......(gdb)-var-set-frozen V 1^done(gdb)File: gdb.info, Node: GDB/MI Data Manipulation, Next: GDB/MI Tracepoint Commands, Prev: GDB/MI Variable Objects, Up: GDB/MI24.13 GDB/MI Data Manipulation==============================This section describes the GDB/MI commands that manipulate data:examine memory and registers, evaluate expressions, etc.The `-data-disassemble' Command-------------------------------Synopsis........-data-disassemble[ -s START-ADDR -e END-ADDR ]| [ -f FILENAME -l LINENUM [ -n LINES ] ]-- MODEWhere:`START-ADDR'is the beginning address (or `$pc')`END-ADDR'is the end address`FILENAME'is the name of the file to disassemble`LINENUM'is the line number to disassemble around`LINES'is the number of disassembly lines to be produced. If it is -1,the whole function will be disassembled, in case no END-ADDR isspecified. If END-ADDR is specified as a non-zero value, andLINES is lower than the number of disassembly lines betweenSTART-ADDR and END-ADDR, only LINES lines are displayed; if LINESis higher than the number of lines between START-ADDR andEND-ADDR, only the lines up to END-ADDR are displayed.`MODE'is either 0 (meaning only disassembly) or 1 (meaning mixed sourceand disassembly).Result......The output for each instruction is composed of four fields:* Address* Func-name* Offset* InstructionNote that whatever included in the instruction field, is notmanipulated directly by GDB/MI, i.e., it is not possible to adjust itsformat.GDB Command...........There's no direct mapping from this command to the CLI.Example.......Disassemble from the current value of `$pc' to `$pc + 20':(gdb)-data-disassemble -s $pc -e "$pc + 20" -- 0^done,asm_insns=[{address="0x000107c0",func-name="main",offset="4",inst="mov 2, %o0"},{address="0x000107c4",func-name="main",offset="8",inst="sethi %hi(0x11800), %o2"},{address="0x000107c8",func-name="main",offset="12",inst="or %o2, 0x140, %o1\t! 0x11940 <_lib_version+8>"},{address="0x000107cc",func-name="main",offset="16",inst="sethi %hi(0x11800), %o2"},{address="0x000107d0",func-name="main",offset="20",inst="or %o2, 0x168, %o4\t! 0x11968 <_lib_version+48>"}](gdb)Disassemble the whole `main' function. Line 32 is part of `main'.-data-disassemble -f basics.c -l 32 -- 0^done,asm_insns=[{address="0x000107bc",func-name="main",offset="0",inst="save %sp, -112, %sp"},{address="0x000107c0",func-name="main",offset="4",inst="mov 2, %o0"},{address="0x000107c4",func-name="main",offset="8",inst="sethi %hi(0x11800), %o2"},[...]{address="0x0001081c",func-name="main",offset="96",inst="ret "},{address="0x00010820",func-name="main",offset="100",inst="restore "}](gdb)Disassemble 3 instructions from the start of `main':(gdb)-data-disassemble -f basics.c -l 32 -n 3 -- 0^done,asm_insns=[{address="0x000107bc",func-name="main",offset="0",inst="save %sp, -112, %sp"},{address="0x000107c0",func-name="main",offset="4",inst="mov 2, %o0"},{address="0x000107c4",func-name="main",offset="8",inst="sethi %hi(0x11800), %o2"}](gdb)Disassemble 3 instructions from the start of `main' in mixed mode:(gdb)-data-disassemble -f basics.c -l 32 -n 3 -- 1^done,asm_insns=[src_and_asm_line={line="31",file="/kwikemart/marge/ezannoni/flathead-dev/devo/gdb/ \testsuite/gdb.mi/basics.c",line_asm_insn=[{address="0x000107bc",func-name="main",offset="0",inst="save %sp, -112, %sp"}]},src_and_asm_line={line="32",file="/kwikemart/marge/ezannoni/flathead-dev/devo/gdb/ \testsuite/gdb.mi/basics.c",line_asm_insn=[{address="0x000107c0",func-name="main",offset="4",inst="mov 2, %o0"},{address="0x000107c4",func-name="main",offset="8",inst="sethi %hi(0x11800), %o2"}]}](gdb)The `-data-evaluate-expression' Command---------------------------------------Synopsis........-data-evaluate-expression EXPREvaluate EXPR as an expression. The expression could contain aninferior function call. The function call will execute synchronously.If the expression contains spaces, it must be enclosed in double quotes.GDB Command...........The corresponding GDB commands are `print', `output', and `call'. In`gdbtk' only, there's a corresponding `gdb_eval' command.Example.......In the following example, the numbers that precede the commands are the"tokens" described in *Note GDB/MI Command Syntax: GDB/MI CommandSyntax. Notice how GDB/MI returns the same tokens in its output.211-data-evaluate-expression A211^done,value="1"(gdb)311-data-evaluate-expression &A311^done,value="0xefffeb7c"(gdb)411-data-evaluate-expression A+3411^done,value="4"(gdb)511-data-evaluate-expression "A + 3"511^done,value="4"(gdb)The `-data-list-changed-registers' Command------------------------------------------Synopsis........-data-list-changed-registersDisplay a list of the registers that have changed.GDB Command...........GDB doesn't have a direct analog for this command; `gdbtk' has thecorresponding command `gdb_changed_register_list'.Example.......On a PPC MBX board:(gdb)-exec-continue^running(gdb)*stopped,reason="breakpoint-hit",bkptno="1",frame={func="main",args=[],file="try.c",fullname="/home/foo/bar/try.c",line="5"}(gdb)-data-list-changed-registers^done,changed-registers=["0","1","2","4","5","6","7","8","9","10","11","13","14","15","16","17","18","19","20","21","22","23","24","25","26","27","28","30","31","64","65","66","67","69"](gdb)The `-data-list-register-names' Command---------------------------------------Synopsis........-data-list-register-names [ ( REGNO )+ ]Show a list of register names for the current target. If noarguments are given, it shows a list of the names of all the registers.If integer numbers are given as arguments, it will print a list of thenames of the registers corresponding to the arguments. To ensureconsistency between a register name and its number, the output list mayinclude empty register names.GDB Command...........GDB does not have a command which corresponds to`-data-list-register-names'. In `gdbtk' there is a correspondingcommand `gdb_regnames'.Example.......For the PPC MBX board:(gdb)-data-list-register-names^done,register-names=["r0","r1","r2","r3","r4","r5","r6","r7","r8","r9","r10","r11","r12","r13","r14","r15","r16","r17","r18","r19","r20","r21","r22","r23","r24","r25","r26","r27","r28","r29","r30","r31","f0","f1","f2","f3","f4","f5","f6","f7","f8","f9","f10","f11","f12","f13","f14","f15","f16","f17","f18","f19","f20","f21","f22","f23","f24","f25","f26","f27","f28","f29","f30","f31","", "pc","ps","cr","lr","ctr","xer"](gdb)-data-list-register-names 1 2 3^done,register-names=["r1","r2","r3"](gdb)The `-data-list-register-values' Command----------------------------------------Synopsis........-data-list-register-values FMT [ ( REGNO )*]Display the registers' contents. FMT is the format according towhich the registers' contents are to be returned, followed by anoptional list of numbers specifying the registers to display. Amissing list of numbers indicates that the contents of all theregisters must be returned.Allowed formats for FMT are:`x'Hexadecimal`o'Octal`t'Binary`d'Decimal`r'Raw`N'NaturalGDB Command...........The corresponding GDB commands are `info reg', `info all-reg', and (in`gdbtk') `gdb_fetch_registers'.Example.......For a PPC MBX board (note: line breaks are for readability only, theydon't appear in the actual output):(gdb)-data-list-register-values r 64 65^done,register-values=[{number="64",value="0xfe00a300"},{number="65",value="0x00029002"}](gdb)-data-list-register-values x^done,register-values=[{number="0",value="0xfe0043c8"},{number="1",value="0x3fff88"},{number="2",value="0xfffffffe"},{number="3",value="0x0"},{number="4",value="0xa"},{number="5",value="0x3fff68"},{number="6",value="0x3fff58"},{number="7",value="0xfe011e98"},{number="8",value="0x2"},{number="9",value="0xfa202820"},{number="10",value="0xfa202808"},{number="11",value="0x1"},{number="12",value="0x0"},{number="13",value="0x4544"},{number="14",value="0xffdfffff"},{number="15",value="0xffffffff"},{number="16",value="0xfffffeff"},{number="17",value="0xefffffed"},{number="18",value="0xfffffffe"},{number="19",value="0xffffffff"},{number="20",value="0xffffffff"},{number="21",value="0xffffffff"},{number="22",value="0xfffffff7"},{number="23",value="0xffffffff"},{number="24",value="0xffffffff"},{number="25",value="0xffffffff"},{number="26",value="0xfffffffb"},{number="27",value="0xffffffff"},{number="28",value="0xf7bfffff"},{number="29",value="0x0"},{number="30",value="0xfe010000"},{number="31",value="0x0"},{number="32",value="0x0"},{number="33",value="0x0"},{number="34",value="0x0"},{number="35",value="0x0"},{number="36",value="0x0"},{number="37",value="0x0"},{number="38",value="0x0"},{number="39",value="0x0"},{number="40",value="0x0"},{number="41",value="0x0"},{number="42",value="0x0"},{number="43",value="0x0"},{number="44",value="0x0"},{number="45",value="0x0"},{number="46",value="0x0"},{number="47",value="0x0"},{number="48",value="0x0"},{number="49",value="0x0"},{number="50",value="0x0"},{number="51",value="0x0"},{number="52",value="0x0"},{number="53",value="0x0"},{number="54",value="0x0"},{number="55",value="0x0"},{number="56",value="0x0"},{number="57",value="0x0"},{number="58",value="0x0"},{number="59",value="0x0"},{number="60",value="0x0"},{number="61",value="0x0"},{number="62",value="0x0"},{number="63",value="0x0"},{number="64",value="0xfe00a300"},{number="65",value="0x29002"},{number="66",value="0x202f04b5"},{number="67",value="0xfe0043b0"},{number="68",value="0xfe00b3e4"},{number="69",value="0x20002b03"}](gdb)The `-data-read-memory' Command-------------------------------Synopsis........-data-read-memory [ -o BYTE-OFFSET ]ADDRESS WORD-FORMAT WORD-SIZENR-ROWS NR-COLS [ ASCHAR ]where:`ADDRESS'An expression specifying the address of the first memory word to beread. Complex expressions containing embedded white space shouldbe quoted using the C convention.`WORD-FORMAT'The format to be used to print the memory words. The notation isthe same as for GDB's `print' command (*note Output Formats:Output Formats.).`WORD-SIZE'The size of each memory word in bytes.`NR-ROWS'The number of rows in the output table.`NR-COLS'The number of columns in the output table.`ASCHAR'If present, indicates that each row should include an ASCII dump.The value of ASCHAR is used as a padding character when a byte isnot a member of the printable ASCII character set (printable ASCIIcharacters are those whose code is between 32 and 126,inclusively).`BYTE-OFFSET'An offset to add to the ADDRESS before fetching memory.This command displays memory contents as a table of NR-ROWS byNR-COLS words, each word being WORD-SIZE bytes. In total, `NR-ROWS *NR-COLS * WORD-SIZE' bytes are read (returned as `total-bytes').Should less than the requested number of bytes be returned by thetarget, the missing words are identified using `N/A'. The number ofbytes read from the target is returned in `nr-bytes' and the startingaddress used to read memory in `addr'.The address of the next/previous row or page is available in`next-row' and `prev-row', `next-page' and `prev-page'.GDB Command...........The corresponding GDB command is `x'. `gdbtk' has `gdb_get_mem' memoryread command.Example.......Read six bytes of memory starting at `bytes+6' but then offset by `-6'bytes. Format as three rows of two columns. One byte per word.Display each word in hex.(gdb)9-data-read-memory -o -6 -- bytes+6 x 1 3 29^done,addr="0x00001390",nr-bytes="6",total-bytes="6",next-row="0x00001396",prev-row="0x0000138e",next-page="0x00001396",prev-page="0x0000138a",memory=[{addr="0x00001390",data=["0x00","0x01"]},{addr="0x00001392",data=["0x02","0x03"]},{addr="0x00001394",data=["0x04","0x05"]}](gdb)Read two bytes of memory starting at address `shorts + 64' anddisplay as a single word formatted in decimal.(gdb)5-data-read-memory shorts+64 d 2 1 15^done,addr="0x00001510",nr-bytes="2",total-bytes="2",next-row="0x00001512",prev-row="0x0000150e",next-page="0x00001512",prev-page="0x0000150e",memory=[{addr="0x00001510",data=["128"]}](gdb)Read thirty two bytes of memory starting at `bytes+16' and format aseight rows of four columns. Include a string encoding with `x' used asthe non-printable character.(gdb)4-data-read-memory bytes+16 x 1 8 4 x4^done,addr="0x000013a0",nr-bytes="32",total-bytes="32",next-row="0x000013c0",prev-row="0x0000139c",next-page="0x000013c0",prev-page="0x00001380",memory=[{addr="0x000013a0",data=["0x10","0x11","0x12","0x13"],ascii="xxxx"},{addr="0x000013a4",data=["0x14","0x15","0x16","0x17"],ascii="xxxx"},{addr="0x000013a8",data=["0x18","0x19","0x1a","0x1b"],ascii="xxxx"},{addr="0x000013ac",data=["0x1c","0x1d","0x1e","0x1f"],ascii="xxxx"},{addr="0x000013b0",data=["0x20","0x21","0x22","0x23"],ascii=" !\"#"},{addr="0x000013b4",data=["0x24","0x25","0x26","0x27"],ascii="$%&'"},{addr="0x000013b8",data=["0x28","0x29","0x2a","0x2b"],ascii="()*+"},{addr="0x000013bc",data=["0x2c","0x2d","0x2e","0x2f"],ascii=",-./"}](gdb)File: gdb.info, Node: GDB/MI Tracepoint Commands, Next: GDB/MI Symbol Query, Prev: GDB/MI Data Manipulation, Up: GDB/MI24.14 GDB/MI Tracepoint Commands================================The tracepoint commands are not yet implemented.File: gdb.info, Node: GDB/MI Symbol Query, Next: GDB/MI File Commands, Prev: GDB/MI Tracepoint Commands, Up: GDB/MI24.15 GDB/MI Symbol Query Commands==================================The `-symbol-info-address' Command----------------------------------Synopsis........-symbol-info-address SYMBOLDescribe where SYMBOL is stored.GDB Command...........The corresponding GDB command is `info address'.Example.......N.A.The `-symbol-info-file' Command-------------------------------Synopsis........-symbol-info-fileShow the file for the symbol.GDB Command...........There's no equivalent GDB command. `gdbtk' has `gdb_find_file'.Example.......N.A.The `-symbol-info-function' Command-----------------------------------Synopsis........-symbol-info-functionShow which function the symbol lives in.GDB Command...........`gdb_get_function' in `gdbtk'.Example.......N.A.The `-symbol-info-line' Command-------------------------------Synopsis........-symbol-info-lineShow the core addresses of the code for a source line.GDB Command...........The corresponding GDB command is `info line'. `gdbtk' has the`gdb_get_line' and `gdb_get_file' commands.Example.......N.A.The `-symbol-info-symbol' Command---------------------------------Synopsis........-symbol-info-symbol ADDRDescribe what symbol is at location ADDR.GDB Command...........The corresponding GDB command is `info symbol'.Example.......N.A.The `-symbol-list-functions' Command------------------------------------Synopsis........-symbol-list-functionsList the functions in the executable.GDB Command...........`info functions' in GDB, `gdb_listfunc' and `gdb_search' in `gdbtk'.Example.......N.A.The `-symbol-list-lines' Command--------------------------------Synopsis........-symbol-list-lines FILENAMEPrint the list of lines that contain code and their associatedprogram addresses for the given source filename. The entries aresorted in ascending PC order.GDB Command...........There is no corresponding GDB command.Example.......(gdb)-symbol-list-lines basics.c^done,lines=[{pc="0x08048554",line="7"},{pc="0x0804855a",line="8"}](gdb)The `-symbol-list-types' Command--------------------------------Synopsis........-symbol-list-typesList all the type names.GDB Command...........The corresponding commands are `info types' in GDB, `gdb_search' in`gdbtk'.Example.......N.A.The `-symbol-list-variables' Command------------------------------------Synopsis........-symbol-list-variablesList all the global and static variable names.GDB Command...........`info variables' in GDB, `gdb_search' in `gdbtk'.Example.......N.A.The `-symbol-locate' Command----------------------------Synopsis........-symbol-locateGDB Command...........`gdb_loc' in `gdbtk'.Example.......N.A.The `-symbol-type' Command--------------------------Synopsis........-symbol-type VARIABLEShow type of VARIABLE.GDB Command...........The corresponding GDB command is `ptype', `gdbtk' has`gdb_obj_variable'.Example.......N.A.File: gdb.info, Node: GDB/MI File Commands, Next: GDB/MI Target Manipulation, Prev: GDB/MI Symbol Query, Up: GDB/MI24.16 GDB/MI File Commands==========================This section describes the GDB/MI commands to specify executable filenames and to read in and obtain symbol table information.The `-file-exec-and-symbols' Command------------------------------------Synopsis........-file-exec-and-symbols FILESpecify the executable file to be debugged. This file is the onefrom which the symbol table is also read. If no file is specified, thecommand clears the executable and symbol information. If breakpointsare set when using this command with no arguments, GDB will produceerror messages. Otherwise, no output is produced, except a completionnotification.GDB Command...........The corresponding GDB command is `file'.Example.......(gdb)-file-exec-and-symbols /kwikemart/marge/ezannoni/TRUNK/mbx/hello.mbx^done(gdb)The `-file-exec-file' Command-----------------------------Synopsis........-file-exec-file FILESpecify the executable file to be debugged. Unlike`-file-exec-and-symbols', the symbol table is _not_ read from thisfile. If used without argument, GDB clears the information about theexecutable file. No output is produced, except a completionnotification.GDB Command...........The corresponding GDB command is `exec-file'.Example.......(gdb)-file-exec-file /kwikemart/marge/ezannoni/TRUNK/mbx/hello.mbx^done(gdb)The `-file-list-exec-sections' Command--------------------------------------Synopsis........-file-list-exec-sectionsList the sections of the current executable file.GDB Command...........The GDB command `info file' shows, among the rest, the same informationas this command. `gdbtk' has a corresponding command `gdb_load_info'.Example.......N.A.The `-file-list-exec-source-file' Command-----------------------------------------Synopsis........-file-list-exec-source-fileList the line number, the current source file, and the absolute pathto the current source file for the current executable. The macroinformation field has a value of `1' or `0' depending on whether or notthe file includes preprocessor macro information.GDB Command...........The GDB equivalent is `info source'Example.......(gdb)123-file-list-exec-source-file123^done,line="1",file="foo.c",fullname="/home/bar/foo.c,macro-info="1"(gdb)The `-file-list-exec-source-files' Command------------------------------------------Synopsis........-file-list-exec-source-filesList the source files for the current executable.It will always output the filename, but only when GDB can find theabsolute file name of a source file, will it output the fullname.GDB Command...........The GDB equivalent is `info sources'. `gdbtk' has an analogous command`gdb_listfiles'.Example.......(gdb)-file-list-exec-source-files^done,files=[{file=foo.c,fullname=/home/foo.c},{file=/home/bar.c,fullname=/home/bar.c},{file=gdb_could_not_find_fullpath.c}](gdb)The `-file-list-shared-libraries' Command-----------------------------------------Synopsis........-file-list-shared-librariesList the shared libraries in the program.GDB Command...........The corresponding GDB command is `info shared'.Example.......N.A.The `-file-list-symbol-files' Command-------------------------------------Synopsis........-file-list-symbol-filesList symbol files.GDB Command...........The corresponding GDB command is `info file' (part of it).Example.......N.A.The `-file-symbol-file' Command-------------------------------Synopsis........-file-symbol-file FILERead symbol table info from the specified FILE argument. When usedwithout arguments, clears GDB's symbol table info. No output isproduced, except for a completion notification.GDB Command...........The corresponding GDB command is `symbol-file'.Example.......(gdb)-file-symbol-file /kwikemart/marge/ezannoni/TRUNK/mbx/hello.mbx^done(gdb)File: gdb.info, Node: GDB/MI Target Manipulation, Next: GDB/MI File Transfer Commands, Prev: GDB/MI File Commands, Up: GDB/MI24.17 GDB/MI Target Manipulation Commands=========================================The `-target-attach' Command----------------------------Synopsis........-target-attach PID | FILEAttach to a process PID or a file FILE outside of GDB.GDB Command...........The corresponding GDB command is `attach'.Example.......N.A.The `-target-compare-sections' Command--------------------------------------Synopsis........-target-compare-sections [ SECTION ]Compare data of section SECTION on target to the exec file. Withoutthe argument, all sections are compared.GDB Command...........The GDB equivalent is `compare-sections'.Example.......N.A.The `-target-detach' Command----------------------------Synopsis........-target-detachDetach from the remote target which normally resumes its execution.There's no output.GDB Command...........The corresponding GDB command is `detach'.Example.......(gdb)-target-detach^done(gdb)The `-target-disconnect' Command--------------------------------Synopsis........-target-disconnectDisconnect from the remote target. There's no output and the targetis generally not resumed.GDB Command...........The corresponding GDB command is `disconnect'.Example.......(gdb)-target-disconnect^done(gdb)The `-target-download' Command------------------------------Synopsis........-target-downloadLoads the executable onto the remote target. It prints out anupdate message every half second, which includes the fields:`section'The name of the section.`section-sent'The size of what has been sent so far for that section.`section-size'The size of the section.`total-sent'The total size of what was sent so far (the current and theprevious sections).`total-size'The size of the overall executable to download.Each message is sent as status record (*note GDB/MI Output Syntax:GDB/MI Output Syntax.).In addition, it prints the name and size of the sections, as they aredownloaded. These messages include the following fields:`section'The name of the section.`section-size'The size of the section.`total-size'The size of the overall executable to download.At the end, a summary is printed.GDB Command...........The corresponding GDB command is `load'.Example.......Note: each status message appears on a single line. Here the messageshave been broken down so that they can fit onto a page.(gdb)-target-download+download,{section=".text",section-size="6668",total-size="9880"}+download,{section=".text",section-sent="512",section-size="6668",total-sent="512",total-size="9880"}+download,{section=".text",section-sent="1024",section-size="6668",total-sent="1024",total-size="9880"}+download,{section=".text",section-sent="1536",section-size="6668",total-sent="1536",total-size="9880"}+download,{section=".text",section-sent="2048",section-size="6668",total-sent="2048",total-size="9880"}+download,{section=".text",section-sent="2560",section-size="6668",total-sent="2560",total-size="9880"}+download,{section=".text",section-sent="3072",section-size="6668",total-sent="3072",total-size="9880"}+download,{section=".text",section-sent="3584",section-size="6668",total-sent="3584",total-size="9880"}+download,{section=".text",section-sent="4096",section-size="6668",total-sent="4096",total-size="9880"}+download,{section=".text",section-sent="4608",section-size="6668",total-sent="4608",total-size="9880"}+download,{section=".text",section-sent="5120",section-size="6668",total-sent="5120",total-size="9880"}+download,{section=".text",section-sent="5632",section-size="6668",total-sent="5632",total-size="9880"}+download,{section=".text",section-sent="6144",section-size="6668",total-sent="6144",total-size="9880"}+download,{section=".text",section-sent="6656",section-size="6668",total-sent="6656",total-size="9880"}+download,{section=".init",section-size="28",total-size="9880"}+download,{section=".fini",section-size="28",total-size="9880"}+download,{section=".data",section-size="3156",total-size="9880"}+download,{section=".data",section-sent="512",section-size="3156",total-sent="7236",total-size="9880"}+download,{section=".data",section-sent="1024",section-size="3156",total-sent="7748",total-size="9880"}+download,{section=".data",section-sent="1536",section-size="3156",total-sent="8260",total-size="9880"}+download,{section=".data",section-sent="2048",section-size="3156",total-sent="8772",total-size="9880"}+download,{section=".data",section-sent="2560",section-size="3156",total-sent="9284",total-size="9880"}+download,{section=".data",section-sent="3072",section-size="3156",total-sent="9796",total-size="9880"}^done,address="0x10004",load-size="9880",transfer-rate="6586",write-rate="429"(gdb)The `-target-exec-status' Command---------------------------------Synopsis........-target-exec-statusProvide information on the state of the target (whether it isrunning or not, for instance).GDB Command...........There's no equivalent GDB command.Example.......N.A.The `-target-list-available-targets' Command--------------------------------------------Synopsis........-target-list-available-targetsList the possible targets to connect to.GDB Command...........The corresponding GDB command is `help target'.Example.......N.A.The `-target-list-current-targets' Command------------------------------------------Synopsis........-target-list-current-targetsDescribe the current target.GDB Command...........The corresponding information is printed by `info file' (among otherthings).Example.......N.A.The `-target-list-parameters' Command-------------------------------------Synopsis........-target-list-parametersGDB Command...........No equivalent.Example.......N.A.The `-target-select' Command----------------------------Synopsis........-target-select TYPE PARAMETERS ...Connect GDB to the remote target. This command takes two args:`TYPE'The type of target, for instance `async', `remote', etc.`PARAMETERS'Device names, host names and the like. *Note Commands forManaging Targets: Target Commands, for more details.The output is a connection notification, followed by the address atwhich the target program is, in the following form:^connected,addr="ADDRESS",func="FUNCTION NAME",args=[ARG LIST]GDB Command...........The corresponding GDB command is `target'.Example.......