* exec.c (xfer_memory): Add attrib argument.
[deliverable/binutils-gdb.git] / gdb / doc / gdbint.texinfo
CommitLineData
c906108c
SS
1\input texinfo
2@setfilename gdbint.info
25822942 3@include gdb-cfg.texi
c906108c
SS
4@ifinfo
5@format
6START-INFO-DIR-ENTRY
7* Gdb-Internals: (gdbint). The GNU debugger's internals.
8END-INFO-DIR-ENTRY
9@end format
10@end ifinfo
11
12@ifinfo
25822942 13This file documents the internals of the GNU debugger @value{GDBN}.
c906108c
SS
14
15Copyright 1990-1999 Free Software Foundation, Inc.
16Contributed by Cygnus Solutions. Written by John Gilmore.
17Second Edition by Stan Shebs.
18
19Permission is granted to make and distribute verbatim copies of this
20manual provided the copyright notice and this permission notice are
21preserved on all copies.
22
23@ignore
24Permission is granted to process this file through Tex and print the
25results, provided the printed document carries copying permission notice
26identical to this one except for the removal of this paragraph (this
27paragraph not being relevant to the printed manual).
28
29@end ignore
30Permission is granted to copy or distribute modified versions of this
31manual under the terms of the GPL (for which purpose this text may be
32regarded as a program in the language TeX).
33@end ifinfo
34
35@setchapternewpage off
25822942 36@settitle @value{GDBN} Internals
c906108c
SS
37
38@titlepage
25822942 39@title @value{GDBN} Internals
c906108c
SS
40@subtitle{A guide to the internals of the GNU debugger}
41@author John Gilmore
42@author Cygnus Solutions
43@author Second Edition:
44@author Stan Shebs
45@author Cygnus Solutions
46@page
47@tex
48\def\$#1${{#1}} % Kluge: collect RCS revision info without $...$
49\xdef\manvers{\$Revision$} % For use in headers, footers too
50{\parskip=0pt
51\hfill Cygnus Solutions\par
52\hfill \manvers\par
53\hfill \TeX{}info \texinfoversion\par
54}
55@end tex
56
57@vskip 0pt plus 1filll
58Copyright @copyright{} 1990-1999 Free Software Foundation, Inc.
59
60Permission is granted to make and distribute verbatim copies of
61this manual provided the copyright notice and this permission notice
62are preserved on all copies.
63
64@end titlepage
65
449f3b6c
AC
66@c TeX can handle the contents at the start but makeinfo 3.12 can not
67@iftex
68@contents
69@end iftex
70
c906108c
SS
71@node Top
72@c Perhaps this should be the title of the document (but only for info,
73@c not for TeX). Existing GNU manuals seem inconsistent on this point.
74@top Scope of this Document
75
25822942
DB
76This document documents the internals of the GNU debugger, @value{GDBN}. It
77includes description of @value{GDBN}'s key algorithms and operations, as well
78as the mechanisms that adapt @value{GDBN} to specific hosts and targets.
c906108c
SS
79
80@menu
81* Requirements::
82* Overall Structure::
83* Algorithms::
84* User Interface::
85* Symbol Handling::
86* Language Support::
87* Host Definition::
88* Target Architecture Definition::
89* Target Vector Definition::
90* Native Debugging::
91* Support Libraries::
92* Coding::
93* Porting GDB::
085dd6e6 94* Testsuite::
c906108c
SS
95* Hints::
96@end menu
97
98@node Requirements
99
100@chapter Requirements
101
102Before diving into the internals, you should understand the formal
25822942
DB
103requirements and other expectations for @value{GDBN}. Although some of these may
104seem obvious, there have been proposals for @value{GDBN} that have run counter to
c906108c
SS
105these requirements.
106
25822942 107First of all, @value{GDBN} is a debugger. It's not designed to be a front panel
c906108c
SS
108for embedded systems. It's not a text editor. It's not a shell. It's
109not a programming environment.
110
25822942 111@value{GDBN} is an interactive tool. Although a batch mode is available, @value{GDBN}'s
c906108c
SS
112primary role is to interact with a human programmer.
113
25822942 114@value{GDBN} should be responsive to the user. A programmer hot on the trail of
c906108c
SS
115a nasty bug, and operating under a looming deadline, is going to be very
116impatient of everything, including the response time to debugger
117commands.
118
25822942 119@value{GDBN} should be relatively permissive, such as for expressions. While the
c906108c
SS
120compiler should be picky (or have the option to be made picky), since
121source code lives for a long time usually, the programmer doing
122debugging shouldn't be spending time figuring out to mollify the
123debugger.
124
25822942 125@value{GDBN} will be called upon to deal with really large programs. Executable
c906108c
SS
126sizes of 50 to 100 megabytes occur regularly, and we've heard reports of
127programs approaching 1 gigabyte in size.
128
25822942
DB
129@value{GDBN} should be able to run everywhere. No other debugger is available
130for even half as many configurations as @value{GDBN} supports.
c906108c
SS
131
132
133@node Overall Structure
134
135@chapter Overall Structure
136
25822942 137@value{GDBN} consists of three major subsystems: user interface, symbol handling
c906108c
SS
138(the ``symbol side''), and target system handling (the ``target side'').
139
2e685b93 140The user interface consists of several actual interfaces, plus
c906108c
SS
141supporting code.
142
143The symbol side consists of object file readers, debugging info
144interpreters, symbol table management, source language expression
145parsing, type and value printing.
146
147The target side consists of execution control, stack frame analysis, and
148physical target manipulation.
149
150The target side/symbol side division is not formal, and there are a
151number of exceptions. For instance, core file support involves symbolic
152elements (the basic core file reader is in BFD) and target elements (it
153supplies the contents of memory and the values of registers). Instead,
154this division is useful for understanding how the minor subsystems
155should fit together.
156
157@section The Symbol Side
158
25822942
DB
159The symbolic side of @value{GDBN} can be thought of as ``everything you can do in
160@value{GDBN} without having a live program running''. For instance, you can look
c906108c
SS
161at the types of variables, and evaluate many kinds of expressions.
162
163@section The Target Side
164
25822942 165The target side of @value{GDBN} is the ``bits and bytes manipulator''. Although
c906108c
SS
166it may make reference to symbolic info here and there, most of the
167target side will run with only a stripped executable available -- or
168even no executable at all, in remote debugging cases.
169
170Operations such as disassembly, stack frame crawls, and register
171display, are able to work with no symbolic info at all. In some cases,
25822942 172such as disassembly, @value{GDBN} will use symbolic info to present addresses
c906108c
SS
173relative to symbols rather than as raw numbers, but it will work either
174way.
175
176@section Configurations
177
25822942 178@dfn{Host} refers to attributes of the system where @value{GDBN} runs.
c906108c
SS
179@dfn{Target} refers to the system where the program being debugged
180executes. In most cases they are the same machine, in which case a
181third type of @dfn{Native} attributes come into play.
182
183Defines and include files needed to build on the host are host support.
184Examples are tty support, system defined types, host byte order, host
185float format.
186
187Defines and information needed to handle the target format are target
188dependent. Examples are the stack frame format, instruction set,
189breakpoint instruction, registers, and how to set up and tear down the stack
190to call a function.
191
192Information that is only needed when the host and target are the same,
193is native dependent. One example is Unix child process support; if the
194host and target are not the same, doing a fork to start the target
195process is a bad idea. The various macros needed for finding the
196registers in the @code{upage}, running @code{ptrace}, and such are all
197in the native-dependent files.
198
199Another example of native-dependent code is support for features that
200are really part of the target environment, but which require
201@code{#include} files that are only available on the host system. Core
202file handling and @code{setjmp} handling are two common cases.
203
25822942 204When you want to make @value{GDBN} work ``native'' on a particular machine, you
c906108c
SS
205have to include all three kinds of information.
206
207
208@node Algorithms
209
210@chapter Algorithms
211
25822942 212@value{GDBN} uses a number of debugging-specific algorithms. They are often not
c906108c
SS
213very complicated, but get lost in the thicket of special cases and
214real-world issues. This chapter describes the basic algorithms and
215mentions some of the specific target definitions that they use.
216
217@section Frames
218
25822942 219A frame is a construct that @value{GDBN} uses to keep track of calling and called
c906108c
SS
220functions.
221
222@code{FRAME_FP} in the machine description has no meaning to the
25822942 223machine-independent part of @value{GDBN}, except that it is used when setting up
c906108c
SS
224a new frame from scratch, as follows:
225
226@example
227 create_new_frame (read_register (FP_REGNUM), read_pc ()));
228@end example
229
230Other than that, all the meaning imparted to @code{FP_REGNUM} is
231imparted by the machine-dependent code. So, @code{FP_REGNUM} can have
232any value that is convenient for the code that creates new frames.
233(@code{create_new_frame} calls @code{INIT_EXTRA_FRAME_INFO} if it is
234defined; that is where you should use the @code{FP_REGNUM} value, if
235your frames are nonstandard.)
236
25822942
DB
237Given a @value{GDBN} frame, define @code{FRAME_CHAIN} to determine the address of
238the calling function's frame. This will be used to create a new @value{GDBN}
c906108c
SS
239frame struct, and then @code{INIT_EXTRA_FRAME_INFO} and
240@code{INIT_FRAME_PC} will be called for the new frame.
241
242@section Breakpoint Handling
243
244In general, a breakpoint is a user-designated location in the program
245where the user wants to regain control if program execution ever reaches
246that location.
247
248There are two main ways to implement breakpoints; either as ``hardware''
249breakpoints or as ``software'' breakpoints.
250
251Hardware breakpoints are sometimes available as a builtin debugging
252features with some chips. Typically these work by having dedicated
253register into which the breakpoint address may be stored. If the PC
254ever matches a value in a breakpoint registers, the CPU raises an
25822942 255exception and reports it to @value{GDBN}. Another possibility is when an
c906108c
SS
256emulator is in use; many emulators include circuitry that watches the
257address lines coming out from the processor, and force it to stop if the
258address matches a breakpoint's address. A third possibility is that the
259target already has the ability to do breakpoints somehow; for instance,
260a ROM monitor may do its own software breakpoints. So although these
25822942
DB
261are not literally ``hardware breakpoints'', from @value{GDBN}'s point of view
262they work the same; @value{GDBN} need not do nothing more than set the breakpoint
c906108c
SS
263and wait for something to happen.
264
265Since they depend on hardware resources, hardware breakpoints may be
25822942 266limited in number; when the user asks for more, @value{GDBN} will start trying to
c906108c
SS
267set software breakpoints.
268
25822942
DB
269Software breakpoints require @value{GDBN} to do somewhat more work. The basic
270theory is that @value{GDBN} will replace a program instruction with a trap,
7be570e7 271illegal divide, or some other instruction that will cause an exception,
25822942
DB
272and then when it's encountered, @value{GDBN} will take the exception and stop the
273program. When the user says to continue, @value{GDBN} will restore the original
c906108c
SS
274instruction, single-step, re-insert the trap, and continue on.
275
276Since it literally overwrites the program being tested, the program area
277must be writeable, so this technique won't work on programs in ROM. It
278can also distort the behavior of programs that examine themselves,
279although the situation would be highly unusual.
280
281Also, the software breakpoint instruction should be the smallest size of
282instruction, so it doesn't overwrite an instruction that might be a jump
283target, and cause disaster when the program jumps into the middle of the
284breakpoint instruction. (Strictly speaking, the breakpoint must be no
285larger than the smallest interval between instructions that may be jump
286targets; perhaps there is an architecture where only even-numbered
287instructions may jumped to.) Note that it's possible for an instruction
288set not to have any instructions usable for a software breakpoint,
289although in practice only the ARC has failed to define such an
290instruction.
291
292The basic definition of the software breakpoint is the macro
293@code{BREAKPOINT}.
294
295Basic breakpoint object handling is in @file{breakpoint.c}. However,
296much of the interesting breakpoint action is in @file{infrun.c}.
297
298@section Single Stepping
299
300@section Signal Handling
301
302@section Thread Handling
303
304@section Inferior Function Calls
305
306@section Longjmp Support
307
25822942 308@value{GDBN} has support for figuring out that the target is doing a
c906108c
SS
309@code{longjmp} and for stopping at the target of the jump, if we are
310stepping. This is done with a few specialized internal breakpoints,
311which are visible in the @code{maint info breakpoint} command.
312
313To make this work, you need to define a macro called
314@code{GET_LONGJMP_TARGET}, which will examine the @code{jmp_buf}
315structure and extract the longjmp target address. Since @code{jmp_buf}
316is target specific, you will need to define it in the appropriate
317@file{tm-@var{xyz}.h} file. Look in @file{tm-sun4os4.h} and
318@file{sparc-tdep.c} for examples of how to do this.
319
320@node User Interface
321
322@chapter User Interface
323
25822942 324@value{GDBN} has several user interfaces. Although the command-line interface
c906108c
SS
325is the most common and most familiar, there are others.
326
327@section Command Interpreter
328
25822942 329The command interpreter in @value{GDBN} is fairly simple. It is designed to
c906108c
SS
330allow for the set of commands to be augmented dynamically, and also
331has a recursive subcommand capability, where the first argument to
332a command may itself direct a lookup on a different command list.
333
334For instance, the @code{set} command just starts a lookup on the
335@code{setlist} command list, while @code{set thread} recurses
336to the @code{set_thread_cmd_list}.
337
338To add commands in general, use @code{add_cmd}. @code{add_com} adds to
339the main command list, and should be used for those commands. The usual
cfeada60
FN
340place to add commands is in the @code{_initialize_@var{xyz}} routines at
341the ends of most source files.
342
343Before removing commands from the command set it is a good idea to
344deprecate them for some time. Use @code{deprecate_cmd} on commands or
345aliases to set the deprecated flag. @code{deprecate_cmd} takes a
346@code{struct cmd_list_element} as it's first argument. You can use the
347return value from @code{add_com} or @code{add_cmd} to deprecate the
348command immediately after it is created.
349
350The first time a comamnd is used the user will be warned and offered a
351replacement (if one exists). Note that the replacement string passed to
352@code{deprecate_cmd} should be the full name of the command, i.e. the
353entire string the user should type at the command line.
c906108c
SS
354
355@section Console Printing
356
357@section TUI
358
359@section libgdb
360
361@code{libgdb} was an abortive project of years ago. The theory was to
25822942 362provide an API to @value{GDBN}'s functionality.
c906108c
SS
363
364@node Symbol Handling
365
366@chapter Symbol Handling
367
25822942 368Symbols are a key part of @value{GDBN}'s operation. Symbols include variables,
c906108c
SS
369functions, and types.
370
371@section Symbol Reading
372
25822942
DB
373@value{GDBN} reads symbols from ``symbol files''. The usual symbol file is the
374file containing the program which @value{GDBN} is debugging. @value{GDBN} can be directed
c906108c
SS
375to use a different file for symbols (with the @code{symbol-file}
376command), and it can also read more symbols via the ``add-file'' and
377``load'' commands, or while reading symbols from shared libraries.
378
379Symbol files are initially opened by code in @file{symfile.c} using the
380BFD library. BFD identifies the type of the file by examining its
96baa820 381header. @code{find_sym_fns} then uses this identification to locate a
c906108c
SS
382set of symbol-reading functions.
383
25822942 384Symbol reading modules identify themselves to @value{GDBN} by calling
c906108c
SS
385@code{add_symtab_fns} during their module initialization. The argument
386to @code{add_symtab_fns} is a @code{struct sym_fns} which contains the
387name (or name prefix) of the symbol format, the length of the prefix,
388and pointers to four functions. These functions are called at various
389times to process symbol-files whose identification matches the specified
390prefix.
391
392The functions supplied by each module are:
393
394@table @code
395@item @var{xyz}_symfile_init(struct sym_fns *sf)
396
397Called from @code{symbol_file_add} when we are about to read a new
398symbol file. This function should clean up any internal state (possibly
399resulting from half-read previous files, for example) and prepare to
400read a new symbol file. Note that the symbol file which we are reading
401might be a new "main" symbol file, or might be a secondary symbol file
402whose symbols are being added to the existing symbol table.
403
404The argument to @code{@var{xyz}_symfile_init} is a newly allocated
405@code{struct sym_fns} whose @code{bfd} field contains the BFD for the
406new symbol file being read. Its @code{private} field has been zeroed,
407and can be modified as desired. Typically, a struct of private
408information will be @code{malloc}'d, and a pointer to it will be placed
409in the @code{private} field.
410
411There is no result from @code{@var{xyz}_symfile_init}, but it can call
412@code{error} if it detects an unavoidable problem.
413
414@item @var{xyz}_new_init()
415
416Called from @code{symbol_file_add} when discarding existing symbols.
417This function need only handle the symbol-reading module's internal
25822942 418state; the symbol table data structures visible to the rest of @value{GDBN} will
c906108c
SS
419be discarded by @code{symbol_file_add}. It has no arguments and no
420result. It may be called after @code{@var{xyz}_symfile_init}, if a new
421symbol table is being read, or may be called alone if all symbols are
422simply being discarded.
423
424@item @var{xyz}_symfile_read(struct sym_fns *sf, CORE_ADDR addr, int mainline)
425
426Called from @code{symbol_file_add} to actually read the symbols from a
427symbol-file into a set of psymtabs or symtabs.
428
429@code{sf} points to the struct sym_fns originally passed to
430@code{@var{xyz}_sym_init} for possible initialization. @code{addr} is
431the offset between the file's specified start address and its true
432address in memory. @code{mainline} is 1 if this is the main symbol
433table being read, and 0 if a secondary symbol file (e.g. shared library
434or dynamically loaded file) is being read.@refill
435@end table
436
437In addition, if a symbol-reading module creates psymtabs when
438@var{xyz}_symfile_read is called, these psymtabs will contain a pointer
439to a function @code{@var{xyz}_psymtab_to_symtab}, which can be called
25822942 440from any point in the @value{GDBN} symbol-handling code.
c906108c
SS
441
442@table @code
443@item @var{xyz}_psymtab_to_symtab (struct partial_symtab *pst)
444
445Called from @code{psymtab_to_symtab} (or the PSYMTAB_TO_SYMTAB macro) if
446the psymtab has not already been read in and had its @code{pst->symtab}
447pointer set. The argument is the psymtab to be fleshed-out into a
448symtab. Upon return, pst->readin should have been set to 1, and
449pst->symtab should contain a pointer to the new corresponding symtab, or
450zero if there were no symbols in that part of the symbol file.
451@end table
452
453@section Partial Symbol Tables
454
25822942 455@value{GDBN} has three types of symbol tables.
c906108c
SS
456
457@itemize @bullet
458
459@item full symbol tables (symtabs). These contain the main information
460about symbols and addresses.
