URL
https://opencores.org/ocsvn/openrisc_me/openrisc_me/trunk
Subversion Repositories openrisc_me
[/] [openrisc/] [trunk/] [gnu-src/] [gdb-6.8/] [gdb/] [doc/] [gdbint.info-1] - Rev 178
Go to most recent revision | Compare with Previous | Blame | View Log
This is gdbint.info, produced by makeinfo version 4.8 from../.././gdb/doc/gdbint.texinfo.INFO-DIR-SECTION Software developmentSTART-INFO-DIR-ENTRY* Gdb-Internals: (gdbint). The GNU debugger's internals.END-INFO-DIR-ENTRYThis file documents the internals of the GNU debugger GDB.Copyright (C) 1990, 1991, 1992, 1993, 1994, 1996, 1998, 1999, 2000,2001, 2002, 2003, 2004, 2005, 2006 Free Software Foundation, Inc.Contributed by Cygnus Solutions. Written by John Gilmore. SecondEdition by Stan Shebs.Permission is granted to copy, distribute and/or modify this documentunder the terms of the GNU Free Documentation License, Version 1.1 orany later version published by the Free Software Foundation; with noInvariant Sections, with no Front-Cover Texts, and with no Back-CoverTexts. A copy of the license is included in the section entitled "GNUFree Documentation License".File: gdbint.info, Node: Top, Next: Requirements, Up: (dir)Scope of this Document**********************This document documents the internals of the GNU debugger, GDB. Itincludes description of GDB's key algorithms and operations, as well asthe mechanisms that adapt GDB to specific hosts and targets.* Menu:* Requirements::* Overall Structure::* Algorithms::* User Interface::* libgdb::* Symbol Handling::* Language Support::* Host Definition::* Target Architecture Definition::* Target Descriptions::* Target Vector Definition::* Native Debugging::* Support Libraries::* Coding::* Porting GDB::* Versions and Branches::* Start of New Year Procedure::* Releasing GDB::* Testsuite::* Hints::* GDB Observers:: GDB Currently available observers* GNU Free Documentation License:: The license for this documentation* Index::File: gdbint.info, Node: Requirements, Next: Overall Structure, Prev: Top, Up: Top1 Requirements**************Before diving into the internals, you should understand the formalrequirements and other expectations for GDB. Although some of thesemay seem obvious, there have been proposals for GDB that have runcounter to these requirements.First of all, GDB is a debugger. It's not designed to be a frontpanel for embedded systems. It's not a text editor. It's not a shell.It's not a programming environment.GDB is an interactive tool. Although a batch mode is available,GDB's primary role is to interact with a human programmer.GDB should be responsive to the user. A programmer hot on the trailof a nasty bug, and operating under a looming deadline, is going to bevery impatient of everything, including the response time to debuggercommands.GDB should be relatively permissive, such as for expressions. Whilethe compiler should be picky (or have the option to be made picky),since source code lives for a long time usually, the programmer doingdebugging shouldn't be spending time figuring out to mollify thedebugger.GDB will be called upon to deal with really large programs.Executable sizes of 50 to 100 megabytes occur regularly, and we'veheard reports of programs approaching 1 gigabyte in size.GDB should be able to run everywhere. No other debugger isavailable for even half as many configurations as GDB supports.File: gdbint.info, Node: Overall Structure, Next: Algorithms, Prev: Requirements, Up: Top2 Overall Structure*******************GDB consists of three major subsystems: user interface, symbol handling(the "symbol side"), and target system handling (the "target side").The user interface consists of several actual interfaces, plussupporting code.The symbol side consists of object file readers, debugging infointerpreters, symbol table management, source language expressionparsing, type and value printing.The target side consists of execution control, stack frame analysis,and physical target manipulation.The target side/symbol side division is not formal, and there are anumber of exceptions. For instance, core file support involves symbolicelements (the basic core file reader is in BFD) and target elements (itsupplies the contents of memory and the values of registers). Instead,this division is useful for understanding how the minor subsystemsshould fit together.2.1 The Symbol Side===================The symbolic side of GDB can be thought of as "everything you can do inGDB without having a live program running". For instance, you can lookat the types of variables, and evaluate many kinds of expressions.2.2 The Target Side===================The target side of GDB is the "bits and bytes manipulator". Althoughit may make reference to symbolic info here and there, most of thetarget side will run with only a stripped executable available--or evenno executable at all, in remote debugging cases.Operations such as disassembly, stack frame crawls, and registerdisplay, are able to work with no symbolic info at all. In some cases,such as disassembly, GDB will use symbolic info to present addressesrelative to symbols rather than as raw numbers, but it will work eitherway.2.3 Configurations=================="Host" refers to attributes of the system where GDB runs. "Target"refers to the system where the program being debugged executes. Inmost cases they are the same machine, in which case a third type of"Native" attributes come into play.Defines and include files needed to build on the host are hostsupport. Examples are tty support, system defined types, host byteorder, host float format.Defines and information needed to handle the target format are targetdependent. Examples are the stack frame format, instruction set,breakpoint instruction, registers, and how to set up and tear down thestack to call a function.Information that is only needed when the host and target are thesame, is native dependent. One example is Unix child process support;if the host and target are not the same, doing a fork to start thetarget process is a bad idea. The various macros needed for finding theregisters in the `upage', running `ptrace', and such are all in thenative-dependent files.Another example of native-dependent code is support for features thatare really part of the target environment, but which require `#include'files that are only available on the host system. Core file handlingand `setjmp' handling are two common cases.When you want to make GDB work "native" on a particular machine, youhave to include all three kinds of information.2.4 Source Tree Structure=========================The GDB source directory has a mostly flat structure--there are only afew subdirectories. A file's name usually gives a hint as to what itdoes; for example, `stabsread.c' reads stabs, `dwarf2read.c' readsDWARF 2, etc.Files that are related to some common task have names that sharecommon substrings. For example, `*-thread.c' files deal with debuggingthreads on various platforms; `*read.c' files deal with reading variouskinds of symbol and object files; `inf*.c' files deal with directcontrol of the "inferior program" (GDB parlance for the program beingdebugged).There are several dozens of files in the `*-tdep.c' family. `tdep'stands for "target-dependent code"--each of these files implementsdebug support for a specific target architecture (sparc, mips, etc).Usually, only one of these will be used in a specific GDB configuration(sometimes two, closely related).Similarly, there are many `*-nat.c' files, each one for nativedebugging on a specific system (e.g., `sparc-linux-nat.c' is for nativedebugging of Sparc machines running the Linux kernel).The few subdirectories of the source tree are:`cli'Code that implements "CLI", the GDB Command-Line Interpreter.*Note Command Interpreter: User Interface.`gdbserver'Code for the GDB remote server.`gdbtk'Code for Insight, the GDB TK-based GUI front-end.`mi'The "GDB/MI", the GDB Machine Interface interpreter.`signals'Target signal translation code.`tui'Code for "TUI", the GDB Text-mode full-screen User Interface.*Note TUI: User Interface.File: gdbint.info, Node: Algorithms, Next: User Interface, Prev: Overall Structure, Up: Top3 Algorithms************GDB uses a number of debugging-specific algorithms. They are often notvery complicated, but get lost in the thicket of special cases andreal-world issues. This chapter describes the basic algorithms andmentions some of the specific target definitions that they use.3.1 Frames==========A frame is a construct that GDB uses to keep track of calling andcalled functions.GDB's frame model, a fresh design, was implemented with the need tosupport DWARF's Call Frame Information in mind. In fact, the term"unwind" is taken directly from that specification. Developers wishingto learn more about unwinders, are encouraged to read the DWARFspecification.GDB's model is that you find a frame's registers by "unwinding" themfrom the next younger frame. That is, `get_frame_register' whichreturns the value of a register in frame #1 (the next-to-youngestframe), is implemented by calling frame #0's `frame_register_unwind'(the youngest frame). But then the obvious question is: how do youaccess the registers of the youngest frame itself?To answer this question, GDB has the "sentinel" frame, the "-1st"frame. Unwinding registers from the sentinel frame gives you thecurrent values of the youngest real frame's registers. If F is asentinel frame, then `get_frame_type (F) == SENTINEL_FRAME'.3.2 Prologue Analysis=====================To produce a backtrace and allow the user to manipulate older frames'variables and arguments, GDB needs to find the base addresses of olderframes, and discover where those frames' registers have been saved.Since a frame's "callee-saves" registers get saved by younger frames ifand when they're reused, a frame's registers may be scatteredunpredictably across younger frames. This means that changing thevalue of a register-allocated variable in an older frame may actuallyentail writing to a save slot in some younger frame.Modern versions of GCC emit Dwarf call frame information ("CFI"),which describes how to find frame base addresses and saved registers.But CFI is not always available, so as a fallback GDB uses a techniquecalled "prologue analysis" to find frame sizes and saved registers. Aprologue analyzer disassembles the function's machine code startingfrom its entry point, and looks for instructions that allocate framespace, save the stack pointer in a frame pointer register, saveregisters, and so on. Obviously, this can't be done accurately ingeneral, but it's tractable to do well enough to be very helpful.Prologue analysis predates the GNU toolchain's support for CFI; at onetime, prologue analysis was the only mechanism GDB used for stackunwinding at all, when the function calling conventions didn't specifya fixed frame layout.In the olden days, function prologues were generated by hand-written,target-specific code in GCC, and treated as opaque and untouchable byoptimizers. Looking at this code, it was usually straightforward towrite a prologue analyzer for GDB that would accurately understand allthe prologues GCC would generate. However, over time GCC became moreaggressive about instruction scheduling, and began to understand moreabout the semantics of the prologue instructions themselves; inresponse, GDB's analyzers became more complex and fragile. Keeping theprologue analyzers working as GCC (and the instruction sets themselves)evolved became a substantial task.To try to address this problem, the code in `prologue-value.h' and`prologue-value.c' provides a general framework for writing prologueanalyzers that are simpler and more robust than ad-hoc analyzers. Whenwe analyze a prologue using the prologue-value framework, we're reallydoing "abstract interpretation" or "pseudo-evaluation": running thefunction's code in simulation, but using conservative approximations ofthe values registers and memory would hold when the code actually runs.For example, if our function starts with the instruction:addi r1, 42 # add 42 to r1we don't know exactly what value will be in `r1' after executingthis instruction, but we do know it'll be 42 greater than its originalvalue.If we then see an instruction like:addi r1, 22 # add 22 to r1we still don't know what `r1's' value is, but again, we can say itis now 64 greater than its original value.If the next instruction were:mov r2, r1 # set r2 to r1's valuethen we can say that `r2's' value is now the original value of `r1'plus 64.It's common for prologues to save registers on the stack, so we'llneed to track the values of stack frame slots, as well as theregisters. So after an instruction like this:mov (fp+4), r2then we'd know that the stack slot four bytes above the frame pointerholds the original value of `r1' plus 64.And so on.Of course, this can only go so far before it gets unreasonable. Ifwe wanted to be able to say anything about the value of `r1' after theinstruction:xor r1, r3 # exclusive-or r1 and r3, place result in r1then things would get pretty complex. But remember, we're just doinga conservative approximation; if exclusive-or instructions aren'trelevant to prologues, we can just say `r1''s value is now "unknown".We can ignore things that are too complex, if that loss of informationis acceptable for our application.So when we say "conservative approximation" here, what we mean is anapproximation that is either accurate, or marked "unknown", but neverinaccurate.Using this framework, a prologue analyzer is simply an interpreterfor machine code, but one that uses conservative approximations for thecontents of registers and memory instead of actual values. Startingfrom the function's entry point, you simulate instructions up to thecurrent PC, or an instruction that you don't know how to simulate. Nowyou can examine the state of the registers and stack slots you've kepttrack of.* To see how large your stack frame is, just check the value of thestack pointer register; if it's the original value of the SP minusa constant, then that constant is the stack frame's size. If theSP's value has been marked as "unknown", then that means theprologue has done something too complex for us to track, and wedon't know the frame size.* To see where we've saved the previous frame's registers, we justsearch the values we've tracked -- stack slots, usually, butregisters, too, if you want -- for something equal to theregister's original value. If the calling conventions suggest astandard place to save a given register, then we can check therefirst, but really, anything that will get us back the originalvalue will probably work.This does take some work. But prologue analyzers aren'tquick-and-simple pattern patching to recognize a few fixed prologueforms any more; they're big, hairy functions. Along with inferiorfunction calls, prologue analysis accounts for a substantial portion ofthe time needed to stabilize a GDB port. So it's worthwhile to lookfor an approach that will be easier to understand and maintain. In theapproach described above:* It's easier to see that the analyzer is correct: you just seewhether the analyzer properly (albeit conservatively) simulatesthe effect of each instruction.* It's easier to extend the analyzer: you can add support for newinstructions, and know that you haven't broken anything thatwasn't already broken before.* It's orthogonal: to gather new information, you don't need tocomplicate the code for each instruction. As long as your domainof conservative values is already detailed enough to tell you whatyou need, then all the existing instruction simulations arealready gathering the right data for you.The file `prologue-value.h' contains detailed comments explainingthe framework and how to use it.3.3 Breakpoint Handling=======================In general, a breakpoint is a user-designated location in the programwhere the user wants to regain control if program execution ever reachesthat location.There are two main ways to implement breakpoints; either as"hardware" breakpoints or as "software" breakpoints.Hardware breakpoints are sometimes available as a builtin debuggingfeatures with some chips. Typically these work by having dedicatedregister into which the breakpoint address may be stored. If the PC(shorthand for "program counter") ever matches a value in a breakpointregisters, the CPU raises an exception and reports it to GDB.Another possibility is when an emulator is in use; many emulatorsinclude circuitry that watches the address lines coming out from theprocessor, and force it to stop if the address matches a breakpoint'saddress.A third possibility is that the target already has the ability to dobreakpoints somehow; for instance, a ROM monitor may do its ownsoftware breakpoints. So although these are not literally "hardwarebreakpoints", from GDB's point of view they work the same; GDB need notdo anything more than set the breakpoint and wait for something tohappen.Since they depend on hardware resources, hardware breakpoints may belimited in number; when the user asks for more, GDB will start tryingto set software breakpoints. (On some architectures, notably the32-bit x86 platforms, GDB cannot always know whether there's enoughhardware resources to insert all the hardware breakpoints andwatchpoints. On those platforms, GDB prints an error message only whenthe program being debugged is continued.)Software breakpoints require GDB to do somewhat more work. Thebasic theory is that GDB will replace a program instruction with atrap, illegal divide, or some other instruction that will cause anexception, and then when it's encountered, GDB will take the exceptionand stop the program. When the user says to continue, GDB will restorethe original instruction, single-step, re-insert the trap, and continueon.Since it literally overwrites the program being tested, the programarea must be writable, so this technique won't work on programs in ROM.It can also distort the behavior of programs that examine themselves,although such a situation would be highly unusual.Also, the software breakpoint instruction should be the smallestsize of instruction, so it doesn't overwrite an instruction that mightbe a jump target, and cause disaster when the program jumps into themiddle of the breakpoint instruction. (Strictly speaking, thebreakpoint must be no larger than the smallest interval betweeninstructions that may be jump targets; perhaps there is an architecturewhere only even-numbered instructions may jumped to.) Note that it'spossible for an instruction set not to have any instructions usable fora software breakpoint, although in practice only the ARC has failed todefine such an instruction.The basic definition of the software breakpoint is the macro`BREAKPOINT'.Basic breakpoint object handling is in `breakpoint.c'. However,much of the interesting breakpoint action is in `infrun.c'.`target_remove_breakpoint (BP_TGT)'`target_insert_breakpoint (BP_TGT)'Insert or remove a software breakpoint at address`BP_TGT->placed_address'. Returns zero for success, non-zero forfailure. On input, BP_TGT contains the address of the breakpoint,and is otherwise initialized to zero. The fields of the `structbp_target_info' pointed to by BP_TGT are updated to contain otherinformation about the breakpoint on output. The field`placed_address' may be updated if the breakpoint was placed at arelated address; the field `shadow_contents' contains the realcontents of the bytes where the breakpoint has been inserted, ifreading memory would return the breakpoint instead of theunderlying memory; the field `shadow_len' is the length of memorycached in `shadow_contents', if any; and the field `placed_size'is optionally set and used by the target, if it could differ from`shadow_len'.For example, the remote target `Z0' packet does not requireshadowing memory, so `shadow_len' is left at zero. However, thelength reported by `gdbarch_breakpoint_from_pc' is cached in`placed_size', so that a matching `z0' packet can be used toremove the breakpoint.`target_remove_hw_breakpoint (BP_TGT)'`target_insert_hw_breakpoint (BP_TGT)'Insert or remove a hardware-assisted breakpoint at address`BP_TGT->placed_address'. Returns zero for success, non-zero forfailure. See `target_insert_breakpoint' for a description of the`struct bp_target_info' pointed to by BP_TGT; the`shadow_contents' and `shadow_len' members are not used forhardware breakpoints, but `placed_size' may be.3.4 Single Stepping===================3.5 Signal Handling===================3.6 Thread Handling===================3.7 Inferior Function Calls===========================3.8 Longjmp Support===================GDB has support for figuring out that the target is doing a `longjmp'and for stopping at the target of the jump, if we are stepping. Thisis done with a few specialized internal breakpoints, which are visiblein the output of the `maint info breakpoint' command.To make this work, you need to define a function called`gdbarch_get_longjmp_target', which will examine the `jmp_buf'structure and extract the longjmp target address. Since `jmp_buf' istarget specific, you will need to define it in the appropriate`tm-TARGET.h' file. Look in `tm-sun4os4.h' and `sparc-tdep.c' forexamples of how to do this.3.9 Watchpoints===============Watchpoints are a special kind of breakpoints (*note breakpoints:Algorithms.) which break when data is accessed rather than when someinstruction is executed. When you have data which changes without yourknowing what code does that, watchpoints are the silver bullet to huntdown and kill such bugs.Watchpoints can be either hardware-assisted or not; the latter typeis known as "software watchpoints." GDB always uses hardware-assistedwatchpoints if they are available, and falls back on softwarewatchpoints otherwise. Typical situations where GDB will use softwarewatchpoints are:* The watched memory region is too large for the underlying hardwarewatchpoint support. For example, each x86 debug register canwatch up to 4 bytes of memory, so trying to watch data structureswhose size is more than 16 bytes will cause GDB to use softwarewatchpoints.* The value of the expression to be watched depends on data held inregisters (as opposed to memory).* Too many different watchpoints requested. (On some architectures,this situation is impossible to detect until the debugged programis resumed.) Note that x86 debug registers are used both forhardware breakpoints and for watchpoints, so setting too manyhardware breakpoints might cause watchpoint insertion to fail.* No hardware-assisted watchpoints provided by the targetimplementation.Software watchpoints are very slow, since GDB needs to single-stepthe program being debugged and test the value of the watchedexpression(s) after each instruction. The rest of this section ismostly irrelevant for software watchpoints.When the inferior stops, GDB tries to establish, among otherpossible reasons, whether it stopped due to a watchpoint being hit. Itfirst uses `STOPPED_BY_WATCHPOINT' to see if any watchpoint was hit.If not, all watchpoint checking is skipped.Then GDB calls `target_stopped_data_address' exactly once. Thismethod returns the address of the watchpoint which triggered, if thetarget can determine it. If the triggered address is available, GDBcompares the address returned by this method with each watched memoryaddress in each active watchpoint. For data-read and data-accesswatchpoints, GDB announces every watchpoint that watches the triggeredaddress as being hit. For this reason, data-read and data-accesswatchpoints _require_ that the triggered address be available; if not,read and access watchpoints will never be considered hit. Fordata-write watchpoints, if the triggered address is available, GDBconsiders only those watchpoints which match that address; otherwise,GDB considers all data-write watchpoints. For each data-writewatchpoint that GDB considers, it evaluates the expression whose valueis being watched, and tests whether the watched value has changed.Watchpoints whose watched values have changed are announced as hit.GDB uses several macros and primitives to support hardwarewatchpoints:`TARGET_HAS_HARDWARE_WATCHPOINTS'If defined, the target supports hardware watchpoints.`TARGET_CAN_USE_HARDWARE_WATCHPOINT (TYPE, COUNT, OTHER)'Return the number of hardware watchpoints of type TYPE that arepossible to be set. The value is positive if COUNT watchpoints ofthis type can be set, zero if setting watchpoints of this type isnot supported, and negative if COUNT is more than the maximumnumber of watchpoints of type TYPE that can be set. OTHER isnon-zero if other types of watchpoints are currently enabled (thereare architectures which cannot set watchpoints of different typesat the same time).`TARGET_REGION_OK_FOR_HW_WATCHPOINT (ADDR, LEN)'Return non-zero if hardware watchpoints can be used to watch aregion whose address is ADDR and whose length in bytes is LEN.`target_insert_watchpoint (ADDR, LEN, TYPE)'`target_remove_watchpoint (ADDR, LEN, TYPE)'Insert or remove a hardware watchpoint starting at ADDR, for LENbytes. TYPE is the watchpoint type, one of the possible values ofthe enumerated data type `target_hw_bp_type', defined by`breakpoint.h' as follows:enum target_hw_bp_type{hw_write = 0, /* Common (write) HW watchpoint */hw_read = 1, /* Read HW watchpoint */hw_access = 2, /* Access (read or write) HW watchpoint */hw_execute = 3 /* Execute HW breakpoint */};These two macros should return 0 for success, non-zero for failure.`target_stopped_data_address (ADDR_P)'If the inferior has some watchpoint that triggered, place theaddress associated with the watchpoint at the location pointed toby ADDR_P and return non-zero. Otherwise, return zero. This isrequired for data-read and data-access watchpoints. It is notrequired for data-write watchpoints, but GDB uses it to improvehandling of those also.GDB will only call this method once per watchpoint stop,immediately after calling `STOPPED_BY_WATCHPOINT'. If thetarget's watchpoint indication is sticky, i.e., stays set afterresuming, this method should clear it. For instance, the x86 debugcontrol register has sticky triggered flags.`HAVE_STEPPABLE_WATCHPOINT'If defined to a non-zero value, it is not necessary to disable awatchpoint to step over it. Like`gdbarch_have_nonsteppable_watchpoint', this is usually set whenwatchpoints trigger at the instruction which will perform aninteresting read or write. It should be set if there is atemporary disable bit which allows the processor to step over theinteresting instruction without raising the watchpoint exceptionagain.`int gdbarch_have_nonsteppable_watchpoint (GDBARCH)'If it returns a non-zero value, GDB should disable a watchpoint tostep the inferior over it. This is usually set when watchpointstrigger at the instruction which will perform an interesting reador write.`HAVE_CONTINUABLE_WATCHPOINT'If defined to a non-zero value, it is possible to continue theinferior after a watchpoint has been hit. This is usually setwhen watchpoints trigger at the instruction following aninteresting read or write.`CANNOT_STEP_HW_WATCHPOINTS'If this is defined to a non-zero value, GDB will remove allwatchpoints before stepping the inferior.`STOPPED_BY_WATCHPOINT (WAIT_STATUS)'Return non-zero if stopped by a watchpoint. WAIT_STATUS is of thetype `struct target_waitstatus', defined by `target.h'. Normally,this macro is defined to invoke the function pointed to by the`to_stopped_by_watchpoint' member of the structure (of the type`target_ops', defined on `target.h') that describes thetarget-specific operations; `to_stopped_by_watchpoint' ignores theWAIT_STATUS argument.GDB does not require the non-zero value returned by`STOPPED_BY_WATCHPOINT' to be 100% correct, so if a target cannotdetermine for sure whether the inferior stopped due to awatchpoint, it could return non-zero "just in case".3.9.1 Watchpoints and Threads-----------------------------GDB only supports process-wide watchpoints, which trigger in allthreads. GDB uses the thread ID to make watchpoints act as if theywere thread-specific, but it cannot set hardware watchpoints that onlytrigger in a specific thread. Therefore, even if the target supportsthreads, per-thread debug registers, and watchpoints which only affecta single thread, it should set the per-thread debug registers for allthreads to the same value. On GNU/Linux native targets, this isaccomplished by using `ALL_LWPS' in `target_insert_watchpoint' and`target_remove_watchpoint' and by using `linux_set_new_thread' toregister a handler for newly created threads.GDB's GNU/Linux support only reports a single event at a time,although multiple events can trigger simultaneously for multi-threadedprograms. When multiple events occur, `linux-nat.c' queues subsequentevents and returns them the next time the program is resumed. Thismeans that `STOPPED_BY_WATCHPOINT' and `target_stopped_data_address'only need to consult the current thread's state--the thread indicatedby `inferior_ptid'. If two threads have hit watchpointssimultaneously, those routines will be called a second time for thesecond thread.3.9.2 x86 Watchpoints---------------------The 32-bit Intel x86 (a.k.a. ia32) processors feature special debugregisters designed to facilitate debugging. GDB provides a genericlibrary of functions that x86-based ports can use to implement supportfor watchpoints and hardware-assisted breakpoints. This subsectiondocuments the x86 watchpoint facilities in GDB.To use the generic x86 watchpoint support, a port should do thefollowing:* Define the macro `I386_USE_GENERIC_WATCHPOINTS' somewhere in thetarget-dependent headers.* Include the `config/i386/nm-i386.h' header file _after_ defining`I386_USE_GENERIC_WATCHPOINTS'.* Add `i386-nat.o' to the value of the Make variable `NATDEPFILES'(*note NATDEPFILES: Native Debugging.) or `TDEPFILES' (*noteTDEPFILES: Target Architecture Definition.).* Provide implementations for the `I386_DR_LOW_*' macros describedbelow. Typically, each macro should call a target-specificfunction which does the real work.The x86 watchpoint support works by maintaining mirror images of thedebug registers. Values are copied between the mirror images and thereal debug registers via a set of macros which each target needs toprovide:`I386_DR_LOW_SET_CONTROL (VAL)'Set the Debug Control (DR7) register to the value VAL.`I386_DR_LOW_SET_ADDR (IDX, ADDR)'Put the address ADDR into the debug register number IDX.`I386_DR_LOW_RESET_ADDR (IDX)'Reset (i.e. zero out) the address stored in the debug registernumber IDX.`I386_DR_LOW_GET_STATUS'Return the value of the Debug Status (DR6) register. This value isused immediately after it is returned by `I386_DR_LOW_GET_STATUS',so as to support per-thread status register values.For each one of the 4 debug registers (whose indices are from 0 to 3)that store addresses, a reference count is maintained by GDB, to allowsharing of debug registers by several watchpoints. This allows usersto define several watchpoints that watch the same expression, but withdifferent conditions and/or commands, without wasting debug registerswhich are in short supply. GDB maintains the reference countsinternally, targets don't have to do anything to use this feature.The x86 debug registers can each watch a region that is 1, 2, or 4bytes long. The ia32 architecture requires that each watched region beappropriately aligned: 2-byte region on 2-byte boundary, 4-byte regionon 4-byte boundary. However, the x86 watchpoint support in GDB canwatch unaligned regions and regions larger than 4 bytes (up to 16bytes) by allocating several debug registers to watch a single region.This allocation of several registers per a watched region is also doneautomatically without target code intervention.The generic x86 watchpoint support provides the following API for theGDB's application code:`i386_region_ok_for_watchpoint (ADDR, LEN)'The macro `TARGET_REGION_OK_FOR_HW_WATCHPOINT' is set to call thisfunction. It counts the number of debug registers required towatch a given region, and returns a non-zero value if that numberis less than 4, the number of debug registers available to x86processors.`i386_stopped_data_address (ADDR_P)'The target function `target_stopped_data_address' is set to callthis function. This function examines the breakpoint conditionbits in the DR6 Debug Status register, as returned by the`I386_DR_LOW_GET_STATUS' macro, and returns the address associatedwith the first bit that is set in DR6.`i386_stopped_by_watchpoint (void)'The macro `STOPPED_BY_WATCHPOINT' is set to call this function.The argument passed to `STOPPED_BY_WATCHPOINT' is ignored. Thisfunction examines the breakpoint condition bits in the DR6 DebugStatus register, as returned by the `I386_DR_LOW_GET_STATUS'macro, and returns true if any bit is set. Otherwise, false isreturned.