(gdb)-target-select async /dev/ttya^connected,addr="0xfe00a300",func="??",args=[](gdb)File: gdb.info, Node: GDB/MI File Transfer Commands, Next: GDB/MI Miscellaneous Commands, Prev: GDB/MI Target Manipulation, Up: GDB/MI24.18 GDB/MI File Transfer Commands===================================The `-target-file-put' Command------------------------------Synopsis........-target-file-put HOSTFILE TARGETFILECopy file HOSTFILE from the host system (the machine running GDB) toTARGETFILE on the target system.GDB Command...........The corresponding GDB command is `remote put'.Example.......(gdb)-target-file-put localfile remotefile^done(gdb)The `-target-file-put' Command------------------------------Synopsis........-target-file-get TARGETFILE HOSTFILECopy file TARGETFILE from the target system to HOSTFILE on the hostsystem.GDB Command...........The corresponding GDB command is `remote get'.Example.......(gdb)-target-file-get remotefile localfile^done(gdb)The `-target-file-delete' Command---------------------------------Synopsis........-target-file-delete TARGETFILEDelete TARGETFILE from the target system.GDB Command...........The corresponding GDB command is `remote delete'.Example.......(gdb)-target-file-delete remotefile^done(gdb)File: gdb.info, Node: GDB/MI Miscellaneous Commands, Prev: GDB/MI File Transfer Commands, Up: GDB/MI24.19 Miscellaneous GDB/MI Commands===================================The `-gdb-exit' Command-----------------------Synopsis........-gdb-exitExit GDB immediately.GDB Command...........Approximately corresponds to `quit'.Example.......(gdb)-gdb-exit^exitThe `-exec-abort' Command-------------------------Synopsis........-exec-abortKill the inferior running program.GDB Command...........The corresponding GDB command is `kill'.Example.......N.A.The `-gdb-set' Command----------------------Synopsis........-gdb-setSet an internal GDB variable.GDB Command...........The corresponding GDB command is `set'.Example.......(gdb)-gdb-set $foo=3^done(gdb)The `-gdb-show' Command-----------------------Synopsis........-gdb-showShow the current value of a GDB variable.GDB Command...........The corresponding GDB command is `show'.Example.......(gdb)-gdb-show annotate^done,value="0"(gdb)The `-gdb-version' Command--------------------------Synopsis........-gdb-versionShow version information for GDB. Used mostly in testing.GDB Command...........The GDB equivalent is `show version'. GDB by default shows thisinformation when you start an interactive session.Example.......(gdb)-gdb-version~GNU gdb 5.2.1~Copyright 2000 Free Software Foundation, Inc.~GDB is free software, covered by the GNU General Public License, and~you are welcome to change it and/or distribute copies of it under~ certain conditions.~Type "show copying" to see the conditions.~There is absolutely no warranty for GDB. Type "show warranty" for~ details.~This GDB was configured as"--host=sparc-sun-solaris2.5.1 --target=ppc-eabi".^done(gdb)The `-list-features' Command----------------------------Returns a list of particular features of the MI protocol that thisversion of gdb implements. A feature can be a command, or a new fieldin an output of some command, or even an important bugfix. While afrontend can sometimes detect presence of a feature at runtime, it iseasier to perform detection at debugger startup.The command returns a list of strings, with each string naming anavailable feature. Each returned string is just a name, it does nothave any internal structure. The list of possible feature names isgiven below.Example output:(gdb) -list-features^done,result=["feature1","feature2"]The current list of features is:- `frozen-varobjs'--indicates presence of the `-var-set-frozen'command, as well as possible presense of the `frozen' field in theoutput of `-varobj-create'.- `pending-breakpoints'--indicates presence of the `-f' option tothe `-break-insert' command.The `-interpreter-exec' Command-------------------------------Synopsis---------interpreter-exec INTERPRETER COMMANDExecute the specified COMMAND in the given INTERPRETER.GDB Command-----------The corresponding GDB command is `interpreter-exec'.Example-------(gdb)-interpreter-exec console "break main"&"During symbol reading, couldn't parse type; debugger out of date?.\n"&"During symbol reading, bad structure-type format.\n"~"Breakpoint 1 at 0x8074fc6: file ../../src/gdb/main.c, line 743.\n"^done(gdb)The `-inferior-tty-set' Command-------------------------------Synopsis---------inferior-tty-set /dev/pts/1Set terminal for future runs of the program being debugged.GDB Command-----------The corresponding GDB command is `set inferior-tty' /dev/pts/1.Example-------(gdb)-inferior-tty-set /dev/pts/1^done(gdb)The `-inferior-tty-show' Command--------------------------------Synopsis---------inferior-tty-showShow terminal for future runs of program being debugged.GDB Command-----------The corresponding GDB command is `show inferior-tty'.Example-------(gdb)-inferior-tty-set /dev/pts/1^done(gdb)-inferior-tty-show^done,inferior_tty_terminal="/dev/pts/1"(gdb)The `-enable-timings' Command-----------------------------Synopsis---------enable-timings [yes | no]Toggle the printing of the wallclock, user and system times for an MIcommand as a field in its output. This command is to help frontenddevelopers optimize the performance of their code. No argument isequivalent to `yes'.GDB Command-----------No equivalent.Example-------(gdb)-enable-timings^done(gdb)-break-insert main^done,bkpt={number="1",type="breakpoint",disp="keep",enabled="y",addr="0x080484ed",func="main",file="myprog.c",fullname="/home/nickrob/myprog.c",line="73",times="0"},time={wallclock="0.05185",user="0.00800",system="0.00000"}(gdb)-enable-timings no^done(gdb)-exec-run^running(gdb)*stopped,reason="breakpoint-hit",bkptno="1",thread-id="0",frame={addr="0x080484ed",func="main",args=[{name="argc",value="1"},{name="argv",value="0xbfb60364"}],file="myprog.c",fullname="/home/nickrob/myprog.c",line="73"}(gdb)File: gdb.info, Node: Annotations, Next: GDB Bugs, Prev: GDB/MI, Up: Top25 GDB Annotations******************This chapter describes annotations in GDB. Annotations were designedto interface GDB to graphical user interfaces or other similar programswhich want to interact with GDB at a relatively high level.The annotation mechanism has largely been superseded by GDB/MI(*note GDB/MI::).* Menu:* Annotations Overview:: What annotations are; the general syntax.* Server Prefix:: Issuing a command without affecting user state.* Prompting:: Annotations marking GDB's need for input.* Errors:: Annotations for error messages.* Invalidation:: Some annotations describe things now invalid.* Annotations for Running::Whether the program is running, how it stopped, etc.* Source Annotations:: Annotations describing source code.File: gdb.info, Node: Annotations Overview, Next: Server Prefix, Up: Annotations25.1 What is an Annotation?===========================Annotations start with a newline character, two `control-z' characters,and the name of the annotation. If there is no additional informationassociated with this annotation, the name of the annotation is followedimmediately by a newline. If there is additional information, the nameof the annotation is followed by a space, the additional information,and a newline. The additional information cannot contain newlinecharacters.Any output not beginning with a newline and two `control-z'characters denotes literal output from GDB. Currently there is no needfor GDB to output a newline followed by two `control-z' characters, butif there was such a need, the annotations could be extended with an`escape' annotation which means those three characters as output.The annotation LEVEL, which is specified using the `--annotate'command line option (*note Mode Options::), controls how muchinformation GDB prints together with its prompt, values of expressions,source lines, and other types of output. Level 0 is for noannotations, level 1 is for use when GDB is run as a subprocess of GNUEmacs, level 3 is the maximum annotation suitable for programs thatcontrol GDB, and level 2 annotations have been made obsolete (*noteLimitations of the Annotation Interface: (annotate)Limitations.).`set annotate LEVEL'The GDB command `set annotate' sets the level of annotations tothe specified LEVEL.`show annotate'Show the current annotation level.This chapter describes level 3 annotations.A simple example of starting up GDB with annotations is:$ gdb --annotate=3GNU gdb 6.0Copyright 2003 Free Software Foundation, Inc.GDB is free software, covered by the GNU General Public License,and you are welcome to change it and/or distribute copies of itunder certain conditions.Type "show copying" to see the conditions.There is absolutely no warranty for GDB. Type "show warranty"for details.This GDB was configured as "i386-pc-linux-gnu"^Z^Zpre-prompt(gdb)^Z^Zpromptquit^Z^Zpost-prompt$Here `quit' is input to GDB; the rest is output from GDB. The threelines beginning `^Z^Z' (where `^Z' denotes a `control-z' character) areannotations; the rest is output from GDB.File: gdb.info, Node: Server Prefix, Next: Prompting, Prev: Annotations Overview, Up: Annotations25.2 The Server Prefix======================If you prefix a command with `server ' then it will not affect thecommand history, nor will it affect GDB's notion of which command torepeat if <RET> is pressed on a line by itself. This means thatcommands can be run behind a user's back by a front-end in atransparent manner.The server prefix does not affect the recording of values into thevalue history; to print a value without recording it into the valuehistory, use the `output' command instead of the `print' command.File: gdb.info, Node: Prompting, Next: Errors, Prev: Server Prefix, Up: Annotations25.3 Annotation for GDB Input=============================When GDB prompts for input, it annotates this fact so it is possible toknow when to send output, when the output from a given command is over,etc.Different kinds of input each have a different "input type". Eachinput type has three annotations: a `pre-' annotation, which denotesthe beginning of any prompt which is being output, a plain annotation,which denotes the end of the prompt, and then a `post-' annotationwhich denotes the end of any echo which may (or may not) be associatedwith the input. For example, the `prompt' input type features thefollowing annotations:^Z^Zpre-prompt^Z^Zprompt^Z^Zpost-promptThe input types are`prompt'When GDB is prompting for a command (the main GDB prompt).`commands'When GDB prompts for a set of commands, like in the `commands'command. The annotations are repeated for each command which isinput.`overload-choice'When GDB wants the user to select between various overloadedfunctions.`query'When GDB wants the user to confirm a potentially dangerousoperation.`prompt-for-continue'When GDB is asking the user to press return to continue. Note:Don't expect this to work well; instead use `set height 0' todisable prompting. This is because the counting of lines is buggyin the presence of annotations.File: gdb.info, Node: Errors, Next: Invalidation, Prev: Prompting, Up: Annotations25.4 Errors===========^Z^ZquitThis annotation occurs right before GDB responds to an interrupt.^Z^ZerrorThis annotation occurs right before GDB responds to an error.Quit and error annotations indicate that any annotations which GDBwas in the middle of may end abruptly. For example, if a`value-history-begin' annotation is followed by a `error', one cannotexpect to receive the matching `value-history-end'. One cannot expectnot to receive it either, however; an error annotation does notnecessarily mean that GDB is immediately returning all the way to thetop level.A quit or error annotation may be preceded by^Z^Zerror-beginAny output between that and the quit or error annotation is the errormessage.Warning messages are not yet annotated.File: gdb.info, Node: Invalidation, Next: Annotations for Running, Prev: Errors, Up: Annotations25.5 Invalidation Notices=========================The following annotations say that certain pieces of state may havechanged.`^Z^Zframes-invalid'The frames (for example, output from the `backtrace' command) mayhave changed.`^Z^Zbreakpoints-invalid'The breakpoints may have changed. For example, the user justadded or deleted a breakpoint.File: gdb.info, Node: Annotations for Running, Next: Source Annotations, Prev: Invalidation, Up: Annotations25.6 Running the Program========================When the program starts executing due to a GDB command such as `step'or `continue',^Z^Zstartingis output. When the program stops,^Z^Zstoppedis output. Before the `stopped' annotation, a variety ofannotations describe how the program stopped.`^Z^Zexited EXIT-STATUS'The program exited, and EXIT-STATUS is the exit status (zero forsuccessful exit, otherwise nonzero).`^Z^Zsignalled'The program exited with a signal. After the `^Z^Zsignalled', theannotation continues:INTRO-TEXT^Z^Zsignal-nameNAME^Z^Zsignal-name-endMIDDLE-TEXT^Z^Zsignal-stringSTRING^Z^Zsignal-string-endEND-TEXTwhere NAME is the name of the signal, such as `SIGILL' or`SIGSEGV', and STRING is the explanation of the signal, such as`Illegal Instruction' or `Segmentation fault'. INTRO-TEXT,MIDDLE-TEXT, and END-TEXT are for the user's benefit and have noparticular format.`^Z^Zsignal'The syntax of this annotation is just like `signalled', but GDB isjust saying that the program received the signal, not that it wasterminated with it.`^Z^Zbreakpoint NUMBER'The program hit breakpoint number NUMBER.`^Z^Zwatchpoint NUMBER'The program hit watchpoint number NUMBER.File: gdb.info, Node: Source Annotations, Prev: Annotations for Running, Up: Annotations25.7 Displaying Source======================The following annotation is used instead of displaying source code:^Z^Zsource FILENAME:LINE:CHARACTER:MIDDLE:ADDRwhere FILENAME is an absolute file name indicating which sourcefile, LINE is the line number within that file (where 1 is the firstline in the file), CHARACTER is the character position within the file(where 0 is the first character in the file) (for most debug formatsthis will necessarily point to the beginning of a line), MIDDLE is`middle' if ADDR is in the middle of the line, or `beg' if ADDR is atthe beginning of the line, and ADDR is the address in the targetprogram associated with the source which is being displayed. ADDR isin the form `0x' followed by one or more lowercase hex digits (notethat this does not depend on the language).File: gdb.info, Node: GDB Bugs, Next: Command Line Editing, Prev: Annotations, Up: Top26 Reporting Bugs in GDB************************Your bug reports play an essential role in making GDB reliable.Reporting a bug may help you by bringing a solution to your problem,or it may not. But in any case the principal function of a bug reportis to help the entire community by making the next version of GDB workbetter. Bug reports are your contribution to the maintenance of GDB.In order for a bug report to serve its purpose, you must include theinformation that enables us to fix the bug.* Menu:* Bug Criteria:: Have you found a bug?* Bug Reporting:: How to report bugsFile: gdb.info, Node: Bug Criteria, Next: Bug Reporting, Up: GDB Bugs26.1 Have You Found a Bug?==========================If you are not sure whether you have found a bug, here are someguidelines:* If the debugger gets a fatal signal, for any input whatever, thatis a GDB bug. Reliable debuggers never crash.* If GDB produces an error message for valid input, that is a bug.(Note that if you're cross debugging, the problem may also besomewhere in the connection to the target.)* If GDB does not produce an error message for invalid input, thatis a bug. However, you should note that your idea of "invalidinput" might be our idea of "an extension" or "support fortraditional practice".* If you are an experienced user of debugging tools, your suggestionsfor improvement of GDB are welcome in any case.File: gdb.info, Node: Bug Reporting, Prev: Bug Criteria, Up: GDB Bugs26.2 How to Report Bugs=======================A number of companies and individuals offer support for GNU products.If you obtained GDB from a support organization, we recommend youcontact that organization first.You can find contact information for many support companies andindividuals in the file `etc/SERVICE' in the GNU Emacs distribution.In any event, we also recommend that you submit bug reports for GDB.The preferred method is to submit them directly using GDB's Bugs webpage (http://www.gnu.org/software/gdb/bugs/). Alternatively, thee-mail gateway <bug-gdb@gnu.org> can be used.*Do not send bug reports to `info-gdb', or to `help-gdb', or to anynewsgroups.* Most users of GDB do not want to receive bug reports.Those that do have arranged to receive `bug-gdb'.The mailing list `bug-gdb' has a newsgroup `gnu.gdb.bug' whichserves as a repeater. The mailing list and the newsgroup carry exactlythe same messages. Often people think of posting bug reports to thenewsgroup instead of mailing them. This appears to work, but it has oneproblem which can be crucial: a newsgroup posting often lacks a mailpath back to the sender. Thus, if we need to ask for more information,we may be unable to reach you. For this reason, it is better to sendbug reports to the mailing list.The fundamental principle of reporting bugs usefully is this:*report all the facts*. If you are not sure whether to state a fact orleave it out, state it!Often people omit facts because they think they know what causes theproblem and assume that some details do not matter. Thus, you mightassume that the name of the variable you use in an example does notmatter. Well, probably it does not, but one cannot be sure. Perhapsthe bug is a stray memory reference which happens to fetch from thelocation where that name is stored in memory; perhaps, if the name weredifferent, the contents of that location would fool the debugger intodoing the right thing despite the bug. Play it safe and give aspecific, complete example. That is the easiest thing for you to do,and the most helpful.Keep in mind that the purpose of a bug report is to enable us to fixthe bug. It may be that the bug has been reported previously, butneither you nor we can know that unless your bug report is complete andself-contained.Sometimes people give a few sketchy facts and ask, "Does this ring abell?" Those bug reports are useless, and we urge everyone to _refuseto respond to them_ except to chide the sender to report bugs properly.To enable us to fix the bug, you should include all these things:* The version of GDB. GDB announces it if you start with noarguments; you can also print it at any time using `show version'.Without this, we will not know whether there is any point inlooking for the bug in the current version of GDB.* The type of machine you are using, and the operating system nameand version number.* What compiler (and its version) was used to compile GDB--e.g."gcc-2.8.1".* What compiler (and its version) was used to compile the programyou are debugging--e.g. "gcc-2.8.1", or "HP92453-01 A.10.32.03 HPC Compiler". For GCC, you can say `gcc --version' to get thisinformation; for other compilers, see the documentation for thosecompilers.* The command arguments you gave the compiler to compile yourexample and observe the bug. For example, did you use `-O'? Toguarantee you will not omit something important, list them all. Acopy of the Makefile (or the output from make) is sufficient.If we were to try to guess the arguments, we would probably guesswrong and then we might not encounter the bug.* A complete input script, and all necessary source files, that willreproduce the bug.* A description of what behavior you observe that you believe isincorrect. For example, "It gets a fatal signal."Of course, if the bug is that GDB gets a fatal signal, then wewill certainly notice it. But if the bug is incorrect output, wemight not notice unless it is glaringly wrong. You might as wellnot give us a chance to make a mistake.Even if the problem you experience is a fatal signal, you shouldstill say so explicitly. Suppose something strange is going on,such as, your copy of GDB is out of synch, or you have encountereda bug in the C library on your system. (This has happened!) Yourcopy might crash and ours would not. If you told us to expect acrash, then when ours fails to crash, we would know that the bugwas not happening for us. If you had not told us to expect acrash, then we would not be able to draw any conclusion from ourobservations.To collect all this information, you can use a session recordingprogram such as `script', which is available on many Unix systems.Just run your GDB session inside `script' and then include the`typescript' file with your bug report.Another way to record a GDB session is to run GDB inside Emacs andthen save the entire buffer to a file.* If you wish to suggest changes to the GDB source, send us contextdiffs. If you even discuss something in the GDB source, refer toit by context, not by line number.The line numbers in our development sources will not match thosein your sources. Your line numbers would convey no usefulinformation to us.Here are some things that are not necessary:* A description of the envelope of the bug.Often people who encounter a bug spend a lot of time investigatingwhich changes to the input file will make the bug go away and whichchanges will not affect it.This is often time consuming and not very useful, because the waywe will find the bug is by running a single example under thedebugger with breakpoints, not by pure deduction from a series ofexamples. We recommend that you save your time for something else.Of course, if you can find a simpler example to report _instead_of the original one, that is a convenience for us. Errors in theoutput will be easier to spot, running under the debugger will takeless time, and so on.However, simplification is not vital; if you do not want to dothis, report the bug anyway and send us the entire test case youused.* A patch for the bug.A patch for the bug does help us if it is a good one. But do notomit the necessary information, such as the test case, on theassumption that a patch is all we need. We might see problemswith your patch and decide to fix the problem another way, or wemight not understand it at all.Sometimes with a program as complicated as GDB it is very hard toconstruct an example that will make the program follow a certainpath through the code. If you do not send us the example, we willnot be able to construct one, so we will not be able to verifythat the bug is fixed.And if we cannot understand what bug you are trying to fix, or whyyour patch should be an improvement, we will not install it. Atest case will help us to understand.* A guess about what the bug is or what it depends on.Such guesses are usually wrong. Even we cannot guess right aboutsuch things without first using the debugger to find the facts.File: gdb.info, Node: Command Line Editing, Next: Using History Interactively, Prev: GDB Bugs, Up: Top27 Command Line Editing***********************This chapter describes the basic features of the GNU command lineediting interface.* Menu:* Introduction and Notation:: Notation used in this text.* Readline Interaction:: The minimum set of commands for editing a line.* Readline Init File:: Customizing Readline from a user's view.* Bindable Readline Commands:: A description of most of the Readline commandsavailable for binding* Readline vi Mode:: A short description of how to make Readlinebehave like the vi editor.File: gdb.info, Node: Introduction and Notation, Next: Readline Interaction, Up: Command Line Editing27.1 Introduction to Line Editing=================================The following paragraphs describe the notation used to representkeystrokes.The text `C-k' is read as `Control-K' and describes the characterproduced when the <k> key is pressed while the Control key is depressed.The text `M-k' is read as `Meta-K' and describes the characterproduced when the Meta key (if you have one) is depressed, and the <k>key is pressed. The Meta key is labeled <ALT> on many keyboards. Onkeyboards with two keys labeled <ALT> (usually to either side of thespace bar), the <ALT> on the left side is generally set to work as aMeta key. The <ALT> key on the right may also be configured to work asa Meta key or may be configured as some other modifier, such as aCompose key for typing accented characters.If you do not have a Meta or <ALT> key, or another key working as aMeta key, the identical keystroke can be generated by typing <ESC>_first_, and then typing <k>. Either process is known as "metafying"the <k> key.The text `M-C-k' is read as `Meta-Control-k' and describes thecharacter produced by "metafying" `C-k'.In addition, several keys have their own names. Specifically,<DEL>, <ESC>, <LFD>, <SPC>, <RET>, and <TAB> all stand for themselveswhen seen in this text, or in an init file (*note Readline Init File::).If your keyboard lacks a <LFD> key, typing <C-j> will produce thedesired character. The <RET> key may be labeled <Return> or <Enter> onsome keyboards.File: gdb.info, Node: Readline Interaction, Next: Readline Init File, Prev: Introduction and Notation, Up: Command Line Editing27.2 Readline Interaction=========================Often during an interactive session you type in a long line of text,only to notice that the first word on the line is misspelled. TheReadline library gives you a set of commands for manipulating the textas you type it in, allowing you to just fix your typo, and not forcingyou to retype the majority of the line. Using these editing commands,you move the cursor to the place that needs correction, and delete orinsert the text of the corrections. Then, when you are satisfied withthe line, you simply press <RET>. You do not have to be at the end ofthe line to press <RET>; the entire line is accepted regardless of thelocation of the cursor within the line.* Menu:* Readline Bare Essentials:: The least you need to know about Readline.* Readline Movement Commands:: Moving about the input line.* Readline Killing Commands:: How to delete text, and how to get it back!