461
462@item partial symbol tables (psymtabs). These contain enough
463information to know when to read the corresponding part of the full
464symbol table.
465
466@item minimal symbol tables (msymtabs). These contain information
467gleaned from non-debugging symbols.
468
469@end itemize
470
471This section describes partial symbol tables.
472
473A psymtab is constructed by doing a very quick pass over an executable
474file's debugging information. Small amounts of information are
475extracted -- enough to identify which parts of the symbol table will
476need to be re-read and fully digested later, when the user needs the
25822942 477information. The speed of this pass causes @value{GDBN} to start up very
c906108c
SS
478quickly. Later, as the detailed rereading occurs, it occurs in small
479pieces, at various times, and the delay therefrom is mostly invisible to
480the user.
481@c (@xref{Symbol Reading}.)
482
483The symbols that show up in a file's psymtab should be, roughly, those
484visible to the debugger's user when the program is not running code from
485that file. These include external symbols and types, static symbols and
486types, and enum values declared at file scope.
487
488The psymtab also contains the range of instruction addresses that the
489full symbol table would represent.
490
491The idea is that there are only two ways for the user (or much of the
492code in the debugger) to reference a symbol:
493
494@itemize @bullet
495
496@item by its address
497(e.g. execution stops at some address which is inside a function in this
498file). The address will be noticed to be in the range of this psymtab,
499and the full symtab will be read in. @code{find_pc_function},
500@code{find_pc_line}, and other @code{find_pc_@dots{}} functions handle
501this.
502
503@item by its name
504(e.g. the user asks to print a variable, or set a breakpoint on a
505function). Global names and file-scope names will be found in the
506psymtab, which will cause the symtab to be pulled in. Local names will
507have to be qualified by a global name, or a file-scope name, in which
508case we will have already read in the symtab as we evaluated the
509qualifier. Or, a local symbol can be referenced when we are "in" a
510local scope, in which case the first case applies. @code{lookup_symbol}
511does most of the work here.
512
513@end itemize
514
515The only reason that psymtabs exist is to cause a symtab to be read in
516at the right moment. Any symbol that can be elided from a psymtab,
517while still causing that to happen, should not appear in it. Since
518psymtabs don't have the idea of scope, you can't put local symbols in
519them anyway. Psymtabs don't have the idea of the type of a symbol,
520either, so types need not appear, unless they will be referenced by
521name.
522
25822942 523It is a bug for @value{GDBN} to behave one way when only a psymtab has been read,
c906108c
SS
524and another way if the corresponding symtab has been read in. Such bugs
525are typically caused by a psymtab that does not contain all the visible
526symbols, or which has the wrong instruction address ranges.
527
528The psymtab for a particular section of a symbol-file (objfile) could be
529thrown away after the symtab has been read in. The symtab should always
530be searched before the psymtab, so the psymtab will never be used (in a
531bug-free environment). Currently, psymtabs are allocated on an obstack,
532and all the psymbols themselves are allocated in a pair of large arrays
533on an obstack, so there is little to be gained by trying to free them
534unless you want to do a lot more work.
535
536@section Types
537
538Fundamental Types (e.g., FT_VOID, FT_BOOLEAN).
539
25822942 540These are the fundamental types that @value{GDBN} uses internally. Fundamental
c906108c
SS
541types from the various debugging formats (stabs, ELF, etc) are mapped
542into one of these. They are basically a union of all fundamental types
25822942 543that gdb knows about for all the languages that @value{GDBN} knows about.
c906108c
SS
544
545Type Codes (e.g., TYPE_CODE_PTR, TYPE_CODE_ARRAY).
546
25822942 547Each time @value{GDBN} builds an internal type, it marks it with one of these
c906108c
SS
548types. The type may be a fundamental type, such as TYPE_CODE_INT, or a
549derived type, such as TYPE_CODE_PTR which is a pointer to another type.
550Typically, several FT_* types map to one TYPE_CODE_* type, and are
551distinguished by other members of the type struct, such as whether the
552type is signed or unsigned, and how many bits it uses.
553
554Builtin Types (e.g., builtin_type_void, builtin_type_char).
555
556These are instances of type structs that roughly correspond to
25822942 557fundamental types and are created as global types for @value{GDBN} to use for
c906108c
SS
558various ugly historical reasons. We eventually want to eliminate these.
559Note for example that builtin_type_int initialized in gdbtypes.c is
560basically the same as a TYPE_CODE_INT type that is initialized in
561c-lang.c for an FT_INTEGER fundamental type. The difference is that the
562builtin_type is not associated with any particular objfile, and only one
563instance exists, while c-lang.c builds as many TYPE_CODE_INT types as
564needed, with each one associated with some particular objfile.
565
566@section Object File Formats
567
568@subsection a.out
569
570The @file{a.out} format is the original file format for Unix. It
571consists of three sections: text, data, and bss, which are for program
572code, initialized data, and uninitialized data, respectively.
573
574The @file{a.out} format is so simple that it doesn't have any reserved
575place for debugging information. (Hey, the original Unix hackers used
576@file{adb}, which is a machine-language debugger.) The only debugging
577format for @file{a.out} is stabs, which is encoded as a set of normal
578symbols with distinctive attributes.
579
580The basic @file{a.out} reader is in @file{dbxread.c}.
581
582@subsection COFF
583
584The COFF format was introduced with System V Release 3 (SVR3) Unix.
585COFF files may have multiple sections, each prefixed by a header. The
586number of sections is limited.
587
588The COFF specification includes support for debugging. Although this
589was a step forward, the debugging information was woefully limited. For
590instance, it was not possible to represent code that came from an
591included file.
592
593The COFF reader is in @file{coffread.c}.
594
595@subsection ECOFF
596
597ECOFF is an extended COFF originally introduced for Mips and Alpha
598workstations.
599
600The basic ECOFF reader is in @file{mipsread.c}.
601
602@subsection XCOFF
603
604The IBM RS/6000 running AIX uses an object file format called XCOFF.
605The COFF sections, symbols, and line numbers are used, but debugging
606symbols are dbx-style stabs whose strings are located in the
607@samp{.debug} section (rather than the string table). For more
608information, see @xref{Top,,,stabs,The Stabs Debugging Format}.
609
610The shared library scheme has a clean interface for figuring out what
611shared libraries are in use, but the catch is that everything which
612refers to addresses (symbol tables and breakpoints at least) needs to be
613relocated for both shared libraries and the main executable. At least
614using the standard mechanism this can only be done once the program has
615been run (or the core file has been read).
616
617@subsection PE
618
619Windows 95 and NT use the PE (Portable Executable) format for their
620executables. PE is basically COFF with additional headers.
621
25822942 622While BFD includes special PE support, @value{GDBN} needs only the basic
c906108c
SS
623COFF reader.
624
625@subsection ELF
626
627The ELF format came with System V Release 4 (SVR4) Unix. ELF is similar
628to COFF in being organized into a number of sections, but it removes
629many of COFF's limitations.
630
631The basic ELF reader is in @file{elfread.c}.
632
633@subsection SOM
634
635SOM is HP's object file and debug format (not to be confused with IBM's
636SOM, which is a cross-language ABI).
637
638The SOM reader is in @file{hpread.c}.
639
640@subsection Other File Formats
641
25822942 642Other file formats that have been supported by @value{GDBN} include Netware
c906108c
SS
643Loadable Modules (@file{nlmread.c}.
644
645@section Debugging File Formats
646
647This section describes characteristics of debugging information that
648are independent of the object file format.
649
650@subsection stabs
651
652@code{stabs} started out as special symbols within the @code{a.out}
653format. Since then, it has been encapsulated into other file
654formats, such as COFF and ELF.
655
656While @file{dbxread.c} does some of the basic stab processing,
657including for encapsulated versions, @file{stabsread.c} does
658the real work.
659
660@subsection COFF
661
662The basic COFF definition includes debugging information. The level
663of support is minimal and non-extensible, and is not often used.
664
665@subsection Mips debug (Third Eye)
666
667ECOFF includes a definition of a special debug format.
668
669The file @file{mdebugread.c} implements reading for this format.
670
671@subsection DWARF 1
672
673DWARF 1 is a debugging format that was originally designed to be
674used with ELF in SVR4 systems.
675
676@c CHILL_PRODUCER
677@c GCC_PRODUCER
678@c GPLUS_PRODUCER
679@c LCC_PRODUCER
680@c If defined, these are the producer strings in a DWARF 1 file. All of
681@c these have reasonable defaults already.
682
683The DWARF 1 reader is in @file{dwarfread.c}.
684
685@subsection DWARF 2
686
687DWARF 2 is an improved but incompatible version of DWARF 1.
688
689The DWARF 2 reader is in @file{dwarf2read.c}.
690
691@subsection SOM
692
693Like COFF, the SOM definition includes debugging information.
694
25822942 695@section Adding a New Symbol Reader to @value{GDBN}
c906108c
SS
696
697If you are using an existing object file format (a.out, COFF, ELF, etc),
698there is probably little to be done.
699
700If you need to add a new object file format, you must first add it to
701BFD. This is beyond the scope of this document.
702
703You must then arrange for the BFD code to provide access to the
25822942 704debugging symbols. Generally @value{GDBN} will have to call swapping routines
c906108c 705from BFD and a few other BFD internal routines to locate the debugging
25822942 706information. As much as possible, @value{GDBN} should not depend on the BFD
c906108c
SS
707internal data structures.
708
709For some targets (e.g., COFF), there is a special transfer vector used
710to call swapping routines, since the external data structures on various
711platforms have different sizes and layouts. Specialized routines that
712will only ever be implemented by one object file format may be called
713directly. This interface should be described in a file
25822942 714@file{bfd/libxyz.h}, which is included by @value{GDBN}.
c906108c
SS
715
716
717@node Language Support
718
719@chapter Language Support
720
25822942 721@value{GDBN}'s language support is mainly driven by the symbol reader, although
c906108c
SS
722it is possible for the user to set the source language manually.
723
25822942 724@value{GDBN} chooses the source language by looking at the extension of the file
c906108c
SS
725recorded in the debug info; @code{.c} means C, @code{.f} means Fortran,
726etc. It may also use a special-purpose language identifier if the debug
727format supports it, such as DWARF.
728
25822942 729@section Adding a Source Language to @value{GDBN}
c906108c 730
25822942 731To add other languages to @value{GDBN}'s expression parser, follow the following
c906108c
SS
732steps:
733
734@table @emph
735@item Create the expression parser.
736
737This should reside in a file @file{@var{lang}-exp.y}. Routines for
738building parsed expressions into a @samp{union exp_element} list are in
739@file{parse.c}.
740
741Since we can't depend upon everyone having Bison, and YACC produces
742parsers that define a bunch of global names, the following lines
743@emph{must} be included at the top of the YACC parser, to prevent the
744various parsers from defining the same global names:
745
746@example
747#define yyparse @var{lang}_parse
748#define yylex @var{lang}_lex
749#define yyerror @var{lang}_error
750#define yylval @var{lang}_lval
751#define yychar @var{lang}_char
752#define yydebug @var{lang}_debug
753#define yypact @var{lang}_pact
754#define yyr1 @var{lang}_r1
755#define yyr2 @var{lang}_r2
756#define yydef @var{lang}_def
757#define yychk @var{lang}_chk
758#define yypgo @var{lang}_pgo
759#define yyact @var{lang}_act
760#define yyexca @var{lang}_exca
761#define yyerrflag @var{lang}_errflag
762#define yynerrs @var{lang}_nerrs
763@end example
764
765At the bottom of your parser, define a @code{struct language_defn} and
766initialize it with the right values for your language. Define an
767@code{initialize_@var{lang}} routine and have it call
25822942 768@samp{add_language(@var{lang}_language_defn)} to tell the rest of @value{GDBN}
c906108c
SS
769that your language exists. You'll need some other supporting variables
770and functions, which will be used via pointers from your
771@code{@var{lang}_language_defn}. See the declaration of @code{struct
772language_defn} in @file{language.h}, and the other @file{*-exp.y} files,
773for more information.
774
775@item Add any evaluation routines, if necessary
776
777If you need new opcodes (that represent the operations of the language),
778add them to the enumerated type in @file{expression.h}. Add support
779code for these operations in @code{eval.c:evaluate_subexp()}. Add cases
780for new opcodes in two functions from @file{parse.c}:
781@code{prefixify_subexp()} and @code{length_of_subexp()}. These compute
782the number of @code{exp_element}s that a given operation takes up.
783
784@item Update some existing code
785
786Add an enumerated identifier for your language to the enumerated type
787@code{enum language} in @file{defs.h}.
788
789Update the routines in @file{language.c} so your language is included.
790These routines include type predicates and such, which (in some cases)
791are language dependent. If your language does not appear in the switch
792statement, an error is reported.
793
794Also included in @file{language.c} is the code that updates the variable
795@code{current_language}, and the routines that translate the
796@code{language_@var{lang}} enumerated identifier into a printable
797string.
798
799Update the function @code{_initialize_language} to include your
800language. This function picks the default language upon startup, so is
25822942 801dependent upon which languages that @value{GDBN} is built for.
c906108c
SS
802
803Update @code{allocate_symtab} in @file{symfile.c} and/or symbol-reading
804code so that the language of each symtab (source file) is set properly.
805This is used to determine the language to use at each stack frame level.
806Currently, the language is set based upon the extension of the source
807file. If the language can be better inferred from the symbol
808information, please set the language of the symtab in the symbol-reading
809code.
810
811Add helper code to @code{expprint.c:print_subexp()} to handle any new
812expression opcodes you have added to @file{expression.h}. Also, add the
813printed representations of your operators to @code{op_print_tab}.
814
815@item Add a place of call
816
817Add a call to @code{@var{lang}_parse()} and @code{@var{lang}_error} in
818@code{parse.c:parse_exp_1()}.
819
820@item Use macros to trim code
821
25822942
DB
822The user has the option of building @value{GDBN} for some or all of the
823languages. If the user decides to build @value{GDBN} for the language
c906108c
SS
824@var{lang}, then every file dependent on @file{language.h} will have the
825macro @code{_LANG_@var{lang}} defined in it. Use @code{#ifdef}s to
826leave out large routines that the user won't need if he or she is not
827using your language.
828
25822942 829Note that you do not need to do this in your YACC parser, since if @value{GDBN}
c906108c 830is not build for @var{lang}, then @file{@var{lang}-exp.tab.o} (the
25822942 831compiled form of your parser) is not linked into @value{GDBN} at all.
c906108c 832
25822942 833See the file @file{configure.in} for how @value{GDBN} is configured for different
c906108c
SS
834languages.
835
836@item Edit @file{Makefile.in}
837
838Add dependencies in @file{Makefile.in}. Make sure you update the macro
839variables such as @code{HFILES} and @code{OBJS}, otherwise your code may
840not get linked in, or, worse yet, it may not get @code{tar}red into the
841distribution!
842
843@end table
844
845
846@node Host Definition
847
848@chapter Host Definition
849
850With the advent of autoconf, it's rarely necessary to have host
851definition machinery anymore.
852
853@section Adding a New Host
854
25822942
DB
855Most of @value{GDBN}'s host configuration support happens via autoconf. It
856should be rare to need new host-specific definitions. @value{GDBN} still uses
c906108c
SS
857the host-specific definitions and files listed below, but these mostly
858exist for historical reasons, and should eventually disappear.
859
25822942 860Several files control @value{GDBN}'s configuration for host systems:
c906108c
SS
861
862@table @file
863
864@item gdb/config/@var{arch}/@var{xyz}.mh
865Specifies Makefile fragments needed when hosting on machine @var{xyz}.
866In particular, this lists the required machine-dependent object files,
867by defining @samp{XDEPFILES=@dots{}}. Also specifies the header file
868which describes host @var{xyz}, by defining @code{XM_FILE=
869xm-@var{xyz}.h}. You can also define @code{CC}, @code{SYSV_DEFINE},
870@code{XM_CFLAGS}, @code{XM_ADD_FILES}, @code{XM_CLIBS}, @code{XM_CDEPS},
871etc.; see @file{Makefile.in}.
872
873@item gdb/config/@var{arch}/xm-@var{xyz}.h
874(@file{xm.h} is a link to this file, created by configure). Contains C
875macro definitions describing the host system environment, such as byte
876order, host C compiler and library.
877
878@item gdb/@var{xyz}-xdep.c
879Contains any miscellaneous C code required for this machine as a host.
880On most machines it doesn't exist at all. If it does exist, put
881@file{@var{xyz}-xdep.o} into the @code{XDEPFILES} line in
882@file{gdb/config/@var{arch}/@var{xyz}.mh}.
883
884@end table
885
886@subheading Generic Host Support Files
887
888There are some ``generic'' versions of routines that can be used by
889various systems. These can be customized in various ways by macros
890defined in your @file{xm-@var{xyz}.h} file. If these routines work for
891the @var{xyz} host, you can just include the generic file's name (with
892@samp{.o}, not @samp{.c}) in @code{XDEPFILES}.
893
894Otherwise, if your machine needs custom support routines, you will need
895to write routines that perform the same functions as the generic file.
896Put them into @code{@var{xyz}-xdep.c}, and put @code{@var{xyz}-xdep.o}
897into @code{XDEPFILES}.
898
899@table @file
900
901@item ser-unix.c
902This contains serial line support for Unix systems. This is always
903included, via the makefile variable @code{SER_HARDWIRE}; override this
904variable in the @file{.mh} file to avoid it.
905
906@item ser-go32.c
907This contains serial line support for 32-bit programs running under DOS,
908using the GO32 execution environment.
909
910@item ser-tcp.c
911This contains generic TCP support using sockets.
912
913@end table
914
915@section Host Conditionals
916
25822942 917When @value{GDBN} is configured and compiled, various macros are defined or left
c906108c
SS
918undefined, to control compilation based on the attributes of the host
919system. These macros and their meanings (or if the meaning is not
920documented here, then one of the source files where they are used is
921indicated) are:
922
923@table @code
924
25822942
DB
925@item @value{GDBN}INIT_FILENAME
926The default name of @value{GDBN}'s initialization file (normally @file{.gdbinit}).
c906108c
SS
927
928@item MEM_FNS_DECLARED
929Your host config file defines this if it includes declarations of
930@code{memcpy} and @code{memset}. Define this to avoid conflicts between
931the native include files and the declarations in @file{defs.h}.
932
cce74817
JM
933@item NO_STD_REGS
934This macro is deprecated.
935
c906108c
SS
936@item NO_SYS_FILE
937Define this if your system does not have a @code{<sys/file.h>}.
