From 2001-07-23 Andreas Schwab <schwab@suse.de>:
[deliverable/binutils-gdb.git] / gdb / doc / gdbint.texinfo
CommitLineData
9742079a 1\input texinfo @c -*- texinfo -*-
c906108c 2@setfilename gdbint.info
25822942 3@include gdb-cfg.texi
e9c75b65
EZ
4@dircategory Programming & development tools.
5@direntry
c906108c
SS
6START-INFO-DIR-ENTRY
7* Gdb-Internals: (gdbint). The GNU debugger's internals.
8END-INFO-DIR-ENTRY
e9c75b65 9@end direntry
c906108c
SS
10
11@ifinfo
25822942 12This file documents the internals of the GNU debugger @value{GDBN}.
e9c75b65
EZ
13Copyright 1990,1991,1992,1993,1994,1996,1998,1999,2000,2001
14 Free Software Foundation, Inc.
c906108c
SS
15Contributed by Cygnus Solutions. Written by John Gilmore.
16Second Edition by Stan Shebs.
17
e9c75b65
EZ
18Permission is granted to copy, distribute and/or modify this document
19under the terms of the GNU Free Documentation License, Version 1.1 or
20any later version published by the Free Software Foundation; with the
21Invariant Sections being ``Algorithms'' and ``Porting GDB'', with the
22Front-Cover texts being ``A GNU Manual,'' and with the Back-Cover
23Texts as in (a) below.
c906108c 24
e9c75b65
EZ
25(a) The FSF's Back-Cover Text is: ``You have freedom to copy and modify
26this GNU Manual, like GNU software. Copies published by the Free
27Software Foundation raise funds for GNU development.''
c906108c
SS
28@end ifinfo
29
30@setchapternewpage off
25822942 31@settitle @value{GDBN} Internals
c906108c 32
56caf160
EZ
33@syncodeindex fn cp
34@syncodeindex vr cp
35
c906108c 36@titlepage
25822942 37@title @value{GDBN} Internals
c906108c
SS
38@subtitle{A guide to the internals of the GNU debugger}
39@author John Gilmore
40@author Cygnus Solutions
41@author Second Edition:
42@author Stan Shebs
43@author Cygnus Solutions
44@page
45@tex
46\def\$#1${{#1}} % Kluge: collect RCS revision info without $...$
47\xdef\manvers{\$Revision$} % For use in headers, footers too
48{\parskip=0pt
49\hfill Cygnus Solutions\par
50\hfill \manvers\par
51\hfill \TeX{}info \texinfoversion\par
52}
53@end tex
54
55@vskip 0pt plus 1filll
e9c75b65
EZ
56Copyright @copyright{} 1990,1991,1992,1993,1994,1996,1998,1999,2000,2001
57 Free Software Foundation, Inc.
c906108c 58
e9c75b65
EZ
59Permission is granted to copy, distribute and/or modify this document
60under the terms of the GNU Free Documentation License, Version 1.1 or
61any later version published by the Free Software Foundation; with the
62Invariant Sections being ``Algorithms'' and ``Porting GDB'', with the
63Front-Cover texts being ``A GNU Manual,'' and with the Back-Cover
64Texts as in (a) below.
c906108c 65
e9c75b65
EZ
66(a) The FSF's Back-Cover Text is: ``You have freedom to copy and modify
67this GNU Manual, like GNU software. Copies published by the Free
68Software Foundation raise funds for GNU development.''
c906108c
SS
69@end titlepage
70
449f3b6c
AC
71@c TeX can handle the contents at the start but makeinfo 3.12 can not
72@iftex
73@contents
74@end iftex
75
c906108c
SS
76@node Top
77@c Perhaps this should be the title of the document (but only for info,
78@c not for TeX). Existing GNU manuals seem inconsistent on this point.