* Readline Arguments:: Giving numeric arguments to commands.* Searching:: Searching through previous lines.File: gdb.info, Node: Readline Bare Essentials, Next: Readline Movement Commands, Up: Readline Interaction27.2.1 Readline Bare Essentials-------------------------------In order to enter characters into the line, simply type them. The typedcharacter appears where the cursor was, and then the cursor moves onespace to the right. If you mistype a character, you can use your erasecharacter to back up and delete the mistyped character.Sometimes you may mistype a character, and not notice the erroruntil you have typed several other characters. In that case, you cantype `C-b' to move the cursor to the left, and then correct yourmistake. Afterwards, you can move the cursor to the right with `C-f'.When you add text in the middle of a line, you will notice thatcharacters to the right of the cursor are `pushed over' to make roomfor the text that you have inserted. Likewise, when you delete textbehind the cursor, characters to the right of the cursor are `pulledback' to fill in the blank space created by the removal of the text. Alist of the bare essentials for editing the text of an input linefollows.`C-b'Move back one character.`C-f'Move forward one character.<DEL> or <Backspace>Delete the character to the left of the cursor.`C-d'Delete the character underneath the cursor.Printing charactersInsert the character into the line at the cursor.`C-_' or `C-x C-u'Undo the last editing command. You can undo all the way back to anempty line.(Depending on your configuration, the <Backspace> key be set to deletethe character to the left of the cursor and the <DEL> key set to deletethe character underneath the cursor, like `C-d', rather than thecharacter to the left of the cursor.)File: gdb.info, Node: Readline Movement Commands, Next: Readline Killing Commands, Prev: Readline Bare Essentials, Up: Readline Interaction27.2.2 Readline Movement Commands---------------------------------The above table describes the most basic keystrokes that you need inorder to do editing of the input line. For your convenience, manyother commands have been added in addition to `C-b', `C-f', `C-d', and<DEL>. Here are some commands for moving more rapidly about the line.`C-a'Move to the start of the line.`C-e'Move to the end of the line.`M-f'Move forward a word, where a word is composed of letters anddigits.`M-b'Move backward a word.`C-l'Clear the screen, reprinting the current line at the top.Notice how `C-f' moves forward a character, while `M-f' movesforward a word. It is a loose convention that control keystrokesoperate on characters while meta keystrokes operate on words.File: gdb.info, Node: Readline Killing Commands, Next: Readline Arguments, Prev: Readline Movement Commands, Up: Readline Interaction27.2.3 Readline Killing Commands--------------------------------"Killing" text means to delete the text from the line, but to save itaway for later use, usually by "yanking" (re-inserting) it back intothe line. (`Cut' and `paste' are more recent jargon for `kill' and`yank'.)If the description for a command says that it `kills' text, then youcan be sure that you can get the text back in a different (or the same)place later.When you use a kill command, the text is saved in a "kill-ring".Any number of consecutive kills save all of the killed text together, sothat when you yank it back, you get it all. The kill ring is not linespecific; the text that you killed on a previously typed line isavailable to be yanked back later, when you are typing another line.Here is the list of commands for killing text.`C-k'Kill the text from the current cursor position to the end of theline.`M-d'Kill from the cursor to the end of the current word, or, if betweenwords, to the end of the next word. Word boundaries are the sameas those used by `M-f'.`M-<DEL>'Kill from the cursor the start of the current word, or, if betweenwords, to the start of the previous word. Word boundaries are thesame as those used by `M-b'.`C-w'Kill from the cursor to the previous whitespace. This isdifferent than `M-<DEL>' because the word boundaries differ.Here is how to "yank" the text back into the line. Yanking means tocopy the most-recently-killed text from the kill buffer.`C-y'Yank the most recently killed text back into the buffer at thecursor.`M-y'Rotate the kill-ring, and yank the new top. You can only do thisif the prior command is `C-y' or `M-y'.File: gdb.info, Node: Readline Arguments, Next: Searching, Prev: Readline Killing Commands, Up: Readline Interaction27.2.4 Readline Arguments-------------------------You can pass numeric arguments to Readline commands. Sometimes theargument acts as a repeat count, other times it is the sign of theargument that is significant. If you pass a negative argument to acommand which normally acts in a forward direction, that command willact in a backward direction. For example, to kill text back to thestart of the line, you might type `M-- C-k'.The general way to pass numeric arguments to a command is to typemeta digits before the command. If the first `digit' typed is a minussign (`-'), then the sign of the argument will be negative. Once youhave typed one meta digit to get the argument started, you can type theremainder of the digits, and then the command. For example, to givethe `C-d' command an argument of 10, you could type `M-1 0 C-d', whichwill delete the next ten characters on the input line.File: gdb.info, Node: Searching, Prev: Readline Arguments, Up: Readline Interaction27.2.5 Searching for Commands in the History--------------------------------------------Readline provides commands for searching through the command historyfor lines containing a specified string. There are two search modes:"incremental" and "non-incremental".Incremental searches begin before the user has finished typing thesearch string. As each character of the search string is typed,Readline displays the next entry from the history matching the stringtyped so far. An incremental search requires only as many charactersas needed to find the desired history entry. To search backward in thehistory for a particular string, type `C-r'. Typing `C-s' searchesforward through the history. The characters present in the value ofthe `isearch-terminators' variable are used to terminate an incrementalsearch. If that variable has not been assigned a value, the <ESC> and`C-J' characters will terminate an incremental search. `C-g' willabort an incremental search and restore the original line. When thesearch is terminated, the history entry containing the search stringbecomes the current line.To find other matching entries in the history list, type `C-r' or`C-s' as appropriate. This will search backward or forward in thehistory for the next entry matching the search string typed so far.Any other key sequence bound to a Readline command will terminate thesearch and execute that command. For instance, a <RET> will terminatethe search and accept the line, thereby executing the command from thehistory list. A movement command will terminate the search, make thelast line found the current line, and begin editing.Readline remembers the last incremental search string. If two`C-r's are typed without any intervening characters defining a newsearch string, any remembered search string is used.Non-incremental searches read the entire search string beforestarting to search for matching history lines. The search string may betyped by the user or be part of the contents of the current line.File: gdb.info, Node: Readline Init File, Next: Bindable Readline Commands, Prev: Readline Interaction, Up: Command Line Editing27.3 Readline Init File=======================Although the Readline library comes with a set of Emacs-likekeybindings installed by default, it is possible to use a different setof keybindings. Any user can customize programs that use Readline byputting commands in an "inputrc" file, conventionally in his homedirectory. The name of this file is taken from the value of theenvironment variable `INPUTRC'. If that variable is unset, the defaultis `~/.inputrc'.When a program which uses the Readline library starts up, the initfile is read, and the key bindings are set.In addition, the `C-x C-r' command re-reads this init file, thusincorporating any changes that you might have made to it.* Menu:* Readline Init File Syntax:: Syntax for the commands in the inputrc file.* Conditional Init Constructs:: Conditional key bindings in the inputrc file.* Sample Init File:: An example inputrc file.File: gdb.info, Node: Readline Init File Syntax, Next: Conditional Init Constructs, Up: Readline Init File27.3.1 Readline Init File Syntax--------------------------------There are only a few basic constructs allowed in the Readline initfile. Blank lines are ignored. Lines beginning with a `#' arecomments. Lines beginning with a `$' indicate conditional constructs(*note Conditional Init Constructs::). Other lines denote variablesettings and key bindings.Variable SettingsYou can modify the run-time behavior of Readline by altering thevalues of variables in Readline using the `set' command within theinit file. The syntax is simple:set VARIABLE VALUEHere, for example, is how to change from the default Emacs-likekey binding to use `vi' line editing commands:set editing-mode viVariable names and values, where appropriate, are recognizedwithout regard to case. Unrecognized variable names are ignored.Boolean variables (those that can be set to on or off) are set toon if the value is null or empty, ON (case-insensitive), or 1.Any other value results in the variable being set to off.A great deal of run-time behavior is changeable with the followingvariables.`bell-style'Controls what happens when Readline wants to ring theterminal bell. If set to `none', Readline never rings thebell. If set to `visible', Readline uses a visible bell ifone is available. If set to `audible' (the default),Readline attempts to ring the terminal's bell.`bind-tty-special-chars'If set to `on', Readline attempts to bind the controlcharacters treated specially by the kernel's terminal driverto their Readline equivalents.`comment-begin'The string to insert at the beginning of the line when the`insert-comment' command is executed. The default value is`"#"'.`completion-ignore-case'If set to `on', Readline performs filename matching andcompletion in a case-insensitive fashion. The default valueis `off'.`completion-query-items'The number of possible completions that determines when theuser is asked whether the list of possibilities should bedisplayed. If the number of possible completions is greaterthan this value, Readline will ask the user whether or not hewishes to view them; otherwise, they are simply listed. Thisvariable must be set to an integer value greater than orequal to 0. A negative value means Readline should never ask.The default limit is `100'.`convert-meta'If set to `on', Readline will convert characters with theeighth bit set to an ASCII key sequence by stripping theeighth bit and prefixing an <ESC> character, converting themto a meta-prefixed key sequence. The default value is `on'.`disable-completion'If set to `On', Readline will inhibit word completion.Completion characters will be inserted into the line as ifthey had been mapped to `self-insert'. The default is `off'.`editing-mode'The `editing-mode' variable controls which default set of keybindings is used. By default, Readline starts up in Emacsediting mode, where the keystrokes are most similar to Emacs.This variable can be set to either `emacs' or `vi'.`enable-keypad'When set to `on', Readline will try to enable the applicationkeypad when it is called. Some systems need this to enablethe arrow keys. The default is `off'.`expand-tilde'If set to `on', tilde expansion is performed when Readlineattempts word completion. The default is `off'.`history-preserve-point'If set to `on', the history code attempts to place point atthe same location on each history line retrieved with`previous-history' or `next-history'. The default is `off'.`horizontal-scroll-mode'This variable can be set to either `on' or `off'. Setting itto `on' means that the text of the lines being edited willscroll horizontally on a single screen line when they arelonger than the width of the screen, instead of wrapping ontoa new screen line. By default, this variable is set to `off'.`input-meta'If set to `on', Readline will enable eight-bit input (it willnot clear the eighth bit in the characters it reads),regardless of what the terminal claims it can support. Thedefault value is `off'. The name `meta-flag' is a synonymfor this variable.`isearch-terminators'The string of characters that should terminate an incrementalsearch without subsequently executing the character as acommand (*note Searching::). If this variable has not beengiven a value, the characters <ESC> and `C-J' will terminatean incremental search.`keymap'Sets Readline's idea of the current keymap for key bindingcommands. Acceptable `keymap' names are `emacs',`emacs-standard', `emacs-meta', `emacs-ctlx', `vi', `vi-move',`vi-command', and `vi-insert'. `vi' is equivalent to`vi-command'; `emacs' is equivalent to `emacs-standard'. Thedefault value is `emacs'. The value of the `editing-mode'variable also affects the default keymap.`mark-directories'If set to `on', completed directory names have a slashappended. The default is `on'.`mark-modified-lines'This variable, when set to `on', causes Readline to display anasterisk (`*') at the start of history lines which have beenmodified. This variable is `off' by default.`mark-symlinked-directories'If set to `on', completed names which are symbolic links todirectories have a slash appended (subject to the value of`mark-directories'). The default is `off'.`match-hidden-files'This variable, when set to `on', causes Readline to matchfiles whose names begin with a `.' (hidden files) whenperforming filename completion, unless the leading `.' issupplied by the user in the filename to be completed. Thisvariable is `on' by default.`output-meta'If set to `on', Readline will display characters with theeighth bit set directly rather than as a meta-prefixed escapesequence. The default is `off'.`page-completions'If set to `on', Readline uses an internal `more'-like pagerto display a screenful of possible completions at a time.This variable is `on' by default.`print-completions-horizontally'If set to `on', Readline will display completions with matchessorted horizontally in alphabetical order, rather than downthe screen. The default is `off'.`show-all-if-ambiguous'This alters the default behavior of the completion functions.If set to `on', words which have more than one possiblecompletion cause the matches to be listed immediately insteadof ringing the bell. The default value is `off'.`show-all-if-unmodified'This alters the default behavior of the completion functionsin a fashion similar to SHOW-ALL-IF-AMBIGUOUS. If set to`on', words which have more than one possible completionwithout any possible partial completion (the possiblecompletions don't share a common prefix) cause the matches tobe listed immediately instead of ringing the bell. Thedefault value is `off'.`visible-stats'If set to `on', a character denoting a file's type isappended to the filename when listing possible completions.The default is `off'.Key BindingsThe syntax for controlling key bindings in the init file issimple. First you need to find the name of the command that youwant to change. The following sections contain tables of thecommand name, the default keybinding, if any, and a shortdescription of what the command does.Once you know the name of the command, simply place on a line inthe init file the name of the key you wish to bind the command to,a colon, and then the name of the command. The name of the keycan be expressed in different ways, depending on what you find mostcomfortable.In addition to command names, readline allows keys to be bound toa string that is inserted when the key is pressed (a MACRO).KEYNAME: FUNCTION-NAME or MACROKEYNAME is the name of a key spelled out in English. Forexample:Control-u: universal-argumentMeta-Rubout: backward-kill-wordControl-o: "> output"In the above example, `C-u' is bound to the function`universal-argument', `M-DEL' is bound to the function`backward-kill-word', and `C-o' is bound to run the macroexpressed on the right hand side (that is, to insert the text`> output' into the line).A number of symbolic character names are recognized whileprocessing this key binding syntax: DEL, ESC, ESCAPE, LFD,NEWLINE, RET, RETURN, RUBOUT, SPACE, SPC, and TAB."KEYSEQ": FUNCTION-NAME or MACROKEYSEQ differs from KEYNAME above in that strings denoting anentire key sequence can be specified, by placing the keysequence in double quotes. Some GNU Emacs style key escapescan be used, as in the following example, but the specialcharacter names are not recognized."\C-u": universal-argument"\C-x\C-r": re-read-init-file"\e[11~": "Function Key 1"In the above example, `C-u' is again bound to the function`universal-argument' (just as it was in the first example),`C-x C-r' is bound to the function `re-read-init-file', and`<ESC> <[> <1> <1> <~>' is bound to insert the text `FunctionKey 1'.The following GNU Emacs style escape sequences are available whenspecifying key sequences:`\C-'control prefix`\M-'meta prefix`\e'an escape character`\\'backslash`\"'<">, a double quotation mark`\''<'>, a single quote or apostropheIn addition to the GNU Emacs style escape sequences, a second setof backslash escapes is available:`\a'alert (bell)`\b'backspace`\d'delete`\f'form feed`\n'newline`\r'carriage return`\t'horizontal tab`\v'vertical tab`\NNN'the eight-bit character whose value is the octal value NNN(one to three digits)`\xHH'the eight-bit character whose value is the hexadecimal valueHH (one or two hex digits)When entering the text of a macro, single or double quotes must beused to indicate a macro definition. Unquoted text is assumed tobe a function name. In the macro body, the backslash escapesdescribed above are expanded. Backslash will quote any othercharacter in the macro text, including `"' and `''. For example,the following binding will make `C-x \' insert a single `\' intothe line:"\C-x\\": "\\"File: gdb.info, Node: Conditional Init Constructs, Next: Sample Init File, Prev: Readline Init File Syntax, Up: Readline Init File27.3.2 Conditional Init Constructs----------------------------------Readline implements a facility similar in spirit to the conditionalcompilation features of the C preprocessor which allows key bindingsand variable settings to be performed as the result of tests. Thereare four parser directives used.`$if'The `$if' construct allows bindings to be made based on theediting mode, the terminal being used, or the application usingReadline. The text of the test extends to the end of the line; nocharacters are required to isolate it.`mode'The `mode=' form of the `$if' directive is used to testwhether Readline is in `emacs' or `vi' mode. This may beused in conjunction with the `set keymap' command, forinstance, to set bindings in the `emacs-standard' and`emacs-ctlx' keymaps only if Readline is starting out in`emacs' mode.`term'The `term=' form may be used to include terminal-specific keybindings, perhaps to bind the key sequences output by theterminal's function keys. The word on the right side of the`=' is tested against both the full name of the terminal andthe portion of the terminal name before the first `-'. Thisallows `sun' to match both `sun' and `sun-cmd', for instance.`application'The APPLICATION construct is used to includeapplication-specific settings. Each program using theReadline library sets the APPLICATION NAME, and you can testfor a particular value. This could be used to bind keysequences to functions useful for a specific program. Forinstance, the following command adds a key sequence thatquotes the current or previous word in Bash:$if Bash# Quote the current or previous word"\C-xq": "\eb\"\ef\""$endif`$endif'This command, as seen in the previous example, terminates an `$if'command.`$else'Commands in this branch of the `$if' directive are executed if thetest fails.`$include'This directive takes a single filename as an argument and readscommands and bindings from that file. For example, the followingdirective reads from `/etc/inputrc':$include /etc/inputrcFile: gdb.info, Node: Sample Init File, Prev: Conditional Init Constructs, Up: Readline Init File27.3.3 Sample Init File-----------------------Here is an example of an INPUTRC file. This illustrates key binding,variable assignment, and conditional syntax.# This file controls the behaviour of line input editing for# programs that use the GNU Readline library. Existing# programs include FTP, Bash, and GDB.## You can re-read the inputrc file with C-x C-r.# Lines beginning with '#' are comments.## First, include any systemwide bindings and variable# assignments from /etc/Inputrc$include /etc/Inputrc## Set various bindings for emacs mode.set editing-mode emacs$if mode=emacsMeta-Control-h: backward-kill-word Text after the function name is ignored## Arrow keys in keypad mode##"\M-OD": backward-char#"\M-OC": forward-char#"\M-OA": previous-history#"\M-OB": next-history## Arrow keys in ANSI mode#"\M-[D": backward-char"\M-[C": forward-char"\M-[A": previous-history"\M-[B": next-history## Arrow keys in 8 bit keypad mode##"\M-\C-OD": backward-char#"\M-\C-OC": forward-char#"\M-\C-OA": previous-history#"\M-\C-OB": next-history## Arrow keys in 8 bit ANSI mode##"\M-\C-[D": backward-char#"\M-\C-[C": forward-char#"\M-\C-[A": previous-history#"\M-\C-[B": next-historyC-q: quoted-insert$endif# An old-style binding. This happens to be the default.TAB: complete# Macros that are convenient for shell interaction$if Bash# edit the path"\C-xp": "PATH=${PATH}\e\C-e\C-a\ef\C-f"# prepare to type a quoted word --# insert open and close double quotes# and move to just after the open quote"\C-x\"": "\"\"\C-b"# insert a backslash (testing backslash escapes# in sequences and macros)"\C-x\\": "\\"# Quote the current or previous word"\C-xq": "\eb\"\ef\""# Add a binding to refresh the line, which is unbound"\C-xr": redraw-current-line# Edit variable on current line."\M-\C-v": "\C-a\C-k$\C-y\M-\C-e\C-a\C-y="$endif# use a visible bell if one is availableset bell-style visible# don't strip characters to 7 bits when readingset input-meta on# allow iso-latin1 characters to be inserted rather# than converted to prefix-meta sequencesset convert-meta off# display characters with the eighth bit set directly# rather than as meta-prefixed charactersset output-meta on# if there are more than 150 possible completions for# a word, ask the user if he wants to see all of themset completion-query-items 150# For FTP$if Ftp"\C-xg": "get \M-?""\C-xt": "put \M-?""\M-.": yank-last-arg$endifFile: gdb.info, Node: Bindable Readline Commands, Next: Readline vi Mode, Prev: Readline Init File, Up: Command Line Editing27.4 Bindable Readline Commands===============================* Menu:* Commands For Moving:: Moving about the line.* Commands For History:: Getting at previous lines.* Commands For Text:: Commands for changing text.* Commands For Killing:: Commands for killing and yanking.* Numeric Arguments:: Specifying numeric arguments, repeat counts.* Commands For Completion:: Getting Readline to do the typing for you.* Keyboard Macros:: Saving and re-executing typed characters* Miscellaneous Commands:: Other miscellaneous commands.This section describes Readline commands that may be bound to keysequences. Command names without an accompanying key sequence areunbound by default.In the following descriptions, "point" refers to the current cursorposition, and "mark" refers to a cursor position saved by the`set-mark' command. The text between the point and mark is referred toas the "region".File: gdb.info, Node: Commands For Moving, Next: Commands For History, Up: Bindable Readline Commands27.4.1 Commands For Moving--------------------------`beginning-of-line (C-a)'Move to the start of the current line.`end-of-line (C-e)'Move to the end of the line.`forward-char (C-f)'Move forward a character.`backward-char (C-b)'Move back a character.`forward-word (M-f)'Move forward to the end of the next word. Words are composed ofletters and digits.`backward-word (M-b)'Move back to the start of the current or previous word. Words arecomposed of letters and digits.`clear-screen (C-l)'Clear the screen and redraw the current line, leaving the currentline at the top of the screen.`redraw-current-line ()'Refresh the current line. By default, this is unbound.File: gdb.info, Node: Commands For History, Next: Commands For Text, Prev: Commands For Moving, Up: Bindable Readline Commands27.4.2 Commands For Manipulating The History--------------------------------------------`accept-line (Newline or Return)'Accept the line regardless of where the cursor is. If this line isnon-empty, it may be added to the history list for future recallwith `add_history()'. If this line is a modified history line,the history line is restored to its original state.`previous-history (C-p)'Move `back' through the history list, fetching the previouscommand.`next-history (C-n)'Move `forward' through the history list, fetching the next command.`beginning-of-history (M-<)'Move to the first line in the history.`end-of-history (M->)'Move to the end of the input history, i.e., the line currentlybeing entered.`reverse-search-history (C-r)'Search backward starting at the current line and moving `up'through the history as necessary. This is an incremental search.`forward-search-history (C-s)'Search forward starting at the current line and moving `down'through the the history as necessary. This is an incrementalsearch.`non-incremental-reverse-search-history (M-p)'Search backward starting at the current line and moving `up'through the history as necessary using a non-incremental searchfor a string supplied by the user.