`i386_insert_watchpoint (ADDR, LEN, TYPE)'`i386_remove_watchpoint (ADDR, LEN, TYPE)'Insert or remove a watchpoint. The macros`target_insert_watchpoint' and `target_remove_watchpoint' are setto call these functions. `i386_insert_watchpoint' first looks fora debug register which is already set to watch the same region forthe same access types; if found, it just increments the referencecount of that debug register, thus implementing debug registersharing between watchpoints. If no such register is found, thefunction looks for a vacant debug register, sets its mirroredvalue to ADDR, sets the mirrored value of DR7 Debug Controlregister as appropriate for the LEN and TYPE parameters, and thenpasses the new values of the debug register and DR7 to theinferior by calling `I386_DR_LOW_SET_ADDR' and`I386_DR_LOW_SET_CONTROL'. If more than one debug register isrequired to cover the given region, the above process is repeatedfor each debug register.`i386_remove_watchpoint' does the opposite: it resets the addressin the mirrored value of the debug register and its read/write andlength bits in the mirrored value of DR7, then passes these newvalues to the inferior via `I386_DR_LOW_RESET_ADDR' and`I386_DR_LOW_SET_CONTROL'. If a register is shared by severalwatchpoints, each time a `i386_remove_watchpoint' is called, itdecrements the reference count, and only calls`I386_DR_LOW_RESET_ADDR' and `I386_DR_LOW_SET_CONTROL' when thecount goes to zero.`i386_insert_hw_breakpoint (BP_TGT)'`i386_remove_hw_breakpoint (BP_TGT)'These functions insert and remove hardware-assisted breakpoints.The macros `target_insert_hw_breakpoint' and`target_remove_hw_breakpoint' are set to call these functions.The argument is a `struct bp_target_info *', as described in thedocumentation for `target_insert_breakpoint'. These functionswork like `i386_insert_watchpoint' and `i386_remove_watchpoint',respectively, except that they set up the debug registers to watchinstruction execution, and each hardware-assisted breakpointalways requires exactly one debug register.`i386_stopped_by_hwbp (void)'This function returns non-zero if the inferior has some watchpointor hardware breakpoint that triggered. It works like`i386_stopped_data_address', except that it doesn't record theaddress whose watchpoint triggered.`i386_cleanup_dregs (void)'This function clears all the reference counts, addresses, andcontrol bits in the mirror images of the debug registers. Itdoesn't affect the actual debug registers in the inferior process.*Notes:*1. x86 processors support setting watchpoints on I/O reads or writes.However, since no target supports this (as of March 2001), andsince `enum target_hw_bp_type' doesn't even have an enumerationfor I/O watchpoints, this feature is not yet available to GDBrunning on x86.2. x86 processors can enable watchpoints locally, for the current taskonly, or globally, for all the tasks. For each debug register,there's a bit in the DR7 Debug Control register that determineswhether the associated address is watched locally or globally. Thecurrent implementation of x86 watchpoint support in GDB alwayssets watchpoints to be locally enabled, since global watchpointsmight interfere with the underlying OS and are probablyunavailable in many platforms.3.10 Checkpoints================In the abstract, a checkpoint is a point in the execution history ofthe program, which the user may wish to return to at some later time.Internally, a checkpoint is a saved copy of the program state,including whatever information is required in order to restore theprogram to that state at a later time. This can be expected to includethe state of registers and memory, and may include external state suchas the state of open files and devices.There are a number of ways in which checkpoints may be implementedin gdb, e.g. as corefiles, as forked processes, and as some opaquemethod implemented on the target side.A corefile can be used to save an image of target memory and registerstate, which can in principle be restored later -- but corefiles do nottypically include information about external entities such as openfiles. Currently this method is not implemented in gdb.A forked process can save the state of user memory and registers, aswell as some subset of external (kernel) state. This method is used toimplement checkpoints on Linux, and in principle might be used on othersystems.Some targets, e.g. simulators, might have their own built-in methodfor saving checkpoints, and gdb might be able to take advantage of thatcapability without necessarily knowing any details of how it is done.3.11 Observing changes in GDB internals=======================================In order to function properly, several modules need to be notified whensome changes occur in the GDB internals. Traditionally, these moduleshave relied on several paradigms, the most common ones being hooks andgdb-events. Unfortunately, none of these paradigms was versatileenough to become the standard notification mechanism in GDB. The factthat they only supported one "client" was also a strong limitation.A new paradigm, based on the Observer pattern of the `DesignPatterns' book, has therefore been implemented. The goal was to providea new interface overcoming the issues with the notification mechanismspreviously available. This new interface needed to be strongly typed,easy to extend, and versatile enough to be used as the standardinterface when adding new notifications.See *Note GDB Observers:: for a brief description of the observerscurrently implemented in GDB. The rationale for the currentimplementation is also briefly discussed.File: gdbint.info, Node: User Interface, Next: libgdb, Prev: Algorithms, Up: Top4 User Interface****************GDB has several user interfaces. Although the command-line interfaceis the most common and most familiar, there are others.4.1 Command Interpreter=======================The command interpreter in GDB is fairly simple. It is designed toallow for the set of commands to be augmented dynamically, and also hasa recursive subcommand capability, where the first argument to acommand may itself direct a lookup on a different command list.For instance, the `set' command just starts a lookup on the`setlist' command list, while `set thread' recurses to the`set_thread_cmd_list'.To add commands in general, use `add_cmd'. `add_com' adds to themain command list, and should be used for those commands. The usualplace to add commands is in the `_initialize_XYZ' routines at the endsof most source files.To add paired `set' and `show' commands, use `add_setshow_cmd' or`add_setshow_cmd_full'. The former is a slightly simpler interfacewhich is useful when you don't need to further modify the new commandstructures, while the latter returns the new command structures formanipulation.Before removing commands from the command set it is a good idea todeprecate them for some time. Use `deprecate_cmd' on commands oraliases to set the deprecated flag. `deprecate_cmd' takes a `structcmd_list_element' as it's first argument. You can use the return valuefrom `add_com' or `add_cmd' to deprecate the command immediately afterit is created.The first time a command is used the user will be warned and offereda replacement (if one exists). Note that the replacement string passedto `deprecate_cmd' should be the full name of the command, i.e., theentire string the user should type at the command line.4.2 UI-Independent Output--the `ui_out' Functions=================================================The `ui_out' functions present an abstraction level for the GDB outputcode. They hide the specifics of different user interfaces supportedby GDB, and thus free the programmer from the need to write severalversions of the same code, one each for every UI, to produce output.4.2.1 Overview and Terminology------------------------------In general, execution of each GDB command produces some sort of output,and can even generate an input request.Output can be generated for the following purposes:* to display a _result_ of an operation;* to convey _info_ or produce side-effects of a requested operation;* to provide a _notification_ of an asynchronous event (includingprogress indication of a prolonged asynchronous operation);* to display _error messages_ (including warnings);* to show _debug data_;* to _query_ or prompt a user for input (a special case).This section mainly concentrates on how to build result output,although some of it also applies to other kinds of output.Generation of output that displays the results of an operationinvolves one or more of the following:* output of the actual data* formatting the output as appropriate for console output, to make iteasily readable by humans* machine oriented formatting-a more terse formatting to allow foreasy parsing by programs which read GDB's output* annotation, whose purpose is to help legacy GUIs to identifyinteresting parts in the outputThe `ui_out' routines take care of the first three aspects.Annotations are provided by separate annotation routines. Note that useof annotations for an interface between a GUI and GDB is deprecated.Output can be in the form of a single item, which we call a "field";a "list" consisting of identical fields; a "tuple" consisting ofnon-identical fields; or a "table", which is a tuple consisting of aheader and a body. In a BNF-like form:`<table> ==>'`<header> <body>'`<header> ==>'`{ <column> }'`<column> ==>'`<width> <alignment> <title>'`<body> ==>'`{<row>}'4.2.2 General Conventions-------------------------Most `ui_out' routines are of type `void', the exceptions are`ui_out_stream_new' (which returns a pointer to the newly createdobject) and the `make_cleanup' routines.The first parameter is always the `ui_out' vector object, a pointerto a `struct ui_out'.The FORMAT parameter is like in `printf' family of functions. Whenit is present, there must also be a variable list of argumentssufficient used to satisfy the `%' specifiers in the supplied format.When a character string argument is not used in a `ui_out' functioncall, a `NULL' pointer has to be supplied instead.4.2.3 Table, Tuple and List Functions-------------------------------------This section introduces `ui_out' routines for building lists, tuplesand tables. The routines to output the actual data items (fields) arepresented in the next section.To recap: A "tuple" is a sequence of "fields", each field containinginformation about an object; a "list" is a sequence of fields whereeach field describes an identical object.Use the "table" functions when your output consists of a list ofrows (tuples) and the console output should include a heading. Use thiseven when you are listing just one object but you still want the header.Tables can not be nested. Tuples and lists can be nested up to amaximum of five levels.The overall structure of the table output code is something likethis:ui_out_table_beginui_out_table_header...ui_out_table_bodyui_out_tuple_beginui_out_field_*...ui_out_tuple_end...ui_out_table_endHere is the description of table-, tuple- and list-related `ui_out'functions:-- Function: void ui_out_table_begin (struct ui_out *UIOUT, intNBROFCOLS, int NR_ROWS, const char *TBLID)The function `ui_out_table_begin' marks the beginning of the outputof a table. It should always be called before any other `ui_out'function for a given table. NBROFCOLS is the number of columns inthe table. NR_ROWS is the number of rows in the table. TBLID isan optional string identifying the table. The string pointed toby TBLID is copied by the implementation of `ui_out_table_begin',so the application can free the string if it was `malloc'ed.The companion function `ui_out_table_end', described below, marksthe end of the table's output.-- Function: void ui_out_table_header (struct ui_out *UIOUT, intWIDTH, enum ui_align ALIGNMENT, const char *COLHDR)`ui_out_table_header' provides the header information for a singletable column. You call this function several times, one each forevery column of the table, after `ui_out_table_begin', but before`ui_out_table_body'.The value of WIDTH gives the column width in characters. Thevalue of ALIGNMENT is one of `left', `center', and `right', and itspecifies how to align the header: left-justify, center, orright-justify it. COLHDR points to a string that specifies thecolumn header; the implementation copies that string, so columnheader strings in `malloc'ed storage can be freed after the call.-- Function: void ui_out_table_body (struct ui_out *UIOUT)This function delimits the table header from the table body.-- Function: void ui_out_table_end (struct ui_out *UIOUT)This function signals the end of a table's output. It should becalled after the table body has been produced by the list andfield output functions.There should be exactly one call to `ui_out_table_end' for eachcall to `ui_out_table_begin', otherwise the `ui_out' functionswill signal an internal error.The output of the tuples that represent the table rows must followthe call to `ui_out_table_body' and precede the call to`ui_out_table_end'. You build a tuple by calling `ui_out_tuple_begin'and `ui_out_tuple_end', with suitable calls to functions which actuallyoutput fields between them.-- Function: void ui_out_tuple_begin (struct ui_out *UIOUT, const char*ID)This function marks the beginning of a tuple output. ID points toan optional string that identifies the tuple; it is copied by theimplementation, and so strings in `malloc'ed storage can be freedafter the call.-- Function: void ui_out_tuple_end (struct ui_out *UIOUT)This function signals an end of a tuple output. There should beexactly one call to `ui_out_tuple_end' for each call to`ui_out_tuple_begin', otherwise an internal GDB error will besignaled.-- Function: struct cleanup *make_cleanup_ui_out_tuple_begin_end(struct ui_out *UIOUT, const char *ID)This function first opens the tuple and then establishes a cleanup(*note Cleanups: Coding.) to close the tuple. It provides aconvenient and correct implementation of the non-portable(1) codesequence:struct cleanup *old_cleanup;ui_out_tuple_begin (uiout, "...");old_cleanup = make_cleanup ((void(*)(void *)) ui_out_tuple_end,uiout);-- Function: void ui_out_list_begin (struct ui_out *UIOUT, const char*ID)This function marks the beginning of a list output. ID points toan optional string that identifies the list; it is copied by theimplementation, and so strings in `malloc'ed storage can be freedafter the call.-- Function: void ui_out_list_end (struct ui_out *UIOUT)This function signals an end of a list output. There should beexactly one call to `ui_out_list_end' for each call to`ui_out_list_begin', otherwise an internal GDB error will besignaled.-- Function: struct cleanup *make_cleanup_ui_out_list_begin_end(struct ui_out *UIOUT, const char *ID)Similar to `make_cleanup_ui_out_tuple_begin_end', this functionopens a list and then establishes cleanup (*note Cleanups: Coding.)that will close the list.4.2.4 Item Output Functions---------------------------The functions described below produce output for the actual data items,or fields, which contain information about the object.Choose the appropriate function accordingly to your particular needs.-- Function: void ui_out_field_fmt (struct ui_out *UIOUT, char*FLDNAME, char *FORMAT, ...)This is the most general output function. It produces therepresentation of the data in the variable-length argument listaccording to formatting specifications in FORMAT, a `printf'-likeformat string. The optional argument FLDNAME supplies the name ofthe field. The data items themselves are supplied as additionalarguments after FORMAT.This generic function should be used only when it is not possibleto use one of the specialized versions (see below).-- Function: void ui_out_field_int (struct ui_out *UIOUT, const char*FLDNAME, int VALUE)This function outputs a value of an `int' variable. It uses the`"%d"' output conversion specification. FLDNAME specifies thename of the field.-- Function: void ui_out_field_fmt_int (struct ui_out *UIOUT, intWIDTH, enum ui_align ALIGNMENT, const char *FLDNAME, intVALUE)This function outputs a value of an `int' variable. It differsfrom `ui_out_field_int' in that the caller specifies the desiredWIDTH and ALIGNMENT of the output. FLDNAME specifies the name ofthe field.-- Function: void ui_out_field_core_addr (struct ui_out *UIOUT, constchar *FLDNAME, CORE_ADDR ADDRESS)This function outputs an address.-- Function: void ui_out_field_string (struct ui_out *UIOUT, constchar *FLDNAME, const char *STRING)This function outputs a string using the `"%s"' conversionspecification.Sometimes, there's a need to compose your output piece by piece usingfunctions that operate on a stream, such as `value_print' or`fprintf_symbol_filtered'. These functions accept an argument of thetype `struct ui_file *', a pointer to a `ui_file' object used to storethe data stream used for the output. When you use one of thesefunctions, you need a way to pass their results stored in a `ui_file'object to the `ui_out' functions. To this end, you first create a`ui_stream' object by calling `ui_out_stream_new', pass the `stream'member of that `ui_stream' object to `value_print' and similarfunctions, and finally call `ui_out_field_stream' to output the fieldyou constructed. When the `ui_stream' object is no longer needed, youshould destroy it and free its memory by calling `ui_out_stream_delete'.-- Function: struct ui_stream *ui_out_stream_new (struct ui_out *UIOUT)This function creates a new `ui_stream' object which uses the sameoutput methods as the `ui_out' object whose pointer is passed inUIOUT. It returns a pointer to the newly created `ui_stream'object.-- Function: void ui_out_stream_delete (struct ui_stream *STREAMBUF)This functions destroys a `ui_stream' object specified bySTREAMBUF.-- Function: void ui_out_field_stream (struct ui_out *UIOUT, constchar *FIELDNAME, struct ui_stream *STREAMBUF)This function consumes all the data accumulated in`streambuf->stream' and outputs it like `ui_out_field_string'does. After a call to `ui_out_field_stream', the accumulated datano longer exists, but the stream is still valid and may be usedfor producing more fields.*Important:* If there is any chance that your code could bail outbefore completing output generation and reaching the point where`ui_out_stream_delete' is called, it is necessary to set up a cleanup,to avoid leaking memory and other resources. Here's a skeleton code todo that:struct ui_stream *mybuf = ui_out_stream_new (uiout);struct cleanup *old = make_cleanup (ui_out_stream_delete, mybuf);...do_cleanups (old);If the function already has the old cleanup chain set (for otherkinds of cleanups), you just have to add your cleanup to it:mybuf = ui_out_stream_new (uiout);make_cleanup (ui_out_stream_delete, mybuf);Note that with cleanups in place, you should not call`ui_out_stream_delete' directly, or you would attempt to free the samebuffer twice.4.2.5 Utility Output Functions-------------------------------- Function: void ui_out_field_skip (struct ui_out *UIOUT, const char*FLDNAME)This function skips a field in a table. Use it if you have toleave an empty field without disrupting the table alignment. Theargument FLDNAME specifies a name for the (missing) filed.-- Function: void ui_out_text (struct ui_out *UIOUT, const char*STRING)This function outputs the text in STRING in a way that makes iteasy to be read by humans. For example, the consoleimplementation of this method filters the text through a built-inpager, to prevent it from scrolling off the visible portion of thescreen.Use this function for printing relatively long chunks of textaround the actual field data: the text it produces is not alignedaccording to the table's format. Use `ui_out_field_string' tooutput a string field, and use `ui_out_message', described below,to output short messages.-- Function: void ui_out_spaces (struct ui_out *UIOUT, int NSPACES)This function outputs NSPACES spaces. It is handy to align thetext produced by `ui_out_text' with the rest of the table or list.-- Function: void ui_out_message (struct ui_out *UIOUT, int VERBOSITY,const char *FORMAT, ...)This function produces a formatted message, provided that thecurrent verbosity level is at least as large as given byVERBOSITY. The current verbosity level is specified by the userwith the `set verbositylevel' command.(2)-- Function: void ui_out_wrap_hint (struct ui_out *UIOUT, char *INDENT)This function gives the console output filter (a paging filter) ahint of where to break lines which are too long. Ignored for allother output consumers. INDENT, if non-`NULL', is the string tobe printed to indent the wrapped text on the next line; it mustremain accessible until the next call to `ui_out_wrap_hint', oruntil an explicit newline is produced by one of the otherfunctions. If INDENT is `NULL', the wrapped text will not beindented.-- Function: void ui_out_flush (struct ui_out *UIOUT)This function flushes whatever output has been accumulated so far,if the UI buffers output.4.2.6 Examples of Use of `ui_out' functions-------------------------------------------This section gives some practical examples of using the `ui_out'functions to generalize the old console-oriented code in GDB. Theexamples all come from functions defined on the `breakpoints.c' file.This example, from the `breakpoint_1' function, shows how to producea table.The original code was:if (!found_a_breakpoint++){annotate_breakpoints_headers ();annotate_field (0);printf_filtered ("Num ");annotate_field (1);printf_filtered ("Type ");annotate_field (2);printf_filtered ("Disp ");annotate_field (3);printf_filtered ("Enb ");if (addressprint){annotate_field (4);printf_filtered ("Address ");}annotate_field (5);printf_filtered ("What\n");annotate_breakpoints_table ();}Here's the new version:nr_printable_breakpoints = ...;if (addressprint)ui_out_table_begin (ui, 6, nr_printable_breakpoints, "BreakpointTable");elseui_out_table_begin (ui, 5, nr_printable_breakpoints, "BreakpointTable");if (nr_printable_breakpoints > 0)annotate_breakpoints_headers ();if (nr_printable_breakpoints > 0)annotate_field (0);ui_out_table_header (uiout, 3, ui_left, "number", "Num"); /* 1 */if (nr_printable_breakpoints > 0)annotate_field (1);ui_out_table_header (uiout, 14, ui_left, "type", "Type"); /* 2 */if (nr_printable_breakpoints > 0)annotate_field (2);ui_out_table_header (uiout, 4, ui_left, "disp", "Disp"); /* 3 */if (nr_printable_breakpoints > 0)annotate_field (3);ui_out_table_header (uiout, 3, ui_left, "enabled", "Enb"); /* 4 */if (addressprint){if (nr_printable_breakpoints > 0)annotate_field (4);if (gdbarch_addr_bit (current_gdbarch) <= 32)ui_out_table_header (uiout, 10, ui_left, "addr", "Address");/* 5 */elseui_out_table_header (uiout, 18, ui_left, "addr", "Address");/* 5 */}if (nr_printable_breakpoints > 0)annotate_field (5);ui_out_table_header (uiout, 40, ui_noalign, "what", "What"); /* 6 */ui_out_table_body (uiout);if (nr_printable_breakpoints > 0)annotate_breakpoints_table ();This example, from the `print_one_breakpoint' function, shows how toproduce the actual data for the table whose structure was defined inthe above example. The original code was:annotate_record ();annotate_field (0);printf_filtered ("%-3d ", b->number);annotate_field (1);if ((int)b->type > (sizeof(bptypes)/sizeof(bptypes[0]))|| ((int) b->type != bptypes[(int) b->type].type))internal_error ("bptypes table does not describe type #%d.",(int)b->type);printf_filtered ("%-14s ", bptypes[(int)b->type].description);annotate_field (2);printf_filtered ("%-4s ", bpdisps[(int)b->disposition]);annotate_field (3);printf_filtered ("%-3c ", bpenables[(int)b->enable]);...This is the new version:annotate_record ();ui_out_tuple_begin (uiout, "bkpt");annotate_field (0);ui_out_field_int (uiout, "number", b->number);annotate_field (1);if (((int) b->type > (sizeof (bptypes) / sizeof (bptypes[0])))|| ((int) b->type != bptypes[(int) b->type].type))internal_error ("bptypes table does not describe type #%d.",(int) b->type);ui_out_field_string (uiout, "type", bptypes[(int)b->type].description);annotate_field (2);ui_out_field_string (uiout, "disp", bpdisps[(int)b->disposition]);annotate_field (3);ui_out_field_fmt (uiout, "enabled", "%c", bpenables[(int)b->enable]);...This example, also from `print_one_breakpoint', shows how to producea complicated output field using the `print_expression' functions whichrequires a stream to be passed. It also shows how to automate streamdestruction with cleanups. The original code was:annotate_field (5);print_expression (b->exp, gdb_stdout);The new version is:struct ui_stream *stb = ui_out_stream_new (uiout);struct cleanup *old_chain = make_cleanup_ui_out_stream_delete (stb);...annotate_field (5);print_expression (b->exp, stb->stream);ui_out_field_stream (uiout, "what", local_stream);This example, also from `print_one_breakpoint', shows how to use`ui_out_text' and `ui_out_field_string'. The original code was:annotate_field (5);if (b->dll_pathname == NULL)printf_filtered ("<any library> ");elseprintf_filtered ("library \"%s\" ", b->dll_pathname);It became:annotate_field (5);if (b->dll_pathname == NULL){ui_out_field_string (uiout, "what", "<any library>");ui_out_spaces (uiout, 1);}else{ui_out_text (uiout, "library \"");ui_out_field_string (uiout, "what", b->dll_pathname);ui_out_text (uiout, "\" ");}The following example from `print_one_breakpoint' shows how to use`ui_out_field_int' and `ui_out_spaces'. The original code was:annotate_field (5);if (b->forked_inferior_pid != 0)printf_filtered ("process %d ", b->forked_inferior_pid);It became:annotate_field (5);if (b->forked_inferior_pid != 0){ui_out_text (uiout, "process ");ui_out_field_int (uiout, "what", b->forked_inferior_pid);ui_out_spaces (uiout, 1);}Here's an example of using `ui_out_field_string'. The original codewas:annotate_field (5);if (b->exec_pathname != NULL)printf_filtered ("program \"%s\" ", b->exec_pathname);It became:annotate_field (5);if (b->exec_pathname != NULL){ui_out_text (uiout, "program \"");ui_out_field_string (uiout, "what", b->exec_pathname);ui_out_text (uiout, "\" ");}Finally, here's an example of printing an address. The originalcode:annotate_field (4);printf_filtered ("%s ",hex_string_custom ((unsigned long) b->address, 8));It became:annotate_field (4);ui_out_field_core_addr (uiout, "Address", b->address);4.3 Console Printing====================4.4 TUI=======---------- Footnotes ----------(1) The function cast is not portable ISO C.(2) As of this writing (April 2001), setting verbosity level is notyet implemented, and is always returned as zero. So calling`ui_out_message' with a VERBOSITY argument more than zero will causethe message to never be printed.File: gdbint.info, Node: libgdb, Next: Symbol Handling, Prev: User Interface, Up: Top5 libgdb********5.1 libgdb 1.0==============`libgdb' 1.0 was an abortive project of years ago. The theory was toprovide an API to GDB's functionality.5.2 libgdb 2.0==============`libgdb' 2.0 is an ongoing effort to update GDB so that is better ableto support graphical and other environments.Since `libgdb' development is on-going, its architecture is stillevolving. The following components have so far been identified:* Observer - `gdb-events.h'.* Builder - `ui-out.h'* Event Loop - `event-loop.h'* Library - `gdb.h'The model that ties these components together is described below.5.3 The `libgdb' Model======================A client of `libgdb' interacts with the library in two ways.* As an observer (using `gdb-events') receiving notifications from`libgdb' of any internal state changes (break point changes, runstate, etc).* As a client querying `libgdb' (using the `ui-out' builder) toobtain various status values from GDB.Since `libgdb' could have multiple clients (e.g., a GUI supportingthe existing GDB CLI), those clients must co-operate when controlling`libgdb'. In particular, a client must ensure that `libgdb' is idle(i.e. no other client is using `libgdb') before responding to a`gdb-event' by making a query.5.4 CLI support===============At present GDB's CLI is very much entangled in with the core of`libgdb'. Consequently, a client wishing to include the CLI in theirinterface needs to carefully co-ordinate its own and the CLI'srequirements.It is suggested that the client set `libgdb' up to be bi-modal(alternate between CLI and client query modes). The notes below sketchout the theory:* The client registers itself as an observer of `libgdb'.* The client create and install `cli-out' builder using its ownversions of the `ui-file' `gdb_stderr', `gdb_stdtarg' and`gdb_stdout' streams.* The client creates a separate custom `ui-out' builder that is onlyused while making direct queries to `libgdb'.When the client receives input intended for the CLI, it simplypasses it along. Since the `cli-out' builder is installed by default,all the CLI output in response to that command is routed (pronouncedrooted) through to the client controlled `gdb_stdout' et. al. streams.At the same time, the client is kept abreast of internal changes byvirtue of being a `libgdb' observer.The only restriction on the client is that it must wait until`libgdb' becomes idle before initiating any queries (using the client'scustom builder).5.5 `libgdb' components=======================Observer - `gdb-events.h'-------------------------`gdb-events' provides the client with a very raw mechanism that can beused to implement an observer. At present it only allows for oneobserver and that observer must, internally, handle the need to delaythe processing of any event notifications until after `libgdb' hasfinished the current command.Builder - `ui-out.h'--------------------`ui-out' provides the infrastructure necessary for a client to create abuilder. That builder is then passed down to `libgdb' when doing anyqueries.Event Loop - `event-loop.h'---------------------------`event-loop', currently non-re-entrant, provides a simple event loop.A client would need to either plug its self into this loop or,implement a new event-loop that GDB would use.The event-loop will eventually be made re-entrant. This is so thatGDB can better handle the problem of some commands blocking instead ofreturning.Library - `gdb.h'-----------------`libgdb' is the most obvious component of this system. It provides thequery interface. Each function is parameterized by a `ui-out' builder.The result of the query is constructed using that builder before thequery function returns.File: gdbint.info, Node: Symbol Handling, Next: Language Support, Prev: libgdb, Up: Top6 Symbol Handling*****************Symbols are a key part of GDB's operation. Symbols include variables,functions, and types.6.1 Symbol Reading==================GDB reads symbols from "symbol files". The usual symbol file is thefile containing the program which GDB is debugging. GDB can bedirected to use a different file for symbols (with the `symbol-file'command), and it can also read more symbols via the `add-file' and`load' commands, or while reading symbols from shared libraries.Symbol files are initially opened by code in `symfile.c' using theBFD library (*note Support Libraries::). BFD identifies the type ofthe file by examining its header. `find_sym_fns' then uses thisidentification to locate a set of symbol-reading functions.Symbol-reading modules identify themselves to GDB by calling`add_symtab_fns' during their module initialization. The argument to`add_symtab_fns' is a `struct sym_fns' which contains the name (or nameprefix) of the symbol format, the length of the prefix, and pointers tofour functions. These functions are called at various times to processsymbol files whose identification matches the specified prefix.The functions supplied by each module are:`XYZ_symfile_init(struct sym_fns *sf)'Called from `symbol_file_add' when we are about to read a newsymbol file. This function should clean up any internal state(possibly resulting from half-read previous files, for example)and prepare to read a new symbol file. Note that the symbol filewhich we are reading might be a new "main" symbol file, or mightbe a secondary symbol file whose symbols are being added to theexisting symbol table.The argument to `XYZ_symfile_init' is a newly allocated `structsym_fns' whose `bfd' field contains the BFD for the new symbolfile being read. Its `private' field has been zeroed, and can bemodified as desired. Typically, a struct of private informationwill be `malloc''d, and a pointer to it will be placed in the`private' field.There is no result from `XYZ_symfile_init', but it can call`error' if it detects an unavoidable problem.`XYZ_new_init()'Called from `symbol_file_add' when discarding existing symbols.This function needs only handle the symbol-reading module'sinternal state; the symbol table data structures visible to therest of GDB will be discarded by `symbol_file_add'. It has noarguments and no result. It may be called after`XYZ_symfile_init', if a new symbol table is being read, or may becalled alone if all symbols are simply being discarded.`XYZ_symfile_read(struct sym_fns *sf, CORE_ADDR addr, int mainline)'Called from `symbol_file_add' to actually read the symbols from asymbol-file into a set of psymtabs or symtabs.