Fix comments on `struct frame_info'.
[deliverable/binutils-gdb.git] / gdb / doc / gdbint.texinfo
CommitLineData
9742079a 1\input texinfo @c -*- texinfo -*-
c906108c 2@setfilename gdbint.info
25822942 3@include gdb-cfg.texi
e9c75b65
EZ
4@dircategory Programming & development tools.
5@direntry
c906108c 6* Gdb-Internals: (gdbint). The GNU debugger's internals.
e9c75b65 7@end direntry
c906108c
SS
8
9@ifinfo
25822942 10This file documents the internals of the GNU debugger @value{GDBN}.
e9c75b65
EZ
11Copyright 1990,1991,1992,1993,1994,1996,1998,1999,2000,2001
12 Free Software Foundation, Inc.
c906108c
SS
13Contributed by Cygnus Solutions. Written by John Gilmore.
14Second Edition by Stan Shebs.
15
e9c75b65
EZ
16Permission is granted to copy, distribute and/or modify this document
17under the terms of the GNU Free Documentation License, Version 1.1 or
18any later version published by the Free Software Foundation; with the
19Invariant Sections being ``Algorithms'' and ``Porting GDB'', with the
20Front-Cover texts being ``A GNU Manual,'' and with the Back-Cover
21Texts as in (a) below.
c906108c 22
e9c75b65
EZ
23(a) The FSF's Back-Cover Text is: ``You have freedom to copy and modify
24this GNU Manual, like GNU software. Copies published by the Free
25Software Foundation raise funds for GNU development.''
c906108c
SS
26@end ifinfo
27
28@setchapternewpage off
25822942 29@settitle @value{GDBN} Internals
c906108c 30
56caf160
EZ
31@syncodeindex fn cp
32@syncodeindex vr cp
33
c906108c 34@titlepage
25822942 35@title @value{GDBN} Internals
c906108c
SS
36@subtitle{A guide to the internals of the GNU debugger}
37@author John Gilmore
38@author Cygnus Solutions
39@author Second Edition:
40@author Stan Shebs
41@author Cygnus Solutions
42@page
43@tex
44\def\$#1${{#1}} % Kluge: collect RCS revision info without $...$
45\xdef\manvers{\$Revision$} % For use in headers, footers too
46{\parskip=0pt
47\hfill Cygnus Solutions\par
48\hfill \manvers\par
49\hfill \TeX{}info \texinfoversion\par
50}
51@end tex
52
53@vskip 0pt plus 1filll
e9c75b65
EZ
54Copyright @copyright{} 1990,1991,1992,1993,1994,1996,1998,1999,2000,2001
55 Free Software Foundation, Inc.
c906108c 56
e9c75b65
EZ
57Permission is granted to copy, distribute and/or modify this document
58under the terms of the GNU Free Documentation License, Version 1.1 or
59any later version published by the Free Software Foundation; with the
60Invariant Sections being ``Algorithms'' and ``Porting GDB'', with the
61Front-Cover texts being ``A GNU Manual,'' and with the Back-Cover
62Texts as in (a) below.
c906108c 63
e9c75b65
EZ
64(a) The FSF's Back-Cover Text is: ``You have freedom to copy and modify
65this GNU Manual, like GNU software. Copies published by the Free
66Software Foundation raise funds for GNU development.''
c906108c
SS
67@end titlepage
68
449f3b6c
AC
69@c TeX can handle the contents at the start but makeinfo 3.12 can not
70@iftex
71@contents
72@end iftex
73
c906108c
SS
74@node Top
75@c Perhaps this should be the title of the document (but only for info,
76@c not for TeX). Existing GNU manuals seem inconsistent on this point.
77@top Scope of this Document
78
25822942
DB
79This document documents the internals of the GNU debugger, @value{GDBN}. It
80includes description of @value{GDBN}'s key algorithms and operations, as well
81as the mechanisms that adapt @value{GDBN} to specific hosts and targets.
c906108c
SS
82
83@menu
84* Requirements::
85* Overall Structure::
86* Algorithms::
87* User Interface::
89437448 88* libgdb::
c906108c
SS
89* Symbol Handling::
90* Language Support::
91* Host Definition::
92* Target Architecture Definition::
93* Target Vector Definition::
94* Native Debugging::
95* Support Libraries::
96* Coding::
97* Porting GDB::
085dd6e6 98* Testsuite::
c906108c 99* Hints::
56caf160 100* Index::
c906108c
SS
101@end menu
102
103@node Requirements
104
105@chapter Requirements
56caf160 106@cindex requirements for @value{GDBN}
c906108c
SS
107
108Before diving into the internals, you should understand the formal
56caf160
EZ
109requirements and other expectations for @value{GDBN}. Although some
110of these may seem obvious, there have been proposals for @value{GDBN}
111that have run counter to these requirements.
c906108c 112
56caf160
EZ
113First of all, @value{GDBN} is a debugger. It's not designed to be a
114front panel for embedded systems. It's not a text editor. It's not a
115shell. It's not a programming environment.
c906108c 116
56caf160
EZ
117@value{GDBN} is an interactive tool. Although a batch mode is
118available, @value{GDBN}'s primary role is to interact with a human
119programmer.
c906108c 120
56caf160
EZ
121@value{GDBN} should be responsive to the user. A programmer hot on
122the trail of a nasty bug, and operating under a looming deadline, is
123going to be very impatient of everything, including the response time
124to debugger commands.
c906108c 125
56caf160
EZ
126@value{GDBN} should be relatively permissive, such as for expressions.
127While the compiler should be picky (or have the option to be made
be9c6c35 128picky), since source code lives for a long time usually, the
56caf160
EZ
129programmer doing debugging shouldn't be spending time figuring out to
130mollify the debugger.
c906108c 131
56caf160
EZ
132@value{GDBN} will be called upon to deal with really large programs.
133Executable sizes of 50 to 100 megabytes occur regularly, and we've
134heard reports of programs approaching 1 gigabyte in size.
c906108c 135
56caf160
EZ
136@value{GDBN} should be able to run everywhere. No other debugger is
137available for even half as many configurations as @value{GDBN}
138supports.
c906108c
SS
139
140
141@node Overall Structure
142
143@chapter Overall Structure
144
56caf160
EZ
145@value{GDBN} consists of three major subsystems: user interface,
146symbol handling (the @dfn{symbol side}), and target system handling (the
147@dfn{target side}).
c906108c 148
2e685b93 149The user interface consists of several actual interfaces, plus
c906108c
SS
150supporting code.
151
152The symbol side consists of object file readers, debugging info
153interpreters, symbol table management, source language expression
154parsing, type and value printing.
155
156The target side consists of execution control, stack frame analysis, and
157physical target manipulation.
158
159The target side/symbol side division is not formal, and there are a
160number of exceptions. For instance, core file support involves symbolic
161elements (the basic core file reader is in BFD) and target elements (it
162supplies the contents of memory and the values of registers). Instead,
163this division is useful for understanding how the minor subsystems
164should fit together.
165
166@section The Symbol Side
167
56caf160
EZ
168The symbolic side of @value{GDBN} can be thought of as ``everything
169you can do in @value{GDBN} without having a live program running''.
170For instance, you can look at the types of variables, and evaluate
171many kinds of expressions.
c906108c
SS
172
173@section The Target Side
174
56caf160
EZ
175The target side of @value{GDBN} is the ``bits and bytes manipulator''.
176Although it may make reference to symbolic info here and there, most
177of the target side will run with only a stripped executable
178available---or even no executable at all, in remote debugging cases.
c906108c
SS
179
180Operations such as disassembly, stack frame crawls, and register
181display, are able to work with no symbolic info at all. In some cases,
25822942 182such as disassembly, @value{GDBN} will use symbolic info to present addresses
c906108c
SS
183relative to symbols rather than as raw numbers, but it will work either
184way.
185
186@section Configurations
187
56caf160
EZ
188@cindex host
189@cindex target
25822942 190@dfn{Host} refers to attributes of the system where @value{GDBN} runs.
c906108c
SS
191@dfn{Target} refers to the system where the program being debugged
192executes. In most cases they are the same machine, in which case a
193third type of @dfn{Native} attributes come into play.
194
195Defines and include files needed to build on the host are host support.
196Examples are tty support, system defined types, host byte order, host
197float format.
198
199Defines and information needed to handle the target format are target
200dependent. Examples are the stack frame format, instruction set,
201breakpoint instruction, registers, and how to set up and tear down the stack
202to call a function.
203
204Information that is only needed when the host and target are the same,
205is native dependent. One example is Unix child process support; if the
206host and target are not the same, doing a fork to start the target
207process is a bad idea. The various macros needed for finding the
208registers in the @code{upage}, running @code{ptrace}, and such are all
209in the native-dependent files.
210
211Another example of native-dependent code is support for features that
212are really part of the target environment, but which require
213@code{#include} files that are only available on the host system. Core
214file handling and @code{setjmp} handling are two common cases.
215
25822942 216When you want to make @value{GDBN} work ``native'' on a particular machine, you
c906108c
SS
217have to include all three kinds of information.
218
219
220@node Algorithms
221
222@chapter Algorithms
56caf160 223@cindex algorithms
c906108c 224
56caf160
EZ
225@value{GDBN} uses a number of debugging-specific algorithms. They are
226often not very complicated, but get lost in the thicket of special
227cases and real-world issues. This chapter describes the basic
228algorithms and mentions some of the specific target definitions that
229they use.
c906108c
SS
230
231@section Frames
232
56caf160
EZ
233@cindex frame
234@cindex call stack frame
235A frame is a construct that @value{GDBN} uses to keep track of calling
236and called functions.
c906108c 237
56caf160
EZ
238@findex create_new_frame
239@vindex FRAME_FP
c906108c 240@code{FRAME_FP} in the machine description has no meaning to the
56caf160
EZ
241machine-independent part of @value{GDBN}, except that it is used when
242setting up a new frame from scratch, as follows:
c906108c
SS
243
244@example
245 create_new_frame (read_register (FP_REGNUM), read_pc ()));
246@end example
247
56caf160 248@cindex frame pointer register
c906108c
SS
249Other than that, all the meaning imparted to @code{FP_REGNUM} is
250imparted by the machine-dependent code. So, @code{FP_REGNUM} can have
251any value that is convenient for the code that creates new frames.
252(@code{create_new_frame} calls @code{INIT_EXTRA_FRAME_INFO} if it is
253defined; that is where you should use the @code{FP_REGNUM} value, if
254your frames are nonstandard.)
255
56caf160
EZ
256@cindex frame chain
257Given a @value{GDBN} frame, define @code{FRAME_CHAIN} to determine the
258address of the calling function's frame. This will be used to create
259a new @value{GDBN} frame struct, and then @code{INIT_EXTRA_FRAME_INFO}
260and @code{INIT_FRAME_PC} will be called for the new frame.
c906108c
SS
261
262@section Breakpoint Handling
263
56caf160 264@cindex breakpoints
c906108c
SS
265In general, a breakpoint is a user-designated location in the program
266where the user wants to regain control if program execution ever reaches
267that location.
268
269There are two main ways to implement breakpoints; either as ``hardware''
270breakpoints or as ``software'' breakpoints.
271
56caf160
EZ
272@cindex hardware breakpoints
273@cindex program counter
c906108c
SS
274Hardware breakpoints are sometimes available as a builtin debugging
275features with some chips. Typically these work by having dedicated
276register into which the breakpoint address may be stored. If the PC
56caf160 277(shorthand for @dfn{program counter})
c906108c 278ever matches a value in a breakpoint registers, the CPU raises an
56caf160
EZ
279exception and reports it to @value{GDBN}.
280
281Another possibility is when an emulator is in use; many emulators
282include circuitry that watches the address lines coming out from the
283processor, and force it to stop if the address matches a breakpoint's
284address.
285
286A third possibility is that the target already has the ability to do
287breakpoints somehow; for instance, a ROM monitor may do its own
288software breakpoints. So although these are not literally ``hardware
289breakpoints'', from @value{GDBN}'s point of view they work the same;
290@value{GDBN} need not do nothing more than set the breakpoint and wait
291for something to happen.
c906108c
SS
292
293Since they depend on hardware resources, hardware breakpoints may be
56caf160 294limited in number; when the user asks for more, @value{GDBN} will
9742079a
EZ
295start trying to set software breakpoints. (On some architectures,
296notably the 32-bit x86 platforms, @value{GDBN} cannot alsways know
297whether there's enough hardware resources to insert all the hardware
298breakpoints and watchpoints. On those platforms, @value{GDBN} prints
299an error message only when the program being debugged is continued.)
56caf160
EZ
300
301@cindex software breakpoints
302Software breakpoints require @value{GDBN} to do somewhat more work.
303The basic theory is that @value{GDBN} will replace a program
304instruction with a trap, illegal divide, or some other instruction
305that will cause an exception, and then when it's encountered,
306@value{GDBN} will take the exception and stop the program. When the
307user says to continue, @value{GDBN} will restore the original
c906108c
SS
308instruction, single-step, re-insert the trap, and continue on.
309
310Since it literally overwrites the program being tested, the program area
be9c6c35 311must be writable, so this technique won't work on programs in ROM. It
c906108c 312can also distort the behavior of programs that examine themselves,
56caf160 313although such a situation would be highly unusual.
c906108c
SS
314
315Also, the software breakpoint instruction should be the smallest size of
316instruction, so it doesn't overwrite an instruction that might be a jump
317target, and cause disaster when the program jumps into the middle of the
318breakpoint instruction. (Strictly speaking, the breakpoint must be no
319larger than the smallest interval between instructions that may be jump
320targets; perhaps there is an architecture where only even-numbered
321instructions may jumped to.) Note that it's possible for an instruction
322set not to have any instructions usable for a software breakpoint,
323although in practice only the ARC has failed to define such an
324instruction.
325
56caf160 326@findex BREAKPOINT
c906108c
SS
327The basic definition of the software breakpoint is the macro
328@code{BREAKPOINT}.
329
330Basic breakpoint object handling is in @file{breakpoint.c}. However,
331much of the interesting breakpoint action is in @file{infrun.c}.
332
333@section Single Stepping
334
335@section Signal Handling
336
337@section Thread Handling
338
339@section Inferior Function Calls
340
341@section Longjmp Support
342
56caf160 343@cindex @code{longjmp} debugging
25822942 344@value{GDBN} has support for figuring out that the target is doing a
c906108c
SS
345@code{longjmp} and for stopping at the target of the jump, if we are
346stepping. This is done with a few specialized internal breakpoints,
56caf160
EZ
347which are visible in the output of the @samp{maint info breakpoint}
348command.
c906108c 349
56caf160 350@findex GET_LONGJMP_TARGET
c906108c
SS
351To make this work, you need to define a macro called
352@code{GET_LONGJMP_TARGET}, which will examine the @code{jmp_buf}
353structure and extract the longjmp target address. Since @code{jmp_buf}
354is target specific, you will need to define it in the appropriate
56caf160 355@file{tm-@var{target}.h} file. Look in @file{tm-sun4os4.h} and
c906108c
SS
356@file{sparc-tdep.c} for examples of how to do this.
357
9742079a
EZ
358@section Watchpoints
359@cindex watchpoints
360
361Watchpoints are a special kind of breakpoints (@pxref{Algorithms,
362breakpoints}) which break when data is accessed rather than when some
363instruction is executed. When you have data which changes without
364your knowing what code does that, watchpoints are the silver bullet to
365hunt down and kill such bugs.
366
367@cindex hardware watchpoints
368@cindex software watchpoints
369Watchpoints can be either hardware-assisted or not; the latter type is
370known as ``software watchpoints.'' @value{GDBN} always uses
371hardware-assisted watchpoints if they are available, and falls back on
372software watchpoints otherwise. Typical situations where @value{GDBN}
373will use software watchpoints are:
374
375@itemize @bullet
376@item
377The watched memory region is too large for the underlying hardware
378watchpoint support. For example, each x86 debug register can watch up
379to 4 bytes of memory, so trying to watch data structures whose size is
380more than 16 bytes will cause @value{GDBN} to use software
381watchpoints.
382
383@item
384The value of the expression to be watched depends on data held in
385registers (as opposed to memory).
386
387@item
388Too many different watchpoints requested. (On some architectures,
389this situation is impossible to detect until the debugged program is
390resumed.) Note that x86 debug registers are used both for hardware
391breakpoints and for watchpoints, so setting too many hardware
392breakpoints might cause watchpoint insertion to fail.
393
394@item
395No hardware-assisted watchpoints provided by the target
396implementation.
397@end itemize
398
399Software watchpoints are very slow, since @value{GDBN} needs to
400single-step the program being debugged and test the value of the
401watched expression(s) after each instruction. The rest of this
402section is mostly irrelevant for software watchpoints.
403
404@value{GDBN} uses several macros and primitives to support hardware
405watchpoints:
406
407@table @code
408@findex TARGET_HAS_HARDWARE_WATCHPOINTS
409@item TARGET_HAS_HARDWARE_WATCHPOINTS
410If defined, the target supports hardware watchpoints.
411
412@findex TARGET_CAN_USE_HARDWARE_WATCHPOINT
413@item TARGET_CAN_USE_HARDWARE_WATCHPOINT (@var{type}, @var{count}, @var{other})
414Return the number of hardware watchpoints of type @var{type} that are
415possible to be set. The value is positive if @var{count} watchpoints
416of this type can be set, zero if setting watchpoints of this type is
417not supported, and negative if @var{count} is more than the maximum
418number of watchpoints of type @var{type} that can be set. @var{other}
419is non-zero if other types of watchpoints are currently enabled (there
420are architectures which cannot set watchpoints of different types at
421the same time).
422
423@findex TARGET_REGION_OK_FOR_HW_WATCHPOINT
424@item TARGET_REGION_OK_FOR_HW_WATCHPOINT (@var{addr}, @var{len})
425Return non-zero if hardware watchpoints can be used to watch a region
426whose address is @var{addr} and whose length in bytes is @var{len}.
427
428@findex TARGET_REGION_SIZE_OK_FOR_HW_WATCHPOINT
429@item TARGET_REGION_SIZE_OK_FOR_HW_WATCHPOINT (@var{size})
430Return non-zero if hardware watchpoints can be used to watch a region
431whose size is @var{size}. @value{GDBN} only uses this macro as a
432fall-back, in case @code{TARGET_REGION_OK_FOR_HW_WATCHPOINT} is not
433defined.
434
435@findex TARGET_DISABLE_HW_WATCHPOINTS
436@item TARGET_DISABLE_HW_WATCHPOINTS (@var{pid})
437Disables watchpoints in the process identified by @var{pid}. This is
438used, e.g., on HP-UX which provides operations to disable and enable
439the page-level memory protection that implements hardware watchpoints
440on that platform.
441
442@findex TARGET_ENABLE_HW_WATCHPOINTS
443@item TARGET_ENABLE_HW_WATCHPOINTS (@var{pid})
444Enables watchpoints in the process identified by @var{pid}. This is
445used, e.g., on HP-UX which provides operations to disable and enable
446the page-level memory protection that implements hardware watchpoints
447on that platform.
448
449@findex TARGET_RANGE_PROFITABLE_FOR_HW_WATCHPOINT
450@item TARGET_RANGE_PROFITABLE_FOR_HW_WATCHPOINT (@var{pid},@var{start},@var{len})
451Some addresses may not be profitable to use hardware to watch, or may
452be difficult to understand when the addressed object is out of scope,
453and hence should not be watched with hardware watchpoints. On some
454targets, this may have severe performance penalties, such that we
455might as well use regular watchpoints, and save (possibly precious)
456hardware watchpoints for other locations.
457
458@findex target_insert_watchpoint
459@findex target_remove_watchpoint
460@item target_insert_watchpoint (@var{addr}, @var{len}, @var{type})
461@itemx target_remove_watchpoint (@var{addr}, @var{len}, @var{type})
462Insert or remove a hardware watchpoint starting at @var{addr}, for
463@var{len} bytes. @var{type} is the watchpoint type, one of the
464possible values of the enumerated data type @code{target_hw_bp_type},
465defined by @file{breakpoint.h} as follows:
466
467@example
468 enum target_hw_bp_type
469 @{
470 hw_write = 0, /* Common (write) HW watchpoint */
471 hw_read = 1, /* Read HW watchpoint */
472 hw_access = 2, /* Access (read or write) HW watchpoint */
473 hw_execute = 3 /* Execute HW breakpoint */
474 @};
475@end example
476
477@noindent
478These two macros should return 0 for success, non-zero for failure.
479
480@cindex insert or remove hardware breakpoint
481@findex target_remove_hw_breakpoint
482@findex target_insert_hw_breakpoint
483@item target_remove_hw_breakpoint (@var{addr}, @var{shadow})
484@itemx target_insert_hw_breakpoint (@var{addr}, @var{shadow})
485Insert or remove a hardware-assisted breakpoint at address @var{addr}.
486Returns zero for success, non-zero for failure. @var{shadow} is the
487real contents of the byte where the breakpoint has been inserted; it
488is generally not valid when hardware breakpoints are used, but since
489no other code touches these values, the implementations of the above
490two macros can use them for their internal purposes.
491
492@findex target_stopped_data_address
493@item target_stopped_data_address ()
494If the inferior has some watchpoint that triggered, return the address
495associated with that watchpoint. Otherwise, return zero.
496
497@findex DECR_PC_AFTER_HW_BREAK
498@item DECR_PC_AFTER_HW_BREAK
499If defined, @value{GDBN} decrements the program counter by the value
500of @code{DECR_PC_AFTER_HW_BREAK} after a hardware break-point. This
501overrides the value of @code{DECR_PC_AFTER_BREAK} when a breakpoint
502that breaks is a hardware-assisted breakpoint.
503
504@findex HAVE_STEPPABLE_WATCHPOINT
505@item HAVE_STEPPABLE_WATCHPOINT
506If defined to a non-zero value, it is not necessary to disable a
507watchpoint to step over it.
508
509@findex HAVE_NONSTEPPABLE_WATCHPOINT
510@item HAVE_NONSTEPPABLE_WATCHPOINT
511If defined to a non-zero value, @value{GDBN} should disable a
512watchpoint to step the inferior over it.
513
514@findex HAVE_CONTINUABLE_WATCHPOINT
515@item HAVE_CONTINUABLE_WATCHPOINT
516If defined to a non-zero value, it is possible to continue the
517inferior after a watchpoint has been hit.
518
519@findex CANNOT_STEP_HW_WATCHPOINTS
520@item CANNOT_STEP_HW_WATCHPOINTS
521If this is defined to a non-zero value, @value{GDBN} will remove all
522watchpoints before stepping the inferior.
523
524@findex STOPPED_BY_WATCHPOINT
525@item STOPPED_BY_WATCHPOINT (@var{wait_status})
526Return non-zero if stopped by a watchpoint. @var{wait_status} is of
527the type @code{struct target_waitstatus}, defined by @file{target.h}.
528@end table
529
530@subsection x86 Watchpoints
531@cindex x86 debug registers
532@cindex watchpoints, on x86
533
534The 32-bit Intel x86 (a.k.a.@: ia32) processors feature special debug
535registers designed to facilitate debugging. @value{GDBN} provides a
536generic library of functions that x86-based ports can use to implement
537support for watchpoints and hardware-assisted breakpoints. This
538subsection documents the x86 watchpoint facilities in @value{GDBN}.
539
540To use the generic x86 watchpoint support, a port should do the
541following:
542
543@itemize @bullet
544@findex I386_USE_GENERIC_WATCHPOINTS
545@item
546Define the macro @code{I386_USE_GENERIC_WATCHPOINTS} somewhere in the
547target-dependent headers.
548
549@item
550Include the @file{config/i386/nm-i386.h} header file @emph{after}
551defining @code{I386_USE_GENERIC_WATCHPOINTS}.
552
553@item
554Add @file{i386-nat.o} to the value of the Make variable
555@code{NATDEPFILES} (@pxref{Native Debugging, NATDEPFILES}) or
556@code{TDEPFILES} (@pxref{Target Architecture Definition, TDEPFILES}).
557
558@item
559Provide implementations for the @code{I386_DR_LOW_*} macros described
560below. Typically, each macro should call a target-specific function
561which does the real work.
562@end itemize
563
564The x86 watchpoint support works by maintaining mirror images of the
565debug registers. Values are copied between the mirror images and the
566real debug registers via a set of macros which each target needs to
567provide:
568
569@table @code
570@findex I386_DR_LOW_SET_CONTROL
571@item I386_DR_LOW_SET_CONTROL (@var{val})
572Set the Debug Control (DR7) register to the value @var{val}.
573
574@findex I386_DR_LOW_SET_ADDR
575@item I386_DR_LOW_SET_ADDR (@var{idx}, @var{addr})
576Put the address @var{addr} into the debug register number @var{idx}.
577
578@findex I386_DR_LOW_RESET_ADDR
579@item I386_DR_LOW_RESET_ADDR (@var{idx})
580Reset (i.e.@: zero out) the address stored in the debug register
581number @var{idx}.
582
583@findex I386_DR_LOW_GET_STATUS
584@item I386_DR_LOW_GET_STATUS
585Return the value of the Debug Status (DR6) register. This value is
586used immediately after it is returned by
587@code{I386_DR_LOW_GET_STATUS}, so as to support per-thread status
588register values.
589@end table
590
591For each one of the 4 debug registers (whose indices are from 0 to 3)
592that store addresses, a reference count is maintained by @value{GDBN},
593to allow sharing of debug registers by several watchpoints. This
594allows users to define several watchpoints that watch the same
595expression, but with different conditions and/or commands, without
596wasting debug registers which are in short supply. @value{GDBN}
597maintains the reference counts internally, targets don't have to do
598anything to use this feature.
599
600The x86 debug registers can each watch a region that is 1, 2, or 4
601bytes long. The ia32 architecture requires that each watched region
602be appropriately aligned: 2-byte region on 2-byte boundary, 4-byte
603region on 4-byte boundary. However, the x86 watchpoint support in
604@value{GDBN} can watch unaligned regions and regions larger than 4
605bytes (up to 16 bytes) by allocating several debug registers to watch
606a single region. This allocation of several registers per a watched
607region is also done automatically without target code intervention.
608
609The generic x86 watchpoint support provides the following API for the
610@value{GDBN}'s application code:
611
612@table @code
613@findex i386_region_ok_for_watchpoint
614@item i386_region_ok_for_watchpoint (@var{addr}, @var{len})
615The macro @code{TARGET_REGION_OK_FOR_HW_WATCHPOINT} is set to call
616this function. It counts the number of debug registers required to
617watch a given region, and returns a non-zero value if that number is
618less than 4, the number of debug registers available to x86
619processors.
620
621@findex i386_stopped_data_address
622@item i386_stopped_data_address (void)
623The macros @code{STOPPED_BY_WATCHPOINT} and
624@code{target_stopped_data_address} are set to call this function. The
625argument passed to @code{STOPPED_BY_WATCHPOINT} is ignored. This
626function examines the breakpoint condition bits in the DR6 Debug
627Status register, as returned by the @code{I386_DR_LOW_GET_STATUS}
628macro, and returns the address associated with the first bit that is
629set in DR6.
630
631@findex i386_insert_watchpoint
632@findex i386_remove_watchpoint
633@item i386_insert_watchpoint (@var{addr}, @var{len}, @var{type})
634@itemx i386_remove_watchpoint (@var{addr}, @var{len}, @var{type})
635Insert or remove a watchpoint. The macros
636@code{target_insert_watchpoint} and @code{target_remove_watchpoint}
637are set to call these functions. @code{i386_insert_watchpoint} first
638looks for a debug register which is already set to watch the same
639region for the same access types; if found, it just increments the
640reference count of that debug register, thus implementing debug
641register sharing between watchpoints. If no such register is found,
642the function looks for a vacant debug register, sets its mirrorred
643value to @var{addr}, sets the mirrorred value of DR7 Debug Control
644register as appropriate for the @var{len} and @var{type} parameters,
645and then passes the new values of the debug register and DR7 to the
646inferior by calling @code{I386_DR_LOW_SET_ADDR} and
647@code{I386_DR_LOW_SET_CONTROL}. If more than one debug register is
648required to cover the given region, the above process is repeated for
649each debug register.
650
651@code{i386_remove_watchpoint} does the opposite: it resets the address
652in the mirrorred value of the debug register and its read/write and
653length bits in the mirrorred value of DR7, then passes these new
654values to the inferior via @code{I386_DR_LOW_RESET_ADDR} and
655@code{I386_DR_LOW_SET_CONTROL}. If a register is shared by several
656watchpoints, each time a @code{i386_remove_watchpoint} is called, it
657decrements the reference count, and only calls
658@code{I386_DR_LOW_RESET_ADDR} and @code{I386_DR_LOW_SET_CONTROL} when
659the count goes to zero.
660
661@findex i386_insert_hw_breakpoint
662@findex i386_remove_hw_breakpoint
663@item i386_insert_hw_breakpoint (@var{addr}, @var{shadow}
664@itemx i386_remove_hw_breakpoint (@var{addr}, @var{shadow})
665These functions insert and remove hardware-assisted breakpoints. The
666macros @code{target_insert_hw_breakpoint} and
667@code{target_remove_hw_breakpoint} are set to call these functions.
668These functions work like @code{i386_insert_watchpoint} and
669@code{i386_remove_watchpoint}, respectively, except that they set up
670the debug registers to watch instruction execution, and each
671hardware-assisted breakpoint always requires exactly one debug
672register.