`non-incremental-forward-search-history (M-n)'Search forward starting at the current line and moving `down'through the the history as necessary using a non-incremental searchfor a string supplied by the user.`history-search-forward ()'Search forward through the history for the string of charactersbetween the start of the current line and the point. This is anon-incremental search. By default, this command is unbound.`history-search-backward ()'Search backward through the history for the string of charactersbetween the start of the current line and the point. This is anon-incremental search. By default, this command is unbound.`yank-nth-arg (M-C-y)'Insert the first argument to the previous command (usually thesecond word on the previous line) at point. With an argument N,insert the Nth word from the previous command (the words in theprevious command begin with word 0). A negative argument insertsthe Nth word from the end of the previous command. Once theargument N is computed, the argument is extracted as if the `!N'history expansion had been specified.`yank-last-arg (M-. or M-_)'Insert last argument to the previous command (the last word of theprevious history entry). With an argument, behave exactly like`yank-nth-arg'. Successive calls to `yank-last-arg' move backthrough the history list, inserting the last argument of each linein turn. The history expansion facilities are used to extract thelast argument, as if the `!$' history expansion had been specified.File: gdb.info, Node: Commands For Text, Next: Commands For Killing, Prev: Commands For History, Up: Bindable Readline Commands27.4.3 Commands For Changing Text---------------------------------`delete-char (C-d)'Delete the character at point. If point is at the beginning ofthe line, there are no characters in the line, and the lastcharacter typed was not bound to `delete-char', then return EOF.`backward-delete-char (Rubout)'Delete the character behind the cursor. A numeric argument meansto kill the characters instead of deleting them.`forward-backward-delete-char ()'Delete the character under the cursor, unless the cursor is at theend of the line, in which case the character behind the cursor isdeleted. By default, this is not bound to a key.`quoted-insert (C-q or C-v)'Add the next character typed to the line verbatim. This is how toinsert key sequences like `C-q', for example.`tab-insert (M-<TAB>)'Insert a tab character.`self-insert (a, b, A, 1, !, ...)'Insert yourself.`transpose-chars (C-t)'Drag the character before the cursor forward over the character atthe cursor, moving the cursor forward as well. If the insertionpoint is at the end of the line, then this transposes the last twocharacters of the line. Negative arguments have no effect.`transpose-words (M-t)'Drag the word before point past the word after point, moving pointpast that word as well. If the insertion point is at the end ofthe line, this transposes the last two words on the line.`upcase-word (M-u)'Uppercase the current (or following) word. With a negativeargument, uppercase the previous word, but do not move the cursor.`downcase-word (M-l)'Lowercase the current (or following) word. With a negativeargument, lowercase the previous word, but do not move the cursor.`capitalize-word (M-c)'Capitalize the current (or following) word. With a negativeargument, capitalize the previous word, but do not move the cursor.`overwrite-mode ()'Toggle overwrite mode. With an explicit positive numeric argument,switches to overwrite mode. With an explicit non-positive numericargument, switches to insert mode. This command affects only`emacs' mode; `vi' mode does overwrite differently. Each call to`readline()' starts in insert mode.In overwrite mode, characters bound to `self-insert' replace thetext at point rather than pushing the text to the right.Characters bound to `backward-delete-char' replace the characterbefore point with a space.By default, this command is unbound.File: gdb.info, Node: Commands For Killing, Next: Numeric Arguments, Prev: Commands For Text, Up: Bindable Readline Commands27.4.4 Killing And Yanking--------------------------`kill-line (C-k)'Kill the text from point to the end of the line.`backward-kill-line (C-x Rubout)'Kill backward to the beginning of the line.`unix-line-discard (C-u)'Kill backward from the cursor to the beginning of the current line.`kill-whole-line ()'Kill all characters on the current line, no matter where point is.By default, this is unbound.`kill-word (M-d)'Kill from point to the end of the current word, or if betweenwords, to the end of the next word. Word boundaries are the sameas `forward-word'.`backward-kill-word (M-<DEL>)'Kill the word behind point. Word boundaries are the same as`backward-word'.`unix-word-rubout (C-w)'Kill the word behind point, using white space as a word boundary.The killed text is saved on the kill-ring.`unix-filename-rubout ()'Kill the word behind point, using white space and the slashcharacter as the word boundaries. The killed text is saved on thekill-ring.`delete-horizontal-space ()'Delete all spaces and tabs around point. By default, this isunbound.`kill-region ()'Kill the text in the current region. By default, this command isunbound.`copy-region-as-kill ()'Copy the text in the region to the kill buffer, so it can be yankedright away. By default, this command is unbound.`copy-backward-word ()'Copy the word before point to the kill buffer. The wordboundaries are the same as `backward-word'. By default, thiscommand is unbound.`copy-forward-word ()'Copy the word following point to the kill buffer. The wordboundaries are the same as `forward-word'. By default, thiscommand is unbound.`yank (C-y)'Yank the top of the kill ring into the buffer at point.`yank-pop (M-y)'Rotate the kill-ring, and yank the new top. You can only do thisif the prior command is `yank' or `yank-pop'.File: gdb.info, Node: Numeric Arguments, Next: Commands For Completion, Prev: Commands For Killing, Up: Bindable Readline Commands27.4.5 Specifying Numeric Arguments-----------------------------------`digit-argument (M-0, M-1, ... M--)'Add this digit to the argument already accumulating, or start a newargument. `M--' starts a negative argument.`universal-argument ()'This is another way to specify an argument. If this command isfollowed by one or more digits, optionally with a leading minussign, those digits define the argument. If the command isfollowed by digits, executing `universal-argument' again ends thenumeric argument, but is otherwise ignored. As a special case, ifthis command is immediately followed by a character that isneither a digit or minus sign, the argument count for the nextcommand is multiplied by four. The argument count is initiallyone, so executing this function the first time makes the argumentcount four, a second time makes the argument count sixteen, and soon. By default, this is not bound to a key.File: gdb.info, Node: Commands For Completion, Next: Keyboard Macros, Prev: Numeric Arguments, Up: Bindable Readline Commands27.4.6 Letting Readline Type For You------------------------------------`complete (<TAB>)'Attempt to perform completion on the text before point. Theactual completion performed is application-specific. The defaultis filename completion.`possible-completions (M-?)'List the possible completions of the text before point.`insert-completions (M-*)'Insert all completions of the text before point that would havebeen generated by `possible-completions'.`menu-complete ()'Similar to `complete', but replaces the word to be completed witha single match from the list of possible completions. Repeatedexecution of `menu-complete' steps through the list of possiblecompletions, inserting each match in turn. At the end of the listof completions, the bell is rung (subject to the setting of`bell-style') and the original text is restored. An argument of Nmoves N positions forward in the list of matches; a negativeargument may be used to move backward through the list. Thiscommand is intended to be bound to <TAB>, but is unbound bydefault.`delete-char-or-list ()'Deletes the character under the cursor if not at the beginning orend of the line (like `delete-char'). If at the end of the line,behaves identically to `possible-completions'. This command isunbound by default.File: gdb.info, Node: Keyboard Macros, Next: Miscellaneous Commands, Prev: Commands For Completion, Up: Bindable Readline Commands27.4.7 Keyboard Macros----------------------`start-kbd-macro (C-x ()'Begin saving the characters typed into the current keyboard macro.`end-kbd-macro (C-x ))'Stop saving the characters typed into the current keyboard macroand save the definition.`call-last-kbd-macro (C-x e)'Re-execute the last keyboard macro defined, by making thecharacters in the macro appear as if typed at the keyboard.File: gdb.info, Node: Miscellaneous Commands, Prev: Keyboard Macros, Up: Bindable Readline Commands27.4.8 Some Miscellaneous Commands----------------------------------`re-read-init-file (C-x C-r)'Read in the contents of the INPUTRC file, and incorporate anybindings or variable assignments found there.`abort (C-g)'Abort the current editing command and ring the terminal's bell(subject to the setting of `bell-style').`do-uppercase-version (M-a, M-b, M-X, ...)'If the metafied character X is lowercase, run the command that isbound to the corresponding uppercase character.`prefix-meta (<ESC>)'Metafy the next character typed. This is for keyboards without ameta key. Typing `<ESC> f' is equivalent to typing `M-f'.`undo (C-_ or C-x C-u)'Incremental undo, separately remembered for each line.`revert-line (M-r)'Undo all changes made to this line. This is like executing the`undo' command enough times to get back to the beginning.`tilde-expand (M-~)'Perform tilde expansion on the current word.`set-mark (C-@)'Set the mark to the point. If a numeric argument is supplied, themark is set to that position.`exchange-point-and-mark (C-x C-x)'Swap the point with the mark. The current cursor position is setto the saved position, and the old cursor position is saved as themark.`character-search (C-])'A character is read and point is moved to the next occurrence ofthat character. A negative count searches for previousoccurrences.`character-search-backward (M-C-])'A character is read and point is moved to the previous occurrenceof that character. A negative count searches for subsequentoccurrences.`insert-comment (M-#)'Without a numeric argument, the value of the `comment-begin'variable is inserted at the beginning of the current line. If anumeric argument is supplied, this command acts as a toggle: ifthe characters at the beginning of the line do not match the valueof `comment-begin', the value is inserted, otherwise thecharacters in `comment-begin' are deleted from the beginning ofthe line. In either case, the line is accepted as if a newlinehad been typed.`dump-functions ()'Print all of the functions and their key bindings to the Readlineoutput stream. If a numeric argument is supplied, the output isformatted in such a way that it can be made part of an INPUTRCfile. This command is unbound by default.`dump-variables ()'Print all of the settable variables and their values to theReadline output stream. If a numeric argument is supplied, theoutput is formatted in such a way that it can be made part of anINPUTRC file. This command is unbound by default.`dump-macros ()'Print all of the Readline key sequences bound to macros and thestrings they output. If a numeric argument is supplied, theoutput is formatted in such a way that it can be made part of anINPUTRC file. This command is unbound by default.`emacs-editing-mode (C-e)'When in `vi' command mode, this causes a switch to `emacs' editingmode.`vi-editing-mode (M-C-j)'When in `emacs' editing mode, this causes a switch to `vi' editingmode.File: gdb.info, Node: Readline vi Mode, Prev: Bindable Readline Commands, Up: Command Line Editing27.5 Readline vi Mode=====================While the Readline library does not have a full set of `vi' editingfunctions, it does contain enough to allow simple editing of the line.The Readline `vi' mode behaves as specified in the POSIX 1003.2standard.In order to switch interactively between `emacs' and `vi' editingmodes, use the command `M-C-j' (bound to emacs-editing-mode when in`vi' mode and to vi-editing-mode in `emacs' mode). The Readlinedefault is `emacs' mode.When you enter a line in `vi' mode, you are already placed in`insertion' mode, as if you had typed an `i'. Pressing <ESC> switchesyou into `command' mode, where you can edit the text of the line withthe standard `vi' movement keys, move to previous history lines with`k' and subsequent lines with `j', and so forth.File: gdb.info, Node: Using History Interactively, Next: Formatting Documentation, Prev: Command Line Editing, Up: Top28 Using History Interactively******************************This chapter describes how to use the GNU History Library interactively,from a user's standpoint. It should be considered a user's guide. Forinformation on using the GNU History Library in other programs, see theGNU Readline Library Manual.* Menu:* History Interaction:: What it feels like using History as a user.File: gdb.info, Node: History Interaction, Up: Using History Interactively28.1 History Expansion======================The History library provides a history expansion feature that is similarto the history expansion provided by `csh'. This section describes thesyntax used to manipulate the history information.History expansions introduce words from the history list into theinput stream, making it easy to repeat commands, insert the argumentsto a previous command into the current input line, or fix errors inprevious commands quickly.History expansion takes place in two parts. The first is todetermine which line from the history list should be used duringsubstitution. The second is to select portions of that line forinclusion into the current one. The line selected from the history iscalled the "event", and the portions of that line that are acted uponare called "words". Various "modifiers" are available to manipulatethe selected words. The line is broken into words in the same fashionthat Bash does, so that several words surrounded by quotes areconsidered one word. History expansions are introduced by theappearance of the history expansion character, which is `!' by default.* Menu:* Event Designators:: How to specify which history line to use.* Word Designators:: Specifying which words are of interest.* Modifiers:: Modifying the results of substitution.File: gdb.info, Node: Event Designators, Next: Word Designators, Up: History Interaction28.1.1 Event Designators------------------------An event designator is a reference to a command line entry in thehistory list.`!'Start a history substitution, except when followed by a space, tab,the end of the line, or `='.`!N'Refer to command line N.`!-N'Refer to the command N lines back.`!!'Refer to the previous command. This is a synonym for `!-1'.`!STRING'Refer to the most recent command starting with STRING.`!?STRING[?]'Refer to the most recent command containing STRING. The trailing`?' may be omitted if the STRING is followed immediately by anewline.`^STRING1^STRING2^'Quick Substitution. Repeat the last command, replacing STRING1with STRING2. Equivalent to `!!:s/STRING1/STRING2/'.`!#'The entire command line typed so far.File: gdb.info, Node: Word Designators, Next: Modifiers, Prev: Event Designators, Up: History Interaction28.1.2 Word Designators-----------------------Word designators are used to select desired words from the event. A`:' separates the event specification from the word designator. It maybe omitted if the word designator begins with a `^', `$', `*', `-', or`%'. Words are numbered from the beginning of the line, with the firstword being denoted by 0 (zero). Words are inserted into the currentline separated by single spaces.For example,`!!'designates the preceding command. When you type this, thepreceding command is repeated in toto.`!!:$'designates the last argument of the preceding command. This may beshortened to `!$'.`!fi:2'designates the second argument of the most recent command startingwith the letters `fi'.Here are the word designators:`0 (zero)'The `0'th word. For many applications, this is the command word.`N'The Nth word.`^'The first argument; that is, word 1.`$'The last argument.`%'The word matched by the most recent `?STRING?' search.`X-Y'A range of words; `-Y' abbreviates `0-Y'.`*'All of the words, except the `0'th. This is a synonym for `1-$'.It is not an error to use `*' if there is just one word in theevent; the empty string is returned in that case.`X*'Abbreviates `X-$'`X-'Abbreviates `X-$' like `X*', but omits the last word.If a word designator is supplied without an event specification, theprevious command is used as the event.File: gdb.info, Node: Modifiers, Prev: Word Designators, Up: History Interaction28.1.3 Modifiers----------------After the optional word designator, you can add a sequence of one ormore of the following modifiers, each preceded by a `:'.`h'Remove a trailing pathname component, leaving only the head.`t'Remove all leading pathname components, leaving the tail.`r'Remove a trailing suffix of the form `.SUFFIX', leaving thebasename.`e'Remove all but the trailing suffix.`p'Print the new command but do not execute it.`s/OLD/NEW/'Substitute NEW for the first occurrence of OLD in the event line.Any delimiter may be used in place of `/'. The delimiter may bequoted in OLD and NEW with a single backslash. If `&' appears inNEW, it is replaced by OLD. A single backslash will quote the`&'. The final delimiter is optional if it is the last characteron the input line.`&'Repeat the previous substitution.`g'`a'Cause changes to be applied over the entire event line. Used inconjunction with `s', as in `gs/OLD/NEW/', or with `&'.`G'Apply the following `s' modifier once to each word in the event.File: gdb.info, Node: Formatting Documentation, Next: Installing GDB, Prev: Using History Interactively, Up: TopAppendix A Formatting Documentation***********************************The GDB 4 release includes an already-formatted reference card, readyfor printing with PostScript or Ghostscript, in the `gdb' subdirectoryof the main source directory(1). If you can use PostScript orGhostscript with your printer, you can print the reference cardimmediately with `refcard.ps'.The release also includes the source for the reference card. Youcan format it, using TeX, by typing:make refcard.dviThe GDB reference card is designed to print in "landscape" mode onUS "letter" size paper; that is, on a sheet 11 inches wide by 8.5 incheshigh. You will need to specify this form of printing as an option toyour DVI output program.All the documentation for GDB comes as part of the machine-readabledistribution. The documentation is written in Texinfo format, which isa documentation system that uses a single source file to produce bothon-line information and a printed manual. You can use one of the Infoformatting commands to create the on-line version of the documentationand TeX (or `texi2roff') to typeset the printed version.GDB includes an already formatted copy of the on-line Info versionof this manual in the `gdb' subdirectory. The main Info file is`gdb-6.8/gdb/gdb.info', and it refers to subordinate files matching`gdb.info*' in the same directory. If necessary, you can print outthese files, or read them with any editor; but they are easier to readusing the `info' subsystem in GNU Emacs or the standalone `info'program, available as part of the GNU Texinfo distribution.If you want to format these Info files yourself, you need one of theInfo formatting programs, such as `texinfo-format-buffer' or `makeinfo'.If you have `makeinfo' installed, and are in the top level GDBsource directory (`gdb-6.8', in the case of version 6.8), you can makethe Info file by typing:cd gdbmake gdb.infoIf you want to typeset and print copies of this manual, you need TeX,a program to print its DVI output files, and `texinfo.tex', the Texinfodefinitions file.TeX is a typesetting program; it does not print files directly, butproduces output files called DVI files. To print a typeset document,you need a program to print DVI files. If your system has TeXinstalled, chances are it has such a program. The precise command touse depends on your system; `lpr -d' is common; another (for PostScriptdevices) is `dvips'. The DVI print command may require a file namewithout any extension or a `.dvi' extension.TeX also requires a macro definitions file called `texinfo.tex'.This file tells TeX how to typeset a document written in Texinfoformat. On its own, TeX cannot either read or typeset a Texinfo file.`texinfo.tex' is distributed with GDB and is located in the`gdb-VERSION-NUMBER/texinfo' directory.If you have TeX and a DVI printer program installed, you can typesetand print this manual. First switch to the `gdb' subdirectory of themain source directory (for example, to `gdb-6.8/gdb') and type:make gdb.dviThen give `gdb.dvi' to your DVI printing program.---------- Footnotes ----------(1) In `gdb-6.8/gdb/refcard.ps' of the version 6.8 release.File: gdb.info, Node: Installing GDB, Next: Maintenance Commands, Prev: Formatting Documentation, Up: TopAppendix B Installing GDB************************** Menu:* Requirements:: Requirements for building GDB* Running Configure:: Invoking the GDB `configure' script* Separate Objdir:: Compiling GDB in another directory* Config Names:: Specifying names for hosts and targets* Configure Options:: Summary of options for configureFile: gdb.info, Node: Requirements, Next: Running Configure, Up: Installing GDBB.1 Requirements for Building GDB=================================Building GDB requires various tools and packages to be available.Other packages will be used only if they are found.Tools/Packages Necessary for Building GDB=========================================ISO C90 compilerGDB is written in ISO C90. It should be buildable with anyworking C90 compiler, e.g. GCC.Tools/Packages Optional for Building GDB========================================ExpatGDB can use the Expat XML parsing library. This library may beincluded with your operating system distribution; if it is not, youcan get the latest version from `http://expat.sourceforge.net'.The `configure' script will search for this library in severalstandard locations; if it is installed in an unusual path, you canuse the `--with-libexpat-prefix' option to specify its location.Expat is used for:* Remote protocol memory maps (*note Memory Map Format::)* Target descriptions (*note Target Descriptions::)* Remote shared library lists (*note Library List Format::)* MS-Windows shared libraries (*note Shared Libraries::)File: gdb.info, Node: Running Configure, Next: Separate Objdir, Prev: Requirements, Up: Installing GDBB.2 Invoking the GDB `configure' Script=======================================GDB comes with a `configure' script that automates the process ofpreparing GDB for installation; you can then use `make' to build the`gdb' program.The GDB distribution includes all the source code you need for GDBin a single directory, whose name is usually composed by appending theversion number to `gdb'.For example, the GDB version 6.8 distribution is in the `gdb-6.8'directory. That directory contains:`gdb-6.8/configure (and supporting files)'script for configuring GDB and all its supporting libraries`gdb-6.8/gdb'the source specific to GDB itself`gdb-6.8/bfd'source for the Binary File Descriptor library`gdb-6.8/include'GNU include files`gdb-6.8/libiberty'source for the `-liberty' free software library`gdb-6.8/opcodes'source for the library of opcode tables and disassemblers`gdb-6.8/readline'source for the GNU command-line interface`gdb-6.8/glob'source for the GNU filename pattern-matching subroutine`gdb-6.8/mmalloc'source for the GNU memory-mapped malloc packageThe simplest way to configure and build GDB is to run `configure'from the `gdb-VERSION-NUMBER' source directory, which in this exampleis the `gdb-6.8' directory.First switch to the `gdb-VERSION-NUMBER' source directory if you arenot already in it; then run `configure'. Pass the identifier for theplatform on which GDB will run as an argument.For example:cd gdb-6.8./configure HOSTmakewhere HOST is an identifier such as `sun4' or `decstation', thatidentifies the platform where GDB will run. (You can often leave offHOST; `configure' tries to guess the correct value by examining yoursystem.)Running `configure HOST' and then running `make' builds the `bfd',`readline', `mmalloc', and `libiberty' libraries, then `gdb' itself.The configured source files, and the binaries, are left in thecorresponding source directories.