938
939@item SIGWINCH_HANDLER
940If your host defines @code{SIGWINCH}, you can define this to be the name
941of a function to be called if @code{SIGWINCH} is received.
942
943@item SIGWINCH_HANDLER_BODY
944Define this to expand into code that will define the function named by
945the expansion of @code{SIGWINCH_HANDLER}.
946
947@item ALIGN_STACK_ON_STARTUP
948Define this if your system is of a sort that will crash in
949@code{tgetent} if the stack happens not to be longword-aligned when
950@code{main} is called. This is a rare situation, but is known to occur
951on several different types of systems.
952
953@item CRLF_SOURCE_FILES
954Define this if host files use @code{\r\n} rather than @code{\n} as a
955line terminator. This will cause source file listings to omit @code{\r}
956characters when printing and it will allow \r\n line endings of files
957which are "sourced" by gdb. It must be possible to open files in binary
958mode using @code{O_BINARY} or, for fopen, @code{"rb"}.
959
960@item DEFAULT_PROMPT
961The default value of the prompt string (normally @code{"(gdb) "}).
962
963@item DEV_TTY
964The name of the generic TTY device, defaults to @code{"/dev/tty"}.
965
966@item FCLOSE_PROVIDED
967Define this if the system declares @code{fclose} in the headers included
968in @code{defs.h}. This isn't needed unless your compiler is unusually
969anal.
970
971@item FOPEN_RB
972Define this if binary files are opened the same way as text files.
973
974@item GETENV_PROVIDED
975Define this if the system declares @code{getenv} in its headers included
976in @code{defs.h}. This isn't needed unless your compiler is unusually
977anal.
978
979@item HAVE_MMAP
980In some cases, use the system call @code{mmap} for reading symbol
981tables. For some machines this allows for sharing and quick updates.
982
983@item HAVE_SIGSETMASK
984Define this if the host system has job control, but does not define
985@code{sigsetmask()}. Currently, this is only true of the RS/6000.
986
987@item HAVE_TERMIO
988Define this if the host system has @code{termio.h}.
989
990@item HOST_BYTE_ORDER
991The ordering of bytes in the host. This must be defined to be either
992@code{BIG_ENDIAN} or @code{LITTLE_ENDIAN}.
993
994@item INT_MAX
995@item INT_MIN
996@item LONG_MAX
997@item UINT_MAX
998@item ULONG_MAX
999Values for host-side constants.
1000
1001@item ISATTY
1002Substitute for isatty, if not available.
1003
1004@item LONGEST
1005This is the longest integer type available on the host. If not defined,
1006it will default to @code{long long} or @code{long}, depending on
1007@code{CC_HAS_LONG_LONG}.
1008
1009@item CC_HAS_LONG_LONG
1010Define this if the host C compiler supports ``long long''. This is set
1011by the configure script.
1012
1013@item PRINTF_HAS_LONG_LONG
1014Define this if the host can handle printing of long long integers via
1015the printf format directive ``ll''. This is set by the configure script.
1016
1017@item HAVE_LONG_DOUBLE
1018Define this if the host C compiler supports ``long double''. This is
1019set by the configure script.
1020
1021@item PRINTF_HAS_LONG_DOUBLE
1022Define this if the host can handle printing of long double float-point
1023numbers via the printf format directive ``Lg''. This is set by the
1024configure script.
1025
1026@item SCANF_HAS_LONG_DOUBLE
1027Define this if the host can handle the parsing of long double
1028float-point numbers via the scanf format directive directive
1029``Lg''. This is set by the configure script.
1030
1031@item LSEEK_NOT_LINEAR
1032Define this if @code{lseek (n)} does not necessarily move to byte number
1033@code{n} in the file. This is only used when reading source files. It
1034is normally faster to define @code{CRLF_SOURCE_FILES} when possible.
1035
1036@item L_SET
1037This macro is used as the argument to lseek (or, most commonly,
1038bfd_seek). FIXME, should be replaced by SEEK_SET instead, which is the
1039POSIX equivalent.
1040
c906108c
SS
1041@item MALLOC_INCOMPATIBLE
1042Define this if the system's prototype for @code{malloc} differs from the
1043@sc{ANSI} definition.
1044
1045@item MMAP_BASE_ADDRESS
1046When using HAVE_MMAP, the first mapping should go at this address.
1047
1048@item MMAP_INCREMENT
1049when using HAVE_MMAP, this is the increment between mappings.
1050
1051@item NEED_POSIX_SETPGID
1052Define this to use the POSIX version of @code{setpgid} to determine
1053whether job control is available.
1054
1055@item NORETURN
1056If defined, this should be one or more tokens, such as @code{volatile},
1057that can be used in both the declaration and definition of functions to
1058indicate that they never return. The default is already set correctly
1059if compiling with GCC. This will almost never need to be defined.
1060
1061@item ATTR_NORETURN
1062If defined, this should be one or more tokens, such as
1063@code{__attribute__ ((noreturn))}, that can be used in the declarations
1064of functions to indicate that they never return. The default is already
1065set correctly if compiling with GCC. This will almost never need to be
1066defined.
1067
7a292a7a
SS
1068@item USE_GENERIC_DUMMY_FRAMES
1069Define this to 1 if the target is using the generic inferior function
1070call code. See @code{blockframe.c} for more information.
1071
c906108c 1072@item USE_MMALLOC
25822942 1073@value{GDBN} will use the @code{mmalloc} library for memory allocation for symbol
c906108c
SS
1074reading if this symbol is defined. Be careful defining it since there
1075are systems on which @code{mmalloc} does not work for some reason. One
1076example is the DECstation, where its RPC library can't cope with our
1077redefinition of @code{malloc} to call @code{mmalloc}. When defining
1078@code{USE_MMALLOC}, you will also have to set @code{MMALLOC} in the
1079Makefile, to point to the mmalloc library. This define is set when you
1080configure with --with-mmalloc.
1081
1082@item NO_MMCHECK
1083Define this if you are using @code{mmalloc}, but don't want the overhead
1084of checking the heap with @code{mmcheck}. Note that on some systems,
1085the C runtime makes calls to malloc prior to calling @code{main}, and if
1086@code{free} is ever called with these pointers after calling
1087@code{mmcheck} to enable checking, a memory corruption abort is certain
1088to occur. These systems can still use mmalloc, but must define
1089NO_MMCHECK.
1090
1091@item MMCHECK_FORCE
1092Define this to 1 if the C runtime allocates memory prior to
1093@code{mmcheck} being called, but that memory is never freed so we don't
1094have to worry about it triggering a memory corruption abort. The
1095default is 0, which means that @code{mmcheck} will only install the heap
1096checking functions if there has not yet been any memory allocation
1097calls, and if it fails to install the functions, gdb will issue a
1098warning. This is currently defined if you configure using
1099--with-mmalloc.
1100
1101@item NO_SIGINTERRUPT
1102Define this to indicate that siginterrupt() is not available.
1103
1104@item R_OK
1105Define if this is not in a system .h file.
1106
1107@item SEEK_CUR
1108@item SEEK_SET
1109Define these to appropriate value for the system lseek(), if not already
1110defined.
1111
1112@item STOP_SIGNAL
25822942 1113This is the signal for stopping @value{GDBN}. Defaults to SIGTSTP. (Only
c906108c
SS
1114redefined for the Convex.)
1115
1116@item USE_O_NOCTTY
1117Define this if the interior's tty should be opened with the O_NOCTTY
1118flag. (FIXME: This should be a native-only flag, but @file{inflow.c} is
1119always linked in.)
1120
1121@item USG
1122Means that System V (prior to SVR4) include files are in use. (FIXME:
1123This symbol is abused in @file{infrun.c}, @file{regex.c},
1124@file{remote-nindy.c}, and @file{utils.c} for other things, at the
1125moment.)
1126
1127@item lint
1128Define this to help placate lint in some situations.
1129
1130@item volatile
1131Define this to override the defaults of @code{__volatile__} or
1132@code{/**/}.
1133
1134@end table
1135
1136
1137@node Target Architecture Definition
1138
1139@chapter Target Architecture Definition
1140
25822942
DB
1141@value{GDBN}'s target architecture defines what sort of machine-language programs
1142@value{GDBN} can work with, and how it works with them.
c906108c
SS
1143
1144At present, the target architecture definition consists of a number of C
1145macros.
1146
1147@section Registers and Memory
1148
25822942 1149@value{GDBN}'s model of the target machine is rather simple. @value{GDBN} assumes the
c906108c
SS
1150machine includes a bank of registers and a block of memory. Each
1151register may have a different size.
1152
25822942 1153@value{GDBN} does not have a magical way to match up with the compiler's idea of
c906108c
SS
1154which registers are which; however, it is critical that they do match up
1155accurately. The only way to make this work is to get accurate
1156information about the order that the compiler uses, and to reflect that
1157in the @code{REGISTER_NAME} and related macros.
1158
25822942 1159@value{GDBN} can handle big-endian, little-endian, and bi-endian architectures.
c906108c 1160
93e79dbd
JB
1161@section Pointers Are Not Always Addresses
1162@cindex pointer representation
1163@cindex address representation
1164@cindex word-addressed machines
1165@cindex separate data and code address spaces
1166@cindex spaces, separate data and code address
1167@cindex address spaces, separate data and code
1168@cindex code pointers, word-addressed
1169@cindex converting between pointers and addresses
1170@cindex D10V addresses
1171
1172On almost all 32-bit architectures, the representation of a pointer is
1173indistinguishable from the representation of some fixed-length number
1174whose value is the byte address of the object pointed to. On such
1175machines, the words `pointer' and `address' can be used interchangeably.
1176However, architectures with smaller word sizes are often cramped for
1177address space, so they may choose a pointer representation that breaks this
1178identity, and allows a larger code address space.
1179
1180For example, the Mitsubishi D10V is a 16-bit VLIW processor whose
1181instructions are 32 bits long@footnote{Some D10V instructions are
1182actually pairs of 16-bit sub-instructions. However, since you can't
1183jump into the middle of such a pair, code addresses can only refer to
1184full 32 bit instructions, which is what matters in this explanation.}.
1185If the D10V used ordinary byte addresses to refer to code locations,
1186then the processor would only be able to address 64kb of instructions.
1187However, since instructions must be aligned on four-byte boundaries, the
1188low two bits of any valid instruction's byte address are always zero ---
1189byte addresses waste two bits. So instead of byte addresses, the D10V
1190uses word addresses --- byte addresses shifted right two bits --- to
1191refer to code. Thus, the D10V can use 16-bit words to address 256kb of
1192code space.
1193
1194However, this means that code pointers and data pointers have different
1195forms on the D10V. The 16-bit word @code{0xC020} refers to byte address
1196@code{0xC020} when used as a data address, but refers to byte address
1197@code{0x30080} when used as a code address.
1198
1199(The D10V also uses separate code and data address spaces, which also
1200affects the correspondence between pointers and addresses, but we're
1201going to ignore that here; this example is already too long.)
1202
1203To cope with architectures like this --- the D10V is not the only one!
1204--- @value{GDBN} tries to distinguish between @dfn{addresses}, which are
1205byte numbers, and @dfn{pointers}, which are the target's representation
1206of an address of a particular type of data. In the example above,
1207@code{0xC020} is the pointer, which refers to one of the addresses
1208@code{0xC020} or @code{0x30080}, depending on the type imposed upon it.
1209@value{GDBN} provides functions for turning a pointer into an address
1210and vice versa, in the appropriate way for the current architecture.
1211
1212Unfortunately, since addresses and pointers are identical on almost all
1213processors, this distinction tends to bit-rot pretty quickly. Thus,
1214each time you port @value{GDBN} to an architecture which does
1215distinguish between pointers and addresses, you'll probably need to
1216clean up some architecture-independent code.
1217
1218Here are functions which convert between pointers and addresses:
1219
1220@deftypefun CORE_ADDR extract_typed_address (void *@var{buf}, struct type *@var{type})
1221Treat the bytes at @var{buf} as a pointer or reference of type
1222@var{type}, and return the address it represents, in a manner
1223appropriate for the current architecture. This yields an address
1224@value{GDBN} can use to read target memory, disassemble, etc. Note that
1225@var{buf} refers to a buffer in @value{GDBN}'s memory, not the
1226inferior's.
1227
1228For example, if the current architecture is the Intel x86, this function
1229extracts a little-endian integer of the appropriate length from
1230@var{buf} and returns it. However, if the current architecture is the
1231D10V, this function will return a 16-bit integer extracted from
1232@var{buf}, multiplied by four if @var{type} is a pointer to a function.
1233
1234If @var{type} is not a pointer or reference type, then this function
1235will signal an internal error.
1236@end deftypefun
1237
1238@deftypefun CORE_ADDR store_typed_address (void *@var{buf}, struct type *@var{type}, CORE_ADDR @var{addr})
1239Store the address @var{addr} in @var{buf}, in the proper format for a
1240pointer of type @var{type} in the current architecture. Note that
1241@var{buf} refers to a buffer in @value{GDBN}'s memory, not the
1242inferior's.
1243
1244For example, if the current architecture is the Intel x86, this function
1245stores @var{addr} unmodified as a little-endian integer of the
1246appropriate length in @var{buf}. However, if the current architecture
1247is the D10V, this function divides @var{addr} by four if @var{type} is
1248a pointer to a function, and then stores it in @var{buf}.
1249
1250If @var{type} is not a pointer or reference type, then this function
1251will signal an internal error.
1252@end deftypefun
1253
1254@deftypefun CORE_ADDR value_as_pointer (value_ptr @var{val})
1255Assuming that @var{val} is a pointer, return the address it represents,
1256as appropriate for the current architecture.
1257
1258This function actually works on integral values, as well as pointers.
1259For pointers, it performs architecture-specific conversions as
1260described above for @code{extract_typed_address}.
1261@end deftypefun
1262
1263@deftypefun CORE_ADDR value_from_pointer (struct type *@var{type}, CORE_ADDR @var{addr})
1264Create and return a value representing a pointer of type @var{type} to
1265the address @var{addr}, as appropriate for the current architecture.
1266This function performs architecture-specific conversions as described
1267above for @code{store_typed_address}.
1268@end deftypefun
1269
1270
1271@value{GDBN} also provides functions that do the same tasks, but assume
1272that pointers are simply byte addresses; they aren't sensitive to the
1273current architecture, beyond knowing the appropriate endianness.
1274
1275@deftypefun CORE_ADDR extract_address (void *@var{addr}, int len)
1276Extract a @var{len}-byte number from @var{addr} in the appropriate
1277endianness for the current architecture, and return it. Note that
1278@var{addr} refers to @value{GDBN}'s memory, not the inferior's.
1279
1280This function should only be used in architecture-specific code; it
1281doesn't have enough information to turn bits into a true address in the
1282appropriate way for the current architecture. If you can, use
1283@code{extract_typed_address} instead.
1284@end deftypefun
1285
1286@deftypefun void store_address (void *@var{addr}, int @var{len}, LONGEST @var{val})
1287Store @var{val} at @var{addr} as a @var{len}-byte integer, in the
1288appropriate endianness for the current architecture. Note that
1289@var{addr} refers to a buffer in @value{GDBN}'s memory, not the
1290inferior's.
1291
1292This function should only be used in architecture-specific code; it
1293doesn't have enough information to turn a true address into bits in the
1294appropriate way for the current architecture. If you can, use
1295@code{store_typed_address} instead.
1296@end deftypefun
1297
1298
1299Here are some macros which architectures can define to indicate the
1300relationship between pointers and addresses. These have default
1301definitions, appropriate for architectures on which all pointers are
1302simple byte addresses.
1303
1304@deftypefn {Target Macro} CORE_ADDR POINTER_TO_ADDRESS (struct type *@var{type}, char *@var{buf})
1305Assume that @var{buf} holds a pointer of type @var{type}, in the
1306appropriate format for the current architecture. Return the byte
1307address the pointer refers to.
1308
1309This function may safely assume that @var{type} is either a pointer or a
1310C++ reference type.
1311@end deftypefn
1312
1313@deftypefn {Target Macro} void ADDRESS_TO_POINTER (struct type *@var{type}, char *@var{buf}, CORE_ADDR @var{addr})
1314Store in @var{buf} a pointer of type @var{type} representing the address
1315@var{addr}, in the appropriate format for the current architecture.
1316
1317This function may safely assume that @var{type} is either a pointer or a
1318C++ reference type.
1319@end deftypefn
1320
1321
9fb4dd36
JB
1322@section Using Different Register and Memory Data Representations
1323@cindex raw representation
1324@cindex virtual representation
1325@cindex representations, raw and virtual
1326@cindex register data formats, converting
1327@cindex @code{struct value}, converting register contents to
1328
1329Some architectures use one representation for a value when it lives in a
1330register, but use a different representation when it lives in memory.
25822942 1331In @value{GDBN}'s terminology, the @dfn{raw} representation is the one used in
9fb4dd36 1332the target registers, and the @dfn{virtual} representation is the one
25822942 1333used in memory, and within @value{GDBN} @code{struct value} objects.
9fb4dd36
JB
1334
1335For almost all data types on almost all architectures, the virtual and
1336raw representations are identical, and no special handling is needed.
1337However, they do occasionally differ. For example:
1338
1339@itemize @bullet
1340
1341@item
1342The x86 architecture supports an 80-bit long double type. However, when
1343we store those values in memory, they occupy twelve bytes: the
1344floating-point number occupies the first ten, and the final two bytes
1345are unused. This keeps the values aligned on four-byte boundaries,
1346allowing more efficient access. Thus, the x86 80-bit floating-point
1347type is the raw representation, and the twelve-byte loosely-packed
1348arrangement is the virtual representation.
1349
1350@item
25822942
DB
1351Some 64-bit MIPS targets present 32-bit registers to @value{GDBN} as 64-bit
1352registers, with garbage in their upper bits. @value{GDBN} ignores the top 32
9fb4dd36
JB
1353bits. Thus, the 64-bit form, with garbage in the upper 32 bits, is the
1354raw representation, and the trimmed 32-bit representation is the
1355virtual representation.
1356
1357@end itemize
1358
1359In general, the raw representation is determined by the architecture, or
25822942
DB
1360@value{GDBN}'s interface to the architecture, while the virtual representation
1361can be chosen for @value{GDBN}'s convenience. @value{GDBN}'s register file,
1362@code{registers}, holds the register contents in raw format, and the @value{GDBN}
9fb4dd36
JB
1363remote protocol transmits register values in raw format.
1364
1365Your architecture may define the following macros to request raw /
1366virtual conversions:
1367
1368@deftypefn {Target Macro} int REGISTER_CONVERTIBLE (int @var{reg})
1369Return non-zero if register number @var{reg}'s value needs different raw
1370and virtual formats.