673
674@findex i386_stopped_by_hwbp
675@item i386_stopped_by_hwbp (void)
676This function returns non-zero if the inferior has some watchpoint or
677hardware breakpoint that triggered. It works like
678@code{i386_stopped_data_address}, except that it doesn't return the
679address whose watchpoint triggered.
680
681@findex i386_cleanup_dregs
682@item i386_cleanup_dregs (void)
683This function clears all the reference counts, addresses, and control
684bits in the mirror images of the debug registers. It doesn't affect
685the actual debug registers in the inferior process.
686@end table
687
688@noindent
689@strong{Notes:}
690@enumerate 1
691@item
692x86 processors support setting watchpoints on I/O reads or writes.
693However, since no target supports this (as of March 2001), and since
694@code{enum target_hw_bp_type} doesn't even have an enumeration for I/O
695watchpoints, this feature is not yet available to @value{GDBN} running
696on x86.
697
698@item
699x86 processors can enable watchpoints locally, for the current task
700only, or globally, for all the tasks. For each debug register,
701there's a bit in the DR7 Debug Control register that determines
702whether the associated address is watched locally or globally. The
703current implementation of x86 watchpoint support in @value{GDBN}
704always sets watchpoints to be locally enabled, since global
705watchpoints might interfere with the underlying OS and are probably
706unavailable in many platforms.
707@end enumerate
708
c906108c
SS
709@node User Interface
710
711@chapter User Interface
712
25822942 713@value{GDBN} has several user interfaces. Although the command-line interface
c906108c
SS
714is the most common and most familiar, there are others.
715
716@section Command Interpreter
717
56caf160 718@cindex command interpreter
0ee54786 719@cindex CLI
25822942 720The command interpreter in @value{GDBN} is fairly simple. It is designed to
c906108c
SS
721allow for the set of commands to be augmented dynamically, and also
722has a recursive subcommand capability, where the first argument to
723a command may itself direct a lookup on a different command list.
724
56caf160
EZ
725For instance, the @samp{set} command just starts a lookup on the
726@code{setlist} command list, while @samp{set thread} recurses
c906108c
SS
727to the @code{set_thread_cmd_list}.
728
56caf160
EZ
729@findex add_cmd
730@findex add_com
c906108c
SS
731To add commands in general, use @code{add_cmd}. @code{add_com} adds to
732the main command list, and should be used for those commands. The usual
cfeada60 733place to add commands is in the @code{_initialize_@var{xyz}} routines at
9742079a 734the ends of most source files.
cfeada60 735
56caf160
EZ
736@cindex deprecating commands
737@findex deprecate_cmd
cfeada60
FN
738Before removing commands from the command set it is a good idea to
739deprecate them for some time. Use @code{deprecate_cmd} on commands or
740aliases to set the deprecated flag. @code{deprecate_cmd} takes a
741@code{struct cmd_list_element} as it's first argument. You can use the
742return value from @code{add_com} or @code{add_cmd} to deprecate the
743command immediately after it is created.
744
c72e7388 745The first time a command is used the user will be warned and offered a
cfeada60
FN
746replacement (if one exists). Note that the replacement string passed to
747@code{deprecate_cmd} should be the full name of the command, i.e. the
748entire string the user should type at the command line.
c906108c 749
0ee54786
EZ
750@section UI-Independent Output---the @code{ui_out} Functions
751@c This section is based on the documentation written by Fernando
752@c Nasser <fnasser@redhat.com>.
753
754@cindex @code{ui_out} functions
755The @code{ui_out} functions present an abstraction level for the
756@value{GDBN} output code. They hide the specifics of different user
757interfaces supported by @value{GDBN}, and thus free the programmer
758from the need to write several versions of the same code, one each for
759every UI, to produce output.
760
761@subsection Overview and Terminology
762
763In general, execution of each @value{GDBN} command produces some sort
764of output, and can even generate an input request.
765
766Output can be generated for the following purposes:
767
768@itemize @bullet
769@item
770to display a @emph{result} of an operation;
771
772@item
773to convey @emph{info} or produce side-effects of a requested
774operation;
775
776@item
777to provide a @emph{notification} of an asynchronous event (including
778progress indication of a prolonged asynchronous operation);
779
780@item
781to display @emph{error messages} (including warnings);
782
783@item
784to show @emph{debug data};
785
786@item
787to @emph{query} or prompt a user for input (a special case).
788@end itemize
789
790@noindent
791This section mainly concentrates on how to build result output,
792although some of it also applies to other kinds of output.
793
794Generation of output that displays the results of an operation
795involves one or more of the following:
796
797@itemize @bullet
798@item
799output of the actual data
800
801@item
802formatting the output as appropriate for console output, to make it
803easily readable by humans
804
805@item
806machine oriented formatting--a more terse formatting to allow for easy
807parsing by programs which read @value{GDBN}'s output
808
809@item
c72e7388
AC
810annotation, whose purpose is to help legacy GUIs to identify interesting
811parts in the output
0ee54786
EZ
812@end itemize
813
814The @code{ui_out} routines take care of the first three aspects.
c72e7388
AC
815Annotations are provided by separate annotation routines. Note that use
816of annotations for an interface between a GUI and @value{GDBN} is
0ee54786
EZ
817deprecated.
818
c72e7388
AC
819Output can be in the form of a single item, which we call a @dfn{field};
820a @dfn{list} consisting of identical fields; a @dfn{tuple} consisting of
821non-identical fields; or a @dfn{table}, which is a tuple consisting of a
822header and a body. In a BNF-like form:
0ee54786 823
c72e7388
AC
824@table @code
825@item <table> @expansion{}
826@code{<header> <body>}
827@item <header> @expansion{}
828@code{@{ <column> @}}
829@item <column> @expansion{}
830@code{<width> <alignment> <title>}
831@item <body> @expansion{}
832@code{@{<row>@}}
833@end table
0ee54786
EZ
834
835
836@subsection General Conventions
837
c72e7388
AC
838Most @code{ui_out} routines are of type @code{void}, the exceptions are
839@code{ui_out_stream_new} (which returns a pointer to the newly created
840object) and the @code{make_cleanup} routines.
0ee54786 841
c72e7388
AC
842The first parameter is always the @code{ui_out} vector object, a pointer
843to a @code{struct ui_out}.
0ee54786 844
c72e7388
AC
845The @var{format} parameter is like in @code{printf} family of functions.
846When it is present, there must also be a variable list of arguments
847sufficient used to satisfy the @code{%} specifiers in the supplied
0ee54786
EZ
848format.
849
c72e7388
AC
850When a character string argument is not used in a @code{ui_out} function
851call, a @code{NULL} pointer has to be supplied instead.
0ee54786
EZ
852
853
c72e7388 854@subsection Table, Tuple and List Functions
0ee54786
EZ
855
856@cindex list output functions
857@cindex table output functions
c72e7388
AC
858@cindex tuple output functions
859This section introduces @code{ui_out} routines for building lists,
860tuples and tables. The routines to output the actual data items
861(fields) are presented in the next section.
0ee54786 862
c72e7388
AC
863To recap: A @dfn{tuple} is a sequence of @dfn{fields}, each field
864containing information about an object; a @dfn{list} is a sequence of
865fields where each field describes an identical object.
0ee54786 866
c72e7388
AC
867Use the @dfn{table} functions when your output consists of a list of
868rows (tuples) and the console output should include a heading. Use this
869even when you are listing just one object but you still want the header.
0ee54786
EZ
870
871@cindex nesting level in @code{ui_out} functions
c72e7388
AC
872Tables can not be nested. Tuples and lists can be nested up to a
873maximum of five levels.
0ee54786
EZ
874
875The overall structure of the table output code is something like this:
876
877@example
878 ui_out_table_begin
879 ui_out_table_header
c72e7388 880 @dots{}
0ee54786 881 ui_out_table_body
c72e7388 882 ui_out_tuple_begin
0ee54786 883 ui_out_field_*
c72e7388
AC
884 @dots{}
885 ui_out_tuple_end
886 @dots{}
0ee54786
EZ
887 ui_out_table_end
888@end example
889
c72e7388 890Here is the description of table-, tuple- and list-related @code{ui_out}
0ee54786
EZ
891functions:
892
c72e7388
AC
893@deftypefun void ui_out_table_begin (struct ui_out *@var{uiout}, int @var{nbrofcols}, int @var{nr_rows}, const char *@var{tblid})
894The function @code{ui_out_table_begin} marks the beginning of the output
895of a table. It should always be called before any other @code{ui_out}
896function for a given table. @var{nbrofcols} is the number of columns in
897the table. @var{nr_rows} is the number of rows in the table.
898@var{tblid} is an optional string identifying the table. The string
899pointed to by @var{tblid} is copied by the implementation of
900@code{ui_out_table_begin}, so the application can free the string if it
901was @code{malloc}ed.
0ee54786
EZ
902
903The companion function @code{ui_out_table_end}, described below, marks
904the end of the table's output.
905@end deftypefun
906
c72e7388
AC
907@deftypefun void ui_out_table_header (struct ui_out *@var{uiout}, int @var{width}, enum ui_align @var{alignment}, const char *@var{colhdr})
908@code{ui_out_table_header} provides the header information for a single
909table column. You call this function several times, one each for every
910column of the table, after @code{ui_out_table_begin}, but before
911@code{ui_out_table_body}.
0ee54786
EZ
912
913The value of @var{width} gives the column width in characters. The
914value of @var{alignment} is one of @code{left}, @code{center}, and
915@code{right}, and it specifies how to align the header: left-justify,
916center, or right-justify it. @var{colhdr} points to a string that
917specifies the column header; the implementation copies that string, so
c72e7388
AC
918column header strings in @code{malloc}ed storage can be freed after the
919call.
0ee54786
EZ
920@end deftypefun
921
922@deftypefun void ui_out_table_body (struct ui_out *@var{uiout})
c72e7388 923This function delimits the table header from the table body.
0ee54786
EZ
924@end deftypefun
925
926@deftypefun void ui_out_table_end (struct ui_out *@var{uiout})
c72e7388
AC
927This function signals the end of a table's output. It should be called
928after the table body has been produced by the list and field output
929functions.
0ee54786
EZ
930
931There should be exactly one call to @code{ui_out_table_end} for each
c72e7388
AC
932call to @code{ui_out_table_begin}, otherwise the @code{ui_out} functions
933will signal an internal error.
0ee54786
EZ
934@end deftypefun
935
c72e7388 936The output of the tuples that represent the table rows must follow the
0ee54786 937call to @code{ui_out_table_body} and precede the call to
c72e7388
AC
938@code{ui_out_table_end}. You build a tuple by calling
939@code{ui_out_tuple_begin} and @code{ui_out_tuple_end}, with suitable
0ee54786
EZ
940calls to functions which actually output fields between them.
941
c72e7388
AC
942@deftypefun void ui_out_tuple_begin (struct ui_out *@var{uiout}, const char *@var{id})
943This function marks the beginning of a tuple output. @var{id} points
944to an optional string that identifies the tuple; it is copied by the
945implementation, and so strings in @code{malloc}ed storage can be freed
946after the call.
947@end deftypefun
948
949@deftypefun void ui_out_tuple_end (struct ui_out *@var{uiout})
950This function signals an end of a tuple output. There should be exactly
951one call to @code{ui_out_tuple_end} for each call to
952@code{ui_out_tuple_begin}, otherwise an internal @value{GDBN} error will
953be signaled.
954@end deftypefun
955
956@deftypefun struct cleanup *make_cleanup_ui_out_tuple_begin_end (struct ui_out *@var{uiout}, const char *@var{id})
957This function first opens the tuple and then establishes a cleanup
958(@pxref{Coding, Cleanups}) to close the tuple. It provides a convenient
959and correct implementation of the non-portable@footnote{The function
960cast is not portable ISO-C.} code sequence:
961@smallexample
962struct cleanup *old_cleanup;
963ui_out_tuple_begin (uiout, "...");
964old_cleanup = make_cleanup ((void(*)(void *)) ui_out_tuple_end,
965 uiout);
966@end smallexample
967@end deftypefun
968
969@deftypefun void ui_out_list_begin (struct ui_out *@var{uiout}, const char *@var{id})
970This function marks the beginning of a list output. @var{id} points to
971an optional string that identifies the list; it is copied by the
972implementation, and so strings in @code{malloc}ed storage can be freed
973after the call.
0ee54786
EZ
974@end deftypefun
975
976@deftypefun void ui_out_list_end (struct ui_out *@var{uiout})
c72e7388
AC
977This function signals an end of a list output. There should be exactly
978one call to @code{ui_out_list_end} for each call to
979@code{ui_out_list_begin}, otherwise an internal @value{GDBN} error will
980be signaled.
981@end deftypefun
982
983@deftypefun struct cleanup *make_cleanup_ui_out_list_begin_end (struct ui_out *@var{uiout}, const char *@var{id})
984Similar to @code{make_cleanup_ui_out_tuple_begin_end}, this function
985opens a list and then establishes cleanup (@pxref{Coding, Cleanups})
986that will close the list.list.
0ee54786
EZ
987@end deftypefun
988
989@subsection Item Output Functions
990
991@cindex item output functions
992@cindex field output functions
993@cindex data output
994The functions described below produce output for the actual data
995items, or fields, which contain information about the object.
996
997Choose the appropriate function accordingly to your particular needs.
998
999@deftypefun void ui_out_field_fmt (struct ui_out *@var{uiout}, char *@var{fldname}, char *@var{format}, ...)
1000This is the most general output function. It produces the
1001representation of the data in the variable-length argument list
1002according to formatting specifications in @var{format}, a
1003@code{printf}-like format string. The optional argument @var{fldname}
1004supplies the name of the field. The data items themselves are
1005supplied as additional arguments after @var{format}.
1006
1007This generic function should be used only when it is not possible to
1008use one of the specialized versions (see below).
1009@end deftypefun
1010
c72e7388 1011@deftypefun void ui_out_field_int (struct ui_out *@var{uiout}, const char *@var{fldname}, int @var{value})
0ee54786
EZ
1012This function outputs a value of an @code{int} variable. It uses the
1013@code{"%d"} output conversion specification. @var{fldname} specifies
1014the name of the field.
1015@end deftypefun
1016
c72e7388 1017@deftypefun void ui_out_field_core_addr (struct ui_out *@var{uiout}, const char *@var{fldname}, CORE_ADDR @var{address})
0ee54786
EZ
1018This function outputs an address.
1019@end deftypefun
1020
c72e7388 1021@deftypefun void ui_out_field_string (struct ui_out *@var{uiout}, const char *@var{fldname}, const char *@var{string})
0ee54786
EZ
1022This function outputs a string using the @code{"%s"} conversion
1023specification.
1024@end deftypefun
1025
1026Sometimes, there's a need to compose your output piece by piece using
1027functions that operate on a stream, such as @code{value_print} or
1028@code{fprintf_symbol_filtered}. These functions accept an argument of
1029the type @code{struct ui_file *}, a pointer to a @code{ui_file} object
1030used to store the data stream used for the output. When you use one
1031of these functions, you need a way to pass their results stored in a
1032@code{ui_file} object to the @code{ui_out} functions. To this end,
1033you first create a @code{ui_stream} object by calling
1034@code{ui_out_stream_new}, pass the @code{stream} member of that
1035@code{ui_stream} object to @code{value_print} and similar functions,
1036and finally call @code{ui_out_field_stream} to output the field you
1037constructed. When the @code{ui_stream} object is no longer needed,
1038you should destroy it and free its memory by calling
1039@code{ui_out_stream_delete}.
1040
1041@deftypefun struct ui_stream *ui_out_stream_new (struct ui_out *@var{uiout})
1042This function creates a new @code{ui_stream} object which uses the
1043same output methods as the @code{ui_out} object whose pointer is
1044passed in @var{uiout}. It returns a pointer to the newly created
1045@code{ui_stream} object.
1046@end deftypefun
1047
1048@deftypefun void ui_out_stream_delete (struct ui_stream *@var{streambuf})
1049This functions destroys a @code{ui_stream} object specified by
1050@var{streambuf}.
1051@end deftypefun
1052
c72e7388 1053@deftypefun void ui_out_field_stream (struct ui_out *@var{uiout}, const char *@var{fieldname}, struct ui_stream *@var{streambuf})
0ee54786
EZ
1054This function consumes all the data accumulated in
1055@code{streambuf->stream} and outputs it like
1056@code{ui_out_field_string} does. After a call to
1057@code{ui_out_field_stream}, the accumulated data no longer exists, but
1058the stream is still valid and may be used for producing more fields.
1059@end deftypefun
1060
1061@strong{Important:} If there is any chance that your code could bail
1062out before completing output generation and reaching the point where
1063@code{ui_out_stream_delete} is called, it is necessary to set up a
1064cleanup, to avoid leaking memory and other resources. Here's a
1065skeleton code to do that:
1066
1067@smallexample
1068 struct ui_stream *mybuf = ui_out_stream_new (uiout);
1069 struct cleanup *old = make_cleanup (ui_out_stream_delete, mybuf);
1070 ...
1071 do_cleanups (old);
1072@end smallexample
1073
1074If the function already has the old cleanup chain set (for other kinds
1075of cleanups), you just have to add your cleanup to it:
1076
1077@smallexample
1078 mybuf = ui_out_stream_new (uiout);
1079 make_cleanup (ui_out_stream_delete, mybuf);
1080@end smallexample
1081
1082Note that with cleanups in place, you should not call
1083@code{ui_out_stream_delete} directly, or you would attempt to free the
1084same buffer twice.
1085
1086@subsection Utility Output Functions
1087
c72e7388 1088@deftypefun void ui_out_field_skip (struct ui_out *@var{uiout}, const char *@var{fldname})
0ee54786
EZ
1089This function skips a field in a table. Use it if you have to leave
1090an empty field without disrupting the table alignment. The argument
1091@var{fldname} specifies a name for the (missing) filed.
1092@end deftypefun
1093
c72e7388 1094@deftypefun void ui_out_text (struct ui_out *@var{uiout}, const char *@var{string})
0ee54786
EZ
1095This function outputs the text in @var{string} in a way that makes it
1096easy to be read by humans. For example, the console implementation of
1097this method filters the text through a built-in pager, to prevent it
1098from scrolling off the visible portion of the screen.
1099
1100Use this function for printing relatively long chunks of text around
1101the actual field data: the text it produces is not aligned according
1102to the table's format. Use @code{ui_out_field_string} to output a
1103string field, and use @code{ui_out_message}, described below, to
1104output short messages.
1105@end deftypefun
1106
1107@deftypefun void ui_out_spaces (struct ui_out *@var{uiout}, int @var{nspaces})
1108This function outputs @var{nspaces} spaces. It is handy to align the
1109text produced by @code{ui_out_text} with the rest of the table or
1110list.
1111@end deftypefun
1112
c72e7388 1113@deftypefun void ui_out_message (struct ui_out *@var{uiout}, int @var{verbosity}, const char *@var{format}, ...)
0ee54786
EZ
1114This function produces a formatted message, provided that the current
1115verbosity level is at least as large as given by @var{verbosity}. The
1116current verbosity level is specified by the user with the @samp{set
1117verbositylevel} command.@footnote{As of this writing (April 2001),
1118setting verbosity level is not yet implemented, and is always returned
1119as zero. So calling @code{ui_out_message} with a @var{verbosity}
1120argument more than zero will cause the message to never be printed.}
1121@end deftypefun
1122
1123@deftypefun void ui_out_wrap_hint (struct ui_out *@var{uiout}, char *@var{indent})
1124This function gives the console output filter (a paging filter) a hint
1125of where to break lines which are too long. Ignored for all other
1126output consumers. @var{indent}, if non-@code{NULL}, is the string to
1127be printed to indent the wrapped text on the next line; it must remain
1128accessible until the next call to @code{ui_out_wrap_hint}, or until an
1129explicit newline is produced by one of the other functions. If
1130@var{indent} is @code{NULL}, the wrapped text will not be indented.
1131@end deftypefun
1132
1133@deftypefun void ui_out_flush (struct ui_out *@var{uiout})
1134This function flushes whatever output has been accumulated so far, if
1135the UI buffers output.
1136@end deftypefun
1137
1138
1139@subsection Examples of Use of @code{ui_out} functions
1140
1141@cindex using @code{ui_out} functions
1142@cindex @code{ui_out} functions, usage examples
1143This section gives some practical examples of using the @code{ui_out}
1144functions to generalize the old console-oriented code in
1145@value{GDBN}. The examples all come from functions defined on the
1146@file{breakpoints.c} file.
1147
1148This example, from the @code{breakpoint_1} function, shows how to
1149produce a table.
1150
1151The original code was:
1152
1153@example
1154 if (!found_a_breakpoint++)
1155 @{
1156 annotate_breakpoints_headers ();
1157
1158 annotate_field (0);
1159 printf_filtered ("Num ");
1160 annotate_field (1);
1161 printf_filtered ("Type ");
1162 annotate_field (2);
1163 printf_filtered ("Disp ");
1164 annotate_field (3);
1165 printf_filtered ("Enb ");
1166 if (addressprint)
1167 @{
1168 annotate_field (4);
1169 printf_filtered ("Address ");
1170 @}
1171 annotate_field (5);
1172 printf_filtered ("What\n");
1173
1174 annotate_breakpoints_table ();
1175 @}
1176@end example
1177
1178Here's the new version:
1179
1180@example
c72e7388
AC
1181 nr_printable_breakpoints = @dots{};
1182
1183 if (addressprint)
1184 ui_out_table_begin (ui, 6, nr_printable_breakpoints, "BreakpointTable");
1185 else
1186 ui_out_table_begin (ui, 5, nr_printable_breakpoints, "BreakpointTable");
1187
1188 if (nr_printable_breakpoints > 0)
1189 annotate_breakpoints_headers ();
1190 if (nr_printable_breakpoints > 0)
1191 annotate_field (0);
1192 ui_out_table_header (uiout, 3, ui_left, "number", "Num"); /* 1 */
1193 if (nr_printable_breakpoints > 0)
1194 annotate_field (1);
1195 ui_out_table_header (uiout, 14, ui_left, "type", "Type"); /* 2 */
1196 if (nr_printable_breakpoints > 0)
1197 annotate_field (2);
1198 ui_out_table_header (uiout, 4, ui_left, "disp", "Disp"); /* 3 */
1199 if (nr_printable_breakpoints > 0)
1200 annotate_field (3);
1201 ui_out_table_header (uiout, 3, ui_left, "enabled", "Enb"); /* 4 */
1202 if (addressprint)
1203 @{
1204 if (nr_printable_breakpoints > 0)
1205 annotate_field (4);
1206 if (TARGET_ADDR_BIT <= 32)
1207 ui_out_table_header (uiout, 10, ui_left, "addr", "Address");/* 5 */
0ee54786 1208 else
c72e7388
AC
1209 ui_out_table_header (uiout, 18, ui_left, "addr", "Address");/* 5 */
1210 @}
1211 if (nr_printable_breakpoints > 0)
1212 annotate_field (5);
1213 ui_out_table_header (uiout, 40, ui_noalign, "what", "What"); /* 6 */
1214 ui_out_table_body (uiout);
1215 if (nr_printable_breakpoints > 0)
1216 annotate_breakpoints_table ();
0ee54786
EZ
1217@end example
1218
1219This example, from the @code{print_one_breakpoint} function, shows how
1220to produce the actual data for the table whose structure was defined
1221in the above example. The original code was:
1222
1223@example
1224 annotate_record ();
1225 annotate_field (0);
1226 printf_filtered ("%-3d ", b->number);
1227 annotate_field (1);
1228 if ((int)b->type > (sizeof(bptypes)/sizeof(bptypes[0]))
1229 || ((int) b->type != bptypes[(int) b->type].type))
1230 internal_error ("bptypes table does not describe type #%d.",
1231 (int)b->type);
1232 printf_filtered ("%-14s ", bptypes[(int)b->type].description);
1233 annotate_field (2);
1234 printf_filtered ("%-4s ", bpdisps[(int)b->disposition]);
1235 annotate_field (3);
1236 printf_filtered ("%-3c ", bpenables[(int)b->enable]);
c72e7388 1237 @dots{}
0ee54786
EZ
1238@end example
1239
1240This is the new version:
1241
1242@example
1243 annotate_record ();
c72e7388 1244 ui_out_tuple_begin (uiout, "bkpt");
0ee54786
EZ
1245 annotate_field (0);
1246 ui_out_field_int (uiout, "number", b->number);
1247 annotate_field (1);
1248 if (((int) b->type > (sizeof (bptypes) / sizeof (bptypes[0])))
1249 || ((int) b->type != bptypes[(int) b->type].type))
1250 internal_error ("bptypes table does not describe type #%d.",
1251 (int) b->type);
1252 ui_out_field_string (uiout, "type", bptypes[(int)b->type].description);
1253 annotate_field (2);
1254 ui_out_field_string (uiout, "disp", bpdisps[(int)b->disposition]);
1255 annotate_field (3);
1256 ui_out_field_fmt (uiout, "enabled", "%c", bpenables[(int)b->enable]);
c72e7388 1257 @dots{}
0ee54786
EZ
1258@end example
1259
1260This example, also from @code{print_one_breakpoint}, shows how to
1261produce a complicated output field using the @code{print_expression}
1262functions which requires a stream to be passed. It also shows how to
1263automate stream destruction with cleanups. The original code was:
1264
1265@example
1266 annotate_field (5);
1267 print_expression (b->exp, gdb_stdout);
1268@end example
1269
1270The new version is:
1271
1272@example
1273 struct ui_stream *stb = ui_out_stream_new (uiout);
1274 struct cleanup *old_chain = make_cleanup_ui_out_stream_delete (stb);
1275 ...
1276 annotate_field (5);
1277 print_expression (b->exp, stb->stream);
1278 ui_out_field_stream (uiout, "what", local_stream);
1279@end example
1280
1281This example, also from @code{print_one_breakpoint}, shows how to use
1282@code{ui_out_text} and @code{ui_out_field_string}. The original code
1283was:
1284
1285@example
1286 annotate_field (5);
1287 if (b->dll_pathname == NULL)
1288 printf_filtered ("<any library> ");
1289 else
1290 printf_filtered ("library \"%s\" ", b->dll_pathname);
1291@end example
1292
1293It became:
1294
1295@example
1296 annotate_field (5);
1297 if (b->dll_pathname == NULL)
1298 @{
1299 ui_out_field_string (uiout, "what", "<any library>");
1300 ui_out_spaces (uiout, 1);
1301 @}
1302 else
1303 @{
1304 ui_out_text (uiout, "library \"");
1305 ui_out_field_string (uiout, "what", b->dll_pathname);
1306 ui_out_text (uiout, "\" ");
1307 @}
1308@end example
1309
1310The following example from @code{print_one_breakpoint} shows how to
1311use @code{ui_out_field_int} and @code{ui_out_spaces}. The original
1312code was:
1313
1314@example
1315 annotate_field (5);
1316 if (b->forked_inferior_pid != 0)
1317 printf_filtered ("process %d ", b->forked_inferior_pid);
1318@end example
1319
1320It became:
1321
1322@example
1323 annotate_field (5);
1324 if (b->forked_inferior_pid != 0)
1325 @{
1326 ui_out_text (uiout, "process ");
1327 ui_out_field_int (uiout, "what", b->forked_inferior_pid);
1328 ui_out_spaces (uiout, 1);
1329 @}
1330@end example
1331
1332Here's an example of using @code{ui_out_field_string}. The original
1333code was:
1334
1335@example
1336 annotate_field (5);
1337 if (b->exec_pathname != NULL)
1338 printf_filtered ("program \"%s\" ", b->exec_pathname);
1339@end example
1340
1341It became:
1342
1343@example
1344 annotate_field (5);
1345 if (b->exec_pathname != NULL)
1346 @{
1347 ui_out_text (uiout, "program \"");
1348 ui_out_field_string (uiout, "what", b->exec_pathname);
1349 ui_out_text (uiout, "\" ");
1350 @}
1351@end example
1352
1353Finally, here's an example of printing an address. The original code:
1354
1355@example
1356 annotate_field (4);
1357 printf_filtered ("%s ",
1358 local_hex_string_custom ((unsigned long) b->address, "08l"));
1359@end example
1360
1361It became:
1362
1363@example
1364 annotate_field (4);
1365 ui_out_field_core_addr (uiout, "Address", b->address);
1366@end example
1367
1368
c906108c
SS
1369@section Console Printing
1370
1371@section TUI
1372
89437448 1373@node libgdb
c906108c 1374
89437448
AC
1375@chapter libgdb
1376
1377@section libgdb 1.0
1378@cindex @code{libgdb}
1379@code{libgdb} 1.0 was an abortive project of years ago. The theory was
1380to provide an API to @value{GDBN}'s functionality.
1381
1382@section libgdb 2.0
56caf160 1383@cindex @code{libgdb}
89437448
AC
1384@code{libgdb} 2.0 is an ongoing effort to update @value{GDBN} so that is
1385better able to support graphical and other environments.
1386
1387Since @code{libgdb} development is on-going, its architecture is still
1388evolving. The following components have so far been identified:
1389
1390@itemize @bullet
1391@item
1392Observer - @file{gdb-events.h}.
1393@item
1394Builder - @file{ui-out.h}
1395@item
1396Event Loop - @file{event-loop.h}
1397@item
1398Library - @file{gdb.h}
1399@end itemize
1400
1401The model that ties these components together is described below.
1402
1403@section The @code{libgdb} Model
1404
1405A client of @code{libgdb} interacts with the library in two ways.