`configure' is a Bourne-shell (`/bin/sh') script; if your systemdoes not recognize this automatically when you run a different shell,you may need to run `sh' on it explicitly:sh configure HOSTIf you run `configure' from a directory that contains sourcedirectories for multiple libraries or programs, such as the `gdb-6.8'source directory for version 6.8, `configure' creates configurationfiles for every directory level underneath (unless you tell it not to,with the `--norecursion' option).You should run the `configure' script from the top directory in thesource tree, the `gdb-VERSION-NUMBER' directory. If you run`configure' from one of the subdirectories, you will configure onlythat subdirectory. That is usually not what you want. In particular,if you run the first `configure' from the `gdb' subdirectory of the`gdb-VERSION-NUMBER' directory, you will omit the configuration of`bfd', `readline', and other sibling directories of the `gdb'subdirectory. This leads to build errors about missing include filessuch as `bfd/bfd.h'.You can install `gdb' anywhere; it has no hardwired paths. However,you should make sure that the shell on your path (named by the `SHELL'environment variable) is publicly readable. Remember that GDB uses theshell to start your program--some systems refuse to let GDB debug childprocesses whose programs are not readable.File: gdb.info, Node: Separate Objdir, Next: Config Names, Prev: Running Configure, Up: Installing GDBB.3 Compiling GDB in Another Directory======================================If you want to run GDB versions for several host or target machines,you need a different `gdb' compiled for each combination of host andtarget. `configure' is designed to make this easy by allowing you togenerate each configuration in a separate subdirectory, rather than inthe source directory. If your `make' program handles the `VPATH'feature (GNU `make' does), running `make' in each of these directoriesbuilds the `gdb' program specified there.To build `gdb' in a separate directory, run `configure' with the`--srcdir' option to specify where to find the source. (You also needto specify a path to find `configure' itself from your workingdirectory. If the path to `configure' would be the same as theargument to `--srcdir', you can leave out the `--srcdir' option; it isassumed.)For example, with version 6.8, you can build GDB in a separatedirectory for a Sun 4 like this:cd gdb-6.8mkdir ../gdb-sun4cd ../gdb-sun4../gdb-6.8/configure sun4makeWhen `configure' builds a configuration using a remote sourcedirectory, it creates a tree for the binaries with the same structure(and using the same names) as the tree under the source directory. Inthe example, you'd find the Sun 4 library `libiberty.a' in thedirectory `gdb-sun4/libiberty', and GDB itself in `gdb-sun4/gdb'.Make sure that your path to the `configure' script has just oneinstance of `gdb' in it. If your path to `configure' looks like`../gdb-6.8/gdb/configure', you are configuring only one subdirectoryof GDB, not the whole package. This leads to build errors aboutmissing include files such as `bfd/bfd.h'.One popular reason to build several GDB configurations in separatedirectories is to configure GDB for cross-compiling (where GDB runs onone machine--the "host"--while debugging programs that run on anothermachine--the "target"). You specify a cross-debugging target by givingthe `--target=TARGET' option to `configure'.When you run `make' to build a program or library, you must run itin a configured directory--whatever directory you were in when youcalled `configure' (or one of its subdirectories).The `Makefile' that `configure' generates in each source directoryalso runs recursively. If you type `make' in a source directory suchas `gdb-6.8' (or in a separate configured directory configured with`--srcdir=DIRNAME/gdb-6.8'), you will build all the required libraries,and then build GDB.When you have multiple hosts or targets configured in separatedirectories, you can run `make' on them in parallel (for example, ifthey are NFS-mounted on each of the hosts); they will not interferewith each other.File: gdb.info, Node: Config Names, Next: Configure Options, Prev: Separate Objdir, Up: Installing GDBB.4 Specifying Names for Hosts and Targets==========================================The specifications used for hosts and targets in the `configure' scriptare based on a three-part naming scheme, but some short predefinedaliases are also supported. The full naming scheme encodes three piecesof information in the following pattern:ARCHITECTURE-VENDOR-OSFor example, you can use the alias `sun4' as a HOST argument, or asthe value for TARGET in a `--target=TARGET' option. The equivalentfull name is `sparc-sun-sunos4'.The `configure' script accompanying GDB does not provide any queryfacility to list all supported host and target names or aliases.`configure' calls the Bourne shell script `config.sub' to mapabbreviations to full names; you can read the script, if you wish, oryou can use it to test your guesses on abbreviations--for example:% sh config.sub i386-linuxi386-pc-linux-gnu% sh config.sub alpha-linuxalpha-unknown-linux-gnu% sh config.sub hp9k700hppa1.1-hp-hpux% sh config.sub sun4sparc-sun-sunos4.1.1% sh config.sub sun3m68k-sun-sunos4.1.1% sh config.sub i986vInvalid configuration `i986v': machine `i986v' not recognized`config.sub' is also distributed in the GDB source directory(`gdb-6.8', for version 6.8).File: gdb.info, Node: Configure Options, Prev: Config Names, Up: Installing GDBB.5 `configure' Options=======================Here is a summary of the `configure' options and arguments that aremost often useful for building GDB. `configure' also has several otheroptions not listed here. *note (configure.info)What Configure Does::,for a full explanation of `configure'.configure [--help][--prefix=DIR][--exec-prefix=DIR][--srcdir=DIRNAME][--norecursion] [--rm][--target=TARGET]HOSTYou may introduce options with a single `-' rather than `--' if youprefer; but you may abbreviate option names if you use `--'.`--help'Display a quick summary of how to invoke `configure'.`--prefix=DIR'Configure the source to install programs and files under directory`DIR'.`--exec-prefix=DIR'Configure the source to install programs under directory `DIR'.`--srcdir=DIRNAME'*Warning: using this option requires GNU `make', or another `make'that implements the `VPATH' feature.*Use this option to make configurations in directories separatefrom the GDB source directories. Among other things, you can usethis to build (or maintain) several configurations simultaneously,in separate directories. `configure' writesconfiguration-specific files in the current directory, butarranges for them to use the source in the directory DIRNAME.`configure' creates directories under the working directory inparallel to the source directories below DIRNAME.`--norecursion'Configure only the directory level where `configure' is executed;do not propagate configuration to subdirectories.`--target=TARGET'Configure GDB for cross-debugging programs running on the specifiedTARGET. Without this option, GDB is configured to debug programsthat run on the same machine (HOST) as GDB itself.There is no convenient way to generate a list of all availabletargets.`HOST ...'Configure GDB to run on the specified HOST.There is no convenient way to generate a list of all availablehosts.There are many other options available as well, but they aregenerally needed for special purposes only.File: gdb.info, Node: Maintenance Commands, Next: Remote Protocol, Prev: Installing GDB, Up: TopAppendix C Maintenance Commands*******************************In addition to commands intended for GDB users, GDB includes a numberof commands intended for GDB developers, that are not documentedelsewhere in this manual. These commands are provided here forreference. (For commands that turn on debugging messages, see *NoteDebugging Output::.)`maint agent EXPRESSION'Translate the given EXPRESSION into remote agent bytecodes. Thiscommand is useful for debugging the Agent Expression mechanism(*note Agent Expressions::).`maint info breakpoints'Using the same format as `info breakpoints', display both thebreakpoints you've set explicitly, and those GDB is using forinternal purposes. Internal breakpoints are shown with negativebreakpoint numbers. The type column identifies what kind ofbreakpoint is shown:`breakpoint'Normal, explicitly set breakpoint.`watchpoint'Normal, explicitly set watchpoint.`longjmp'Internal breakpoint, used to handle correctly stepping through`longjmp' calls.`longjmp resume'Internal breakpoint at the target of a `longjmp'.`until'Temporary internal breakpoint used by the GDB `until' command.`finish'Temporary internal breakpoint used by the GDB `finish'command.`shlib events'Shared library events.`maint check-symtabs'Check the consistency of psymtabs and symtabs.`maint cplus first_component NAME'Print the first C++ class/namespace component of NAME.`maint cplus namespace'Print the list of possible C++ namespaces.`maint demangle NAME'Demangle a C++ or Objective-C mangled NAME.`maint deprecate COMMAND [REPLACEMENT]'`maint undeprecate COMMAND'Deprecate or undeprecate the named COMMAND. Deprecated commandscause GDB to issue a warning when you use them. The optionalargument REPLACEMENT says which newer command should be used infavor of the deprecated one; if it is given, GDB will mention thereplacement as part of the warning.`maint dump-me'Cause a fatal signal in the debugger and force it to dump its core.This is supported only on systems which support aborting a programwith the `SIGQUIT' signal.`maint internal-error [MESSAGE-TEXT]'`maint internal-warning [MESSAGE-TEXT]'Cause GDB to call the internal function `internal_error' or`internal_warning' and hence behave as though an internal error orinternal warning has been detected. In addition to reporting theinternal problem, these functions give the user the opportunity toeither quit GDB or create a core file of the current GDB session.These commands take an optional parameter MESSAGE-TEXT that isused as the text of the error or warning message.Here's an example of using `internal-error':(gdb) maint internal-error testing, 1, 2.../maint.c:121: internal-error: testing, 1, 2A problem internal to GDB has been detected. Furtherdebugging may prove unreliable.Quit this debugging session? (y or n) nCreate a core file? (y or n) n(gdb)`maint packet TEXT'If GDB is talking to an inferior via the serial protocol, thenthis command sends the string TEXT to the inferior, and displaysthe response packet. GDB supplies the initial `$' character, theterminating `#' character, and the checksum.`maint print architecture [FILE]'Print the entire architecture configuration. The optional argumentFILE names the file where the output goes.`maint print c-tdesc'Print the current target description (*note Target Descriptions::)as a C source file. The created source file can be used in GDBwhen an XML parser is not available to parse the description.`maint print dummy-frames'Prints the contents of GDB's internal dummy-frame stack.(gdb) b add...(gdb) print add(2,3)Breakpoint 2, add (a=2, b=3) at ...58 return (a + b);The program being debugged stopped while in a function called from GDB....(gdb) maint print dummy-frames0x1a57c80: pc=0x01014068 fp=0x0200bddc sp=0x0200bdd6top=0x0200bdd4 id={stack=0x200bddc,code=0x101405c}call_lo=0x01014000 call_hi=0x01014001(gdb)Takes an optional file parameter.`maint print registers [FILE]'`maint print raw-registers [FILE]'`maint print cooked-registers [FILE]'`maint print register-groups [FILE]'Print GDB's internal register data structures.The command `maint print raw-registers' includes the contents ofthe raw register cache; the command `maint print cooked-registers'includes the (cooked) value of all registers; and the command`maint print register-groups' includes the groups that eachregister is a member of. *Note Registers: (gdbint)Registers.These commands take an optional parameter, a file name to which towrite the information.`maint print reggroups [FILE]'Print GDB's internal register group data structures. The optionalargument FILE tells to what file to write the information.The register groups info looks like this:(gdb) maint print reggroupsGroup Typegeneral userfloat userall uservector usersystem usersave internalrestore internal`flushregs'This command forces GDB to flush its internal register cache.`maint print objfiles'Print a dump of all known object files. For each object file, thiscommand prints its name, address in memory, and all of its psymtabsand symtabs.`maint print statistics'This command prints, for each object file in the program, variousdata about that object file followed by the byte cache ("bcache")statistics for the object file. The objfile data includes thenumber of minimal, partial, full, and stabs symbols, the number oftypes defined by the objfile, the number of as yet unexpanded psymtables, the number of line tables and string tables, and theamount of memory used by the various tables. The bcachestatistics include the counts, sizes, and counts of duplicates ofall and unique objects, max, average, and median entry size, totalmemory used and its overhead and savings, and various measures ofthe hash table size and chain lengths.`maint print target-stack'A "target" is an interface between the debugger and a particularkind of file or process. Targets can be stacked in "strata", sothat more than one target can potentially respond to a request.In particular, memory accesses will walk down the stack of targetsuntil they find a target that is interested in handling thatparticular address.This command prints a short description of each layer that waspushed on the "target stack", starting from the top layer down tothe bottom one.`maint print type EXPR'Print the type chain for a type specified by EXPR. The argumentcan be either a type name or a symbol. If it is a symbol, thetype of that symbol is described. The type chain produced by thiscommand is a recursive definition of the data type as stored inGDB's data structures, including its flags and contained types.`maint set dwarf2 max-cache-age'`maint show dwarf2 max-cache-age'Control the DWARF 2 compilation unit cache.In object files with inter-compilation-unit references, such asthose produced by the GCC option `-feliminate-dwarf2-dups', theDWARF 2 reader needs to frequently refer to previously readcompilation units. This setting controls how long a compilationunit will remain in the cache if it is not referenced. A higherlimit means that cached compilation units will be stored in memorylonger, and more total memory will be used. Setting it to zerodisables caching, which will slow down GDB startup, but reducememory consumption.`maint set profile'`maint show profile'Control profiling of GDB.Profiling will be disabled until you use the `maint set profile'command to enable it. When you enable profiling, the system willbegin collecting timing and execution count data; when you disableprofiling or exit GDB, the results will be written to a log file.Remember that if you use profiling, GDB will overwrite theprofiling log file (often called `gmon.out'). If you have arecord of important profiling data in a `gmon.out' file, be sureto move it to a safe location.Configuring with `--enable-profiling' arranges for GDB to becompiled with the `-pg' compiler option.`maint show-debug-regs'Control whether to show variables that mirror the x86 hardwaredebug registers. Use `ON' to enable, `OFF' to disable. Ifenabled, the debug registers values are shown when GDB inserts orremoves a hardware breakpoint or watchpoint, and when the inferiortriggers a hardware-assisted breakpoint or watchpoint.`maint space'Control whether to display memory usage for each command. If setto a nonzero value, GDB will display how much memory each commandtook, following the command's own output. This can also berequested by invoking GDB with the `--statistics' command-lineswitch (*note Mode Options::).`maint time'Control whether to display the execution time for each command. Ifset to a nonzero value, GDB will display how much time it took toexecute each command, following the command's own output. Thiscan also be requested by invoking GDB with the `--statistics'command-line switch (*note Mode Options::).`maint translate-address [SECTION] ADDR'Find the symbol stored at the location specified by the addressADDR and an optional section name SECTION. If found, GDB printsthe name of the closest symbol and an offset from the symbol'slocation to the specified address. This is similar to the `infoaddress' command (*note Symbols::), except that this command alsoallows to find symbols in other sections.The following command is useful for non-interactive invocations ofGDB, such as in the test suite.`set watchdog NSEC'Set the maximum number of seconds GDB will wait for the targetoperation to finish. If this time expires, GDB reports and errorand the command is aborted.`show watchdog'Show the current setting of the target wait timeout.File: gdb.info, Node: Remote Protocol, Next: Agent Expressions, Prev: Maintenance Commands, Up: TopAppendix D GDB Remote Serial Protocol************************************** Menu:* Overview::* Packets::* Stop Reply Packets::* General Query Packets::* Register Packet Format::* Tracepoint Packets::* Host I/O Packets::* Interrupts::* Examples::* File-I/O Remote Protocol Extension::* Library List Format::* Memory Map Format::File: gdb.info, Node: Overview, Next: Packets, Up: Remote ProtocolD.1 Overview============There may be occasions when you need to know something about theprotocol--for example, if there is only one serial port to your targetmachine, you might want your program to do something special if itrecognizes a packet meant for GDB.In the examples below, `->' and `<-' are used to indicatetransmitted and received data, respectively.All GDB commands and responses (other than acknowledgments) are sentas a PACKET. A PACKET is introduced with the character `$', the actualPACKET-DATA, and the terminating character `#' followed by a two-digitCHECKSUM:`$'PACKET-DATA`#'CHECKSUMThe two-digit CHECKSUM is computed as the modulo 256 sum of allcharacters between the leading `$' and the trailing `#' (an eight bitunsigned checksum).Implementors should note that prior to GDB 5.0 the protocolspecification also included an optional two-digit SEQUENCE-ID:`$'SEQUENCE-ID`:'PACKET-DATA`#'CHECKSUMThat SEQUENCE-ID was appended to the acknowledgment. GDB has neveroutput SEQUENCE-IDs. Stubs that handle packets added since GDB 5.0must not accept SEQUENCE-ID.When either the host or the target machine receives a packet, thefirst response expected is an acknowledgment: either `+' (to indicatethe package was received correctly) or `-' (to request retransmission):-> `$'PACKET-DATA`#'CHECKSUM<- `+'The host (GDB) sends COMMANDs, and the target (the debugging stubincorporated in your program) sends a RESPONSE. In the case of stepand continue COMMANDs, the response is only sent when the operation hascompleted (the target has again stopped).PACKET-DATA consists of a sequence of characters with the exceptionof `#' and `$' (see `X' packet for additional exceptions).Fields within the packet should be separated using `,' `;' or `:'.Except where otherwise noted all numbers are represented in HEX withleading zeros suppressed.Implementors should note that prior to GDB 5.0, the character `:'could not appear as the third character in a packet (as it wouldpotentially conflict with the SEQUENCE-ID).Binary data in most packets is encoded either as two hexadecimaldigits per byte of binary data. This allowed the traditional remoteprotocol to work over connections which were only seven-bit clean.Some packets designed more recently assume an eight-bit cleanconnection, and use a more efficient encoding to send and receivebinary data.The binary data representation uses `7d' (ASCII `}') as an escapecharacter. Any escaped byte is transmitted as the escape characterfollowed by the original character XORed with `0x20'. For example, thebyte `0x7d' would be transmitted as the two bytes `0x7d 0x5d'. Thebytes `0x23' (ASCII `#'), `0x24' (ASCII `$'), and `0x7d' (ASCII `}')must always be escaped. Responses sent by the stub must also escape`0x2a' (ASCII `*'), so that it is not interpreted as the start of arun-length encoded sequence (described next).Response DATA can be run-length encoded to save space. Run-lengthencoding replaces runs of identical characters with one instance of therepeated character, followed by a `*' and a repeat count. The repeatcount is itself sent encoded, to avoid binary characters in DATA: avalue of N is sent as `N+29'. For a repeat count greater or equal to3, this produces a printable ASCII character, e.g. a space (ASCII code32) for a repeat count of 3. (This is because run-length encodingstarts to win for counts 3 or more.) Thus, for example, `0* ' is arun-length encoding of "0000": the space character after `*' meansrepeat the leading `0' `32 - 29 = 3' more times.The printable characters `#' and `$' or with a numeric value greaterthan 126 must not be used. Runs of six repeats (`#') or seven repeats(`$') can be expanded using a repeat count of only five (`"'). Forexample, `00000000' can be encoded as `0*"00'.The error response returned for some packets includes a two charactererror number. That number is not well defined.For any COMMAND not supported by the stub, an empty response(`$#00') should be returned. That way it is possible to extend theprotocol. A newer GDB can tell if a packet is supported based on thatresponse.A stub is required to support the `g', `G', `m', `M', `c', and `s'COMMANDs. All other COMMANDs are optional.File: gdb.info, Node: Packets, Next: Stop Reply Packets, Prev: Overview, Up: Remote ProtocolD.2 Packets===========The following table provides a complete list of all currently definedCOMMANDs and their corresponding response DATA. *Note File-I/O RemoteProtocol Extension::, for details about the File I/O extension of theremote protocol.Each packet's description has a template showing the packet's overallsyntax, followed by an explanation of the packet's meaning. We includespaces in some of the templates for clarity; these are not part of thepacket's syntax. No GDB packet uses spaces to separate its components.For example, a template like `foo BAR BAZ' describes a packetbeginning with the three ASCII bytes `foo', followed by a BAR, followeddirectly by a BAZ. GDB does not transmit a space character between the`foo' and the BAR, or between the BAR and the BAZ.Note that all packet forms beginning with an upper- or lower-caseletter, other than those described here, are reserved for future use.Here are the packet descriptions.`!'Enable extended mode. In extended mode, the remote server is madepersistent. The `R' packet is used to restart the program beingdebugged.Reply:`OK'The remote target both supports and has enabled extended mode.`?'Indicate the reason the target halted. The reply is the same asfor step and continue.Reply: *Note Stop Reply Packets::, for the reply specifications.`A ARGLEN,ARGNUM,ARG,...'Initialized `argv[]' array passed into program. ARGLEN specifiesthe number of bytes in the hex encoded byte stream ARG. See`gdbserver' for more details.Reply:`OK'The arguments were set.`E NN'An error occurred.`b BAUD'(Don't use this packet; its behavior is not well-defined.) Changethe serial line speed to BAUD.JTC: _When does the transport layer state change? When it'sreceived, or after the ACK is transmitted. In either case, thereare problems if the command or the acknowledgment packet isdropped._Stan: _If people really wanted to add something like this, and getit working for the first time, they ought to modify ser-unix.c tosend some kind of out-of-band message to a specially-setup stuband have the switch happen "in between" packets, so that fromremote protocol's point of view, nothing actually happened._`B ADDR,MODE'Set (MODE is `S') or clear (MODE is `C') a breakpoint at ADDR.Don't use this packet. Use the `Z' and `z' packets instead (*noteinsert breakpoint or watchpoint packet::).`c [ADDR]'Continue. ADDR is address to resume. If ADDR is omitted, resumeat current address.Reply: *Note Stop Reply Packets::, for the reply specifications.`C SIG[;ADDR]'Continue with signal SIG (hex signal number). If `;ADDR' isomitted, resume at same address.Reply: *Note Stop Reply Packets::, for the reply specifications.`d'Toggle debug flag.Don't use this packet; instead, define a general set packet (*noteGeneral Query Packets::).`D'Detach GDB from the remote system. Sent to the remote targetbefore GDB disconnects via the `detach' command.Reply:`OK'for success`E NN'for an error`F RC,EE,CF;XX'A reply from GDB to an `F' packet sent by the target. This ispart of the File-I/O protocol extension. *Note File-I/O RemoteProtocol Extension::, for the specification.`g'Read general registers.Reply:`XX...'Each byte of register data is described by two hex digits.The bytes with the register are transmitted in target byteorder. The size of each register and their position withinthe `g' packet are determined by the GDB internal gdbarchfunctions `DEPRECATED_REGISTER_RAW_SIZE' and`gdbarch_register_name'. The specification of severalstandard `g' packets is specified below.`E NN'for an error.`G XX...'Write general registers. *Note read registers packet::, for adescription of the XX... data.Reply:`OK'for success`E NN'for an error`H C T'Set thread for subsequent operations (`m', `M', `g', `G', et.al.).C depends on the operation to be performed: it should be `c' forstep and continue operations, `g' for other operations. Thethread designator T may be `-1', meaning all the threads, a threadnumber, or `0' which means pick any thread.Reply:`OK'for success`E NN'for an error`i [ADDR[,NNN]]'Step the remote target by a single clock cycle. If `,NNN' ispresent, cycle step NNN cycles. If ADDR is present, cycle stepstarting at that address.`I'Signal, then cycle step. *Note step with signal packet::. *Notecycle step packet::.`k'Kill request.FIXME: _There is no description of how to operate when a specificthread context has been selected (i.e. does 'k' kill only thatthread?)_.`m ADDR,LENGTH'Read LENGTH bytes of memory starting at address ADDR. Note thatADDR may not be aligned to any particular boundary.The stub need not use any particular size or alignment whengathering data from memory for the response; even if ADDR isword-aligned and LENGTH is a multiple of the word size, the stubis free to use byte accesses, or not. For this reason, thispacket may not be suitable for accessing memory-mapped I/O devices.Reply:`XX...'Memory contents; each byte is transmitted as a two-digithexadecimal number. The reply may contain fewer bytes thanrequested if the server was able to read only part of theregion of memory.`E NN'NN is errno`M ADDR,LENGTH:XX...'Write LENGTH bytes of memory starting at address ADDR. XX... isthe data; each byte is transmitted as a two-digit hexadecimalnumber.Reply:`OK'for success`E NN'for an error (this includes the case where only part of thedata was written).`p N'Read the value of register N; N is in hex. *Note read registerspacket::, for a description of how the returned register value isencoded.Reply:`XX...'the register's value`E NN'for an error`'Indicating an unrecognized QUERY.`P N...=R...'Write register N... with value R.... The register number N is inhexadecimal, and R... contains two hex digits for each byte in theregister (target byte order).Reply:`OK'for success`E NN'for an error`q NAME PARAMS...'