6f6ef15a
EZ
1371
1372You should not use @code{REGISTER_CONVERT_TO_VIRTUAL} for a register
1373unless this macro returns a non-zero value for that register.
9fb4dd36
JB
1374@end deftypefn
1375
1376@deftypefn {Target Macro} int REGISTER_RAW_SIZE (int @var{reg})
1377The size of register number @var{reg}'s raw value. This is the number
25822942 1378of bytes the register will occupy in @code{registers}, or in a @value{GDBN}
9fb4dd36
JB
1379remote protocol packet.
1380@end deftypefn
1381
1382@deftypefn {Target Macro} int REGISTER_VIRTUAL_SIZE (int @var{reg})
1383The size of register number @var{reg}'s value, in its virtual format.
1384This is the size a @code{struct value}'s buffer will have, holding that
1385register's value.
1386@end deftypefn
1387
1388@deftypefn {Target Macro} struct type *REGISTER_VIRTUAL_TYPE (int @var{reg})
1389This is the type of the virtual representation of register number
1390@var{reg}. Note that there is no need for a macro giving a type for the
25822942 1391register's raw form; once the register's value has been obtained, @value{GDBN}
9fb4dd36
JB
1392always uses the virtual form.
1393@end deftypefn
1394
1395@deftypefn {Target Macro} void REGISTER_CONVERT_TO_VIRTUAL (int @var{reg}, struct type *@var{type}, char *@var{from}, char *@var{to})
1396Convert the value of register number @var{reg} to @var{type}, which
1397should always be @code{REGISTER_VIRTUAL_TYPE (@var{reg})}. The buffer
1398at @var{from} holds the register's value in raw format; the macro should
1399convert the value to virtual format, and place it at @var{to}.
1400
6f6ef15a
EZ
1401Note that @code{REGISTER_CONVERT_TO_VIRTUAL} and
1402@code{REGISTER_CONVERT_TO_RAW} take their @var{reg} and @var{type}
1403arguments in different orders.
1404
1405You should only use @code{REGISTER_CONVERT_TO_VIRTUAL} with registers
1406for which the @code{REGISTER_CONVERTIBLE} macro returns a non-zero
1407value.
9fb4dd36
JB
1408@end deftypefn
1409
1410@deftypefn {Target Macro} void REGISTER_CONVERT_TO_RAW (struct type *@var{type}, int @var{reg}, char *@var{from}, char *@var{to})
1411Convert the value of register number @var{reg} to @var{type}, which
1412should always be @code{REGISTER_VIRTUAL_TYPE (@var{reg})}. The buffer
1413at @var{from} holds the register's value in raw format; the macro should
1414convert the value to virtual format, and place it at @var{to}.
1415
1416Note that REGISTER_CONVERT_TO_VIRTUAL and REGISTER_CONVERT_TO_RAW take
1417their @var{reg} and @var{type} arguments in different orders.
1418@end deftypefn
1419
1420
c906108c
SS
1421@section Frame Interpretation
1422
1423@section Inferior Call Setup
1424
1425@section Compiler Characteristics
1426
1427@section Target Conditionals
1428
1429This section describes the macros that you can use to define the target
1430machine.
1431
1432@table @code
1433
1434@item ADDITIONAL_OPTIONS
1435@item ADDITIONAL_OPTION_CASES
1436@item ADDITIONAL_OPTION_HANDLER
1437@item ADDITIONAL_OPTION_HELP
1438These are a set of macros that allow the addition of additional command
25822942 1439line options to @value{GDBN}. They are currently used only for the unsupported
c906108c
SS
1440i960 Nindy target, and should not be used in any other configuration.
1441
1442@item ADDR_BITS_REMOVE (addr)
adf40b2e
JM
1443If a raw machine instruction address includes any bits that are not
1444really part of the address, then define this macro to expand into an
1445expression that zeros those bits in @var{addr}. This is only used for
1446addresses of instructions, and even then not in all contexts.
1447
1448For example, the two low-order bits of the PC on the Hewlett-Packard PA
14492.0 architecture contain the privilege level of the corresponding
1450instruction. Since instructions must always be aligned on four-byte
1451boundaries, the processor masks out these bits to generate the actual
1452address of the instruction. ADDR_BITS_REMOVE should filter out these
1453bits with an expression such as @code{((addr) & ~3)}.
c906108c 1454
93e79dbd
JB
1455@item ADDRESS_TO_POINTER (@var{type}, @var{buf}, @var{addr})
1456Store in @var{buf} a pointer of type @var{type} representing the address
1457@var{addr}, in the appropriate format for the current architecture.
1458This macro may safely assume that @var{type} is either a pointer or a
1459C++ reference type.
1460@xref{Target Architecture Definition, , Pointers Are Not Always Addresses}.
1461
c906108c
SS
1462@item BEFORE_MAIN_LOOP_HOOK
1463Define this to expand into any code that you want to execute before the
1464main loop starts. Although this is not, strictly speaking, a target
1465conditional, that is how it is currently being used. Note that if a
1466configuration were to define it one way for a host and a different way
25822942 1467for the target, @value{GDBN} will probably not compile, let alone run correctly.
c906108c
SS
1468This is currently used only for the unsupported i960 Nindy target, and
1469should not be used in any other configuration.
1470
1471@item BELIEVE_PCC_PROMOTION
1472Define if the compiler promotes a short or char parameter to an int, but
1473still reports the parameter as its original type, rather than the
1474promoted type.
1475
1476@item BELIEVE_PCC_PROMOTION_TYPE
25822942 1477Define this if @value{GDBN} should believe the type of a short argument when
c906108c
SS
1478compiled by pcc, but look within a full int space to get its value.
1479Only defined for Sun-3 at present.
1480
1481@item BITS_BIG_ENDIAN
1482Define this if the numbering of bits in the targets does *not* match the
1483endianness of the target byte order. A value of 1 means that the bits
1484are numbered in a big-endian order, 0 means little-endian.
1485
1486@item BREAKPOINT
1487This is the character array initializer for the bit pattern to put into
1488memory where a breakpoint is set. Although it's common to use a trap
1489instruction for a breakpoint, it's not required; for instance, the bit
1490pattern could be an invalid instruction. The breakpoint must be no
1491longer than the shortest instruction of the architecture.
1492
7a292a7a
SS
1493@var{BREAKPOINT} has been deprecated in favour of
1494@var{BREAKPOINT_FROM_PC}.
1495
c906108c
SS
1496@item BIG_BREAKPOINT
1497@item LITTLE_BREAKPOINT
1498Similar to BREAKPOINT, but used for bi-endian targets.
1499
7a292a7a
SS
1500@var{BIG_BREAKPOINT} and @var{LITTLE_BREAKPOINT} have been deprecated in
1501favour of @var{BREAKPOINT_FROM_PC}.
1502
c906108c
SS
1503@item REMOTE_BREAKPOINT
1504@item LITTLE_REMOTE_BREAKPOINT
1505@item BIG_REMOTE_BREAKPOINT
1506Similar to BREAKPOINT, but used for remote targets.
1507
7a292a7a
SS
1508@var{BIG_REMOTE_BREAKPOINT} and @var{LITTLE_REMOTE_BREAKPOINT} have been
1509deprecated in favour of @var{BREAKPOINT_FROM_PC}.
1510
c906108c
SS
1511@item BREAKPOINT_FROM_PC (pcptr, lenptr)
1512
1513Use the program counter to determine the contents and size of a
1514breakpoint instruction. It returns a pointer to a string of bytes that
1515encode a breakpoint instruction, stores the length of the string to
1516*lenptr, and adjusts pc (if necessary) to point to the actual memory
1517location where the breakpoint should be inserted.
1518
1519Although it is common to use a trap instruction for a breakpoint, it's
1520not required; for instance, the bit pattern could be an invalid
1521instruction. The breakpoint must be no longer than the shortest
1522instruction of the architecture.
1523
7a292a7a
SS
1524Replaces all the other @var{BREAKPOINT} macros.
1525
917317f4
JM
1526@item MEMORY_INSERT_BREAKPOINT (addr, contents_cache)
1527@item MEMORY_REMOVE_BREAKPOINT (addr, contents_cache)
1528
1529Insert or remove memory based breakpoints. Reasonable defaults
1530(@code{default_memory_insert_breakpoint} and
1531@code{default_memory_remove_breakpoint} respectively) have been
1532provided so that it is not necessary to define these for most
1533architectures. Architectures which may want to define
1534@var{MEMORY_INSERT_BREAKPOINT} and @var{MEMORY_REMOVE_BREAKPOINT} will
1535likely have instructions that are oddly sized or are not stored in a
1536conventional manner.
1537
1538It may also be desirable (from an efficiency standpoint) to define
1539custom breakpoint insertion and removal routines if
1540@var{BREAKPOINT_FROM_PC} needs to read the target's memory for some
1541reason.
1542
7a292a7a
SS
1543@item CALL_DUMMY_P
1544A C expresson that is non-zero when the target suports inferior function
1545calls.
1546
1547@item CALL_DUMMY_WORDS
1548Pointer to an array of @var{LONGEST} words of data containing
1549host-byte-ordered @var{REGISTER_BYTES} sized values that partially
1550specify the sequence of instructions needed for an inferior function
1551call.
1552
1553Should be deprecated in favour of a macro that uses target-byte-ordered
1554data.
1555
1556@item SIZEOF_CALL_DUMMY_WORDS
1557The size of @var{CALL_DUMMY_WORDS}. When @var{CALL_DUMMY_P} this must
1558return a positive value. See also @var{CALL_DUMMY_LENGTH}.
c906108c
SS
1559
1560@item CALL_DUMMY
7a292a7a
SS
1561A static initializer for @var{CALL_DUMMY_WORDS}. Deprecated.
1562
c906108c
SS
1563@item CALL_DUMMY_LOCATION
1564inferior.h
7a292a7a 1565
c906108c 1566@item CALL_DUMMY_STACK_ADJUST
7a292a7a
SS
1567Stack adjustment needed when performing an inferior function call.
1568
1569Should be deprecated in favor of something like @var{STACK_ALIGN}.
1570
1571@item CALL_DUMMY_STACK_ADJUST_P
1572Predicate for use of @var{CALL_DUMMY_STACK_ADJUST}.
1573
1574Should be deprecated in favor of something like @var{STACK_ALIGN}.
c906108c
SS
1575
1576@item CANNOT_FETCH_REGISTER (regno)
1577A C expression that should be nonzero if @var{regno} cannot be fetched
1578from an inferior process. This is only relevant if
1579@code{FETCH_INFERIOR_REGISTERS} is not defined.
1580
1581@item CANNOT_STORE_REGISTER (regno)
1582A C expression that should be nonzero if @var{regno} should not be
1583written to the target. This is often the case for program counters,
25822942 1584status words, and other special registers. If this is not defined, @value{GDBN}
c906108c
SS
1585will assume that all registers may be written.
1586
1587@item DO_DEFERRED_STORES
1588@item CLEAR_DEFERRED_STORES
1589Define this to execute any deferred stores of registers into the inferior,
1590and to cancel any deferred stores.
1591
1592Currently only implemented correctly for native Sparc configurations?
1593
ef36d45e
JB
1594@item COERCE_FLOAT_TO_DOUBLE (@var{formal}, @var{actual})
1595If we are calling a function by hand, and the function was declared
1596(according to the debug info) without a prototype, should we
1597automatically promote floats to doubles? This macro must evaluate to
1598non-zero if we should, or zero if we should leave the value alone.
1599
1600The argument @var{actual} is the type of the value we want to pass to
1601the function. The argument @var{formal} is the type of this argument,
1602as it appears in the function's definition. Note that @var{formal} may
1603be zero if we have no debugging information for the function, or if
1604we're passing more arguments than are officially declared (for example,
1605varargs). This macro is never invoked if the function definitely has a
1606prototype.
1607
1608The default behavior is to promote only when we have no type information
1609for the formal parameter. This is different from the obvious behavior,
1610which would be to promote whenever we have no prototype, just as the
1611compiler does. It's annoying, but some older targets rely on this. If
25822942 1612you want @value{GDBN} to follow the typical compiler behavior --- to always
ef36d45e
JB
1613promote when there is no prototype in scope --- your gdbarch init
1614function can call @code{set_gdbarch_coerce_float_to_double} and select
1615the @code{standard_coerce_float_to_double} function.
1616
c906108c
SS
1617@item CPLUS_MARKER
1618Define this to expand into the character that G++ uses to distinguish
1619compiler-generated identifiers from programmer-specified identifiers.
1620By default, this expands into @code{'$'}. Most System V targets should
1621define this to @code{'.'}.
1622
1623@item DBX_PARM_SYMBOL_CLASS
1624Hook for the @code{SYMBOL_CLASS} of a parameter when decoding DBX symbol
1625information. In the i960, parameters can be stored as locals or as
1626args, depending on the type of the debug record.
1627
1628@item DECR_PC_AFTER_BREAK
1629Define this to be the amount by which to decrement the PC after the
1630program encounters a breakpoint. This is often the number of bytes in
1631BREAKPOINT, though not always. For most targets this value will be 0.
1632
1633@item DECR_PC_AFTER_HW_BREAK
1634Similarly, for hardware breakpoints.
1635
1636@item DISABLE_UNSETTABLE_BREAK addr
1637If defined, this should evaluate to 1 if @var{addr} is in a shared
1638library in which breakpoints cannot be set and so should be disabled.
1639
1640@item DO_REGISTERS_INFO
1641If defined, use this to print the value of a register or all registers.
1642
0dcedd82
AC
1643@item DWARF_REG_TO_REGNUM
1644Convert DWARF register number into @value{GDBN} regnum. If not defined,
1645no conversion will be performed.
1646
1647@item DWARF2_REG_TO_REGNUM
1648Convert DWARF2 register number into @value{GDBN} regnum. If not
1649defined, no conversion will be performed.
1650
1651@item ECOFF_REG_TO_REGNUM
1652Convert ECOFF register number into @value{GDBN} regnum. If not defined,
1653no conversion will be performed.
1654
c906108c
SS
1655@item END_OF_TEXT_DEFAULT
1656This is an expression that should designate the end of the text section
1657(? FIXME ?)
1658
1659@item EXTRACT_RETURN_VALUE(type,regbuf,valbuf)
1660Define this to extract a function's return value of type @var{type} from
1661the raw register state @var{regbuf} and copy that, in virtual format,
1662into @var{valbuf}.
1663
1664@item EXTRACT_STRUCT_VALUE_ADDRESS(regbuf)
ac9a91a7
JM
1665When @var{EXTRACT_STRUCT_VALUE_ADDRESS_P} this is used to to extract
1666from an array @var{regbuf} (containing the raw register state) the
1667address in which a function should return its structure value, as a
1668CORE_ADDR (or an expression that can be used as one).
1669
1670@item EXTRACT_STRUCT_VALUE_ADDRESS_P
1671Predicate for @var{EXTRACT_STRUCT_VALUE_ADDRESS}.
c906108c
SS
1672
1673@item FLOAT_INFO
1674If defined, then the `info float' command will print information about
1675the processor's floating point unit.
1676
1677@item FP_REGNUM
cce74817
JM
1678If the virtual frame pointer is kept in a register, then define this
1679macro to be the number (greater than or equal to zero) of that register.
1680
1681This should only need to be defined if @code{TARGET_READ_FP} and
1682@code{TARGET_WRITE_FP} are not defined.
c906108c 1683
392a587b
JM
1684@item FRAMELESS_FUNCTION_INVOCATION(fi)
1685Define this to an expression that returns 1 if the function invocation
1686represented by @var{fi} does not have a stack frame associated with it.
1687Otherwise return 0.
c906108c
SS
1688
1689@item FRAME_ARGS_ADDRESS_CORRECT
1690stack.c
1691
1692@item FRAME_CHAIN(frame)
1693Given @var{frame}, return a pointer to the calling frame.
1694
1695@item FRAME_CHAIN_COMBINE(chain,frame)
1696Define this to take the frame chain pointer and the frame's nominal
1697address and produce the nominal address of the caller's frame.
1698Presently only defined for HP PA.
1699
1700@item FRAME_CHAIN_VALID(chain,thisframe)
1701
1702Define this to be an expression that returns zero if the given frame is
c4093a6a
JM
1703an outermost frame, with no caller, and nonzero otherwise. Several
1704common definitions are available.
1705
1706@code{file_frame_chain_valid} is nonzero if the chain pointer is nonzero
1707and given frame's PC is not inside the startup file (such as
1708@file{crt0.o}). @code{func_frame_chain_valid} is nonzero if the chain
1709pointer is nonzero and the given frame's PC is not in @code{main()} or a
1710known entry point function (such as @code{_start()}).
1711@code{generic_file_frame_chain_valid} and
1712@code{generic_func_frame_chain_valid} are equivalent implementations for
1713targets using generic dummy frames.
c906108c
SS
1714
1715@item FRAME_INIT_SAVED_REGS(frame)
1716See @file{frame.h}. Determines the address of all registers in the
1717current stack frame storing each in @code{frame->saved_regs}. Space for
1718@code{frame->saved_regs} shall be allocated by
1719@code{FRAME_INIT_SAVED_REGS} using either
1720@code{frame_saved_regs_zalloc} or @code{frame_obstack_alloc}.
1721
1722@var{FRAME_FIND_SAVED_REGS} and @var{EXTRA_FRAME_INFO} are deprecated.
1723
392a587b
JM
1724@item FRAME_NUM_ARGS (fi)
1725For the frame described by @var{fi} return the number of arguments that
1726are being passed. If the number of arguments is not known, return
1727@code{-1}.
c906108c
SS
1728
1729@item FRAME_SAVED_PC(frame)
1730Given @var{frame}, return the pc saved there. That is, the return
1731address.
1732
1733@item FUNCTION_EPILOGUE_SIZE
1734For some COFF targets, the @code{x_sym.x_misc.x_fsize} field of the
1735function end symbol is 0. For such targets, you must define
1736@code{FUNCTION_EPILOGUE_SIZE} to expand into the standard size of a
1737function's epilogue.
1738
f7cb2b90
JB
1739@item FUNCTION_START_OFFSET
1740An integer, giving the offset in bytes from a function's address (as
1741used in the values of symbols, function pointers, etc.), and the
1742function's first genuine instruction.
1743
1744This is zero on almost all machines: the function's address is usually
1745the address of its first instruction. However, on the VAX, for example,
1746each function starts with two bytes containing a bitmask indicating
1747which registers to save upon entry to the function. The VAX @code{call}
1748instructions check this value, and save the appropriate registers
1749automatically. Thus, since the offset from the function's address to
1750its first instruction is two bytes, @code{FUNCTION_START_OFFSET} would
1751be 2 on the VAX.