1406
1407@itemize @bullet
1408@item
1409As an observer (using @file{gdb-events}) receiving notifications from
1410@code{libgdb} of any internal state changes (break point changes, run
1411state, etc).
1412@item
1413As a client querying @code{libgdb} (using the @file{ui-out} builder) to
1414obtain various status values from @value{GDBN}.
1415@end itemize
1416
1417Since @code{libgdb} could have multiple clients (e.g. a GUI supporting
1418the existing @value{GDBN} CLI), those clients must co-operate when
1419controlling @code{libgdb}. In particular, a client must ensure that
1420@code{libgdb} is idle (i.e. no other client is using @code{libgdb})
1421before responding to a @file{gdb-event} by making a query.
1422
1423@section CLI support
1424
1425At present @value{GDBN}'s CLI is very much entangled in with the core of
1426@code{libgdb}. Consequently, a client wishing to include the CLI in
1427their interface needs to carefully co-ordinate its own and the CLI's
1428requirements.
1429
1430It is suggested that the client set @code{libgdb} up to be bi-modal
1431(alternate between CLI and client query modes). The notes below sketch
1432out the theory:
1433
1434@itemize @bullet
1435@item
1436The client registers itself as an observer of @code{libgdb}.
1437@item
1438The client create and install @code{cli-out} builder using its own
1439versions of the @code{ui-file} @code{gdb_stderr}, @code{gdb_stdtarg} and
1440@code{gdb_stdout} streams.
1441@item
1442The client creates a separate custom @code{ui-out} builder that is only
1443used while making direct queries to @code{libgdb}.
1444@end itemize
1445
1446When the client receives input intended for the CLI, it simply passes it
1447along. Since the @code{cli-out} builder is installed by default, all
1448the CLI output in response to that command is routed (pronounced rooted)
1449through to the client controlled @code{gdb_stdout} et.@: al.@: streams.
1450At the same time, the client is kept abreast of internal changes by
1451virtue of being a @code{libgdb} observer.
1452
1453The only restriction on the client is that it must wait until
1454@code{libgdb} becomes idle before initiating any queries (using the
1455client's custom builder).
1456
1457@section @code{libgdb} components
1458
1459@subheading Observer - @file{gdb-events.h}
1460@file{gdb-events} provides the client with a very raw mechanism that can
1461be used to implement an observer. At present it only allows for one
1462observer and that observer must, internally, handle the need to delay
1463the processing of any event notifications until after @code{libgdb} has
1464finished the current command.
1465
1466@subheading Builder - @file{ui-out.h}
1467@file{ui-out} provides the infrastructure necessary for a client to
1468create a builder. That builder is then passed down to @code{libgdb}
1469when doing any queries.
1470
1471@subheading Event Loop - @file{event-loop.h}
1472@c There could be an entire section on the event-loop
1473@file{event-loop}, currently non-re-entrant, provides a simple event
1474loop. A client would need to either plug its self into this loop or,
1475implement a new event-loop that GDB would use.
1476
1477The event-loop will eventually be made re-entrant. This is so that
1478@value{GDB} can better handle the problem of some commands blocking
1479instead of returning.
1480
1481@subheading Library - @file{gdb.h}
1482@file{libgdb} is the most obvious component of this system. It provides
1483the query interface. Each function is parameterized by a @code{ui-out}
1484builder. The result of the query is constructed using that builder
1485before the query function returns.
c906108c
SS
1486
1487@node Symbol Handling
1488
1489@chapter Symbol Handling
1490
25822942 1491Symbols are a key part of @value{GDBN}'s operation. Symbols include variables,
c906108c
SS
1492functions, and types.
1493
1494@section Symbol Reading
1495
56caf160
EZ
1496@cindex symbol reading
1497@cindex reading of symbols
1498@cindex symbol files
1499@value{GDBN} reads symbols from @dfn{symbol files}. The usual symbol
1500file is the file containing the program which @value{GDBN} is
1501debugging. @value{GDBN} can be directed to use a different file for
1502symbols (with the @samp{symbol-file} command), and it can also read
1503more symbols via the @samp{add-file} and @samp{load} commands, or while
1504reading symbols from shared libraries.
1505
1506@findex find_sym_fns
1507Symbol files are initially opened by code in @file{symfile.c} using
1508the BFD library (@pxref{Support Libraries}). BFD identifies the type
1509of the file by examining its header. @code{find_sym_fns} then uses
1510this identification to locate a set of symbol-reading functions.
1511
1512@findex add_symtab_fns
1513@cindex @code{sym_fns} structure
1514@cindex adding a symbol-reading module
1515Symbol-reading modules identify themselves to @value{GDBN} by calling
c906108c
SS
1516@code{add_symtab_fns} during their module initialization. The argument
1517to @code{add_symtab_fns} is a @code{struct sym_fns} which contains the
1518name (or name prefix) of the symbol format, the length of the prefix,
1519and pointers to four functions. These functions are called at various
56caf160 1520times to process symbol files whose identification matches the specified
c906108c
SS
1521prefix.
1522
1523The functions supplied by each module are:
1524
1525@table @code
1526@item @var{xyz}_symfile_init(struct sym_fns *sf)
1527
56caf160 1528@cindex secondary symbol file
c906108c
SS
1529Called from @code{symbol_file_add} when we are about to read a new
1530symbol file. This function should clean up any internal state (possibly
1531resulting from half-read previous files, for example) and prepare to
56caf160
EZ
1532read a new symbol file. Note that the symbol file which we are reading
1533might be a new ``main'' symbol file, or might be a secondary symbol file
c906108c
SS
1534whose symbols are being added to the existing symbol table.
1535
1536The argument to @code{@var{xyz}_symfile_init} is a newly allocated
1537@code{struct sym_fns} whose @code{bfd} field contains the BFD for the
1538new symbol file being read. Its @code{private} field has been zeroed,
1539and can be modified as desired. Typically, a struct of private
1540information will be @code{malloc}'d, and a pointer to it will be placed
1541in the @code{private} field.
1542
1543There is no result from @code{@var{xyz}_symfile_init}, but it can call
1544@code{error} if it detects an unavoidable problem.
1545
1546@item @var{xyz}_new_init()
1547
1548Called from @code{symbol_file_add} when discarding existing symbols.
56caf160
EZ
1549This function needs only handle the symbol-reading module's internal
1550state; the symbol table data structures visible to the rest of
1551@value{GDBN} will be discarded by @code{symbol_file_add}. It has no
1552arguments and no result. It may be called after
1553@code{@var{xyz}_symfile_init}, if a new symbol table is being read, or
1554may be called alone if all symbols are simply being discarded.
c906108c
SS
1555
1556@item @var{xyz}_symfile_read(struct sym_fns *sf, CORE_ADDR addr, int mainline)
1557
1558Called from @code{symbol_file_add} to actually read the symbols from a
1559symbol-file into a set of psymtabs or symtabs.
1560
56caf160 1561@code{sf} points to the @code{struct sym_fns} originally passed to
c906108c
SS
1562@code{@var{xyz}_sym_init} for possible initialization. @code{addr} is
1563the offset between the file's specified start address and its true
1564address in memory. @code{mainline} is 1 if this is the main symbol
1565table being read, and 0 if a secondary symbol file (e.g. shared library
1566or dynamically loaded file) is being read.@refill
1567@end table
1568
1569In addition, if a symbol-reading module creates psymtabs when
1570@var{xyz}_symfile_read is called, these psymtabs will contain a pointer
1571to a function @code{@var{xyz}_psymtab_to_symtab}, which can be called
25822942 1572from any point in the @value{GDBN} symbol-handling code.
c906108c
SS
1573
1574@table @code
1575@item @var{xyz}_psymtab_to_symtab (struct partial_symtab *pst)
1576
56caf160 1577Called from @code{psymtab_to_symtab} (or the @code{PSYMTAB_TO_SYMTAB} macro) if
c906108c
SS
1578the psymtab has not already been read in and had its @code{pst->symtab}
1579pointer set. The argument is the psymtab to be fleshed-out into a
56caf160
EZ
1580symtab. Upon return, @code{pst->readin} should have been set to 1, and
1581@code{pst->symtab} should contain a pointer to the new corresponding symtab, or
c906108c
SS
1582zero if there were no symbols in that part of the symbol file.
1583@end table
1584
1585@section Partial Symbol Tables
1586
56caf160 1587@value{GDBN} has three types of symbol tables:
c906108c
SS
1588
1589@itemize @bullet
56caf160
EZ
1590@cindex full symbol table
1591@cindex symtabs
1592@item
1593Full symbol tables (@dfn{symtabs}). These contain the main
1594information about symbols and addresses.
c906108c 1595
56caf160
EZ
1596@cindex psymtabs
1597@item
1598Partial symbol tables (@dfn{psymtabs}). These contain enough
c906108c
SS
1599information to know when to read the corresponding part of the full
1600symbol table.
1601
56caf160
EZ
1602@cindex minimal symbol table
1603@cindex minsymtabs
1604@item
1605Minimal symbol tables (@dfn{msymtabs}). These contain information
c906108c 1606gleaned from non-debugging symbols.
c906108c
SS
1607@end itemize
1608
56caf160 1609@cindex partial symbol table
c906108c
SS
1610This section describes partial symbol tables.
1611
1612A psymtab is constructed by doing a very quick pass over an executable
1613file's debugging information. Small amounts of information are
56caf160 1614extracted---enough to identify which parts of the symbol table will
c906108c 1615need to be re-read and fully digested later, when the user needs the
25822942 1616information. The speed of this pass causes @value{GDBN} to start up very
c906108c
SS
1617quickly. Later, as the detailed rereading occurs, it occurs in small
1618pieces, at various times, and the delay therefrom is mostly invisible to
1619the user.
1620@c (@xref{Symbol Reading}.)
1621
1622The symbols that show up in a file's psymtab should be, roughly, those
1623visible to the debugger's user when the program is not running code from
1624that file. These include external symbols and types, static symbols and
56caf160 1625types, and @code{enum} values declared at file scope.
c906108c
SS
1626
1627The psymtab also contains the range of instruction addresses that the
1628full symbol table would represent.
1629
56caf160
EZ
1630@cindex finding a symbol
1631@cindex symbol lookup
c906108c
SS
1632The idea is that there are only two ways for the user (or much of the
1633code in the debugger) to reference a symbol:
1634
1635@itemize @bullet
56caf160
EZ
1636@findex find_pc_function
1637@findex find_pc_line
1638@item
1639By its address (e.g. execution stops at some address which is inside a
1640function in this file). The address will be noticed to be in the
1641range of this psymtab, and the full symtab will be read in.
1642@code{find_pc_function}, @code{find_pc_line}, and other
1643@code{find_pc_@dots{}} functions handle this.
c906108c 1644
56caf160
EZ
1645@cindex lookup_symbol
1646@item
1647By its name
c906108c
SS
1648(e.g. the user asks to print a variable, or set a breakpoint on a
1649function). Global names and file-scope names will be found in the
1650psymtab, which will cause the symtab to be pulled in. Local names will
1651have to be qualified by a global name, or a file-scope name, in which
1652case we will have already read in the symtab as we evaluated the
56caf160 1653qualifier. Or, a local symbol can be referenced when we are ``in'' a
c906108c
SS
1654local scope, in which case the first case applies. @code{lookup_symbol}
1655does most of the work here.
c906108c
SS
1656@end itemize
1657
1658The only reason that psymtabs exist is to cause a symtab to be read in
1659at the right moment. Any symbol that can be elided from a psymtab,
1660while still causing that to happen, should not appear in it. Since
1661psymtabs don't have the idea of scope, you can't put local symbols in
1662them anyway. Psymtabs don't have the idea of the type of a symbol,
1663either, so types need not appear, unless they will be referenced by
1664name.
1665
56caf160
EZ
1666It is a bug for @value{GDBN} to behave one way when only a psymtab has
1667been read, and another way if the corresponding symtab has been read
1668in. Such bugs are typically caused by a psymtab that does not contain
1669all the visible symbols, or which has the wrong instruction address
1670ranges.
c906108c 1671
56caf160 1672The psymtab for a particular section of a symbol file (objfile) could be
c906108c
SS
1673thrown away after the symtab has been read in. The symtab should always
1674be searched before the psymtab, so the psymtab will never be used (in a
1675bug-free environment). Currently, psymtabs are allocated on an obstack,
1676and all the psymbols themselves are allocated in a pair of large arrays
1677on an obstack, so there is little to be gained by trying to free them
1678unless you want to do a lot more work.
1679
1680@section Types
1681
56caf160 1682@unnumberedsubsec Fundamental Types (e.g., @code{FT_VOID}, @code{FT_BOOLEAN}).
c906108c 1683
56caf160 1684@cindex fundamental types
25822942 1685These are the fundamental types that @value{GDBN} uses internally. Fundamental
c906108c
SS
1686types from the various debugging formats (stabs, ELF, etc) are mapped
1687into one of these. They are basically a union of all fundamental types
56caf160
EZ
1688that @value{GDBN} knows about for all the languages that @value{GDBN}
1689knows about.
c906108c 1690
56caf160 1691@unnumberedsubsec Type Codes (e.g., @code{TYPE_CODE_PTR}, @code{TYPE_CODE_ARRAY}).
c906108c 1692
56caf160
EZ
1693@cindex type codes
1694Each time @value{GDBN} builds an internal type, it marks it with one
1695of these types. The type may be a fundamental type, such as
1696@code{TYPE_CODE_INT}, or a derived type, such as @code{TYPE_CODE_PTR}
1697which is a pointer to another type. Typically, several @code{FT_*}
1698types map to one @code{TYPE_CODE_*} type, and are distinguished by
1699other members of the type struct, such as whether the type is signed
1700or unsigned, and how many bits it uses.
c906108c 1701
56caf160 1702@unnumberedsubsec Builtin Types (e.g., @code{builtin_type_void}, @code{builtin_type_char}).
c906108c
SS
1703
1704These are instances of type structs that roughly correspond to
56caf160
EZ
1705fundamental types and are created as global types for @value{GDBN} to
1706use for various ugly historical reasons. We eventually want to
1707eliminate these. Note for example that @code{builtin_type_int}
1708initialized in @file{gdbtypes.c} is basically the same as a
1709@code{TYPE_CODE_INT} type that is initialized in @file{c-lang.c} for
1710an @code{FT_INTEGER} fundamental type. The difference is that the
1711@code{builtin_type} is not associated with any particular objfile, and
1712only one instance exists, while @file{c-lang.c} builds as many
1713@code{TYPE_CODE_INT} types as needed, with each one associated with
1714some particular objfile.
c906108c
SS
1715
1716@section Object File Formats
56caf160 1717@cindex object file formats
c906108c
SS
1718
1719@subsection a.out
1720
56caf160
EZ
1721@cindex @code{a.out} format
1722The @code{a.out} format is the original file format for Unix. It
1723consists of three sections: @code{text}, @code{data}, and @code{bss},
1724which are for program code, initialized data, and uninitialized data,
1725respectively.
c906108c 1726
56caf160 1727The @code{a.out} format is so simple that it doesn't have any reserved
c906108c 1728place for debugging information. (Hey, the original Unix hackers used
56caf160
EZ
1729@samp{adb}, which is a machine-language debugger!) The only debugging
1730format for @code{a.out} is stabs, which is encoded as a set of normal
c906108c
SS
1731symbols with distinctive attributes.
1732
56caf160 1733The basic @code{a.out} reader is in @file{dbxread.c}.
c906108c
SS
1734
1735@subsection COFF
1736
56caf160 1737@cindex COFF format
c906108c
SS
1738The COFF format was introduced with System V Release 3 (SVR3) Unix.
1739COFF files may have multiple sections, each prefixed by a header. The
1740number of sections is limited.
1741
1742The COFF specification includes support for debugging. Although this
1743was a step forward, the debugging information was woefully limited. For
1744instance, it was not possible to represent code that came from an
1745included file.
1746
1747The COFF reader is in @file{coffread.c}.
1748
1749@subsection ECOFF
1750
56caf160 1751@cindex ECOFF format
c906108c
SS
1752ECOFF is an extended COFF originally introduced for Mips and Alpha
1753workstations.
1754
1755The basic ECOFF reader is in @file{mipsread.c}.
1756
1757@subsection XCOFF
1758
56caf160 1759@cindex XCOFF format
c906108c
SS
1760The IBM RS/6000 running AIX uses an object file format called XCOFF.
1761The COFF sections, symbols, and line numbers are used, but debugging
56caf160
EZ
1762symbols are @code{dbx}-style stabs whose strings are located in the
1763@code{.debug} section (rather than the string table). For more
1764information, see @ref{Top,,,stabs,The Stabs Debugging Format}.
c906108c
SS
1765
1766The shared library scheme has a clean interface for figuring out what
1767shared libraries are in use, but the catch is that everything which
1768refers to addresses (symbol tables and breakpoints at least) needs to be
1769relocated for both shared libraries and the main executable. At least
1770using the standard mechanism this can only be done once the program has
1771been run (or the core file has been read).
1772
1773@subsection PE
1774
56caf160
EZ
1775@cindex PE-COFF format
1776Windows 95 and NT use the PE (@dfn{Portable Executable}) format for their
c906108c
SS
1777executables. PE is basically COFF with additional headers.
1778
25822942 1779While BFD includes special PE support, @value{GDBN} needs only the basic
c906108c
SS
1780COFF reader.
1781
1782@subsection ELF
1783
56caf160 1784@cindex ELF format
c906108c
SS
1785The ELF format came with System V Release 4 (SVR4) Unix. ELF is similar
1786to COFF in being organized into a number of sections, but it removes
1787many of COFF's limitations.
1788
1789The basic ELF reader is in @file{elfread.c}.
1790
1791@subsection SOM
1792
56caf160 1793@cindex SOM format
c906108c
SS
1794SOM is HP's object file and debug format (not to be confused with IBM's
1795SOM, which is a cross-language ABI).
1796
1797The SOM reader is in @file{hpread.c}.
1798
1799@subsection Other File Formats
1800
56caf160 1801@cindex Netware Loadable Module format
25822942 1802Other file formats that have been supported by @value{GDBN} include Netware
4a98ee0e 1803Loadable Modules (@file{nlmread.c}).
c906108c
SS
1804
1805@section Debugging File Formats
1806
1807This section describes characteristics of debugging information that
1808are independent of the object file format.
1809
1810@subsection stabs
1811
56caf160 1812@cindex stabs debugging info
c906108c
SS
1813@code{stabs} started out as special symbols within the @code{a.out}
1814format. Since then, it has been encapsulated into other file
1815formats, such as COFF and ELF.
1816
1817While @file{dbxread.c} does some of the basic stab processing,
1818including for encapsulated versions, @file{stabsread.c} does
1819the real work.
1820
1821@subsection COFF
1822
56caf160 1823@cindex COFF debugging info
c906108c
SS
1824The basic COFF definition includes debugging information. The level
1825of support is minimal and non-extensible, and is not often used.
1826
1827@subsection Mips debug (Third Eye)
1828
56caf160 1829@cindex ECOFF debugging info
c906108c
SS
1830ECOFF includes a definition of a special debug format.
1831
1832The file @file{mdebugread.c} implements reading for this format.
1833
1834@subsection DWARF 1
1835
56caf160 1836@cindex DWARF 1 debugging info
c906108c
SS
1837DWARF 1 is a debugging format that was originally designed to be
1838used with ELF in SVR4 systems.
1839
1840@c CHILL_PRODUCER
1841@c GCC_PRODUCER
1842@c GPLUS_PRODUCER
1843@c LCC_PRODUCER
1844@c If defined, these are the producer strings in a DWARF 1 file. All of
1845@c these have reasonable defaults already.
1846
1847The DWARF 1 reader is in @file{dwarfread.c}.
1848
1849@subsection DWARF 2
1850
56caf160 1851@cindex DWARF 2 debugging info
c906108c
SS
1852DWARF 2 is an improved but incompatible version of DWARF 1.
1853
1854The DWARF 2 reader is in @file{dwarf2read.c}.
1855
1856@subsection SOM
1857
56caf160 1858@cindex SOM debugging info
c906108c
SS
1859Like COFF, the SOM definition includes debugging information.
1860
25822942 1861@section Adding a New Symbol Reader to @value{GDBN}
c906108c 1862
56caf160
EZ
1863@cindex adding debugging info reader
1864If you are using an existing object file format (@code{a.out}, COFF, ELF, etc),
c906108c
SS
1865there is probably little to be done.
1866
1867If you need to add a new object file format, you must first add it to
1868BFD. This is beyond the scope of this document.
1869
1870You must then arrange for the BFD code to provide access to the
25822942 1871debugging symbols. Generally @value{GDBN} will have to call swapping routines
c906108c 1872from BFD and a few other BFD internal routines to locate the debugging
25822942 1873information. As much as possible, @value{GDBN} should not depend on the BFD
c906108c
SS
1874internal data structures.
1875
1876For some targets (e.g., COFF), there is a special transfer vector used
1877to call swapping routines, since the external data structures on various
1878platforms have different sizes and layouts. Specialized routines that
1879will only ever be implemented by one object file format may be called
1880directly. This interface should be described in a file
56caf160 1881@file{bfd/lib@var{xyz}.h}, which is included by @value{GDBN}.
c906108c
SS
1882
1883
1884@node Language Support
1885
1886@chapter Language Support
1887
56caf160
EZ
1888@cindex language support
1889@value{GDBN}'s language support is mainly driven by the symbol reader,
1890although it is possible for the user to set the source language
1891manually.
c906108c 1892
56caf160
EZ
1893@value{GDBN} chooses the source language by looking at the extension
1894of the file recorded in the debug info; @file{.c} means C, @file{.f}
1895means Fortran, etc. It may also use a special-purpose language
1896identifier if the debug format supports it, like with DWARF.
c906108c 1897
25822942 1898@section Adding a Source Language to @value{GDBN}
c906108c 1899
56caf160
EZ
1900@cindex adding source language
1901To add other languages to @value{GDBN}'s expression parser, follow the
1902following steps:
c906108c
SS
1903
1904@table @emph
1905@item Create the expression parser.
1906
56caf160 1907@cindex expression parser
c906108c 1908This should reside in a file @file{@var{lang}-exp.y}. Routines for
56caf160 1909building parsed expressions into a @code{union exp_element} list are in
c906108c
SS
1910@file{parse.c}.
1911
56caf160 1912@cindex language parser
c906108c
SS
1913Since we can't depend upon everyone having Bison, and YACC produces
1914parsers that define a bunch of global names, the following lines
56caf160 1915@strong{must} be included at the top of the YACC parser, to prevent the
c906108c
SS
1916various parsers from defining the same global names:
1917
1918@example
56caf160
EZ
1919#define yyparse @var{lang}_parse
1920#define yylex @var{lang}_lex
1921#define yyerror @var{lang}_error
1922#define yylval @var{lang}_lval
1923#define yychar @var{lang}_char
1924#define yydebug @var{lang}_debug
1925#define yypact @var{lang}_pact
1926#define yyr1 @var{lang}_r1
1927#define yyr2 @var{lang}_r2
1928#define yydef @var{lang}_def
1929#define yychk @var{lang}_chk
1930#define yypgo @var{lang}_pgo
1931#define yyact @var{lang}_act
1932#define yyexca @var{lang}_exca
1933#define yyerrflag @var{lang}_errflag
1934#define yynerrs @var{lang}_nerrs
c906108c
SS
1935@end example
1936
1937At the bottom of your parser, define a @code{struct language_defn} and
1938initialize it with the right values for your language. Define an
1939@code{initialize_@var{lang}} routine and have it call
25822942 1940@samp{add_language(@var{lang}_language_defn)} to tell the rest of @value{GDBN}
c906108c
SS
1941that your language exists. You'll need some other supporting variables
1942and functions, which will be used via pointers from your
1943@code{@var{lang}_language_defn}. See the declaration of @code{struct
1944language_defn} in @file{language.h}, and the other @file{*-exp.y} files,
1945for more information.
1946
1947@item Add any evaluation routines, if necessary
1948
56caf160
EZ
1949@cindex expression evaluation routines
1950@findex evaluate_subexp
1951@findex prefixify_subexp
1952@findex length_of_subexp
c906108c
SS
1953If you need new opcodes (that represent the operations of the language),
1954add them to the enumerated type in @file{expression.h}. Add support
56caf160
EZ
1955code for these operations in the @code{evaluate_subexp} function
1956defined in the file @file{eval.c}. Add cases
c906108c 1957for new opcodes in two functions from @file{parse.c}:
56caf160 1958@code{prefixify_subexp} and @code{length_of_subexp}. These compute
c906108c
SS
1959the number of @code{exp_element}s that a given operation takes up.
1960
1961@item Update some existing code
1962
1963Add an enumerated identifier for your language to the enumerated type
1964@code{enum language} in @file{defs.h}.
1965
1966Update the routines in @file{language.c} so your language is included.
1967These routines include type predicates and such, which (in some cases)
1968are language dependent. If your language does not appear in the switch
1969statement, an error is reported.
1970
56caf160 1971@vindex current_language
c906108c
SS
1972Also included in @file{language.c} is the code that updates the variable
1973@code{current_language}, and the routines that translate the
1974@code{language_@var{lang}} enumerated identifier into a printable
1975string.
1976
56caf160 1977@findex _initialize_language
c906108c
SS
1978Update the function @code{_initialize_language} to include your
1979language. This function picks the default language upon startup, so is
25822942 1980dependent upon which languages that @value{GDBN} is built for.
c906108c 1981
56caf160 1982@findex allocate_symtab
c906108c
SS
1983Update @code{allocate_symtab} in @file{symfile.c} and/or symbol-reading
1984code so that the language of each symtab (source file) is set properly.
1985This is used to determine the language to use at each stack frame level.
1986Currently, the language is set based upon the extension of the source
1987file. If the language can be better inferred from the symbol
1988information, please set the language of the symtab in the symbol-reading
1989code.
1990
56caf160
EZ
1991@findex print_subexp
1992@findex op_print_tab
1993Add helper code to @code{print_subexp} (in @file{expprint.c}) to handle any new
c906108c
SS
1994expression opcodes you have added to @file{expression.h}. Also, add the
1995printed representations of your operators to @code{op_print_tab}.
1996
1997@item Add a place of call
1998
56caf160 1999@findex parse_exp_1
c906108c 2000Add a call to @code{@var{lang}_parse()} and @code{@var{lang}_error} in
56caf160 2001@code{parse_exp_1} (defined in @file{parse.c}).
c906108c
SS
2002
2003@item Use macros to trim code
2004
56caf160 2005@cindex trimming language-dependent code
25822942
DB
2006The user has the option of building @value{GDBN} for some or all of the
2007languages. If the user decides to build @value{GDBN} for the language
c906108c
SS
2008@var{lang}, then every file dependent on @file{language.h} will have the
2009macro @code{_LANG_@var{lang}} defined in it. Use @code{#ifdef}s to
2010leave out large routines that the user won't need if he or she is not
2011using your language.
2012
25822942 2013Note that you do not need to do this in your YACC parser, since if @value{GDBN}
c906108c 2014is not build for @var{lang}, then @file{@var{lang}-exp.tab.o} (the
25822942 2015compiled form of your parser) is not linked into @value{GDBN} at all.
c906108c 2016
56caf160
EZ
2017See the file @file{configure.in} for how @value{GDBN} is configured
2018for different languages.
c906108c
SS
2019
2020@item Edit @file{Makefile.in}
2021
2022Add dependencies in @file{Makefile.in}. Make sure you update the macro
2023variables such as @code{HFILES} and @code{OBJS}, otherwise your code may
2024not get linked in, or, worse yet, it may not get @code{tar}red into the
2025distribution!
c906108c
SS
2026@end table
2027
2028
2029@node Host Definition
2030
2031@chapter Host Definition
2032
af6c57ea
AC
2033@emph{Maintainer's note: In theory, new targets no longer need to use
2034the host framework described below. Instead it should be possible to
2035handle everything using autoconf. Patches eliminating this framework
2036welcome.}
2037
56caf160 2038With the advent of Autoconf, it's rarely necessary to have host
c906108c
SS
2039definition machinery anymore.
2040
2041@section Adding a New Host
2042
56caf160
EZ
2043@cindex adding a new host
2044@cindex host, adding
2045Most of @value{GDBN}'s host configuration support happens via
2046Autoconf. New host-specific definitions should be rarely needed.
2047@value{GDBN} still uses the host-specific definitions and files listed
2048below, but these mostly exist for historical reasons, and should
2049eventually disappear.
c906108c 2050
25822942 2051Several files control @value{GDBN}'s configuration for host systems:
c906108c
SS
2052
2053@table @file
56caf160 2054@vindex XDEPFILES
c906108c
SS
2055@item gdb/config/@var{arch}/@var{xyz}.mh
2056Specifies Makefile fragments needed when hosting on machine @var{xyz}.
2057In particular, this lists the required machine-dependent object files,
2058by defining @samp{XDEPFILES=@dots{}}. Also specifies the header file
2059which describes host @var{xyz}, by defining @code{XM_FILE=
2060xm-@var{xyz}.h}. You can also define @code{CC}, @code{SYSV_DEFINE},
2061@code{XM_CFLAGS}, @code{XM_ADD_FILES}, @code{XM_CLIBS}, @code{XM_CDEPS},
2062etc.; see @file{Makefile.in}.
2063
2064@item gdb/config/@var{arch}/xm-@var{xyz}.h
56caf160 2065(@file{xm.h} is a link to this file, created by @code{configure}). Contains C
c906108c
SS
2066macro definitions describing the host system environment, such as byte
2067order, host C compiler and library.