`Q NAME PARAMS...'General query (`q') and set (`Q'). These packets are describedfully in *Note General Query Packets::.`r'Reset the entire system.Don't use this packet; use the `R' packet instead.`R XX'Restart the program being debugged. XX, while needed, is ignored.This packet is only available in extended mode (*note extendedmode::).The `R' packet has no reply.`s [ADDR]'Single step. ADDR is the address at which to resume. If ADDR isomitted, resume at same address.Reply: *Note Stop Reply Packets::, for the reply specifications.`S SIG[;ADDR]'Step with signal. This is analogous to the `C' packet, butrequests a single-step, rather than a normal resumption ofexecution.Reply: *Note Stop Reply Packets::, for the reply specifications.`t ADDR:PP,MM'Search backwards starting at address ADDR for a match with patternPP and mask MM. PP and MM are 4 bytes. ADDR must be at least 3digits.`T XX'Find out if the thread XX is alive.Reply:`OK'thread is still alive`E NN'thread is dead`v'Packets starting with `v' are identified by a multi-letter name,up to the first `;' or `?' (or the end of the packet).`vAttach;PID'Attach to a new process with the specified process ID. PID is ahexadecimal integer identifying the process. The attached processis stopped.This packet is only available in extended mode (*note extendedmode::).Reply:`E NN'for an error`Any stop packet'for success (*note Stop Reply Packets::)`vCont[;ACTION[:TID]]...'Resume the inferior, specifying different actions for each thread.If an action is specified with no TID, then it is applied to anythreads that don't have a specific action specified; if no defaultaction is specified then other threads should remain stopped.Specifying multiple default actions is an error; specifying noactions is also an error. Thread IDs are specified inhexadecimal. Currently supported actions are:`c'Continue.`C SIG'Continue with signal SIG. SIG should be two hex digits.`s'Step.`S SIG'Step with signal SIG. SIG should be two hex digits.The optional ADDR argument normally associated with these packetsis not supported in `vCont'.Reply: *Note Stop Reply Packets::, for the reply specifications.`vCont?'Request a list of actions supported by the `vCont' packet.Reply:`vCont[;ACTION...]'The `vCont' packet is supported. Each ACTION is a supportedcommand in the `vCont' packet.`'The `vCont' packet is not supported.`vFile:OPERATION:PARAMETER...'Perform a file operation on the target system. For details, see*Note Host I/O Packets::.`vFlashErase:ADDR,LENGTH'Direct the stub to erase LENGTH bytes of flash starting at ADDR.The region may enclose any number of flash blocks, but its startand end must fall on block boundaries, as indicated by the flashblock size appearing in the memory map (*note Memory MapFormat::). GDB groups flash memory programming operationstogether, and sends a `vFlashDone' request after each group; thestub is allowed to delay erase operation until the `vFlashDone'packet is received.Reply:`OK'for success`E NN'for an error`vFlashWrite:ADDR:XX...'Direct the stub to write data to flash address ADDR. The data ispassed in binary form using the same encoding as for the `X'packet (*note Binary Data::). The memory ranges specified by`vFlashWrite' packets preceding a `vFlashDone' packet must notoverlap, and must appear in order of increasing addresses(although `vFlashErase' packets for higher addresses may alreadyhave been received; the ordering is guaranteed only between`vFlashWrite' packets). If a packet writes to an address that wasneither erased by a preceding `vFlashErase' packet nor by someother target-specific method, the results are unpredictable.Reply:`OK'for success`E.memtype'for vFlashWrite addressing non-flash memory`E NN'for an error`vFlashDone'Indicate to the stub that flash programming operation is finished.The stub is permitted to delay or batch the effects of a group of`vFlashErase' and `vFlashWrite' packets until a `vFlashDone'packet is received. The contents of the affected regions of flashmemory are unpredictable until the `vFlashDone' request iscompleted.`vRun;FILENAME[;ARGUMENT]...'Run the program FILENAME, passing it each ARGUMENT on its commandline. The file and arguments are hex-encoded strings. IfFILENAME is an empty string, the stub may use a default program(e.g. the last program run). The program is created in the stoppedstate.This packet is only available in extended mode (*note extendedmode::).Reply:`E NN'for an error`Any stop packet'for success (*note Stop Reply Packets::)`X ADDR,LENGTH:XX...'Write data to memory, where the data is transmitted in binary.ADDR is address, LENGTH is number of bytes, `XX...' is binary data(*note Binary Data::).Reply:`OK'for success`E NN'for an error`z TYPE,ADDR,LENGTH'`Z TYPE,ADDR,LENGTH'Insert (`Z') or remove (`z') a TYPE breakpoint or watchpointstarting at address ADDRESS and covering the next LENGTH bytes.Each breakpoint and watchpoint packet TYPE is documentedseparately._Implementation notes: A remote target shall return an empty stringfor an unrecognized breakpoint or watchpoint packet TYPE. Aremote target shall support either both or neither of a given`ZTYPE...' and `zTYPE...' packet pair. To avoid potentialproblems with duplicate packets, the operations should beimplemented in an idempotent way._`z0,ADDR,LENGTH'`Z0,ADDR,LENGTH'Insert (`Z0') or remove (`z0') a memory breakpoint at address ADDRof size LENGTH.A memory breakpoint is implemented by replacing the instruction atADDR with a software breakpoint or trap instruction. The LENGTHis used by targets that indicates the size of the breakpoint (inbytes) that should be inserted (e.g., the ARM and MIPS can inserteither a 2 or 4 byte breakpoint)._Implementation note: It is possible for a target to copy or movecode that contains memory breakpoints (e.g., when implementingoverlays). The behavior of this packet, in the presence of such atarget, is not defined._Reply:`OK'success`'not supported`E NN'for an error`z1,ADDR,LENGTH'`Z1,ADDR,LENGTH'Insert (`Z1') or remove (`z1') a hardware breakpoint at addressADDR of size LENGTH.A hardware breakpoint is implemented using a mechanism that is notdependant on being able to modify the target's memory._Implementation note: A hardware breakpoint is not affected by codemovement._Reply:`OK'success`'not supported`E NN'for an error`z2,ADDR,LENGTH'`Z2,ADDR,LENGTH'Insert (`Z2') or remove (`z2') a write watchpoint.Reply:`OK'success`'not supported`E NN'for an error`z3,ADDR,LENGTH'`Z3,ADDR,LENGTH'Insert (`Z3') or remove (`z3') a read watchpoint.Reply:`OK'success`'not supported`E NN'for an error`z4,ADDR,LENGTH'`Z4,ADDR,LENGTH'Insert (`Z4') or remove (`z4') an access watchpoint.Reply:`OK'success`'not supported`E NN'for an errorFile: gdb.info, Node: Stop Reply Packets, Next: General Query Packets, Prev: Packets, Up: Remote ProtocolD.3 Stop Reply Packets======================The `C', `c', `S', `s' and `?' packets can receive any of the below asa reply. In the case of the `C', `c', `S' and `s' packets, that replyis only returned when the target halts. In the below the exact meaningof "signal number" is defined by the header `include/gdb/signals.h' inthe GDB source code.As in the description of request packets, we include spaces in thereply templates for clarity; these are not part of the reply packet'ssyntax. No GDB stop reply packet uses spaces to separate itscomponents.`S AA'The program received signal number AA (a two-digit hexadecimalnumber). This is equivalent to a `T' response with no N:R pairs.`T AA N1:R1;N2:R2;...'The program received signal number AA (a two-digit hexadecimalnumber). This is equivalent to an `S' response, except that the`N:R' pairs can carry values of important registers and otherinformation directly in the stop reply packet, reducing round-triplatency. Single-step and breakpoint traps are reported this way.Each `N:R' pair is interpreted as follows:* If N is a hexadecimal number, it is a register number, and thecorresponding R gives that register's value. R is a seriesof bytes in target byte order, with each byte given by atwo-digit hex number.* If N is `thread', then R is the thread process ID, in hex.* If N is a recognized "stop reason", it describes a morespecific event that stopped the target. The currentlydefined stop reasons are listed below. AA should be `05',the trap signal. At most one stop reason should be present.* Otherwise, GDB should ignore this `N:R' pair and go on to thenext; this allows us to extend the protocol in the future.The currently defined stop reasons are:`watch'`rwatch'`awatch'The packet indicates a watchpoint hit, and R is the dataaddress, in hex.`library'The packet indicates that the loaded libraries have changed.GDB should use `qXfer:libraries:read' to fetch a new list ofloaded libraries. R is ignored.`W AA'The process exited, and AA is the exit status. This is onlyapplicable to certain targets.`X AA'The process terminated with signal AA.`O XX...'`XX...' is hex encoding of ASCII data, to be written as theprogram's console output. This can happen at any time while theprogram is running and the debugger should continue to wait for`W', `T', etc.`F CALL-ID,PARAMETER...'CALL-ID is the identifier which says which host system call shouldbe called. This is just the name of the function. Translationinto the correct system call is only applicable as it's defined inGDB. *Note File-I/O Remote Protocol Extension::, for a list ofimplemented system calls.`PARAMETER...' is a list of parameters as defined for this verysystem call.The target replies with this packet when it expects GDB to call ahost system call on behalf of the target. GDB replies with anappropriate `F' packet and keeps up waiting for the next replypacket from the target. The latest `C', `c', `S' or `s' action isexpected to be continued. *Note File-I/O Remote ProtocolExtension::, for more details.File: gdb.info, Node: General Query Packets, Next: Register Packet Format, Prev: Stop Reply Packets, Up: Remote ProtocolD.4 General Query Packets=========================Packets starting with `q' are "general query packets"; packets startingwith `Q' are "general set packets". General query and set packets area semi-unified form for retrieving and sending information to and fromthe stub.The initial letter of a query or set packet is followed by a nameindicating what sort of thing the packet applies to. For example, GDBmay use a `qSymbol' packet to exchange symbol definitions with thestub. These packet names follow some conventions:* The name must not contain commas, colons or semicolons.* Most GDB query and set packets have a leading upper case letter.* The names of custom vendor packets should use a company prefix, inlower case, followed by a period. For example, packets designed atthe Acme Corporation might begin with `qacme.foo' (for queryingfoos) or `Qacme.bar' (for setting bars).The name of a query or set packet should be separated from anyparameters by a `:'; the parameters themselves should be separated by`,' or `;'. Stubs must be careful to match the full packet name, andcheck for a separator or the end of the packet, in case two packetnames share a common prefix. New packets should not begin with `qC',`qP', or `qL'(1).Like the descriptions of the other packets, each description herehas a template showing the packet's overall syntax, followed by anexplanation of the packet's meaning. We include spaces in some of thetemplates for clarity; these are not part of the packet's syntax. NoGDB packet uses spaces to separate its components.Here are the currently defined query and set packets:`qC'Return the current thread id.Reply:`QC PID'Where PID is an unsigned hexadecimal process id.`(anything else)'Any other reply implies the old pid.`qCRC:ADDR,LENGTH'Compute the CRC checksum of a block of memory. Reply:`E NN'An error (such as memory fault)`C CRC32'The specified memory region's checksum is CRC32.`qfThreadInfo'`qsThreadInfo'Obtain a list of all active thread ids from the target (OS).Since there may be too many active threads to fit into one replypacket, this query works iteratively: it may require more than onequery/reply sequence to obtain the entire list of threads. Thefirst query of the sequence will be the `qfThreadInfo' query;subsequent queries in the sequence will be the `qsThreadInfo'query.NOTE: This packet replaces the `qL' query (see below).Reply:`m ID'A single thread id`m ID,ID...'a comma-separated list of thread ids`l'(lower case letter `L') denotes end of list.In response to each query, the target will reply with a list ofone or more thread ids, in big-endian unsigned hex, separated bycommas. GDB will respond to each reply with a request for morethread ids (using the `qs' form of the query), until the targetresponds with `l' (lower-case el, for "last").`qGetTLSAddr:THREAD-ID,OFFSET,LM'Fetch the address associated with thread local storage specifiedby THREAD-ID, OFFSET, and LM.THREAD-ID is the (big endian, hex encoded) thread id associatedwith the thread for which to fetch the TLS address.OFFSET is the (big endian, hex encoded) offset associated with thethread local variable. (This offset is obtained from the debuginformation associated with the variable.)LM is the (big endian, hex encoded) OS/ABI-specific encoding of thethe load module associated with the thread local storage. Forexample, a GNU/Linux system will pass the link map address of theshared object associated with the thread local storage underconsideration. Other operating environments may choose torepresent the load module differently, so the precise meaning ofthis parameter will vary.Reply:`XX...'Hex encoded (big endian) bytes representing the address ofthe thread local storage requested.`E NN'An error occurred. NN are hex digits.`'An empty reply indicates that `qGetTLSAddr' is not supportedby the stub.`qL STARTFLAG THREADCOUNT NEXTTHREAD'Obtain thread information from RTOS. Where: STARTFLAG (one hexdigit) is one to indicate the first query and zero to indicate asubsequent query; THREADCOUNT (two hex digits) is the maximumnumber of threads the response packet can contain; and NEXTTHREAD(eight hex digits), for subsequent queries (STARTFLAG is zero), isreturned in the response as ARGTHREAD.Don't use this packet; use the `qfThreadInfo' query instead (seeabove).Reply:`qM COUNT DONE ARGTHREAD THREAD...'Where: COUNT (two hex digits) is the number of threads beingreturned; DONE (one hex digit) is zero to indicate morethreads and one indicates no further threads; ARGTHREADID(eight hex digits) is NEXTTHREAD from the request packet;THREAD... is a sequence of thread IDs from the target.THREADID (eight hex digits). See`remote.c:parse_threadlist_response()'.`qOffsets'Get section offsets that the target used when relocating thedownloaded image.Reply:`Text=XXX;Data=YYY[;Bss=ZZZ]'Relocate the `Text' section by XXX from its original address.Relocate the `Data' section by YYY from its original address.If the object file format provides segment information (e.g.ELF `PT_LOAD' program headers), GDB will relocate entiresegments by the supplied offsets._Note: while a `Bss' offset may be included in the response,GDB ignores this and instead applies the `Data' offset to the`Bss' section._`TextSeg=XXX[;DataSeg=YYY]'Relocate the first segment of the object file, whichconventionally contains program code, to a starting addressof XXX. If `DataSeg' is specified, relocate the secondsegment, which conventionally contains modifiable data, to astarting address of YYY. GDB will report an error if theobject file does not contain segment information, or does notcontain at least as many segments as mentioned in the reply.Extra segments are kept at fixed offsets relative to the lastrelocated segment.`qP MODE THREADID'Returns information on THREADID. Where: MODE is a hex encoded 32bit mode; THREADID is a hex encoded 64 bit thread ID.Don't use this packet; use the `qThreadExtraInfo' query instead(see below).Reply: see `remote.c:remote_unpack_thread_info_response()'.`QPassSignals: SIGNAL [;SIGNAL]...'Each listed SIGNAL should be passed directly to the inferiorprocess. Signals are numbered identically to continue packets andstop replies (*note Stop Reply Packets::). Each SIGNAL list itemshould be strictly greater than the previous item. These signalsdo not need to stop the inferior, or be reported to GDB. Allother signals should be reported to GDB. Multiple `QPassSignals'packets do not combine; any earlier `QPassSignals' list iscompletely replaced by the new list. This packet improvesperformance when using `handle SIGNAL nostop noprint pass'.Reply:`OK'The request succeeded.`E NN'An error occurred. NN are hex digits.`'An empty reply indicates that `QPassSignals' is not supportedby the stub.Use of this packet is controlled by the `set remote pass-signals'command (*note set remote pass-signals: Remote Configuration.).This packet is not probed by default; the remote stub must requestit, by supplying an appropriate `qSupported' response (*noteqSupported::).`qRcmd,COMMAND'COMMAND (hex encoded) is passed to the local interpreter forexecution. Invalid commands should be reported using the outputstring. Before the final result packet, the target may alsorespond with a number of intermediate `OOUTPUT' console outputpackets. _Implementors should note that providing access to astubs's interpreter may have security implications_.Reply:`OK'A command response with no output.`OUTPUT'A command response with the hex encoded output string OUTPUT.`E NN'Indicate a badly formed request.`'An empty reply indicates that `qRcmd' is not recognized.(Note that the `qRcmd' packet's name is separated from the commandby a `,', not a `:', contrary to the naming conventions above.Please don't use this packet as a model for new packets.)`qSupported [:GDBFEATURE [;GDBFEATURE]... ]'Tell the remote stub about features supported by GDB, and querythe stub for features it supports. This packet allows GDB and theremote stub to take advantage of each others' features.`qSupported' also consolidates multiple feature probes at startup,to improve GDB performance--a single larger packet performs betterthan multiple smaller probe packets on high-latency links. Somefeatures may enable behavior which must not be on by default, e.g.because it would confuse older clients or stubs. Other featuresmay describe packets which could be automatically probed for, butare not. These features must be reported before GDB will usethem. This "default unsupported" behavior is not appropriate forall packets, but it helps to keep the initial connection timeunder control with new versions of GDB which support increasingnumbers of packets.Reply:`STUBFEATURE [;STUBFEATURE]...'The stub supports or does not support each returnedSTUBFEATURE, depending on the form of each STUBFEATURE (seebelow for the possible forms).`'An empty reply indicates that `qSupported' is not recognized,or that no features needed to be reported to GDB.The allowed forms for each feature (either a GDBFEATURE in the`qSupported' packet, or a STUBFEATURE in the response) are:`NAME=VALUE'The remote protocol feature NAME is supported, and associatedwith the specified VALUE. The format of VALUE depends on thefeature, but it must not include a semicolon.`NAME+'The remote protocol feature NAME is supported, and does notneed an associated value.`NAME-'The remote protocol feature NAME is not supported.`NAME?'The remote protocol feature NAME may be supported, and GDBshould auto-detect support in some other way when it isneeded. This form will not be used for GDBFEATUREnotifications, but may be used for STUBFEATURE responses.Whenever the stub receives a `qSupported' request, the suppliedset of GDB features should override any previous request. Thisallows GDB to put the stub in a known state, even if the stub hadpreviously been communicating with a different version of GDB.No values of GDBFEATURE (for the packet sent by GDB) are definedyet. Stubs should ignore any unknown values for GDBFEATURE. AnyGDB which sends a `qSupported' packet supports receiving packetsof unlimited length (earlier versions of GDB may reject overlylong responses). Values for GDBFEATURE may be defined in thefuture to let the stub take advantage of new features in GDB, e.g.incompatible improvements in the remote protocol--support forunlimited length responses would be a GDBFEATURE example, if itwere not implied by the `qSupported' query. The stub's replyshould be independent of the GDBFEATURE entries sent by GDB; firstGDB describes all the features it supports, and then the stubreplies with all the features it supports.Similarly, GDB will silently ignore unrecognized stub featureresponses, as long as each response uses one of the standard forms.Some features are flags. A stub which supports a flag featureshould respond with a `+' form response. Other features requirevalues, and the stub should respond with an `=' form response.Each feature has a default value, which GDB will use if`qSupported' is not available or if the feature is not mentionedin the `qSupported' response. The default values are fixed; astub is free to omit any feature responses that match the defaults.Not all features can be probed, but for those which can, theprobing mechanism is useful: in some cases, a stub's internalarchitecture may not allow the protocol layer to know someinformation about the underlying target in advance. This isespecially common in stubs which may be configured for multipletargets.These are the currently defined stub features and their properties:Feature Name Value Default Probe AllowedRequired`PacketSize' Yes `-' No`qXfer:auxv:read' No `-' Yes`qXfer:features:read' No `-' Yes`qXfer:libraries:read' No `-' Yes`qXfer:memory-map:read' No `-' Yes`qXfer:spu:read' No `-' Yes`qXfer:spu:write' No `-' Yes`QPassSignals' No `-' YesThese are the currently defined stub features, in more detail:`PacketSize=BYTES'The remote stub can accept packets up to at least BYTES inlength. GDB will send packets up to this size for bulktransfers, and will never send larger packets. This is alimit on the data characters in the packet, including theframe and checksum. There is no trailing NUL byte in aremote protocol packet; if the stub stores packets in aNUL-terminated format, it should allow an extra byte in itsbuffer for the NUL. If this stub feature is not supported,GDB guesses based on the size of the `g' packet response.`qXfer:auxv:read'The remote stub understands the `qXfer:auxv:read' packet(*note qXfer auxiliary vector read::).`qXfer:features:read'The remote stub understands the `qXfer:features:read' packet(*note qXfer target description read::).`qXfer:libraries:read'The remote stub understands the `qXfer:libraries:read' packet(*note qXfer library list read::).`qXfer:memory-map:read'The remote stub understands the `qXfer:memory-map:read' packet(*note qXfer memory map read::).`qXfer:spu:read'The remote stub understands the `qXfer:spu:read' packet(*note qXfer spu read::).`qXfer:spu:write'The remote stub understands the `qXfer:spu:write' packet(*note qXfer spu write::).`QPassSignals'The remote stub understands the `QPassSignals' packet (*noteQPassSignals::).`qSymbol::'Notify the target that GDB is prepared to serve symbol lookuprequests. Accept requests from the target for the values ofsymbols.Reply:`OK'The target does not need to look up any (more) symbols.`qSymbol:SYM_NAME'The target requests the value of symbol SYM_NAME (hexencoded). GDB may provide the value by using the`qSymbol:SYM_VALUE:SYM_NAME' message, described below.`qSymbol:SYM_VALUE:SYM_NAME'Set the value of SYM_NAME to SYM_VALUE.SYM_NAME (hex encoded) is the name of a symbol whose value thetarget has previously requested.SYM_VALUE (hex) is the value for symbol SYM_NAME. If GDB cannotsupply a value for SYM_NAME, then this field will be empty.Reply:`OK'The target does not need to look up any (more) symbols.`qSymbol:SYM_NAME'The target requests the value of a new symbol SYM_NAME (hexencoded). GDB will continue to supply the values of symbols(if available), until the target ceases to request them.`QTDP'`QTFrame'*Note Tracepoint Packets::.`qThreadExtraInfo,ID'Obtain a printable string description of a thread's attributes fromthe target OS. ID is a thread-id in big-endian hex. This stringmay contain anything that the target OS thinks is interesting forGDB to tell the user about the thread. The string is displayed inGDB's `info threads' display. Some examples of possible threadextra info strings are `Runnable', or `Blocked on Mutex'.Reply:`XX...'Where `XX...' is a hex encoding of ASCII data, comprising theprintable string containing the extra information about thethread's attributes.(Note that the `qThreadExtraInfo' packet's name is separated fromthe command by a `,', not a `:', contrary to the namingconventions above. Please don't use this packet as a model for newpackets.)`QTStart'`QTStop'`QTinit'`QTro'`qTStatus'*Note Tracepoint Packets::.`qXfer:OBJECT:read:ANNEX:OFFSET,LENGTH'Read uninterpreted bytes from the target's special data areaidentified by the keyword OBJECT. Request LENGTH bytes startingat OFFSET bytes into the data. The content and encoding of ANNEXis specific to OBJECT; it can supply additional details about whatdata to access.Here are the specific requests of this form defined so far. All`qXfer:OBJECT:read:...' requests use the same reply formats,listed below.`qXfer:auxv:read::OFFSET,LENGTH'Access the target's "auxiliary vector". *Note auxiliaryvector: OS Information. Note ANNEX must be empty.This packet is not probed by default; the remote stub mustrequest it, by supplying an appropriate `qSupported' response(*note qSupported::).`qXfer:features:read:ANNEX:OFFSET,LENGTH'Access the "target description". *Note TargetDescriptions::. The annex specifies which XML document toaccess. The main description is always loaded from the`target.xml' annex.This packet is not probed by default; the remote stub mustrequest it, by supplying an appropriate `qSupported' response(*note qSupported::).