1752
c906108c
SS
1753@item GCC_COMPILED_FLAG_SYMBOL
1754@item GCC2_COMPILED_FLAG_SYMBOL
25822942 1755If defined, these are the names of the symbols that @value{GDBN} will look for to
c906108c
SS
1756detect that GCC compiled the file. The default symbols are
1757@code{gcc_compiled.} and @code{gcc2_compiled.}, respectively. (Currently
1758only defined for the Delta 68.)
1759
25822942 1760@item @value{GDBN}_MULTI_ARCH
0f71a2f6 1761If defined and non-zero, enables suport for multiple architectures
25822942 1762within @value{GDBN}.
0f71a2f6
JM
1763
1764The support can be enabled at two levels. At level one, only
1765definitions for previously undefined macros are provided; at level two,
1766a multi-arch definition of all architecture dependant macros will be
1767defined.
1768
25822942 1769@item @value{GDBN}_TARGET_IS_HPPA
c906108c
SS
1770This determines whether horrible kludge code in dbxread.c and
1771partial-stab.h is used to mangle multiple-symbol-table files from
1772HPPA's. This should all be ripped out, and a scheme like elfread.c
1773used.
1774
c906108c
SS
1775@item GET_LONGJMP_TARGET
1776For most machines, this is a target-dependent parameter. On the
1777DECstation and the Iris, this is a native-dependent parameter, since
1778<setjmp.h> is needed to define it.
1779
1780This macro determines the target PC address that longjmp() will jump to,
1781assuming that we have just stopped at a longjmp breakpoint. It takes a
1782CORE_ADDR * as argument, and stores the target PC value through this
1783pointer. It examines the current state of the machine as needed.
1784
1785@item GET_SAVED_REGISTER
1786Define this if you need to supply your own definition for the function
7a292a7a 1787@code{get_saved_register}.
c906108c
SS
1788
1789@item HAVE_REGISTER_WINDOWS
1790Define this if the target has register windows.
1791@item REGISTER_IN_WINDOW_P (regnum)
1792Define this to be an expression that is 1 if the given register is in
1793the window.
1794
1795@item IBM6000_TARGET
1796Shows that we are configured for an IBM RS/6000 target. This
1797conditional should be eliminated (FIXME) and replaced by
1798feature-specific macros. It was introduced in haste and we are
1799repenting at leisure.
1800
2df3850c
JM
1801@item SYMBOLS_CAN_START_WITH_DOLLAR
1802Some systems have routines whose names start with @samp{$}. Giving this
25822942 1803macro a non-zero value tells @value{GDBN}'s expression parser to check for such
2df3850c
JM
1804routines when parsing tokens that begin with @samp{$}.
1805
1806On HP-UX, certain system routines (millicode) have names beginning with
1807@samp{$} or @samp{$$}. For example, @code{$$dyncall} is a millicode
1808routine that handles inter-space procedure calls on PA-RISC.
1809
c906108c
SS
1810@item IEEE_FLOAT
1811Define this if the target system uses IEEE-format floating point numbers.
1812
1813@item INIT_EXTRA_FRAME_INFO (fromleaf, frame)
1814If additional information about the frame is required this should be
1815stored in @code{frame->extra_info}. Space for @code{frame->extra_info}
1816is allocated using @code{frame_obstack_alloc}.
1817
1818@item INIT_FRAME_PC (fromleaf, prev)
1819This is a C statement that sets the pc of the frame pointed to by
1820@var{prev}. [By default...]
1821
1822@item INNER_THAN (lhs,rhs)
1823Returns non-zero if stack address @var{lhs} is inner than (nearer to the
1824stack top) stack address @var{rhs}. Define this as @code{lhs < rhs} if
1825the target's stack grows downward in memory, or @code{lhs > rsh} if the
1826stack grows upward.
1827
1828@item IN_SIGTRAMP (pc, name)
1829Define this to return true if the given @var{pc} and/or @var{name}
1830indicates that the current function is a sigtramp.
1831
1832@item SIGTRAMP_START (pc)
1833@item SIGTRAMP_END (pc)
1834Define these to be the start and end address of the sigtramp for the
1835given @var{pc}. On machines where the address is just a compile time
1836constant, the macro expansion will typically just ignore the supplied
1837@var{pc}.
1838
1839@item IN_SOLIB_CALL_TRAMPOLINE pc name
1840Define this to evaluate to nonzero if the program is stopped in the
1841trampoline that connects to a shared library.
1842
1843@item IN_SOLIB_RETURN_TRAMPOLINE pc name
1844Define this to evaluate to nonzero if the program is stopped in the
1845trampoline that returns from a shared library.
1846
d4f3574e
SS
1847@item IN_SOLIB_DYNSYM_RESOLVE_CODE pc
1848Define this to evaluate to nonzero if the program is stopped in the
1849dynamic linker.
1850
1851@item SKIP_SOLIB_RESOLVER pc
1852Define this to evaluate to the (nonzero) address at which execution
1853should continue to get past the dynamic linker's symbol resolution
1854function. A zero value indicates that it is not important or necessary
1855to set a breakpoint to get through the dynamic linker and that single
1856stepping will suffice.
1857
c906108c
SS
1858@item IS_TRAPPED_INTERNALVAR (name)
1859This is an ugly hook to allow the specification of special actions that
1860should occur as a side-effect of setting the value of a variable
25822942 1861internal to @value{GDBN}. Currently only used by the h8500. Note that this
c906108c
SS
1862could be either a host or target conditional.
1863
1864@item NEED_TEXT_START_END
25822942 1865Define this if @value{GDBN} should determine the start and end addresses of the
c906108c
SS
1866text section. (Seems dubious.)
1867
1868@item NO_HIF_SUPPORT
1869(Specific to the a29k.)
1870
93e79dbd
JB
1871@item POINTER_TO_ADDRESS (@var{type}, @var{buf})
1872Assume that @var{buf} holds a pointer of type @var{type}, in the
1873appropriate format for the current architecture. Return the byte
1874address the pointer refers to.
1875@xref{Target Architecture Definition, , Pointers Are Not Always Addresses}.
1876
9fb4dd36
JB
1877@item REGISTER_CONVERTIBLE (@var{reg})
1878Return non-zero if @var{reg} uses different raw and virtual formats.
4281a42e 1879@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
1880
1881@item REGISTER_RAW_SIZE (@var{reg})
1882Return the raw size of @var{reg}.
4281a42e 1883@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
1884
1885@item REGISTER_VIRTUAL_SIZE (@var{reg})
1886Return the virtual size of @var{reg}.
4281a42e 1887@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
1888
1889@item REGISTER_VIRTUAL_TYPE (@var{reg})
1890Return the virtual type of @var{reg}.
4281a42e 1891@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
1892
1893@item REGISTER_CONVERT_TO_VIRTUAL(@var{reg}, @var{type}, @var{from}, @var{to})
1894Convert the value of register @var{reg} from its raw form to its virtual
4281a42e
JB
1895form.
1896@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
1897
1898@item REGISTER_CONVERT_TO_RAW(@var{type}, @var{reg}, @var{from}, @var{to})
1899Convert the value of register @var{reg} from its virtual form to its raw
4281a42e
JB
1900form.
1901@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36 1902
e5419804
JB
1903@item RETURN_VALUE_ON_STACK(@var{type})
1904@findex RETURN_VALUE_ON_STACK
1905@cindex returning structures by value
1906@cindex structures, returning by value
1907
1908Return non-zero if values of type TYPE are returned on the stack, using
1909the ``struct convention'' (i.e., the caller provides a pointer to a
1910buffer in which the callee should store the return value). This
1911controls how the @samp{finish} command finds a function's return value,
1912and whether an inferior function call reserves space on the stack for
1913the return value.
1914
1915The full logic @value{GDBN} uses here is kind of odd.
1916@itemize @bullet
1917
1918@item
1919If the type being returned by value is not a structure, union, or array,
1920and @code{RETURN_VALUE_ON_STACK} returns zero, then @value{GDBN}
1921concludes the value is not returned using the struct convention.
1922
1923@item
1924Otherwise, @value{GDBN} calls @code{USE_STRUCT_CONVENTION} (see below).
1925If that returns non-zero, @value{GDBN} assumes the struct convention is
1926in use.
1927
1928@end itemize
1929
1930In other words, to indicate that a given type is returned by value using
1931the struct convention, that type must be either a struct, union, array,
1932or something @code{RETURN_VALUE_ON_STACK} likes, @emph{and} something
1933that @code{USE_STRUCT_CONVENTION} likes.
1934
1935Note that, in C and C++, arrays are never returned by value. In those
1936languages, these predicates will always see a pointer type, never an
1937array type. All the references above to arrays being returned by value
1938apply only to other languages.
1939
c906108c
SS
1940@item SOFTWARE_SINGLE_STEP_P
1941Define this as 1 if the target does not have a hardware single-step
1942mechanism. The macro @code{SOFTWARE_SINGLE_STEP} must also be defined.
1943
1944@item SOFTWARE_SINGLE_STEP(signal,insert_breapoints_p)
1945A function that inserts or removes (dependant on
1946@var{insert_breapoints_p}) breakpoints at each possible destinations of
1947the next instruction. See @code{sparc-tdep.c} and @code{rs6000-tdep.c}
1948for examples.
1949
da59e081
JM
1950@item SOFUN_ADDRESS_MAYBE_MISSING
1951
1952Somebody clever observed that, the more actual addresses you have in the
1953debug information, the more time the linker has to spend relocating
1954them. So whenever there's some other way the debugger could find the
1955address it needs, you should omit it from the debug info, to make
1956linking faster.
1957
1958@code{SOFUN_ADDRESS_MAYBE_MISSING} indicates that a particular set of
1959hacks of this sort are in use, affecting @code{N_SO} and @code{N_FUN}
1960entries in stabs-format debugging information. @code{N_SO} stabs mark
1961the beginning and ending addresses of compilation units in the text
1962segment. @code{N_FUN} stabs mark the starts and ends of functions.
1963
1964@code{SOFUN_ADDRESS_MAYBE_MISSING} means two things:
1965@itemize @bullet
1966
1967@item
1968@code{N_FUN} stabs have an address of zero. Instead, you should find the
1969addresses where the function starts by taking the function name from
1970the stab, and then looking that up in the minsyms (the linker/
1971assembler symbol table). In other words, the stab has the name, and
1972the linker / assembler symbol table is the only place that carries
1973the address.
1974
1975@item
1976@code{N_SO} stabs have an address of zero, too. You just look at the
1977@code{N_FUN} stabs that appear before and after the @code{N_SO} stab,
1978and guess the starting and ending addresses of the compilation unit from
1979them.
1980
1981@end itemize
1982
c906108c
SS
1983@item PCC_SOL_BROKEN
1984(Used only in the Convex target.)
1985
1986@item PC_IN_CALL_DUMMY
1987inferior.h
1988
1989@item PC_LOAD_SEGMENT
1990If defined, print information about the load segment for the program
1991counter. (Defined only for the RS/6000.)
1992
1993@item PC_REGNUM
1994If the program counter is kept in a register, then define this macro to
cce74817
JM
1995be the number (greater than or equal to zero) of that register.
1996
1997This should only need to be defined if @code{TARGET_READ_PC} and
1998@code{TARGET_WRITE_PC} are not defined.
c906108c
SS
1999
2000@item NPC_REGNUM
2001The number of the ``next program counter'' register, if defined.
2002
2003@item NNPC_REGNUM
2004The number of the ``next next program counter'' register, if defined.
2005Currently, this is only defined for the Motorola 88K.
2006
2df3850c
JM
2007@item PARM_BOUNDARY
2008If non-zero, round arguments to a boundary of this many bits before
2009pushing them on the stack.
2010
c906108c
SS
2011@item PRINT_REGISTER_HOOK (regno)
2012If defined, this must be a function that prints the contents of the
2013given register to standard output.
2014
2015@item PRINT_TYPELESS_INTEGER
2016This is an obscure substitute for @code{print_longest} that seems to
2017have been defined for the Convex target.
2018
2019@item PROCESS_LINENUMBER_HOOK
2020A hook defined for XCOFF reading.
2021
2022@item PROLOGUE_FIRSTLINE_OVERLAP
2023(Only used in unsupported Convex configuration.)
2024
2025@item PS_REGNUM
2026If defined, this is the number of the processor status register. (This
2027definition is only used in generic code when parsing "$ps".)
2028
2029@item POP_FRAME
2030Used in @samp{call_function_by_hand} to remove an artificial stack
1c6147de 2031frame and in @samp{return_command} to remove a real stack frame.
c906108c
SS
2032
2033@item PUSH_ARGUMENTS (nargs, args, sp, struct_return, struct_addr)
392a587b
JM
2034Define this to push arguments onto the stack for inferior function
2035call. Return the updated stack pointer value.
c906108c
SS
2036
2037@item PUSH_DUMMY_FRAME
2038Used in @samp{call_function_by_hand} to create an artificial stack frame.
2039
2040@item REGISTER_BYTES
25822942 2041The total amount of space needed to store @value{GDBN}'s copy of the machine's
c906108c
SS
2042register state.
2043
2044@item REGISTER_NAME(i)
2045Return the name of register @var{i} as a string. May return @var{NULL}
2046or @var{NUL} to indicate that register @var{i} is not valid.
2047
7a292a7a
SS
2048@item REGISTER_NAMES
2049Deprecated in favor of @var{REGISTER_NAME}.
2050
c906108c
SS
2051@item REG_STRUCT_HAS_ADDR (gcc_p, type)
2052Define this to return 1 if the given type will be passed by pointer
2053rather than directly.
2054
43ff13b4
JM
2055@item SAVE_DUMMY_FRAME_TOS (sp)
2056Used in @samp{call_function_by_hand} to notify the target dependent code
2057of the top-of-stack value that will be passed to the the inferior code.
2058This is the value of the @var{SP} after both the dummy frame and space
2059for parameters/results have been allocated on the stack.
2060
c906108c 2061@item SDB_REG_TO_REGNUM
25822942 2062Define this to convert sdb register numbers into @value{GDBN} regnums. If not
c906108c
SS
2063defined, no conversion will be done.
2064
2065@item SHIFT_INST_REGS
2066(Only used for m88k targets.)
2067
c2c6d25f 2068@item SKIP_PERMANENT_BREAKPOINT
25822942 2069Advance the inferior's PC past a permanent breakpoint. @value{GDBN} normally
c2c6d25f
JM
2070steps over a breakpoint by removing it, stepping one instruction, and
2071re-inserting the breakpoint. However, permanent breakpoints are
2072hardwired into the inferior, and can't be removed, so this strategy
2073doesn't work. Calling SKIP_PERMANENT_BREAKPOINT adjusts the processor's
2074state so that execution will resume just after the breakpoint. This
2075macro does the right thing even when the breakpoint is in the delay slot
2076of a branch or jump.
2077
c906108c 2078@item SKIP_PROLOGUE (pc)
b83266a0
SS
2079A C expression that returns the address of the ``real'' code beyond the
2080function entry prologue found at @var{pc}.
c906108c
SS
2081
2082@item SKIP_PROLOGUE_FRAMELESS_P
b83266a0
SS
2083A C expression that should behave similarly, but that can stop as soon
2084as the function is known to have a frame. If not defined,
c906108c
SS
2085@code{SKIP_PROLOGUE} will be used instead.
2086
2087@item SKIP_TRAMPOLINE_CODE (pc)
2088If the target machine has trampoline code that sits between callers and
2089the functions being called, then define this macro to return a new PC
2090that is at the start of the real function.
2091
2092@item SP_REGNUM
cce74817
JM
2093If the stack-pointer is kept in a register, then define this macro to be
2094the number (greater than or equal to zero) of that register.
2095
2096This should only need to be defined if @code{TARGET_WRITE_SP} and
2097@code{TARGET_WRITE_SP} are not defined.
c906108c
SS
2098
2099@item STAB_REG_TO_REGNUM
2100Define this to convert stab register numbers (as gotten from `r'
25822942 2101declarations) into @value{GDBN} regnums. If not defined, no conversion will be
c906108c
SS
2102done.
2103
2104@item STACK_ALIGN (addr)
2105Define this to adjust the address to the alignment required for the
2106processor's stack.
2107
2108@item STEP_SKIPS_DELAY (addr)
2109Define this to return true if the address is of an instruction with a
2110delay slot. If a breakpoint has been placed in the instruction's delay
25822942 2111slot, @value{GDBN} will single-step over that instruction before resuming
c906108c
SS
2112normally. Currently only defined for the Mips.
2113
2114@item STORE_RETURN_VALUE (type, valbuf)
2115A C expression that stores a function return value of type @var{type},
2116where @var{valbuf} is the address of the value to be stored.
2117
2118@item SUN_FIXED_LBRAC_BUG
2119(Used only for Sun-3 and Sun-4 targets.)
2120
2121@item SYMBOL_RELOADING_DEFAULT
2122The default value of the `symbol-reloading' variable. (Never defined in
2123current sources.)
2124
2125@item TARGET_BYTE_ORDER_DEFAULT
2126The ordering of bytes in the target. This must be either
2127@code{BIG_ENDIAN} or @code{LITTLE_ENDIAN}. This macro replaces
2128@var{TARGET_BYTE_ORDER} which is deprecated.
2129
2130@item TARGET_BYTE_ORDER_SELECTABLE_P
2131Non-zero if the target has both @code{BIG_ENDIAN} and
2132@code{LITTLE_ENDIAN} variants. This macro replaces
2133@var{TARGET_BYTE_ORDER_SELECTABLE} which is deprecated.
2134
2135@item TARGET_CHAR_BIT
2136Number of bits in a char; defaults to 8.
2137
2138@item TARGET_COMPLEX_BIT
2139Number of bits in a complex number; defaults to @code{2 * TARGET_FLOAT_BIT}.
2140
ac9a91a7
JM
2141At present this macro is not used.
2142
c906108c
SS
2143@item TARGET_DOUBLE_BIT
2144Number of bits in a double float; defaults to @code{8 * TARGET_CHAR_BIT}.
2145
2146@item TARGET_DOUBLE_COMPLEX_BIT
2147Number of bits in a double complex; defaults to @code{2 * TARGET_DOUBLE_BIT}.
2148
ac9a91a7
JM
2149At present this macro is not used.
2150
c906108c
SS
2151@item TARGET_FLOAT_BIT
2152Number of bits in a float; defaults to @code{4 * TARGET_CHAR_BIT}.
2153
2154@item TARGET_INT_BIT
2155Number of bits in an integer; defaults to @code{4 * TARGET_CHAR_BIT}.