2068
2069@item gdb/@var{xyz}-xdep.c
2070Contains any miscellaneous C code required for this machine as a host.
2071On most machines it doesn't exist at all. If it does exist, put
2072@file{@var{xyz}-xdep.o} into the @code{XDEPFILES} line in
2073@file{gdb/config/@var{arch}/@var{xyz}.mh}.
c906108c
SS
2074@end table
2075
2076@subheading Generic Host Support Files
2077
56caf160 2078@cindex generic host support
c906108c
SS
2079There are some ``generic'' versions of routines that can be used by
2080various systems. These can be customized in various ways by macros
2081defined in your @file{xm-@var{xyz}.h} file. If these routines work for
2082the @var{xyz} host, you can just include the generic file's name (with
2083@samp{.o}, not @samp{.c}) in @code{XDEPFILES}.
2084
2085Otherwise, if your machine needs custom support routines, you will need
2086to write routines that perform the same functions as the generic file.
2087Put them into @code{@var{xyz}-xdep.c}, and put @code{@var{xyz}-xdep.o}
2088into @code{XDEPFILES}.
2089
2090@table @file
56caf160
EZ
2091@cindex remote debugging support
2092@cindex serial line support
c906108c
SS
2093@item ser-unix.c
2094This contains serial line support for Unix systems. This is always
2095included, via the makefile variable @code{SER_HARDWIRE}; override this
2096variable in the @file{.mh} file to avoid it.
2097
2098@item ser-go32.c
2099This contains serial line support for 32-bit programs running under DOS,
56caf160 2100using the DJGPP (a.k.a.@: GO32) execution environment.
c906108c 2101
56caf160 2102@cindex TCP remote support
c906108c
SS
2103@item ser-tcp.c
2104This contains generic TCP support using sockets.
c906108c
SS
2105@end table
2106
2107@section Host Conditionals
2108
56caf160
EZ
2109When @value{GDBN} is configured and compiled, various macros are
2110defined or left undefined, to control compilation based on the
2111attributes of the host system. These macros and their meanings (or if
2112the meaning is not documented here, then one of the source files where
2113they are used is indicated) are:
c906108c 2114
56caf160 2115@ftable @code
25822942 2116@item @value{GDBN}INIT_FILENAME
56caf160
EZ
2117The default name of @value{GDBN}'s initialization file (normally
2118@file{.gdbinit}).
c906108c
SS
2119
2120@item MEM_FNS_DECLARED
2121Your host config file defines this if it includes declarations of
2122@code{memcpy} and @code{memset}. Define this to avoid conflicts between
2123the native include files and the declarations in @file{defs.h}.
2124
cce74817
JM
2125@item NO_STD_REGS
2126This macro is deprecated.
2127
c906108c
SS
2128@item NO_SYS_FILE
2129Define this if your system does not have a @code{<sys/file.h>}.
2130
2131@item SIGWINCH_HANDLER
2132If your host defines @code{SIGWINCH}, you can define this to be the name
2133of a function to be called if @code{SIGWINCH} is received.
2134
2135@item SIGWINCH_HANDLER_BODY
2136Define this to expand into code that will define the function named by
2137the expansion of @code{SIGWINCH_HANDLER}.
2138
2139@item ALIGN_STACK_ON_STARTUP
56caf160 2140@cindex stack alignment
c906108c
SS
2141Define this if your system is of a sort that will crash in
2142@code{tgetent} if the stack happens not to be longword-aligned when
2143@code{main} is called. This is a rare situation, but is known to occur
2144on several different types of systems.
2145
2146@item CRLF_SOURCE_FILES
56caf160 2147@cindex DOS text files
c906108c
SS
2148Define this if host files use @code{\r\n} rather than @code{\n} as a
2149line terminator. This will cause source file listings to omit @code{\r}
56caf160
EZ
2150characters when printing and it will allow @code{\r\n} line endings of files
2151which are ``sourced'' by gdb. It must be possible to open files in binary
c906108c
SS
2152mode using @code{O_BINARY} or, for fopen, @code{"rb"}.
2153
2154@item DEFAULT_PROMPT
56caf160 2155@cindex prompt
c906108c
SS
2156The default value of the prompt string (normally @code{"(gdb) "}).
2157
2158@item DEV_TTY
56caf160 2159@cindex terminal device
c906108c
SS
2160The name of the generic TTY device, defaults to @code{"/dev/tty"}.
2161
2162@item FCLOSE_PROVIDED
2163Define this if the system declares @code{fclose} in the headers included
2164in @code{defs.h}. This isn't needed unless your compiler is unusually
2165anal.
2166
2167@item FOPEN_RB
2168Define this if binary files are opened the same way as text files.
2169
2170@item GETENV_PROVIDED
2171Define this if the system declares @code{getenv} in its headers included
56caf160 2172in @code{defs.h}. This isn't needed unless your compiler is unusually
c906108c
SS
2173anal.
2174
2175@item HAVE_MMAP
56caf160 2176@findex mmap
c906108c
SS
2177In some cases, use the system call @code{mmap} for reading symbol
2178tables. For some machines this allows for sharing and quick updates.
2179
2180@item HAVE_SIGSETMASK
56caf160 2181@findex sigsetmask
c906108c 2182Define this if the host system has job control, but does not define
56caf160 2183@code{sigsetmask}. Currently, this is only true of the RS/6000.
c906108c
SS
2184
2185@item HAVE_TERMIO
2186Define this if the host system has @code{termio.h}.
2187
2188@item HOST_BYTE_ORDER
56caf160 2189@cindex byte order
c906108c
SS
2190The ordering of bytes in the host. This must be defined to be either
2191@code{BIG_ENDIAN} or @code{LITTLE_ENDIAN}.
2192
2193@item INT_MAX
9742079a
EZ
2194@itemx INT_MIN
2195@itemx LONG_MAX
2196@itemx UINT_MAX
2197@itemx ULONG_MAX
c906108c
SS
2198Values for host-side constants.
2199
2200@item ISATTY
2201Substitute for isatty, if not available.
2202
2203@item LONGEST
2204This is the longest integer type available on the host. If not defined,
2205it will default to @code{long long} or @code{long}, depending on
2206@code{CC_HAS_LONG_LONG}.
2207
2208@item CC_HAS_LONG_LONG
56caf160
EZ
2209@cindex @code{long long} data type
2210Define this if the host C compiler supports @code{long long}. This is set
2211by the @code{configure} script.
c906108c
SS
2212
2213@item PRINTF_HAS_LONG_LONG
2214Define this if the host can handle printing of long long integers via
56caf160
EZ
2215the printf format conversion specifier @code{ll}. This is set by the
2216@code{configure} script.
c906108c
SS
2217
2218@item HAVE_LONG_DOUBLE
56caf160
EZ
2219Define this if the host C compiler supports @code{long double}. This is
2220set by the @code{configure} script.
c906108c
SS
2221
2222@item PRINTF_HAS_LONG_DOUBLE
2223Define this if the host can handle printing of long double float-point
56caf160
EZ
2224numbers via the printf format conversion specifier @code{Lg}. This is
2225set by the @code{configure} script.
c906108c
SS
2226
2227@item SCANF_HAS_LONG_DOUBLE
2228Define this if the host can handle the parsing of long double
56caf160
EZ
2229float-point numbers via the scanf format conversion specifier
2230@code{Lg}. This is set by the @code{configure} script.
c906108c
SS
2231
2232@item LSEEK_NOT_LINEAR
2233Define this if @code{lseek (n)} does not necessarily move to byte number
2234@code{n} in the file. This is only used when reading source files. It
2235is normally faster to define @code{CRLF_SOURCE_FILES} when possible.
2236
2237@item L_SET
56caf160
EZ
2238This macro is used as the argument to @code{lseek} (or, most commonly,
2239@code{bfd_seek}). FIXME, should be replaced by SEEK_SET instead,
2240which is the POSIX equivalent.
c906108c 2241
c906108c
SS
2242@item MALLOC_INCOMPATIBLE
2243Define this if the system's prototype for @code{malloc} differs from the
56caf160 2244@sc{ansi} definition.
c906108c
SS
2245
2246@item MMAP_BASE_ADDRESS
2247When using HAVE_MMAP, the first mapping should go at this address.
2248
2249@item MMAP_INCREMENT
2250when using HAVE_MMAP, this is the increment between mappings.
2251
c906108c
SS
2252@item NORETURN
2253If defined, this should be one or more tokens, such as @code{volatile},
2254that can be used in both the declaration and definition of functions to
2255indicate that they never return. The default is already set correctly
2256if compiling with GCC. This will almost never need to be defined.
2257
2258@item ATTR_NORETURN
2259If defined, this should be one or more tokens, such as
2260@code{__attribute__ ((noreturn))}, that can be used in the declarations
2261of functions to indicate that they never return. The default is already
2262set correctly if compiling with GCC. This will almost never need to be
2263defined.
2264
7a292a7a 2265@item USE_GENERIC_DUMMY_FRAMES
56caf160 2266@cindex generic dummy frames
7a292a7a
SS
2267Define this to 1 if the target is using the generic inferior function
2268call code. See @code{blockframe.c} for more information.
2269
c906108c 2270@item USE_MMALLOC
56caf160
EZ
2271@findex mmalloc
2272@value{GDBN} will use the @code{mmalloc} library for memory allocation
2273for symbol reading if this symbol is defined. Be careful defining it
2274since there are systems on which @code{mmalloc} does not work for some
2275reason. One example is the DECstation, where its RPC library can't
2276cope with our redefinition of @code{malloc} to call @code{mmalloc}.
2277When defining @code{USE_MMALLOC}, you will also have to set
2278@code{MMALLOC} in the Makefile, to point to the @code{mmalloc} library. This
2279define is set when you configure with @samp{--with-mmalloc}.
c906108c
SS
2280
2281@item NO_MMCHECK
56caf160 2282@findex mmcheck
c906108c
SS
2283Define this if you are using @code{mmalloc}, but don't want the overhead
2284of checking the heap with @code{mmcheck}. Note that on some systems,
56caf160 2285the C runtime makes calls to @code{malloc} prior to calling @code{main}, and if
c906108c
SS
2286@code{free} is ever called with these pointers after calling
2287@code{mmcheck} to enable checking, a memory corruption abort is certain
56caf160
EZ
2288to occur. These systems can still use @code{mmalloc}, but must define
2289@code{NO_MMCHECK}.
c906108c
SS
2290
2291@item MMCHECK_FORCE
2292Define this to 1 if the C runtime allocates memory prior to
2293@code{mmcheck} being called, but that memory is never freed so we don't
2294have to worry about it triggering a memory corruption abort. The
2295default is 0, which means that @code{mmcheck} will only install the heap
2296checking functions if there has not yet been any memory allocation
56caf160 2297calls, and if it fails to install the functions, @value{GDBN} will issue a
c906108c 2298warning. This is currently defined if you configure using
56caf160 2299@samp{--with-mmalloc}.
c906108c
SS
2300
2301@item NO_SIGINTERRUPT
56caf160
EZ
2302@findex siginterrupt
2303Define this to indicate that @code{siginterrupt} is not available.
c906108c
SS
2304
2305@item R_OK
56caf160 2306Define if this is not in a system header file (typically, @file{unistd.h}).
c906108c
SS
2307
2308@item SEEK_CUR
9742079a 2309@itemx SEEK_SET
56caf160 2310Define these to appropriate value for the system @code{lseek}, if not already
c906108c
SS
2311defined.
2312
2313@item STOP_SIGNAL
56caf160
EZ
2314This is the signal for stopping @value{GDBN}. Defaults to
2315@code{SIGTSTP}. (Only redefined for the Convex.)
c906108c
SS
2316
2317@item USE_O_NOCTTY
56caf160 2318Define this if the interior's tty should be opened with the @code{O_NOCTTY}
c906108c
SS
2319flag. (FIXME: This should be a native-only flag, but @file{inflow.c} is
2320always linked in.)
2321
2322@item USG
2323Means that System V (prior to SVR4) include files are in use. (FIXME:
2324This symbol is abused in @file{infrun.c}, @file{regex.c},
2325@file{remote-nindy.c}, and @file{utils.c} for other things, at the
2326moment.)
2327
2328@item lint
56caf160 2329Define this to help placate @code{lint} in some situations.
c906108c
SS
2330
2331@item volatile
2332Define this to override the defaults of @code{__volatile__} or
2333@code{/**/}.
56caf160 2334@end ftable
c906108c
SS
2335
2336
2337@node Target Architecture Definition
2338
2339@chapter Target Architecture Definition
2340
56caf160
EZ
2341@cindex target architecture definition
2342@value{GDBN}'s target architecture defines what sort of
2343machine-language programs @value{GDBN} can work with, and how it works
2344with them.
c906108c 2345
af6c57ea
AC
2346The target architecture object is implemented as the C structure
2347@code{struct gdbarch *}. The structure, and its methods, are generated
2348using the Bourn shell script @file{gdbarch.sh}.
c906108c
SS
2349
2350@section Registers and Memory
2351
56caf160
EZ
2352@value{GDBN}'s model of the target machine is rather simple.
2353@value{GDBN} assumes the machine includes a bank of registers and a
2354block of memory. Each register may have a different size.
c906108c 2355
56caf160
EZ
2356@value{GDBN} does not have a magical way to match up with the
2357compiler's idea of which registers are which; however, it is critical
2358that they do match up accurately. The only way to make this work is
2359to get accurate information about the order that the compiler uses,
2360and to reflect that in the @code{REGISTER_NAME} and related macros.
c906108c 2361
25822942 2362@value{GDBN} can handle big-endian, little-endian, and bi-endian architectures.
c906108c 2363
93e79dbd
JB
2364@section Pointers Are Not Always Addresses
2365@cindex pointer representation
2366@cindex address representation
2367@cindex word-addressed machines
2368@cindex separate data and code address spaces
2369@cindex spaces, separate data and code address
2370@cindex address spaces, separate data and code
2371@cindex code pointers, word-addressed
2372@cindex converting between pointers and addresses
2373@cindex D10V addresses
2374
2375On almost all 32-bit architectures, the representation of a pointer is
2376indistinguishable from the representation of some fixed-length number
2377whose value is the byte address of the object pointed to. On such
56caf160 2378machines, the words ``pointer'' and ``address'' can be used interchangeably.
93e79dbd
JB
2379However, architectures with smaller word sizes are often cramped for
2380address space, so they may choose a pointer representation that breaks this
2381identity, and allows a larger code address space.
2382
2383For example, the Mitsubishi D10V is a 16-bit VLIW processor whose
2384instructions are 32 bits long@footnote{Some D10V instructions are
2385actually pairs of 16-bit sub-instructions. However, since you can't
2386jump into the middle of such a pair, code addresses can only refer to
2387full 32 bit instructions, which is what matters in this explanation.}.
2388If the D10V used ordinary byte addresses to refer to code locations,
2389then the processor would only be able to address 64kb of instructions.
2390However, since instructions must be aligned on four-byte boundaries, the
56caf160
EZ
2391low two bits of any valid instruction's byte address are always
2392zero---byte addresses waste two bits. So instead of byte addresses,
2393the D10V uses word addresses---byte addresses shifted right two bits---to
93e79dbd
JB
2394refer to code. Thus, the D10V can use 16-bit words to address 256kb of
2395code space.
2396
2397However, this means that code pointers and data pointers have different
2398forms on the D10V. The 16-bit word @code{0xC020} refers to byte address
2399@code{0xC020} when used as a data address, but refers to byte address
2400@code{0x30080} when used as a code address.
2401
2402(The D10V also uses separate code and data address spaces, which also
2403affects the correspondence between pointers and addresses, but we're
2404going to ignore that here; this example is already too long.)
2405
56caf160
EZ
2406To cope with architectures like this---the D10V is not the only
2407one!---@value{GDBN} tries to distinguish between @dfn{addresses}, which are
93e79dbd
JB
2408byte numbers, and @dfn{pointers}, which are the target's representation
2409of an address of a particular type of data. In the example above,
2410@code{0xC020} is the pointer, which refers to one of the addresses
2411@code{0xC020} or @code{0x30080}, depending on the type imposed upon it.
2412@value{GDBN} provides functions for turning a pointer into an address
2413and vice versa, in the appropriate way for the current architecture.
2414
2415Unfortunately, since addresses and pointers are identical on almost all
2416processors, this distinction tends to bit-rot pretty quickly. Thus,
2417each time you port @value{GDBN} to an architecture which does
2418distinguish between pointers and addresses, you'll probably need to
2419clean up some architecture-independent code.
2420
2421Here are functions which convert between pointers and addresses:
2422
2423@deftypefun CORE_ADDR extract_typed_address (void *@var{buf}, struct type *@var{type})
2424Treat the bytes at @var{buf} as a pointer or reference of type
2425@var{type}, and return the address it represents, in a manner
2426appropriate for the current architecture. This yields an address
2427@value{GDBN} can use to read target memory, disassemble, etc. Note that
2428@var{buf} refers to a buffer in @value{GDBN}'s memory, not the
2429inferior's.
2430
2431For example, if the current architecture is the Intel x86, this function
2432extracts a little-endian integer of the appropriate length from
2433@var{buf} and returns it. However, if the current architecture is the
2434D10V, this function will return a 16-bit integer extracted from
2435@var{buf}, multiplied by four if @var{type} is a pointer to a function.
2436
2437If @var{type} is not a pointer or reference type, then this function
2438will signal an internal error.
2439@end deftypefun
2440
2441@deftypefun CORE_ADDR store_typed_address (void *@var{buf}, struct type *@var{type}, CORE_ADDR @var{addr})
2442Store the address @var{addr} in @var{buf}, in the proper format for a
2443pointer of type @var{type} in the current architecture. Note that
2444@var{buf} refers to a buffer in @value{GDBN}'s memory, not the
2445inferior's.
2446
2447For example, if the current architecture is the Intel x86, this function
2448stores @var{addr} unmodified as a little-endian integer of the
2449appropriate length in @var{buf}. However, if the current architecture
2450is the D10V, this function divides @var{addr} by four if @var{type} is
2451a pointer to a function, and then stores it in @var{buf}.
2452
2453If @var{type} is not a pointer or reference type, then this function
2454will signal an internal error.
2455@end deftypefun
2456
2457@deftypefun CORE_ADDR value_as_pointer (value_ptr @var{val})
2458Assuming that @var{val} is a pointer, return the address it represents,
2459as appropriate for the current architecture.
2460
2461This function actually works on integral values, as well as pointers.
2462For pointers, it performs architecture-specific conversions as
2463described above for @code{extract_typed_address}.
2464@end deftypefun
2465
2466@deftypefun CORE_ADDR value_from_pointer (struct type *@var{type}, CORE_ADDR @var{addr})
2467Create and return a value representing a pointer of type @var{type} to
2468the address @var{addr}, as appropriate for the current architecture.
2469This function performs architecture-specific conversions as described
2470above for @code{store_typed_address}.
2471@end deftypefun
2472
2473
2474@value{GDBN} also provides functions that do the same tasks, but assume
2475that pointers are simply byte addresses; they aren't sensitive to the
2476current architecture, beyond knowing the appropriate endianness.
2477
2478@deftypefun CORE_ADDR extract_address (void *@var{addr}, int len)
2479Extract a @var{len}-byte number from @var{addr} in the appropriate
2480endianness for the current architecture, and return it. Note that
2481@var{addr} refers to @value{GDBN}'s memory, not the inferior's.
2482
2483This function should only be used in architecture-specific code; it
2484doesn't have enough information to turn bits into a true address in the
2485appropriate way for the current architecture. If you can, use
2486@code{extract_typed_address} instead.
2487@end deftypefun
2488
2489@deftypefun void store_address (void *@var{addr}, int @var{len}, LONGEST @var{val})
2490Store @var{val} at @var{addr} as a @var{len}-byte integer, in the
2491appropriate endianness for the current architecture. Note that
2492@var{addr} refers to a buffer in @value{GDBN}'s memory, not the
2493inferior's.
2494
2495This function should only be used in architecture-specific code; it
2496doesn't have enough information to turn a true address into bits in the
2497appropriate way for the current architecture. If you can, use
2498@code{store_typed_address} instead.
2499@end deftypefun
2500
2501
2502Here are some macros which architectures can define to indicate the
2503relationship between pointers and addresses. These have default
2504definitions, appropriate for architectures on which all pointers are
2505simple byte addresses.
2506
2507@deftypefn {Target Macro} CORE_ADDR POINTER_TO_ADDRESS (struct type *@var{type}, char *@var{buf})
2508Assume that @var{buf} holds a pointer of type @var{type}, in the
2509appropriate format for the current architecture. Return the byte
2510address the pointer refers to.
2511
2512This function may safely assume that @var{type} is either a pointer or a
56caf160 2513C@t{++} reference type.
93e79dbd
JB
2514@end deftypefn
2515
2516@deftypefn {Target Macro} void ADDRESS_TO_POINTER (struct type *@var{type}, char *@var{buf}, CORE_ADDR @var{addr})
2517Store in @var{buf} a pointer of type @var{type} representing the address
2518@var{addr}, in the appropriate format for the current architecture.
2519
2520This function may safely assume that @var{type} is either a pointer or a
56caf160 2521C@t{++} reference type.
93e79dbd
JB
2522@end deftypefn
2523
2524
9fb4dd36
JB
2525@section Using Different Register and Memory Data Representations
2526@cindex raw representation
2527@cindex virtual representation
2528@cindex representations, raw and virtual
2529@cindex register data formats, converting
2530@cindex @code{struct value}, converting register contents to
2531
af6c57ea
AC
2532@emph{Maintainer's note: The way GDB manipulates registers is undergoing
2533significant change. Many of the macros and functions refered to in the
2534sections below are likely to be made obsolete. See the file @file{TODO}
2535for more up-to-date information.}
2536
9fb4dd36
JB
2537Some architectures use one representation for a value when it lives in a
2538register, but use a different representation when it lives in memory.
25822942 2539In @value{GDBN}'s terminology, the @dfn{raw} representation is the one used in
9fb4dd36 2540the target registers, and the @dfn{virtual} representation is the one
25822942 2541used in memory, and within @value{GDBN} @code{struct value} objects.
9fb4dd36
JB
2542
2543For almost all data types on almost all architectures, the virtual and
2544raw representations are identical, and no special handling is needed.
2545However, they do occasionally differ. For example:
2546
2547@itemize @bullet
9fb4dd36 2548@item
56caf160 2549The x86 architecture supports an 80-bit @code{long double} type. However, when
9fb4dd36
JB
2550we store those values in memory, they occupy twelve bytes: the
2551floating-point number occupies the first ten, and the final two bytes
2552are unused. This keeps the values aligned on four-byte boundaries,
2553allowing more efficient access. Thus, the x86 80-bit floating-point
2554type is the raw representation, and the twelve-byte loosely-packed
2555arrangement is the virtual representation.
2556
2557@item
25822942
DB
2558Some 64-bit MIPS targets present 32-bit registers to @value{GDBN} as 64-bit
2559registers, with garbage in their upper bits. @value{GDBN} ignores the top 32
9fb4dd36
JB
2560bits. Thus, the 64-bit form, with garbage in the upper 32 bits, is the
2561raw representation, and the trimmed 32-bit representation is the
2562virtual representation.
9fb4dd36
JB
2563@end itemize
2564
2565In general, the raw representation is determined by the architecture, or
25822942
DB
2566@value{GDBN}'s interface to the architecture, while the virtual representation
2567can be chosen for @value{GDBN}'s convenience. @value{GDBN}'s register file,
56caf160
EZ
2568@code{registers}, holds the register contents in raw format, and the
2569@value{GDBN} remote protocol transmits register values in raw format.
9fb4dd36 2570
56caf160
EZ
2571Your architecture may define the following macros to request
2572conversions between the raw and virtual format:
9fb4dd36
JB
2573
2574@deftypefn {Target Macro} int REGISTER_CONVERTIBLE (int @var{reg})
2575Return non-zero if register number @var{reg}'s value needs different raw
2576and virtual formats.
6f6ef15a
EZ
2577
2578You should not use @code{REGISTER_CONVERT_TO_VIRTUAL} for a register
2579unless this macro returns a non-zero value for that register.
9fb4dd36
JB
2580@end deftypefn
2581
2582@deftypefn {Target Macro} int REGISTER_RAW_SIZE (int @var{reg})
2583The size of register number @var{reg}'s raw value. This is the number
25822942 2584of bytes the register will occupy in @code{registers}, or in a @value{GDBN}
9fb4dd36
JB
2585remote protocol packet.
2586@end deftypefn
2587
2588@deftypefn {Target Macro} int REGISTER_VIRTUAL_SIZE (int @var{reg})
2589The size of register number @var{reg}'s value, in its virtual format.
2590This is the size a @code{struct value}'s buffer will have, holding that
2591register's value.
2592@end deftypefn
2593
2594@deftypefn {Target Macro} struct type *REGISTER_VIRTUAL_TYPE (int @var{reg})
2595This is the type of the virtual representation of register number
2596@var{reg}. Note that there is no need for a macro giving a type for the
25822942 2597register's raw form; once the register's value has been obtained, @value{GDBN}
9fb4dd36
JB
2598always uses the virtual form.
2599@end deftypefn
2600
2601@deftypefn {Target Macro} void REGISTER_CONVERT_TO_VIRTUAL (int @var{reg}, struct type *@var{type}, char *@var{from}, char *@var{to})
2602Convert the value of register number @var{reg} to @var{type}, which
2603should always be @code{REGISTER_VIRTUAL_TYPE (@var{reg})}. The buffer
2604at @var{from} holds the register's value in raw format; the macro should
2605convert the value to virtual format, and place it at @var{to}.
2606
6f6ef15a
EZ
2607Note that @code{REGISTER_CONVERT_TO_VIRTUAL} and
2608@code{REGISTER_CONVERT_TO_RAW} take their @var{reg} and @var{type}
2609arguments in different orders.
2610
2611You should only use @code{REGISTER_CONVERT_TO_VIRTUAL} with registers
2612for which the @code{REGISTER_CONVERTIBLE} macro returns a non-zero
2613value.
9fb4dd36
JB
2614@end deftypefn
2615
2616@deftypefn {Target Macro} void REGISTER_CONVERT_TO_RAW (struct type *@var{type}, int @var{reg}, char *@var{from}, char *@var{to})
2617Convert the value of register number @var{reg} to @var{type}, which
2618should always be @code{REGISTER_VIRTUAL_TYPE (@var{reg})}. The buffer
2619at @var{from} holds the register's value in raw format; the macro should
2620convert the value to virtual format, and place it at @var{to}.
2621
2622Note that REGISTER_CONVERT_TO_VIRTUAL and REGISTER_CONVERT_TO_RAW take
2623their @var{reg} and @var{type} arguments in different orders.
2624@end deftypefn
2625
2626
c906108c
SS
2627@section Frame Interpretation
2628
2629@section Inferior Call Setup
2630
2631@section Compiler Characteristics
2632
2633@section Target Conditionals
2634
2635This section describes the macros that you can use to define the target
2636machine.
2637
2638@table @code
2639
2640@item ADDITIONAL_OPTIONS
56caf160
EZ
2641@itemx ADDITIONAL_OPTION_CASES
2642@itemx ADDITIONAL_OPTION_HANDLER
2643@itemx ADDITIONAL_OPTION_HELP
2644@findex ADDITIONAL_OPTION_HELP
2645@findex ADDITIONAL_OPTION_HANDLER
2646@findex ADDITIONAL_OPTION_CASES
2647@findex ADDITIONAL_OPTIONS
c906108c 2648These are a set of macros that allow the addition of additional command
25822942 2649line options to @value{GDBN}. They are currently used only for the unsupported
c906108c
SS
2650i960 Nindy target, and should not be used in any other configuration.
2651
2652@item ADDR_BITS_REMOVE (addr)
56caf160 2653@findex ADDR_BITS_REMOVE
adf40b2e
JM
2654If a raw machine instruction address includes any bits that are not
2655really part of the address, then define this macro to expand into an
56caf160 2656expression that zeroes those bits in @var{addr}. This is only used for
adf40b2e
JM
2657addresses of instructions, and even then not in all contexts.
2658
2659For example, the two low-order bits of the PC on the Hewlett-Packard PA
26602.0 architecture contain the privilege level of the corresponding
2661instruction. Since instructions must always be aligned on four-byte
2662boundaries, the processor masks out these bits to generate the actual
2663address of the instruction. ADDR_BITS_REMOVE should filter out these
2664bits with an expression such as @code{((addr) & ~3)}.
c906108c 2665
93e79dbd 2666@item ADDRESS_TO_POINTER (@var{type}, @var{buf}, @var{addr})
56caf160 2667@findex ADDRESS_TO_POINTER
93e79dbd
JB
2668Store in @var{buf} a pointer of type @var{type} representing the address
2669@var{addr}, in the appropriate format for the current architecture.
2670This macro may safely assume that @var{type} is either a pointer or a
56caf160 2671C@t{++} reference type.
93e79dbd
JB
2672@xref{Target Architecture Definition, , Pointers Are Not Always Addresses}.