79@top Scope of this Document
80
25822942
DB
81This document documents the internals of the GNU debugger, @value{GDBN}. It
82includes description of @value{GDBN}'s key algorithms and operations, as well
83as the mechanisms that adapt @value{GDBN} to specific hosts and targets.
c906108c
SS
84
85@menu
86* Requirements::
87* Overall Structure::
88* Algorithms::
89* User Interface::
89437448 90* libgdb::
c906108c
SS
91* Symbol Handling::
92* Language Support::
93* Host Definition::
94* Target Architecture Definition::
95* Target Vector Definition::
96* Native Debugging::
97* Support Libraries::
98* Coding::
99* Porting GDB::
085dd6e6 100* Testsuite::
c906108c 101* Hints::
56caf160 102* Index::
c906108c
SS
103@end menu
104
105@node Requirements
106
107@chapter Requirements
56caf160 108@cindex requirements for @value{GDBN}
c906108c
SS
109
110Before diving into the internals, you should understand the formal
56caf160
EZ
111requirements and other expectations for @value{GDBN}. Although some
112of these may seem obvious, there have been proposals for @value{GDBN}
113that have run counter to these requirements.
c906108c 114
56caf160
EZ
115First of all, @value{GDBN} is a debugger. It's not designed to be a
116front panel for embedded systems. It's not a text editor. It's not a
117shell. It's not a programming environment.
c906108c 118
56caf160
EZ
119@value{GDBN} is an interactive tool. Although a batch mode is
120available, @value{GDBN}'s primary role is to interact with a human
121programmer.
c906108c 122
56caf160
EZ
123@value{GDBN} should be responsive to the user. A programmer hot on
124the trail of a nasty bug, and operating under a looming deadline, is
125going to be very impatient of everything, including the response time
126to debugger commands.
c906108c 127
56caf160
EZ
128@value{GDBN} should be relatively permissive, such as for expressions.
129While the compiler should be picky (or have the option to be made
be9c6c35 130picky), since source code lives for a long time usually, the
56caf160
EZ
131programmer doing debugging shouldn't be spending time figuring out to
132mollify the debugger.
c906108c 133
56caf160
EZ
134@value{GDBN} will be called upon to deal with really large programs.
135Executable sizes of 50 to 100 megabytes occur regularly, and we've
136heard reports of programs approaching 1 gigabyte in size.
c906108c 137
56caf160
EZ
138@value{GDBN} should be able to run everywhere. No other debugger is
139available for even half as many configurations as @value{GDBN}
140supports.
c906108c
SS
141
142
143@node Overall Structure
144
145@chapter Overall Structure
146
56caf160
EZ
147@value{GDBN} consists of three major subsystems: user interface,
148symbol handling (the @dfn{symbol side}), and target system handling (the
149@dfn{target side}).
c906108c 150
2e685b93 151The user interface consists of several actual interfaces, plus
c906108c
SS
152supporting code.
153
154The symbol side consists of object file readers, debugging info
155interpreters, symbol table management, source language expression
156parsing, type and value printing.
157
158The target side consists of execution control, stack frame analysis, and
159physical target manipulation.
160
161The target side/symbol side division is not formal, and there are a
162number of exceptions. For instance, core file support involves symbolic
163elements (the basic core file reader is in BFD) and target elements (it
164supplies the contents of memory and the values of registers). Instead,
165this division is useful for understanding how the minor subsystems
166should fit together.
167
168@section The Symbol Side
169
56caf160
EZ
170The symbolic side of @value{GDBN} can be thought of as ``everything
171you can do in @value{GDBN} without having a live program running''.
172For instance, you can look at the types of variables, and evaluate
173many kinds of expressions.
c906108c
SS
174
175@section The Target Side
176
56caf160
EZ
177The target side of @value{GDBN} is the ``bits and bytes manipulator''.
178Although it may make reference to symbolic info here and there, most
179of the target side will run with only a stripped executable
180available---or even no executable at all, in remote debugging cases.
c906108c
SS
181
182Operations such as disassembly, stack frame crawls, and register
183display, are able to work with no symbolic info at all. In some cases,
25822942 184such as disassembly, @value{GDBN} will use symbolic info to present addresses
c906108c
SS
185relative to symbols rather than as raw numbers, but it will work either
186way.