`sf' points to the `struct sym_fns' originally passed to`XYZ_sym_init' for possible initialization. `addr' is the offsetbetween the file's specified start address and its true address inmemory. `mainline' is 1 if this is the main symbol table beingread, and 0 if a secondary symbol file (e.g., shared library ordynamically loaded file) is being read.In addition, if a symbol-reading module creates psymtabs whenXYZ_symfile_read is called, these psymtabs will contain a pointer to afunction `XYZ_psymtab_to_symtab', which can be called from any point inthe GDB symbol-handling code.`XYZ_psymtab_to_symtab (struct partial_symtab *pst)'Called from `psymtab_to_symtab' (or the `PSYMTAB_TO_SYMTAB' macro)if the psymtab has not already been read in and had its`pst->symtab' pointer set. The argument is the psymtab to befleshed-out into a symtab. Upon return, `pst->readin' should havebeen set to 1, and `pst->symtab' should contain a pointer to thenew corresponding symtab, or zero if there were no symbols in thatpart of the symbol file.6.2 Partial Symbol Tables=========================GDB has three types of symbol tables:* Full symbol tables ("symtabs"). These contain the maininformation about symbols and addresses.* Partial symbol tables ("psymtabs"). These contain enoughinformation to know when to read the corresponding part of the fullsymbol table.* Minimal symbol tables ("msymtabs"). These contain informationgleaned from non-debugging symbols.This section describes partial symbol tables.A psymtab is constructed by doing a very quick pass over anexecutable file's debugging information. Small amounts of informationare extracted--enough to identify which parts of the symbol table willneed to be re-read and fully digested later, when the user needs theinformation. The speed of this pass causes GDB to start up veryquickly. Later, as the detailed rereading occurs, it occurs in smallpieces, at various times, and the delay therefrom is mostly invisible tothe user.The symbols that show up in a file's psymtab should be, roughly,those visible to the debugger's user when the program is not runningcode from that file. These include external symbols and types, staticsymbols and types, and `enum' values declared at file scope.The psymtab also contains the range of instruction addresses that thefull symbol table would represent.The idea is that there are only two ways for the user (or much of thecode in the debugger) to reference a symbol:* By its address (e.g., execution stops at some address which isinside a function in this file). The address will be noticed tobe in the range of this psymtab, and the full symtab will be readin. `find_pc_function', `find_pc_line', and other `find_pc_...'functions handle this.* By its name (e.g., the user asks to print a variable, or set abreakpoint on a function). Global names and file-scope names willbe found in the psymtab, which will cause the symtab to be pulledin. Local names will have to be qualified by a global name, or afile-scope name, in which case we will have already read in thesymtab as we evaluated the qualifier. Or, a local symbol can bereferenced when we are "in" a local scope, in which case the firstcase applies. `lookup_symbol' does most of the work here.The only reason that psymtabs exist is to cause a symtab to be readin at the right moment. Any symbol that can be elided from a psymtab,while still causing that to happen, should not appear in it. Sincepsymtabs don't have the idea of scope, you can't put local symbols inthem anyway. Psymtabs don't have the idea of the type of a symbol,either, so types need not appear, unless they will be referenced byname.It is a bug for GDB to behave one way when only a psymtab has beenread, and another way if the corresponding symtab has been read in.Such bugs are typically caused by a psymtab that does not contain allthe visible symbols, or which has the wrong instruction address ranges.The psymtab for a particular section of a symbol file (objfile)could be thrown away after the symtab has been read in. The symtabshould always be searched before the psymtab, so the psymtab will neverbe used (in a bug-free environment). Currently, psymtabs are allocatedon an obstack, and all the psymbols themselves are allocated in a pairof large arrays on an obstack, so there is little to be gained bytrying to free them unless you want to do a lot more work.6.3 Types=========Fundamental Types (e.g., `FT_VOID', `FT_BOOLEAN').--------------------------------------------------These are the fundamental types that GDB uses internally. Fundamentaltypes from the various debugging formats (stabs, ELF, etc) are mappedinto one of these. They are basically a union of all fundamental typesthat GDB knows about for all the languages that GDB knows about.Type Codes (e.g., `TYPE_CODE_PTR', `TYPE_CODE_ARRAY').------------------------------------------------------Each time GDB builds an internal type, it marks it with one of thesetypes. The type may be a fundamental type, such as `TYPE_CODE_INT', ora derived type, such as `TYPE_CODE_PTR' which is a pointer to anothertype. Typically, several `FT_*' types map to one `TYPE_CODE_*' type,and are distinguished by other members of the type struct, such aswhether the type is signed or unsigned, and how many bits it uses.Builtin Types (e.g., `builtin_type_void', `builtin_type_char').---------------------------------------------------------------These are instances of type structs that roughly correspond tofundamental types and are created as global types for GDB to use forvarious ugly historical reasons. We eventually want to eliminatethese. Note for example that `builtin_type_int' initialized in`gdbtypes.c' is basically the same as a `TYPE_CODE_INT' type that isinitialized in `c-lang.c' for an `FT_INTEGER' fundamental type. Thedifference is that the `builtin_type' is not associated with anyparticular objfile, and only one instance exists, while `c-lang.c'builds as many `TYPE_CODE_INT' types as needed, with each oneassociated with some particular objfile.6.4 Object File Formats=======================6.4.1 a.out-----------The `a.out' format is the original file format for Unix. It consistsof three sections: `text', `data', and `bss', which are for programcode, initialized data, and uninitialized data, respectively.The `a.out' format is so simple that it doesn't have any reservedplace for debugging information. (Hey, the original Unix hackers used`adb', which is a machine-language debugger!) The only debuggingformat for `a.out' is stabs, which is encoded as a set of normalsymbols with distinctive attributes.The basic `a.out' reader is in `dbxread.c'.6.4.2 COFF----------The COFF format was introduced with System V Release 3 (SVR3) Unix.COFF files may have multiple sections, each prefixed by a header. Thenumber of sections is limited.The COFF specification includes support for debugging. Although thiswas a step forward, the debugging information was woefully limited. Forinstance, it was not possible to represent code that came from anincluded file.The COFF reader is in `coffread.c'.6.4.3 ECOFF-----------ECOFF is an extended COFF originally introduced for Mips and Alphaworkstations.The basic ECOFF reader is in `mipsread.c'.6.4.4 XCOFF-----------The IBM RS/6000 running AIX uses an object file format called XCOFF.The COFF sections, symbols, and line numbers are used, but debuggingsymbols are `dbx'-style stabs whose strings are located in the `.debug'section (rather than the string table). For more information, see*Note Top: (stabs)Top.The shared library scheme has a clean interface for figuring out whatshared libraries are in use, but the catch is that everything whichrefers to addresses (symbol tables and breakpoints at least) needs to berelocated for both shared libraries and the main executable. At leastusing the standard mechanism this can only be done once the program hasbeen run (or the core file has been read).6.4.5 PE--------Windows 95 and NT use the PE ("Portable Executable") format for theirexecutables. PE is basically COFF with additional headers.While BFD includes special PE support, GDB needs only the basic COFFreader.6.4.6 ELF---------The ELF format came with System V Release 4 (SVR4) Unix. ELF is similarto COFF in being organized into a number of sections, but it removesmany of COFF's limitations.The basic ELF reader is in `elfread.c'.6.4.7 SOM---------SOM is HP's object file and debug format (not to be confused with IBM'sSOM, which is a cross-language ABI).The SOM reader is in `somread.c'.6.5 Debugging File Formats==========================This section describes characteristics of debugging information thatare independent of the object file format.6.5.1 stabs-----------`stabs' started out as special symbols within the `a.out' format.Since then, it has been encapsulated into other file formats, such asCOFF and ELF.While `dbxread.c' does some of the basic stab processing, includingfor encapsulated versions, `stabsread.c' does the real work.6.5.2 COFF----------The basic COFF definition includes debugging information. The level ofsupport is minimal and non-extensible, and is not often used.6.5.3 Mips debug (Third Eye)----------------------------ECOFF includes a definition of a special debug format.The file `mdebugread.c' implements reading for this format.6.5.4 DWARF 2-------------DWARF 2 is an improved but incompatible version of DWARF 1.The DWARF 2 reader is in `dwarf2read.c'.6.5.5 SOM---------Like COFF, the SOM definition includes debugging information.6.6 Adding a New Symbol Reader to GDB=====================================If you are using an existing object file format (`a.out', COFF, ELF,etc), there is probably little to be done.If you need to add a new object file format, you must first add it toBFD. This is beyond the scope of this document.You must then arrange for the BFD code to provide access to thedebugging symbols. Generally GDB will have to call swapping routinesfrom BFD and a few other BFD internal routines to locate the debugginginformation. As much as possible, GDB should not depend on the BFDinternal data structures.For some targets (e.g., COFF), there is a special transfer vectorused to call swapping routines, since the external data structures onvarious platforms have different sizes and layouts. Specializedroutines that will only ever be implemented by one object file formatmay be called directly. This interface should be described in a file`bfd/libXYZ.h', which is included by GDB.6.7 Memory Management for Symbol Files======================================Most memory associated with a loaded symbol file is stored on its`objfile_obstack'. This includes symbols, types, namespace data, andother information produced by the symbol readers.Because this data lives on the objfile's obstack, it is automaticallyreleased when the objfile is unloaded or reloaded. Therefore oneobjfile must not reference symbol or type data from another objfile;they could be unloaded at different times.User convenience variables, et cetera, have associated types.Normally these types live in the associated objfile. However, when theobjfile is unloaded, those types are deep copied to global memory, sothat the values of the user variables and history items are not lost.File: gdbint.info, Node: Language Support, Next: Host Definition, Prev: Symbol Handling, Up: Top7 Language Support******************GDB's language support is mainly driven by the symbol reader, althoughit is possible for the user to set the source language manually.GDB chooses the source language by looking at the extension of thefile recorded in the debug info; `.c' means C, `.f' means Fortran, etc.It may also use a special-purpose language identifier if the debugformat supports it, like with DWARF.7.1 Adding a Source Language to GDB===================================To add other languages to GDB's expression parser, follow the followingsteps:_Create the expression parser._This should reside in a file `LANG-exp.y'. Routines for buildingparsed expressions into a `union exp_element' list are in`parse.c'.Since we can't depend upon everyone having Bison, and YACC producesparsers that define a bunch of global names, the following lines*must* be included at the top of the YACC parser, to prevent thevarious parsers from defining the same global names:#define yyparse LANG_parse#define yylex LANG_lex#define yyerror LANG_error#define yylval LANG_lval#define yychar LANG_char#define yydebug LANG_debug#define yypact LANG_pact#define yyr1 LANG_r1#define yyr2 LANG_r2#define yydef LANG_def#define yychk LANG_chk#define yypgo LANG_pgo#define yyact LANG_act#define yyexca LANG_exca#define yyerrflag LANG_errflag#define yynerrs LANG_nerrsAt the bottom of your parser, define a `struct language_defn' andinitialize it with the right values for your language. Define an`initialize_LANG' routine and have it call`add_language(LANG_language_defn)' to tell the rest of GDB thatyour language exists. You'll need some other supporting variablesand functions, which will be used via pointers from your`LANG_language_defn'. See the declaration of `structlanguage_defn' in `language.h', and the other `*-exp.y' files, formore information._Add any evaluation routines, if necessary_If you need new opcodes (that represent the operations of thelanguage), add them to the enumerated type in `expression.h'. Addsupport code for these operations in the `evaluate_subexp' functiondefined in the file `eval.c'. Add cases for new opcodes in twofunctions from `parse.c': `prefixify_subexp' and`length_of_subexp'. These compute the number of `exp_element'sthat a given operation takes up._Update some existing code_Add an enumerated identifier for your language to the enumeratedtype `enum language' in `defs.h'.Update the routines in `language.c' so your language is included.These routines include type predicates and such, which (in somecases) are language dependent. If your language does not appearin the switch statement, an error is reported.Also included in `language.c' is the code that updates the variable`current_language', and the routines that translate the`language_LANG' enumerated identifier into a printable string.Update the function `_initialize_language' to include yourlanguage. This function picks the default language upon startup,so is dependent upon which languages that GDB is built for.Update `allocate_symtab' in `symfile.c' and/or symbol-reading codeso that the language of each symtab (source file) is set properly.This is used to determine the language to use at each stack framelevel. Currently, the language is set based upon the extension ofthe source file. If the language can be better inferred from thesymbol information, please set the language of the symtab in thesymbol-reading code.Add helper code to `print_subexp' (in `expprint.c') to handle anynew expression opcodes you have added to `expression.h'. Also,add the printed representations of your operators to`op_print_tab'._Add a place of call_Add a call to `LANG_parse()' and `LANG_error' in `parse_exp_1'(defined in `parse.c')._Use macros to trim code_The user has the option of building GDB for some or all of thelanguages. If the user decides to build GDB for the languageLANG, then every file dependent on `language.h' will have themacro `_LANG_LANG' defined in it. Use `#ifdef's to leave outlarge routines that the user won't need if he or she is not usingyour language.Note that you do not need to do this in your YACC parser, since ifGDB is not build for LANG, then `LANG-exp.tab.o' (the compiledform of your parser) is not linked into GDB at all.See the file `configure.in' for how GDB is configured fordifferent languages._Edit `Makefile.in'_Add dependencies in `Makefile.in'. Make sure you update the macrovariables such as `HFILES' and `OBJS', otherwise your code may notget linked in, or, worse yet, it may not get `tar'red into thedistribution!File: gdbint.info, Node: Host Definition, Next: Target Architecture Definition, Prev: Language Support, Up: Top8 Host Definition*****************With the advent of Autoconf, it's rarely necessary to have hostdefinition machinery anymore. The following information is provided,mainly, as an historical reference.8.1 Adding a New Host=====================GDB's host configuration support normally happens via Autoconf. Newhost-specific definitions should not be needed. Older hosts GDB stilluse the host-specific definitions and files listed below, but thesemostly exist for historical reasons, and will eventually disappear.`gdb/config/ARCH/XYZ.mh'This file once contained both host and native configurationinformation (*note Native Debugging::) for the machine XYZ. Thehost configuration information is now handed by Autoconf.Host configuration information included a definition of`XM_FILE=xm-XYZ.h' and possibly definitions for `CC',`SYSV_DEFINE', `XM_CFLAGS', `XM_ADD_FILES', `XM_CLIBS',`XM_CDEPS', etc.; see `Makefile.in'.New host only configurations do not need this file.`gdb/config/ARCH/xm-XYZ.h'This file once contained definitions and includes required whenhosting gdb on machine XYZ. Those definitions and includes are nowhandled by Autoconf.New host and native configurations do not need this file._Maintainer's note: Some hosts continue to use the `xm-xyz.h' fileto define the macros HOST_FLOAT_FORMAT, HOST_DOUBLE_FORMAT andHOST_LONG_DOUBLE_FORMAT. That code also needs to be replaced witheither an Autoconf or run-time test._Generic Host Support Files--------------------------There are some "generic" versions of routines that can be used byvarious systems. These can be customized in various ways by macrosdefined in your `xm-XYZ.h' file. If these routines work for the XYZhost, you can just include the generic file's name (with `.o', not`.c') in `XDEPFILES'.Otherwise, if your machine needs custom support routines, you willneed to write routines that perform the same functions as the genericfile. Put them into `XYZ-xdep.c', and put `XYZ-xdep.o' into`XDEPFILES'.`ser-unix.c'This contains serial line support for Unix systems. This is alwaysincluded, via the makefile variable `SER_HARDWIRE'; override thisvariable in the `.mh' file to avoid it.`ser-go32.c'This contains serial line support for 32-bit programs runningunder DOS, using the DJGPP (a.k.a. GO32) execution environment.`ser-tcp.c'This contains generic TCP support using sockets.8.2 Host Conditionals=====================When GDB is configured and compiled, various macros are defined or leftundefined, to control compilation based on the attributes of the hostsystem. These macros and their meanings (or if the meaning is notdocumented here, then one of the source files where they are used isindicated) are:`GDBINIT_FILENAME'The default name of GDB's initialization file (normally`.gdbinit').`NO_STD_REGS'This macro is deprecated.`SIGWINCH_HANDLER'If your host defines `SIGWINCH', you can define this to be the nameof a function to be called if `SIGWINCH' is received.`SIGWINCH_HANDLER_BODY'Define this to expand into code that will define the functionnamed by the expansion of `SIGWINCH_HANDLER'.`CRLF_SOURCE_FILES'Define this if host files use `\r\n' rather than `\n' as a lineterminator. This will cause source file listings to omit `\r'characters when printing and it will allow `\r\n' line endings offiles which are "sourced" by gdb. It must be possible to openfiles in binary mode using `O_BINARY' or, for fopen, `"rb"'.`DEFAULT_PROMPT'The default value of the prompt string (normally `"(gdb) "').`DEV_TTY'The name of the generic TTY device, defaults to `"/dev/tty"'.`FOPEN_RB'Define this if binary files are opened the same way as text files.`HAVE_MMAP'In some cases, use the system call `mmap' for reading symboltables. For some machines this allows for sharing and quickupdates.`HAVE_TERMIO'Define this if the host system has `termio.h'.`INT_MAX'`INT_MIN'`LONG_MAX'`UINT_MAX'`ULONG_MAX'Values for host-side constants.`ISATTY'Substitute for isatty, if not available.`LONGEST'This is the longest integer type available on the host. If notdefined, it will default to `long long' or `long', depending on`CC_HAS_LONG_LONG'.`CC_HAS_LONG_LONG'Define this if the host C compiler supports `long long'. This isset by the `configure' script.`PRINTF_HAS_LONG_LONG'Define this if the host can handle printing of long long integersvia the printf format conversion specifier `ll'. This is set bythe `configure' script.`HAVE_LONG_DOUBLE'Define this if the host C compiler supports `long double'. This isset by the `configure' script.`PRINTF_HAS_LONG_DOUBLE'Define this if the host can handle printing of long doublefloat-point numbers via the printf format conversion specifier`Lg'. This is set by the `configure' script.`SCANF_HAS_LONG_DOUBLE'Define this if the host can handle the parsing of long doublefloat-point numbers via the scanf format conversion specifier`Lg'. This is set by the `configure' script.`LSEEK_NOT_LINEAR'Define this if `lseek (n)' does not necessarily move to byte number`n' in the file. This is only used when reading source files. Itis normally faster to define `CRLF_SOURCE_FILES' when possible.`L_SET'This macro is used as the argument to `lseek' (or, most commonly,`bfd_seek'). FIXME, should be replaced by SEEK_SET instead, whichis the POSIX equivalent.`NORETURN'If defined, this should be one or more tokens, such as `volatile',that can be used in both the declaration and definition offunctions to indicate that they never return. The default isalready set correctly if compiling with GCC. This will almostnever need to be defined.`ATTR_NORETURN'If defined, this should be one or more tokens, such as`__attribute__ ((noreturn))', that can be used in the declarationsof functions to indicate that they never return. The default isalready set correctly if compiling with GCC. This will almostnever need to be defined.`SEEK_CUR'`SEEK_SET'Define these to appropriate value for the system `lseek', if notalready defined.`STOP_SIGNAL'This is the signal for stopping GDB. Defaults to `SIGTSTP'.(Only redefined for the Convex.)`USG'Means that System V (prior to SVR4) include files are in use.(FIXME: This symbol is abused in `infrun.c', `regex.c', and`utils.c' for other things, at the moment.)`lint'Define this to help placate `lint' in some situations.`volatile'Define this to override the defaults of `__volatile__' or `/**/'.File: gdbint.info, Node: Target Architecture Definition, Next: Target Descriptions, Prev: Host Definition, Up: Top9 Target Architecture Definition********************************GDB's target architecture defines what sort of machine-languageprograms GDB can work with, and how it works with them.The target architecture object is implemented as the C structure`struct gdbarch *'. The structure, and its methods, are generatedusing the Bourne shell script `gdbarch.sh'.* Menu:* OS ABI Variant Handling::* Initialize New Architecture::* Registers and Memory::* Pointers and Addresses::* Address Classes::* Raw and Virtual Registers::* Register and Memory Data::* Frame Interpretation::* Inferior Call Setup::* Compiler Characteristics::* Target Conditionals::* Adding a New Target::File: gdbint.info, Node: OS ABI Variant Handling, Next: Initialize New Architecture, Up: Target Architecture Definition9.1 Operating System ABI Variant Handling=========================================GDB provides a mechanism for handling variations in OS ABIs. An OS ABIvariant may have influence over any number of variables in the targetarchitecture definition. There are two major components in the OS ABImechanism: sniffers and handlers.A "sniffer" examines a file matching a BFD architecture/flavour pair(the architecture may be wildcarded) in an attempt to determine the OSABI of that file. Sniffers with a wildcarded architecture areconsidered to be "generic", while sniffers for a specific architectureare considered to be "specific". A match from a specific snifferoverrides a match from a generic sniffer. Multiple sniffers for anarchitecture/flavour may exist, in order to differentiate between twodifferent operating systems which use the same basic file format. TheOS ABI framework provides a generic sniffer for ELF-format files whichexamines the `EI_OSABI' field of the ELF header, as well as notesections known to be used by several operating systems.A "handler" is used to fine-tune the `gdbarch' structure for theselected OS ABI. There may be only one handler for a given OS ABI foreach BFD architecture.The following OS ABI variants are defined in `defs.h':`GDB_OSABI_UNINITIALIZED'Used for struct gdbarch_info if ABI is still uninitialized.`GDB_OSABI_UNKNOWN'The ABI of the inferior is unknown. The default `gdbarch'settings for the architecture will be used.`GDB_OSABI_SVR4'UNIX System V Release 4.`GDB_OSABI_HURD'GNU using the Hurd kernel.`GDB_OSABI_SOLARIS'Sun Solaris.`GDB_OSABI_OSF1'OSF/1, including Digital UNIX and Compaq Tru64 UNIX.`GDB_OSABI_LINUX'GNU using the Linux kernel.`GDB_OSABI_FREEBSD_AOUT'FreeBSD using the `a.out' executable format.`GDB_OSABI_FREEBSD_ELF'FreeBSD using the ELF executable format.`GDB_OSABI_NETBSD_AOUT'NetBSD using the `a.out' executable format.`GDB_OSABI_NETBSD_ELF'NetBSD using the ELF executable format.`GDB_OSABI_OPENBSD_ELF'OpenBSD using the ELF executable format.`GDB_OSABI_WINCE'Windows CE.`GDB_OSABI_GO32'DJGPP.`GDB_OSABI_IRIX'Irix.`GDB_OSABI_INTERIX'Interix (Posix layer for MS-Windows systems).`GDB_OSABI_HPUX_ELF'HP/UX using the ELF executable format.`GDB_OSABI_HPUX_SOM'HP/UX using the SOM executable format.`GDB_OSABI_QNXNTO'QNX Neutrino.`GDB_OSABI_CYGWIN'Cygwin.`GDB_OSABI_AIX'AIX.Here are the functions that make up the OS ABI framework:-- Function: const char *gdbarch_osabi_name (enum gdb_osabi OSABI)Return the name of the OS ABI corresponding to OSABI.-- Function: void gdbarch_register_osabi (enum bfd_architecture ARCH,unsigned long MACHINE, enum gdb_osabi OSABI, void(*INIT_OSABI)(struct gdbarch_info INFO, struct gdbarch*GDBARCH))Register the OS ABI handler specified by INIT_OSABI for thearchitecture, machine type and OS ABI specified by ARCH, MACHINEand OSABI. In most cases, a value of zero for the machine type,which implies the architecture's default machine type, willsuffice.-- Function: void gdbarch_register_osabi_sniffer (enumbfd_architecture ARCH, enum bfd_flavour FLAVOUR, enumgdb_osabi (*SNIFFER)(bfd *ABFD))Register the OS ABI file sniffer specified by SNIFFER for the BFDarchitecture/flavour pair specified by ARCH and FLAVOUR. If ARCHis `bfd_arch_unknown', the sniffer is considered to be generic,and is allowed to examine FLAVOUR-flavoured files for anyarchitecture.-- Function: enum gdb_osabi gdbarch_lookup_osabi (bfd *ABFD)Examine the file described by ABFD to determine its OS ABI. Thevalue `GDB_OSABI_UNKNOWN' is returned if the OS ABI cannot bedetermined.-- Function: void gdbarch_init_osabi (struct gdbarch info INFO, structgdbarch *GDBARCH, enum gdb_osabi OSABI)Invoke the OS ABI handler corresponding to OSABI to fine-tune the`gdbarch' structure specified by GDBARCH. If a handlercorresponding to OSABI has not been registered for GDBARCH'sarchitecture, a warning will be issued and the debugging sessionwill continue with the defaults already established for GDBARCH.-- Function: void generic_elf_osabi_sniff_abi_tag_sections (bfd *ABFD,asection *SECT, void *OBJ)Helper routine for ELF file sniffers. Examine the file describedby ABFD and look at ABI tag note sections to determine the OS ABIfrom the note. This function should be called via`bfd_map_over_sections'.File: gdbint.info, Node: Initialize New Architecture, Next: Registers and Memory, Prev: OS ABI Variant Handling, Up: Target Architecture Definition9.2 Initializing a New Architecture===================================Each `gdbarch' is associated with a single BFD architecture, via a`bfd_arch_ARCH' constant. The `gdbarch' is registered by a call to`register_gdbarch_init', usually from the file's `_initialize_FILENAME'routine, which will be automatically called during GDB startup. Thearguments are a BFD architecture constant and an initializationfunction.The initialization function has this type:static struct gdbarch *ARCH_gdbarch_init (struct gdbarch_info INFO,struct gdbarch_list *ARCHES)The INFO argument contains parameters used to select the correctarchitecture, and ARCHES is a list of architectures which have alreadybeen created with the same `bfd_arch_ARCH' value.The initialization function should first make sure that INFO isacceptable, and return `NULL' if it is not. Then, it should searchthrough ARCHES for an exact match to INFO, and return one if found.Lastly, if no exact match was found, it should create a newarchitecture based on INFO and return it.Only information in INFO should be used to choose the newarchitecture. Historically, INFO could be sparse, and defaults wouldbe collected from the first element on ARCHES. However, GDB now fillsin INFO more thoroughly, so new `gdbarch' initialization functionsshould not take defaults from ARCHES.File: gdbint.info, Node: Registers and Memory, Next: Pointers and Addresses, Prev: Initialize New Architecture, Up: Target Architecture Definition9.3 Registers and Memory========================GDB's model of the target machine is rather simple. GDB assumes themachine includes a bank of registers and a block of memory. Eachregister may have a different size.GDB does not have a magical way to match up with the compiler's ideaof which registers are which; however, it is critical that they domatch up accurately. The only way to make this work is to get accurateinformation about the order that the compiler uses, and to reflect thatin the `gdbarch_register_name' and related functions.GDB can handle big-endian, little-endian, and bi-endianarchitectures.File: gdbint.info, Node: Pointers and Addresses, Next: Address Classes, Prev: Registers and Memory, Up: Target Architecture Definition9.4 Pointers Are Not Always Addresses=====================================On almost all 32-bit architectures, the representation of a pointer isindistinguishable from the representation of some fixed-length numberwhose value is the byte address of the object pointed to. On suchmachines, the words "pointer" and "address" can be used interchangeably.However, architectures with smaller word sizes are often cramped foraddress space, so they may choose a pointer representation that breaksthis identity, and allows a larger code address space.For example, the Renesas D10V is a 16-bit VLIW processor whoseinstructions are 32 bits long(1). If the D10V used ordinary byteaddresses to refer to code locations, then the processor would only beable to address 64kb of instructions. However, since instructions mustbe aligned on four-byte boundaries, the low two bits of any validinstruction's byte address are always zero--byte addresses waste twobits. So instead of byte addresses, the D10V uses word addresses--byteaddresses shifted right two bits--to refer to code. Thus, the D10V canuse 16-bit words to address 256kb of code space.However, this means that code pointers and data pointers havedifferent forms on the D10V. The 16-bit word `0xC020' refers to byteaddress `0xC020' when used as a data address, but refers to byte address`0x30080' when used as a code address.(The D10V also uses separate code and data address spaces, which alsoaffects the correspondence between pointers and addresses, but we'regoing to ignore that here; this example is already too long.)To cope with architectures like this--the D10V is not the onlyone!--GDB tries to distinguish between "addresses", which are bytenumbers, and "pointers", which are the target's representation of anaddress of a particular type of data. In the example above, `0xC020'is the pointer, which refers to one of the addresses `0xC020' or`0x30080', depending on the type imposed upon it. GDB providesfunctions for turning a pointer into an address and vice versa, in theappropriate way for the current architecture.Unfortunately, since addresses and pointers are identical on almostall processors, this distinction tends to bit-rot pretty quickly. Thus,each time you port GDB to an architecture which does distinguishbetween pointers and addresses, you'll probably need to clean up somearchitecture-independent code.Here are functions which convert between pointers and addresses:-- Function: CORE_ADDR extract_typed_address (void *BUF, struct type*TYPE)Treat the bytes at BUF as a pointer or reference of type TYPE, andreturn the address it represents, in a manner appropriate for thecurrent architecture. This yields an address GDB can use to readtarget memory, disassemble, etc. Note that BUF refers to a bufferin GDB's memory, not the inferior's.For example, if the current architecture is the Intel x86, thisfunction extracts a little-endian integer of the appropriatelength from BUF and returns it. However, if the currentarchitecture is the D10V, this function will return a 16-bitinteger extracted from BUF, multiplied by four if TYPE is apointer to a function.If TYPE is not a pointer or reference type, then this functionwill signal an internal error.