2673
c906108c 2674@item BEFORE_MAIN_LOOP_HOOK
56caf160 2675@findex BEFORE_MAIN_LOOP_HOOK
c906108c
SS
2676Define this to expand into any code that you want to execute before the
2677main loop starts. Although this is not, strictly speaking, a target
2678conditional, that is how it is currently being used. Note that if a
2679configuration were to define it one way for a host and a different way
56caf160
EZ
2680for the target, @value{GDBN} will probably not compile, let alone run
2681correctly. This macro is currently used only for the unsupported i960 Nindy
2682target, and should not be used in any other configuration.
c906108c
SS
2683
2684@item BELIEVE_PCC_PROMOTION
56caf160
EZ
2685@findex BELIEVE_PCC_PROMOTION
2686Define if the compiler promotes a @code{short} or @code{char}
2687parameter to an @code{int}, but still reports the parameter as its
2688original type, rather than the promoted type.
c906108c
SS
2689
2690@item BELIEVE_PCC_PROMOTION_TYPE
56caf160
EZ
2691@findex BELIEVE_PCC_PROMOTION_TYPE
2692Define this if @value{GDBN} should believe the type of a @code{short}
2693argument when compiled by @code{pcc}, but look within a full int space to get
2694its value. Only defined for Sun-3 at present.
c906108c
SS
2695
2696@item BITS_BIG_ENDIAN
56caf160
EZ
2697@findex BITS_BIG_ENDIAN
2698Define this if the numbering of bits in the targets does @strong{not} match the
c906108c 2699endianness of the target byte order. A value of 1 means that the bits
56caf160 2700are numbered in a big-endian bit order, 0 means little-endian.
c906108c
SS
2701
2702@item BREAKPOINT
56caf160 2703@findex BREAKPOINT
c906108c
SS
2704This is the character array initializer for the bit pattern to put into
2705memory where a breakpoint is set. Although it's common to use a trap
2706instruction for a breakpoint, it's not required; for instance, the bit
2707pattern could be an invalid instruction. The breakpoint must be no
2708longer than the shortest instruction of the architecture.
2709
56caf160
EZ
2710@code{BREAKPOINT} has been deprecated in favor of
2711@code{BREAKPOINT_FROM_PC}.
7a292a7a 2712
c906108c 2713@item BIG_BREAKPOINT
56caf160
EZ
2714@itemx LITTLE_BREAKPOINT
2715@findex LITTLE_BREAKPOINT
2716@findex BIG_BREAKPOINT
c906108c
SS
2717Similar to BREAKPOINT, but used for bi-endian targets.
2718
56caf160
EZ
2719@code{BIG_BREAKPOINT} and @code{LITTLE_BREAKPOINT} have been deprecated in
2720favor of @code{BREAKPOINT_FROM_PC}.
7a292a7a 2721
c906108c 2722@item REMOTE_BREAKPOINT
56caf160
EZ
2723@itemx LITTLE_REMOTE_BREAKPOINT
2724@itemx BIG_REMOTE_BREAKPOINT
2725@findex BIG_REMOTE_BREAKPOINT
2726@findex LITTLE_REMOTE_BREAKPOINT
2727@findex REMOTE_BREAKPOINT
c906108c
SS
2728Similar to BREAKPOINT, but used for remote targets.
2729
56caf160
EZ
2730@code{BIG_REMOTE_BREAKPOINT} and @code{LITTLE_REMOTE_BREAKPOINT} have been
2731deprecated in favor of @code{BREAKPOINT_FROM_PC}.
c906108c 2732
56caf160
EZ
2733@item BREAKPOINT_FROM_PC (@var{pcptr}, @var{lenptr})
2734@findex BREAKPOINT_FROM_PC
c906108c 2735Use the program counter to determine the contents and size of a
56caf160
EZ
2736breakpoint instruction. It returns a pointer to a string of bytes
2737that encode a breakpoint instruction, stores the length of the string
2738to *@var{lenptr}, and adjusts pc (if necessary) to point to the actual
2739memory location where the breakpoint should be inserted.
c906108c
SS
2740
2741Although it is common to use a trap instruction for a breakpoint, it's
2742not required; for instance, the bit pattern could be an invalid
2743instruction. The breakpoint must be no longer than the shortest
2744instruction of the architecture.
2745
7a292a7a
SS
2746Replaces all the other @var{BREAKPOINT} macros.
2747
56caf160
EZ
2748@item MEMORY_INSERT_BREAKPOINT (@var{addr}, @var{contents_cache})
2749@itemx MEMORY_REMOVE_BREAKPOINT (@var{addr}, @var{contents_cache})
2750@findex MEMORY_REMOVE_BREAKPOINT
2751@findex MEMORY_INSERT_BREAKPOINT
917317f4
JM
2752Insert or remove memory based breakpoints. Reasonable defaults
2753(@code{default_memory_insert_breakpoint} and
2754@code{default_memory_remove_breakpoint} respectively) have been
2755provided so that it is not necessary to define these for most
2756architectures. Architectures which may want to define
56caf160 2757@code{MEMORY_INSERT_BREAKPOINT} and @code{MEMORY_REMOVE_BREAKPOINT} will
917317f4
JM
2758likely have instructions that are oddly sized or are not stored in a
2759conventional manner.
2760
2761It may also be desirable (from an efficiency standpoint) to define
2762custom breakpoint insertion and removal routines if
56caf160 2763@code{BREAKPOINT_FROM_PC} needs to read the target's memory for some
917317f4
JM
2764reason.
2765
7a292a7a 2766@item CALL_DUMMY_P
56caf160 2767@findex CALL_DUMMY_P
7a292a7a
SS
2768A C expresson that is non-zero when the target suports inferior function
2769calls.
2770
2771@item CALL_DUMMY_WORDS
56caf160
EZ
2772@findex CALL_DUMMY_WORDS
2773Pointer to an array of @code{LONGEST} words of data containing
2774host-byte-ordered @code{REGISTER_BYTES} sized values that partially
7a292a7a
SS
2775specify the sequence of instructions needed for an inferior function
2776call.
2777
56caf160 2778Should be deprecated in favor of a macro that uses target-byte-ordered
7a292a7a
SS
2779data.
2780
2781@item SIZEOF_CALL_DUMMY_WORDS
56caf160
EZ
2782@findex SIZEOF_CALL_DUMMY_WORDS
2783The size of @code{CALL_DUMMY_WORDS}. When @code{CALL_DUMMY_P} this must
2784return a positive value. See also @code{CALL_DUMMY_LENGTH}.
c906108c
SS
2785
2786@item CALL_DUMMY
56caf160
EZ
2787@findex CALL_DUMMY
2788A static initializer for @code{CALL_DUMMY_WORDS}. Deprecated.
7a292a7a 2789
c906108c 2790@item CALL_DUMMY_LOCATION
56caf160
EZ
2791@findex CALL_DUMMY_LOCATION
2792See the file @file{inferior.h}.
7a292a7a 2793
c906108c 2794@item CALL_DUMMY_STACK_ADJUST
56caf160 2795@findex CALL_DUMMY_STACK_ADJUST
7a292a7a
SS
2796Stack adjustment needed when performing an inferior function call.
2797
56caf160 2798Should be deprecated in favor of something like @code{STACK_ALIGN}.
7a292a7a
SS
2799
2800@item CALL_DUMMY_STACK_ADJUST_P
56caf160
EZ
2801@findex CALL_DUMMY_STACK_ADJUST_P
2802Predicate for use of @code{CALL_DUMMY_STACK_ADJUST}.
7a292a7a 2803
56caf160 2804Should be deprecated in favor of something like @code{STACK_ALIGN}.
c906108c 2805
56caf160
EZ
2806@item CANNOT_FETCH_REGISTER (@var{regno})
2807@findex CANNOT_FETCH_REGISTER
c906108c
SS
2808A C expression that should be nonzero if @var{regno} cannot be fetched
2809from an inferior process. This is only relevant if
2810@code{FETCH_INFERIOR_REGISTERS} is not defined.
2811
56caf160
EZ
2812@item CANNOT_STORE_REGISTER (@var{regno})
2813@findex CANNOT_STORE_REGISTER
c906108c
SS
2814A C expression that should be nonzero if @var{regno} should not be
2815written to the target. This is often the case for program counters,
56caf160
EZ
2816status words, and other special registers. If this is not defined,
2817@value{GDBN} will assume that all registers may be written.
c906108c
SS
2818
2819@item DO_DEFERRED_STORES
a5d7c491 2820@itemx CLEAR_DEFERRED_STORES
56caf160
EZ
2821@findex CLEAR_DEFERRED_STORES
2822@findex DO_DEFERRED_STORES
c906108c
SS
2823Define this to execute any deferred stores of registers into the inferior,
2824and to cancel any deferred stores.
2825
2826Currently only implemented correctly for native Sparc configurations?
2827
ef36d45e 2828@item COERCE_FLOAT_TO_DOUBLE (@var{formal}, @var{actual})
56caf160
EZ
2829@findex COERCE_FLOAT_TO_DOUBLE
2830@cindex promotion to @code{double}
ef36d45e
JB
2831If we are calling a function by hand, and the function was declared
2832(according to the debug info) without a prototype, should we
56caf160
EZ
2833automatically promote @code{float}s to @code{double}s? This macro
2834must evaluate to non-zero if we should, or zero if we should leave the
2835value alone.
ef36d45e
JB
2836
2837The argument @var{actual} is the type of the value we want to pass to
2838the function. The argument @var{formal} is the type of this argument,
2839as it appears in the function's definition. Note that @var{formal} may
2840be zero if we have no debugging information for the function, or if
2841we're passing more arguments than are officially declared (for example,
2842varargs). This macro is never invoked if the function definitely has a
2843prototype.
2844
56caf160
EZ
2845@findex set_gdbarch_coerce_float_to_double
2846@findex standard_coerce_float_to_double
ef36d45e
JB
2847The default behavior is to promote only when we have no type information
2848for the formal parameter. This is different from the obvious behavior,
2849which would be to promote whenever we have no prototype, just as the
2850compiler does. It's annoying, but some older targets rely on this. If
56caf160
EZ
2851you want @value{GDBN} to follow the typical compiler behavior---to always
2852promote when there is no prototype in scope---your gdbarch @code{init}
ef36d45e
JB
2853function can call @code{set_gdbarch_coerce_float_to_double} and select
2854the @code{standard_coerce_float_to_double} function.
2855
c906108c 2856@item CPLUS_MARKER
56caf160
EZ
2857@findex CPLUS_MARKERz
2858Define this to expand into the character that G@t{++} uses to distinguish
c906108c
SS
2859compiler-generated identifiers from programmer-specified identifiers.
2860By default, this expands into @code{'$'}. Most System V targets should
2861define this to @code{'.'}.
2862
2863@item DBX_PARM_SYMBOL_CLASS
56caf160 2864@findex DBX_PARM_SYMBOL_CLASS
c906108c
SS
2865Hook for the @code{SYMBOL_CLASS} of a parameter when decoding DBX symbol
2866information. In the i960, parameters can be stored as locals or as
2867args, depending on the type of the debug record.
2868
2869@item DECR_PC_AFTER_BREAK
56caf160 2870@findex DECR_PC_AFTER_BREAK
c906108c
SS
2871Define this to be the amount by which to decrement the PC after the
2872program encounters a breakpoint. This is often the number of bytes in
56caf160 2873@code{BREAKPOINT}, though not always. For most targets this value will be 0.
c906108c
SS
2874
2875@item DECR_PC_AFTER_HW_BREAK
56caf160 2876@findex DECR_PC_AFTER_HW_BREAK
c906108c
SS
2877Similarly, for hardware breakpoints.
2878
56caf160
EZ
2879@item DISABLE_UNSETTABLE_BREAK (@var{addr})
2880@findex DISABLE_UNSETTABLE_BREAK
c906108c
SS
2881If defined, this should evaluate to 1 if @var{addr} is in a shared
2882library in which breakpoints cannot be set and so should be disabled.
2883
2884@item DO_REGISTERS_INFO
56caf160 2885@findex DO_REGISTERS_INFO
c906108c
SS
2886If defined, use this to print the value of a register or all registers.
2887
0dcedd82 2888@item DWARF_REG_TO_REGNUM
56caf160 2889@findex DWARF_REG_TO_REGNUM
0dcedd82
AC
2890Convert DWARF register number into @value{GDBN} regnum. If not defined,
2891no conversion will be performed.
2892
2893@item DWARF2_REG_TO_REGNUM
56caf160 2894@findex DWARF2_REG_TO_REGNUM
0dcedd82
AC
2895Convert DWARF2 register number into @value{GDBN} regnum. If not
2896defined, no conversion will be performed.
2897
2898@item ECOFF_REG_TO_REGNUM
56caf160 2899@findex ECOFF_REG_TO_REGNUM
0dcedd82
AC
2900Convert ECOFF register number into @value{GDBN} regnum. If not defined,
2901no conversion will be performed.
2902
c906108c 2903@item END_OF_TEXT_DEFAULT
56caf160
EZ
2904@findex END_OF_TEXT_DEFAULT
2905This is an expression that should designate the end of the text section.
2906@c (? FIXME ?)
c906108c 2907
56caf160
EZ
2908@item EXTRACT_RETURN_VALUE(@var{type}, @var{regbuf}, @var{valbuf})
2909@findex EXTRACT_RETURN_VALUE
c906108c
SS
2910Define this to extract a function's return value of type @var{type} from
2911the raw register state @var{regbuf} and copy that, in virtual format,
2912into @var{valbuf}.
2913
56caf160
EZ
2914@item EXTRACT_STRUCT_VALUE_ADDRESS(@var{regbuf})
2915@findex EXTRACT_STRUCT_VALUE_ADDRESS
83aa8bc6
AC
2916When defined, extract from the array @var{regbuf} (containing the raw
2917register state) the @code{CORE_ADDR} at which a function should return
2918its structure value.
ac9a91a7 2919
83aa8bc6
AC
2920If not defined, @code{EXTRACT_RETURN_VALUE} is used.
2921
2922@item EXTRACT_STRUCT_VALUE_ADDRESS_P()
56caf160
EZ
2923@findex EXTRACT_STRUCT_VALUE_ADDRESS_P
2924Predicate for @code{EXTRACT_STRUCT_VALUE_ADDRESS}.
c906108c
SS
2925
2926@item FLOAT_INFO
56caf160
EZ
2927@findex FLOAT_INFO
2928If defined, then the @samp{info float} command will print information about
c906108c
SS
2929the processor's floating point unit.
2930
2931@item FP_REGNUM
56caf160 2932@findex FP_REGNUM
cce74817
JM
2933If the virtual frame pointer is kept in a register, then define this
2934macro to be the number (greater than or equal to zero) of that register.
2935
2936This should only need to be defined if @code{TARGET_READ_FP} and
2937@code{TARGET_WRITE_FP} are not defined.
c906108c 2938
56caf160
EZ
2939@item FRAMELESS_FUNCTION_INVOCATION(@var{fi})
2940@findex FRAMELESS_FUNCTION_INVOCATION
392a587b
JM
2941Define this to an expression that returns 1 if the function invocation
2942represented by @var{fi} does not have a stack frame associated with it.
2943Otherwise return 0.
c906108c 2944
a5d7c491 2945@item FRAME_ARGS_ADDRESS_CORRECT
56caf160
EZ
2946@findex FRAME_ARGS_ADDRESS_CORRECT
2947See @file{stack.c}.
c906108c 2948
56caf160
EZ
2949@item FRAME_CHAIN(@var{frame})
2950@findex FRAME_CHAIN
c906108c
SS
2951Given @var{frame}, return a pointer to the calling frame.
2952
56caf160
EZ
2953@item FRAME_CHAIN_COMBINE(@var{chain}, @var{frame})
2954@findex FRAME_CHAIN_COMBINE
c906108c
SS
2955Define this to take the frame chain pointer and the frame's nominal
2956address and produce the nominal address of the caller's frame.
2957Presently only defined for HP PA.
2958
56caf160
EZ
2959@item FRAME_CHAIN_VALID(@var{chain}, @var{thisframe})
2960@findex FRAME_CHAIN_VALID
c906108c 2961Define this to be an expression that returns zero if the given frame is
c4093a6a 2962an outermost frame, with no caller, and nonzero otherwise. Several
56caf160 2963common definitions are available:
c4093a6a 2964
56caf160
EZ
2965@itemize @bullet
2966@item
c4093a6a
JM
2967@code{file_frame_chain_valid} is nonzero if the chain pointer is nonzero
2968and given frame's PC is not inside the startup file (such as
56caf160
EZ
2969@file{crt0.o}).
2970
2971@item
2972@code{func_frame_chain_valid} is nonzero if the chain
2973pointer is nonzero and the given frame's PC is not in @code{main} or a
2974known entry point function (such as @code{_start}).
2975
2976@item
c4093a6a
JM
2977@code{generic_file_frame_chain_valid} and
2978@code{generic_func_frame_chain_valid} are equivalent implementations for
2979targets using generic dummy frames.
56caf160 2980@end itemize
c906108c 2981
56caf160
EZ
2982@item FRAME_INIT_SAVED_REGS(@var{frame})
2983@findex FRAME_INIT_SAVED_REGS
c906108c
SS
2984See @file{frame.h}. Determines the address of all registers in the
2985current stack frame storing each in @code{frame->saved_regs}. Space for
2986@code{frame->saved_regs} shall be allocated by
2987@code{FRAME_INIT_SAVED_REGS} using either
2988@code{frame_saved_regs_zalloc} or @code{frame_obstack_alloc}.
2989
56caf160 2990@code{FRAME_FIND_SAVED_REGS} and @code{EXTRA_FRAME_INFO} are deprecated.
c906108c 2991
56caf160
EZ
2992@item FRAME_NUM_ARGS (@var{fi})
2993@findex FRAME_NUM_ARGS
392a587b
JM
2994For the frame described by @var{fi} return the number of arguments that
2995are being passed. If the number of arguments is not known, return
2996@code{-1}.
c906108c 2997
56caf160
EZ
2998@item FRAME_SAVED_PC(@var{frame})
2999@findex FRAME_SAVED_PC
3000Given @var{frame}, return the pc saved there. This is the return
c906108c
SS
3001address.
3002
3003@item FUNCTION_EPILOGUE_SIZE
56caf160 3004@findex FUNCTION_EPILOGUE_SIZE
c906108c
SS
3005For some COFF targets, the @code{x_sym.x_misc.x_fsize} field of the
3006function end symbol is 0. For such targets, you must define
3007@code{FUNCTION_EPILOGUE_SIZE} to expand into the standard size of a
3008function's epilogue.
3009
f7cb2b90 3010@item FUNCTION_START_OFFSET
56caf160 3011@findex FUNCTION_START_OFFSET
f7cb2b90
JB
3012An integer, giving the offset in bytes from a function's address (as
3013used in the values of symbols, function pointers, etc.), and the
3014function's first genuine instruction.
3015
3016This is zero on almost all machines: the function's address is usually
3017the address of its first instruction. However, on the VAX, for example,
3018each function starts with two bytes containing a bitmask indicating
3019which registers to save upon entry to the function. The VAX @code{call}
3020instructions check this value, and save the appropriate registers
3021automatically. Thus, since the offset from the function's address to
3022its first instruction is two bytes, @code{FUNCTION_START_OFFSET} would
3023be 2 on the VAX.
3024
c906108c 3025@item GCC_COMPILED_FLAG_SYMBOL
56caf160
EZ
3026@itemx GCC2_COMPILED_FLAG_SYMBOL
3027@findex GCC2_COMPILED_FLAG_SYMBOL
3028@findex GCC_COMPILED_FLAG_SYMBOL
3029If defined, these are the names of the symbols that @value{GDBN} will
3030look for to detect that GCC compiled the file. The default symbols
3031are @code{gcc_compiled.} and @code{gcc2_compiled.},
3032respectively. (Currently only defined for the Delta 68.)
c906108c 3033
25822942 3034@item @value{GDBN}_MULTI_ARCH
56caf160 3035@findex @value{GDBN}_MULTI_ARCH
0f71a2f6 3036If defined and non-zero, enables suport for multiple architectures
25822942 3037within @value{GDBN}.
0f71a2f6 3038
56caf160 3039This support can be enabled at two levels. At level one, only
0f71a2f6
JM
3040definitions for previously undefined macros are provided; at level two,
3041a multi-arch definition of all architecture dependant macros will be
3042defined.
3043
25822942 3044@item @value{GDBN}_TARGET_IS_HPPA
56caf160
EZ
3045@findex @value{GDBN}_TARGET_IS_HPPA
3046This determines whether horrible kludge code in @file{dbxread.c} and
3047@file{partial-stab.h} is used to mangle multiple-symbol-table files from
3048HPPA's. This should all be ripped out, and a scheme like @file{elfread.c}
3049used instead.
c906108c 3050
c906108c 3051@item GET_LONGJMP_TARGET
56caf160 3052@findex GET_LONGJMP_TARGET
c906108c
SS
3053For most machines, this is a target-dependent parameter. On the
3054DECstation and the Iris, this is a native-dependent parameter, since
56caf160 3055trhe header file @file{setjmp.h} is needed to define it.
c906108c 3056
56caf160
EZ
3057This macro determines the target PC address that @code{longjmp} will jump to,
3058assuming that we have just stopped at a @code{longjmp} breakpoint. It takes a
3059@code{CORE_ADDR *} as argument, and stores the target PC value through this
c906108c
SS
3060pointer. It examines the current state of the machine as needed.
3061
3062@item GET_SAVED_REGISTER
56caf160
EZ
3063@findex GET_SAVED_REGISTER
3064@findex get_saved_register
c906108c 3065Define this if you need to supply your own definition for the function
7a292a7a 3066@code{get_saved_register}.
c906108c
SS
3067
3068@item HAVE_REGISTER_WINDOWS
56caf160 3069@findex HAVE_REGISTER_WINDOWS
c906108c 3070Define this if the target has register windows.
56caf160
EZ
3071
3072@item REGISTER_IN_WINDOW_P (@var{regnum})
3073@findex REGISTER_IN_WINDOW_P
c906108c
SS
3074Define this to be an expression that is 1 if the given register is in
3075the window.
3076
3077@item IBM6000_TARGET
56caf160 3078@findex IBM6000_TARGET
c906108c
SS
3079Shows that we are configured for an IBM RS/6000 target. This
3080conditional should be eliminated (FIXME) and replaced by
56caf160 3081feature-specific macros. It was introduced in a haste and we are
c906108c
SS
3082repenting at leisure.
3083
9742079a
EZ
3084@item I386_USE_GENERIC_WATCHPOINTS
3085An x86-based target can define this to use the generic x86 watchpoint
3086support; see @ref{Algorithms, I386_USE_GENERIC_WATCHPOINTS}.
3087
2df3850c 3088@item SYMBOLS_CAN_START_WITH_DOLLAR
56caf160 3089@findex SYMBOLS_CAN_START_WITH_DOLLAR
2df3850c 3090Some systems have routines whose names start with @samp{$}. Giving this
25822942 3091macro a non-zero value tells @value{GDBN}'s expression parser to check for such
2df3850c
JM
3092routines when parsing tokens that begin with @samp{$}.
3093
3094On HP-UX, certain system routines (millicode) have names beginning with
3095@samp{$} or @samp{$$}. For example, @code{$$dyncall} is a millicode
3096routine that handles inter-space procedure calls on PA-RISC.
3097
c906108c 3098@item IEEE_FLOAT
56caf160 3099@findex IEEE_FLOAT
c906108c
SS
3100Define this if the target system uses IEEE-format floating point numbers.
3101
56caf160
EZ
3102@item INIT_EXTRA_FRAME_INFO (@var{fromleaf}, @var{frame})
3103@findex INIT_EXTRA_FRAME_INFO
c906108c
SS
3104If additional information about the frame is required this should be
3105stored in @code{frame->extra_info}. Space for @code{frame->extra_info}
3106is allocated using @code{frame_obstack_alloc}.
3107
56caf160
EZ
3108@item INIT_FRAME_PC (@var{fromleaf}, @var{prev})
3109@findex INIT_FRAME_PC
c906108c
SS
3110This is a C statement that sets the pc of the frame pointed to by
3111@var{prev}. [By default...]
3112
56caf160
EZ
3113@item INNER_THAN (@var{lhs}, @var{rhs})
3114@findex INNER_THAN
c906108c
SS
3115Returns non-zero if stack address @var{lhs} is inner than (nearer to the
3116stack top) stack address @var{rhs}. Define this as @code{lhs < rhs} if
3117the target's stack grows downward in memory, or @code{lhs > rsh} if the
3118stack grows upward.
3119
56caf160
EZ
3120@item IN_SIGTRAMP (@var{pc}, @var{name})
3121@findex IN_SIGTRAMP
3122Define this to return non-zero if the given @var{pc} and/or @var{name}
3123indicates that the current function is a @code{sigtramp}.
c906108c 3124
56caf160
EZ
3125@item SIGTRAMP_START (@var{pc})
3126@findex SIGTRAMP_START
3127@itemx SIGTRAMP_END (@var{pc})
3128@findex SIGTRAMP_END
3129Define these to be the start and end address of the @code{sigtramp} for the
c906108c
SS
3130given @var{pc}. On machines where the address is just a compile time
3131constant, the macro expansion will typically just ignore the supplied
3132@var{pc}.
3133
56caf160
EZ
3134@item IN_SOLIB_CALL_TRAMPOLINE (@var{pc}, @var{name})
3135@findex IN_SOLIB_CALL_TRAMPOLINE
c906108c
SS
3136Define this to evaluate to nonzero if the program is stopped in the
3137trampoline that connects to a shared library.
3138
56caf160
EZ
3139@item IN_SOLIB_RETURN_TRAMPOLINE (@var{pc}, @var{name})
3140@findex IN_SOLIB_RETURN_TRAMPOLINE
c906108c
SS
3141Define this to evaluate to nonzero if the program is stopped in the
3142trampoline that returns from a shared library.
3143
56caf160
EZ
3144@item IN_SOLIB_DYNSYM_RESOLVE_CODE (@var{pc})
3145@findex IN_SOLIB_DYNSYM_RESOLVE_CODE
d4f3574e
SS
3146Define this to evaluate to nonzero if the program is stopped in the
3147dynamic linker.
3148
56caf160
EZ
3149@item SKIP_SOLIB_RESOLVER (@var{pc})
3150@findex SKIP_SOLIB_RESOLVER
d4f3574e
SS
3151Define this to evaluate to the (nonzero) address at which execution
3152should continue to get past the dynamic linker's symbol resolution
3153function. A zero value indicates that it is not important or necessary
3154to set a breakpoint to get through the dynamic linker and that single
3155stepping will suffice.
3156
56caf160
EZ
3157@item IS_TRAPPED_INTERNALVAR (@var{name})
3158@findex IS_TRAPPED_INTERNALVAR
c906108c
SS
3159This is an ugly hook to allow the specification of special actions that
3160should occur as a side-effect of setting the value of a variable
25822942 3161internal to @value{GDBN}. Currently only used by the h8500. Note that this
c906108c
SS
3162could be either a host or target conditional.
3163
3164@item NEED_TEXT_START_END
56caf160 3165@findex NEED_TEXT_START_END
25822942 3166Define this if @value{GDBN} should determine the start and end addresses of the
c906108c
SS
3167text section. (Seems dubious.)
3168
3169@item NO_HIF_SUPPORT
56caf160 3170@findex NO_HIF_SUPPORT
c906108c
SS
3171(Specific to the a29k.)
3172
93e79dbd 3173@item POINTER_TO_ADDRESS (@var{type}, @var{buf})
56caf160 3174@findex POINTER_TO_ADDRESS
93e79dbd
JB
3175Assume that @var{buf} holds a pointer of type @var{type}, in the
3176appropriate format for the current architecture. Return the byte
3177address the pointer refers to.
3178@xref{Target Architecture Definition, , Pointers Are Not Always Addresses}.
3179
9fb4dd36 3180@item REGISTER_CONVERTIBLE (@var{reg})
56caf160 3181@findex REGISTER_CONVERTIBLE
9fb4dd36 3182Return non-zero if @var{reg} uses different raw and virtual formats.
4281a42e 3183@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
3184
3185@item REGISTER_RAW_SIZE (@var{reg})
56caf160 3186@findex REGISTER_RAW_SIZE
9fb4dd36 3187Return the raw size of @var{reg}.
4281a42e 3188@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
3189
3190@item REGISTER_VIRTUAL_SIZE (@var{reg})
56caf160 3191@findex REGISTER_VIRTUAL_SIZE
9fb4dd36 3192Return the virtual size of @var{reg}.
4281a42e 3193@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
3194
3195@item REGISTER_VIRTUAL_TYPE (@var{reg})
56caf160 3196@findex REGISTER_VIRTUAL_TYPE
9fb4dd36 3197Return the virtual type of @var{reg}.
4281a42e 3198@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
3199
3200@item REGISTER_CONVERT_TO_VIRTUAL(@var{reg}, @var{type}, @var{from}, @var{to})
56caf160 3201@findex REGISTER_CONVERT_TO_VIRTUAL
9fb4dd36 3202Convert the value of register @var{reg} from its raw form to its virtual
4281a42e
JB
3203form.
3204@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
3205
3206@item REGISTER_CONVERT_TO_RAW(@var{type}, @var{reg}, @var{from}, @var{to})
56caf160 3207@findex REGISTER_CONVERT_TO_RAW
9fb4dd36 3208Convert the value of register @var{reg} from its virtual form to its raw
4281a42e
JB
3209form.
3210@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36 3211
e5419804
JB
3212@item RETURN_VALUE_ON_STACK(@var{type})
3213@findex RETURN_VALUE_ON_STACK
3214@cindex returning structures by value
3215@cindex structures, returning by value
3216
3217Return non-zero if values of type TYPE are returned on the stack, using
3218the ``struct convention'' (i.e., the caller provides a pointer to a
3219buffer in which the callee should store the return value). This
3220controls how the @samp{finish} command finds a function's return value,
3221and whether an inferior function call reserves space on the stack for
3222the return value.