187
188@section Configurations
189
56caf160
EZ
190@cindex host
191@cindex target
25822942 192@dfn{Host} refers to attributes of the system where @value{GDBN} runs.
c906108c
SS
193@dfn{Target} refers to the system where the program being debugged
194executes. In most cases they are the same machine, in which case a
195third type of @dfn{Native} attributes come into play.
196
197Defines and include files needed to build on the host are host support.
198Examples are tty support, system defined types, host byte order, host
199float format.
200
201Defines and information needed to handle the target format are target
202dependent. Examples are the stack frame format, instruction set,
203breakpoint instruction, registers, and how to set up and tear down the stack
204to call a function.
205
206Information that is only needed when the host and target are the same,
207is native dependent. One example is Unix child process support; if the
208host and target are not the same, doing a fork to start the target
209process is a bad idea. The various macros needed for finding the
210registers in the @code{upage}, running @code{ptrace}, and such are all
211in the native-dependent files.
212
213Another example of native-dependent code is support for features that
214are really part of the target environment, but which require
215@code{#include} files that are only available on the host system. Core
216file handling and @code{setjmp} handling are two common cases.
217
25822942 218When you want to make @value{GDBN} work ``native'' on a particular machine, you
c906108c
SS
219have to include all three kinds of information.
220
221
222@node Algorithms
223
224@chapter Algorithms
56caf160 225@cindex algorithms
c906108c 226
56caf160
EZ
227@value{GDBN} uses a number of debugging-specific algorithms. They are
228often not very complicated, but get lost in the thicket of special
229cases and real-world issues. This chapter describes the basic
230algorithms and mentions some of the specific target definitions that
231they use.
c906108c
SS
232
233@section Frames
234
56caf160
EZ
235@cindex frame
236@cindex call stack frame
237A frame is a construct that @value{GDBN} uses to keep track of calling
238and called functions.
c906108c 239
56caf160
EZ
240@findex create_new_frame
241@vindex FRAME_FP
c906108c 242@code{FRAME_FP} in the machine description has no meaning to the
56caf160
EZ
243machine-independent part of @value{GDBN}, except that it is used when
244setting up a new frame from scratch, as follows:
c906108c
SS
245
246@example
247 create_new_frame (read_register (FP_REGNUM), read_pc ()));
248@end example
249
56caf160 250@cindex frame pointer register
c906108c
SS
251Other than that, all the meaning imparted to @code{FP_REGNUM} is
252imparted by the machine-dependent code. So, @code{FP_REGNUM} can have
253any value that is convenient for the code that creates new frames.
254(@code{create_new_frame} calls @code{INIT_EXTRA_FRAME_INFO} if it is
255defined; that is where you should use the @code{FP_REGNUM} value, if
256your frames are nonstandard.)
257
56caf160
EZ
258@cindex frame chain
259Given a @value{GDBN} frame, define @code{FRAME_CHAIN} to determine the
260address of the calling function's frame. This will be used to create
261a new @value{GDBN} frame struct, and then @code{INIT_EXTRA_FRAME_INFO}
262and @code{INIT_FRAME_PC} will be called for the new frame.
c906108c
SS
263
264@section Breakpoint Handling
265
56caf160 266@cindex breakpoints
c906108c
SS
267In general, a breakpoint is a user-designated location in the program
268where the user wants to regain control if program execution ever reaches
269that location.
270
271There are two main ways to implement breakpoints; either as ``hardware''
272breakpoints or as ``software'' breakpoints.
273
56caf160
EZ
274@cindex hardware breakpoints
275@cindex program counter
c906108c
SS
276Hardware breakpoints are sometimes available as a builtin debugging
277features with some chips. Typically these work by having dedicated
278register into which the breakpoint address may be stored. If the PC
56caf160 279(shorthand for @dfn{program counter})
c906108c 280ever matches a value in a breakpoint registers, the CPU raises an
56caf160
EZ
281exception and reports it to @value{GDBN}.
282
283Another possibility is when an emulator is in use; many emulators
284include circuitry that watches the address lines coming out from the
285processor, and force it to stop if the address matches a breakpoint's
286address.