2156
2157@item TARGET_LONG_BIT
2158Number of bits in a long integer; defaults to @code{4 * TARGET_CHAR_BIT}.
2159
2160@item TARGET_LONG_DOUBLE_BIT
2161Number of bits in a long double float;
2162defaults to @code{2 * TARGET_DOUBLE_BIT}.
2163
2164@item TARGET_LONG_LONG_BIT
2165Number of bits in a long long integer; defaults to @code{2 * TARGET_LONG_BIT}.
2166
2167@item TARGET_PTR_BIT
2168Number of bits in a pointer; defaults to @code{TARGET_INT_BIT}.
2169
2170@item TARGET_SHORT_BIT
2171Number of bits in a short integer; defaults to @code{2 * TARGET_CHAR_BIT}.
2172
2173@item TARGET_READ_PC
2174@item TARGET_WRITE_PC (val, pid)
2175@item TARGET_READ_SP
2176@item TARGET_WRITE_SP
2177@item TARGET_READ_FP
2178@item TARGET_WRITE_FP
2179These change the behavior of @code{read_pc}, @code{write_pc},
2180@code{read_sp}, @code{write_sp}, @code{read_fp} and @code{write_fp}.
25822942 2181For most targets, these may be left undefined. @value{GDBN} will call the read
c906108c
SS
2182and write register functions with the relevant @code{_REGNUM} argument.
2183
2184These macros are useful when a target keeps one of these registers in a
2185hard to get at place; for example, part in a segment register and part
2186in an ordinary register.
2187
2188@item TARGET_VIRTUAL_FRAME_POINTER(pc,regp,offsetp)
2189Returns a @code{(register, offset)} pair representing the virtual
2190frame pointer in use at the code address @code{"pc"}. If virtual
2191frame pointers are not used, a default definition simply returns
2192@code{FP_REGNUM}, with an offset of zero.
2193
2194@item USE_STRUCT_CONVENTION (gcc_p, type)
2195If defined, this must be an expression that is nonzero if a value of the
2196given @var{type} being returned from a function must have space
2197allocated for it on the stack. @var{gcc_p} is true if the function
2198being considered is known to have been compiled by GCC; this is helpful
2199for systems where GCC is known to use different calling convention than
2200other compilers.
2201
2202@item VARIABLES_INSIDE_BLOCK (desc, gcc_p)
2203For dbx-style debugging information, if the compiler puts variable
2204declarations inside LBRAC/RBRAC blocks, this should be defined to be
2205nonzero. @var{desc} is the value of @code{n_desc} from the
25822942 2206@code{N_RBRAC} symbol, and @var{gcc_p} is true if @value{GDBN} has noticed the
c906108c
SS
2207presence of either the @code{GCC_COMPILED_SYMBOL} or the
2208@code{GCC2_COMPILED_SYMBOL}. By default, this is 0.
2209
2210@item OS9K_VARIABLES_INSIDE_BLOCK (desc, gcc_p)
2211Similarly, for OS/9000. Defaults to 1.
2212
2213@end table
2214
2215Motorola M68K target conditionals.
2216
2217@table @code
2218
2219@item BPT_VECTOR
2220Define this to be the 4-bit location of the breakpoint trap vector. If
2221not defined, it will default to @code{0xf}.
2222
2223@item REMOTE_BPT_VECTOR
2224Defaults to @code{1}.
2225
2226@end table
2227
2228@section Adding a New Target
2229
25822942 2230The following files define a target to @value{GDBN}:
c906108c
SS
2231
2232@table @file
2233
2234@item gdb/config/@var{arch}/@var{ttt}.mt
2235Contains a Makefile fragment specific to this target. Specifies what
2236object files are needed for target @var{ttt}, by defining
104c1213
JM
2237@samp{TDEPFILES=@dots{}} and @samp{TDEPLIBS=@dots{}}. Also specifies
2238the header file which describes @var{ttt}, by defining @samp{TM_FILE=
2239tm-@var{ttt}.h}.
2240
2241You can also define @samp{TM_CFLAGS}, @samp{TM_CLIBS}, @samp{TM_CDEPS},
2242but these are now deprecated, replaced by autoconf, and may go away in
25822942 2243future versions of @value{GDBN}.
c906108c
SS
2244
2245@item gdb/config/@var{arch}/tm-@var{ttt}.h
2246(@file{tm.h} is a link to this file, created by configure). Contains
2247macro definitions about the target machine's registers, stack frame
2248format and instructions.
2249
2250@item gdb/@var{ttt}-tdep.c
2251Contains any miscellaneous code required for this target machine. On
2252some machines it doesn't exist at all. Sometimes the macros in
2253@file{tm-@var{ttt}.h} become very complicated, so they are implemented
2254as functions here instead, and the macro is simply defined to call the
2255function. This is vastly preferable, since it is easier to understand
2256and debug.
2257
2258@item gdb/config/@var{arch}/tm-@var{arch}.h
2259This often exists to describe the basic layout of the target machine's
2260processor chip (registers, stack, etc). If used, it is included by
2261@file{tm-@var{ttt}.h}. It can be shared among many targets that use the
2262same processor.
2263
2264@item gdb/@var{arch}-tdep.c
2265Similarly, there are often common subroutines that are shared by all
2266target machines that use this particular architecture.
2267
2268@end table
2269
2270If you are adding a new operating system for an existing CPU chip, add a
2271@file{config/tm-@var{os}.h} file that describes the operating system
2272facilities that are unusual (extra symbol table info; the breakpoint
2273instruction needed; etc). Then write a @file{@var{arch}/tm-@var{os}.h}
2274that just @code{#include}s @file{tm-@var{arch}.h} and
2275@file{config/tm-@var{os}.h}.
2276
2277
2278@node Target Vector Definition
2279
2280@chapter Target Vector Definition
2281
25822942 2282The target vector defines the interface between @value{GDBN}'s abstract handling
c906108c 2283of target systems, and the nitty-gritty code that actually exercises
25822942
DB
2284control over a process or a serial port. @value{GDBN} includes some 30-40
2285different target vectors; however, each configuration of @value{GDBN} includes
c906108c
SS
2286only a few of them.
2287
2288@section File Targets
2289
2290Both executables and core files have target vectors.
2291
2292@section Standard Protocol and Remote Stubs
2293
25822942
DB
2294@value{GDBN}'s file @file{remote.c} talks a serial protocol to code that runs in
2295the target system. @value{GDBN} provides several sample ``stubs'' that can be
c906108c
SS
2296integrated into target programs or operating systems for this purpose;
2297they are named @file{*-stub.c}.
2298
25822942 2299The @value{GDBN} user's manual describes how to put such a stub into your target
c906108c
SS
2300code. What follows is a discussion of integrating the SPARC stub into a
2301complicated operating system (rather than a simple program), by Stu
2302Grossman, the author of this stub.
2303
2304The trap handling code in the stub assumes the following upon entry to
2305trap_low:
2306
2307@enumerate
2308
2309@item %l1 and %l2 contain pc and npc respectively at the time of the trap
2310
2311@item traps are disabled
2312
2313@item you are in the correct trap window
2314
2315@end enumerate
2316
2317As long as your trap handler can guarantee those conditions, then there
2318is no reason why you shouldn't be able to `share' traps with the stub.
2319The stub has no requirement that it be jumped to directly from the
2320hardware trap vector. That is why it calls @code{exceptionHandler()},
2321which is provided by the external environment. For instance, this could
2322setup the hardware traps to actually execute code which calls the stub
2323first, and then transfers to its own trap handler.
2324
2325For the most point, there probably won't be much of an issue with
2326`sharing' traps, as the traps we use are usually not used by the kernel,
2327and often indicate unrecoverable error conditions. Anyway, this is all
2328controlled by a table, and is trivial to modify. The most important
2329trap for us is for @code{ta 1}. Without that, we can't single step or
2330do breakpoints. Everything else is unnecessary for the proper operation
2331of the debugger/stub.
2332
2333From reading the stub, it's probably not obvious how breakpoints work.
25822942 2334They are simply done by deposit/examine operations from @value{GDBN}.
c906108c
SS
2335
2336@section ROM Monitor Interface
2337
2338@section Custom Protocols
2339
2340@section Transport Layer
2341
2342@section Builtin Simulator
2343
2344
2345@node Native Debugging
2346
2347@chapter Native Debugging
2348
25822942 2349Several files control @value{GDBN}'s configuration for native support:
c906108c
SS
2350
2351@table @file
2352
2353@item gdb/config/@var{arch}/@var{xyz}.mh
2354Specifies Makefile fragments needed when hosting @emph{or native} on
2355machine @var{xyz}. In particular, this lists the required
2356native-dependent object files, by defining @samp{NATDEPFILES=@dots{}}.
2357Also specifies the header file which describes native support on
2358@var{xyz}, by defining @samp{NAT_FILE= nm-@var{xyz}.h}. You can also
2359define @samp{NAT_CFLAGS}, @samp{NAT_ADD_FILES}, @samp{NAT_CLIBS},
2360@samp{NAT_CDEPS}, etc.; see @file{Makefile.in}.
2361
2362@item gdb/config/@var{arch}/nm-@var{xyz}.h
2363(@file{nm.h} is a link to this file, created by configure). Contains C
2364macro definitions describing the native system environment, such as
2365child process control and core file support.
2366
2367@item gdb/@var{xyz}-nat.c
2368Contains any miscellaneous C code required for this native support of
2369this machine. On some machines it doesn't exist at all.
2370
2371@end table
2372
2373There are some ``generic'' versions of routines that can be used by
2374various systems. These can be customized in various ways by macros
2375defined in your @file{nm-@var{xyz}.h} file. If these routines work for
2376the @var{xyz} host, you can just include the generic file's name (with
2377@samp{.o}, not @samp{.c}) in @code{NATDEPFILES}.
2378
2379Otherwise, if your machine needs custom support routines, you will need
2380to write routines that perform the same functions as the generic file.
2381Put them into @code{@var{xyz}-nat.c}, and put @code{@var{xyz}-nat.o}
2382into @code{NATDEPFILES}.
2383
2384@table @file
2385
2386@item inftarg.c
2387This contains the @emph{target_ops vector} that supports Unix child
2388processes on systems which use ptrace and wait to control the child.
2389
2390@item procfs.c
2391This contains the @emph{target_ops vector} that supports Unix child
2392processes on systems which use /proc to control the child.
2393
2394@item fork-child.c
2395This does the low-level grunge that uses Unix system calls to do a "fork
2396and exec" to start up a child process.
2397
2398@item infptrace.c
2399This is the low level interface to inferior processes for systems using
2400the Unix @code{ptrace} call in a vanilla way.
2401
2402@end table
2403
2404@section Native core file Support
2405
2406@table @file
2407
2408@item core-aout.c::fetch_core_registers()
2409Support for reading registers out of a core file. This routine calls
2410@code{register_addr()}, see below. Now that BFD is used to read core
2411files, virtually all machines should use @code{core-aout.c}, and should
2412just provide @code{fetch_core_registers} in @code{@var{xyz}-nat.c} (or
2413@code{REGISTER_U_ADDR} in @code{nm-@var{xyz}.h}).
2414
2415@item core-aout.c::register_addr()
2416If your @code{nm-@var{xyz}.h} file defines the macro
2417@code{REGISTER_U_ADDR(addr, blockend, regno)}, it should be defined to
25822942 2418set @code{addr} to the offset within the @samp{user} struct of @value{GDBN}
c906108c
SS
2419register number @code{regno}. @code{blockend} is the offset within the
2420``upage'' of @code{u.u_ar0}. If @code{REGISTER_U_ADDR} is defined,
2421@file{core-aout.c} will define the @code{register_addr()} function and
2422use the macro in it. If you do not define @code{REGISTER_U_ADDR}, but
2423you are using the standard @code{fetch_core_registers()}, you will need
2424to define your own version of @code{register_addr()}, put it into your
2425@code{@var{xyz}-nat.c} file, and be sure @code{@var{xyz}-nat.o} is in
2426the @code{NATDEPFILES} list. If you have your own
2427@code{fetch_core_registers()}, you may not need a separate
2428@code{register_addr()}. Many custom @code{fetch_core_registers()}
2429implementations simply locate the registers themselves.@refill
2430
2431@end table
2432
25822942 2433When making @value{GDBN} run native on a new operating system, to make it
c906108c
SS
2434possible to debug core files, you will need to either write specific
2435code for parsing your OS's core files, or customize
2436@file{bfd/trad-core.c}. First, use whatever @code{#include} files your
2437machine uses to define the struct of registers that is accessible
2438(possibly in the u-area) in a core file (rather than
2439@file{machine/reg.h}), and an include file that defines whatever header
2440exists on a core file (e.g. the u-area or a @samp{struct core}). Then
2441modify @code{trad_unix_core_file_p()} to use these values to set up the
2442section information for the data segment, stack segment, any other
2443segments in the core file (perhaps shared library contents or control
2444information), ``registers'' segment, and if there are two discontiguous
2445sets of registers (e.g. integer and float), the ``reg2'' segment. This
2446section information basically delimits areas in the core file in a
2447standard way, which the section-reading routines in BFD know how to seek
2448around in.
2449
25822942 2450Then back in @value{GDBN}, you need a matching routine called
c906108c
SS
2451@code{fetch_core_registers()}. If you can use the generic one, it's in
2452@file{core-aout.c}; if not, it's in your @file{@var{xyz}-nat.c} file.
2453It will be passed a char pointer to the entire ``registers'' segment,
2454its length, and a zero; or a char pointer to the entire ``regs2''
2455segment, its length, and a 2. The routine should suck out the supplied
25822942 2456register values and install them into @value{GDBN}'s ``registers'' array.
c906108c
SS
2457
2458If your system uses @file{/proc} to control processes, and uses ELF
2459format core files, then you may be able to use the same routines for
2460reading the registers out of processes and out of core files.
2461
2462@section ptrace
2463
2464@section /proc
2465
2466@section win32
2467
2468@section shared libraries
2469
2470@section Native Conditionals
2471
25822942 2472When @value{GDBN} is configured and compiled, various macros are defined or left
c906108c
SS
2473undefined, to control compilation when the host and target systems are
2474the same. These macros should be defined (or left undefined) in
2475@file{nm-@var{system}.h}.
2476
2477@table @code
2478
2479@item ATTACH_DETACH
25822942 2480If defined, then @value{GDBN} will include support for the @code{attach} and
c906108c
SS
2481@code{detach} commands.
2482
2483@item CHILD_PREPARE_TO_STORE
2484If the machine stores all registers at once in the child process, then
2485define this to ensure that all values are correct. This usually entails
2486a read from the child.
2487
2488[Note that this is incorrectly defined in @file{xm-@var{system}.h} files
2489currently.]
2490
2491@item FETCH_INFERIOR_REGISTERS
2492Define this if the native-dependent code will provide its own routines
2493@code{fetch_inferior_registers} and @code{store_inferior_registers} in
2494@file{@var{HOST}-nat.c}. If this symbol is @emph{not} defined, and
2495@file{infptrace.c} is included in this configuration, the default
2496routines in @file{infptrace.c} are used for these functions.
2497
2498@item FILES_INFO_HOOK
2499(Only defined for Convex.)
2500
2501@item FP0_REGNUM
2502This macro is normally defined to be the number of the first floating
2503point register, if the machine has such registers. As such, it would
2504appear only in target-specific code. However, /proc support uses this
2505to decide whether floats are in use on this target.
2506
2507@item GET_LONGJMP_TARGET
2508For most machines, this is a target-dependent parameter. On the
2509DECstation and the Iris, this is a native-dependent parameter, since
2510<setjmp.h> is needed to define it.
2511
2512This macro determines the target PC address that longjmp() will jump to,
2513assuming that we have just stopped at a longjmp breakpoint. It takes a
2514CORE_ADDR * as argument, and stores the target PC value through this
2515pointer. It examines the current state of the machine as needed.
2516
2517@item KERNEL_U_ADDR
2518Define this to the address of the @code{u} structure (the ``user
25822942 2519struct'', also known as the ``u-page'') in kernel virtual memory. @value{GDBN}
c906108c
SS
2520needs to know this so that it can subtract this address from absolute
2521addresses in the upage, that are obtained via ptrace or from core files.
2522On systems that don't need this value, set it to zero.
2523
2524@item KERNEL_U_ADDR_BSD
25822942 2525Define this to cause @value{GDBN} to determine the address of @code{u} at
c906108c
SS
2526runtime, by using Berkeley-style @code{nlist} on the kernel's image in
2527the root directory.
2528
2529@item KERNEL_U_ADDR_HPUX
25822942 2530Define this to cause @value{GDBN} to determine the address of @code{u} at
c906108c
SS
2531runtime, by using HP-style @code{nlist} on the kernel's image in the
2532root directory.
2533
2534@item ONE_PROCESS_WRITETEXT
2535Define this to be able to, when a breakpoint insertion fails, warn the
2536user that another process may be running with the same executable.
2537
adf40b2e
JM
2538@item PREPARE_TO_PROCEED @var{select_it}
2539This (ugly) macro allows a native configuration to customize the way the
2540@code{proceed} function in @file{infrun.c} deals with switching between
2541threads.
2542
2543In a multi-threaded task we may select another thread and then continue
2544or step. But if the old thread was stopped at a breakpoint, it will
2545immediately cause another breakpoint stop without any execution (i.e. it
25822942 2546will report a breakpoint hit incorrectly). So @value{GDBN} must step over it
adf40b2e
JM
2547first.
2548
2549If defined, @code{PREPARE_TO_PROCEED} should check the current thread
2550against the thread that reported the most recent event. If a step-over
2551is required, it returns TRUE. If @var{select_it} is non-zero, it should
2552reselect the old thread.
2553
c906108c
SS
2554@item PROC_NAME_FMT
2555Defines the format for the name of a @file{/proc} device. Should be
2556defined in @file{nm.h} @emph{only} in order to override the default
2557definition in @file{procfs.c}.
2558
2559@item PTRACE_FP_BUG
2560mach386-xdep.c
2561
2562@item PTRACE_ARG3_TYPE
2563The type of the third argument to the @code{ptrace} system call, if it
2564exists and is different from @code{int}.
2565
2566@item REGISTER_U_ADDR
2567Defines the offset of the registers in the ``u area''.
2568
2569@item SHELL_COMMAND_CONCAT
2570If defined, is a string to prefix on the shell command used to start the
2571inferior.
2572
2573@item SHELL_FILE
2574If defined, this is the name of the shell to use to run the inferior.
2575Defaults to @code{"/bin/sh"}.