-- Function: CORE_ADDR store_typed_address (void *BUF, struct type*TYPE, CORE_ADDR ADDR)Store the address ADDR in BUF, in the proper format for a pointerof type TYPE in the current architecture. Note that BUF refers toa buffer in GDB's memory, not the inferior's.For example, if the current architecture is the Intel x86, thisfunction stores ADDR unmodified as a little-endian integer of theappropriate length in BUF. However, if the current architectureis the D10V, this function divides ADDR by four if TYPE is apointer to a function, and then stores it in BUF.If TYPE is not a pointer or reference type, then this functionwill signal an internal error.-- Function: CORE_ADDR value_as_address (struct value *VAL)Assuming that VAL is a pointer, return the address it represents,as appropriate for the current architecture.This function actually works on integral values, as well aspointers. For pointers, it performs architecture-specificconversions as described above for `extract_typed_address'.-- Function: CORE_ADDR value_from_pointer (struct type *TYPE,CORE_ADDR ADDR)Create and return a value representing a pointer of type TYPE tothe address ADDR, as appropriate for the current architecture.This function performs architecture-specific conversions asdescribed above for `store_typed_address'.Here are two functions which architectures can define to indicate therelationship between pointers and addresses. These have defaultdefinitions, appropriate for architectures on which all pointers aresimple unsigned byte addresses.-- Function: CORE_ADDR gdbarch_pointer_to_address (struct gdbarch*CURRENT_GDBARCH, struct type *TYPE, char *BUF)Assume that BUF holds a pointer of type TYPE, in the appropriateformat for the current architecture. Return the byte address thepointer refers to.This function may safely assume that TYPE is either a pointer or aC++ reference type.-- Function: void gdbarch_address_to_pointer (struct gdbarch*CURRENT_GDBARCH, struct type *TYPE, char *BUF, CORE_ADDRADDR)Store in BUF a pointer of type TYPE representing the address ADDR,in the appropriate format for the current architecture.This function may safely assume that TYPE is either a pointer or aC++ reference type.---------- Footnotes ----------(1) Some D10V instructions are actually pairs of 16-bitsub-instructions. However, since you can't jump into the middle ofsuch a pair, code addresses can only refer to full 32 bit instructions,which is what matters in this explanation.File: gdbint.info, Node: Address Classes, Next: Raw and Virtual Registers, Prev: Pointers and Addresses, Up: Target Architecture Definition9.5 Address Classes===================Sometimes information about different kinds of addresses is availablevia the debug information. For example, some programming environmentsdefine addresses of several different sizes. If the debug informationdistinguishes these kinds of address classes through either the sizeinfo (e.g, `DW_AT_byte_size' in DWARF 2) or through an explicit addressclass attribute (e.g, `DW_AT_address_class' in DWARF 2), the followingmacros should be defined in order to disambiguate these types withinGDB as well as provide the added information to a GDB user whenprinting type expressions.-- Function: int gdbarch_address_class_type_flags (struct gdbarch*CURRENT_GDBARCH, int BYTE_SIZE, int DWARF2_ADDR_CLASS)Returns the type flags needed to construct a pointer type whosesize is BYTE_SIZE and whose address class is DWARF2_ADDR_CLASS.This function is normally called from within a symbol reader. See`dwarf2read.c'.-- Function: char *gdbarch_address_class_type_flags_to_name (structgdbarch *CURRENT_GDBARCH, int TYPE_FLAGS)Given the type flags representing an address class qualifier,return its name.-- Function: int gdbarch_address_class_name_to_type_flags (structgdbarch *CURRENT_GDBARCH, int NAME, int *vartype_flags_ptr)Given an address qualifier name, set the `int' referenced byTYPE_FLAGS_PTR to the type flags for that address class qualifier.Since the need for address classes is rather rare, none of theaddress class functions are defined by default. Predicate functionsare provided to detect when they are defined.Consider a hypothetical architecture in which addresses are normally32-bits wide, but 16-bit addresses are also supported. Furthermore,suppose that the DWARF 2 information for this architecture simply usesa `DW_AT_byte_size' value of 2 to indicate the use of one of these"short" pointers. The following functions could be defined toimplement the address class functions:somearch_address_class_type_flags (int byte_size,int dwarf2_addr_class){if (byte_size == 2)return TYPE_FLAG_ADDRESS_CLASS_1;elsereturn 0;}static char *somearch_address_class_type_flags_to_name (int type_flags){if (type_flags & TYPE_FLAG_ADDRESS_CLASS_1)return "short";elsereturn NULL;}intsomearch_address_class_name_to_type_flags (char *name,int *type_flags_ptr){if (strcmp (name, "short") == 0){*type_flags_ptr = TYPE_FLAG_ADDRESS_CLASS_1;return 1;}elsereturn 0;}The qualifier `@short' is used in GDB's type expressions to indicatethe presence of one of these "short" pointers. E.g, if the debuginformation indicates that `short_ptr_var' is one of these shortpointers, GDB might show the following behavior:(gdb) ptype short_ptr_vartype = int * @shortFile: gdbint.info, Node: Raw and Virtual Registers, Next: Register and Memory Data, Prev: Address Classes, Up: Target Architecture Definition9.6 Raw and Virtual Register Representations============================================_Maintainer note: This section is pretty much obsolete. Thefunctionality described here has largely been replaced bypseudo-registers and the mechanisms described in *Note Using DifferentRegister and Memory Data Representations: Target ArchitectureDefinition. See also Bug Tracking Database(http://www.gnu.org/software/gdb/bugs/) and ARI Index(http://sources.redhat.com/gdb/current/ari/) for more up-to-dateinformation._Some architectures use one representation for a value when it livesin a register, but use a different representation when it lives inmemory. In GDB's terminology, the "raw" representation is the one usedin the target registers, and the "virtual" representation is the oneused in memory, and within GDB `struct value' objects._Maintainer note: Notice that the same mechanism is being used toboth convert a register to a `struct value' and alternative registerforms._For almost all data types on almost all architectures, the virtualand raw representations are identical, and no special handling isneeded. However, they do occasionally differ. For example:* The x86 architecture supports an 80-bit `long double' type.However, when we store those values in memory, they occupy twelvebytes: the floating-point number occupies the first ten, and thefinal two bytes are unused. This keeps the values aligned onfour-byte boundaries, allowing more efficient access. Thus, thex86 80-bit floating-point type is the raw representation, and thetwelve-byte loosely-packed arrangement is the virtualrepresentation.* Some 64-bit MIPS targets present 32-bit registers to GDB as 64-bitregisters, with garbage in their upper bits. GDB ignores the top32 bits. Thus, the 64-bit form, with garbage in the upper 32bits, is the raw representation, and the trimmed 32-bitrepresentation is the virtual representation.In general, the raw representation is determined by thearchitecture, or GDB's interface to the architecture, while the virtualrepresentation can be chosen for GDB's convenience. GDB's registerfile, `registers', holds the register contents in raw format, and theGDB remote protocol transmits register values in raw format.Your architecture may define the following macros to requestconversions between the raw and virtual format:-- Target Macro: int REGISTER_CONVERTIBLE (int REG)Return non-zero if register number REG's value needs different rawand virtual formats.You should not use `REGISTER_CONVERT_TO_VIRTUAL' for a registerunless this macro returns a non-zero value for that register.-- Target Macro: int DEPRECATED_REGISTER_RAW_SIZE (int REG)The size of register number REG's raw value. This is the numberof bytes the register will occupy in `registers', or in a GDBremote protocol packet.-- Target Macro: int DEPRECATED_REGISTER_VIRTUAL_SIZE (int REG)The size of register number REG's value, in its virtual format.This is the size a `struct value''s buffer will have, holding thatregister's value.-- Target Macro: struct type *DEPRECATED_REGISTER_VIRTUAL_TYPE (intREG)This is the type of the virtual representation of register numberREG. Note that there is no need for a macro giving a type for theregister's raw form; once the register's value has been obtained,GDB always uses the virtual form.-- Target Macro: void REGISTER_CONVERT_TO_VIRTUAL (int REG, structtype *TYPE, char *FROM, char *TO)Convert the value of register number REG to TYPE, which shouldalways be `DEPRECATED_REGISTER_VIRTUAL_TYPE (REG)'. The buffer atFROM holds the register's value in raw format; the macro shouldconvert the value to virtual format, and place it at TO.Note that `REGISTER_CONVERT_TO_VIRTUAL' and`REGISTER_CONVERT_TO_RAW' take their REG and TYPE arguments indifferent orders.You should only use `REGISTER_CONVERT_TO_VIRTUAL' with registersfor which the `REGISTER_CONVERTIBLE' macro returns a non-zerovalue.-- Target Macro: void REGISTER_CONVERT_TO_RAW (struct type *TYPE, intREG, char *FROM, char *TO)Convert the value of register number REG to TYPE, which shouldalways be `DEPRECATED_REGISTER_VIRTUAL_TYPE (REG)'. The buffer atFROM holds the register's value in raw format; the macro shouldconvert the value to virtual format, and place it at TO.Note that REGISTER_CONVERT_TO_VIRTUAL and REGISTER_CONVERT_TO_RAWtake their REG and TYPE arguments in different orders.File: gdbint.info, Node: Register and Memory Data, Next: Frame Interpretation, Prev: Raw and Virtual Registers, Up: Target Architecture Definition9.7 Using Different Register and Memory Data Representations============================================================_Maintainer's note: The way GDB manipulates registers is undergoingsignificant change. Many of the macros and functions referred to inthis section are likely to be subject to further revision. See A.R.Index (http://sources.redhat.com/gdb/current/ari/) and Bug TrackingDatabase (http://www.gnu.org/software/gdb/bugs) for furtherinformation. cagney/2002-05-06._Some architectures can represent a data object in a register using aform that is different to the objects more normal memory representation.For example:* The Alpha architecture can represent 32 bit integer values infloating-point registers.* The x86 architecture supports 80-bit floating-point registers. The`long double' data type occupies 96 bits in memory but only 80 bitswhen stored in a register.In general, the register representation of a data type is determinedby the architecture, or GDB's interface to the architecture, while thememory representation is determined by the Application Binary Interface.For almost all data types on almost all architectures, the tworepresentations are identical, and no special handling is needed.However, they do occasionally differ. Your architecture may define thefollowing macros to request conversions between the register and memoryrepresentations of a data type:-- Function: int gdbarch_convert_register_p (struct gdbarch *GDBARCH,int REG)Return non-zero if the representation of a data value stored inthis register may be different to the representation of that samedata value when stored in memory.When non-zero, the macros `gdbarch_register_to_value' and`value_to_register' are used to perform any necessary conversion.This function should return zero for the register's native type,when no conversion is necessary.-- Function: void gdbarch_register_to_value (struct gdbarch *GDBARCH,int REG, struct type *TYPE, char *FROM, char *TO)Convert the value of register number REG to a data object of typeTYPE. The buffer at FROM holds the register's value in rawformat; the converted value should be placed in the buffer at TO.Note that `gdbarch_register_to_value' and`gdbarch_value_to_register' take their REG and TYPE arguments indifferent orders.You should only use `gdbarch_register_to_value' with registers forwhich the `gdbarch_convert_register_p' function returns a non-zerovalue.-- Function: void gdbarch_value_to_register (struct gdbarch *GDBARCH,struct type *TYPE, int REG, char *FROM, char *TO)Convert a data value of type TYPE to register number REG' rawformat.Note that `gdbarch_register_to_value' and`gdbarch_value_to_register' take their REG and TYPE arguments indifferent orders.You should only use `gdbarch_value_to_register' with registers forwhich the `gdbarch_convert_register_p' function returns a non-zerovalue.-- Target Macro: void REGISTER_CONVERT_TO_TYPE (int REGNUM, structtype *TYPE, char *BUF)See `mips-tdep.c'. It does not do what you want.File: gdbint.info, Node: Frame Interpretation, Next: Inferior Call Setup, Prev: Register and Memory Data, Up: Target Architecture Definition9.8 Frame Interpretation========================File: gdbint.info, Node: Inferior Call Setup, Next: Compiler Characteristics, Prev: Frame Interpretation, Up: Target Architecture Definition9.9 Inferior Call Setup=======================File: gdbint.info, Node: Compiler Characteristics, Next: Target Conditionals, Prev: Inferior Call Setup, Up: Target Architecture Definition9.10 Compiler Characteristics=============================File: gdbint.info, Node: Target Conditionals, Next: Adding a New Target, Prev: Compiler Characteristics, Up: Target Architecture Definition9.11 Target Conditionals========================This section describes the macros and functions that you can use todefine the target machine.`CORE_ADDR gdbarch_addr_bits_remove (GDBARCH, ADDR)'If a raw machine instruction address includes any bits that are notreally part of the address, then this function is used to zerothose bits in ADDR. This is only used for addresses ofinstructions, and even then not in all contexts.For example, the two low-order bits of the PC on theHewlett-Packard PA 2.0 architecture contain the privilege level ofthe corresponding instruction. Since instructions must always bealigned on four-byte boundaries, the processor masks out thesebits to generate the actual address of the instruction.`gdbarch_addr_bits_remove' would then for example look like that:arch_addr_bits_remove (CORE_ADDR addr){return (addr &= ~0x3);}`int address_class_name_to_type_flags (GDBARCH, NAME, TYPE_FLAGS_PTR)'If NAME is a valid address class qualifier name, set the `int'referenced by TYPE_FLAGS_PTR to the mask representing the qualifierand return 1. If NAME is not a valid address class qualifier name,return 0.The value for TYPE_FLAGS_PTR should be one of`TYPE_FLAG_ADDRESS_CLASS_1', `TYPE_FLAG_ADDRESS_CLASS_2', orpossibly some combination of these values or'd together. *NoteAddress Classes: Target Architecture Definition.`int address_class_name_to_type_flags_p (GDBARCH)'Predicate which indicates whether`address_class_name_to_type_flags' has been defined.`int gdbarch_address_class_type_flags (GDBARCH, BYTE_SIZE, DWARF2_ADDR_CLASS)'Given a pointers byte size (as described by the debug information)and the possible `DW_AT_address_class' value, return the type flagsused by GDB to represent this address class. The value returnedshould be one of `TYPE_FLAG_ADDRESS_CLASS_1',`TYPE_FLAG_ADDRESS_CLASS_2', or possibly some combination of thesevalues or'd together. *Note Address Classes: Target ArchitectureDefinition.`int gdbarch_address_class_type_flags_p (GDBARCH)'Predicate which indicates whether`gdbarch_address_class_type_flags_p' has been defined.`const char *gdbarch_address_class_type_flags_to_name (GDBARCH, TYPE_FLAGS)'Return the name of the address class qualifier associated with thetype flags given by TYPE_FLAGS.`int gdbarch_address_class_type_flags_to_name_p (GDBARCH)'Predicate which indicates whether`gdbarch_address_class_type_flags_to_name' has been defined.*Note Address Classes: Target Architecture Definition.`void gdbarch_address_to_pointer (GDBARCH, TYPE, BUF, ADDR)'Store in BUF a pointer of type TYPE representing the address ADDR,in the appropriate format for the current architecture. Thisfunction may safely assume that TYPE is either a pointer or a C++reference type. *Note Pointers Are Not Always Addresses: TargetArchitecture Definition.`int gdbarch_believe_pcc_promotion (GDBARCH)'Used to notify if the compiler promotes a `short' or `char'parameter to an `int', but still reports the parameter as itsoriginal type, rather than the promoted type.`gdbarch_bits_big_endian (GDBARCH)'This is used if the numbering of bits in the targets does *not*match the endianness of the target byte order. A value of 1 meansthat the bits are numbered in a big-endian bit order, 0 meanslittle-endian.`set_gdbarch_bits_big_endian (GDBARCH, BITS_BIG_ENDIAN)'Calling set_gdbarch_bits_big_endian with a value of 1 indicatesthat the bits in the target are numbered in a big-endian bitorder, 0 indicates little-endian.`BREAKPOINT'This is the character array initializer for the bit pattern to putinto memory where a breakpoint is set. Although it's common touse a trap instruction for a breakpoint, it's not required; forinstance, the bit pattern could be an invalid instruction. Thebreakpoint must be no longer than the shortest instruction of thearchitecture.`BREAKPOINT' has been deprecated in favor of`gdbarch_breakpoint_from_pc'.`BIG_BREAKPOINT'`LITTLE_BREAKPOINT'Similar to BREAKPOINT, but used for bi-endian targets.`BIG_BREAKPOINT' and `LITTLE_BREAKPOINT' have been deprecated infavor of `gdbarch_breakpoint_from_pc'.`const gdb_byte *gdbarch_breakpoint_from_pc (GDBARCH, PCPTR, LENPTR)'Use the program counter to determine the contents and size of abreakpoint instruction. It returns a pointer to a string of bytesthat encode a breakpoint instruction, stores the length of thestring to `*LENPTR', and adjusts the program counter (ifnecessary) to point to the actual memory location where thebreakpoint should be inserted.Although it is common to use a trap instruction for a breakpoint,it's not required; for instance, the bit pattern could be aninvalid instruction. The breakpoint must be no longer than theshortest instruction of the architecture.Replaces all the other BREAKPOINT macros.`int gdbarch_memory_insert_breakpoint (GDBARCH, BP_TGT)'`gdbarch_memory_remove_breakpoint (GDBARCH, BP_TGT)'Insert or remove memory based breakpoints. Reasonable defaults(`default_memory_insert_breakpoint' and`default_memory_remove_breakpoint' respectively) have beenprovided so that it is not necessary to set these for mostarchitectures. Architectures which may want to set`gdbarch_memory_insert_breakpoint' and`gdbarch_memory_remove_breakpoint' will likely have instructionsthat are oddly sized or are not stored in a conventional manner.It may also be desirable (from an efficiency standpoint) to definecustom breakpoint insertion and removal routines if`gdbarch_breakpoint_from_pc' needs to read the target's memory forsome reason.`CORE_ADDR gdbarch_adjust_breakpoint_address (GDBARCH, BPADDR)'Given an address at which a breakpoint is desired, return abreakpoint address adjusted to account for architecturalconstraints on breakpoint placement. This method is not needed bymost targets.The FR-V target (see `frv-tdep.c') requires this method. The FR-Vis a VLIW architecture in which a number of RISC-like instructionsare grouped (packed) together into an aggregate instruction orinstruction bundle. When the processor executes one of thesebundles, the component instructions are executed in parallel.In the course of optimization, the compiler may group instructionsfrom distinct source statements into the same bundle. The linenumber information associated with one of the latter statementswill likely refer to some instruction other than the first one inthe bundle. So, if the user attempts to place a breakpoint on oneof these latter statements, GDB must be careful to _not_ place thebreak instruction on any instruction other than the first one inthe bundle. (Remember though that the instructions within abundle execute in parallel, so the _first_ instruction is theinstruction at the lowest address and has nothing to do withexecution order.)The FR-V's `gdbarch_adjust_breakpoint_address' method will adjust abreakpoint's address by scanning backwards for the beginning ofthe bundle, returning the address of the bundle.Since the adjustment of a breakpoint may significantly alter auser's expectation, GDB prints a warning when an adjustedbreakpoint is initially set and each time that that breakpoint ishit.`int gdbarch_call_dummy_location (GDBARCH)'See the file `inferior.h'.This method has been replaced by `gdbarch_push_dummy_code' (*notegdbarch_push_dummy_code::).`int gdbarch_cannot_fetch_register (GDBARCH, REGUM)'This function should return nonzero if REGNO cannot be fetchedfrom an inferior process. This is only relevant if`FETCH_INFERIOR_REGISTERS' is not defined.`int gdbarch_cannot_store_register (GDBARCH, REGNUM)'This function should return nonzero if REGNO should not be writtento the target. This is often the case for program counters,status words, and other special registers. This function returns0 as default so that GDB will assume that all registers may bewritten.`int gdbarch_convert_register_p (GDBARCH, REGNUM, struct type *TYPE)'Return non-zero if register REGNUM represents data values of typeTYPE in a non-standard form. *Note Using Different Register andMemory Data Representations: Target Architecture Definition.`CORE_ADDR gdbarch_decr_pc_after_break (GDBARCH)'This function shall return the amount by which to decrement the PCafter the program encounters a breakpoint. This is often thenumber of bytes in `BREAKPOINT', though not always. For mosttargets this value will be 0.`DISABLE_UNSETTABLE_BREAK (ADDR)'If defined, this should evaluate to 1 if ADDR is in a sharedlibrary in which breakpoints cannot be set and so should bedisabled.`void gdbarch_print_float_info (GDBARCH, FILE, FRAME, ARGS)'If defined, then the `info float' command will print informationabout the processor's floating point unit.`void gdbarch_print_registers_info (GDBARCH, FRAME, REGNUM, ALL)'If defined, pretty print the value of the register REGNUM for thespecified FRAME. If the value of REGNUM is -1, pretty printeither all registers (ALL is non zero) or a select subset ofregisters (ALL is zero).The default method prints one register per line, and if ALL iszero omits floating-point registers.`int gdbarch_print_vector_info (GDBARCH, FILE, FRAME, ARGS)'If defined, then the `info vector' command will call this functionto print information about the processor's vector unit.By default, the `info vector' command will print all vectorregisters (the register's type having the vector attribute).`int gdbarch_dwarf_reg_to_regnum (GDBARCH, DWARF_REGNR)'Convert DWARF register number DWARF_REGNR into GDB regnum. If notdefined, no conversion will be performed.`int gdbarch_dwarf2_reg_to_regnum (GDBARCH, DWARF2_REGNR)'Convert DWARF2 register number DWARF2_REGNR into GDB regnum. Ifnot defined, no conversion will be performed.`int gdbarch_ecoff_reg_to_regnum (GDBARCH, ECOFF_REGNR)'Convert ECOFF register number ECOFF_REGNR into GDB regnum. Ifnot defined, no conversion will be performed.`DEPRECATED_FP_REGNUM'If the virtual frame pointer is kept in a register, then definethis macro to be the number (greater than or equal to zero) ofthat register.This should only need to be defined if `DEPRECATED_TARGET_READ_FP'is not defined.`DEPRECATED_FRAMELESS_FUNCTION_INVOCATION(FI)'Define this to an expression that returns 1 if the functioninvocation represented by FI does not have a stack frameassociated with it. Otherwise return 0.`CORE_ADDR frame_align (GDBARCH, ADDRESS)'Define this to adjust ADDRESS so that it meets the alignmentrequirements for the start of a new stack frame. A stack frame'salignment requirements are typically stronger than a targetprocessors stack alignment requirements.This function is used to ensure that, when creating a dummy frame,both the initial stack pointer and (if needed) the address of thereturn value are correctly aligned.This function always adjusts the address in the direction of stackgrowth.By default, no frame based stack alignment is performed.`int gdbarch_frame_red_zone_size (GDBARCH)'The number of bytes, beyond the innermost-stack-address, reservedby the ABI. A function is permitted to use this scratch area(instead of allocating extra stack space).When performing an inferior function call, to ensure that it doesnot modify this area, GDB adjusts the innermost-stack-address byGDBARCH_FRAME_RED_ZONE_SIZE bytes before pushing parameters ontothe stack.By default, zero bytes are allocated. The value must be aligned(*note frame_align::).The AMD64 (nee x86-64) ABI documentation refers to the _red zone_when describing this scratch area.`DEPRECATED_FRAME_CHAIN(FRAME)'Given FRAME, return a pointer to the calling frame.`DEPRECATED_FRAME_CHAIN_VALID(CHAIN, THISFRAME)'Define this to be an expression that returns zero if the givenframe is an outermost frame, with no caller, and nonzerootherwise. Most normal situations can be handled without definingthis macro, including `NULL' chain pointers, dummy frames, andframes whose PC values are inside the startup file (e.g.`crt0.o'), inside `main', or inside `_start'.`DEPRECATED_FRAME_INIT_SAVED_REGS(FRAME)'See `frame.h'. Determines the address of all registers in thecurrent stack frame storing each in `frame->saved_regs'. Space for`frame->saved_regs' shall be allocated by`DEPRECATED_FRAME_INIT_SAVED_REGS' using `frame_saved_regs_zalloc'.`FRAME_FIND_SAVED_REGS' is deprecated.`int gdbarch_frame_num_args (GDBARCH, FRAME)'For the frame described by FRAME return the number of argumentsthat are being passed. If the number of arguments is not known,return `-1'.`DEPRECATED_FRAME_SAVED_PC(FRAME)'Given FRAME, return the pc saved there. This is the returnaddress.This method is deprecated. *Note gdbarch_unwind_pc::.`CORE_ADDR gdbarch_unwind_pc (NEXT_FRAME)'Return the instruction address, in NEXT_FRAME's caller, at whichexecution will resume after NEXT_FRAME returns. This is commonlyreferred to as the return address.The implementation, which must be frame agnostic (work with anyframe), is typically no more than:ULONGEST pc;pc = frame_unwind_register_unsigned (next_frame, S390_PC_REGNUM);return gdbarch_addr_bits_remove (gdbarch, pc);*Note DEPRECATED_FRAME_SAVED_PC::, which this method replaces.`CORE_ADDR gdbarch_unwind_sp (GDBARCH, NEXT_FRAME)'Return the frame's inner most stack address. This is commonlyreferred to as the frame's "stack pointer".The implementation, which must be frame agnostic (work with anyframe), is typically no more than:ULONGEST sp;sp = frame_unwind_register_unsigned (next_frame, S390_SP_REGNUM);return gdbarch_addr_bits_remove (gdbarch, sp);*Note TARGET_READ_SP::, which this method replaces.`FUNCTION_EPILOGUE_SIZE'For some COFF targets, the `x_sym.x_misc.x_fsize' field of thefunction end symbol is 0. For such targets, you must define`FUNCTION_EPILOGUE_SIZE' to expand into the standard size of afunction's epilogue.`DEPRECATED_FUNCTION_START_OFFSET'An integer, giving the offset in bytes from a function's address(as used in the values of symbols, function pointers, etc.), andthe function's first genuine instruction.This is zero on almost all machines: the function's address isusually the address of its first instruction. However, on theVAX, for example, each function starts with two bytes containing abitmask indicating which registers to save upon entry to thefunction. The VAX `call' instructions check this value, and savethe appropriate registers automatically. Thus, since the offsetfrom the function's address to its first instruction is two bytes,`DEPRECATED_FUNCTION_START_OFFSET' would be 2 on the VAX.`GCC_COMPILED_FLAG_SYMBOL'`GCC2_COMPILED_FLAG_SYMBOL'If defined, these are the names of the symbols that GDB will lookfor to detect that GCC compiled the file. The default symbols are`gcc_compiled.' and `gcc2_compiled.', respectively. (Currentlyonly defined for the Delta 68.)`gdbarch_get_longjmp_target'For most machines, this is a target-dependent parameter. On theDECstation and the Iris, this is a native-dependent parameter,since the header file `setjmp.h' is needed to define it.This macro determines the target PC address that `longjmp' willjump to, assuming that we have just stopped at a `longjmp'breakpoint. It takes a `CORE_ADDR *' as argument, and stores thetarget PC value through this pointer. It examines the currentstate of the machine as needed.`DEPRECATED_IBM6000_TARGET'Shows that we are configured for an IBM RS/6000 system. Thisconditional should be eliminated (FIXME) and replaced byfeature-specific macros. It was introduced in a haste and we arerepenting at leisure.`I386_USE_GENERIC_WATCHPOINTS'An x86-based target can define this to use the generic x86watchpoint support; see *Note I386_USE_GENERIC_WATCHPOINTS:Algorithms.`int gdbarch_inner_than (GDBARCH, LHS, RHS)'Returns non-zero if stack address LHS is inner than (nearer to thestack top) stack address RHS. Let the function return `lhs < rhs'if the target's stack grows downward in memory, or `lhs > rsh' ifthe stack grows upward.`gdbarch_in_function_epilogue_p (GDBARCH, ADDR)'Returns non-zero if the given ADDR is in the epilogue of afunction. The epilogue of a function is defined as the part of afunction where the stack frame of the function already has beendestroyed up to the final `return from function call' instruction.`int gdbarch_in_solib_return_trampoline (GDBARCH, PC, NAME)'Define this function to return nonzero if the program is stoppedin the trampoline that returns from a shared library.`IN_SOLIB_DYNSYM_RESOLVE_CODE (PC)'Define this to return nonzero if the program is stopped in thedynamic linker.`SKIP_SOLIB_RESOLVER (PC)'Define this to evaluate to the (nonzero) address at which executionshould continue to get past the dynamic linker's symbol resolutionfunction. A zero value indicates that it is not important ornecessary to set a breakpoint to get through the dynamic linkerand that single stepping will suffice.`CORE_ADDR gdbarch_integer_to_address (GDBARCH, TYPE, BUF)'Define this when the architecture needs to handle non-pointer toaddress conversions specially. Converts that value to an addressaccording to the current architectures conventions._Pragmatics: When the user copies a well defined expression fromtheir source code and passes it, as a parameter, to GDB's `print'command, they should get the same value as would have beencomputed by the target program. Any deviation from this rule cancause major confusion and annoyance, and needs to be justifiedcarefully. In other words, GDB doesn't really have the freedom todo these conversions in clever and useful ways. It has, however,been pointed out that users aren't complaining about how GDB castsintegers to pointers; they are complaining that they can't take anaddress from a disassembly listing and give it to `x/i'. Addingan architecture method like `gdbarch_integer_to_address' certainlymakes it possible for GDB to "get it right" in all circumstances._*Note Pointers Are Not Always Addresses: Target ArchitectureDefinition.`CORE_ADDR gdbarch_pointer_to_address (GDBARCH, TYPE, BUF)'Assume that BUF holds a pointer of type TYPE, in the appropriateformat for the current architecture. Return the byte address thepointer refers to. *Note Pointers Are Not Always Addresses:Target Architecture Definition.`void gdbarch_register_to_value(GDBARCH, FRAME, REGNUM, TYPE, FUR)'Convert the raw contents of register REGNUM into a value of typeTYPE. *Note Using Different Register and Memory DataRepresentations: Target Architecture Definition.`register_reggroup_p (GDBARCH, REGNUM, REGGROUP)'Return non-zero if register REGNUM is a member of the registergroup REGGROUP.By default, registers are grouped as follows:`float_reggroup'Any register with a valid name and a floating-point type.`vector_reggroup'Any register with a valid name and a vector type.`general_reggroup'Any register with a valid name and a type other than vector orfloating-point. `float_reggroup'.`save_reggroup'`restore_reggroup'`all_reggroup'Any register with a valid name.`DEPRECATED_REGISTER_VIRTUAL_SIZE (REG)'Return the virtual size of REG; defaults to the size of theregister's virtual type. Return the virtual size of REG. *NoteRaw and Virtual Register Representations: Target ArchitectureDefinition.`DEPRECATED_REGISTER_VIRTUAL_TYPE (REG)'Return the virtual type of REG. *Note Raw and Virtual RegisterRepresentations: Target Architecture Definition.`struct type *register_type (GDBARCH, REG)'If defined, return the type of register REG. This functionsupersedes `DEPRECATED_REGISTER_VIRTUAL_TYPE'. *Note Raw andVirtual Register Representations: Target Architecture Definition.