`qXfer:libraries:read:ANNEX:OFFSET,LENGTH'Access the target's list of loaded libraries. *Note LibraryList Format::. The annex part of the generic `qXfer' packetmust be empty (*note qXfer read::).Targets which maintain a list of libraries in the program'smemory do not need to implement this packet; it is designedfor platforms where the operating system manages the list ofloaded libraries.This packet is not probed by default; the remote stub mustrequest it, by supplying an appropriate `qSupported' response(*note qSupported::).`qXfer:memory-map:read::OFFSET,LENGTH'Access the target's "memory-map". *Note Memory Map Format::.The annex part of the generic `qXfer' packet must be empty(*note qXfer read::).This packet is not probed by default; the remote stub mustrequest it, by supplying an appropriate `qSupported' response(*note qSupported::).`qXfer:spu:read:ANNEX:OFFSET,LENGTH'Read contents of an `spufs' file on the target system. Theannex specifies which file to read; it must be of the form`ID/NAME', where ID specifies an SPU context ID in the targetprocess, and NAME identifes the `spufs' file in that contextto be accessed.This packet is not probed by default; the remote stub mustrequest it, by supplying an appropriate `qSupported' response(*note qSupported::).Reply:`m DATA'Data DATA (*note Binary Data::) has been read from thetarget. There may be more data at a higher address (althoughit is permitted to return `m' even for the last valid blockof data, as long as at least one byte of data was read).DATA may have fewer bytes than the LENGTH in the request.`l DATA'Data DATA (*note Binary Data::) has been read from the target.There is no more data to be read. DATA may have fewer bytesthan the LENGTH in the request.`l'The OFFSET in the request is at the end of the data. Thereis no more data to be read.`E00'The request was malformed, or ANNEX was invalid.`E NN'The offset was invalid, or there was an error encounteredreading the data. NN is a hex-encoded `errno' value.`'An empty reply indicates the OBJECT string was not recognizedby the stub, or that the object does not support reading.`qXfer:OBJECT:write:ANNEX:OFFSET:DATA...'Write uninterpreted bytes into the target's special data areaidentified by the keyword OBJECT, starting at OFFSET bytes intothe data. DATA... is the binary-encoded data (*note BinaryData::) to be written. The content and encoding of ANNEX isspecific to OBJECT; it can supply additional details about whatdata to access.Here are the specific requests of this form defined so far. All`qXfer:OBJECT:write:...' requests use the same reply formats,listed below.`qXfer:SPU:write:ANNEX:OFFSET:DATA...'Write DATA to an `spufs' file on the target system. Theannex specifies which file to write; it must be of the form`ID/NAME', where ID specifies an SPU context ID in the targetprocess, and NAME identifes the `spufs' file in that contextto be accessed.This packet is not probed by default; the remote stub mustrequest it, by supplying an appropriate `qSupported' response(*note qSupported::).Reply:`NN'NN (hex encoded) is the number of bytes written. This may befewer bytes than supplied in the request.`E00'The request was malformed, or ANNEX was invalid.`E NN'The offset was invalid, or there was an error encounteredwriting the data. NN is a hex-encoded `errno' value.`'An empty reply indicates the OBJECT string was not recognizedby the stub, or that the object does not support writing.`qXfer:OBJECT:OPERATION:...'Requests of this form may be added in the future. When a stub doesnot recognize the OBJECT keyword, or its support for OBJECT doesnot recognize the OPERATION keyword, the stub must respond with anempty packet.---------- Footnotes ----------(1) The `qP' and `qL' packets predate these conventions, and havearguments without any terminator for the packet name; we suspect theyare in widespread use in places that are difficult to upgrade. The`qC' packet has no arguments, but some existing stubs (e.g. RedBoot)are known to not check for the end of the packet.File: gdb.info, Node: Register Packet Format, Next: Tracepoint Packets, Prev: General Query Packets, Up: Remote ProtocolD.5 Register Packet Format==========================The following `g'/`G' packets have previously been defined. In thebelow, some thirty-two bit registers are transferred as sixty-fourbits. Those registers should be zero/sign extended (which?) to fillthe space allocated. Register bytes are transferred in target byteorder. The two nibbles within a register byte are transferredmost-significant - least-significant.MIPS32All registers are transferred as thirty-two bit quantities in theorder: 32 general-purpose; sr; lo; hi; bad; cause; pc; 32floating-point registers; fsr; fir; fp.MIPS64All registers are transferred as sixty-four bit quantities(including thirty-two bit registers such as `sr'). The orderingis the same as `MIPS32'.File: gdb.info, Node: Tracepoint Packets, Next: Host I/O Packets, Prev: Register Packet Format, Up: Remote ProtocolD.6 Tracepoint Packets======================Here we describe the packets GDB uses to implement tracepoints (*noteTracepoints::).`QTDP:N:ADDR:ENA:STEP:PASS[-]'Create a new tracepoint, number N, at ADDR. If ENA is `E', thenthe tracepoint is enabled; if it is `D', then the tracepoint isdisabled. STEP is the tracepoint's step count, and PASS is itspass count. If the trailing `-' is present, further `QTDP'packets will follow to specify this tracepoint's actions.Replies:`OK'The packet was understood and carried out.`'The packet was not recognized.`QTDP:-N:ADDR:[S]ACTION...[-]'Define actions to be taken when a tracepoint is hit. N and ADDRmust be the same as in the initial `QTDP' packet for thistracepoint. This packet may only be sent immediately afteranother `QTDP' packet that ended with a `-'. If the trailing `-'is present, further `QTDP' packets will follow, specifying moreactions for this tracepoint.In the series of action packets for a given tracepoint, at most onecan have an `S' before its first ACTION. If such a packet issent, it and the following packets define "while-stepping"actions. Any prior packets define ordinary actions -- that is,those taken when the tracepoint is first hit. If no action packethas an `S', then all the packets in the series specify ordinarytracepoint actions.The `ACTION...' portion of the packet is a series of actions,concatenated without separators. Each action has one of thefollowing forms:`R MASK'Collect the registers whose bits are set in MASK. MASK is ahexadecimal number whose I'th bit is set if register number Ishould be collected. (The least significant bit is numberedzero.) Note that MASK may be any number of digits long; itmay not fit in a 32-bit word.`M BASEREG,OFFSET,LEN'Collect LEN bytes of memory starting at the address inregister number BASEREG, plus OFFSET. If BASEREG is `-1',then the range has a fixed address: OFFSET is the address ofthe lowest byte to collect. The BASEREG, OFFSET, and LENparameters are all unsigned hexadecimal values (the `-1'value for BASEREG is a special case).`X LEN,EXPR'Evaluate EXPR, whose length is LEN, and collect memory as itdirects. EXPR is an agent expression, as described in *NoteAgent Expressions::. Each byte of the expression is encodedas a two-digit hex number in the packet; LEN is the number ofbytes in the expression (and thus one-half the number of hexdigits in the packet).Any number of actions may be packed together in a single `QTDP'packet, as long as the packet does not exceed the maximum packetlength (400 bytes, for many stubs). There may be only one `R'action per tracepoint, and it must precede any `M' or `X' actions.Any registers referred to by `M' and `X' actions must becollected by a preceding `R' action. (The "while-stepping"actions are treated as if they were attached to a separatetracepoint, as far as these restrictions are concerned.)Replies:`OK'The packet was understood and carried out.`'The packet was not recognized.`QTFrame:N'Select the N'th tracepoint frame from the buffer, and use theregister and memory contents recorded there to answer subsequentrequest packets from GDB.A successful reply from the stub indicates that the stub has foundthe requested frame. The response is a series of parts,concatenated without separators, describing the frame we selected.Each part has one of the following forms:`F F'The selected frame is number N in the trace frame buffer; Fis a hexadecimal number. If F is `-1', then there was noframe matching the criteria in the request packet.`T T'The selected trace frame records a hit of tracepoint number T;T is a hexadecimal number.`QTFrame:pc:ADDR'Like `QTFrame:N', but select the first tracepoint frame after thecurrently selected frame whose PC is ADDR; ADDR is a hexadecimalnumber.`QTFrame:tdp:T'Like `QTFrame:N', but select the first tracepoint frame after thecurrently selected frame that is a hit of tracepoint T; T is ahexadecimal number.`QTFrame:range:START:END'Like `QTFrame:N', but select the first tracepoint frame after thecurrently selected frame whose PC is between START (inclusive) andEND (exclusive); START and END are hexadecimal numbers.`QTFrame:outside:START:END'Like `QTFrame:range:START:END', but select the first frame_outside_ the given range of addresses.`QTStart'Begin the tracepoint experiment. Begin collecting data fromtracepoint hits in the trace frame buffer.`QTStop'End the tracepoint experiment. Stop collecting trace frames.`QTinit'Clear the table of tracepoints, and empty the trace frame buffer.`QTro:START1,END1:START2,END2:...'Establish the given ranges of memory as "transparent". The stubwill answer requests for these ranges from memory's currentcontents, if they were not collected as part of the tracepoint hit.GDB uses this to mark read-only regions of memory, like thosecontaining program code. Since these areas never change, theyshould still have the same contents they did when the tracepointwas hit, so there's no reason for the stub to refuse to providetheir contents.`qTStatus'Ask the stub if there is a trace experiment running right now.Replies:`T0'There is no trace experiment running.`T1'There is a trace experiment running.File: gdb.info, Node: Host I/O Packets, Next: Interrupts, Prev: Tracepoint Packets, Up: Remote ProtocolD.7 Host I/O Packets====================The "Host I/O" packets allow GDB to perform I/O operations on the farside of a remote link. For example, Host I/O is used to upload anddownload files to a remote target with its own filesystem. Host I/Ouses the same constant values and data structure layout as thetarget-initiated File-I/O protocol. However, the Host I/O packets arestructured differently. The target-initiated protocol relies on targetmemory to store parameters and buffers. Host I/O requests areinitiated by GDB, and the target's memory is not involved. *NoteFile-I/O Remote Protocol Extension::, for more details on thetarget-initiated protocol.The Host I/O request packets all encode a single operation along withits arguments. They have this format:`vFile:OPERATION: PARAMETER...'OPERATION is the name of the particular request; the target shouldcompare the entire packet name up to the second colon when checkingfor a supported operation. The format of PARAMETER depends on theoperation. Numbers are always passed in hexadecimal. Negativenumbers have an explicit minus sign (i.e. two's complement is notused). Strings (e.g. filenames) are encoded as a series ofhexadecimal bytes. The last argument to a system call may be abuffer of escaped binary data (*note Binary Data::).The valid responses to Host I/O packets are:`F RESULT [, ERRNO] [; ATTACHMENT]'RESULT is the integer value returned by this operation, usuallynon-negative for success and -1 for errors. If an error hasoccured, ERRNO will be included in the result. ERRNO will have avalue defined by the File-I/O protocol (*note Errno Values::). Foroperations which return data, ATTACHMENT supplies the data as abinary buffer. Binary buffers in response packets are escaped inthe normal way (*note Binary Data::). See the individual packetdocumentation for the interpretation of RESULT and ATTACHMENT.`'An empty response indicates that this operation is not recognized.These are the supported Host I/O operations:`vFile:open: PATHNAME, FLAGS, MODE'Open a file at PATHNAME and return a file descriptor for it, orreturn -1 if an error occurs. PATHNAME is a string, FLAGS is aninteger indicating a mask of open flags (*note Open Flags::), andMODE is an integer indicating a mask of mode bits to use if thefile is created (*note mode_t Values::). *Note open::, fordetails of the open flags and mode values.`vFile:close: FD'Close the open file corresponding to FD and return 0, or -1 if anerror occurs.`vFile:pread: FD, COUNT, OFFSET'Read data from the open file corresponding to FD. Up to COUNTbytes will be read from the file, starting at OFFSET relative tothe start of the file. The target may read fewer bytes; commonreasons include packet size limits and an end-of-file condition.The number of bytes read is returned. Zero should only bereturned for a successful read at the end of the file, or if COUNTwas zero.The data read should be returned as a binary attachment on success.If zero bytes were read, the response should include an emptybinary attachment (i.e. a trailing semicolon). The return valueis the number of target bytes read; the binary attachment may belonger if some characters were escaped.`vFile:pwrite: FD, OFFSET, DATA'Write DATA (a binary buffer) to the open file corresponding to FD.Start the write at OFFSET from the start of the file. Unlikemany `write' system calls, there is no separate COUNT argument;the length of DATA in the packet is used. `vFile:write' returnsthe number of bytes written, which may be shorter than the lengthof DATA, or -1 if an error occurred.`vFile:unlink: PATHNAME'Delete the file at PATHNAME on the target. Return 0, or -1 if anerror occurs. PATHNAME is a string.File: gdb.info, Node: Interrupts, Next: Examples, Prev: Host I/O Packets, Up: Remote ProtocolD.8 Interrupts==============When a program on the remote target is running, GDB may attempt tointerrupt it by sending a `Ctrl-C' or a `BREAK', control of which isspecified via GDB's `remotebreak' setting (*note set remotebreak::).The precise meaning of `BREAK' is defined by the transport mechanismand may, in fact, be undefined. GDB does not currently define a`BREAK' mechanism for any of the network interfaces.`Ctrl-C', on the other hand, is defined and implemented for alltransport mechanisms. It is represented by sending the single byte`0x03' without any of the usual packet overhead described in theOverview section (*note Overview::). When a `0x03' byte is transmittedas part of a packet, it is considered to be packet data and does _not_represent an interrupt. E.g., an `X' packet (*note X packet::), usedfor binary downloads, may include an unescaped `0x03' as part of itspacket.Stubs are not required to recognize these interrupt mechanisms andthe precise meaning associated with receipt of the interrupt isimplementation defined. If the stub is successful at interrupting therunning program, it is expected that it will send one of the Stop ReplyPackets (*note Stop Reply Packets::) to GDB as a result of successfullystopping the program. Interrupts received while the program is stoppedwill be discarded.File: gdb.info, Node: Examples, Next: File-I/O Remote Protocol Extension, Prev: Interrupts, Up: Remote ProtocolD.9 Examples============Example sequence of a target being re-started. Notice how the restartdoes not get any direct output:-> `R00'<- `+'_target restarts_-> `?'<- `+'<- `T001:1234123412341234'-> `+'Example sequence of a target being stepped by a single instruction:-> `G1445...'<- `+'-> `s'<- `+'_time passes_<- `T001:1234123412341234'-> `+'-> `g'<- `+'<- `1455...'-> `+'File: gdb.info, Node: File-I/O Remote Protocol Extension, Next: Library List Format, Prev: Examples, Up: Remote ProtocolD.10 File-I/O Remote Protocol Extension=======================================* Menu:* File-I/O Overview::* Protocol Basics::* The F Request Packet::* The F Reply Packet::* The Ctrl-C Message::* Console I/O::* List of Supported Calls::* Protocol-specific Representation of Datatypes::* Constants::* File-I/O Examples::File: gdb.info, Node: File-I/O Overview, Next: Protocol Basics, Up: File-I/O Remote Protocol ExtensionD.10.1 File-I/O Overview------------------------The "File I/O remote protocol extension" (short: File-I/O) allows thetarget to use the host's file system and console I/O to perform varioussystem calls. System calls on the target system are translated into aremote protocol packet to the host system, which then performs theneeded actions and returns a response packet to the target system.This simulates file system operations even on targets that lack filesystems.The protocol is defined to be independent of both the host andtarget systems. It uses its own internal representation of datatypesand values. Both GDB and the target's GDB stub are responsible fortranslating the system-dependent value representations into the internalprotocol representations when data is transmitted.The communication is synchronous. A system call is possible onlywhen GDB is waiting for a response from the `C', `c', `S' or `s'packets. While GDB handles the request for a system call, the targetis stopped to allow deterministic access to the target's memory.Therefore File-I/O is not interruptible by target signals. On theother hand, it is possible to interrupt File-I/O by a user interrupt(`Ctrl-C') within GDB.The target's request to perform a host system call does not finishthe latest `C', `c', `S' or `s' action. That means, after finishingthe system call, the target returns to continuing the previous activity(continue, step). No additional continue or step request from GDB isrequired.(gdb) continue<- target requests 'system call X'target is stopped, GDB executes system call-> GDB returns result... target continues, GDB returns to wait for the target<- target hits breakpoint and sends a Txx packetThe protocol only supports I/O on the console and to regular files onthe host file system. Character or block special devices, pipes, namedpipes, sockets or any other communication method on the host system arenot supported by this protocol.File: gdb.info, Node: Protocol Basics, Next: The F Request Packet, Prev: File-I/O Overview, Up: File-I/O Remote Protocol ExtensionD.10.2 Protocol Basics----------------------The File-I/O protocol uses the `F' packet as the request as well asreply packet. Since a File-I/O system call can only occur when GDB iswaiting for a response from the continuing or stepping target, theFile-I/O request is a reply that GDB has to expect as a result of aprevious `C', `c', `S' or `s' packet. This `F' packet contains allinformation needed to allow GDB to call the appropriate host systemcall:* A unique identifier for the requested system call.* All parameters to the system call. Pointers are given as addressesin the target memory address space. Pointers to strings are givenas pointer/length pair. Numerical values are given as they are.Numerical control flags are given in a protocol-specificrepresentation.At this point, GDB has to perform the following actions.* If the parameters include pointer values to data needed as inputto a system call, GDB requests this data from the target with astandard `m' packet request. This additional communication has tobe expected by the target implementation and is handled as anyother `m' packet.* GDB translates all value from protocol representation to hostrepresentation as needed. Datatypes are coerced into the hosttypes.* GDB calls the system call.* It then coerces datatypes back to protocol representation.* If the system call is expected to return data in buffer spacespecified by pointer parameters to the call, the data istransmitted to the target using a `M' or `X' packet. This packethas to be expected by the target implementation and is handled asany other `M' or `X' packet.Eventually GDB replies with another `F' packet which contains allnecessary information for the target to continue. This at leastcontains* Return value.* `errno', if has been changed by the system call.* "Ctrl-C" flag.After having done the needed type and value coercion, the targetcontinues the latest continue or step action.File: gdb.info, Node: The F Request Packet, Next: The F Reply Packet, Prev: Protocol Basics, Up: File-I/O Remote Protocol ExtensionD.10.3 The `F' Request Packet-----------------------------The `F' request packet has the following format:`FCALL-ID,PARAMETER...'CALL-ID is the identifier to indicate the host system call to becalled. This is just the name of the function.PARAMETER... are the parameters to the system call. Parametersare hexadecimal integer values, either the actual values in caseof scalar datatypes, pointers to target buffer space in case ofcompound datatypes and unspecified memory areas, or pointer/lengthpairs in case of string parameters. These are appended to theCALL-ID as a comma-delimited list. All values are transmitted inASCII string representation, pointer/length pairs separated by aslash.File: gdb.info, Node: The F Reply Packet, Next: The Ctrl-C Message, Prev: The F Request Packet, Up: File-I/O Remote Protocol ExtensionD.10.4 The `F' Reply Packet---------------------------The `F' reply packet has the following format:`FRETCODE,ERRNO,CTRL-C FLAG;CALL-SPECIFIC ATTACHMENT'RETCODE is the return code of the system call as hexadecimal value.ERRNO is the `errno' set by the call, in protocol-specificrepresentation. This parameter can be omitted if the call wassuccessful.CTRL-C FLAG is only sent if the user requested a break. In thiscase, ERRNO must be sent as well, even if the call was successful.The CTRL-C FLAG itself consists of the character `C':F0,0,Cor, if the call was interrupted before the host call has beenperformed:F-1,4,Cassuming 4 is the protocol-specific representation of `EINTR'.File: gdb.info, Node: The Ctrl-C Message, Next: Console I/O, Prev: The F Reply Packet, Up: File-I/O Remote Protocol ExtensionD.10.5 The `Ctrl-C' Message---------------------------If the `Ctrl-C' flag is set in the GDB reply packet (*note The F ReplyPacket::), the target should behave as if it had gotten a breakmessage. The meaning for the target is "system call interrupted by`SIGINT'". Consequentially, the target should actually stop (as with abreak message) and return to GDB with a `T02' packet.It's important for the target to know in which state the system callwas interrupted. There are two possible cases:* The system call hasn't been performed on the host yet.* The system call on the host has been finished.These two states can be distinguished by the target by the value ofthe returned `errno'. If it's the protocol representation of `EINTR',the system call hasn't been performed. This is equivalent to the`EINTR' handling on POSIX systems. In any other case, the target maypresume that the system call has been finished -- successfully or not-- and should behave as if the break message arrived right after thesystem call.GDB must behave reliably. If the system call has not been calledyet, GDB may send the `F' reply immediately, setting `EINTR' as `errno'in the packet. If the system call on the host has been finished beforethe user requests a break, the full action must be finished by GDB.This requires sending `M' or `X' packets as necessary. The `F' packetmay only be sent when either nothing has happened or the full actionhas been completed.File: gdb.info, Node: Console I/O, Next: List of Supported Calls, Prev: The Ctrl-C Message, Up: File-I/O Remote Protocol ExtensionD.10.6 Console I/O------------------By default and if not explicitly closed by the target system, the filedescriptors 0, 1 and 2 are connected to the GDB console. Output on theGDB console is handled as any other file output operation (`write(1,...)' or `write(2, ...)'). Console input is handled by GDB so thatafter the target read request from file descriptor 0 all followingtyping is buffered until either one of the following conditions is met:* The user types `Ctrl-c'. The behaviour is as explained above, andthe `read' system call is treated as finished.* The user presses <RET>. This is treated as end of input with atrailing newline.* The user types `Ctrl-d'. This is treated as end of input. Notrailing character (neither newline nor `Ctrl-D') is appended tothe input.If the user has typed more characters than fit in the buffer given tothe `read' call, the trailing characters are buffered in GDB untileither another `read(0, ...)' is requested by the target, or debuggingis stopped at the user's request.File: gdb.info, Node: List of Supported Calls, Next: Protocol-specific Representation of Datatypes, Prev: Console I/O, Up: File-I/O Remote Protocol ExtensionD.10.7 List of Supported Calls------------------------------* Menu:* open::* close::* read::* write::* lseek::* rename::* unlink::* stat/fstat::* gettimeofday::* isatty::* system::File: gdb.info, Node: open, Next: close, Up: List of Supported Callsopen....Synopsis:int open(const char *pathname, int flags);int open(const char *pathname, int flags, mode_t mode);Request:`Fopen,PATHPTR/LEN,FLAGS,MODE'FLAGS is the bitwise `OR' of the following values:`O_CREAT'If the file does not exist it will be created. The hostrules apply as far as file ownership and time stamps areconcerned.`O_EXCL'When used with `O_CREAT', if the file already exists it is anerror and open() fails.`O_TRUNC'If the file already exists and the open mode allows writing(`O_RDWR' or `O_WRONLY' is given) it will be truncated tozero length.`O_APPEND'The file is opened in append mode.`O_RDONLY'The file is opened for reading only.`O_WRONLY'The file is opened for writing only.`O_RDWR'The file is opened for reading and writing.Other bits are silently ignored.MODE is the bitwise `OR' of the following values:`S_IRUSR'User has read permission.`S_IWUSR'User has write permission.`S_IRGRP'Group has read permission.`S_IWGRP'Group has write permission.`S_IROTH'Others have read permission.`S_IWOTH'Others have write permission.Other bits are silently ignored.Return value:`open' returns the new file descriptor or -1 if an error occurred.Errors:`EEXIST'PATHNAME already exists and `O_CREAT' and `O_EXCL' were used.