2576
2577@item SOLIB_ADD (filename, from_tty, targ)
2578Define this to expand into an expression that will cause the symbols in
25822942 2579@var{filename} to be added to @value{GDBN}'s symbol table.
c906108c
SS
2580
2581@item SOLIB_CREATE_INFERIOR_HOOK
2582Define this to expand into any shared-library-relocation code that you
2583want to be run just after the child process has been forked.
2584
2585@item START_INFERIOR_TRAPS_EXPECTED
25822942 2586When starting an inferior, @value{GDBN} normally expects to trap twice; once when
c906108c
SS
2587the shell execs, and once when the program itself execs. If the actual
2588number of traps is something other than 2, then define this macro to
2589expand into the number expected.
2590
2591@item SVR4_SHARED_LIBS
2592Define this to indicate that SVR4-style shared libraries are in use.
2593
2594@item USE_PROC_FS
2595This determines whether small routines in @file{*-tdep.c}, which
25822942 2596translate register values between @value{GDBN}'s internal representation and the
c906108c
SS
2597/proc representation, are compiled.
2598
2599@item U_REGS_OFFSET
2600This is the offset of the registers in the upage. It need only be
2601defined if the generic ptrace register access routines in
2602@file{infptrace.c} are being used (that is, @file{infptrace.c} is
2603configured in, and @code{FETCH_INFERIOR_REGISTERS} is not defined). If
2604the default value from @file{infptrace.c} is good enough, leave it
2605undefined.
2606
2607The default value means that u.u_ar0 @emph{points to} the location of
2608the registers. I'm guessing that @code{#define U_REGS_OFFSET 0} means
2609that u.u_ar0 @emph{is} the location of the registers.
2610
2611@item CLEAR_SOLIB
2612objfiles.c
2613
2614@item DEBUG_PTRACE
2615Define this to debug ptrace calls.
2616
2617@end table
2618
2619
2620@node Support Libraries
2621
2622@chapter Support Libraries
2623
2624@section BFD
2625
25822942 2626BFD provides support for @value{GDBN} in several ways:
c906108c
SS
2627
2628@table @emph
2629
2630@item identifying executable and core files
2631BFD will identify a variety of file types, including a.out, coff, and
2632several variants thereof, as well as several kinds of core files.
2633
2634@item access to sections of files
2635BFD parses the file headers to determine the names, virtual addresses,
2636sizes, and file locations of all the various named sections in files
25822942 2637(such as the text section or the data section). @value{GDBN} simply calls BFD to
c906108c
SS
2638read or write section X at byte offset Y for length Z.
2639
2640@item specialized core file support
2641BFD provides routines to determine the failing command name stored in a
2642core file, the signal with which the program failed, and whether a core
2643file matches (i.e. could be a core dump of) a particular executable
2644file.
2645
2646@item locating the symbol information
25822942
DB
2647@value{GDBN} uses an internal interface of BFD to determine where to find the
2648symbol information in an executable file or symbol-file. @value{GDBN} itself
c906108c 2649handles the reading of symbols, since BFD does not ``understand'' debug
25822942 2650symbols, but @value{GDBN} uses BFD's cached information to find the symbols,
c906108c
SS
2651string table, etc.
2652
2653@end table
2654
2655@section opcodes
2656
25822942 2657The opcodes library provides @value{GDBN}'s disassembler. (It's a separate
c906108c
SS
2658library because it's also used in binutils, for @file{objdump}).
2659
2660@section readline
2661
2662@section mmalloc
2663
2664@section libiberty
2665
2666@section gnu-regex
2667
2668Regex conditionals.
2669
2670@table @code
2671
2672@item C_ALLOCA
2673
2674@item NFAILURES
2675
2676@item RE_NREGS
2677
2678@item SIGN_EXTEND_CHAR
2679
2680@item SWITCH_ENUM_BUG
2681
2682@item SYNTAX_TABLE
2683
2684@item Sword
2685
2686@item sparc
2687
2688@end table
2689
2690@section include
2691
2692@node Coding
2693
2694@chapter Coding
2695
2696This chapter covers topics that are lower-level than the major
25822942 2697algorithms of @value{GDBN}.
c906108c
SS
2698
2699@section Cleanups
2700
2701Cleanups are a structured way to deal with things that need to be done
2702later. When your code does something (like @code{malloc} some memory,
2703or open a file) that needs to be undone later (e.g. free the memory or
2704close the file), it can make a cleanup. The cleanup will be done at
2705some future point: when the command is finished, when an error occurs,
2706or when your code decides it's time to do cleanups.
2707
2708You can also discard cleanups, that is, throw them away without doing
2709what they say. This is only done if you ask that it be done.
2710
2711Syntax:
2712
2713@table @code
2714
2715@item struct cleanup *@var{old_chain};
2716Declare a variable which will hold a cleanup chain handle.
2717
2718@item @var{old_chain} = make_cleanup (@var{function}, @var{arg});
2719Make a cleanup which will cause @var{function} to be called with
2720@var{arg} (a @code{char *}) later. The result, @var{old_chain}, is a
2721handle that can be passed to @code{do_cleanups} or
2722@code{discard_cleanups} later. Unless you are going to call
2723@code{do_cleanups} or @code{discard_cleanups} yourself, you can ignore
2724the result from @code{make_cleanup}.
2725
2726@item do_cleanups (@var{old_chain});
2727Perform all cleanups done since @code{make_cleanup} returned
2728@var{old_chain}. E.g.:
2729@example
2730make_cleanup (a, 0);
2731old = make_cleanup (b, 0);
2732do_cleanups (old);
2733@end example
2734@noindent
2735will call @code{b()} but will not call @code{a()}. The cleanup that
2736calls @code{a()} will remain in the cleanup chain, and will be done
2737later unless otherwise discarded.@refill
2738
2739@item discard_cleanups (@var{old_chain});
2740Same as @code{do_cleanups} except that it just removes the cleanups from
2741the chain and does not call the specified functions.
2742
2743@end table
2744
2745Some functions, e.g. @code{fputs_filtered()} or @code{error()}, specify
2746that they ``should not be called when cleanups are not in place''. This
2747means that any actions you need to reverse in the case of an error or
2748interruption must be on the cleanup chain before you call these
2749functions, since they might never return to your code (they
2750@samp{longjmp} instead).
2751
2752@section Wrapping Output Lines
2753
2754Output that goes through @code{printf_filtered} or @code{fputs_filtered}
2755or @code{fputs_demangled} needs only to have calls to @code{wrap_here}
2756added in places that would be good breaking points. The utility
2757routines will take care of actually wrapping if the line width is
2758exceeded.
2759
2760The argument to @code{wrap_here} is an indentation string which is
2761printed @emph{only} if the line breaks there. This argument is saved
2762away and used later. It must remain valid until the next call to
2763@code{wrap_here} or until a newline has been printed through the
2764@code{*_filtered} functions. Don't pass in a local variable and then
2765return!
2766
2767It is usually best to call @code{wrap_here()} after printing a comma or
2768space. If you call it before printing a space, make sure that your
2769indentation properly accounts for the leading space that will print if
2770the line wraps there.
2771
2772Any function or set of functions that produce filtered output must
2773finish by printing a newline, to flush the wrap buffer, before switching
2774to unfiltered (``@code{printf}'') output. Symbol reading routines that
2775print warnings are a good example.
2776
25822942 2777@section @value{GDBN} Coding Standards
c906108c 2778
25822942 2779@value{GDBN} follows the GNU coding standards, as described in
c906108c 2780@file{etc/standards.texi}. This file is also available for anonymous
25822942 2781FTP from GNU archive sites. @value{GDBN} takes a strict interpretation of the
c906108c 2782standard; in general, when the GNU standard recommends a practice but
25822942 2783does not require it, @value{GDBN} requires it.
c906108c 2784
25822942 2785@value{GDBN} follows an additional set of coding standards specific to @value{GDBN},
c906108c
SS
2786as described in the following sections.
2787
3b851bce
AC
2788You can configure with @samp{--enable-build-warnings} or
2789@samp{--enable-gdb-build-warnings} to get GCC to check on a number of
2790these rules. @value{GDBN} sources ought not to engender any complaints,
2791unless they are caused by bogus host systems. (The exact set of enabled
2792warnings is currently @samp{-Wimplicit -Wreturn-type -Wcomment
2793-Wtrigraphs -Wformat -Wparentheses -Wpointer-arith -Wuninitialized}.
c906108c
SS
2794
2795@subsection Formatting
2796
2797The standard GNU recommendations for formatting must be followed
2798strictly.
2799
2800Note that while in a definition, the function's name must be in column
2801zero; in a function declaration, the name must be on the same line as
2802the return type.
2803
2804In addition, there must be a space between a function or macro name and
2805the opening parenthesis of its argument list (except for macro
2806definitions, as required by C). There must not be a space after an open
2807paren/bracket or before a close paren/bracket.
2808
2809While additional whitespace is generally helpful for reading, do not use
2810more than one blank line to separate blocks, and avoid adding whitespace
2811after the end of a program line (as of 1/99, some 600 lines had whitespace
2812after the semicolon). Excess whitespace causes difficulties for diff and
2813patch.
2814
2815@subsection Comments
2816
2817The standard GNU requirements on comments must be followed strictly.
2818
2819Block comments must appear in the following form, with no `/*'- or
2820'*/'-only lines, and no leading `*':
2821
2822@example @code
2823/* Wait for control to return from inferior to debugger. If inferior
2824 gets a signal, we may decide to start it up again instead of
2825 returning. That is why there is a loop in this function. When
2826 this function actually returns it means the inferior should be left
25822942 2827 stopped and @value{GDBN} should read more commands. */
c906108c
SS
2828@end example
2829
2830(Note that this format is encouraged by Emacs; tabbing for a multi-line
2831comment works correctly, and M-Q fills the block consistently.)
2832
2833Put a blank line between the block comments preceding function or
2834variable definitions, and the definition itself.
2835
2836In general, put function-body comments on lines by themselves, rather
2837than trying to fit them into the 20 characters left at the end of a
2838line, since either the comment or the code will inevitably get longer
2839than will fit, and then somebody will have to move it anyhow.
2840
2841@subsection C Usage
2842
2843Code must not depend on the sizes of C data types, the format of the
2844host's floating point numbers, the alignment of anything, or the order
2845of evaluation of expressions.
2846
2847Use functions freely. There are only a handful of compute-bound areas
25822942
DB
2848in @value{GDBN} that might be affected by the overhead of a function call, mainly
2849in symbol reading. Most of @value{GDBN}'s performance is limited by the target
c906108c
SS
2850interface (whether serial line or system call).
2851
2852However, use functions with moderation. A thousand one-line functions
2853are just as hard to understand as a single thousand-line function.
2854
2855@subsection Function Prototypes
2856
53a5351d 2857Prototypes must be used to @emph{declare} functions, and may be used to
25822942 2858@emph{define} them. Prototypes for @value{GDBN} functions must include both the
c906108c
SS
2859argument type and name, with the name matching that used in the actual
2860function definition.
2861
53a5351d
JM
2862All external functions should have a declaration in a header file that
2863callers include, except for @code{_initialize_*} functions, which must
2864be external so that @file{init.c} construction works, but shouldn't be
2865visible to random source files.
c906108c
SS
2866
2867All static functions must be declared in a block near the top of the
2868source file.
2869
2870@subsection Clean Design
2871
2872In addition to getting the syntax right, there's the little question of
25822942 2873semantics. Some things are done in certain ways in @value{GDBN} because long
c906108c
SS
2874experience has shown that the more obvious ways caused various kinds of
2875trouble.
2876
2877You can't assume the byte order of anything that comes from a target
2878(including @var{value}s, object files, and instructions). Such things
25822942 2879must be byte-swapped using @code{SWAP_TARGET_AND_HOST} in @value{GDBN}, or one of
c906108c
SS
2880the swap routines defined in @file{bfd.h}, such as @code{bfd_get_32}.
2881
2882You can't assume that you know what interface is being used to talk to
2883the target system. All references to the target must go through the
2884current @code{target_ops} vector.
2885
2886You can't assume that the host and target machines are the same machine
2887(except in the ``native'' support modules). In particular, you can't
2888assume that the target machine's header files will be available on the
2889host machine. Target code must bring along its own header files --
2890written from scratch or explicitly donated by their owner, to avoid
2891copyright problems.
2892
2893Insertion of new @code{#ifdef}'s will be frowned upon. It's much better
2894to write the code portably than to conditionalize it for various
2895systems.
2896
2897New @code{#ifdef}'s which test for specific compilers or manufacturers
2898or operating systems are unacceptable. All @code{#ifdef}'s should test
2899for features. The information about which configurations contain which
2900features should be segregated into the configuration files. Experience
2901has proven far too often that a feature unique to one particular system
2902often creeps into other systems; and that a conditional based on some
2903predefined macro for your current system will become worthless over
2904time, as new versions of your system come out that behave differently
2905with regard to this feature.
2906
2907Adding code that handles specific architectures, operating systems,
2908target interfaces, or hosts, is not acceptable in generic code. If a
2909hook is needed at that point, invent a generic hook and define it for
2910your configuration, with something like:
2911
2912@example
2913#ifdef WRANGLE_SIGNALS
2914 WRANGLE_SIGNALS (signo);
2915#endif
2916@end example
2917
2918In your host, target, or native configuration file, as appropriate,
2919define @code{WRANGLE_SIGNALS} to do the machine-dependent thing. Take a
2920bit of care in defining the hook, so that it can be used by other ports
2921in the future, if they need a hook in the same place.
2922
2923If the hook is not defined, the code should do whatever "most" machines
2924want. Using @code{#ifdef}, as above, is the preferred way to do this,
2925but sometimes that gets convoluted, in which case use
2926
2927@example
2928#ifndef SPECIAL_FOO_HANDLING
2929#define SPECIAL_FOO_HANDLING(pc, sp) (0)
2930#endif
2931@end example
2932
2933where the macro is used or in an appropriate header file.
2934
2935Whether to include a @dfn{small} hook, a hook around the exact pieces of
2936code which are system-dependent, or whether to replace a whole function
2937with a hook depends on the case. A good example of this dilemma can be
25822942 2938found in @code{get_saved_register}. All machines that @value{GDBN} 2.8 ran on
c906108c
SS
2939just needed the @code{FRAME_FIND_SAVED_REGS} hook to find the saved
2940registers. Then the SPARC and Pyramid came along, and
2941@code{HAVE_REGISTER_WINDOWS} and @code{REGISTER_IN_WINDOW_P} were
2942introduced. Then the 29k and 88k required the @code{GET_SAVED_REGISTER}
2943hook. The first three are examples of small hooks; the latter replaces
2944a whole function. In this specific case, it is useful to have both
2945kinds; it would be a bad idea to replace all the uses of the small hooks
2946with @code{GET_SAVED_REGISTER}, since that would result in much
2947duplicated code. Other times, duplicating a few lines of code here or
2948there is much cleaner than introducing a large number of small hooks.
2949
25822942
DB
2950Another way to generalize @value{GDBN} along a particular interface is with an
2951attribute struct. For example, @value{GDBN} has been generalized to handle
c906108c
SS
2952multiple kinds of remote interfaces -- not by #ifdef's everywhere, but
2953by defining the "target_ops" structure and having a current target (as
2954well as a stack of targets below it, for memory references). Whenever
2955something needs to be done that depends on which remote interface we are
2956using, a flag in the current target_ops structure is tested (e.g.
2957`target_has_stack'), or a function is called through a pointer in the
2958current target_ops structure. In this way, when a new remote interface
2959is added, only one module needs to be touched -- the one that actually
2960implements the new remote interface. Other examples of
2961attribute-structs are BFD access to multiple kinds of object file
25822942 2962formats, or @value{GDBN}'s access to multiple source languages.
c906108c 2963
25822942
DB
2964Please avoid duplicating code. For example, in @value{GDBN} 3.x all the code
2965interfacing between @code{ptrace} and the rest of @value{GDBN} was duplicated in
2966@file{*-dep.c}, and so changing something was very painful. In @value{GDBN} 4.x,
c906108c
SS
2967these have all been consolidated into @file{infptrace.c}.
2968@file{infptrace.c} can deal with variations between systems the same way
2969any system-independent file would (hooks, #if defined, etc.), and
2970machines which are radically different don't need to use infptrace.c at
2971all.
2972
9e0b60a8 2973Don't put debugging printfs in the code.
c906108c 2974
8487521e 2975@node Porting GDB
c906108c 2976
25822942 2977@chapter Porting @value{GDBN}
c906108c 2978
25822942 2979Most of the work in making @value{GDBN} compile on a new machine is in specifying
c906108c
SS
2980the configuration of the machine. This is done in a dizzying variety of
2981header files and configuration scripts, which we hope to make more
2982sensible soon. Let's say your new host is called an @var{xyz} (e.g.
2983@samp{sun4}), and its full three-part configuration name is
2984@code{@var{arch}-@var{xvend}-@var{xos}} (e.g. @samp{sparc-sun-sunos4}).
2985In particular:
2986
2987In the top level directory, edit @file{config.sub} and add @var{arch},
2988@var{xvend}, and @var{xos} to the lists of supported architectures,
2989vendors, and operating systems near the bottom of the file. Also, add
2990@var{xyz} as an alias that maps to
2991@code{@var{arch}-@var{xvend}-@var{xos}}. You can test your changes by
2992running
2993
2994@example
2995./config.sub @var{xyz}
2996@end example
2997@noindent
2998and
2999@example
3000./config.sub @code{@var{arch}-@var{xvend}-@var{xos}}
3001@end example
3002@noindent
3003which should both respond with @code{@var{arch}-@var{xvend}-@var{xos}}
3004and no error messages.
3005
3006You need to port BFD, if that hasn't been done already. Porting BFD is
3007beyond the scope of this manual.
3008
25822942 3009To configure @value{GDBN} itself, edit @file{gdb/configure.host} to recognize
c906108c
SS
3010your system and set @code{gdb_host} to @var{xyz}, and (unless your
3011desired target is already available) also edit @file{gdb/configure.tgt},
3012setting @code{gdb_target} to something appropriate (for instance,
3013@var{xyz}).
3014
25822942 3015Finally, you'll need to specify and define @value{GDBN}'s host-, native-, and
c906108c
SS
3016target-dependent @file{.h} and @file{.c} files used for your
3017configuration.
3018
25822942 3019@section Configuring @value{GDBN} for Release
c906108c
SS
3020
3021From the top level directory (containing @file{gdb}, @file{bfd},
3022@file{libiberty}, and so on):
3023@example
3024make -f Makefile.in gdb.tar.gz
3025@end example
3026
3027This will properly configure, clean, rebuild any files that are
3028distributed pre-built (e.g. @file{c-exp.tab.c} or @file{refcard.ps}),
3029and will then make a tarfile. (If the top level directory has already
3030been configured, you can just do @code{make gdb.tar.gz} instead.)