`REGISTER_CONVERT_TO_VIRTUAL(REG, TYPE, FROM, TO)'Convert the value of register REG from its raw form to its virtualform. *Note Raw and Virtual Register Representations: TargetArchitecture Definition.`REGISTER_CONVERT_TO_RAW(TYPE, REG, FROM, TO)'Convert the value of register REG from its virtual form to its rawform. *Note Raw and Virtual Register Representations: TargetArchitecture Definition.`const struct regset *regset_from_core_section (struct gdbarch * GDBARCH, const char * SECT_NAME, size_t SECT_SIZE)'Return the appropriate register set for a core file section withname SECT_NAME and size SECT_SIZE.`SOFTWARE_SINGLE_STEP_P()'Define this as 1 if the target does not have a hardware single-stepmechanism. The macro `SOFTWARE_SINGLE_STEP' must also be defined.`SOFTWARE_SINGLE_STEP(SIGNAL, INSERT_BREAKPOINTS_P)'A function that inserts or removes (depending onINSERT_BREAKPOINTS_P) breakpoints at each possible destinations ofthe next instruction. See `sparc-tdep.c' and `rs6000-tdep.c' forexamples.`set_gdbarch_sofun_address_maybe_missing (GDBARCH, SET)'Somebody clever observed that, the more actual addresses you havein the debug information, the more time the linker has to spendrelocating them. So whenever there's some other way the debuggercould find the address it needs, you should omit it from the debuginfo, to make linking faster.Calling `set_gdbarch_sofun_address_maybe_missing' with a non-zeroargument SET indicates that a particular set of hacks of this sortare in use, affecting `N_SO' and `N_FUN' entries in stabs-formatdebugging information. `N_SO' stabs mark the beginning and endingaddresses of compilation units in the text segment. `N_FUN' stabsmark the starts and ends of functions.In this case, GDB assumes two things:* `N_FUN' stabs have an address of zero. Instead of using thoseaddresses, you should find the address where the functionstarts by taking the function name from the stab, and thenlooking that up in the minsyms (the linker/assembler symboltable). In other words, the stab has the name, and thelinker/assembler symbol table is the only place that carriesthe address.* `N_SO' stabs have an address of zero, too. You just look atthe `N_FUN' stabs that appear before and after the `N_SO'stab, and guess the starting and ending addresses of thecompilation unit from them.`int gdbarch_pc_regnum (GDBARCH)'If the program counter is kept in a register, then let thisfunction return the number (greater than or equal to zero) of thatregister.This should only need to be defined if `gdbarch_read_pc' and`gdbarch_write_pc' are not defined.`int gdbarch_stabs_argument_has_addr (GDBARCH, TYPE)'Define this function to return nonzero if a function argument oftype TYPE is passed by reference instead of value.`PROCESS_LINENUMBER_HOOK'A hook defined for XCOFF reading.`gdbarch_ps_regnum (GDBARCH'If defined, this function returns the number of the processorstatus register. (This definition is only used in generic codewhen parsing "$ps".)`CORE_ADDR gdbarch_push_dummy_call (GDBARCH, FUNCTION, REGCACHE, BP_ADDR, NARGS, ARGS, SP, STRUCT_RETURN, STRUCT_ADDR)'Define this to push the dummy frame's call to the inferiorfunction onto the stack. In addition to pushing NARGS, the codeshould push STRUCT_ADDR (when STRUCT_RETURN is non-zero), and thereturn address (BP_ADDR).FUNCTION is a pointer to a `struct value'; on architectures thatuse function descriptors, this contains the function descriptorvalue.Returns the updated top-of-stack pointer.This method replaces `DEPRECATED_PUSH_ARGUMENTS'.`CORE_ADDR gdbarch_push_dummy_code (GDBARCH, SP, FUNADDR, USING_GCC, ARGS, NARGS, VALUE_TYPE, REAL_PC, BP_ADDR, REGCACHE)'Given a stack based call dummy, push the instruction sequence(including space for a breakpoint) to which the called functionshould return.Set BP_ADDR to the address at which the breakpoint instructionshould be inserted, REAL_PC to the resume address when startingthe call sequence, and return the updated inner-most stack address.By default, the stack is grown sufficient to hold a frame-aligned(*note frame_align::) breakpoint, BP_ADDR is set to the addressreserved for that breakpoint, and REAL_PC set to FUNADDR.This method replaces `gdbarch_call_dummy_location (GDBARCH)' and`DEPRECATED_REGISTER_SIZE'.`const char *gdbarch_register_name (GDBARCH, REGNR)'Return the name of register REGNR as a string. May return `NULL'to indicate that REGNR is not a valid register.`SAVE_DUMMY_FRAME_TOS (SP)'Used in `call_function_by_hand' to notify the target dependentcode of the top-of-stack value that will be passed to the inferiorcode. This is the value of the `SP' after both the dummy frameand space for parameters/results have been allocated on the stack.*Note gdbarch_unwind_dummy_id::.`int gdbarch_sdb_reg_to_regnum (GDBARCH, SDB_REGNR)'Use this function to convert sdb register SDB_REGNR into GDBregnum. If not defined, no conversion will be done.`enum return_value_convention gdbarch_return_value (struct gdbarch *GDBARCH, struct type *VALTYPE, struct regcache *REGCACHE, void *READBUF, const void *WRITEBUF)'Given a function with a return-value of type RETTYPE, return whichreturn-value convention that function would use.GDB currently recognizes two function return-value conventions:`RETURN_VALUE_REGISTER_CONVENTION' where the return value is foundin registers; and `RETURN_VALUE_STRUCT_CONVENTION' where the returnvalue is found in memory and the address of that memory location ispassed in as the function's first parameter.If the register convention is being used, and WRITEBUF isnon-`NULL', also copy the return-value in WRITEBUF into REGCACHE.If the register convention is being used, and READBUF isnon-`NULL', also copy the return value from REGCACHE into READBUF(REGCACHE contains a copy of the registers from the just returnedfunction)._Maintainer note: This method replaces separate predicate, extract,store methods. By having only one method, the logic needed todetermine the return-value convention need only be implemented inone place. If GDB were written in an OO language, this methodwould instead return an object that knew how to perform theregister return-value extract and store.__Maintainer note: This method does not take a GCC_P parameter, andsuch a parameter should not be added. If an architecture thatrequires per-compiler or per-function information be identified,then the replacement of RETTYPE with `struct value' FUNCTIONshould be pursued.__Maintainer note: The REGCACHE parameter limits this methods tothe inner most frame. While replacing REGCACHE with a `structframe_info' FRAME parameter would remove that limitation there hasyet to be a demonstrated need for such a change._`void gdbarch_skip_permanent_breakpoint (GDBARCH, REGCACHE)'Advance the inferior's PC past a permanent breakpoint. GDBnormally steps over a breakpoint by removing it, stepping oneinstruction, and re-inserting the breakpoint. However, permanentbreakpoints are hardwired into the inferior, and can't be removed,so this strategy doesn't work. Calling`gdbarch_skip_permanent_breakpoint' adjusts the processor's stateso that execution will resume just after the breakpoint. Thisfunction does the right thing even when the breakpoint is in thedelay slot of a branch or jump.`CORE_ADDR gdbarch_skip_prologue (GDBARCH, IP)'A function that returns the address of the "real" code beyond thefunction entry prologue found at IP.`CORE_ADDR gdbarch_skip_trampoline_code (GDBARCH, FRAME, PC)'If the target machine has trampoline code that sits betweencallers and the functions being called, then define this functionto return a new PC that is at the start of the real function.`int gdbarch_sp_regnum (GDBARCH)'If the stack-pointer is kept in a register, then use this functionto return the number (greater than or equal to zero) of thatregister, or -1 if there is no such register.`int gdbarch_stab_reg_to_regnum (GDBARCH, STAB_REGNR)'Use this function to convert stab register STAB_REGNR into GDBregnum. If not defined, no conversion will be done.`SYMBOL_RELOADING_DEFAULT'The default value of the "symbol-reloading" variable. (Neverdefined in current sources.)`TARGET_CHAR_BIT'Number of bits in a char; defaults to 8.`int gdbarch_char_signed (GDBARCH)'Non-zero if `char' is normally signed on this architecture; zero ifit should be unsigned.The ISO C standard requires the compiler to treat `char' asequivalent to either `signed char' or `unsigned char'; anycharacter in the standard execution set is supposed to be positive.Most compilers treat `char' as signed, but `char' is unsigned onthe IBM S/390, RS6000, and PowerPC targets.`int gdbarch_double_bit (GDBARCH)'Number of bits in a double float; defaults to`8 * TARGET_CHAR_BIT'.`int gdbarch_float_bit (GDBARCH)'Number of bits in a float; defaults to `4 * TARGET_CHAR_BIT'.`int gdbarch_int_bit (GDBARCH)'Number of bits in an integer; defaults to `4 * TARGET_CHAR_BIT'.`int gdbarch_long_bit (GDBARCH)'Number of bits in a long integer; defaults to`4 * TARGET_CHAR_BIT'.`int gdbarch_long_double_bit (GDBARCH)'Number of bits in a long double float; defaults to`2 * gdbarch_double_bit (GDBARCH)'.`int gdbarch_long_long_bit (GDBARCH)'Number of bits in a long long integer; defaults to`2 * gdbarch_long_bit (GDBARCH)'.`int gdbarch_ptr_bit (GDBARCH)'Number of bits in a pointer; defaults to`gdbarch_int_bit (GDBARCH)'.`int gdbarch_short_bit (GDBARCH)'Number of bits in a short integer; defaults to`2 * TARGET_CHAR_BIT'.`CORE_ADDR gdbarch_read_pc (GDBARCH, REGCACHE)'`gdbarch_write_pc (GDBARCH, REGCACHE, VAL)'`TARGET_READ_SP'`TARGET_READ_FP'These change the behavior of `gdbarch_read_pc',`gdbarch_write_pc', and `read_sp'. For most targets, these may beleft undefined. GDB will call the read and write registerfunctions with the relevant `_REGNUM' argument.These macros and functions are useful when a target keeps one ofthese registers in a hard to get at place; for example, part in asegment register and part in an ordinary register.*Note gdbarch_unwind_sp::, which replaces `TARGET_READ_SP'.`void gdbarch_virtual_frame_pointer (GDBARCH, PC, FRAME_REGNUM, FRAME_OFFSET)'Returns a `(register, offset)' pair representing the virtual framepointer in use at the code address PC. If virtual frame pointersare not used, a default definition simply returns`DEPRECATED_FP_REGNUM', with an offset of zero.`TARGET_HAS_HARDWARE_WATCHPOINTS'If non-zero, the target has support for hardware-assistedwatchpoints. *Note watchpoints: Algorithms, for more details andother related macros.`int gdbarch_print_insn (GDBARCH, VMA, INFO)'This is the function used by GDB to print an assembly instruction.It prints the instruction at address VMA in debugged memory andreturns the length of the instruction, in bytes. If a targetdoesn't define its own printing routine, it defaults to anaccessor function for the global pointer`deprecated_tm_print_insn'. This usually points to a function inthe `opcodes' library (*note Opcodes: Support Libraries.). INFOis a structure (of type `disassemble_info') defined in`include/dis-asm.h' used to pass information to the instructiondecoding routine.`frame_id gdbarch_unwind_dummy_id (GDBARCH, FRAME)'Given FRAME return a `struct frame_id' that uniquely identifies aninferior function call's dummy frame. The value returned mustmatch the dummy frame stack value previously saved using`SAVE_DUMMY_FRAME_TOS'. *Note SAVE_DUMMY_FRAME_TOS::.`DEPRECATED_USE_STRUCT_CONVENTION (GCC_P, TYPE)'If defined, this must be an expression that is nonzero if a valueof the given TYPE being returned from a function must have spaceallocated for it on the stack. GCC_P is true if the functionbeing considered is known to have been compiled by GCC; this ishelpful for systems where GCC is known to use different callingconvention than other compilers.This method has been deprecated in favour of `gdbarch_return_value'(*note gdbarch_return_value::).`void gdbarch_value_to_register (GDBARCH, FRAME, TYPE, BUF)'Convert a value of type TYPE into the raw contents of a register.*Note Using Different Register and Memory Data Representations:Target Architecture Definition.Motorola M68K target conditionals.`BPT_VECTOR'Define this to be the 4-bit location of the breakpoint trapvector. If not defined, it will default to `0xf'.`REMOTE_BPT_VECTOR'Defaults to `1'.`const char *gdbarch_name_of_malloc (GDBARCH)'A string containing the name of the function to call in order toallocate some memory in the inferior. The default value is"malloc".File: gdbint.info, Node: Adding a New Target, Prev: Target Conditionals, Up: Target Architecture Definition9.12 Adding a New Target========================The following files add a target to GDB:`gdb/config/ARCH/TTT.mt'Contains a Makefile fragment specific to this target. Specifieswhat object files are needed for target TTT, by defining`TDEPFILES=...' and `TDEPLIBS=...'. Also specifies the headerfile which describes TTT, by defining `TM_FILE= tm-TTT.h'.You can also define `TM_CFLAGS', `TM_CLIBS', `TM_CDEPS', but theseare now deprecated, replaced by autoconf, and may go away infuture versions of GDB.`gdb/TTT-tdep.c'Contains any miscellaneous code required for this target machine.On some machines it doesn't exist at all. Sometimes the macros in`tm-TTT.h' become very complicated, so they are implemented asfunctions here instead, and the macro is simply defined to call thefunction. This is vastly preferable, since it is easier tounderstand and debug.`gdb/ARCH-tdep.c'`gdb/ARCH-tdep.h'This often exists to describe the basic layout of the targetmachine's processor chip (registers, stack, etc.). If used, it isincluded by `TTT-tdep.h'. It can be shared among many targetsthat use the same processor.`gdb/config/ARCH/tm-TTT.h'(`tm.h' is a link to this file, created by `configure'). Containsmacro definitions about the target machine's registers, stack frameformat and instructions.New targets do not need this file and should not create it.`gdb/config/ARCH/tm-ARCH.h'This often exists to describe the basic layout of the targetmachine's processor chip (registers, stack, etc.). If used, it isincluded by `tm-TTT.h'. It can be shared among many targets thatuse the same processor.New targets do not need this file and should not create it.If you are adding a new operating system for an existing CPU chip,add a `config/tm-OS.h' file that describes the operating systemfacilities that are unusual (extra symbol table info; the breakpointinstruction needed; etc.). Then write a `ARCH/tm-OS.h' that just`#include's `tm-ARCH.h' and `config/tm-OS.h'.File: gdbint.info, Node: Target Descriptions, Next: Target Vector Definition, Prev: Target Architecture Definition, Up: Top10 Target Descriptions**********************The target architecture definition (*note Target ArchitectureDefinition::) contains GDB's hard-coded knowledge about anarchitecture. For some platforms, it is handy to have more flexibleknowledge about a specific instance of the architecture--for instance,a processor or development board. "Target descriptions" provide amechanism for the user to tell GDB more about what their targetsupports, or for the target to tell GDB directly.For details on writing, automatically supplying, and manuallyselecting target descriptions, see *Note Target Descriptions:(gdb)Target Descriptions. This section will cover some related topicsabout the GDB internals.* Menu:* Target Descriptions Implementation::* Adding Target Described Register Support::File: gdbint.info, Node: Target Descriptions Implementation, Next: Adding Target Described Register Support, Up: Target Descriptions10.1 Target Descriptions Implementation=======================================Before GDB connects to a new target, or runs a new program on anexisting target, it discards any existing target description andreverts to a default gdbarch. Then, after connecting, it looks for anew target description by calling `target_find_description'.A description may come from a user specified file (XML), the remote`qXfer:features:read' packet (also XML), or from any custom`to_read_description' routine in the target vector. For instance, theremote target supports guessing whether a MIPS target is 32-bit or64-bit based on the size of the `g' packet.If any target description is found, GDB creates a new gdbarchincorporating the description by calling `gdbarch_update_p'. Any`<architecture>' element is handled first, to determine whicharchitecture's gdbarch initialization routine is called to create thenew architecture. Then the initialization routine is called, and has achance to adjust the constructed architecture based on the contents ofthe target description. For instance, it can recognize any propertiesset by a `to_read_description' routine. Also see *Note Adding TargetDescribed Register Support::.File: gdbint.info, Node: Adding Target Described Register Support, Prev: Target Descriptions Implementation, Up: Target Descriptions10.2 Adding Target Described Register Support=============================================Target descriptions can report additional registers specific to aninstance of the target. But it takes a little work in the architecturespecific routines to support this.A target description must either have no registers or a completeset--this avoids complexity in trying to merge standard registers withthe target defined registers. It is the architecture's responsibilityto validate that a description with registers has everything it needs.To keep architecture code simple, the same mechanism is used to assignfixed internal register numbers to standard registers.If `tdesc_has_registers' returns 1, the description containsregisters. The architecture's `gdbarch_init' routine should:* Call `tdesc_data_alloc' to allocate storage, early, beforesearching for a matching gdbarch or allocating a new one.* Use `tdesc_find_feature' to locate standard features by name.* Use `tdesc_numbered_register' and `tdesc_numbered_register_choices'to locate the expected registers in the standard features.* Return `NULL' if a required feature is missing, or if any standardfeature is missing expected registers. This will produce awarning that the description was incomplete.* Free the allocated data before returning, unless`tdesc_use_registers' is called.* Call `set_gdbarch_num_regs' as usual, with a number higher than anyfixed number passed to `tdesc_numbered_register'.* Call `tdesc_use_registers' after creating a new gdbarch, beforereturning it.After `tdesc_use_registers' has been called, the architecture's`register_name', `register_type', and `register_reggroup_p' routineswill not be called; that information will be taken from the targetdescription. `num_regs' may be increased to account for any additionalregisters in the description.Pseudo-registers require some extra care:* Using `tdesc_numbered_register' allows the architecture to giveconstant register numbers to standard architectural registers, e.g.as an `enum' in `ARCH-tdep.h'. But because pseudo-registers arealways numbered above `num_regs', which may be increased by thedescription, constant numbers can not be used for pseudos. Theymust be numbered relative to `num_regs' instead.* The description will not describe pseudo-registers, so thearchitecture must call `set_tdesc_pseudo_register_name',`set_tdesc_pseudo_register_type', and`set_tdesc_pseudo_register_reggroup_p' to supply routinesdescribing pseudo registers. These routines will be passedinternal register numbers, so the same routines used for thegdbarch equivalents are usually suitable.File: gdbint.info, Node: Target Vector Definition, Next: Native Debugging, Prev: Target Descriptions, Up: Top11 Target Vector Definition***************************The target vector defines the interface between GDB's abstract handlingof target systems, and the nitty-gritty code that actually exercisescontrol over a process or a serial port. GDB includes some 30-40different target vectors; however, each configuration of GDB includesonly a few of them.* Menu:* Managing Execution State::* Existing Targets::File: gdbint.info, Node: Managing Execution State, Next: Existing Targets, Up: Target Vector Definition11.1 Managing Execution State=============================A target vector can be completely inactive (not pushed on the targetstack), active but not running (pushed, but not connected to a fullymanifested inferior), or completely active (pushed, with an accessibleinferior). Most targets are only completely inactive or completelyactive, but some support persistent connections to a target even whenthe target has exited or not yet started.For example, connecting to the simulator using `target sim' does notcreate a running program. Neither registers nor memory are accessibleuntil `run'. Similarly, after `kill', the program can not continueexecuting. But in both cases GDB remains connected to the simulator,and target-specific commands are directed to the simulator.A target which only supports complete activation should push itselfonto the stack in its `to_open' routine (by calling `push_target'), andunpush itself from the stack in its `to_mourn_inferior' routine (bycalling `unpush_target').A target which supports both partial and complete activation shouldstill call `push_target' in `to_open', but not call `unpush_target' in`to_mourn_inferior'. Instead, it should call either`target_mark_running' or `target_mark_exited' in its `to_open',depending on whether the target is fully active after connection. Itshould also call `target_mark_running' any time the inferior becomesfully active (e.g. in `to_create_inferior' and `to_attach'), and`target_mark_exited' when the inferior becomes inactive (in`to_mourn_inferior'). The target should also make sure to call`target_mourn_inferior' from its `to_kill', to return the target toinactive state.File: gdbint.info, Node: Existing Targets, Prev: Managing Execution State, Up: Target Vector Definition11.2 Existing Targets=====================11.2.1 File Targets-------------------Both executables and core files have target vectors.11.2.2 Standard Protocol and Remote Stubs-----------------------------------------GDB's file `remote.c' talks a serial protocol to code that runs in thetarget system. GDB provides several sample "stubs" that can beintegrated into target programs or operating systems for this purpose;they are named `*-stub.c'.The GDB user's manual describes how to put such a stub into yourtarget code. What follows is a discussion of integrating the SPARCstub into a complicated operating system (rather than a simpleprogram), by Stu Grossman, the author of this stub.The trap handling code in the stub assumes the following upon entryto `trap_low':1. %l1 and %l2 contain pc and npc respectively at the time of thetrap;2. traps are disabled;3. you are in the correct trap window.As long as your trap handler can guarantee those conditions, thenthere is no reason why you shouldn't be able to "share" traps with thestub. The stub has no requirement that it be jumped to directly fromthe hardware trap vector. That is why it calls `exceptionHandler()',which is provided by the external environment. For instance, this couldset up the hardware traps to actually execute code which calls the stubfirst, and then transfers to its own trap handler.For the most point, there probably won't be much of an issue with"sharing" traps, as the traps we use are usually not used by the kernel,and often indicate unrecoverable error conditions. Anyway, this is allcontrolled by a table, and is trivial to modify. The most importanttrap for us is for `ta 1'. Without that, we can't single step or dobreakpoints. Everything else is unnecessary for the proper operationof the debugger/stub.From reading the stub, it's probably not obvious how breakpointswork. They are simply done by deposit/examine operations from GDB.11.2.3 ROM Monitor Interface----------------------------11.2.4 Custom Protocols-----------------------11.2.5 Transport Layer----------------------11.2.6 Builtin Simulator------------------------File: gdbint.info, Node: Native Debugging, Next: Support Libraries, Prev: Target Vector Definition, Up: Top12 Native Debugging*******************Several files control GDB's configuration for native support:`gdb/config/ARCH/XYZ.mh'Specifies Makefile fragments needed by a _native_ configuration onmachine XYZ. In particular, this lists the requirednative-dependent object files, by defining `NATDEPFILES=...'.Also specifies the header file which describes native support onXYZ, by defining `NAT_FILE= nm-XYZ.h'. You can also define`NAT_CFLAGS', `NAT_ADD_FILES', `NAT_CLIBS', `NAT_CDEPS', etc.; see`Makefile.in'._Maintainer's note: The `.mh' suffix is because this fileoriginally contained `Makefile' fragments for hosting GDB onmachine XYZ. While the file is no longer used for this purpose,the `.mh' suffix remains. Perhaps someone will eventually renamethese fragments so that they have a `.mn' suffix._`gdb/config/ARCH/nm-XYZ.h'(`nm.h' is a link to this file, created by `configure'). ContainsC macro definitions describing the native system environment, suchas child process control and core file support.`gdb/XYZ-nat.c'Contains any miscellaneous C code required for this native supportof this machine. On some machines it doesn't exist at all.There are some "generic" versions of routines that can be used byvarious systems. These can be customized in various ways by macrosdefined in your `nm-XYZ.h' file. If these routines work for the XYZhost, you can just include the generic file's name (with `.o', not`.c') in `NATDEPFILES'.Otherwise, if your machine needs custom support routines, you willneed to write routines that perform the same functions as the genericfile. Put them into `XYZ-nat.c', and put `XYZ-nat.o' into`NATDEPFILES'.`inftarg.c'This contains the _target_ops vector_ that supports Unix childprocesses on systems which use ptrace and wait to control thechild.`procfs.c'This contains the _target_ops vector_ that supports Unix childprocesses on systems which use /proc to control the child.`fork-child.c'This does the low-level grunge that uses Unix system calls to do a"fork and exec" to start up a child process.`infptrace.c'This is the low level interface to inferior processes for systemsusing the Unix `ptrace' call in a vanilla way.12.1 Native core file Support=============================`core-aout.c::fetch_core_registers()'Support for reading registers out of a core file. This routinecalls `register_addr()', see below. Now that BFD is used to readcore files, virtually all machines should use `core-aout.c', andshould just provide `fetch_core_registers' in `XYZ-nat.c' (or`REGISTER_U_ADDR' in `nm-XYZ.h').`core-aout.c::register_addr()'If your `nm-XYZ.h' file defines the macro `REGISTER_U_ADDR(addr,blockend, regno)', it should be defined to set `addr' to theoffset within the `user' struct of GDB register number `regno'.`blockend' is the offset within the "upage" of `u.u_ar0'. If`REGISTER_U_ADDR' is defined, `core-aout.c' will define the`register_addr()' function and use the macro in it. If you do notdefine `REGISTER_U_ADDR', but you are using the standard`fetch_core_registers()', you will need to define your own versionof `register_addr()', put it into your `XYZ-nat.c' file, and besure `XYZ-nat.o' is in the `NATDEPFILES' list. If you have yourown `fetch_core_registers()', you may not need a separate`register_addr()'. Many custom `fetch_core_registers()'implementations simply locate the registers themselves.When making GDB run native on a new operating system, to make itpossible to debug core files, you will need to either write specificcode for parsing your OS's core files, or customize `bfd/trad-core.c'.First, use whatever `#include' files your machine uses to define thestruct of registers that is accessible (possibly in the u-area) in acore file (rather than `machine/reg.h'), and an include file thatdefines whatever header exists on a core file (e.g., the u-area or a`struct core'). Then modify `trad_unix_core_file_p' to use thesevalues to set up the section information for the data segment, stacksegment, any other segments in the core file (perhaps shared librarycontents or control information), "registers" segment, and if there aretwo discontiguous sets of registers (e.g., integer and float), the"reg2" segment. This section information basically delimits areas inthe core file in a standard way, which the section-reading routines inBFD know how to seek around in.Then back in GDB, you need a matching routine called`fetch_core_registers'. If you can use the generic one, it's in`core-aout.c'; if not, it's in your `XYZ-nat.c' file. It will bepassed a char pointer to the entire "registers" segment, its length,and a zero; or a char pointer to the entire "regs2" segment, itslength, and a 2. The routine should suck out the supplied registervalues and install them into GDB's "registers" array.If your system uses `/proc' to control processes, and uses ELFformat core files, then you may be able to use the same routines forreading the registers out of processes and out of core files.12.2 ptrace===========12.3 /proc==========12.4 win32==========12.5 shared libraries=====================12.6 Native Conditionals========================When GDB is configured and compiled, various macros are defined or leftundefined, to control compilation when the host and target systems arethe same. These macros should be defined (or left undefined) in`nm-SYSTEM.h'.`CHILD_PREPARE_TO_STORE'If the machine stores all registers at once in the child process,then define this to ensure that all values are correct. Thisusually entails a read from the child.[Note that this is incorrectly defined in `xm-SYSTEM.h' filescurrently.]`FETCH_INFERIOR_REGISTERS'Define this if the native-dependent code will provide its ownroutines `fetch_inferior_registers' and `store_inferior_registers'in `HOST-nat.c'. If this symbol is _not_ defined, and`infptrace.c' is included in this configuration, the defaultroutines in `infptrace.c' are used for these functions.`int gdbarch_fp0_regnum (GDBARCH)'This functions normally returns the number of the first floatingpoint register, if the machine has such registers. As such, itwould appear only in target-specific code. However, `/proc'support uses this to decide whether floats are in use on thistarget.`int gdbarch_get_longjmp_target (GDBARCH)'For most machines, this is a target-dependent parameter. On theDECstation and the Iris, this is a native-dependent parameter,since `setjmp.h' is needed to define it.This function determines the target PC address that `longjmp' willjump to, assuming that we have just stopped at a longjmpbreakpoint. It takes a `CORE_ADDR *' as argument, and stores thetarget PC value through this pointer. It examines the currentstate of the machine as needed.`I386_USE_GENERIC_WATCHPOINTS'An x86-based machine can define this to use the generic x86watchpoint support; see *Note I386_USE_GENERIC_WATCHPOINTS:Algorithms.`ONE_PROCESS_WRITETEXT'Define this to be able to, when a breakpoint insertion fails, warnthe user that another process may be running with the sameexecutable.`PROC_NAME_FMT'Defines the format for the name of a `/proc' device. Should bedefined in `nm.h' _only_ in order to override the defaultdefinition in `procfs.c'.`SOLIB_ADD (FILENAME, FROM_TTY, TARG, READSYMS)'Define this to expand into an expression that will cause thesymbols in FILENAME to be added to GDB's symbol table. If READSYMSis zero symbols are not read but any necessary low levelprocessing for FILENAME is still done.`SOLIB_CREATE_INFERIOR_HOOK'Define this to expand into any shared-library-relocation code thatyou want to be run just after the child process has been forked.