3223
3224The full logic @value{GDBN} uses here is kind of odd.
e5419804 3225
56caf160 3226@itemize @bullet
e5419804
JB
3227@item
3228If the type being returned by value is not a structure, union, or array,
3229and @code{RETURN_VALUE_ON_STACK} returns zero, then @value{GDBN}
3230concludes the value is not returned using the struct convention.
3231
3232@item
3233Otherwise, @value{GDBN} calls @code{USE_STRUCT_CONVENTION} (see below).
3234If that returns non-zero, @value{GDBN} assumes the struct convention is
3235in use.
e5419804
JB
3236@end itemize
3237
3238In other words, to indicate that a given type is returned by value using
3239the struct convention, that type must be either a struct, union, array,
3240or something @code{RETURN_VALUE_ON_STACK} likes, @emph{and} something
3241that @code{USE_STRUCT_CONVENTION} likes.
3242
56caf160 3243Note that, in C and C@t{++}, arrays are never returned by value. In those
e5419804
JB
3244languages, these predicates will always see a pointer type, never an
3245array type. All the references above to arrays being returned by value
3246apply only to other languages.
3247
b0ed3589 3248@item SOFTWARE_SINGLE_STEP_P()
56caf160 3249@findex SOFTWARE_SINGLE_STEP_P
c906108c 3250Define this as 1 if the target does not have a hardware single-step
56caf160 3251mechanism. The macro @code{SOFTWARE_SINGLE_STEP} must also be defined.
c906108c 3252
56caf160
EZ
3253@item SOFTWARE_SINGLE_STEP(@var{signal}, @var{insert_breapoints_p})
3254@findex SOFTWARE_SINGLE_STEP
3255A function that inserts or removes (depending on
c906108c 3256@var{insert_breapoints_p}) breakpoints at each possible destinations of
56caf160 3257the next instruction. See @file{sparc-tdep.c} and @file{rs6000-tdep.c}
c906108c
SS
3258for examples.
3259
da59e081 3260@item SOFUN_ADDRESS_MAYBE_MISSING
56caf160 3261@findex SOFUN_ADDRESS_MAYBE_MISSING
da59e081
JM
3262Somebody clever observed that, the more actual addresses you have in the
3263debug information, the more time the linker has to spend relocating
3264them. So whenever there's some other way the debugger could find the
3265address it needs, you should omit it from the debug info, to make
3266linking faster.
3267
3268@code{SOFUN_ADDRESS_MAYBE_MISSING} indicates that a particular set of
3269hacks of this sort are in use, affecting @code{N_SO} and @code{N_FUN}
3270entries in stabs-format debugging information. @code{N_SO} stabs mark
3271the beginning and ending addresses of compilation units in the text
3272segment. @code{N_FUN} stabs mark the starts and ends of functions.
3273
3274@code{SOFUN_ADDRESS_MAYBE_MISSING} means two things:
da59e081 3275
56caf160 3276@itemize @bullet
da59e081
JM
3277@item
3278@code{N_FUN} stabs have an address of zero. Instead, you should find the
3279addresses where the function starts by taking the function name from
56caf160
EZ
3280the stab, and then looking that up in the minsyms (the
3281linker/assembler symbol table). In other words, the stab has the
3282name, and the linker/assembler symbol table is the only place that carries
da59e081
JM
3283the address.
3284
3285@item
3286@code{N_SO} stabs have an address of zero, too. You just look at the
3287@code{N_FUN} stabs that appear before and after the @code{N_SO} stab,
3288and guess the starting and ending addresses of the compilation unit from
3289them.
da59e081
JM
3290@end itemize
3291
c906108c 3292@item PCC_SOL_BROKEN
56caf160 3293@findex PCC_SOL_BROKEN
c906108c
SS
3294(Used only in the Convex target.)
3295
3296@item PC_IN_CALL_DUMMY
56caf160
EZ
3297@findex PC_IN_CALL_DUMMY
3298See @file{inferior.h}.
c906108c
SS
3299
3300@item PC_LOAD_SEGMENT
56caf160 3301@findex PC_LOAD_SEGMENT
c906108c
SS
3302If defined, print information about the load segment for the program
3303counter. (Defined only for the RS/6000.)
3304
3305@item PC_REGNUM
56caf160 3306@findex PC_REGNUM
c906108c 3307If the program counter is kept in a register, then define this macro to
cce74817
JM
3308be the number (greater than or equal to zero) of that register.
3309
3310This should only need to be defined if @code{TARGET_READ_PC} and
3311@code{TARGET_WRITE_PC} are not defined.
c906108c
SS
3312
3313@item NPC_REGNUM
56caf160 3314@findex NPC_REGNUM
c906108c
SS
3315The number of the ``next program counter'' register, if defined.
3316
3317@item NNPC_REGNUM
56caf160 3318@findex NNPC_REGNUM
c906108c
SS
3319The number of the ``next next program counter'' register, if defined.
3320Currently, this is only defined for the Motorola 88K.
3321
2df3850c 3322@item PARM_BOUNDARY
56caf160 3323@findex PARM_BOUNDARY
2df3850c
JM
3324If non-zero, round arguments to a boundary of this many bits before
3325pushing them on the stack.
3326
56caf160
EZ
3327@item PRINT_REGISTER_HOOK (@var{regno})
3328@findex PRINT_REGISTER_HOOK
c906108c
SS
3329If defined, this must be a function that prints the contents of the
3330given register to standard output.
3331
3332@item PRINT_TYPELESS_INTEGER
56caf160 3333@findex PRINT_TYPELESS_INTEGER
c906108c
SS
3334This is an obscure substitute for @code{print_longest} that seems to
3335have been defined for the Convex target.
3336
3337@item PROCESS_LINENUMBER_HOOK
56caf160 3338@findex PROCESS_LINENUMBER_HOOK
c906108c
SS
3339A hook defined for XCOFF reading.
3340
3341@item PROLOGUE_FIRSTLINE_OVERLAP
56caf160 3342@findex PROLOGUE_FIRSTLINE_OVERLAP
c906108c
SS
3343(Only used in unsupported Convex configuration.)
3344
3345@item PS_REGNUM
56caf160 3346@findex PS_REGNUM
c906108c
SS
3347If defined, this is the number of the processor status register. (This
3348definition is only used in generic code when parsing "$ps".)
3349
3350@item POP_FRAME
56caf160
EZ
3351@findex POP_FRAME
3352@findex call_function_by_hand
3353@findex return_command
c906108c 3354Used in @samp{call_function_by_hand} to remove an artificial stack
1c6147de 3355frame and in @samp{return_command} to remove a real stack frame.
c906108c 3356
56caf160
EZ
3357@item PUSH_ARGUMENTS (@var{nargs}, @var{args}, @var{sp}, @var{struct_return}, @var{struct_addr})
3358@findex PUSH_ARGUMENTS
392a587b 3359Define this to push arguments onto the stack for inferior function
56caf160 3360call. Returns the updated stack pointer value.
c906108c
SS
3361
3362@item PUSH_DUMMY_FRAME
56caf160 3363@findex PUSH_DUMMY_FRAME
c906108c
SS
3364Used in @samp{call_function_by_hand} to create an artificial stack frame.
3365
3366@item REGISTER_BYTES
56caf160 3367@findex REGISTER_BYTES
25822942 3368The total amount of space needed to store @value{GDBN}'s copy of the machine's
c906108c
SS
3369register state.
3370
56caf160
EZ
3371@item REGISTER_NAME(@var{i})
3372@findex REGISTER_NAME
3373Return the name of register @var{i} as a string. May return @code{NULL}
3374or @code{NUL} to indicate that register @var{i} is not valid.
c906108c 3375
7a292a7a 3376@item REGISTER_NAMES
56caf160
EZ
3377@findex REGISTER_NAMES
3378Deprecated in favor of @code{REGISTER_NAME}.
7a292a7a 3379
56caf160
EZ
3380@item REG_STRUCT_HAS_ADDR (@var{gcc_p}, @var{type})
3381@findex REG_STRUCT_HAS_ADDR
c906108c
SS
3382Define this to return 1 if the given type will be passed by pointer
3383rather than directly.
3384
56caf160
EZ
3385@item SAVE_DUMMY_FRAME_TOS (@var{sp})
3386@findex SAVE_DUMMY_FRAME_TOS
43ff13b4
JM
3387Used in @samp{call_function_by_hand} to notify the target dependent code
3388of the top-of-stack value that will be passed to the the inferior code.
56caf160 3389This is the value of the @code{SP} after both the dummy frame and space
43ff13b4
JM
3390for parameters/results have been allocated on the stack.
3391
c906108c 3392@item SDB_REG_TO_REGNUM
56caf160 3393@findex SDB_REG_TO_REGNUM
25822942 3394Define this to convert sdb register numbers into @value{GDBN} regnums. If not
c906108c
SS
3395defined, no conversion will be done.
3396
3397@item SHIFT_INST_REGS
56caf160 3398@findex SHIFT_INST_REGS
c906108c
SS
3399(Only used for m88k targets.)
3400
c2c6d25f 3401@item SKIP_PERMANENT_BREAKPOINT
56caf160 3402@findex SKIP_PERMANENT_BREAKPOINT
25822942 3403Advance the inferior's PC past a permanent breakpoint. @value{GDBN} normally
c2c6d25f
JM
3404steps over a breakpoint by removing it, stepping one instruction, and
3405re-inserting the breakpoint. However, permanent breakpoints are
3406hardwired into the inferior, and can't be removed, so this strategy
56caf160 3407doesn't work. Calling @code{SKIP_PERMANENT_BREAKPOINT} adjusts the processor's
c2c6d25f
JM
3408state so that execution will resume just after the breakpoint. This
3409macro does the right thing even when the breakpoint is in the delay slot
3410of a branch or jump.
3411
56caf160
EZ
3412@item SKIP_PROLOGUE (@var{pc})
3413@findex SKIP_PROLOGUE
b83266a0
SS
3414A C expression that returns the address of the ``real'' code beyond the
3415function entry prologue found at @var{pc}.
c906108c
SS
3416
3417@item SKIP_PROLOGUE_FRAMELESS_P
56caf160 3418@findex SKIP_PROLOGUE_FRAMELESS_P
b83266a0
SS
3419A C expression that should behave similarly, but that can stop as soon
3420as the function is known to have a frame. If not defined,
c906108c
SS
3421@code{SKIP_PROLOGUE} will be used instead.
3422
56caf160
EZ
3423@item SKIP_TRAMPOLINE_CODE (@var{pc})
3424@findex SKIP_TRAMPOLINE_CODE
c906108c
SS
3425If the target machine has trampoline code that sits between callers and
3426the functions being called, then define this macro to return a new PC
3427that is at the start of the real function.
3428
3429@item SP_REGNUM
56caf160 3430@findex SP_REGNUM
cce74817
JM
3431If the stack-pointer is kept in a register, then define this macro to be
3432the number (greater than or equal to zero) of that register.
3433
3434This should only need to be defined if @code{TARGET_WRITE_SP} and
3435@code{TARGET_WRITE_SP} are not defined.
c906108c
SS
3436
3437@item STAB_REG_TO_REGNUM
56caf160 3438@findex STAB_REG_TO_REGNUM
c906108c 3439Define this to convert stab register numbers (as gotten from `r'
25822942 3440declarations) into @value{GDBN} regnums. If not defined, no conversion will be
c906108c
SS
3441done.
3442
56caf160
EZ
3443@item STACK_ALIGN (@var{addr})
3444@findex STACK_ALIGN
c906108c
SS
3445Define this to adjust the address to the alignment required for the
3446processor's stack.
3447
56caf160
EZ
3448@item STEP_SKIPS_DELAY (@var{addr})
3449@findex STEP_SKIPS_DELAY
c906108c
SS
3450Define this to return true if the address is of an instruction with a
3451delay slot. If a breakpoint has been placed in the instruction's delay
25822942 3452slot, @value{GDBN} will single-step over that instruction before resuming
c906108c
SS
3453normally. Currently only defined for the Mips.
3454
56caf160
EZ
3455@item STORE_RETURN_VALUE (@var{type}, @var{valbuf})
3456@findex STORE_RETURN_VALUE
c906108c
SS
3457A C expression that stores a function return value of type @var{type},
3458where @var{valbuf} is the address of the value to be stored.
3459
3460@item SUN_FIXED_LBRAC_BUG
56caf160 3461@findex SUN_FIXED_LBRAC_BUG
c906108c
SS
3462(Used only for Sun-3 and Sun-4 targets.)
3463
3464@item SYMBOL_RELOADING_DEFAULT
56caf160
EZ
3465@findex SYMBOL_RELOADING_DEFAULT
3466The default value of the ``symbol-reloading'' variable. (Never defined in
c906108c
SS
3467current sources.)
3468
3469@item TARGET_BYTE_ORDER_DEFAULT
56caf160 3470@findex TARGET_BYTE_ORDER_DEFAULT
c906108c
SS
3471The ordering of bytes in the target. This must be either
3472@code{BIG_ENDIAN} or @code{LITTLE_ENDIAN}. This macro replaces
56caf160 3473@code{TARGET_BYTE_ORDER} which is deprecated.
c906108c
SS
3474
3475@item TARGET_BYTE_ORDER_SELECTABLE_P
56caf160 3476@findex TARGET_BYTE_ORDER_SELECTABLE_P
c906108c
SS
3477Non-zero if the target has both @code{BIG_ENDIAN} and
3478@code{LITTLE_ENDIAN} variants. This macro replaces
56caf160 3479@code{TARGET_BYTE_ORDER_SELECTABLE} which is deprecated.
c906108c
SS
3480
3481@item TARGET_CHAR_BIT
56caf160 3482@findex TARGET_CHAR_BIT
c906108c
SS
3483Number of bits in a char; defaults to 8.
3484
3485@item TARGET_COMPLEX_BIT
56caf160 3486@findex TARGET_COMPLEX_BIT
c906108c
SS
3487Number of bits in a complex number; defaults to @code{2 * TARGET_FLOAT_BIT}.
3488
ac9a91a7
JM
3489At present this macro is not used.
3490
c906108c 3491@item TARGET_DOUBLE_BIT
56caf160 3492@findex TARGET_DOUBLE_BIT
c906108c
SS
3493Number of bits in a double float; defaults to @code{8 * TARGET_CHAR_BIT}.
3494
3495@item TARGET_DOUBLE_COMPLEX_BIT
56caf160 3496@findex TARGET_DOUBLE_COMPLEX_BIT
c906108c
SS
3497Number of bits in a double complex; defaults to @code{2 * TARGET_DOUBLE_BIT}.
3498
ac9a91a7
JM
3499At present this macro is not used.
3500
c906108c 3501@item TARGET_FLOAT_BIT
56caf160 3502@findex TARGET_FLOAT_BIT
c906108c
SS
3503Number of bits in a float; defaults to @code{4 * TARGET_CHAR_BIT}.
3504
3505@item TARGET_INT_BIT
56caf160 3506@findex TARGET_INT_BIT
c906108c
SS
3507Number of bits in an integer; defaults to @code{4 * TARGET_CHAR_BIT}.
3508
3509@item TARGET_LONG_BIT
56caf160 3510@findex TARGET_LONG_BIT
c906108c
SS
3511Number of bits in a long integer; defaults to @code{4 * TARGET_CHAR_BIT}.
3512
3513@item TARGET_LONG_DOUBLE_BIT
56caf160 3514@findex TARGET_LONG_DOUBLE_BIT
c906108c
SS
3515Number of bits in a long double float;
3516defaults to @code{2 * TARGET_DOUBLE_BIT}.
3517
3518@item TARGET_LONG_LONG_BIT
56caf160 3519@findex TARGET_LONG_LONG_BIT
c906108c
SS
3520Number of bits in a long long integer; defaults to @code{2 * TARGET_LONG_BIT}.
3521
3522@item TARGET_PTR_BIT
56caf160 3523@findex TARGET_PTR_BIT
c906108c
SS
3524Number of bits in a pointer; defaults to @code{TARGET_INT_BIT}.
3525
3526@item TARGET_SHORT_BIT
56caf160 3527@findex TARGET_SHORT_BIT
c906108c
SS
3528Number of bits in a short integer; defaults to @code{2 * TARGET_CHAR_BIT}.
3529
3530@item TARGET_READ_PC
56caf160
EZ
3531@findex TARGET_READ_PC
3532@itemx TARGET_WRITE_PC (@var{val}, @var{pid})
3533@findex TARGET_WRITE_PC
3534@itemx TARGET_READ_SP
3535@findex TARGET_READ_SP
3536@itemx TARGET_WRITE_SP
3537@findex TARGET_WRITE_SP
3538@itemx TARGET_READ_FP
3539@findex TARGET_READ_FP
3540@itemx TARGET_WRITE_FP
3541@findex TARGET_WRITE_FP
3542@findex read_pc
3543@findex write_pc
3544@findex read_sp
3545@findex write_sp
3546@findex read_fp
3547@findex write_fp
c906108c
SS
3548These change the behavior of @code{read_pc}, @code{write_pc},
3549@code{read_sp}, @code{write_sp}, @code{read_fp} and @code{write_fp}.
25822942 3550For most targets, these may be left undefined. @value{GDBN} will call the read
c906108c
SS
3551and write register functions with the relevant @code{_REGNUM} argument.
3552
3553These macros are useful when a target keeps one of these registers in a
3554hard to get at place; for example, part in a segment register and part
3555in an ordinary register.
3556
56caf160
EZ
3557@item TARGET_VIRTUAL_FRAME_POINTER(@var{pc}, @var{regp}, @var{offsetp})
3558@findex TARGET_VIRTUAL_FRAME_POINTER
c906108c 3559Returns a @code{(register, offset)} pair representing the virtual
56caf160 3560frame pointer in use at the code address @var{pc}. If virtual
c906108c
SS
3561frame pointers are not used, a default definition simply returns
3562@code{FP_REGNUM}, with an offset of zero.
3563
9742079a
EZ
3564@item TARGET_HAS_HARDWARE_WATCHPOINTS
3565If non-zero, the target has support for hardware-assisted
3566watchpoints. @xref{Algorithms, watchpoints}, for more details and
3567other related macros.
3568
56caf160
EZ
3569@item USE_STRUCT_CONVENTION (@var{gcc_p}, @var{type})
3570@findex USE_STRUCT_CONVENTION
c906108c
SS
3571If defined, this must be an expression that is nonzero if a value of the
3572given @var{type} being returned from a function must have space
3573allocated for it on the stack. @var{gcc_p} is true if the function
3574being considered is known to have been compiled by GCC; this is helpful
3575for systems where GCC is known to use different calling convention than
3576other compilers.
3577
56caf160
EZ
3578@item VARIABLES_INSIDE_BLOCK (@var{desc}, @var{gcc_p})
3579@findex VARIABLES_INSIDE_BLOCK
c906108c
SS
3580For dbx-style debugging information, if the compiler puts variable
3581declarations inside LBRAC/RBRAC blocks, this should be defined to be
3582nonzero. @var{desc} is the value of @code{n_desc} from the
25822942 3583@code{N_RBRAC} symbol, and @var{gcc_p} is true if @value{GDBN} has noticed the
c906108c
SS
3584presence of either the @code{GCC_COMPILED_SYMBOL} or the
3585@code{GCC2_COMPILED_SYMBOL}. By default, this is 0.
3586
56caf160
EZ
3587@item OS9K_VARIABLES_INSIDE_BLOCK (@var{desc}, @var{gcc_p})
3588@findex OS9K_VARIABLES_INSIDE_BLOCK
c906108c 3589Similarly, for OS/9000. Defaults to 1.
c906108c
SS
3590@end table
3591
3592Motorola M68K target conditionals.
3593
56caf160 3594@ftable @code
c906108c
SS
3595@item BPT_VECTOR
3596Define this to be the 4-bit location of the breakpoint trap vector. If
3597not defined, it will default to @code{0xf}.
3598
3599@item REMOTE_BPT_VECTOR
3600Defaults to @code{1}.
56caf160 3601@end ftable
c906108c
SS
3602
3603@section Adding a New Target
3604
56caf160 3605@cindex adding a target
af6c57ea 3606The following files add a target to @value{GDBN}:
c906108c
SS
3607
3608@table @file
56caf160 3609@vindex TDEPFILES
c906108c
SS
3610@item gdb/config/@var{arch}/@var{ttt}.mt
3611Contains a Makefile fragment specific to this target. Specifies what
3612object files are needed for target @var{ttt}, by defining
104c1213
JM
3613@samp{TDEPFILES=@dots{}} and @samp{TDEPLIBS=@dots{}}. Also specifies
3614the header file which describes @var{ttt}, by defining @samp{TM_FILE=
3615tm-@var{ttt}.h}.
3616
3617You can also define @samp{TM_CFLAGS}, @samp{TM_CLIBS}, @samp{TM_CDEPS},
3618but these are now deprecated, replaced by autoconf, and may go away in
25822942 3619future versions of @value{GDBN}.
c906108c 3620
c906108c
SS
3621@item gdb/@var{ttt}-tdep.c
3622Contains any miscellaneous code required for this target machine. On
3623some machines it doesn't exist at all. Sometimes the macros in
3624@file{tm-@var{ttt}.h} become very complicated, so they are implemented
3625as functions here instead, and the macro is simply defined to call the
3626function. This is vastly preferable, since it is easier to understand
3627and debug.
3628
af6c57ea
AC
3629@item gdb/@var{arch}-tdep.c
3630@itemx gdb/@var{arch}-tdep.h
3631This often exists to describe the basic layout of the target machine's
3632processor chip (registers, stack, etc.). If used, it is included by
3633@file{@var{ttt}-tdep.h}. It can be shared among many targets that use
3634the same processor.
3635
3636@item gdb/config/@var{arch}/tm-@var{ttt}.h
3637(@file{tm.h} is a link to this file, created by @code{configure}). Contains
3638macro definitions about the target machine's registers, stack frame
3639format and instructions.
3640
3641New targets do not need this file and should not create it.
3642
c906108c
SS
3643@item gdb/config/@var{arch}/tm-@var{arch}.h
3644This often exists to describe the basic layout of the target machine's
56caf160 3645processor chip (registers, stack, etc.). If used, it is included by
c906108c
SS
3646@file{tm-@var{ttt}.h}. It can be shared among many targets that use the
3647same processor.
3648
af6c57ea
AC
3649New targets do not need this file and should not create it.
3650
c906108c
SS
3651@end table
3652
3653If you are adding a new operating system for an existing CPU chip, add a
3654@file{config/tm-@var{os}.h} file that describes the operating system
3655facilities that are unusual (extra symbol table info; the breakpoint
56caf160 3656instruction needed; etc.). Then write a @file{@var{arch}/tm-@var{os}.h}
c906108c
SS
3657that just @code{#include}s @file{tm-@var{arch}.h} and
3658@file{config/tm-@var{os}.h}.
3659
3660
3661@node Target Vector Definition
3662
3663@chapter Target Vector Definition
56caf160 3664@cindex target vector
c906108c 3665
56caf160
EZ
3666The target vector defines the interface between @value{GDBN}'s
3667abstract handling of target systems, and the nitty-gritty code that
3668actually exercises control over a process or a serial port.
3669@value{GDBN} includes some 30-40 different target vectors; however,
3670each configuration of @value{GDBN} includes only a few of them.
c906108c
SS
3671
3672@section File Targets
3673
3674Both executables and core files have target vectors.
3675
3676@section Standard Protocol and Remote Stubs
3677
56caf160
EZ
3678@value{GDBN}'s file @file{remote.c} talks a serial protocol to code
3679that runs in the target system. @value{GDBN} provides several sample
3680@dfn{stubs} that can be integrated into target programs or operating
3681systems for this purpose; they are named @file{*-stub.c}.
c906108c 3682
56caf160
EZ
3683The @value{GDBN} user's manual describes how to put such a stub into
3684your target code. What follows is a discussion of integrating the
3685SPARC stub into a complicated operating system (rather than a simple
3686program), by Stu Grossman, the author of this stub.
c906108c
SS
3687
3688The trap handling code in the stub assumes the following upon entry to
56caf160 3689@code{trap_low}:
c906108c
SS
3690
3691@enumerate
56caf160
EZ
3692@item
3693%l1 and %l2 contain pc and npc respectively at the time of the trap;
c906108c 3694
56caf160
EZ
3695@item
3696traps are disabled;
c906108c 3697
56caf160
EZ
3698@item
3699you are in the correct trap window.
c906108c
SS
3700@end enumerate
3701
3702As long as your trap handler can guarantee those conditions, then there
56caf160 3703is no reason why you shouldn't be able to ``share'' traps with the stub.
c906108c
SS
3704The stub has no requirement that it be jumped to directly from the
3705hardware trap vector. That is why it calls @code{exceptionHandler()},
3706which is provided by the external environment. For instance, this could
56caf160 3707set up the hardware traps to actually execute code which calls the stub
c906108c
SS
3708first, and then transfers to its own trap handler.
3709
3710For the most point, there probably won't be much of an issue with
56caf160 3711``sharing'' traps, as the traps we use are usually not used by the kernel,
c906108c
SS
3712and often indicate unrecoverable error conditions. Anyway, this is all
3713controlled by a table, and is trivial to modify. The most important
3714trap for us is for @code{ta 1}. Without that, we can't single step or
3715do breakpoints. Everything else is unnecessary for the proper operation
3716of the debugger/stub.
3717
3718From reading the stub, it's probably not obvious how breakpoints work.
25822942 3719They are simply done by deposit/examine operations from @value{GDBN}.
c906108c
SS
3720
3721@section ROM Monitor Interface
3722
3723@section Custom Protocols
3724
3725@section Transport Layer
3726
3727@section Builtin Simulator
3728
3729
3730@node Native Debugging
3731
3732@chapter Native Debugging
56caf160 3733@cindex native debugging
c906108c 3734
25822942 3735Several files control @value{GDBN}'s configuration for native support:
c906108c
SS
3736
3737@table @file
56caf160 3738@vindex NATDEPFILES
c906108c
SS
3739@item gdb/config/@var{arch}/@var{xyz}.mh
3740Specifies Makefile fragments needed when hosting @emph{or native} on
3741machine @var{xyz}. In particular, this lists the required
3742native-dependent object files, by defining @samp{NATDEPFILES=@dots{}}.
3743Also specifies the header file which describes native support on
3744@var{xyz}, by defining @samp{NAT_FILE= nm-@var{xyz}.h}. You can also
3745define @samp{NAT_CFLAGS}, @samp{NAT_ADD_FILES}, @samp{NAT_CLIBS},
3746@samp{NAT_CDEPS}, etc.; see @file{Makefile.in}.
3747
3748@item gdb/config/@var{arch}/nm-@var{xyz}.h
56caf160 3749(@file{nm.h} is a link to this file, created by @code{configure}). Contains C
c906108c
SS
3750macro definitions describing the native system environment, such as
3751child process control and core file support.
3752
3753@item gdb/@var{xyz}-nat.c
3754Contains any miscellaneous C code required for this native support of
3755this machine. On some machines it doesn't exist at all.
c906108c
SS
3756@end table
3757
3758There are some ``generic'' versions of routines that can be used by
3759various systems. These can be customized in various ways by macros
3760defined in your @file{nm-@var{xyz}.h} file. If these routines work for
3761the @var{xyz} host, you can just include the generic file's name (with
3762@samp{.o}, not @samp{.c}) in @code{NATDEPFILES}.
3763
3764Otherwise, if your machine needs custom support routines, you will need
3765to write routines that perform the same functions as the generic file.
56caf160 3766Put them into @file{@var{xyz}-nat.c}, and put @file{@var{xyz}-nat.o}
c906108c
SS
3767into @code{NATDEPFILES}.
3768
3769@table @file
c906108c
SS
3770@item inftarg.c
3771This contains the @emph{target_ops vector} that supports Unix child
3772processes on systems which use ptrace and wait to control the child.
3773
3774@item procfs.c
3775This contains the @emph{target_ops vector} that supports Unix child
3776processes on systems which use /proc to control the child.
3777
3778@item fork-child.c
56caf160
EZ
3779This does the low-level grunge that uses Unix system calls to do a ``fork
3780and exec'' to start up a child process.
c906108c
SS
3781
3782@item infptrace.c
3783This is the low level interface to inferior processes for systems using
3784the Unix @code{ptrace} call in a vanilla way.
c906108c
SS
3785@end table
3786
3787@section Native core file Support
56caf160 3788@cindex native core files
c906108c
SS
3789
3790@table @file
56caf160 3791@findex fetch_core_registers
c906108c
SS
3792@item core-aout.c::fetch_core_registers()
3793Support for reading registers out of a core file. This routine calls
3794@code{register_addr()}, see below. Now that BFD is used to read core
3795files, virtually all machines should use @code{core-aout.c}, and should
3796just provide @code{fetch_core_registers} in @code{@var{xyz}-nat.c} (or
3797@code{REGISTER_U_ADDR} in @code{nm-@var{xyz}.h}).