3031
3032This procedure requires:
3033@itemize @bullet
3034@item symbolic links
3035@item @code{makeinfo} (texinfo2 level)
3036@item @TeX{}
3037@item @code{dvips}
3038@item @code{yacc} or @code{bison}
3039@end itemize
3040@noindent
3041@dots{} and the usual slew of utilities (@code{sed}, @code{tar}, etc.).
3042
3043@subheading TEMPORARY RELEASE PROCEDURE FOR DOCUMENTATION
3044
3045@file{gdb.texinfo} is currently marked up using the texinfo-2 macros,
3046which are not yet a default for anything (but we have to start using
3047them sometime).
3048
3049For making paper, the only thing this implies is the right generation of
3050@file{texinfo.tex} needs to be included in the distribution.
3051
3052For making info files, however, rather than duplicating the texinfo2
3053distribution, generate @file{gdb-all.texinfo} locally, and include the
3054files @file{gdb.info*} in the distribution. Note the plural;
3055@code{makeinfo} will split the document into one overall file and five
3056or so included files.
3057
085dd6e6
JM
3058@node Testsuite
3059
3060@chapter Testsuite
3061
25822942 3062The testsuite is an important component of the @value{GDBN} package. While it is
085dd6e6
JM
3063always worthwhile to encourage user testing, in practice this is rarely
3064sufficient; users typically use only a small subset of the available
3065commands, and it has proven all too common for a change to cause a
3066significant regression that went unnoticed for some time.
3067
25822942 3068The @value{GDBN} testsuite uses the DejaGNU testing framework. DejaGNU is built
085dd6e6
JM
3069using tcl and expect. The tests themselves are calls to various tcl
3070procs; the framework runs all the procs and summarizes the passes and
3071fails.
3072
3073@section Using the Testsuite
3074
25822942 3075To run the testsuite, simply go to the @value{GDBN} object directory (or to the
085dd6e6
JM
3076testsuite's objdir) and type @code{make check}. This just sets up some
3077environment variables and invokes DejaGNU's @code{runtest} script. While
3078the testsuite is running, you'll get mentions of which test file is in use,
3079and a mention of any unexpected passes or fails. When the testsuite is
3080finished, you'll get a summary that looks like this:
3081@example
3082 === gdb Summary ===
3083
3084# of expected passes 6016
3085# of unexpected failures 58
3086# of unexpected successes 5
3087# of expected failures 183
3088# of unresolved testcases 3
3089# of untested testcases 5
3090@end example
3091The ideal test run consists of expected passes only; however, reality
3092conspires to keep us from this ideal. Unexpected failures indicate
25822942 3093real problems, whether in @value{GDBN} or in the testsuite. Expected failures
085dd6e6
JM
3094are still failures, but ones which have been decided are too hard to
3095deal with at the time; for instance, a test case might work everywhere
3096except on AIX, and there is no prospect of the AIX case being fixed in
3097the near future. Expected failures should not be added lightly, since
25822942 3098you may be masking serious bugs in @value{GDBN}. Unexpected successes are expected
085dd6e6
JM
3099fails that are passing for some reason, while unresolved and untested
3100cases often indicate some minor catastrophe, such as the compiler being
3101unable to deal with a test program.
3102
25822942 3103When making any significant change to @value{GDBN}, you should run the testsuite
085dd6e6
JM
3104before and after the change, to confirm that there are no regressions.
3105Note that truly complete testing would require that you run the
3106testsuite with all supported configurations and a variety of compilers;
3107however this is more than really necessary. In many cases testing with
3108a single configuration is sufficient. Other useful options are to test
3109one big-endian (Sparc) and one little-endian (x86) host, a cross config
3110with a builtin simulator (powerpc-eabi, mips-elf), or a 64-bit host
3111(Alpha).
3112
25822942
DB
3113If you add new functionality to @value{GDBN}, please consider adding tests for it
3114as well; this way future @value{GDBN} hackers can detect and fix their changes
085dd6e6
JM
3115that break the functionality you added. Similarly, if you fix a bug
3116that was not previously reported as a test failure, please add a test
3117case for it. Some cases are extremely difficult to test, such as code
3118that handles host OS failures or bugs in particular versions of
3119compilers, and it's OK not to try to write tests for all of those.
3120
3121@section Testsuite Organization
3122
3123The testsuite is entirely contained in @file{gdb/testsuite}. While the
3124testsuite includes some makefiles and configury, these are very minimal,
3125and used for little besides cleaning up, since the tests themselves
25822942 3126handle the compilation of the programs that @value{GDBN} will run. The file
085dd6e6 3127@file{testsuite/lib/gdb.exp} contains common utility procs useful for
25822942 3128all @value{GDBN} tests, while the directory @file{testsuite/config} contains
085dd6e6
JM
3129configuration-specific files, typically used for special-purpose
3130definitions of procs like @code{gdb_load} and @code{gdb_start}.
3131
3132The tests themselves are to be found in @file{testsuite/gdb.*} and
3133subdirectories of those. The names of the test files must always end
3134with @file{.exp}. DejaGNU collects the test files by wildcarding
3135in the test directories, so both subdirectories and individual files
3136get chosen and run in alphabetical order.
3137
3138The following table lists the main types of subdirectories and what they
3139are for. Since DejaGNU finds test files no matter where they are
3140located, and since each test file sets up its own compilation and
3141execution environment, this organization is simply for convenience and
3142intelligibility.
3143
3144@table @code
3145
3146@item gdb.base
3147
3148This is the base testsuite. The tests in it should apply to all
25822942 3149configurations of @value{GDBN} (but generic native-only tests may live here).
085dd6e6
JM
3150The test programs should be in the subset of C that is valid K&R,
3151ANSI/ISO, and C++ (ifdefs are allowed if necessary, for instance
3152for prototypes).
3153
3154@item gdb.@var{lang}
3155
3156Language-specific tests for all languages besides C. Examples are
3157@file{gdb.c++} and @file{gdb.java}.
3158
3159@item gdb.@var{platform}
3160
3161Non-portable tests. The tests are specific to a specific configuration
3162(host or target), such as HP-UX or eCos. Example is @file{gdb.hp}, for
3163HP-UX.
3164
3165@item gdb.@var{compiler}
3166
3167Tests specific to a particular compiler. As of this writing (June
31681999), there aren't currently any groups of tests in this category that
3169couldn't just as sensibly be made platform-specific, but one could
25822942 3170imagine a gdb.gcc, for tests of @value{GDBN}'s handling of GCC extensions.
085dd6e6
JM
3171
3172@item gdb.@var{subsystem}
3173
25822942 3174Tests that exercise a specific @value{GDBN} subsystem in more depth. For
085dd6e6
JM
3175instance, @file{gdb.disasm} exercises various disassemblers, while
3176@file{gdb.stabs} tests pathways through the stabs symbol reader.
3177
3178@end table
3179
3180@section Writing Tests
3181
25822942 3182In many areas, the @value{GDBN} tests are already quite comprehensive; you
085dd6e6
JM
3183should be able to copy existing tests to handle new cases.
3184
3185You should try to use @code{gdb_test} whenever possible, since it
3186includes cases to handle all the unexpected errors that might happen.
3187However, it doesn't cost anything to add new test procedures; for
3188instance, @file{gdb.base/exprs.exp} defines a @code{test_expr} that
3189calls @code{gdb_test} multiple times.
3190
3191Only use @code{send_gdb} and @code{gdb_expect} when absolutely
25822942 3192necessary, such as when @value{GDBN} has several valid responses to a command.
085dd6e6
JM
3193
3194The source language programs do @emph{not} need to be in a consistent
25822942 3195style. Since @value{GDBN} is used to debug programs written in many different
085dd6e6 3196styles, it's worth having a mix of styles in the testsuite; for
25822942 3197instance, some @value{GDBN} bugs involving the display of source lines would
085dd6e6
JM
3198never manifest themselves if the programs used GNU coding style
3199uniformly.
3200
c906108c
SS
3201@node Hints
3202
3203@chapter Hints
3204
3205Check the @file{README} file, it often has useful information that does not
3206appear anywhere else in the directory.
3207
3208@menu
25822942 3209* Getting Started:: Getting started working on @value{GDBN}
33e16fad 3210* Debugging GDB:: Debugging @value{GDBN} with itself
c906108c
SS
3211@end menu
3212
3213@node Getting Started,,, Hints
3214
3215@section Getting Started
3216
25822942 3217@value{GDBN} is a large and complicated program, and if you first starting to
c906108c
SS
3218work on it, it can be hard to know where to start. Fortunately, if you
3219know how to go about it, there are ways to figure out what is going on.
3220
25822942
DB
3221This manual, the @value{GDBN} Internals manual, has information which applies
3222generally to many parts of @value{GDBN}.
c906108c
SS
3223
3224Information about particular functions or data structures are located in
3225comments with those functions or data structures. If you run across a
3226function or a global variable which does not have a comment correctly
25822942 3227explaining what is does, this can be thought of as a bug in @value{GDBN}; feel
c906108c
SS
3228free to submit a bug report, with a suggested comment if you can figure
3229out what the comment should say. If you find a comment which is
3230actually wrong, be especially sure to report that.
3231
3232Comments explaining the function of macros defined in host, target, or
3233native dependent files can be in several places. Sometimes they are
3234repeated every place the macro is defined. Sometimes they are where the
3235macro is used. Sometimes there is a header file which supplies a
3236default definition of the macro, and the comment is there. This manual
3237also documents all the available macros.
3238@c (@pxref{Host Conditionals}, @pxref{Target
3239@c Conditionals}, @pxref{Native Conditionals}, and @pxref{Obsolete
3240@c Conditionals})
3241
25822942 3242Start with the header files. Once you have some idea of how @value{GDBN}'s internal
c906108c
SS
3243symbol tables are stored (see @file{symtab.h}, @file{gdbtypes.h}), you
3244will find it much easier to understand the code which uses and creates
3245those symbol tables.
3246
3247You may wish to process the information you are getting somehow, to
3248enhance your understanding of it. Summarize it, translate it to another
25822942 3249language, add some (perhaps trivial or non-useful) feature to @value{GDBN}, use
c906108c
SS
3250the code to predict what a test case would do and write the test case
3251and verify your prediction, etc. If you are reading code and your eyes
3252are starting to glaze over, this is a sign you need to use a more active
3253approach.
3254
25822942 3255Once you have a part of @value{GDBN} to start with, you can find more
c906108c
SS
3256specifically the part you are looking for by stepping through each
3257function with the @code{next} command. Do not use @code{step} or you
3258will quickly get distracted; when the function you are stepping through
3259calls another function try only to get a big-picture understanding
3260(perhaps using the comment at the beginning of the function being
3261called) of what it does. This way you can identify which of the
3262functions being called by the function you are stepping through is the
3263one which you are interested in. You may need to examine the data
3264structures generated at each stage, with reference to the comments in
3265the header files explaining what the data structures are supposed to
3266look like.
3267
3268Of course, this same technique can be used if you are just reading the
3269code, rather than actually stepping through it. The same general
3270principle applies---when the code you are looking at calls something
3271else, just try to understand generally what the code being called does,
3272rather than worrying about all its details.
3273
3274A good place to start when tracking down some particular area is with a
3275command which invokes that feature. Suppose you want to know how
25822942 3276single-stepping works. As a @value{GDBN} user, you know that the @code{step}
c906108c
SS
3277command invokes single-stepping. The command is invoked via command
3278tables (see @file{command.h}); by convention the function which actually
3279performs the command is formed by taking the name of the command and
3280adding @samp{_command}, or in the case of an @code{info} subcommand,
3281@samp{_info}. For example, the @code{step} command invokes the
3282@code{step_command} function and the @code{info display} command invokes
3283@code{display_info}. When this convention is not followed, you might
25822942 3284have to use @code{grep} or @kbd{M-x tags-search} in emacs, or run @value{GDBN} on
c906108c
SS
3285itself and set a breakpoint in @code{execute_command}.
3286
3287If all of the above fail, it may be appropriate to ask for information
3288on @code{bug-gdb}. But @emph{never} post a generic question like ``I was
3289wondering if anyone could give me some tips about understanding
25822942 3290@value{GDBN}''---if we had some magic secret we would put it in this manual.
c906108c
SS
3291Suggestions for improving the manual are always welcome, of course.
3292
33e16fad 3293@node Debugging GDB,,,Hints
c906108c 3294
25822942 3295@section Debugging @value{GDBN} with itself
c906108c 3296
25822942 3297If @value{GDBN} is limping on your machine, this is the preferred way to get it
c906108c
SS
3298fully functional. Be warned that in some ancient Unix systems, like
3299Ultrix 4.2, a program can't be running in one process while it is being
3300debugged in another. Rather than typing the command @code{@w{./gdb
3301./gdb}}, which works on Suns and such, you can copy @file{gdb} to
3302@file{gdb2} and then type @code{@w{./gdb ./gdb2}}.
3303
25822942 3304When you run @value{GDBN} in the @value{GDBN} source directory, it will read a
c906108c
SS
3305@file{.gdbinit} file that sets up some simple things to make debugging
3306gdb easier. The @code{info} command, when executed without a subcommand
25822942 3307in a @value{GDBN} being debugged by gdb, will pop you back up to the top level
c906108c
SS
3308gdb. See @file{.gdbinit} for details.
3309
3310If you use emacs, you will probably want to do a @code{make TAGS} after
3311you configure your distribution; this will put the machine dependent
3312routines for your local machine where they will be accessed first by
3313@kbd{M-.}
3314
25822942 3315Also, make sure that you've either compiled @value{GDBN} with your local cc, or
c906108c
SS
3316have run @code{fixincludes} if you are compiling with gcc.
3317
3318@section Submitting Patches
3319
3320Thanks for thinking of offering your changes back to the community of
25822942 3321@value{GDBN} users. In general we like to get well designed enhancements.
c906108c
SS
3322Thanks also for checking in advance about the best way to transfer the
3323changes.
3324
25822942
DB
3325The @value{GDBN} maintainers will only install ``cleanly designed'' patches.
3326This manual summarizes what we believe to be clean design for @value{GDBN}.
c906108c
SS
3327
3328If the maintainers don't have time to put the patch in when it arrives,
3329or if there is any question about a patch, it goes into a large queue
3330with everyone else's patches and bug reports.
3331
3332The legal issue is that to incorporate substantial changes requires a
3333copyright assignment from you and/or your employer, granting ownership
3334of the changes to the Free Software Foundation. You can get the
9e0b60a8
JM
3335standard documents for doing this by sending mail to @code{gnu@@gnu.org}
3336and asking for it. We recommend that people write in "All programs
3337owned by the Free Software Foundation" as "NAME OF PROGRAM", so that
25822942 3338changes in many programs (not just @value{GDBN}, but GAS, Emacs, GCC, etc) can be
9e0b60a8
JM
3339contributed with only one piece of legalese pushed through the
3340bureacracy and filed with the FSF. We can't start merging changes until
3341this paperwork is received by the FSF (their rules, which we follow
3342since we maintain it for them).
c906108c
SS
3343
3344Technically, the easiest way to receive changes is to receive each
9e0b60a8
JM
3345feature as a small context diff or unidiff, suitable for "patch". Each
3346message sent to me should include the changes to C code and header files
3347for a single feature, plus ChangeLog entries for each directory where
3348files were modified, and diffs for any changes needed to the manuals
3349(gdb/doc/gdb.texinfo or gdb/doc/gdbint.texinfo). If there are a lot of
3350changes for a single feature, they can be split down into multiple
3351messages.
3352
3353In this way, if we read and like the feature, we can add it to the
c906108c 3354sources with a single patch command, do some testing, and check it in.
9e0b60a8
JM
3355If you leave out the ChangeLog, we have to write one. If you leave
3356out the doc, we have to puzzle out what needs documenting. Etc.
c906108c 3357
9e0b60a8
JM
3358The reason to send each change in a separate message is that we will not
3359install some of the changes. They'll be returned to you with questions
3360or comments. If we're doing our job correctly, the message back to you
c906108c 3361will say what you have to fix in order to make the change acceptable.
9e0b60a8
JM
3362The reason to have separate messages for separate features is so that
3363the acceptable changes can be installed while one or more changes are
3364being reworked. If multiple features are sent in a single message, we
3365tend to not put in the effort to sort out the acceptable changes from
3366the unacceptable, so none of the features get installed until all are
3367acceptable.
3368
3369If this sounds painful or authoritarian, well, it is. But we get a lot
3370of bug reports and a lot of patches, and many of them don't get
3371installed because we don't have the time to finish the job that the bug
c906108c
SS
3372reporter or the contributor could have done. Patches that arrive
3373complete, working, and well designed, tend to get installed on the day
9e0b60a8
JM
3374they arrive. The others go into a queue and get installed as time
3375permits, which, since the maintainers have many demands to meet, may not
3376be for quite some time.
c906108c 3377
25822942 3378Please send patches directly to the @value{GDBN} maintainers at
9e0b60a8 3379@code{gdb-patches@@sourceware.cygnus.com}.
c906108c
SS
3380
3381@section Obsolete Conditionals
3382
25822942 3383Fragments of old code in @value{GDBN} sometimes reference or set the following
c906108c
SS
3384configuration macros. They should not be used by new code, and old uses
3385should be removed as those parts of the debugger are otherwise touched.
3386
3387@table @code
3388
3389@item STACK_END_ADDR
3390This macro used to define where the end of the stack appeared, for use
3391in interpreting core file formats that don't record this address in the
25822942
DB
3392core file itself. This information is now configured in BFD, and @value{GDBN}
3393gets the info portably from there. The values in @value{GDBN}'s configuration
c906108c 3394files should be moved into BFD configuration files (if needed there),
25822942 3395and deleted from all of @value{GDBN}'s config files.
c906108c
SS
3396
3397Any @file{@var{foo}-xdep.c} file that references STACK_END_ADDR
3398is so old that it has never been converted to use BFD. Now that's old!
3399
3400@item PYRAMID_CONTROL_FRAME_DEBUGGING
3401pyr-xdep.c
3402@item PYRAMID_CORE
3403pyr-xdep.c
3404@item PYRAMID_PTRACE
3405pyr-xdep.c
3406
3407@item REG_STACK_SEGMENT
3408exec.c
3409
3410@end table
3411
449f3b6c
AC
3412@c TeX can handle the contents at the start but makeinfo 3.12 can not
3413@ifinfo
c906108c 3414@contents
449f3b6c
AC
3415@end ifinfo
3416@ifhtml
3417@contents
3418@end ifhtml
3419
c906108c 3420@bye
This page took 0.220553 seconds and 4 git commands to generate.