`START_INFERIOR_TRAPS_EXPECTED'When starting an inferior, GDB normally expects to trap twice;once when the shell execs, and once when the program itself execs.If the actual number of traps is something other than 2, thendefine this macro to expand into the number expected.File: gdbint.info, Node: Support Libraries, Next: Coding, Prev: Native Debugging, Up: Top13 Support Libraries********************13.1 BFD========BFD provides support for GDB in several ways:_identifying executable and core files_BFD will identify a variety of file types, including a.out, coff,and several variants thereof, as well as several kinds of corefiles._access to sections of files_BFD parses the file headers to determine the names, virtualaddresses, sizes, and file locations of all the various namedsections in files (such as the text section or the data section).GDB simply calls BFD to read or write section X at byte offset Yfor length Z._specialized core file support_BFD provides routines to determine the failing command name storedin a core file, the signal with which the program failed, andwhether a core file matches (i.e. could be a core dump of) aparticular executable file._locating the symbol information_GDB uses an internal interface of BFD to determine where to findthe symbol information in an executable file or symbol-file. GDBitself handles the reading of symbols, since BFD does not"understand" debug symbols, but GDB uses BFD's cached informationto find the symbols, string table, etc.13.2 opcodes============The opcodes library provides GDB's disassembler. (It's a separatelibrary because it's also used in binutils, for `objdump').13.3 readline=============The `readline' library provides a set of functions for use byapplications that allow users to edit command lines as they are typedin.13.4 libiberty==============The `libiberty' library provides a set of functions and features thatintegrate and improve on functionality found in modern operatingsystems. Broadly speaking, such features can be divided into threegroups: supplemental functions (functions that may be missing in someenvironments and operating systems), replacement functions (providing auniform and easier to use interface for commonly used standardfunctions), and extensions (which provide additional functionalitybeyond standard functions).GDB uses various features provided by the `libiberty' library, forinstance the C++ demangler, the IEEE floating format support functions,the input options parser `getopt', the `obstack' extension, and otherfunctions.13.4.1 `obstacks' in GDB------------------------The obstack mechanism provides a convenient way to allocate and freechunks of memory. Each obstack is a pool of memory that is managedlike a stack. Objects (of any nature, size and alignment) areallocated and freed in a LIFO fashion on an obstack (see `libiberty''sdocumentation for a more detailed explanation of `obstacks').The most noticeable use of the `obstacks' in GDB is in object files.There is an obstack associated with each internal representation of anobject file. Lots of things get allocated on these `obstacks':dictionary entries, blocks, blockvectors, symbols, minimal symbols,types, vectors of fundamental types, class fields of types, objectfiles section lists, object files section offset lists, line tables,symbol tables, partial symbol tables, string tables, symbol tableprivate data, macros tables, debug information sections and entries,import and export lists (som), unwind information (hppa), dwarf2location expressions data. Plus various strings such as directorynames strings, debug format strings, names of types.An essential and convenient property of all data on `obstacks' isthat memory for it gets allocated (with `obstack_alloc') at varioustimes during a debugging session, but it is released all at once usingthe `obstack_free' function. The `obstack_free' function takes apointer to where in the stack it must start the deletion from (muchlike the cleanup chains have a pointer to where to start the cleanups).Because of the stack like structure of the `obstacks', this allows tofree only a top portion of the obstack. There are a few instances inGDB where such thing happens. Calls to `obstack_free' are done aftersome local data is allocated to the obstack. Only the local data isdeleted from the obstack. Of course this assumes that nothing betweenthe `obstack_alloc' and the `obstack_free' allocates anything else onthe same obstack. For this reason it is best and safest to usetemporary `obstacks'.Releasing the whole obstack is also not safe per se. It is safe onlyunder the condition that we know the `obstacks' memory is no longerneeded. In GDB we get rid of the `obstacks' only when we get rid ofthe whole objfile(s), for instance upon reading a new symbol file.13.5 gnu-regex==============Regex conditionals.`C_ALLOCA'`NFAILURES'`RE_NREGS'`SIGN_EXTEND_CHAR'`SWITCH_ENUM_BUG'`SYNTAX_TABLE'`Sword'`sparc'13.6 Array Containers=====================Often it is necessary to manipulate a dynamic array of a set ofobjects. C forces some bookkeeping on this, which can get cumbersomeand repetitive. The `vec.h' file contains macros for defining andusing a typesafe vector type. The functions defined will be inlinedwhen compiling, and so the abstraction cost should be zero. Domainchecks are added to detect programming errors.An example use would be an array of symbols or section information.The array can be grown as symbols are read in (or preallocated), andthe accessor macros provided keep care of all the necessarybookkeeping. Because the arrays are type safe, there is no danger ofaccidentally mixing up the contents. Think of these as C++ templates,but implemented in C.Because of the different behavior of structure objects, scalarobjects and of pointers, there are three flavors of vector, one foreach of these variants. Both the structure object and pointer variantspass pointers to objects around -- in the former case the pointers arestored into the vector and in the latter case the pointers aredereferenced and the objects copied into the vector. The scalar objectvariant is suitable for `int'-like objects, and the vector elements arereturned by value.There are both `index' and `iterate' accessors. The iteratorreturns a boolean iteration condition and updates the iterationvariable passed by reference. Because the iterator will be inlined,the address-of can be optimized away.The vectors are implemented using the trailing array idiom, thus theyare not resizeable without changing the address of the vector objectitself. This means you cannot have variables or fields of vector type-- always use a pointer to a vector. The one exception is the finalfield of a structure, which could be a vector type. You will have touse the `embedded_size' & `embedded_init' calls to create such objects,and they will probably not be resizeable (so don't use the "safe"allocation variants). The trailing array idiom is used (rather than apointer to an array of data), because, if we allow `NULL' to alsorepresent an empty vector, empty vectors occupy minimal space in thestructure containing them.Each operation that increases the number of active elements isavailable in "quick" and "safe" variants. The former presumes thatthere is sufficient allocated space for the operation to succeed (itdies if there is not). The latter will reallocate the vector, ifneeded. Reallocation causes an exponential increase in vector size.If you know you will be adding N elements, it would be more efficientto use the reserve operation before adding the elements with the"quick" operation. This will ensure there are at least as manyelements as you ask for, it will exponentially increase if there aretoo few spare slots. If you want reserve a specific number of slots,but do not want the exponential increase (for instance, you know thisis the last allocation), use a negative number for reservation. Youcan also create a vector of a specific size from the get go.You should prefer the push and pop operations, as they append andremove from the end of the vector. If you need to remove several itemsin one go, use the truncate operation. The insert and removeoperations allow you to change elements in the middle of the vector.There are two remove operations, one which preserves the elementordering `ordered_remove', and one which does not `unordered_remove'.The latter function copies the end element into the removed slot,rather than invoke a memmove operation. The `lower_bound' functionwill determine where to place an item in the array using insert thatwill maintain sorted order.If you need to directly manipulate a vector, then the `address'accessor will return the address of the start of the vector. Also the`space' predicate will tell you whether there is spare capacity in thevector. You will not normally need to use these two functions.Vector types are defined using a `DEF_VEC_{O,P,I}(TYPENAME)' macro.Variables of vector type are declared using a `VEC(TYPENAME)' macro.The characters `O', `P' and `I' indicate whether TYPENAME is an object(`O'), pointer (`P') or integral (`I') type. Be careful to pick thecorrect one, as you'll get an awkward and inefficient API if you usethe wrong one. There is a check, which results in a compile-timewarning, for the `P' and `I' versions, but there is no check for the`O' versions, as that is not possible in plain C.An example of their use would be,DEF_VEC_P(tree); // non-managed tree vector.struct my_struct {VEC(tree) *v; // A (pointer to) a vector of tree pointers.};struct my_struct *s;if (VEC_length(tree, s->v)) { we have some contents }VEC_safe_push(tree, s->v, decl); // append some decl onto the endfor (ix = 0; VEC_iterate(tree, s->v, ix, elt); ix++){ do something with elt }The `vec.h' file provides details on how to invoke the variousaccessors provided. They are enumerated here:`VEC_length'Return the number of items in the array,`VEC_empty'Return true if the array has no elements.`VEC_last'`VEC_index'Return the last or arbitrary item in the array.`VEC_iterate'Access an array element and indicate whether the array has beentraversed.`VEC_alloc'`VEC_free'Create and destroy an array.`VEC_embedded_size'`VEC_embedded_init'Helpers for embedding an array as the final element of anotherstruct.`VEC_copy'Duplicate an array.`VEC_space'Return the amount of free space in an array.`VEC_reserve'Ensure a certain amount of free space.`VEC_quick_push'`VEC_safe_push'Append to an array, either assuming the space is available, ormaking sure that it is.`VEC_pop'Remove the last item from an array.`VEC_truncate'Remove several items from the end of an array.`VEC_safe_grow'Add several items to the end of an array.`VEC_replace'Overwrite an item in the array.`VEC_quick_insert'`VEC_safe_insert'Insert an item into the middle of the array. Either the space mustalready exist, or the space is created.`VEC_ordered_remove'`VEC_unordered_remove'Remove an item from the array, preserving order or not.`VEC_block_remove'Remove a set of items from the array.`VEC_address'Provide the address of the first element.`VEC_lower_bound'Binary search the array.13.7 include============File: gdbint.info, Node: Coding, Next: Porting GDB, Prev: Support Libraries, Up: Top14 Coding*********This chapter covers topics that are lower-level than the majoralgorithms of GDB.14.1 Cleanups=============Cleanups are a structured way to deal with things that need to be donelater.When your code does something (e.g., `xmalloc' some memory, or`open' a file) that needs to be undone later (e.g., `xfree' the memoryor `close' the file), it can make a cleanup. The cleanup will be doneat some future point: when the command is finished and control returnsto the top level; when an error occurs and the stack is unwound; orwhen your code decides it's time to explicitly perform cleanups.Alternatively you can elect to discard the cleanups you created.Syntax:`struct cleanup *OLD_CHAIN;'Declare a variable which will hold a cleanup chain handle.`OLD_CHAIN = make_cleanup (FUNCTION, ARG);'Make a cleanup which will cause FUNCTION to be called with ARG (a`char *') later. The result, OLD_CHAIN, is a handle that canlater be passed to `do_cleanups' or `discard_cleanups'. Unlessyou are going to call `do_cleanups' or `discard_cleanups', you canignore the result from `make_cleanup'.`do_cleanups (OLD_CHAIN);'Do all cleanups added to the chain since the corresponding`make_cleanup' call was made.`discard_cleanups (OLD_CHAIN);'Same as `do_cleanups' except that it just removes the cleanups fromthe chain and does not call the specified functions.Cleanups are implemented as a chain. The handle returned by`make_cleanups' includes the cleanup passed to the call and any latercleanups appended to the chain (but not yet discarded or performed).E.g.:make_cleanup (a, 0);{struct cleanup *old = make_cleanup (b, 0);make_cleanup (c, 0)...do_cleanups (old);}will call `c()' and `b()' but will not call `a()'. The cleanup thatcalls `a()' will remain in the cleanup chain, and will be done laterunless otherwise discarded.Your function should explicitly do or discard the cleanups itcreates. Failing to do this leads to non-deterministic behavior sincethe caller will arbitrarily do or discard your functions cleanups.This need leads to two common cleanup styles.The first style is try/finally. Before it exits, your code-blockcalls `do_cleanups' with the old cleanup chain and thus ensures thatyour code-block's cleanups are always performed. For instance, thefollowing code-segment avoids a memory leak problem (even when `error'is called and a forced stack unwind occurs) by ensuring that the`xfree' will always be called:struct cleanup *old = make_cleanup (null_cleanup, 0);data = xmalloc (sizeof blah);make_cleanup (xfree, data);... blah blah ...do_cleanups (old);The second style is try/except. Before it exits, your code-blockcalls `discard_cleanups' with the old cleanup chain and thus ensuresthat any created cleanups are not performed. For instance, thefollowing code segment, ensures that the file will be closed but onlyif there is an error:FILE *file = fopen ("afile", "r");struct cleanup *old = make_cleanup (close_file, file);... blah blah ...discard_cleanups (old);return file;Some functions, e.g., `fputs_filtered()' or `error()', specify thatthey "should not be called when cleanups are not in place". This meansthat any actions you need to reverse in the case of an error orinterruption must be on the cleanup chain before you call thesefunctions, since they might never return to your code (they `longjmp'instead).14.2 Per-architecture module data=================================The multi-arch framework includes a mechanism for adding modulespecific per-architecture data-pointers to the `struct gdbarch'architecture object.A module registers one or more per-architecture data-pointers using:-- Function: struct gdbarch_data *gdbarch_data_register_pre_init(gdbarch_data_pre_init_ftype *PRE_INIT)PRE_INIT is used to, on-demand, allocate an initial value for aper-architecture data-pointer using the architecture's obstack(passed in as a parameter). Since PRE_INIT can be called duringarchitecture creation, it is not parameterized with thearchitecture. and must not call modules that use per-architecturedata.-- Function: struct gdbarch_data *gdbarch_data_register_post_init(gdbarch_data_post_init_ftype *POST_INIT)POST_INIT is used to obtain an initial value for aper-architecture data-pointer _after_. Since POST_INIT is alwayscalled after architecture creation, it both receives the fullyinitialized architecture and is free to call modules that useper-architecture data (care needs to be taken to ensure that thoseother modules do not try to call back to this module as that willcreate in cycles in the initialization call graph).These functions return a `struct gdbarch_data' that is used toidentify the per-architecture data-pointer added for that module.The per-architecture data-pointer is accessed using the function:-- Function: void *gdbarch_data (struct gdbarch *GDBARCH, structgdbarch_data *DATA_HANDLE)Given the architecture ARCH and module data handle DATA_HANDLE(returned by `gdbarch_data_register_pre_init' or`gdbarch_data_register_post_init'), this function returns thecurrent value of the per-architecture data-pointer. If the datapointer is `NULL', it is first initialized by calling thecorresponding PRE_INIT or POST_INIT method.The examples below assume the following definitions:struct nozel { int total; };static struct gdbarch_data *nozel_handle;A module can extend the architecture vector, adding additionalper-architecture data, using the PRE_INIT method. The module'sper-architecture data is then initialized during architecture creation.In the below, the module's per-architecture _nozel_ is added. Anarchitecture can specify its nozel by calling `set_gdbarch_nozel' from`gdbarch_init'.static void *nozel_pre_init (struct obstack *obstack){struct nozel *data = OBSTACK_ZALLOC (obstack, struct nozel);return data;}extern voidset_gdbarch_nozel (struct gdbarch *gdbarch, int total){struct nozel *data = gdbarch_data (gdbarch, nozel_handle);data->total = nozel;}A module can on-demand create architecture dependant data structuresusing `post_init'.In the below, the nozel's total is computed on-demand by`nozel_post_init' using information obtained from the architecture.static void *nozel_post_init (struct gdbarch *gdbarch){struct nozel *data = GDBARCH_OBSTACK_ZALLOC (gdbarch, struct nozel);nozel->total = gdbarch... (gdbarch);return data;}extern intnozel_total (struct gdbarch *gdbarch){struct nozel *data = gdbarch_data (gdbarch, nozel_handle);return data->total;}14.3 Wrapping Output Lines==========================Output that goes through `printf_filtered' or `fputs_filtered' or`fputs_demangled' needs only to have calls to `wrap_here' added inplaces that would be good breaking points. The utility routines willtake care of actually wrapping if the line width is exceeded.The argument to `wrap_here' is an indentation string which isprinted _only_ if the line breaks there. This argument is saved awayand used later. It must remain valid until the next call to`wrap_here' or until a newline has been printed through the`*_filtered' functions. Don't pass in a local variable and then return!It is usually best to call `wrap_here' after printing a comma orspace. If you call it before printing a space, make sure that yourindentation properly accounts for the leading space that will print ifthe line wraps there.Any function or set of functions that produce filtered output mustfinish by printing a newline, to flush the wrap buffer, before switchingto unfiltered (`printf') output. Symbol reading routines that printwarnings are a good example.14.4 GDB Coding Standards=========================GDB follows the GNU coding standards, as described in`etc/standards.texi'. This file is also available for anonymous FTPfrom GNU archive sites. GDB takes a strict interpretation of thestandard; in general, when the GNU standard recommends a practice butdoes not require it, GDB requires it.GDB follows an additional set of coding standards specific to GDB,as described in the following sections.14.4.1 ISO C------------GDB assumes an ISO/IEC 9899:1990 (a.k.a. ISO C90) compliant compiler.GDB does not assume an ISO C or POSIX compliant C library.14.4.2 Memory Management------------------------GDB does not use the functions `malloc', `realloc', `calloc', `free'and `asprintf'.GDB uses the functions `xmalloc', `xrealloc' and `xcalloc' whenallocating memory. Unlike `malloc' et.al. these functions do notreturn when the memory pool is empty. Instead, they unwind the stackusing cleanups. These functions return `NULL' when requested toallocate a chunk of memory of size zero._Pragmatics: By using these functions, the need to check everymemory allocation is removed. These functions provide portablebehavior._GDB does not use the function `free'.GDB uses the function `xfree' to return memory to the memory pool.Consistent with ISO-C, this function ignores a request to free a `NULL'pointer._Pragmatics: On some systems `free' fails when passed a `NULL'pointer._GDB can use the non-portable function `alloca' for the allocation ofsmall temporary values (such as strings)._Pragmatics: This function is very non-portable. Some systemsrestrict the memory being allocated to no more than a few kilobytes._GDB uses the string function `xstrdup' and the print function`xstrprintf'._Pragmatics: `asprintf' and `strdup' can fail. Print functions suchas `sprintf' are very prone to buffer overflow errors._14.4.3 Compiler Warnings------------------------With few exceptions, developers should avoid the configuration option`--disable-werror' when building GDB. The exceptions are listed in thefile `gdb/MAINTAINERS'. The default, when building with GCC, is`--enable-werror'.This option causes GDB (when built using GCC) to be compiled with acarefully selected list of compiler warning flags. Any warnings fromthose flags are treated as errors.The current list of warning flags includes:`-Wall'Recommended GCC warnings.`-Wdeclaration-after-statement'GCC 3.x (and later) and C99 allow declarations mixed with code,but GCC 2.x and C89 do not.`-Wpointer-arith'`-Wformat-nonliteral'Non-literal format strings, with a few exceptions, are bugs - theymight contain unintended user-supplied format specifiers. SinceGDB uses the `format printf' attribute on all `printf' likefunctions this checks not just `printf' calls but also calls tofunctions such as `fprintf_unfiltered'.`-Wno-pointer-sign'In version 4.0, GCC began warning about pointer argument passing orassignment even when the source and destination differed only insignedness. However, most GDB code doesn't distinguish carefullybetween `char' and `unsigned char'. In early 2006 the GDBdevelopers decided correcting these warnings wasn't worth the timeit would take.`-Wno-unused-parameter'Due to the way that GDB is implemented many functions have unusedparameters. Consequently this warning is avoided. The macro`ATTRIBUTE_UNUSED' is not used as it leads to false negatives --it is not an error to have `ATTRIBUTE_UNUSED' on a parameter thatis being used.`-Wno-unused'`-Wno-switch'`-Wno-char-subscripts'These are warnings which might be useful for GDB, but arecurrently too noisy to enable with `-Werror'.14.4.4 Formatting-----------------The standard GNU recommendations for formatting must be followedstrictly.A function declaration should not have its name in column zero. Afunction definition should have its name in column zero./* Declaration */static void foo (void);/* Definition */voidfoo (void){}_Pragmatics: This simplifies scripting. Function definitions can befound using `^function-name'._There must be a space between a function or macro name and theopening parenthesis of its argument list (except for macro definitions,as required by C). There must not be a space after an openparen/bracket or before a close paren/bracket.While additional whitespace is generally helpful for reading, do notuse more than one blank line to separate blocks, and avoid addingwhitespace after the end of a program line (as of 1/99, some 600 lineshad whitespace after the semicolon). Excess whitespace causesdifficulties for `diff' and `patch' utilities.Pointers are declared using the traditional K&R C style:void *foo;and not:void * foo;void* foo;14.4.5 Comments---------------The standard GNU requirements on comments must be followed strictly.Block comments must appear in the following form, with no `/*'- or`*/'-only lines, and no leading `*':/* Wait for control to return from inferior to debugger. If inferiorgets a signal, we may decide to start it up again instead ofreturning. That is why there is a loop in this function. Whenthis function actually returns it means the inferior should be leftstopped and GDB should read more commands. */(Note that this format is encouraged by Emacs; tabbing for amulti-line comment works correctly, and `M-q' fills the blockconsistently.)Put a blank line between the block comments preceding function orvariable definitions, and the definition itself.In general, put function-body comments on lines by themselves, ratherthan trying to fit them into the 20 characters left at the end of aline, since either the comment or the code will inevitably get longerthan will fit, and then somebody will have to move it anyhow.14.4.6 C Usage--------------Code must not depend on the sizes of C data types, the format of thehost's floating point numbers, the alignment of anything, or the orderof evaluation of expressions.Use functions freely. There are only a handful of compute-boundareas in GDB that might be affected by the overhead of a function call,mainly in symbol reading. Most of GDB's performance is limited by thetarget interface (whether serial line or system call).However, use functions with moderation. A thousand one-linefunctions are just as hard to understand as a single thousand-linefunction._Macros are bad, M'kay._ (But if you have to use a macro, make surethat the macro arguments are protected with parentheses.)Declarations like `struct foo *' should be used in preference todeclarations like `typedef struct foo { ... } *foo_ptr'.14.4.7 Function Prototypes--------------------------Prototypes must be used when both _declaring_ and _defining_ afunction. Prototypes for GDB functions must include both the argumenttype and name, with the name matching that used in the actual functiondefinition.All external functions should have a declaration in a header filethat callers include, except for `_initialize_*' functions, which mustbe external so that `init.c' construction works, but shouldn't bevisible to random source files.Where a source file needs a forward declaration of a static function,that declaration must appear in a block near the top of the source file.14.4.8 Internal Error Recovery------------------------------During its execution, GDB can encounter two types of errors. Usererrors and internal errors. User errors include not only a userentering an incorrect command but also problems arising from corruptobject files and system errors when interacting with the target.Internal errors include situations where GDB has detected, at run time,a corrupt or erroneous situation.When reporting an internal error, GDB uses `internal_error' and`gdb_assert'.GDB must not call `abort' or `assert'._Pragmatics: There is no `internal_warning' function. Either thecode detected a user error, recovered from it and issued a `warning' orthe code failed to correctly recover from the user error and issued an`internal_error'._14.4.9 File Names-----------------Any file used when building the core of GDB must be in lower case. Anyfile used when building the core of GDB must be 8.3 unique. Theserequirements apply to both source and generated files._Pragmatics: The core of GDB must be buildable on many platformsincluding DJGPP and MacOS/HFS. Every time an unfriendly file isintroduced to the build process both `Makefile.in' and `configure.in'need to be modified accordingly. Compare the convoluted conversionprocess needed to transform `COPYING' into `copying.c' with theconversion needed to transform `version.in' into `version.c'._Any file non 8.3 compliant file (that is not used when building thecore of GDB) must be added to `gdb/config/djgpp/fnchange.lst'._Pragmatics: This is clearly a compromise._When GDB has a local version of a system header file (ex `string.h')the file name based on the POSIX header prefixed with `gdb_'(`gdb_string.h'). These headers should be relatively independent: theyshould use only macros defined by `configure', the compiler, or thehost; they should include only system headers; they should refer onlyto system types. They may be shared between multiple programs, e.g.GDB and GDBSERVER.For other files `-' is used as the separator.14.4.10 Include Files---------------------A `.c' file should include `defs.h' first.A `.c' file should directly include the `.h' file of everydeclaration and/or definition it directly refers to. It cannot rely onindirect inclusion.A `.h' file should directly include the `.h' file of everydeclaration and/or definition it directly refers to. It cannot rely onindirect inclusion. Exception: The file `defs.h' does not need to bedirectly included.An external declaration should only appear in one include file.An external declaration should never appear in a `.c' file.Exception: a declaration for the `_initialize' function that pacifies`-Wmissing-declaration'.A `typedef' definition should only appear in one include file.An opaque `struct' declaration can appear in multiple `.h' files.Where possible, a `.h' file should use an opaque `struct' declarationinstead of an include.All `.h' files should be wrapped in:#ifndef INCLUDE_FILE_NAME_H#define INCLUDE_FILE_NAME_Hheader body#endif14.4.11 Clean Design and Portable Implementation------------------------------------------------In addition to getting the syntax right, there's the little question ofsemantics. Some things are done in certain ways in GDB because longexperience has shown that the more obvious ways caused various kinds oftrouble.You can't assume the byte order of anything that comes from a target(including VALUEs, object files, and instructions). Such things mustbe byte-swapped using `SWAP_TARGET_AND_HOST' in GDB, or one of the swaproutines defined in `bfd.h', such as `bfd_get_32'.You can't assume that you know what interface is being used to talkto the target system. All references to the target must go through thecurrent `target_ops' vector.You can't assume that the host and target machines are the samemachine (except in the "native" support modules). In particular, youcan't assume that the target machine's header files will be availableon the host machine. Target code must bring along its own header files- written from scratch or explicitly donated by their owner, to avoidcopyright problems.Insertion of new `#ifdef''s will be frowned upon. It's much betterto write the code portably than to conditionalize it for varioussystems.New `#ifdef''s which test for specific compilers or manufacturers oroperating systems are unacceptable. All `#ifdef''s should test forfeatures. The information about which configurations contain whichfeatures should be segregated into the configuration files. Experiencehas proven far too often that a feature unique to one particular systemoften creeps into other systems; and that a conditional based on somepredefined macro for your current system will become worthless overtime, as new versions of your system come out that behave differentlywith regard to this feature.Adding code that handles specific architectures, operating systems,target interfaces, or hosts, is not acceptable in generic code.One particularly notorious area where system dependencies tend tocreep in is handling of file names. The mainline GDB code assumesPosix semantics of file names: absolute file names begin with a forwardslash `/', slashes are used to separate leading directories,case-sensitive file names. These assumptions are not necessarily trueon non-Posix systems such as MS-Windows. To avoid system-dependentcode where you need to take apart or construct a file name, use thefollowing portable macros:`HAVE_DOS_BASED_FILE_SYSTEM'This preprocessing symbol is defined to a non-zero value on hostswhose filesystems belong to the MS-DOS/MS-Windows family. Use thissymbol to write conditional code which should only be compiled forsuch hosts.`IS_DIR_SEPARATOR (C)'Evaluates to a non-zero value if C is a directory separatorcharacter. On Unix and GNU/Linux systems, only a slash `/' issuch a character, but on Windows, both `/' and `\' will pass.`IS_ABSOLUTE_PATH (FILE)'Evaluates to a non-zero value if FILE is an absolute file name.For Unix and GNU/Linux hosts, a name which begins with a slash `/'is absolute. On DOS and Windows, `d:/foo' and `x:\bar' are alsoabsolute file names.`FILENAME_CMP (F1, F2)'Calls a function which compares file names F1 and F2 asappropriate for the underlying host filesystem. For Posix systems,this simply calls `strcmp'; on case-insensitive filesystems itwill call `strcasecmp' instead.`DIRNAME_SEPARATOR'Evaluates to a character which separates directories in`PATH'-style lists, typically held in environment variables. Thischaracter is `:' on Unix, `;' on DOS and Windows.`SLASH_STRING'This evaluates to a constant string you should use to produce anabsolute filename from leading directories and the file's basename.`SLASH_STRING' is `"/"' on most systems, but might be `"\\"' forsome Windows-based ports.In addition to using these macros, be sure to use portable libraryfunctions whenever possible. For example, to extract a directory or abasename part from a file name, use the `dirname' and `basename'library functions (available in `libiberty' for platforms which don'tprovide them), instead of searching for a slash with `strrchr'.Another way to generalize GDB along a particular interface is with anattribute struct. For example, GDB has been generalized to handlemultiple kinds of remote interfaces--not by `#ifdef's everywhere, butby defining the `target_ops' structure and having a current target (aswell as a stack of targets below it, for memory references). Wheneversomething needs to be done that depends on which remote interface we areusing, a flag in the current target_ops structure is tested (e.g.,`target_has_stack'), or a function is called through a pointer in thecurrent target_ops structure. In this way, when a new remote interfaceis added, only one module needs to be touched--the one that actuallyimplements the new remote interface. Other examples ofattribute-structs are BFD access to multiple kinds of object fileformats, or GDB's access to multiple source languages.Please avoid duplicating code. For example, in GDB 3.x all the codeinterfacing between `ptrace' and the rest of GDB was duplicated in`*-dep.c', and so changing something was very painful. In GDB 4.x,these have all been consolidated into `infptrace.c'. `infptrace.c' candeal with variations between systems the same way any system-independentfile would (hooks, `#if defined', etc.), and machines which areradically different don't need to use `infptrace.c' at all.All debugging code must be controllable using the `set debug MODULE'command. Do not use `printf' to print trace messages. Use`fprintf_unfiltered(gdb_stdlog, ...'