3798
3799@item core-aout.c::register_addr()
3800If your @code{nm-@var{xyz}.h} file defines the macro
3801@code{REGISTER_U_ADDR(addr, blockend, regno)}, it should be defined to
25822942 3802set @code{addr} to the offset within the @samp{user} struct of @value{GDBN}
c906108c
SS
3803register number @code{regno}. @code{blockend} is the offset within the
3804``upage'' of @code{u.u_ar0}. If @code{REGISTER_U_ADDR} is defined,
3805@file{core-aout.c} will define the @code{register_addr()} function and
3806use the macro in it. If you do not define @code{REGISTER_U_ADDR}, but
3807you are using the standard @code{fetch_core_registers()}, you will need
3808to define your own version of @code{register_addr()}, put it into your
3809@code{@var{xyz}-nat.c} file, and be sure @code{@var{xyz}-nat.o} is in
3810the @code{NATDEPFILES} list. If you have your own
3811@code{fetch_core_registers()}, you may not need a separate
3812@code{register_addr()}. Many custom @code{fetch_core_registers()}
3813implementations simply locate the registers themselves.@refill
c906108c
SS
3814@end table
3815
25822942 3816When making @value{GDBN} run native on a new operating system, to make it
c906108c
SS
3817possible to debug core files, you will need to either write specific
3818code for parsing your OS's core files, or customize
3819@file{bfd/trad-core.c}. First, use whatever @code{#include} files your
3820machine uses to define the struct of registers that is accessible
3821(possibly in the u-area) in a core file (rather than
3822@file{machine/reg.h}), and an include file that defines whatever header
56caf160
EZ
3823exists on a core file (e.g. the u-area or a @code{struct core}). Then
3824modify @code{trad_unix_core_file_p} to use these values to set up the
c906108c
SS
3825section information for the data segment, stack segment, any other
3826segments in the core file (perhaps shared library contents or control
3827information), ``registers'' segment, and if there are two discontiguous
3828sets of registers (e.g. integer and float), the ``reg2'' segment. This
3829section information basically delimits areas in the core file in a
3830standard way, which the section-reading routines in BFD know how to seek
3831around in.
3832
25822942 3833Then back in @value{GDBN}, you need a matching routine called
56caf160 3834@code{fetch_core_registers}. If you can use the generic one, it's in
c906108c
SS
3835@file{core-aout.c}; if not, it's in your @file{@var{xyz}-nat.c} file.
3836It will be passed a char pointer to the entire ``registers'' segment,
3837its length, and a zero; or a char pointer to the entire ``regs2''
3838segment, its length, and a 2. The routine should suck out the supplied
25822942 3839register values and install them into @value{GDBN}'s ``registers'' array.
c906108c
SS
3840
3841If your system uses @file{/proc} to control processes, and uses ELF
3842format core files, then you may be able to use the same routines for
3843reading the registers out of processes and out of core files.
3844
3845@section ptrace
3846
3847@section /proc
3848
3849@section win32
3850
3851@section shared libraries
3852
3853@section Native Conditionals
56caf160 3854@cindex native conditionals
c906108c 3855
56caf160
EZ
3856When @value{GDBN} is configured and compiled, various macros are
3857defined or left undefined, to control compilation when the host and
3858target systems are the same. These macros should be defined (or left
3859undefined) in @file{nm-@var{system}.h}.
c906108c
SS
3860
3861@table @code
c906108c 3862@item ATTACH_DETACH
56caf160 3863@findex ATTACH_DETACH
25822942 3864If defined, then @value{GDBN} will include support for the @code{attach} and
c906108c
SS
3865@code{detach} commands.
3866
3867@item CHILD_PREPARE_TO_STORE
56caf160 3868@findex CHILD_PREPARE_TO_STORE
c906108c
SS
3869If the machine stores all registers at once in the child process, then
3870define this to ensure that all values are correct. This usually entails
3871a read from the child.
3872
3873[Note that this is incorrectly defined in @file{xm-@var{system}.h} files
3874currently.]
3875
3876@item FETCH_INFERIOR_REGISTERS
56caf160 3877@findex FETCH_INFERIOR_REGISTERS
c906108c
SS
3878Define this if the native-dependent code will provide its own routines
3879@code{fetch_inferior_registers} and @code{store_inferior_registers} in
56caf160 3880@file{@var{host}-nat.c}. If this symbol is @emph{not} defined, and
c906108c
SS
3881@file{infptrace.c} is included in this configuration, the default
3882routines in @file{infptrace.c} are used for these functions.
3883
3884@item FILES_INFO_HOOK
56caf160 3885@findex FILES_INFO_HOOK
c906108c
SS
3886(Only defined for Convex.)
3887
3888@item FP0_REGNUM
56caf160 3889@findex FP0_REGNUM
c906108c
SS
3890This macro is normally defined to be the number of the first floating
3891point register, if the machine has such registers. As such, it would
56caf160 3892appear only in target-specific code. However, @file{/proc} support uses this
c906108c
SS
3893to decide whether floats are in use on this target.
3894
3895@item GET_LONGJMP_TARGET
56caf160 3896@findex GET_LONGJMP_TARGET
c906108c
SS
3897For most machines, this is a target-dependent parameter. On the
3898DECstation and the Iris, this is a native-dependent parameter, since
56caf160 3899@file{setjmp.h} is needed to define it.
c906108c 3900
56caf160 3901This macro determines the target PC address that @code{longjmp} will jump to,
c906108c 3902assuming that we have just stopped at a longjmp breakpoint. It takes a
56caf160 3903@code{CORE_ADDR *} as argument, and stores the target PC value through this
c906108c
SS
3904pointer. It examines the current state of the machine as needed.
3905
9742079a
EZ
3906@item I386_USE_GENERIC_WATCHPOINTS
3907An x86-based machine can define this to use the generic x86 watchpoint
3908support; see @ref{Algorithms, I386_USE_GENERIC_WATCHPOINTS}.
3909
c906108c 3910@item KERNEL_U_ADDR
56caf160 3911@findex KERNEL_U_ADDR
c906108c 3912Define this to the address of the @code{u} structure (the ``user
25822942 3913struct'', also known as the ``u-page'') in kernel virtual memory. @value{GDBN}
c906108c
SS
3914needs to know this so that it can subtract this address from absolute
3915addresses in the upage, that are obtained via ptrace or from core files.
3916On systems that don't need this value, set it to zero.
3917
3918@item KERNEL_U_ADDR_BSD
56caf160 3919@findex KERNEL_U_ADDR_BSD
25822942 3920Define this to cause @value{GDBN} to determine the address of @code{u} at
c906108c
SS
3921runtime, by using Berkeley-style @code{nlist} on the kernel's image in
3922the root directory.
3923
3924@item KERNEL_U_ADDR_HPUX
56caf160 3925@findex KERNEL_U_ADDR_HPUX
25822942 3926Define this to cause @value{GDBN} to determine the address of @code{u} at
c906108c
SS
3927runtime, by using HP-style @code{nlist} on the kernel's image in the
3928root directory.
3929
3930@item ONE_PROCESS_WRITETEXT
56caf160 3931@findex ONE_PROCESS_WRITETEXT
c906108c
SS
3932Define this to be able to, when a breakpoint insertion fails, warn the
3933user that another process may be running with the same executable.
3934
56caf160
EZ
3935@item PREPARE_TO_PROCEED (@var{select_it})
3936@findex PREPARE_TO_PROCEED
adf40b2e
JM
3937This (ugly) macro allows a native configuration to customize the way the
3938@code{proceed} function in @file{infrun.c} deals with switching between
3939threads.
3940
3941In a multi-threaded task we may select another thread and then continue
3942or step. But if the old thread was stopped at a breakpoint, it will
3943immediately cause another breakpoint stop without any execution (i.e. it
25822942 3944will report a breakpoint hit incorrectly). So @value{GDBN} must step over it
adf40b2e
JM
3945first.
3946
3947If defined, @code{PREPARE_TO_PROCEED} should check the current thread
3948against the thread that reported the most recent event. If a step-over
3949is required, it returns TRUE. If @var{select_it} is non-zero, it should
3950reselect the old thread.
3951
c906108c 3952@item PROC_NAME_FMT
56caf160 3953@findex PROC_NAME_FMT
c906108c
SS
3954Defines the format for the name of a @file{/proc} device. Should be
3955defined in @file{nm.h} @emph{only} in order to override the default
3956definition in @file{procfs.c}.
3957
3958@item PTRACE_FP_BUG
56caf160
EZ
3959@findex PTRACE_FP_BUG
3960See @file{mach386-xdep.c}.
c906108c
SS
3961
3962@item PTRACE_ARG3_TYPE
56caf160 3963@findex PTRACE_ARG3_TYPE
c906108c
SS
3964The type of the third argument to the @code{ptrace} system call, if it
3965exists and is different from @code{int}.
3966
3967@item REGISTER_U_ADDR
56caf160 3968@findex REGISTER_U_ADDR
c906108c
SS
3969Defines the offset of the registers in the ``u area''.
3970
3971@item SHELL_COMMAND_CONCAT
56caf160 3972@findex SHELL_COMMAND_CONCAT
c906108c
SS
3973If defined, is a string to prefix on the shell command used to start the
3974inferior.
3975
3976@item SHELL_FILE
56caf160 3977@findex SHELL_FILE
c906108c
SS
3978If defined, this is the name of the shell to use to run the inferior.
3979Defaults to @code{"/bin/sh"}.
3980
56caf160
EZ
3981@item SOLIB_ADD (@var{filename}, @var{from_tty}, @var{targ})
3982@findex SOLIB_ADD
c906108c 3983Define this to expand into an expression that will cause the symbols in
25822942 3984@var{filename} to be added to @value{GDBN}'s symbol table.
c906108c
SS
3985
3986@item SOLIB_CREATE_INFERIOR_HOOK
56caf160 3987@findex SOLIB_CREATE_INFERIOR_HOOK
c906108c
SS
3988Define this to expand into any shared-library-relocation code that you
3989want to be run just after the child process has been forked.
3990
3991@item START_INFERIOR_TRAPS_EXPECTED
56caf160
EZ
3992@findex START_INFERIOR_TRAPS_EXPECTED
3993When starting an inferior, @value{GDBN} normally expects to trap
3994twice; once when
c906108c
SS
3995the shell execs, and once when the program itself execs. If the actual
3996number of traps is something other than 2, then define this macro to
3997expand into the number expected.
3998
3999@item SVR4_SHARED_LIBS
56caf160 4000@findex SVR4_SHARED_LIBS
c906108c
SS
4001Define this to indicate that SVR4-style shared libraries are in use.
4002
4003@item USE_PROC_FS
56caf160 4004@findex USE_PROC_FS
c906108c 4005This determines whether small routines in @file{*-tdep.c}, which
56caf160
EZ
4006translate register values between @value{GDBN}'s internal
4007representation and the @file{/proc} representation, are compiled.
c906108c
SS
4008
4009@item U_REGS_OFFSET
56caf160 4010@findex U_REGS_OFFSET
c906108c
SS
4011This is the offset of the registers in the upage. It need only be
4012defined if the generic ptrace register access routines in
4013@file{infptrace.c} are being used (that is, @file{infptrace.c} is
4014configured in, and @code{FETCH_INFERIOR_REGISTERS} is not defined). If
4015the default value from @file{infptrace.c} is good enough, leave it
4016undefined.
4017
4018The default value means that u.u_ar0 @emph{points to} the location of
4019the registers. I'm guessing that @code{#define U_REGS_OFFSET 0} means
56caf160 4020that @code{u.u_ar0} @emph{is} the location of the registers.
c906108c
SS
4021
4022@item CLEAR_SOLIB
56caf160
EZ
4023@findex CLEAR_SOLIB
4024See @file{objfiles.c}.
c906108c
SS
4025
4026@item DEBUG_PTRACE
56caf160
EZ
4027@findex DEBUG_PTRACE
4028Define this to debug @code{ptrace} calls.
c906108c
SS
4029@end table
4030
4031
4032@node Support Libraries
4033
4034@chapter Support Libraries
4035
4036@section BFD
56caf160 4037@cindex BFD library
c906108c 4038
25822942 4039BFD provides support for @value{GDBN} in several ways:
c906108c
SS
4040
4041@table @emph
c906108c
SS
4042@item identifying executable and core files
4043BFD will identify a variety of file types, including a.out, coff, and
4044several variants thereof, as well as several kinds of core files.
4045
4046@item access to sections of files
4047BFD parses the file headers to determine the names, virtual addresses,
4048sizes, and file locations of all the various named sections in files
56caf160
EZ
4049(such as the text section or the data section). @value{GDBN} simply
4050calls BFD to read or write section @var{x} at byte offset @var{y} for
4051length @var{z}.
c906108c
SS
4052
4053@item specialized core file support
4054BFD provides routines to determine the failing command name stored in a
4055core file, the signal with which the program failed, and whether a core
56caf160 4056file matches (i.e.@: could be a core dump of) a particular executable
c906108c
SS
4057file.
4058
4059@item locating the symbol information
25822942
DB
4060@value{GDBN} uses an internal interface of BFD to determine where to find the
4061symbol information in an executable file or symbol-file. @value{GDBN} itself
c906108c 4062handles the reading of symbols, since BFD does not ``understand'' debug
25822942 4063symbols, but @value{GDBN} uses BFD's cached information to find the symbols,
c906108c 4064string table, etc.
c906108c
SS
4065@end table
4066
4067@section opcodes
56caf160 4068@cindex opcodes library
c906108c 4069
25822942 4070The opcodes library provides @value{GDBN}'s disassembler. (It's a separate
c906108c
SS
4071library because it's also used in binutils, for @file{objdump}).
4072
4073@section readline
4074
4075@section mmalloc
4076
4077@section libiberty
4078
4079@section gnu-regex
56caf160 4080@cindex regular expressions library
c906108c
SS
4081
4082Regex conditionals.
4083
4084@table @code
c906108c
SS
4085@item C_ALLOCA
4086
4087@item NFAILURES
4088
4089@item RE_NREGS
4090
4091@item SIGN_EXTEND_CHAR
4092
4093@item SWITCH_ENUM_BUG
4094
4095@item SYNTAX_TABLE
4096
4097@item Sword
4098
4099@item sparc
c906108c
SS
4100@end table
4101
4102@section include
4103
4104@node Coding
4105
4106@chapter Coding
4107
4108This chapter covers topics that are lower-level than the major
25822942 4109algorithms of @value{GDBN}.
c906108c
SS
4110
4111@section Cleanups
56caf160 4112@cindex cleanups
c906108c
SS
4113
4114Cleanups are a structured way to deal with things that need to be done
4115later. When your code does something (like @code{malloc} some memory,
56caf160 4116or open a file) that needs to be undone later (e.g., free the memory or
c906108c
SS
4117close the file), it can make a cleanup. The cleanup will be done at
4118some future point: when the command is finished, when an error occurs,
4119or when your code decides it's time to do cleanups.
4120
4121You can also discard cleanups, that is, throw them away without doing
4122what they say. This is only done if you ask that it be done.
4123
4124Syntax:
4125
4126@table @code
c906108c
SS
4127@item struct cleanup *@var{old_chain};
4128Declare a variable which will hold a cleanup chain handle.
4129
56caf160 4130@findex make_cleanup
c906108c
SS
4131@item @var{old_chain} = make_cleanup (@var{function}, @var{arg});
4132Make a cleanup which will cause @var{function} to be called with
4133@var{arg} (a @code{char *}) later. The result, @var{old_chain}, is a
4134handle that can be passed to @code{do_cleanups} or
4135@code{discard_cleanups} later. Unless you are going to call
4136@code{do_cleanups} or @code{discard_cleanups} yourself, you can ignore
4137the result from @code{make_cleanup}.
4138
56caf160 4139@findex do_cleanups
c906108c
SS
4140@item do_cleanups (@var{old_chain});
4141Perform all cleanups done since @code{make_cleanup} returned
4142@var{old_chain}. E.g.:
56caf160 4143
c906108c
SS
4144@example
4145make_cleanup (a, 0);
4146old = make_cleanup (b, 0);
4147do_cleanups (old);
4148@end example
56caf160 4149
c906108c
SS
4150@noindent
4151will call @code{b()} but will not call @code{a()}. The cleanup that
4152calls @code{a()} will remain in the cleanup chain, and will be done
4153later unless otherwise discarded.@refill
4154
56caf160 4155@findex discard_cleanups
c906108c
SS
4156@item discard_cleanups (@var{old_chain});
4157Same as @code{do_cleanups} except that it just removes the cleanups from
4158the chain and does not call the specified functions.
c906108c
SS
4159@end table
4160
4161Some functions, e.g. @code{fputs_filtered()} or @code{error()}, specify
4162that they ``should not be called when cleanups are not in place''. This
4163means that any actions you need to reverse in the case of an error or
4164interruption must be on the cleanup chain before you call these
4165functions, since they might never return to your code (they
4166@samp{longjmp} instead).
4167
4168@section Wrapping Output Lines
56caf160 4169@cindex line wrap in output
c906108c 4170
56caf160 4171@findex wrap_here
c906108c
SS
4172Output that goes through @code{printf_filtered} or @code{fputs_filtered}
4173or @code{fputs_demangled} needs only to have calls to @code{wrap_here}
4174added in places that would be good breaking points. The utility
4175routines will take care of actually wrapping if the line width is
4176exceeded.
4177
4178The argument to @code{wrap_here} is an indentation string which is
4179printed @emph{only} if the line breaks there. This argument is saved
4180away and used later. It must remain valid until the next call to
4181@code{wrap_here} or until a newline has been printed through the
4182@code{*_filtered} functions. Don't pass in a local variable and then
4183return!
4184
56caf160 4185It is usually best to call @code{wrap_here} after printing a comma or
c906108c
SS
4186space. If you call it before printing a space, make sure that your
4187indentation properly accounts for the leading space that will print if
4188the line wraps there.
4189
4190Any function or set of functions that produce filtered output must
4191finish by printing a newline, to flush the wrap buffer, before switching
56caf160 4192to unfiltered (@code{printf}) output. Symbol reading routines that
c906108c
SS
4193print warnings are a good example.
4194
25822942 4195@section @value{GDBN} Coding Standards
56caf160 4196@cindex coding standards
c906108c 4197
25822942 4198@value{GDBN} follows the GNU coding standards, as described in
c906108c 4199@file{etc/standards.texi}. This file is also available for anonymous
af6c57ea
AC
4200FTP from GNU archive sites. @value{GDBN} takes a strict interpretation
4201of the standard; in general, when the GNU standard recommends a practice
4202but does not require it, @value{GDBN} requires it.
c906108c 4203
56caf160
EZ
4204@value{GDBN} follows an additional set of coding standards specific to
4205@value{GDBN}, as described in the following sections.
c906108c 4206
af6c57ea
AC
4207
4208@subsection ISO-C
4209
4210@value{GDBN} assumes an ISO-C compliant compiler.
4211
4212@value{GDBN} does not assume an ISO-C or POSIX compliant C library.
4213
4214
4215@subsection Memory Management
4216
4217@value{GDBN} does not use the functions @code{malloc}, @code{realloc},
4218@code{calloc}, @code{free} and @code{asprintf}.
4219
4220@value{GDBN} uses the functions @code{xmalloc}, @code{xrealloc} and
4221@code{xcalloc} when allocating memory. Unlike @code{malloc} et.al.@:
4222these functions do not return when the memory pool is empty. Instead,
4223they unwind the stack using cleanups. These functions return
4224@code{NULL} when requested to allocate a chunk of memory of size zero.
4225
4226@emph{Pragmatics: By using these functions, the need to check every
4227memory allocation is removed. These functions provide portable
4228behavior.}
4229
4230@value{GDBN} does not use the function @code{free}.
4231
4232@value{GDBN} uses the function @code{xfree} to return memory to the
4233memory pool. Consistent with ISO-C, this function ignores a request to
4234free a @code{NULL} pointer.
4235
4236@emph{Pragmatics: On some systems @code{free} fails when passed a
4237@code{NULL} pointer.}
4238
4239@value{GDBN} can use the non-portable function @code{alloca} for the
4240allocation of small temporary values (such as strings).
4241
4242@emph{Pragmatics: This function is very non-portable. Some systems
4243restrict the memory being allocated to no more than a few kilobytes.}
4244
4245@value{GDBN} uses the string function @code{xstrdup} and the print
4246function @code{xasprintf}.
4247
4248@emph{Pragmatics: @code{asprintf} and @code{strdup} can fail. Print
4249functions such as @code{sprintf} are very prone to buffer overflow
4250errors.}
4251
4252
4253@subsection Compiler Warnings
56caf160 4254@cindex compiler warnings
af6c57ea
AC
4255
4256With few exceptions, developers should include the configuration option
4257@samp{--enable-gdb-build-warnings=,-Werror} when building @value{GDBN}.
4258The exceptions are listed in the file @file{gdb/MAINTAINERS}.
4259
4260This option causes @value{GDBN} (when built using GCC) to be compiled
4261with a carefully selected list of compiler warning flags. Any warnings
4262from those flags being treated as errors.
4263
4264The current list of warning flags includes:
4265
4266@table @samp
4267@item -Wimplicit
4268Since @value{GDBN} coding standard requires all functions to be declared
4269using a prototype, the flag has the side effect of ensuring that
4270prototyped functions are always visible with out resorting to
4271@samp{-Wstrict-prototypes}.
4272
4273@item -Wreturn-type
4274Such code often appears to work except on instruction set architectures
4275that use register windows.
4276
4277@item -Wcomment
4278
4279@item -Wtrigraphs
4280
4281@item -Wformat
4282Since @value{GDBN} uses the @code{format printf} attribute on all
4283@code{printf} like functions this checks not just @code{printf} calls
4284but also calls to functions such as @code{fprintf_unfiltered}.
4285
4286@item -Wparentheses
4287This warning includes uses of the assignment operator within an
4288@code{if} statement.
4289
4290@item -Wpointer-arith
4291
4292@item -Wuninitialized
4293@end table
4294
4295@emph{Pragmatics: Due to the way that @value{GDBN} is implemented most
4296functions have unused parameters. Consequently the warning
4297@samp{-Wunused-parameter} is precluded from the list. The macro
4298@code{ATTRIBUTE_UNUSED} is not used as it leads to false negatives ---
4299it is not an error to have @code{ATTRIBUTE_UNUSED} on a parameter that
4300is being used. The options @samp{-Wall} and @samp{-Wunused} are also
4301precluded because they both include @samp{-Wunused-parameter}.}
4302
4303@emph{Pragmatics: @value{GDBN} has not simply accepted the warnings
4304enabled by @samp{-Wall -Werror -W...}. Instead it is selecting warnings
4305when and where their benefits can be demonstrated.}
c906108c
SS
4306
4307@subsection Formatting
4308
56caf160 4309@cindex source code formatting
c906108c
SS
4310The standard GNU recommendations for formatting must be followed
4311strictly.
4312
af6c57ea
AC
4313A function declaration should not have its name in column zero. A
4314function definition should have its name in column zero.
4315
4316@example
4317/* Declaration */
4318static void foo (void);
4319/* Definition */
4320void
4321foo (void)
4322@{
4323@}
4324@end example
4325
4326@emph{Pragmatics: This simplifies scripting. Function definitions can
4327be found using @samp{^function-name}.}
c906108c 4328
af6c57ea
AC
4329There must be a space between a function or macro name and the opening
4330parenthesis of its argument list (except for macro definitions, as
4331required by C). There must not be a space after an open paren/bracket
4332or before a close paren/bracket.
c906108c
SS
4333
4334While additional whitespace is generally helpful for reading, do not use
4335more than one blank line to separate blocks, and avoid adding whitespace
af6c57ea
AC
4336after the end of a program line (as of 1/99, some 600 lines had
4337whitespace after the semicolon). Excess whitespace causes difficulties
4338for @code{diff} and @code{patch} utilities.
4339
4340Pointers are declared using the traditional K&R C style:
4341
4342@example
4343void *foo;
4344@end example
4345
4346@noindent
4347and not:
4348
4349@example
4350void * foo;
4351void* foo;
4352@end example
c906108c
SS
4353
4354@subsection Comments
4355
56caf160 4356@cindex comment formatting
c906108c
SS
4357The standard GNU requirements on comments must be followed strictly.
4358
af6c57ea
AC
4359Block comments must appear in the following form, with no @code{/*}- or
4360@code{*/}-only lines, and no leading @code{*}:
c906108c 4361
56caf160 4362@example
c906108c
SS
4363/* Wait for control to return from inferior to debugger. If inferior
4364 gets a signal, we may decide to start it up again instead of
4365 returning. That is why there is a loop in this function. When
4366 this function actually returns it means the inferior should be left
25822942 4367 stopped and @value{GDBN} should read more commands. */
c906108c
SS
4368@end example
4369
4370(Note that this format is encouraged by Emacs; tabbing for a multi-line
56caf160 4371comment works correctly, and @kbd{M-q} fills the block consistently.)
c906108c
SS
4372
4373Put a blank line between the block comments preceding function or
4374variable definitions, and the definition itself.
4375
4376In general, put function-body comments on lines by themselves, rather
4377than trying to fit them into the 20 characters left at the end of a
4378line, since either the comment or the code will inevitably get longer
4379than will fit, and then somebody will have to move it anyhow.
4380
4381@subsection C Usage
4382
56caf160 4383@cindex C data types
c906108c
SS
4384Code must not depend on the sizes of C data types, the format of the
4385host's floating point numbers, the alignment of anything, or the order
4386of evaluation of expressions.
4387
56caf160 4388@cindex function usage
c906108c 4389Use functions freely. There are only a handful of compute-bound areas
56caf160
EZ
4390in @value{GDBN} that might be affected by the overhead of a function
4391call, mainly in symbol reading. Most of @value{GDBN}'s performance is
4392limited by the target interface (whether serial line or system call).
c906108c
SS
4393
4394However, use functions with moderation. A thousand one-line functions
4395are just as hard to understand as a single thousand-line function.
4396
af6c57ea 4397@emph{Macros are bad, M'kay.}
9e678452
CF
4398(But if you have to use a macro, make sure that the macro arguments are
4399protected with parentheses.)
af6c57ea
AC
4400
4401@cindex types
c906108c 4402
af6c57ea
AC
4403Declarations like @samp{struct foo *} should be used in preference to
4404declarations like @samp{typedef struct foo @{ @dots{} @} *foo_ptr}.
4405
4406
4407@subsection Function Prototypes
56caf160 4408@cindex function prototypes
af6c57ea
AC
4409
4410Prototypes must be used when both @emph{declaring} and @emph{defining}
4411a function. Prototypes for @value{GDBN} functions must include both the
4412argument type and name, with the name matching that used in the actual
4413function definition.
c906108c 4414
53a5351d
JM
4415All external functions should have a declaration in a header file that
4416callers include, except for @code{_initialize_*} functions, which must
4417be external so that @file{init.c} construction works, but shouldn't be
4418visible to random source files.
c906108c 4419
af6c57ea
AC
4420Where a source file needs a forward declaration of a static function,
4421that declaration must appear in a block near the top of the source file.
4422
4423
4424@subsection Internal Error Recovery
4425
4426During its execution, @value{GDBN} can encounter two types of errors.
4427User errors and internal errors. User errors include not only a user
4428entering an incorrect command but also problems arising from corrupt
4429object files and system errors when interacting with the target.
4430Internal errors include situtations where @value{GDBN} has detected, at
4431run time, a corrupt or erroneous situtation.
4432
4433When reporting an internal error, @value{GDBN} uses
4434@code{internal_error} and @code{gdb_assert}.
4435
4436@value{GDBN} must not call @code{abort} or @code{assert}.
4437
4438@emph{Pragmatics: There is no @code{internal_warning} function. Either
4439the code detected a user error, recovered from it and issued a
4440@code{warning} or the code failed to correctly recover from the user
4441error and issued an @code{internal_error}.}
4442
4443@subsection File Names
4444
4445Any file used when building the core of @value{GDBN} must be in lower
4446case. Any file used when building the core of @value{GDBN} must be 8.3
4447unique. These requirements apply to both source and generated files.
4448
4449@emph{Pragmatics: The core of @value{GDBN} must be buildable on many
4450platforms including DJGPP and MacOS/HFS. Every time an unfriendly file
4451is introduced to the build process both @file{Makefile.in} and
4452@file{configure.in} need to be modified accordingly. Compare the
4453convoluted conversion process needed to transform @file{COPYING} into
4454@file{copying.c} with the conversion needed to transform
4455@file{version.in} into @file{version.c}.}
4456
4457Any file non 8.3 compliant file (that is not used when building the core
4458of @value{GDBN}) must be added to @file{gdb/config/djgpp/fnchange.lst}.
4459
4460@emph{Pragmatics: This is clearly a compromise.}
4461
4462When @value{GDBN} has a local version of a system header file (ex
4463@file{string.h}) the file name based on the POSIX header prefixed with
4464@file{gdb_} (@file{gdb_string.h}).
4465
4466For other files @samp{-} is used as the separator.
4467
4468
4469@subsection Include Files
4470
4471All @file{.c} files should include @file{defs.h} first.
4472
4473All @file{.c} files should explicitly include the headers for any
4474declarations they refer to. They should not rely on files being
4475included indirectly.
4476
4477With the exception of the global definitions supplied by @file{defs.h},
4478a header file should explictily include the header declaring any
4479@code{typedefs} et.al.@: it refers to.
4480
4481@code{extern} declarations should never appear in @code{.c} files.
4482
4483All include files should be wrapped in:
4484
4485@example
4486#ifndef INCLUDE_FILE_NAME_H
4487#define INCLUDE_FILE_NAME_H
4488header body
4489#endif
4490@end example
4491
c906108c 4492
dab11f21 4493@subsection Clean Design and Portable Implementation
c906108c 4494
56caf160 4495@cindex design
c906108c 4496In addition to getting the syntax right, there's the little question of
25822942 4497semantics. Some things are done in certain ways in @value{GDBN} because long
c906108c
SS
4498experience has shown that the more obvious ways caused various kinds of
4499trouble.