`EISDIR'PATHNAME refers to a directory.`EACCES'The requested access is not allowed.`ENAMETOOLONG'PATHNAME was too long.`ENOENT'A directory component in PATHNAME does not exist.`ENODEV'PATHNAME refers to a device, pipe, named pipe or socket.`EROFS'PATHNAME refers to a file on a read-only filesystem and writeaccess was requested.`EFAULT'PATHNAME is an invalid pointer value.`ENOSPC'No space on device to create the file.`EMFILE'The process already has the maximum number of files open.`ENFILE'The limit on the total number of files open on the system hasbeen reached.`EINTR'The call was interrupted by the user.File: gdb.info, Node: close, Next: read, Prev: open, Up: List of Supported Callsclose.....Synopsis:int close(int fd);Request:`Fclose,FD'Return value:`close' returns zero on success, or -1 if an error occurred.Errors:`EBADF'FD isn't a valid open file descriptor.`EINTR'The call was interrupted by the user.File: gdb.info, Node: read, Next: write, Prev: close, Up: List of Supported Callsread....Synopsis:int read(int fd, void *buf, unsigned int count);Request:`Fread,FD,BUFPTR,COUNT'Return value:On success, the number of bytes read is returned. Zero indicatesend of file. If count is zero, read returns zero as well. Onerror, -1 is returned.Errors:`EBADF'FD is not a valid file descriptor or is not open for reading.`EFAULT'BUFPTR is an invalid pointer value.`EINTR'The call was interrupted by the user.File: gdb.info, Node: write, Next: lseek, Prev: read, Up: List of Supported Callswrite.....Synopsis:int write(int fd, const void *buf, unsigned int count);Request:`Fwrite,FD,BUFPTR,COUNT'Return value:On success, the number of bytes written are returned. Zeroindicates nothing was written. On error, -1 is returned.Errors:`EBADF'FD is not a valid file descriptor or is not open for writing.`EFAULT'BUFPTR is an invalid pointer value.`EFBIG'An attempt was made to write a file that exceeds thehost-specific maximum file size allowed.`ENOSPC'No space on device to write the data.`EINTR'The call was interrupted by the user.File: gdb.info, Node: lseek, Next: rename, Prev: write, Up: List of Supported Callslseek.....Synopsis:long lseek (int fd, long offset, int flag);Request:`Flseek,FD,OFFSET,FLAG'FLAG is one of:`SEEK_SET'The offset is set to OFFSET bytes.`SEEK_CUR'The offset is set to its current location plus OFFSET bytes.`SEEK_END'The offset is set to the size of the file plus OFFSET bytes.Return value:On success, the resulting unsigned offset in bytes from thebeginning of the file is returned. Otherwise, a value of -1 isreturned.Errors:`EBADF'FD is not a valid open file descriptor.`ESPIPE'FD is associated with the GDB console.`EINVAL'FLAG is not a proper value.`EINTR'The call was interrupted by the user.File: gdb.info, Node: rename, Next: unlink, Prev: lseek, Up: List of Supported Callsrename......Synopsis:int rename(const char *oldpath, const char *newpath);Request:`Frename,OLDPATHPTR/LEN,NEWPATHPTR/LEN'Return value:On success, zero is returned. On error, -1 is returned.Errors:`EISDIR'NEWPATH is an existing directory, but OLDPATH is not adirectory.`EEXIST'NEWPATH is a non-empty directory.`EBUSY'OLDPATH or NEWPATH is a directory that is in use by someprocess.`EINVAL'An attempt was made to make a directory a subdirectory ofitself.`ENOTDIR'A component used as a directory in OLDPATH or new path isnot a directory. Or OLDPATH is a directory and NEWPATHexists but is not a directory.`EFAULT'OLDPATHPTR or NEWPATHPTR are invalid pointer values.`EACCES'No access to the file or the path of the file.`ENAMETOOLONG'OLDPATH or NEWPATH was too long.`ENOENT'A directory component in OLDPATH or NEWPATH does not exist.`EROFS'The file is on a read-only filesystem.`ENOSPC'The device containing the file has no room for the newdirectory entry.`EINTR'The call was interrupted by the user.File: gdb.info, Node: unlink, Next: stat/fstat, Prev: rename, Up: List of Supported Callsunlink......Synopsis:int unlink(const char *pathname);Request:`Funlink,PATHNAMEPTR/LEN'Return value:On success, zero is returned. On error, -1 is returned.Errors:`EACCES'No access to the file or the path of the file.`EPERM'The system does not allow unlinking of directories.`EBUSY'The file PATHNAME cannot be unlinked because it's being usedby another process.`EFAULT'PATHNAMEPTR is an invalid pointer value.`ENAMETOOLONG'PATHNAME was too long.`ENOENT'A directory component in PATHNAME does not exist.`ENOTDIR'A component of the path is not a directory.`EROFS'The file is on a read-only filesystem.`EINTR'The call was interrupted by the user.File: gdb.info, Node: stat/fstat, Next: gettimeofday, Prev: unlink, Up: List of Supported Callsstat/fstat..........Synopsis:int stat(const char *pathname, struct stat *buf);int fstat(int fd, struct stat *buf);Request:`Fstat,PATHNAMEPTR/LEN,BUFPTR'`Ffstat,FD,BUFPTR'Return value:On success, zero is returned. On error, -1 is returned.Errors:`EBADF'FD is not a valid open file.`ENOENT'A directory component in PATHNAME does not exist or the pathis an empty string.`ENOTDIR'A component of the path is not a directory.`EFAULT'PATHNAMEPTR is an invalid pointer value.`EACCES'No access to the file or the path of the file.`ENAMETOOLONG'PATHNAME was too long.`EINTR'The call was interrupted by the user.File: gdb.info, Node: gettimeofday, Next: isatty, Prev: stat/fstat, Up: List of Supported Callsgettimeofday............Synopsis:int gettimeofday(struct timeval *tv, void *tz);Request:`Fgettimeofday,TVPTR,TZPTR'Return value:On success, 0 is returned, -1 otherwise.Errors:`EINVAL'TZ is a non-NULL pointer.`EFAULT'TVPTR and/or TZPTR is an invalid pointer value.File: gdb.info, Node: isatty, Next: system, Prev: gettimeofday, Up: List of Supported Callsisatty......Synopsis:int isatty(int fd);Request:`Fisatty,FD'Return value:Returns 1 if FD refers to the GDB console, 0 otherwise.Errors:`EINTR'The call was interrupted by the user.Note that the `isatty' call is treated as a special case: it returns1 to the target if the file descriptor is attached to the GDB console,0 otherwise. Implementing through system calls would requireimplementing `ioctl' and would be more complex than needed.File: gdb.info, Node: system, Prev: isatty, Up: List of Supported Callssystem......Synopsis:int system(const char *command);Request:`Fsystem,COMMANDPTR/LEN'Return value:If LEN is zero, the return value indicates whether a shell isavailable. A zero return value indicates a shell is not available.For non-zero LEN, the value returned is -1 on error and the returnstatus of the command otherwise. Only the exit status of thecommand is returned, which is extracted from the host's `system'return value by calling `WEXITSTATUS(retval)'. In case `/bin/sh'could not be executed, 127 is returned.Errors:`EINTR'The call was interrupted by the user.GDB takes over the full task of calling the necessary host calls toperform the `system' call. The return value of `system' on the host issimplified before it's returned to the target. Any termination signalinformation from the child process is discarded, and the return valueconsists entirely of the exit status of the called command.Due to security concerns, the `system' call is by default refused byGDB. The user has to allow this call explicitly with the `set remotesystem-call-allowed 1' command.`set remote system-call-allowed'Control whether to allow the `system' calls in the File I/Oprotocol for the remote target. The default is zero (disabled).`show remote system-call-allowed'Show whether the `system' calls are allowed in the File I/Oprotocol.File: gdb.info, Node: Protocol-specific Representation of Datatypes, Next: Constants, Prev: List of Supported Calls, Up: File-I/O Remote Protocol ExtensionD.10.8 Protocol-specific Representation of Datatypes----------------------------------------------------* Menu:* Integral Datatypes::* Pointer Values::* Memory Transfer::* struct stat::* struct timeval::File: gdb.info, Node: Integral Datatypes, Next: Pointer Values, Up: Protocol-specific Representation of DatatypesIntegral Datatypes..................The integral datatypes used in the system calls are `int', `unsignedint', `long', `unsigned long', `mode_t', and `time_t'.`int', `unsigned int', `mode_t' and `time_t' are implemented as 32bit values in this protocol.`long' and `unsigned long' are implemented as 64 bit types.*Note Limits::, for corresponding MIN and MAX values (similar tothose in `limits.h') to allow range checking on host and target.`time_t' datatypes are defined as seconds since the Epoch.All integral datatypes transferred as part of a memory read or writeof a structured datatype e.g. a `struct stat' have to be given in bigendian byte order.File: gdb.info, Node: Pointer Values, Next: Memory Transfer, Prev: Integral Datatypes, Up: Protocol-specific Representation of DatatypesPointer Values..............Pointers to target data are transmitted as they are. An exception ismade for pointers to buffers for which the length isn't transmitted aspart of the function call, namely strings. Strings are transmitted asa pointer/length pair, both as hex values, e.g.`1aaf/12'which is a pointer to data of length 18 bytes at position 0x1aaf. Thelength is defined as the full string length in bytes, including thetrailing null byte. For example, the string `"hello world"' at address0x123456 is transmitted as`123456/d'File: gdb.info, Node: Memory Transfer, Next: struct stat, Prev: Pointer Values, Up: Protocol-specific Representation of DatatypesMemory Transfer...............Structured data which is transferred using a memory read or write (forexample, a `struct stat') is expected to be in a protocol-specificformat with all scalar multibyte datatypes being big endian.Translation to this representation needs to be done both by the targetbefore the `F' packet is sent, and by GDB before it transfers memory tothe target. Transferred pointers to structured data should point tothe already-coerced data at any time.File: gdb.info, Node: struct stat, Next: struct timeval, Prev: Memory Transfer, Up: Protocol-specific Representation of Datatypesstruct stat...........The buffer of type `struct stat' used by the target and GDB is definedas follows:struct stat {unsigned int st_dev; /* device */unsigned int st_ino; /* inode */mode_t st_mode; /* protection */unsigned int st_nlink; /* number of hard links */unsigned int st_uid; /* user ID of owner */unsigned int st_gid; /* group ID of owner */unsigned int st_rdev; /* device type (if inode device) */unsigned long st_size; /* total size, in bytes */unsigned long st_blksize; /* blocksize for filesystem I/O */unsigned long st_blocks; /* number of blocks allocated */time_t st_atime; /* time of last access */time_t st_mtime; /* time of last modification */time_t st_ctime; /* time of last change */};The integral datatypes conform to the definitions given in theappropriate section (see *Note Integral Datatypes::, for details) sothis structure is of size 64 bytes.The values of several fields have a restricted meaning and/or rangeof values.`st_dev'A value of 0 represents a file, 1 the console.`st_ino'No valid meaning for the target. Transmitted unchanged.`st_mode'Valid mode bits are described in *Note Constants::. Any otherbits have currently no meaning for the target.`st_uid'`st_gid'`st_rdev'No valid meaning for the target. Transmitted unchanged.`st_atime'`st_mtime'`st_ctime'These values have a host and file system dependent accuracy.Especially on Windows hosts, the file system may not support exacttiming values.The target gets a `struct stat' of the above representation and isresponsible for coercing it to the target representation beforecontinuing.Note that due to size differences between the host, target, andprotocol representations of `struct stat' members, these members couldeventually get truncated on the target.File: gdb.info, Node: struct timeval, Prev: struct stat, Up: Protocol-specific Representation of Datatypesstruct timeval..............The buffer of type `struct timeval' used by the File-I/O protocol isdefined as follows:struct timeval {time_t tv_sec; /* second */long tv_usec; /* microsecond */};The integral datatypes conform to the definitions given in theappropriate section (see *Note Integral Datatypes::, for details) sothis structure is of size 8 bytes.File: gdb.info, Node: Constants, Next: File-I/O Examples, Prev: Protocol-specific Representation of Datatypes, Up: File-I/O Remote Protocol ExtensionD.10.9 Constants----------------The following values are used for the constants inside of the protocol.GDB and target are responsible for translating these values before andafter the call as needed.* Menu:* Open Flags::* mode_t Values::* Errno Values::* Lseek Flags::* Limits::File: gdb.info, Node: Open Flags, Next: mode_t Values, Up: ConstantsOpen Flags..........All values are given in hexadecimal representation.O_RDONLY 0x0O_WRONLY 0x1O_RDWR 0x2O_APPEND 0x8O_CREAT 0x200O_TRUNC 0x400O_EXCL 0x800File: gdb.info, Node: mode_t Values, Next: Errno Values, Prev: Open Flags, Up: Constantsmode_t Values.............All values are given in octal representation.S_IFREG 0100000S_IFDIR 040000S_IRUSR 0400S_IWUSR 0200S_IXUSR 0100S_IRGRP 040S_IWGRP 020S_IXGRP 010S_IROTH 04S_IWOTH 02S_IXOTH 01File: gdb.info, Node: Errno Values, Next: Lseek Flags, Prev: mode_t Values, Up: ConstantsErrno Values............All values are given in decimal representation.EPERM 1ENOENT 2EINTR 4EBADF 9EACCES 13EFAULT 14EBUSY 16EEXIST 17ENODEV 19ENOTDIR 20EISDIR 21EINVAL 22ENFILE 23EMFILE 24EFBIG 27ENOSPC 28ESPIPE 29EROFS 30ENAMETOOLONG 91EUNKNOWN 9999`EUNKNOWN' is used as a fallback error value if a host system returnsany error value not in the list of supported error numbers.File: gdb.info, Node: Lseek Flags, Next: Limits, Prev: Errno Values, Up: ConstantsLseek Flags...........SEEK_SET 0SEEK_CUR 1SEEK_END 2File: gdb.info, Node: Limits, Prev: Lseek Flags, Up: ConstantsLimits......All values are given in decimal representation.INT_MIN -2147483648INT_MAX 2147483647UINT_MAX 4294967295LONG_MIN -9223372036854775808LONG_MAX 9223372036854775807ULONG_MAX 18446744073709551615File: gdb.info, Node: File-I/O Examples, Prev: Constants, Up: File-I/O Remote Protocol ExtensionD.10.10 File-I/O Examples-------------------------Example sequence of a write call, file descriptor 3, buffer is at targetaddress 0x1234, 6 bytes should be written:<- `Fwrite,3,1234,6'_request memory read from target_-> `m1234,6'<- XXXXXX_return "6 bytes written"_-> `F6'Example sequence of a read call, file descriptor 3, buffer is attarget address 0x1234, 6 bytes should be read:<- `Fread,3,1234,6'_request memory write to target_-> `X1234,6:XXXXXX'_return "6 bytes read"_-> `F6'Example sequence of a read call, call fails on the host due toinvalid file descriptor (`EBADF'):<- `Fread,3,1234,6'-> `F-1,9'Example sequence of a read call, user presses `Ctrl-c' beforesyscall on host is called:<- `Fread,3,1234,6'-> `F-1,4,C'<- `T02'Example sequence of a read call, user presses `Ctrl-c' after syscallon host is called:<- `Fread,3,1234,6'-> `X1234,6:XXXXXX'<- `T02'File: gdb.info, Node: Library List Format, Next: Memory Map Format, Prev: File-I/O Remote Protocol Extension, Up: Remote ProtocolD.11 Library List Format========================On some platforms, a dynamic loader (e.g. `ld.so') runs in the sameprocess as your application to manage libraries. In this case, GDB canuse the loader's symbol table and normal memory operations to maintaina list of shared libraries. On other platforms, the operating systemmanages loaded libraries. GDB can not retrieve the list of currentlyloaded libraries through memory operations, so it uses the`qXfer:libraries:read' packet (*note qXfer library list read::)instead. The remote stub queries the target's operating system andreports which libraries are loaded.The `qXfer:libraries:read' packet returns an XML document whichlists loaded libraries and their offsets. Each library has anassociated name and one or more segment base addresses, which reportwhere the library was loaded in memory. The segment bases are startaddresses, not relocation offsets; they do not depend on the library'slink-time base addresses.GDB must be linked with the Expat library to support XML librarylists. *Note Expat::.A simple memory map, with one loaded library relocated by a singleoffset, looks like this:<library-list><library name="/lib/libc.so.6"><segment address="0x10000000"/></library></library-list>The format of a library list is described by this DTD:<!-- library-list: Root element with versioning --><!ELEMENT library-list (library)*><!ATTLIST library-list version CDATA #FIXED "1.0"><!ELEMENT library (segment)*><!ATTLIST library name CDATA #REQUIRED><!ELEMENT segment EMPTY><!ATTLIST segment address CDATA #REQUIRED>File: gdb.info, Node: Memory Map Format, Prev: Library List Format, Up: Remote ProtocolD.12 Memory Map Format======================To be able to write into flash memory, GDB needs to obtain a memory mapfrom the target. This section describes the format of the memory map.The memory map is obtained using the `qXfer:memory-map:read' (*noteqXfer memory map read::) packet and is an XML document that listsmemory regions.GDB must be linked with the Expat library to support XML memorymaps. *Note Expat::.The top-level structure of the document is shown below:<?xml version="1.0"?><!DOCTYPE memory-mapPUBLIC "+//IDN gnu.org//DTD GDB Memory Map V1.0//EN""http://sourceware.org/gdb/gdb-memory-map.dtd"><memory-map>region...</memory-map>Each region can be either:* A region of RAM starting at ADDR and extending for LENGTH bytesfrom there:<memory type="ram" start="ADDR" length="LENGTH"/>* A region of read-only memory:<memory type="rom" start="ADDR" length="LENGTH"/>* A region of flash memory, with erasure blocks BLOCKSIZE bytes inlength:<memory type="flash" start="ADDR" length="LENGTH"><property name="blocksize">BLOCKSIZE</property></memory>Regions must not overlap. GDB assumes that areas of memory notcovered by the memory map are RAM, and uses the ordinary `M' and `X'packets to write to addresses in such ranges.The formal DTD for memory map format is given below:<!-- ................................................... --><!-- Memory Map XML DTD ................................ --><!-- File: memory-map.dtd .............................. --><!-- .................................... .............. --><!-- memory-map.dtd --><!-- memory-map: Root element with versioning --><!ELEMENT memory-map (memory | property)><!ATTLIST memory-map version CDATA #FIXED "1.0.0"><!ELEMENT memory (property)><!-- memory: Specifies a memory region,and its type, or device. --><!ATTLIST memory type CDATA #REQUIREDstart CDATA #REQUIREDlength CDATA #REQUIREDdevice CDATA #IMPLIED><!-- property: Generic attribute tag --><!ELEMENT property (#PCDATA | property)*><!ATTLIST property name CDATA #REQUIRED>File: gdb.info, Node: Agent Expressions, Next: Target Descriptions, Prev: Remote Protocol, Up: TopAppendix E The GDB Agent Expression Mechanism*********************************************In some applications, it is not feasible for the debugger to interruptthe program's execution long enough for the developer to learn anythinghelpful about its behavior. If the program's correctness depends on itsreal-time behavior, delays introduced by a debugger might cause theprogram to fail, even when the code itself is correct. It is useful tobe able to observe the program's behavior without interrupting it.Using GDB's `trace' and `collect' commands, the user can specifylocations in the program, and arbitrary expressions to evaluate whenthose locations are reached. Later, using the `tfind' command, she canexamine the values those expressions had when the program hit the tracepoints. The expressions may also denote objects in memory --structures or arrays, for example -- whose values GDB should record;while visiting a particular tracepoint, the user may inspect thoseobjects as if they were in memory at that moment. However, because GDBrecords these values without interacting with the user, it can do soquickly and unobtrusively, hopefully not disturbing the program'sbehavior.When GDB is debugging a remote target, the GDB "agent" code runningon the target computes the values of the expressions itself. To avoidhaving a full symbolic expression evaluator on the agent, GDB translatesexpressions in the source language into a simpler bytecode language, andthen sends the bytecode to the agent; the agent then executes thebytecode, and records the values for GDB to retrieve later.The bytecode language is simple; there are forty-odd opcodes, thebulk of which are the usual vocabulary of C operands (addition,subtraction, shifts, and so on) and various sizes of literals andmemory reference operations. The bytecode interpreter operatesstrictly on machine-level values -- various sizes of integers andfloating point numbers -- and requires no information about types orsymbols; thus, the interpreter's internal data structures are simple,and each bytecode requires only a few native machine instructions toimplement it. The interpreter is small, and strict limits on thememory and time required to evaluate an expression are easy todetermine, making it suitable for use by the debugging agent inreal-time applications.* Menu:* General Bytecode Design:: Overview of the interpreter.* Bytecode Descriptions:: What each one does.* Using Agent Expressions:: How agent expressions fit into the big picture.* Varying Target Capabilities:: How to discover what the target can do.* Tracing on Symmetrix:: Special info for implementation on EMC'sboxes.* Rationale:: Why we did it this way.File: gdb.info, Node: General Bytecode Design, Next: Bytecode Descriptions, Up: Agent ExpressionsE.1 General Bytecode Design===========================The agent represents bytecode expressions as an array of bytes. Eachinstruction is one byte long (thus the term "bytecode"). Someinstructions are followed by operand bytes; for example, the `goto'instruction is followed by a destination for the jump.The bytecode interpreter is a stack-based machine; most instructionspop their operands off the stack, perform some operation, and push theresult back on the stack for the next instruction to consume. Eachelement of the stack may contain either a integer or a floating pointvalue; these values are as many bits wide as the largest integer thatcan be directly manipulated in the source language. Stack elementscarry no record of their type; bytecode could push a value as aninteger, then pop it as a floating point value. However, GDB will notgenerate code which does this. In C, one might define the type of astack element as follows:union agent_val {LONGEST l;DOUBLEST d;};where `LONGEST' and `DOUBLEST' are `typedef' names for the largestinteger and floating point types on the machine.By the time the bytecode interpreter reaches the end of theexpression, the value of the expression should be the only value lefton the stack. For tracing applications, `trace' bytecodes in theexpression will have recorded the necessary data, and the value on thestack may be discarded. For other applications, like conditionalbreakpoints, the value may be useful.Separate from the stack, the interpreter has two registers:`pc'The address of the next bytecode to execute.`start'The address of the start of the bytecode expression, necessary forinterpreting the `goto' and `if_goto' instructions.Neither of these registers is directly visible to the bytecodelanguage itself, but they are useful for defining the meanings of thebytecode operations.There are no instructions to perform side effects on the runningprogram, or call the program's functions; we assume that theseexpressions are only used for unobtrusive debugging, not for patchingthe running code.Most bytecode instructions do not distinguish between the varioussizes of values, and operate on full-width values; the upper bits of thevalues are simply ignored, since they do not usually make a differenceto the value computed. The exceptions to this rule are:memory reference instructions (`ref'N)There are distinct instructions to fetch different word sizes frommemory. Once on the stack, however, the values are treated asfull-size integers. They may need to be sign-extended; the `ext'instruction exists for this purpose.the sign-extension instruction (`ext' N)These clearly need to know which portion of their operand is to beextended to occupy the full length of the word.If the interpreter is unable to evaluate an expression completely forsome reason (a memory location is inaccessible, or a divisor is zero,for example), we say that interpretation "terminates with an error".This means that the problem is reported back to the interpreter's callerin some helpful way. In general, code using agent expressions shouldassume that they may attempt to divide by zero, fetch arbitrary memorylocations, and misbehave in other ways.Even complicated C expressions compile to a few bytecodeinstructions; for example, the expression `x + y * z' would typicallyproduce code like the following, assuming that `x' and `y' live inregisters, and `z' is a global variable holding a 32-bit `int':reg 1reg 2const32 address of zref32ext 32muladdendIn detail, these mean:`reg 1'Push the value of register 1 (presumably holding `x') onto thestack.`reg 2'Push the value of register 2 (holding `y').`const32 address of z'Push the address of `z' onto the stack.`ref32'Fetch a 32-bit word from the address at the top of the stack;replace the address on the stack with the value. Thus, we replacethe address of `z' with `z''s value.`ext 32'Sign-extend the value on the top of the stack from 32 bits to fulllength. This is necessary because `z' is a signed integer.`mul'Pop the top two numbers on the stack, multiply them, and push theirproduct. Now the top of the stack contains the value of theexpression `y * z'.`add'Pop the top two numbers, add them, and push the sum. Now the topof the stack contains the value of `x + y * z'.`end'Stop executing; the value left on the stack top is the value to berecorded.
Go to most recent revision | Compare with Previous | Blame | View Log