. Do not use `#ifdef DEBUG'.File: gdbint.info, Node: Porting GDB, Next: Versions and Branches, Prev: Coding, Up: Top15 Porting GDB**************Most of the work in making GDB compile on a new machine is inspecifying the configuration of the machine. This is done in adizzying variety of header files and configuration scripts, which wehope to make more sensible soon. Let's say your new host is called anXYZ (e.g., `sun4'), and its full three-part configuration name is`ARCH-XVEND-XOS' (e.g., `sparc-sun-sunos4'). In particular:* In the top level directory, edit `config.sub' and add ARCH, XVEND,and XOS to the lists of supported architectures, vendors, andoperating systems near the bottom of the file. Also, add XYZ asan alias that maps to `ARCH-XVEND-XOS'. You can test your changesby running./config.sub XYZand./config.sub `ARCH-XVEND-XOS'which should both respond with `ARCH-XVEND-XOS' and no errormessages.You need to port BFD, if that hasn't been done already. PortingBFD is beyond the scope of this manual.* To configure GDB itself, edit `gdb/configure.host' to recognizeyour system and set `gdb_host' to XYZ, and (unless your desiredtarget is already available) also edit `gdb/configure.tgt',setting `gdb_target' to something appropriate (for instance, XYZ)._Maintainer's note: Work in progress. The file`gdb/configure.host' originally needed to be modified when either anew native target or a new host machine was being added to GDB.Recent changes have removed this requirement. The file now onlyneeds to be modified when adding a new native configuration. Thiswill likely changed again in the future._* Finally, you'll need to specify and define GDB's host-, native-,and target-dependent `.h' and `.c' files used for yourconfiguration.File: gdbint.info, Node: Versions and Branches, Next: Start of New Year Procedure, Prev: Porting GDB, Up: Top16 Versions and Branches************************16.1 Versions=============GDB's version is determined by the file `gdb/version.in' and takes oneof the following forms:MAJOR.MINORMAJOR.MINOR.PATCHLEVELan official release (e.g., 6.2 or 6.2.1)MAJOR.MINOR.PATCHLEVEL.YYYYMMDDa snapshot taken at YYYY-MM-DD-gmt (e.g., 6.1.50.20020302,6.1.90.20020304, or 6.1.0.20020308)MAJOR.MINOR.PATCHLEVEL.YYYYMMDD-cvsa CVS check out drawn on YYYY-MM-DD (e.g., 6.1.50.20020302-cvs,6.1.90.20020304-cvs, or 6.1.0.20020308-cvs)MAJOR.MINOR.PATCHLEVEL.YYYYMMDD (VENDOR)a vendor specific release of GDB, that while based onMAJOR.MINOR.PATCHLEVEL.YYYYMMDD, may include additional changesGDB's mainline uses the MAJOR and MINOR version numbers from themost recent release branch, with a PATCHLEVEL of 50. At the time eachnew release branch is created, the mainline's MAJOR and MINOR versionnumbers are updated.GDB's release branch is similar. When the branch is cut, thePATCHLEVEL is changed from 50 to 90. As draft releases are drawn fromthe branch, the PATCHLEVEL is incremented. Once the first release(MAJOR.MINOR) has been made, the PATCHLEVEL is set to 0 and updateshave an incremented PATCHLEVEL.For snapshots, and CVS check outs, it is also possible to identifythe CVS origin:MAJOR.MINOR.50.YYYYMMDDdrawn from the HEAD of mainline CVS (e.g., 6.1.50.20020302)MAJOR.MINOR.90.YYYYMMDDMAJOR.MINOR.91.YYYYMMDD ...drawn from a release branch prior to the release (e.g.,6.1.90.20020304)MAJOR.MINOR.0.YYYYMMDDMAJOR.MINOR.1.YYYYMMDD ...drawn from a release branch after the release (e.g.,6.2.0.20020308)If the previous GDB version is 6.1 and the current version is 6.2,then, substituting 6 for MAJOR and 1 or 2 for MINOR, here's anillustration of a typical sequence:<HEAD>|6.1.50.20020302-cvs|+--------------------------.| <gdb_6_2-branch>| |6.2.50.20020303-cvs 6.1.90 (draft #1)| |6.2.50.20020304-cvs 6.1.90.20020304-cvs| |6.2.50.20020305-cvs 6.1.91 (draft #2)| |6.2.50.20020306-cvs 6.1.91.20020306-cvs| |6.2.50.20020307-cvs 6.2 (release)| |6.2.50.20020308-cvs 6.2.0.20020308-cvs| |6.2.50.20020309-cvs 6.2.1 (update)| |6.2.50.20020310-cvs <branch closed>|6.2.50.20020311-cvs|+--------------------------.| <gdb_6_3-branch>| |6.3.50.20020312-cvs 6.2.90 (draft #1)| |16.2 Release Branches=====================GDB draws a release series (6.2, 6.2.1, ...) from a single releasebranch, and identifies that branch using the CVS branch tags:gdb_MAJOR_MINOR-YYYYMMDD-branchpointgdb_MAJOR_MINOR-branchgdb_MAJOR_MINOR-YYYYMMDD-release_Pragmatics: To help identify the date at which a branch or releaseis made, both the branchpoint and release tags include the date thatthey are cut (YYYYMMDD) in the tag. The branch tag, denoting the headof the branch, does not need this._16.3 Vendor Branches====================To avoid version conflicts, vendors are expected to modify the file`gdb/version.in' to include a vendor unique alphabetic identifier (anofficial GDB release never uses alphabetic characters in its versionidentifier). E.g., `6.2widgit2', or `6.2 (Widgit Inc Patch 2)'.16.4 Experimental Branches==========================16.4.1 Guidelines-----------------GDB permits the creation of branches, cut from the CVS repository, forexperimental development. Branches make it possible for developers toshare preliminary work, and maintainers to examine significant newdevelopments.The following are a set of guidelines for creating such branches:_a branch has an owner_The owner can set further policy for a branch, but may not changethe ground rules. In particular, they can set a policy forcommits (be it adding more reviewers or deciding who can commit)._all commits are posted_All changes committed to a branch shall also be posted to the GDBpatches mailing list <gdb-patches@sources.redhat.com>. Whilecommentary on such changes are encouraged, people should rememberthat the changes only apply to a branch._all commits are covered by an assignment_This ensures that all changes belong to the Free SoftwareFoundation, and avoids the possibility that the branch may becomecontaminated._a branch is focused_A focused branch has a single objective or goal, and does notcontain unnecessary or irrelevant changes. Cleanups, whereidentified, being be pushed into the mainline as soon as possible._a branch tracks mainline_This keeps the level of divergence under control. It also keepsthe pressure on developers to push cleanups and other stuff intothe mainline._a branch shall contain the entire GDB module_The GDB module `gdb' should be specified when creating a branch(branches of individual files should be avoided). *Note Tags::._a branch shall be branded using `version.in'_The file `gdb/version.in' shall be modified so that it identifiesthe branch OWNER and branch NAME, e.g.,`6.2.50.20030303_owner_name' or `6.2 (Owner Name)'.16.4.2 Tags-----------To simplify the identification of GDB branches, the following branchtagging convention is strongly recommended:`OWNER_NAME-YYYYMMDD-branchpoint'`OWNER_NAME-YYYYMMDD-branch'The branch point and corresponding branch tag. YYYYMMDD is thedate that the branch was created. A branch is created using thesequence:cvs rtag OWNER_NAME-YYYYMMDD-branchpoint gdbcvs rtag -b -r OWNER_NAME-YYYYMMDD-branchpoint \OWNER_NAME-YYYYMMDD-branch gdb`OWNER_NAME-YYYYMMDD-mergepoint'The tagged point, on the mainline, that was used when merging thebranch on YYYYMMDD. To merge in all changes since the branch wascut, use a command sequence like:cvs rtag OWNER_NAME-YYYYMMDD-mergepoint gdbcvs update \-jOWNER_NAME-YYYYMMDD-branchpoint-jOWNER_NAME-YYYYMMDD-mergepointSimilar sequences can be used to just merge in changes since thelast merge.For further information on CVS, see Concurrent Versions System(http://www.gnu.org/software/cvs/).File: gdbint.info, Node: Start of New Year Procedure, Next: Releasing GDB, Prev: Versions and Branches, Up: Top17 Start of New Year Procedure******************************At the start of each new year, the following actions should beperformed:* Rotate the ChangeLog fileThe current `ChangeLog' file should be renamed into`ChangeLog-YYYY' where YYYY is the year that has just passed. Anew `ChangeLog' file should be created, and its contents shouldcontain a reference to the previous ChangeLog. The followingshould also be preserved at the end of the new ChangeLog, in orderto provide the appropriate settings when editing this file withEmacs:Local Variables:mode: change-logleft-margin: 8fill-column: 74version-control: neverEnd:* Add an entry for the newly created ChangeLog file(`ChangeLog-YYYY') in `gdb/config/djgpp/fnchange.lst'.* Update the copyright year in the startup messageUpdate the copyright year in file `top.c', function`print_gdb_version'.* Add the new year in the copyright notices of all source anddocumentation files. This can be done semi-automatically byrunning the `copyright.sh' script. This script requires Emacs 22or later to be installed.File: gdbint.info, Node: Releasing GDB, Next: Testsuite, Prev: Start of New Year Procedure, Up: Top18 Releasing GDB****************18.1 Branch Commit Policy=========================The branch commit policy is pretty slack. GDB releases 5.0, 5.1 and5.2 all used the below:* The `gdb/MAINTAINERS' file still holds.* Don't fix something on the branch unless/until it is also fixed inthe trunk. If this isn't possible, mentioning it in the`gdb/PROBLEMS' file is better than committing a hack.* When considering a patch for the branch, suggested criteriainclude: Does it fix a build? Does it fix the sequence `breakmain; run' when debugging a static binary?* The further a change is from the core of GDB, the less likely thechange will worry anyone (e.g., target specific code).* Only post a proposal to change the core of GDB after you've sentindividual bribes to all the people listed in the `MAINTAINERS'file ;-)_Pragmatics: Provided updates are restricted to non-corefunctionality there is little chance that a broken change will be fatal.This means that changes such as adding a new architectures or (withinreason) support for a new host are considered acceptable._18.2 Obsoleting code====================Before anything else, poke the other developers (and around the sourcecode) to see if there is anything that can be removed from GDB (an oldtarget, an unused file).Obsolete code is identified by adding an `OBSOLETE' prefix to everyline. Doing this means that it is easy to identify something that hasbeen obsoleted when greping through the sources.The process is done in stages -- this is mainly to ensure that thewider GDB community has a reasonable opportunity to respond. Remember,everything on the Internet takes a week.1. Post the proposal on the GDB mailing list <gdb@sources.redhat.com>Creating a bug report to track the task's state, is also highlyrecommended.2. Wait a week or so.3. Post the proposal on the GDB Announcement mailing list<gdb-announce@sources.redhat.com>.4. Wait a week or so.5. Go through and edit all relevant files and lines so that they areprefixed with the word `OBSOLETE'.6. Wait until the next GDB version, containing this obsolete code,has been released.7. Remove the obsolete code._Maintainer note: While removing old code is regrettable it ishopefully better for GDB's long term development. Firstly it helps thedevelopers by removing code that is either no longer relevant or simplywrong. Secondly since it removes any history associated with the file(effectively clearing the slate) the developer has a much freer handwhen it comes to fixing broken files._18.3 Before the Branch======================The most important objective at this stage is to find and fix simplechanges that become a pain to track once the branch is created. Forinstance, configuration problems that stop GDB from even building. Ifyou can't get the problem fixed, document it in the `gdb/PROBLEMS' file.Prompt for `gdb/NEWS'---------------------People always forget. Send a post reminding them but also if you knowsomething interesting happened add it yourself. The `schedule' scriptwill mention this in its e-mail.Review `gdb/README'-------------------Grab one of the nightly snapshots and then walk through the`gdb/README' looking for anything that can be improved. The `schedule'script will mention this in its e-mail.Refresh any imported files.---------------------------A number of files are taken from external repositories. They include:* `texinfo/texinfo.tex'* `config.guess' et. al. (see the top-level `MAINTAINERS' file)* `etc/standards.texi', `etc/make-stds.texi'Check the ARI-------------A.R.I. is an `awk' script (Awk Regression Index ;-) that checks for anumber of errors and coding conventions. The checks include thingslike using `malloc' instead of `xmalloc' and file naming problems.There shouldn't be any regressions.18.3.1 Review the bug data base-------------------------------Close anything obviously fixed.18.3.2 Check all cross targets build------------------------------------The targets are listed in `gdb/MAINTAINERS'.18.4 Cut the Branch===================Create the branch-----------------$ u=5.1$ v=5.2$ V=`echo $v | sed 's/\./_/g'`$ D=`date -u +%Y-%m-%d`$ echo $u $V $D5.1 5_2 2002-03-03$ echo cvs -f -d :ext:sources.redhat.com:/cvs/src rtag \-D $D-gmt gdb_$V-$D-branchpoint insightcvs -f -d :ext:sources.redhat.com:/cvs/src rtag-D 2002-03-03-gmt gdb_5_2-2002-03-03-branchpoint insight$ ^echo ^^...$ echo cvs -f -d :ext:sources.redhat.com:/cvs/src rtag \-b -r gdb_$V-$D-branchpoint gdb_$V-branch insightcvs -f -d :ext:sources.redhat.com:/cvs/src rtag \-b -r gdb_5_2-2002-03-03-branchpoint gdb_5_2-branch insight$ ^echo ^^...$* By using `-D YYYY-MM-DD-gmt', the branch is forced to an exactdate/time.* The trunk is first tagged so that the branch point can easily befound.* Insight, which includes GDB, is tagged at the same time.* `version.in' gets bumped to avoid version number conflicts.* The reading of `.cvsrc' is disabled using `-f'.Update `version.in'-------------------$ u=5.1$ v=5.2$ V=`echo $v | sed 's/\./_/g'`$ echo $u $v$V5.1 5_2$ cd /tmp$ echo cvs -f -d :ext:sources.redhat.com:/cvs/src co \-r gdb_$V-branch src/gdb/version.incvs -f -d :ext:sources.redhat.com:/cvs/src co-r gdb_5_2-branch src/gdb/version.in$ ^echo ^^U src/gdb/version.in$ cd src/gdb$ echo $u.90-0000-00-00-cvs > version.in$ cat version.in5.1.90-0000-00-00-cvs$ cvs -f commit version.in* `0000-00-00' is used as a date to pump prime the version.in updatemechanism.* `.90' and the previous branch version are used as fairly arbitraryinitial branch version number.Update the web and news pages-----------------------------Something?Tweak cron to track the new branch----------------------------------The file `gdbadmin/cron/crontab' contains gdbadmin's cron table. Thisfile needs to be updated so that:* A daily timestamp is added to the file `version.in'.* The new branch is included in the snapshot process.See the file `gdbadmin/cron/README' for how to install the updated crontable.The file `gdbadmin/ss/README' should also be reviewed to reflect anychanges. That file is copied to both the branch/ and current/ snapshotdirectories.Update the NEWS and README files--------------------------------The `NEWS' file needs to be updated so that on the branch it refers to_changes in the current release_ while on the trunk it also refers to_changes since the current release_.The `README' file needs to be updated so that it refers to thecurrent release.Post the branch info--------------------Send an announcement to the mailing lists:* GDB Announcement mailing list <gdb-announce@sources.redhat.com>* GDB Discussion mailing list <gdb@sources.redhat.com> and GDBTesters mailing list <gdb-testers@sources.redhat.com>_Pragmatics: The branch creation is sent to the announce list toensure that people people not subscribed to the higher volume discussionlist are alerted._The announcement should include:* The branch tag.* How to check out the branch using CVS.* The date/number of weeks until the release.* The branch commit policy still holds.18.5 Stabilize the branch=========================Something goes here.18.6 Create a Release=====================The process of creating and then making available a release is brokendown into a number of stages. The first part addresses the technicalprocess of creating a releasable tar ball. The later stages address theprocess of releasing that tar ball.When making a release candidate just the first section is needed.18.6.1 Create a release candidate---------------------------------The objective at this stage is to create a set of tar balls that can bemade available as a formal release (or as a less formal releasecandidate).Freeze the branch.................Send out an e-mail notifying everyone that the branch is frozen to<gdb-patches@sources.redhat.com>.Establish a few defaults..........................$ b=gdb_5_2-branch$ v=5.2$ t=/sourceware/snapshot-tmp/gdbadmin-tmp$ echo $t/$b/$v/sourceware/snapshot-tmp/gdbadmin-tmp/gdb_5_2-branch/5.2$ mkdir -p $t/$b/$v$ cd $t/$b/$v$ pwd/sourceware/snapshot-tmp/gdbadmin-tmp/gdb_5_2-branch/5.2$ which autoconf/home/gdbadmin/bin/autoconf$Notes:* Check the `autoconf' version carefully. You want to be using theversion taken from the `binutils' snapshot directory, which can befound at `ftp://sources.redhat.com/pub/binutils/'. It is veryunlikely that a system installed version of `autoconf' (e.g.,`/usr/bin/autoconf') is correct.Check out the relevant modules:...............................$ for m in gdb insightdo( mkdir -p $m && cd $m && cvs -q -f -d /cvs/src co -P -r $b $m )done$Note:* The reading of `.cvsrc' is disabled (`-f') so that there isn't anyconfusion between what is written here and what your local `cvs'really does.Update relevant files.......................`gdb/NEWS'Major releases get their comments added as part of the mainline.Minor releases should probably mention any significant bugs thatwere fixed.Don't forget to include the `ChangeLog' entry.$ emacs gdb/src/gdb/NEWS...c-x 4 a...c-x c-s c-x c-c$ cp gdb/src/gdb/NEWS insight/src/gdb/NEWS$ cp gdb/src/gdb/ChangeLog insight/src/gdb/ChangeLog`gdb/README'You'll need to update:* The version.* The update date.* Who did it.$ emacs gdb/src/gdb/README...c-x 4 a...c-x c-s c-x c-c$ cp gdb/src/gdb/README insight/src/gdb/README$ cp gdb/src/gdb/ChangeLog insight/src/gdb/ChangeLog_Maintainer note: Hopefully the `README' file was reviewed beforethe initial branch was cut so just a simple substitute is neededto get it updated.__Maintainer note: Other projects generate `README' and `INSTALL'from the core documentation. This might be worth pursuing._`gdb/version.in'$ echo $v > gdb/src/gdb/version.in$ cat gdb/src/gdb/version.in5.2$ emacs gdb/src/gdb/version.in...c-x 4 a... Bump to version ...c-x c-s c-x c-c$ cp gdb/src/gdb/version.in insight/src/gdb/version.in$ cp gdb/src/gdb/ChangeLog insight/src/gdb/ChangeLogDo the dirty work.................This is identical to the process used to create the daily snapshot.$ for m in gdb insightdo( cd $m/src && gmake -f src-release $m.tar )doneIf the top level source directory does not have `src-release' (GDBversion 5.3.1 or earlier), try these commands instead:$ for m in gdb insightdo( cd $m/src && gmake -f Makefile.in $m.tar )doneCheck the source files......................You're looking for files that have mysteriously disappeared.`distclean' has the habit of deleting files it shouldn't. Watch outfor the `version.in' update `cronjob'.$ ( cd gdb/src && cvs -f -q -n update )M djunpack.bat? gdb-5.1.91.tar? proto-toplev... lots of generated files ...M gdb/ChangeLogM gdb/NEWSM gdb/READMEM gdb/version.in... lots of generated files ...$_Don't worry about the `gdb.info-??' or `gdb/p-exp.tab.c'. They weregenerated (and yes `gdb.info-1' was also generated only somethingstrange with CVS means that they didn't get suppressed). Fixing itwould be nice though._Create compressed versions of the release.........................................$ cp */src/*.tar .$ cp */src/*.bz2 .$ ls -Fgdb/ gdb-5.2.tar insight/ insight-5.2.tar$ for m in gdb insightdobzip2 -v -9 -c $m-$v.tar > $m-$v.tar.bz2gzip -v -9 -c $m-$v.tar > $m-$v.tar.gzdone$Note:* A pipe such as `bunzip2 < xxx.bz2 | gzip -9 > xxx.gz' is not since,in that mode, `gzip' does not know the name of the file and, hence,can not include it in the compressed file. This is also why therelease process runs `tar' and `bzip2' as separate passes.18.6.2 Sanity check the tar ball--------------------------------Pick a popular machine (Solaris/PPC?) and try the build on that.$ bunzip2 < gdb-5.2.tar.bz2 | tar xpf -$ cd gdb-5.2$ ./configure$ make...$ ./gdb/gdb ./gdb/gdbGNU gdb 5.2...(gdb) b mainBreakpoint 1 at 0x80732bc: file main.c, line 734.(gdb) runStarting program: /tmp/gdb-5.2/gdb/gdbBreakpoint 1, main (argc=1, argv=0xbffff8b4) at main.c:734734 catch_errors (captured_main, &args, "", RETURN_MASK_ALL);(gdb) print args$1 = {argc = 136426532, argv = 0x821b7f0}(gdb)18.6.3 Make a release candidate available-----------------------------------------If this is a release candidate then the only remaining steps are:1. Commit `version.in' and `ChangeLog'2. Tweak `version.in' (and `ChangeLog' to read L.M.N-0000-00-00-cvsso that the version update process can restart.3. Make the release candidate available in`ftp://sources.redhat.com/pub/gdb/snapshots/branch'4. Notify the relevant mailing lists ( <gdb@sources.redhat.com> and<gdb-testers@sources.redhat.com> that the candidate is available.18.6.4 Make a formal release available--------------------------------------(And you thought all that was required was to post an e-mail.)Install on sware................Copy the new files to both the release and the old release directory:$ cp *.bz2 *.gz ~ftp/pub/gdb/old-releases/$ cp *.bz2 *.gz ~ftp/pub/gdb/releasesClean up the releases directory so that only the most recent releasesare available (e.g. keep 5.2 and 5.2.1 but remove 5.1):$ cd ~ftp/pub/gdb/releases$ rm ...Update the file `README' and `.message' in the releases directory:$ vi README...$ rm -f .message$ ln README .messageUpdate the web pages......................`htdocs/download/ANNOUNCEMENT'This file, which is posted as the official announcement, includes:* General announcement.* News. If making an M.N.1 release, retain the news fromearlier M.N release.* Errata.`htdocs/index.html'`htdocs/news/index.html'`htdocs/download/index.html'These files include:* Announcement of the most recent release.* News entry (remember to update both the top level and thenews directory).These pages also need to be regenerate using `index.sh'.`download/onlinedocs/'You need to find the magic command that is used to generate theonline docs from the `.tar.bz2'. The best way is to look in theoutput from one of the nightly `cron' jobs and then just editaccordingly. Something like:$ ~/ss/update-web-docs \~ftp/pub/gdb/releases/gdb-5.2.tar.bz2 \$PWD/www \/www/sourceware/htdocs/gdb/download/onlinedocs \gdb`download/ari/'Just like the online documentation. Something like:$ /bin/sh ~/ss/update-web-ari \~ftp/pub/gdb/releases/gdb-5.2.tar.bz2 \$PWD/www \/www/sourceware/htdocs/gdb/download/ari \gdbShadow the pages onto gnu.........................Something goes here.Install the GDB tar ball on GNU...............................At the time of writing, the GNU machine was `gnudist.gnu.org' in`~ftp/gnu/gdb'.Make the `ANNOUNCEMENT'.......................Post the `ANNOUNCEMENT' file you created above to:* GDB Announcement mailing list <gdb-announce@sources.redhat.com>* General GNU Announcement list <info-gnu@gnu.org> (but delay it aday or so to let things get out)* GDB Bug Report mailing list <bug-gdb@gnu.org>18.6.5 Cleanup--------------The release is out but you're still not finished.Commit outstanding changes..........................In particular you'll need to commit any changes to:* `gdb/ChangeLog'* `gdb/version.in'* `gdb/NEWS'* `gdb/README'Tag the release...............Something like:$ d=`date -u +%Y-%m-%d`$ echo $d2002-01-24$ ( cd insight/src/gdb && cvs -f -q update )$ ( cd insight/src && cvs -f -q tag gdb_5_2-$d-release )Insight is used since that contains more of the release than GDB.Mention the release on the trunk................................Just put something in the `ChangeLog' so that the trunk also indicateswhen the release was made.Restart `gdb/version.in'........................If `gdb/version.in' does not contain an ISO date such as `2002-01-24'then the daily `cronjob' won't update it. Having committed all therelease changes it can be set to `5.2.0_0000-00-00-cvs' which willrestart things (yes the `_' is important - it affects the snapshotprocess).Don't forget the `ChangeLog'.Merge into trunk................The files committed to the branch may also need changes merged into thetrunk.Revise the release schedule...........................Post a revised release schedule to GDB Discussion List<gdb@sources.redhat.com> with an updated announcement. The schedulecan be generated by running:$ ~/ss/schedule `date +%s` scheduleThe first parameter is approximate date/time in seconds (from the epoch)of the most recent release.Also update the schedule `cronjob'.18.7 Post release=================Remove any `OBSOLETE' code.File: gdbint.info, Node: Testsuite, Next: Hints, Prev: Releasing GDB, Up: Top19 Testsuite************The testsuite is an important component of the GDB package. While itis always worthwhile to encourage user testing, in practice this israrely sufficient; users typically use only a small subset of theavailable commands, and it has proven all too common for a change tocause a significant regression that went unnoticed for some time.The GDB testsuite uses the DejaGNU testing framework. The teststhemselves are calls to various `Tcl' procs; the framework runs all theprocs and summarizes the passes and fails.19.1 Using the Testsuite========================To run the testsuite, simply go to the GDB object directory (or to thetestsuite's objdir) and type `make check'. This just sets up someenvironment variables and invokes DejaGNU's `runtest' script. Whilethe testsuite is running, you'll get mentions of which test file is inuse, and a mention of any unexpected passes or fails. When thetestsuite is finished, you'll get a summary that looks like this:=== gdb Summary ===# of expected passes 6016# of unexpected failures 58# of unexpected successes 5# of expected failures 183# of unresolved testcases 3# of untested testcases 5To run a specific test script, type:make check RUNTESTFLAGS='TESTS'where TESTS is a list of test script file names, separated by spaces.The ideal test run consists of expected passes only; however, realityconspires to keep us from this ideal. Unexpected failures indicatereal problems, whether in GDB or in the testsuite. Expected failuresare still failures, but ones which have been decided are too hard todeal with at the time; for instance, a test case might work everywhereexcept on AIX, and there is no prospect of the AIX case being fixed inthe near future. Expected failures should not be added lightly, sinceyou may be masking serious bugs in GDB. Unexpected successes areexpected fails that are passing for some reason, while unresolved anduntested cases often indicate some minor catastrophe, such as thecompiler being unable to deal with a test program.When making any significant change to GDB, you should run thetestsuite before and after the change, to confirm that there are noregressions. Note that truly complete testing would require that yourun the testsuite with all supported configurations and a variety ofcompilers; however this is more than really necessary. In many casestesting with a single configuration is sufficient. Other usefuloptions are to test one big-endian (Sparc) and one little-endian (x86)host, a cross config with a builtin simulator (powerpc-eabi, mips-elf),or a 64-bit host (Alpha).If you add new functionality to GDB, please consider adding testsfor it as well; this way future GDB hackers can detect and fix theirchanges that break the functionality you added. Similarly, if you fixa bug that was not previously reported as a test failure, please add atest case for it. Some cases are extremely difficult to test, such ascode that handles host OS failures or bugs in particular versions ofcompilers, and it's OK not to try to write tests for all of those.DejaGNU supports separate build, host, and target machines. However,some GDB test scripts do not work if the build machine and the hostmachine are not the same. In such an environment, these scripts willgive a result of "UNRESOLVED", like this:UNRESOLVED: gdb.base/example.exp: This test script does not work on a remote host.19.2 Testsuite Organization===========================The testsuite is entirely contained in `gdb/testsuite'. While thetestsuite includes some makefiles and configury, these are very minimal,and used for little besides cleaning up, since the tests themselveshandle the compilation of the programs that GDB will run. The file`testsuite/lib/gdb.exp' contains common utility procs useful for allGDB tests, while the directory `testsuite/config' containsconfiguration-specific files, typically used for special-purposedefinitions of procs like `gdb_load' and `gdb_start'.The tests themselves are to be found in `testsuite/gdb.*' andsubdirectories of those. The names of the test files must always endwith `.exp'. DejaGNU collects the test files by wildcarding in thetest directories, so both subdirectories and individual files getchosen and run in alphabetical order.The following table lists the main types of subdirectories and whatthey are for. Since DejaGNU finds test files no matter where they arelocated, and since each test file sets up its own compilation andexecution environment, this organization is simply for convenience andintelligibility.`gdb.base'This is the base testsuite. The tests in it should apply to allconfigurations of GDB (but generic native-only tests may livehere). The test programs should be in the subset of C that isvalid K&R, ANSI/ISO, and C++ (`#ifdef's are allowed if necessary,for instance for prototypes).`gdb.LANG'Language-specific tests for any language LANG besides C. Examplesare `gdb.cp' and `gdb.java'.`gdb.PLATFORM'Non-portable tests. The tests are specific to a specificconfiguration (host or target), such as HP-UX or eCos. Example is`gdb.hp', for HP-UX.`gdb.COMPILER'Tests specific to a particular compiler. As of this writing (June1999), there aren't currently any groups of tests in this categorythat couldn't just as sensibly be made platform-specific, but onecould imagine a `gdb.gcc', for tests of GDB's handling of GCCextensions.`gdb.SUBSYSTEM'Tests that exercise a specific GDB subsystem in more depth. Forinstance, `gdb.disasm' exercises various disassemblers, while`gdb.stabs' tests pathways through the stabs symbol reader.19.3 Writing Tests==================In many areas, the GDB tests are already quite comprehensive; youshould be able to copy existing tests to handle new cases.You should try to use `gdb_test' whenever possible, since itincludes cases to handle all the unexpected errors that might happen.However, it doesn't cost anything to add new test procedures; forinstance, `gdb.base/exprs.exp' defines a `test_expr' that calls`gdb_test' multiple times.Only use `send_gdb' and `gdb_expect' when absolutely necessary.Even if GDB has several valid responses to a command, you can use`gdb_test_multiple'. Like `gdb_test', `gdb_test_multiple' recognizesinternal errors and unexpected prompts.Do not write tests which expect a literal tab character from GDB.On some operating systems (e.g. OpenBSD) the TTY layer expands tabs tospaces, so by the time GDB's output reaches expect the tab is gone.The source language programs do _not_ need to be in a consistentstyle. Since GDB is used to debug programs written in many differentstyles, it's worth having a mix of styles in the testsuite; forinstance, some GDB bugs involving the display of source lines wouldnever manifest themselves if the programs used GNU coding styleuniformly.File: gdbint.info, Node: Hints, Next: GDB Observers, Prev: Testsuite, Up: Top20 Hints********Check the `README' file, it often has useful information that does notappear anywhere else in the directory.