4500
56caf160 4501@cindex assumptions about targets
c906108c
SS
4502You can't assume the byte order of anything that comes from a target
4503(including @var{value}s, object files, and instructions). Such things
56caf160
EZ
4504must be byte-swapped using @code{SWAP_TARGET_AND_HOST} in
4505@value{GDBN}, or one of the swap routines defined in @file{bfd.h},
4506such as @code{bfd_get_32}.
c906108c
SS
4507
4508You can't assume that you know what interface is being used to talk to
4509the target system. All references to the target must go through the
4510current @code{target_ops} vector.
4511
4512You can't assume that the host and target machines are the same machine
4513(except in the ``native'' support modules). In particular, you can't
4514assume that the target machine's header files will be available on the
4515host machine. Target code must bring along its own header files --
4516written from scratch or explicitly donated by their owner, to avoid
4517copyright problems.
4518
56caf160 4519@cindex portability
c906108c
SS
4520Insertion of new @code{#ifdef}'s will be frowned upon. It's much better
4521to write the code portably than to conditionalize it for various
4522systems.
4523
56caf160 4524@cindex system dependencies
c906108c
SS
4525New @code{#ifdef}'s which test for specific compilers or manufacturers
4526or operating systems are unacceptable. All @code{#ifdef}'s should test
4527for features. The information about which configurations contain which
4528features should be segregated into the configuration files. Experience
4529has proven far too often that a feature unique to one particular system
4530often creeps into other systems; and that a conditional based on some
4531predefined macro for your current system will become worthless over
4532time, as new versions of your system come out that behave differently
4533with regard to this feature.
4534
4535Adding code that handles specific architectures, operating systems,
af6c57ea 4536target interfaces, or hosts, is not acceptable in generic code.
c906108c 4537
dab11f21
EZ
4538@cindex portable file name handling
4539@cindex file names, portability
4540One particularly notorious area where system dependencies tend to
4541creep in is handling of file names. The mainline @value{GDBN} code
4542assumes Posix semantics of file names: absolute file names begin with
4543a forward slash @file{/}, slashes are used to separate leading
4544directories, case-sensitive file names. These assumptions are not
4545necessarily true on non-Posix systems such as MS-Windows. To avoid
4546system-dependent code where you need to take apart or construct a file
4547name, use the following portable macros:
4548
4549@table @code
4550@findex HAVE_DOS_BASED_FILE_SYSTEM
4551@item HAVE_DOS_BASED_FILE_SYSTEM
4552This preprocessing symbol is defined to a non-zero value on hosts
4553whose filesystems belong to the MS-DOS/MS-Windows family. Use this
4554symbol to write conditional code which should only be compiled for
4555such hosts.
4556
4557@findex IS_DIR_SEPARATOR
4558@item IS_DIR_SEPARATOR (@var{c}
4559Evaluates to a non-zero value if @var{c} is a directory separator
4560character. On Unix and GNU/Linux systems, only a slash @file{/} is
4561such a character, but on Windows, both @file{/} and @file{\} will
4562pass.
4563
4564@findex IS_ABSOLUTE_PATH
4565@item IS_ABSOLUTE_PATH (@var{file})
4566Evaluates to a non-zero value if @var{file} is an absolute file name.
4567For Unix and GNU/Linux hosts, a name which begins with a slash
4568@file{/} is absolute. On DOS and Windows, @file{d:/foo} and
4569@file{x:\bar} are also absolute file names.
4570
4571@findex FILENAME_CMP
4572@item FILENAME_CMP (@var{f1}, @var{f2})
4573Calls a function which compares file names @var{f1} and @var{f2} as
4574appropriate for the underlying host filesystem. For Posix systems,
4575this simply calls @code{strcmp}; on case-insensitive filesystems it
4576will call @code{strcasecmp} instead.
4577
4578@findex DIRNAME_SEPARATOR
4579@item DIRNAME_SEPARATOR
4580Evaluates to a character which separates directories in
4581@code{PATH}-style lists, typically held in environment variables.
4582This character is @samp{:} on Unix, @samp{;} on DOS and Windows.
4583
4584@findex SLASH_STRING
4585@item SLASH_STRING
4586This evaluates to a constant string you should use to produce an
4587absolute filename from leading directories and the file's basename.
4588@code{SLASH_STRING} is @code{"/"} on most systems, but might be
4589@code{"\\"} for some Windows-based ports.
4590@end table
4591
4592In addition to using these macros, be sure to use portable library
4593functions whenever possible. For example, to extract a directory or a
4594basename part from a file name, use the @code{dirname} and
4595@code{basename} library functions (available in @code{libiberty} for
4596platforms which don't provide them), instead of searching for a slash
4597with @code{strrchr}.
4598
25822942
DB
4599Another way to generalize @value{GDBN} along a particular interface is with an
4600attribute struct. For example, @value{GDBN} has been generalized to handle
56caf160
EZ
4601multiple kinds of remote interfaces---not by @code{#ifdef}s everywhere, but
4602by defining the @code{target_ops} structure and having a current target (as
c906108c
SS
4603well as a stack of targets below it, for memory references). Whenever
4604something needs to be done that depends on which remote interface we are
56caf160
EZ
4605using, a flag in the current target_ops structure is tested (e.g.,
4606@code{target_has_stack}), or a function is called through a pointer in the
c906108c 4607current target_ops structure. In this way, when a new remote interface
56caf160 4608is added, only one module needs to be touched---the one that actually
c906108c
SS
4609implements the new remote interface. Other examples of
4610attribute-structs are BFD access to multiple kinds of object file
25822942 4611formats, or @value{GDBN}'s access to multiple source languages.
c906108c 4612
56caf160
EZ
4613Please avoid duplicating code. For example, in @value{GDBN} 3.x all
4614the code interfacing between @code{ptrace} and the rest of
4615@value{GDBN} was duplicated in @file{*-dep.c}, and so changing
4616something was very painful. In @value{GDBN} 4.x, these have all been
4617consolidated into @file{infptrace.c}. @file{infptrace.c} can deal
4618with variations between systems the same way any system-independent
4619file would (hooks, @code{#if defined}, etc.), and machines which are
4620radically different don't need to use @file{infptrace.c} at all.
c906108c 4621
af6c57ea
AC
4622All debugging code must be controllable using the @samp{set debug
4623@var{module}} command. Do not use @code{printf} to print trace
4624messages. Use @code{fprintf_unfiltered(gdb_stdlog, ...}. Do not use
4625@code{#ifdef DEBUG}.
4626
c906108c 4627
8487521e 4628@node Porting GDB
c906108c 4629
25822942 4630@chapter Porting @value{GDBN}
56caf160 4631@cindex porting to new machines
c906108c 4632
56caf160
EZ
4633Most of the work in making @value{GDBN} compile on a new machine is in
4634specifying the configuration of the machine. This is done in a
4635dizzying variety of header files and configuration scripts, which we
4636hope to make more sensible soon. Let's say your new host is called an
4637@var{xyz} (e.g., @samp{sun4}), and its full three-part configuration
4638name is @code{@var{arch}-@var{xvend}-@var{xos}} (e.g.,
4639@samp{sparc-sun-sunos4}). In particular:
c906108c 4640
56caf160
EZ
4641@itemize @bullet
4642@item
c906108c
SS
4643In the top level directory, edit @file{config.sub} and add @var{arch},
4644@var{xvend}, and @var{xos} to the lists of supported architectures,
4645vendors, and operating systems near the bottom of the file. Also, add
4646@var{xyz} as an alias that maps to
4647@code{@var{arch}-@var{xvend}-@var{xos}}. You can test your changes by
4648running
4649
4650@example
4651./config.sub @var{xyz}
4652@end example
56caf160 4653
c906108c
SS
4654@noindent
4655and
56caf160 4656
c906108c
SS
4657@example
4658./config.sub @code{@var{arch}-@var{xvend}-@var{xos}}
4659@end example
56caf160 4660
c906108c
SS
4661@noindent
4662which should both respond with @code{@var{arch}-@var{xvend}-@var{xos}}
4663and no error messages.
4664
56caf160 4665@noindent
c906108c
SS
4666You need to port BFD, if that hasn't been done already. Porting BFD is
4667beyond the scope of this manual.
4668
56caf160 4669@item
25822942 4670To configure @value{GDBN} itself, edit @file{gdb/configure.host} to recognize
c906108c
SS
4671your system and set @code{gdb_host} to @var{xyz}, and (unless your
4672desired target is already available) also edit @file{gdb/configure.tgt},
4673setting @code{gdb_target} to something appropriate (for instance,
4674@var{xyz}).
4675
56caf160 4676@item
25822942 4677Finally, you'll need to specify and define @value{GDBN}'s host-, native-, and
c906108c
SS
4678target-dependent @file{.h} and @file{.c} files used for your
4679configuration.
56caf160 4680@end itemize
c906108c 4681
25822942 4682@section Configuring @value{GDBN} for Release
c906108c 4683
56caf160
EZ
4684@cindex preparing a release
4685@cindex making a distribution tarball
c906108c
SS
4686From the top level directory (containing @file{gdb}, @file{bfd},
4687@file{libiberty}, and so on):
56caf160 4688
c906108c
SS
4689@example
4690make -f Makefile.in gdb.tar.gz
4691@end example
4692
56caf160 4693@noindent
c906108c
SS
4694This will properly configure, clean, rebuild any files that are
4695distributed pre-built (e.g. @file{c-exp.tab.c} or @file{refcard.ps}),
4696and will then make a tarfile. (If the top level directory has already
4697been configured, you can just do @code{make gdb.tar.gz} instead.)
4698
4699This procedure requires:
56caf160 4700
c906108c 4701@itemize @bullet
56caf160
EZ
4702
4703@item
4704symbolic links;
4705
4706@item
4707@code{makeinfo} (texinfo2 level);
4708
4709@item
4710@TeX{};
4711
4712@item
4713@code{dvips};
4714
4715@item
4716@code{yacc} or @code{bison}.
c906108c 4717@end itemize
56caf160 4718
c906108c
SS
4719@noindent
4720@dots{} and the usual slew of utilities (@code{sed}, @code{tar}, etc.).
4721
4722@subheading TEMPORARY RELEASE PROCEDURE FOR DOCUMENTATION
4723
4724@file{gdb.texinfo} is currently marked up using the texinfo-2 macros,
4725which are not yet a default for anything (but we have to start using
4726them sometime).
4727
4728For making paper, the only thing this implies is the right generation of
4729@file{texinfo.tex} needs to be included in the distribution.
4730
4731For making info files, however, rather than duplicating the texinfo2
4732distribution, generate @file{gdb-all.texinfo} locally, and include the
4733files @file{gdb.info*} in the distribution. Note the plural;
4734@code{makeinfo} will split the document into one overall file and five
4735or so included files.
4736
085dd6e6
JM
4737@node Testsuite
4738
4739@chapter Testsuite
56caf160 4740@cindex test suite
085dd6e6 4741
56caf160
EZ
4742The testsuite is an important component of the @value{GDBN} package.
4743While it is always worthwhile to encourage user testing, in practice
4744this is rarely sufficient; users typically use only a small subset of
4745the available commands, and it has proven all too common for a change
4746to cause a significant regression that went unnoticed for some time.
085dd6e6 4747
56caf160
EZ
4748The @value{GDBN} testsuite uses the DejaGNU testing framework.
4749DejaGNU is built using @code{Tcl} and @code{expect}. The tests
4750themselves are calls to various @code{Tcl} procs; the framework runs all the
4751procs and summarizes the passes and fails.
085dd6e6
JM
4752
4753@section Using the Testsuite
4754
56caf160 4755@cindex running the test suite
25822942 4756To run the testsuite, simply go to the @value{GDBN} object directory (or to the
085dd6e6
JM
4757testsuite's objdir) and type @code{make check}. This just sets up some
4758environment variables and invokes DejaGNU's @code{runtest} script. While
4759the testsuite is running, you'll get mentions of which test file is in use,
4760and a mention of any unexpected passes or fails. When the testsuite is
4761finished, you'll get a summary that looks like this:
56caf160 4762
085dd6e6
JM
4763@example
4764 === gdb Summary ===
4765
4766# of expected passes 6016
4767# of unexpected failures 58
4768# of unexpected successes 5
4769# of expected failures 183
4770# of unresolved testcases 3
4771# of untested testcases 5
4772@end example
56caf160 4773
085dd6e6
JM
4774The ideal test run consists of expected passes only; however, reality
4775conspires to keep us from this ideal. Unexpected failures indicate
56caf160
EZ
4776real problems, whether in @value{GDBN} or in the testsuite. Expected
4777failures are still failures, but ones which have been decided are too
4778hard to deal with at the time; for instance, a test case might work
4779everywhere except on AIX, and there is no prospect of the AIX case
4780being fixed in the near future. Expected failures should not be added
4781lightly, since you may be masking serious bugs in @value{GDBN}.
4782Unexpected successes are expected fails that are passing for some
4783reason, while unresolved and untested cases often indicate some minor
4784catastrophe, such as the compiler being unable to deal with a test
4785program.
4786
4787When making any significant change to @value{GDBN}, you should run the
4788testsuite before and after the change, to confirm that there are no
4789regressions. Note that truly complete testing would require that you
4790run the testsuite with all supported configurations and a variety of
4791compilers; however this is more than really necessary. In many cases
4792testing with a single configuration is sufficient. Other useful
4793options are to test one big-endian (Sparc) and one little-endian (x86)
4794host, a cross config with a builtin simulator (powerpc-eabi,
4795mips-elf), or a 64-bit host (Alpha).
4796
4797If you add new functionality to @value{GDBN}, please consider adding
4798tests for it as well; this way future @value{GDBN} hackers can detect
4799and fix their changes that break the functionality you added.
4800Similarly, if you fix a bug that was not previously reported as a test
4801failure, please add a test case for it. Some cases are extremely
4802difficult to test, such as code that handles host OS failures or bugs
4803in particular versions of compilers, and it's OK not to try to write
4804tests for all of those.
085dd6e6
JM
4805
4806@section Testsuite Organization
4807
56caf160 4808@cindex test suite organization
085dd6e6
JM
4809The testsuite is entirely contained in @file{gdb/testsuite}. While the
4810testsuite includes some makefiles and configury, these are very minimal,
4811and used for little besides cleaning up, since the tests themselves
25822942 4812handle the compilation of the programs that @value{GDBN} will run. The file
085dd6e6 4813@file{testsuite/lib/gdb.exp} contains common utility procs useful for
25822942 4814all @value{GDBN} tests, while the directory @file{testsuite/config} contains
085dd6e6
JM
4815configuration-specific files, typically used for special-purpose
4816definitions of procs like @code{gdb_load} and @code{gdb_start}.
4817
4818The tests themselves are to be found in @file{testsuite/gdb.*} and
4819subdirectories of those. The names of the test files must always end
4820with @file{.exp}. DejaGNU collects the test files by wildcarding
4821in the test directories, so both subdirectories and individual files
4822get chosen and run in alphabetical order.
4823
4824The following table lists the main types of subdirectories and what they
4825are for. Since DejaGNU finds test files no matter where they are
4826located, and since each test file sets up its own compilation and
4827execution environment, this organization is simply for convenience and
4828intelligibility.
4829
56caf160 4830@table @file
085dd6e6 4831@item gdb.base
085dd6e6 4832This is the base testsuite. The tests in it should apply to all
25822942 4833configurations of @value{GDBN} (but generic native-only tests may live here).
085dd6e6 4834The test programs should be in the subset of C that is valid K&R,
56caf160 4835ANSI/ISO, and C++ (@code{#ifdef}s are allowed if necessary, for instance
085dd6e6
JM
4836for prototypes).
4837
4838@item gdb.@var{lang}
56caf160 4839Language-specific tests for any language @var{lang} besides C. Examples are
085dd6e6
JM
4840@file{gdb.c++} and @file{gdb.java}.
4841
4842@item gdb.@var{platform}
085dd6e6
JM
4843Non-portable tests. The tests are specific to a specific configuration
4844(host or target), such as HP-UX or eCos. Example is @file{gdb.hp}, for
4845HP-UX.
4846
4847@item gdb.@var{compiler}
085dd6e6
JM
4848Tests specific to a particular compiler. As of this writing (June
48491999), there aren't currently any groups of tests in this category that
4850couldn't just as sensibly be made platform-specific, but one could
56caf160
EZ
4851imagine a @file{gdb.gcc}, for tests of @value{GDBN}'s handling of GCC
4852extensions.
085dd6e6
JM
4853
4854@item gdb.@var{subsystem}
25822942 4855Tests that exercise a specific @value{GDBN} subsystem in more depth. For
085dd6e6
JM
4856instance, @file{gdb.disasm} exercises various disassemblers, while
4857@file{gdb.stabs} tests pathways through the stabs symbol reader.
085dd6e6
JM
4858@end table
4859
4860@section Writing Tests
56caf160 4861@cindex writing tests
085dd6e6 4862
25822942 4863In many areas, the @value{GDBN} tests are already quite comprehensive; you
085dd6e6
JM
4864should be able to copy existing tests to handle new cases.
4865
4866You should try to use @code{gdb_test} whenever possible, since it
4867includes cases to handle all the unexpected errors that might happen.
4868However, it doesn't cost anything to add new test procedures; for
4869instance, @file{gdb.base/exprs.exp} defines a @code{test_expr} that
4870calls @code{gdb_test} multiple times.
4871
4872Only use @code{send_gdb} and @code{gdb_expect} when absolutely
25822942 4873necessary, such as when @value{GDBN} has several valid responses to a command.
085dd6e6
JM
4874
4875The source language programs do @emph{not} need to be in a consistent
25822942 4876style. Since @value{GDBN} is used to debug programs written in many different
085dd6e6 4877styles, it's worth having a mix of styles in the testsuite; for
25822942 4878instance, some @value{GDBN} bugs involving the display of source lines would
085dd6e6
JM
4879never manifest themselves if the programs used GNU coding style
4880uniformly.
4881
c906108c
SS
4882@node Hints
4883
4884@chapter Hints
4885
4886Check the @file{README} file, it often has useful information that does not
4887appear anywhere else in the directory.
4888
4889@menu
25822942 4890* Getting Started:: Getting started working on @value{GDBN}
33e16fad 4891* Debugging GDB:: Debugging @value{GDBN} with itself
c906108c
SS
4892@end menu
4893
4894@node Getting Started,,, Hints
4895
4896@section Getting Started
4897
25822942 4898@value{GDBN} is a large and complicated program, and if you first starting to
c906108c
SS
4899work on it, it can be hard to know where to start. Fortunately, if you
4900know how to go about it, there are ways to figure out what is going on.
4901
25822942
DB
4902This manual, the @value{GDBN} Internals manual, has information which applies
4903generally to many parts of @value{GDBN}.
c906108c
SS
4904
4905Information about particular functions or data structures are located in
4906comments with those functions or data structures. If you run across a
4907function or a global variable which does not have a comment correctly
25822942 4908explaining what is does, this can be thought of as a bug in @value{GDBN}; feel
c906108c
SS
4909free to submit a bug report, with a suggested comment if you can figure
4910out what the comment should say. If you find a comment which is
4911actually wrong, be especially sure to report that.
4912
4913Comments explaining the function of macros defined in host, target, or
4914native dependent files can be in several places. Sometimes they are
4915repeated every place the macro is defined. Sometimes they are where the
4916macro is used. Sometimes there is a header file which supplies a
4917default definition of the macro, and the comment is there. This manual
4918also documents all the available macros.
4919@c (@pxref{Host Conditionals}, @pxref{Target
4920@c Conditionals}, @pxref{Native Conditionals}, and @pxref{Obsolete
4921@c Conditionals})
4922
56caf160
EZ
4923Start with the header files. Once you have some idea of how
4924@value{GDBN}'s internal symbol tables are stored (see @file{symtab.h},
4925@file{gdbtypes.h}), you will find it much easier to understand the
4926code which uses and creates those symbol tables.
c906108c
SS
4927
4928You may wish to process the information you are getting somehow, to
4929enhance your understanding of it. Summarize it, translate it to another
25822942 4930language, add some (perhaps trivial or non-useful) feature to @value{GDBN}, use
c906108c
SS
4931the code to predict what a test case would do and write the test case
4932and verify your prediction, etc. If you are reading code and your eyes
4933are starting to glaze over, this is a sign you need to use a more active
4934approach.
4935
25822942 4936Once you have a part of @value{GDBN} to start with, you can find more
c906108c
SS
4937specifically the part you are looking for by stepping through each
4938function with the @code{next} command. Do not use @code{step} or you
4939will quickly get distracted; when the function you are stepping through
4940calls another function try only to get a big-picture understanding
4941(perhaps using the comment at the beginning of the function being
4942called) of what it does. This way you can identify which of the
4943functions being called by the function you are stepping through is the
4944one which you are interested in. You may need to examine the data
4945structures generated at each stage, with reference to the comments in
4946the header files explaining what the data structures are supposed to
4947look like.
4948
4949Of course, this same technique can be used if you are just reading the
4950code, rather than actually stepping through it. The same general
4951principle applies---when the code you are looking at calls something
4952else, just try to understand generally what the code being called does,
4953rather than worrying about all its details.
4954
56caf160
EZ
4955@cindex command implementation
4956A good place to start when tracking down some particular area is with
4957a command which invokes that feature. Suppose you want to know how
4958single-stepping works. As a @value{GDBN} user, you know that the
4959@code{step} command invokes single-stepping. The command is invoked
4960via command tables (see @file{command.h}); by convention the function
4961which actually performs the command is formed by taking the name of
4962the command and adding @samp{_command}, or in the case of an
4963@code{info} subcommand, @samp{_info}. For example, the @code{step}
4964command invokes the @code{step_command} function and the @code{info
4965display} command invokes @code{display_info}. When this convention is
4966not followed, you might have to use @code{grep} or @kbd{M-x
4967tags-search} in emacs, or run @value{GDBN} on itself and set a
4968breakpoint in @code{execute_command}.
4969
4970@cindex @code{bug-gdb} mailing list
c906108c
SS
4971If all of the above fail, it may be appropriate to ask for information
4972on @code{bug-gdb}. But @emph{never} post a generic question like ``I was
4973wondering if anyone could give me some tips about understanding
25822942 4974@value{GDBN}''---if we had some magic secret we would put it in this manual.
c906108c
SS
4975Suggestions for improving the manual are always welcome, of course.
4976
33e16fad 4977@node Debugging GDB,,,Hints
c906108c 4978
25822942 4979@section Debugging @value{GDBN} with itself
56caf160 4980@cindex debugging @value{GDBN}
c906108c 4981
25822942 4982If @value{GDBN} is limping on your machine, this is the preferred way to get it
c906108c
SS
4983fully functional. Be warned that in some ancient Unix systems, like
4984Ultrix 4.2, a program can't be running in one process while it is being
56caf160 4985debugged in another. Rather than typing the command @kbd{@w{./gdb
c906108c 4986./gdb}}, which works on Suns and such, you can copy @file{gdb} to
56caf160 4987@file{gdb2} and then type @kbd{@w{./gdb ./gdb2}}.
c906108c 4988
25822942 4989When you run @value{GDBN} in the @value{GDBN} source directory, it will read a
c906108c
SS
4990@file{.gdbinit} file that sets up some simple things to make debugging
4991gdb easier. The @code{info} command, when executed without a subcommand
25822942 4992in a @value{GDBN} being debugged by gdb, will pop you back up to the top level
c906108c
SS
4993gdb. See @file{.gdbinit} for details.
4994
4995If you use emacs, you will probably want to do a @code{make TAGS} after
4996you configure your distribution; this will put the machine dependent
4997routines for your local machine where they will be accessed first by
4998@kbd{M-.}
4999
25822942 5000Also, make sure that you've either compiled @value{GDBN} with your local cc, or
c906108c
SS
5001have run @code{fixincludes} if you are compiling with gcc.
5002
5003@section Submitting Patches
5004
56caf160 5005@cindex submitting patches
c906108c 5006Thanks for thinking of offering your changes back to the community of
25822942 5007@value{GDBN} users. In general we like to get well designed enhancements.
c906108c
SS
5008Thanks also for checking in advance about the best way to transfer the
5009changes.
5010
25822942
DB
5011The @value{GDBN} maintainers will only install ``cleanly designed'' patches.
5012This manual summarizes what we believe to be clean design for @value{GDBN}.
c906108c
SS
5013
5014If the maintainers don't have time to put the patch in when it arrives,
5015or if there is any question about a patch, it goes into a large queue
5016with everyone else's patches and bug reports.
5017
56caf160 5018@cindex legal papers for code contributions
c906108c
SS
5019The legal issue is that to incorporate substantial changes requires a
5020copyright assignment from you and/or your employer, granting ownership
5021of the changes to the Free Software Foundation. You can get the
9e0b60a8
JM
5022standard documents for doing this by sending mail to @code{gnu@@gnu.org}
5023and asking for it. We recommend that people write in "All programs
5024owned by the Free Software Foundation" as "NAME OF PROGRAM", so that
56caf160
EZ
5025changes in many programs (not just @value{GDBN}, but GAS, Emacs, GCC,
5026etc) can be
9e0b60a8 5027contributed with only one piece of legalese pushed through the
be9c6c35 5028bureaucracy and filed with the FSF. We can't start merging changes until
9e0b60a8
JM
5029this paperwork is received by the FSF (their rules, which we follow
5030since we maintain it for them).
c906108c
SS
5031
5032Technically, the easiest way to receive changes is to receive each
56caf160
EZ
5033feature as a small context diff or unidiff, suitable for @code{patch}.
5034Each message sent to me should include the changes to C code and
5035header files for a single feature, plus @file{ChangeLog} entries for
5036each directory where files were modified, and diffs for any changes
5037needed to the manuals (@file{gdb/doc/gdb.texinfo} or
5038@file{gdb/doc/gdbint.texinfo}). If there are a lot of changes for a
5039single feature, they can be split down into multiple messages.
9e0b60a8
JM
5040
5041In this way, if we read and like the feature, we can add it to the
c906108c 5042sources with a single patch command, do some testing, and check it in.
56caf160
EZ
5043If you leave out the @file{ChangeLog}, we have to write one. If you leave
5044out the doc, we have to puzzle out what needs documenting. Etc., etc.
c906108c 5045
9e0b60a8
JM
5046The reason to send each change in a separate message is that we will not
5047install some of the changes. They'll be returned to you with questions
5048or comments. If we're doing our job correctly, the message back to you
c906108c 5049will say what you have to fix in order to make the change acceptable.
9e0b60a8
JM
5050The reason to have separate messages for separate features is so that
5051the acceptable changes can be installed while one or more changes are
5052being reworked. If multiple features are sent in a single message, we
5053tend to not put in the effort to sort out the acceptable changes from
5054the unacceptable, so none of the features get installed until all are
5055acceptable.
5056
5057If this sounds painful or authoritarian, well, it is. But we get a lot
5058of bug reports and a lot of patches, and many of them don't get
5059installed because we don't have the time to finish the job that the bug
c906108c
SS
5060reporter or the contributor could have done. Patches that arrive
5061complete, working, and well designed, tend to get installed on the day
9e0b60a8
JM
5062they arrive. The others go into a queue and get installed as time
5063permits, which, since the maintainers have many demands to meet, may not
5064be for quite some time.
c906108c 5065
56caf160
EZ
5066Please send patches directly to
5067@email{gdb-patches@@sourceware.cygnus.com, the @value{GDBN} maintainers}.
c906108c
SS
5068
5069@section Obsolete Conditionals
56caf160 5070@cindex obsolete code
c906108c 5071
25822942 5072Fragments of old code in @value{GDBN} sometimes reference or set the following
c906108c
SS
5073configuration macros. They should not be used by new code, and old uses
5074should be removed as those parts of the debugger are otherwise touched.
5075
5076@table @code
c906108c
SS
5077@item STACK_END_ADDR
5078This macro used to define where the end of the stack appeared, for use
5079in interpreting core file formats that don't record this address in the
25822942
DB
5080core file itself. This information is now configured in BFD, and @value{GDBN}
5081gets the info portably from there. The values in @value{GDBN}'s configuration
c906108c 5082files should be moved into BFD configuration files (if needed there),
25822942 5083and deleted from all of @value{GDBN}'s config files.
c906108c
SS
5084
5085Any @file{@var{foo}-xdep.c} file that references STACK_END_ADDR
5086is so old that it has never been converted to use BFD. Now that's old!
5087
5088@item PYRAMID_CONTROL_FRAME_DEBUGGING
5089pyr-xdep.c
5090@item PYRAMID_CORE
5091pyr-xdep.c
5092@item PYRAMID_PTRACE
5093pyr-xdep.c
5094
5095@item REG_STACK_SEGMENT
5096exec.c
5097
5098@end table
5099
56caf160
EZ
5100@node Index
5101@unnumbered Index
5102
5103@printindex cp
5104
449f3b6c
AC
5105@c TeX can handle the contents at the start but makeinfo 3.12 can not
5106@ifinfo
c906108c 5107@contents
449f3b6c
AC
5108@end ifinfo
5109@ifhtml
5110@contents
5111@end ifhtml
5112
c906108c 5113@bye
This page took 0.358189 seconds and 4 git commands to generate.