* Menu:* Getting Started:: Getting started working on GDB* Debugging GDB:: Debugging GDB with itselfFile: gdbint.info, Node: Getting Started, Up: Hints20.1 Getting Started====================GDB is a large and complicated program, and if you first starting towork on it, it can be hard to know where to start. Fortunately, if youknow how to go about it, there are ways to figure out what is going on.This manual, the GDB Internals manual, has information which appliesgenerally to many parts of GDB.Information about particular functions or data structures arelocated in comments with those functions or data structures. If yourun across a function or a global variable which does not have acomment correctly explaining what is does, this can be thought of as abug in GDB; feel free to submit a bug report, with a suggested commentif you can figure out what the comment should say. If you find acomment which is actually wrong, be especially sure to report that.Comments explaining the function of macros defined in host, target,or native dependent files can be in several places. Sometimes they arerepeated every place the macro is defined. Sometimes they are where themacro is used. Sometimes there is a header file which supplies adefault definition of the macro, and the comment is there. This manualalso documents all the available macros.Start with the header files. Once you have some idea of how GDB'sinternal symbol tables are stored (see `symtab.h', `gdbtypes.h'), youwill find it much easier to understand the code which uses and createsthose symbol tables.You may wish to process the information you are getting somehow, toenhance your understanding of it. Summarize it, translate it to anotherlanguage, add some (perhaps trivial or non-useful) feature to GDB, usethe code to predict what a test case would do and write the test caseand verify your prediction, etc. If you are reading code and your eyesare starting to glaze over, this is a sign you need to use a more activeapproach.Once you have a part of GDB to start with, you can find morespecifically the part you are looking for by stepping through eachfunction with the `next' command. Do not use `step' or you willquickly get distracted; when the function you are stepping throughcalls another function try only to get a big-picture understanding(perhaps using the comment at the beginning of the function beingcalled) of what it does. This way you can identify which of thefunctions being called by the function you are stepping through is theone which you are interested in. You may need to examine the datastructures generated at each stage, with reference to the comments inthe header files explaining what the data structures are supposed tolook like.Of course, this same technique can be used if you are just readingthe code, rather than actually stepping through it. The same generalprinciple applies--when the code you are looking at calls somethingelse, just try to understand generally what the code being called does,rather than worrying about all its details.A good place to start when tracking down some particular area is witha command which invokes that feature. Suppose you want to know howsingle-stepping works. As a GDB user, you know that the `step' commandinvokes single-stepping. The command is invoked via command tables(see `command.h'); by convention the function which actually performsthe command is formed by taking the name of the command and adding`_command', or in the case of an `info' subcommand, `_info'. Forexample, the `step' command invokes the `step_command' function and the`info display' command invokes `display_info'. When this convention isnot followed, you might have to use `grep' or `M-x tags-search' inemacs, or run GDB on itself and set a breakpoint in `execute_command'.If all of the above fail, it may be appropriate to ask forinformation on `bug-gdb'. But _never_ post a generic question like "Iwas wondering if anyone could give me some tips about understandingGDB"--if we had some magic secret we would put it in this manual.Suggestions for improving the manual are always welcome, of course.File: gdbint.info, Node: Debugging GDB, Up: Hints20.2 Debugging GDB with itself==============================If GDB is limping on your machine, this is the preferred way to get itfully functional. Be warned that in some ancient Unix systems, likeUltrix 4.2, a program can't be running in one process while it is beingdebugged in another. Rather than typing the command `./gdb ./gdb',which works on Suns and such, you can copy `gdb' to `gdb2' and thentype `./gdb ./gdb2'.When you run GDB in the GDB source directory, it will read a`.gdbinit' file that sets up some simple things to make debugging gdbeasier. The `info' command, when executed without a subcommand in aGDB being debugged by gdb, will pop you back up to the top level gdb.See `.gdbinit' for details.If you use emacs, you will probably want to do a `make TAGS' afteryou configure your distribution; this will put the machine dependentroutines for your local machine where they will be accessed first by`M-.'Also, make sure that you've either compiled GDB with your local cc,or have run `fixincludes' if you are compiling with gcc.20.3 Submitting Patches=======================Thanks for thinking of offering your changes back to the community ofGDB users. In general we like to get well designed enhancements.Thanks also for checking in advance about the best way to transfer thechanges.The GDB maintainers will only install "cleanly designed" patches.This manual summarizes what we believe to be clean design for GDB.If the maintainers don't have time to put the patch in when itarrives, or if there is any question about a patch, it goes into alarge queue with everyone else's patches and bug reports.The legal issue is that to incorporate substantial changes requires acopyright assignment from you and/or your employer, granting ownershipof the changes to the Free Software Foundation. You can get thestandard documents for doing this by sending mail to `gnu@gnu.org' andasking for it. We recommend that people write in "All programs ownedby the Free Software Foundation" as "NAME OF PROGRAM", so that changesin many programs (not just GDB, but GAS, Emacs, GCC, etc) can becontributed with only one piece of legalese pushed through thebureaucracy and filed with the FSF. We can't start merging changesuntil this paperwork is received by the FSF (their rules, which wefollow since we maintain it for them).Technically, the easiest way to receive changes is to receive eachfeature as a small context diff or unidiff, suitable for `patch'. Eachmessage sent to me should include the changes to C code and headerfiles for a single feature, plus `ChangeLog' entries for each directorywhere files were modified, and diffs for any changes needed to themanuals (`gdb/doc/gdb.texinfo' or `gdb/doc/gdbint.texinfo'). If thereare a lot of changes for a single feature, they can be split down intomultiple messages.In this way, if we read and like the feature, we can add it to thesources with a single patch command, do some testing, and check it in.If you leave out the `ChangeLog', we have to write one. If you leaveout the doc, we have to puzzle out what needs documenting. Etc., etc.The reason to send each change in a separate message is that we willnot install some of the changes. They'll be returned to you withquestions or comments. If we're doing our job correctly, the messageback to you will say what you have to fix in order to make the changeacceptable. The reason to have separate messages for separate featuresis so that the acceptable changes can be installed while one or morechanges are being reworked. If multiple features are sent in a singlemessage, we tend to not put in the effort to sort out the acceptablechanges from the unacceptable, so none of the features get installeduntil all are acceptable.If this sounds painful or authoritarian, well, it is. But we get alot of bug reports and a lot of patches, and many of them don't getinstalled because we don't have the time to finish the job that the bugreporter or the contributor could have done. Patches that arrivecomplete, working, and well designed, tend to get installed on the daythey arrive. The others go into a queue and get installed as timepermits, which, since the maintainers have many demands to meet, may notbe for quite some time.Please send patches directly to the GDB maintainers<gdb-patches@sources.redhat.com>.20.4 Obsolete Conditionals==========================Fragments of old code in GDB sometimes reference or set the followingconfiguration macros. They should not be used by new code, and old usesshould be removed as those parts of the debugger are otherwise touched.`STACK_END_ADDR'This macro used to define where the end of the stack appeared, foruse in interpreting core file formats that don't record thisaddress in the core file itself. This information is nowconfigured in BFD, and GDB gets the info portably from there. Thevalues in GDB's configuration files should be moved into BFDconfiguration files (if needed there), and deleted from all ofGDB's config files.Any `FOO-xdep.c' file that references STACK_END_ADDR is so oldthat it has never been converted to use BFD. Now that's old!20.5 Build Script=================The script `gdb_buildall.sh' builds GDB with flag`--enable-targets=all' set. This builds GDB with all supported targetsactivated. This helps testing GDB when doing changes that affect morethan one architecture and is much faster than using `gdb_mbuild.sh'.After building GDB the script checks which architectures aresupported and then switches the current architecture to each of thoseto get information about the architecture. The test results are storedin log files in the directory the script was called from.File: gdbint.info, Node: GDB Observers, Next: GNU Free Documentation License, Prev: Hints, Up: TopAppendix A GDB Currently available observers********************************************A.1 Implementation rationale============================An "observer" is an entity which is interested in being notified whenGDB reaches certain states, or certain events occur in GDB. The entitybeing observed is called the "subject". To receive notifications, theobserver attaches a callback to the subject. One subject can haveseveral observers.`observer.c' implements an internal generic low-level eventnotification mechanism. This generic event notification mechanism isthen re-used to implement the exported high-level notificationmanagement routines for all possible notifications.The current implementation of the generic observer provides supportfor contextual data. This contextual data is given to the subject whenattaching the callback. In return, the subject will provide thiscontextual data back to the observer as a parameter of the callback.Note that the current support for the contextual data is onlypartial, as it lacks a mechanism that would deallocate this data whenthe callback is detached. This is not a problem so far, as thiscontextual data is only used internally to hold a function pointer.Later on, if a certain observer needs to provide support for user-levelcontextual data, then the generic notification mechanism will need to beenhanced to allow the observer to provide a routine to deallocate thedata when attaching the callback.The observer implementation is also currently not reentrant. Inparticular, it is therefore not possible to call the attach or detachroutines during a notification.A.2 Debugging=============Observer notifications can be traced using the command `set debugobserver 1' (*note Optional messages about internal happenings:(gdb)Debugging Output.).A.3 `normal_stop' Notifications===============================GDB notifies all `normal_stop' observers when the inferior executionhas just stopped, the associated messages and annotations have beenprinted, and the control is about to be returned to the user.Note that the `normal_stop' notification is not emitted when theexecution stops due to a breakpoint, and this breakpoint has acondition that is not met. If the breakpoint has any associatedcommands list, the commands are executed after the notification isemitted.The following interfaces are available to manage observers:-- Function: extern struct observer *observer_attach_EVENT(observer_EVENT_ftype *F)Using the function F, create an observer that is notified whenever EVENT occurs, return the observer.-- Function: extern void observer_detach_EVENT (struct observer*OBSERVER);Remove OBSERVER from the list of observers to be notified whenEVENT occurs.-- Function: extern void observer_notify_EVENT (void);Send a notification to all EVENT observers.The following observable events are defined:-- Function: void normal_stop (struct bpstats *BS)The inferior has stopped for real.-- Function: void target_changed (struct target_ops *TARGET)The target's register contents have changed.-- Function: void executable_changed (void *UNUSED_ARGS)The executable being debugged by GDB has changed: The user decidedto debug a different program, or the program he was debugging hasbeen modified since being loaded by the debugger (by beingrecompiled, for instance).-- Function: void inferior_created (struct target_ops *OBJFILE, intFROM_TTY)GDB has just connected to an inferior. For `run', GDB calls thisobserver while the inferior is still stopped at the entry-pointinstruction. For `attach' and `core', GDB calls this observerimmediately after connecting to the inferior, and before anyinformation on the inferior has been printed.-- Function: void solib_loaded (struct so_list *SOLIB)The shared library specified by SOLIB has been loaded. Note thatwhen GDB calls this observer, the library's symbols probablyhaven't been loaded yet.-- Function: void solib_unloaded (struct so_list *SOLIB)The shared library specified by SOLIB has been unloaded.-- Function: void new_objfile (struct objfile *OBJFILE)The symbol file specified by OBJFILE has been loaded. Called withOBJFILE equal to `NULL' to indicate previously loaded symbol tabledata has now been invalidated.File: gdbint.info, Node: GNU Free Documentation License, Next: Index, Prev: GDB Observers, Up: TopAppendix B GNU Free Documentation License*****************************************Version 1.2, November 2002Copyright (C) 2000,2001,2002 Free Software Foundation, Inc.51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.Everyone is permitted to copy and distribute verbatim copiesof this license document, but changing it is not allowed.0. PREAMBLEThe purpose of this License is to make a manual, textbook, or otherfunctional and useful document "free" in the sense of freedom: toassure everyone the effective freedom to copy and redistribute it,with or without modifying it, either commercially ornoncommercially. Secondarily, this License preserves for theauthor and publisher a way to get credit for their work, while notbeing considered responsible for modifications made by others.This License is a kind of "copyleft", which means that derivativeworks of the document must themselves be free in the same sense.It complements the GNU General Public License, which is a copyleftlicense designed for free software.We have designed this License in order to use it for manuals forfree software, because free software needs free documentation: afree program should come with manuals providing the same freedomsthat the software does. But this License is not limited tosoftware manuals; it can be used for any textual work, regardlessof subject matter or whether it is published as a printed book.We recommend this License principally for works whose purpose isinstruction or reference.1. APPLICABILITY AND DEFINITIONSThis License applies to any manual or other work, in any medium,that contains a notice placed by the copyright holder saying itcan be distributed under the terms of this License. Such a noticegrants a world-wide, royalty-free license, unlimited in duration,to use that work under the conditions stated herein. The"Document", below, refers to any such manual or work. Any memberof the public is a licensee, and is addressed as "you". Youaccept the license if you copy, modify or distribute the work in away requiring permission under copyright law.A "Modified Version" of the Document means any work containing theDocument or a portion of it, either copied verbatim, or withmodifications and/or translated into another language.A "Secondary Section" is a named appendix or a front-matter sectionof the Document that deals exclusively with the relationship of thepublishers or authors of the Document to the Document's overallsubject (or to related matters) and contains nothing that couldfall directly within that overall subject. (Thus, if the Documentis in part a textbook of mathematics, a Secondary Section may notexplain any mathematics.) The relationship could be a matter ofhistorical connection with the subject or with related matters, orof legal, commercial, philosophical, ethical or political positionregarding them.The "Invariant Sections" are certain Secondary Sections whosetitles are designated, as being those of Invariant Sections, inthe notice that says that the Document is released under thisLicense. If a section does not fit the above definition ofSecondary then it is not allowed to be designated as Invariant.The Document may contain zero Invariant Sections. If the Documentdoes not identify any Invariant Sections then there are none.The "Cover Texts" are certain short passages of text that arelisted, as Front-Cover Texts or Back-Cover Texts, in the noticethat says that the Document is released under this License. AFront-Cover Text may be at most 5 words, and a Back-Cover Text maybe at most 25 words.A "Transparent" copy of the Document means a machine-readable copy,represented in a format whose specification is available to thegeneral public, that is suitable for revising the documentstraightforwardly with generic text editors or (for imagescomposed of pixels) generic paint programs or (for drawings) somewidely available drawing editor, and that is suitable for input totext formatters or for automatic translation to a variety offormats suitable for input to text formatters. A copy made in anotherwise Transparent file format whose markup, or absence ofmarkup, has been arranged to thwart or discourage subsequentmodification by readers is not Transparent. An image format isnot Transparent if used for any substantial amount of text. Acopy that is not "Transparent" is called "Opaque".Examples of suitable formats for Transparent copies include plainASCII without markup, Texinfo input format, LaTeX input format,SGML or XML using a publicly available DTD, andstandard-conforming simple HTML, PostScript or PDF designed forhuman modification. Examples of transparent image formats includePNG, XCF and JPG. Opaque formats include proprietary formats thatcan be read and edited only by proprietary word processors, SGML orXML for which the DTD and/or processing tools are not generallyavailable, and the machine-generated HTML, PostScript or PDFproduced by some word processors for output purposes only.The "Title Page" means, for a printed book, the title page itself,plus such following pages as are needed to hold, legibly, thematerial this License requires to appear in the title page. Forworks in formats which do not have any title page as such, "TitlePage" means the text near the most prominent appearance of thework's title, preceding the beginning of the body of the text.A section "Entitled XYZ" means a named subunit of the Documentwhose title either is precisely XYZ or contains XYZ in parenthesesfollowing text that translates XYZ in another language. (Here XYZstands for a specific section name mentioned below, such as"Acknowledgements", "Dedications", "Endorsements", or "History".)To "Preserve the Title" of such a section when you modify theDocument means that it remains a section "Entitled XYZ" accordingto this definition.The Document may include Warranty Disclaimers next to the noticewhich states that this License applies to the Document. TheseWarranty Disclaimers are considered to be included by reference inthis License, but only as regards disclaiming warranties: any otherimplication that these Warranty Disclaimers may have is void andhas no effect on the meaning of this License.2. VERBATIM COPYINGYou may copy and distribute the Document in any medium, eithercommercially or noncommercially, provided that this License, thecopyright notices, and the license notice saying this Licenseapplies to the Document are reproduced in all copies, and that youadd no other conditions whatsoever to those of this License. Youmay not use technical measures to obstruct or control the readingor further copying of the copies you make or distribute. However,you may accept compensation in exchange for copies. If youdistribute a large enough number of copies you must also followthe conditions in section 3.You may also lend copies, under the same conditions stated above,and you may publicly display copies.3. COPYING IN QUANTITYIf you publish printed copies (or copies in media that commonlyhave printed covers) of the Document, numbering more than 100, andthe Document's license notice requires Cover Texts, you mustenclose the copies in covers that carry, clearly and legibly, allthese Cover Texts: Front-Cover Texts on the front cover, andBack-Cover Texts on the back cover. Both covers must also clearlyand legibly identify you as the publisher of these copies. Thefront cover must present the full title with all words of thetitle equally prominent and visible. You may add other materialon the covers in addition. Copying with changes limited to thecovers, as long as they preserve the title of the Document andsatisfy these conditions, can be treated as verbatim copying inother respects.If the required texts for either cover are too voluminous to fitlegibly, you should put the first ones listed (as many as fitreasonably) on the actual cover, and continue the rest ontoadjacent pages.If you publish or distribute Opaque copies of the Documentnumbering more than 100, you must either include amachine-readable Transparent copy along with each Opaque copy, orstate in or with each Opaque copy a computer-network location fromwhich the general network-using public has access to downloadusing public-standard network protocols a complete Transparentcopy of the Document, free of added material. If you use thelatter option, you must take reasonably prudent steps, when youbegin distribution of Opaque copies in quantity, to ensure thatthis Transparent copy will remain thus accessible at the statedlocation until at least one year after the last time youdistribute an Opaque copy (directly or through your agents orretailers) of that edition to the public.It is requested, but not required, that you contact the authors ofthe Document well before redistributing any large number ofcopies, to give them a chance to provide you with an updatedversion of the Document.4. MODIFICATIONSYou may copy and distribute a Modified Version of the Documentunder the conditions of sections 2 and 3 above, provided that yourelease the Modified Version under precisely this License, withthe Modified Version filling the role of the Document, thuslicensing distribution and modification of the Modified Version towhoever possesses a copy of it. In addition, you must do thesethings in the Modified Version:A. Use in the Title Page (and on the covers, if any) a titledistinct from that of the Document, and from those ofprevious versions (which should, if there were any, be listedin the History section of the Document). You may use thesame title as a previous version if the original publisher ofthat version gives permission.B. List on the Title Page, as authors, one or more persons orentities responsible for authorship of the modifications inthe Modified Version, together with at least five of theprincipal authors of the Document (all of its principalauthors, if it has fewer than five), unless they release youfrom this requirement.C. State on the Title page the name of the publisher of theModified Version, as the publisher.D. Preserve all the copyright notices of the Document.E. Add an appropriate copyright notice for your modificationsadjacent to the other copyright notices.F. Include, immediately after the copyright notices, a licensenotice giving the public permission to use the ModifiedVersion under the terms of this License, in the form shown inthe Addendum below.G. Preserve in that license notice the full lists of InvariantSections and required Cover Texts given in the Document'slicense notice.H. Include an unaltered copy of this License.I. Preserve the section Entitled "History", Preserve its Title,and add to it an item stating at least the title, year, newauthors, and publisher of the Modified Version as given onthe Title Page. If there is no section Entitled "History" inthe Document, create one stating the title, year, authors,and publisher of the Document as given on its Title Page,then add an item describing the Modified Version as stated inthe previous sentence.J. Preserve the network location, if any, given in the Documentfor public access to a Transparent copy of the Document, andlikewise the network locations given in the Document forprevious versions it was based on. These may be placed inthe "History" section. You may omit a network location for awork that was published at least four years before theDocument itself, or if the original publisher of the versionit refers to gives permission.K. For any section Entitled "Acknowledgements" or "Dedications",Preserve the Title of the section, and preserve in thesection all the substance and tone of each of the contributoracknowledgements and/or dedications given therein.L. Preserve all the Invariant Sections of the Document,unaltered in their text and in their titles. Section numbersor the equivalent are not considered part of the sectiontitles.M. Delete any section Entitled "Endorsements". Such a sectionmay not be included in the Modified Version.N. Do not retitle any existing section to be Entitled"Endorsements" or to conflict in title with any InvariantSection.O. Preserve any Warranty Disclaimers.If the Modified Version includes new front-matter sections orappendices that qualify as Secondary Sections and contain nomaterial copied from the Document, you may at your optiondesignate some or all of these sections as invariant. To do this,add their titles to the list of Invariant Sections in the ModifiedVersion's license notice. These titles must be distinct from anyother section titles.You may add a section Entitled "Endorsements", provided it containsnothing but endorsements of your Modified Version by variousparties--for example, statements of peer review or that the texthas been approved by an organization as the authoritativedefinition of a standard.You may add a passage of up to five words as a Front-Cover Text,and a passage of up to 25 words as a Back-Cover Text, to the endof the list of Cover Texts in the Modified Version. Only onepassage of Front-Cover Text and one of Back-Cover Text may beadded by (or through arrangements made by) any one entity. If theDocument already includes a cover text for the same cover,previously added by you or by arrangement made by the same entityyou are acting on behalf of, you may not add another; but you mayreplace the old one, on explicit permission from the previouspublisher that added the old one.The author(s) and publisher(s) of the Document do not by thisLicense give permission to use their names for publicity for or toassert or imply endorsement of any Modified Version.5. COMBINING DOCUMENTSYou may combine the Document with other documents released underthis License, under the terms defined in section 4 above formodified versions, provided that you include in the combinationall of the Invariant Sections of all of the original documents,unmodified, and list them all as Invariant Sections of yourcombined work in its license notice, and that you preserve alltheir Warranty Disclaimers.The combined work need only contain one copy of this License, andmultiple identical Invariant Sections may be replaced with a singlecopy. If there are multiple Invariant Sections with the same namebut different contents, make the title of each such section uniqueby adding at the end of it, in parentheses, the name of theoriginal author or publisher of that section if known, or else aunique number. Make the same adjustment to the section titles inthe list of Invariant Sections in the license notice of thecombined work.In the combination, you must combine any sections Entitled"History" in the various original documents, forming one sectionEntitled "History"; likewise combine any sections Entitled"Acknowledgements", and any sections Entitled "Dedications". Youmust delete all sections Entitled "Endorsements."6. COLLECTIONS OF DOCUMENTSYou may make a collection consisting of the Document and otherdocuments released under this License, and replace the individualcopies of this License in the various documents with a single copythat is included in the collection, provided that you follow therules of this License for verbatim copying of each of thedocuments in all other respects.You may extract a single document from such a collection, anddistribute it individually under this License, provided you inserta copy of this License into the extracted document, and followthis License in all other respects regarding verbatim copying ofthat document.7. AGGREGATION WITH INDEPENDENT WORKSA compilation of the Document or its derivatives with otherseparate and independent documents or works, in or on a volume ofa storage or distribution medium, is called an "aggregate" if thecopyright resulting from the compilation is not used to limit thelegal rights of the compilation's users beyond what the individualworks permit. When the Document is included in an aggregate, thisLicense does not apply to the other works in the aggregate whichare not themselves derivative works of the Document.If the Cover Text requirement of section 3 is applicable to thesecopies of the Document, then if the Document is less than one halfof the entire aggregate, the Document's Cover Texts may be placedon covers that bracket the Document within the aggregate, or theelectronic equivalent of covers if the Document is in electronicform. Otherwise they must appear on printed covers that bracketthe whole aggregate.8. TRANSLATIONTranslation is considered a kind of modification, so you maydistribute translations of the Document under the terms of section4. Replacing Invariant Sections with translations requires specialpermission from their copyright holders, but you may includetranslations of some or all Invariant Sections in addition to theoriginal versions of these Invariant Sections. You may include atranslation of this License, and all the license notices in theDocument, and any Warranty Disclaimers, provided that you alsoinclude the original English version of this License and theoriginal versions of those notices and disclaimers. In case of adisagreement between the translation and the original version ofthis License or a notice or disclaimer, the original version willprevail.If a section in the Document is Entitled "Acknowledgements","Dedications", or "History", the requirement (section 4) toPreserve its Title (section 1) will typically require changing theactual title.9. TERMINATIONYou may not copy, modify, sublicense, or distribute the Documentexcept as expressly provided for under this License. Any otherattempt to copy, modify, sublicense or distribute the Document isvoid, and will automatically terminate your rights under thisLicense. However, parties who have received copies, or rights,from you under this License will not have their licensesterminated so long as such parties remain in full compliance.10. FUTURE REVISIONS OF THIS LICENSEThe Free Software Foundation may publish new, revised versions ofthe GNU Free Documentation License from time to time. Such newversions will be similar in spirit to the present version, but maydiffer in detail to address new problems or concerns. See`http://www.gnu.org/copyleft/'.Each version of the License is given a distinguishing versionnumber. If the Document specifies that a particular numberedversion of this License "or any later version" applies to it, youhave the option of following the terms and conditions either ofthat specified version or of any later version that has beenpublished (not as a draft) by the Free Software Foundation. Ifthe Document does not specify a version number of this License,you may choose any version ever published (not as a draft) by theFree Software Foundation.B.1 ADDENDUM: How to use this License for your documents========================================================To use this License in a document you have written, include a copy ofthe License in the document and put the following copyright and licensenotices just after the title page:Copyright (C) YEAR YOUR NAME.Permission is granted to copy, distribute and/or modify this documentunder the terms of the GNU Free Documentation License, Version 1.2or any later version published by the Free Software Foundation;with no Invariant Sections, no Front-Cover Texts, and no Back-CoverTexts. A copy of the license is included in the section entitled ``GNUFree Documentation License''.If you have Invariant Sections, Front-Cover Texts and Back-CoverTexts, replace the "with...Texts." line with this:with the Invariant Sections being LIST THEIR TITLES, withthe Front-Cover Texts being LIST, and with the Back-Cover Textsbeing LIST.If you have Invariant Sections without Cover Texts, or some othercombination of the three, merge those two alternatives to suit thesituation.If your document contains nontrivial examples of program code, werecommend releasing these examples in parallel under your choice offree software license, such as the GNU General Public License, topermit their use in free software.
Go to most recent revision | Compare with Previous | Blame | View Log