287
288A third possibility is that the target already has the ability to do
289breakpoints somehow; for instance, a ROM monitor may do its own
290software breakpoints. So although these are not literally ``hardware
291breakpoints'', from @value{GDBN}'s point of view they work the same;
292@value{GDBN} need not do nothing more than set the breakpoint and wait
293for something to happen.
c906108c
SS
294
295Since they depend on hardware resources, hardware breakpoints may be
56caf160 296limited in number; when the user asks for more, @value{GDBN} will
9742079a
EZ
297start trying to set software breakpoints. (On some architectures,
298notably the 32-bit x86 platforms, @value{GDBN} cannot alsways know
299whether there's enough hardware resources to insert all the hardware
300breakpoints and watchpoints. On those platforms, @value{GDBN} prints
301an error message only when the program being debugged is continued.)
56caf160
EZ
302
303@cindex software breakpoints
304Software breakpoints require @value{GDBN} to do somewhat more work.
305The basic theory is that @value{GDBN} will replace a program
306instruction with a trap, illegal divide, or some other instruction
307that will cause an exception, and then when it's encountered,
308@value{GDBN} will take the exception and stop the program. When the
309user says to continue, @value{GDBN} will restore the original
c906108c
SS
310instruction, single-step, re-insert the trap, and continue on.
311
312Since it literally overwrites the program being tested, the program area
be9c6c35 313must be writable, so this technique won't work on programs in ROM. It
c906108c 314can also distort the behavior of programs that examine themselves,
56caf160 315although such a situation would be highly unusual.
c906108c
SS
316
317Also, the software breakpoint instruction should be the smallest size of
318instruction, so it doesn't overwrite an instruction that might be a jump
319target, and cause disaster when the program jumps into the middle of the
320breakpoint instruction. (Strictly speaking, the breakpoint must be no
321larger than the smallest interval between instructions that may be jump
322targets; perhaps there is an architecture where only even-numbered
323instructions may jumped to.) Note that it's possible for an instruction
324set not to have any instructions usable for a software breakpoint,
325although in practice only the ARC has failed to define such an
326instruction.
327
56caf160 328@findex BREAKPOINT
c906108c
SS
329The basic definition of the software breakpoint is the macro
330@code{BREAKPOINT}.
331
332Basic breakpoint object handling is in @file{breakpoint.c}. However,
333much of the interesting breakpoint action is in @file{infrun.c}.
334
335@section Single Stepping
336
337@section Signal Handling
338
339@section Thread Handling
340
341@section Inferior Function Calls
342
343@section Longjmp Support
344
56caf160 345@cindex @code{longjmp} debugging
25822942 346@value{GDBN} has support for figuring out that the target is doing a
c906108c
SS
347@code{longjmp} and for stopping at the target of the jump, if we are
348stepping. This is done with a few specialized internal breakpoints,
56caf160
EZ
349which are visible in the output of the @samp{maint info breakpoint}
350command.
c906108c 351
56caf160 352@findex GET_LONGJMP_TARGET
c906108c
SS
353To make this work, you need to define a macro called
354@code{GET_LONGJMP_TARGET}, which will examine the @code{jmp_buf}
355structure and extract the longjmp target address. Since @code{jmp_buf}
356is target specific, you will need to define it in the appropriate
56caf160 357@file{tm-@var{target}.h} file. Look in @file{tm-sun4os4.h} and
c906108c
SS
358@file{sparc-tdep.c} for examples of how to do this.
359
9742079a
EZ
360@section Watchpoints
361@cindex watchpoints
362
363Watchpoints are a special kind of breakpoints (@pxref{Algorithms,
364breakpoints}) which break when data is accessed rather than when some
365instruction is executed. When you have data which changes without
366your knowing what code does that, watchpoints are the silver bullet to
367hunt down and kill such bugs.
368
369@cindex hardware watchpoints
370@cindex software watchpoints
371Watchpoints can be either hardware-assisted or not; the latter type is
372known as ``software watchpoints.'' @value{GDBN} always uses
373hardware-assisted watchpoints if they are available, and falls back on
374software watchpoints otherwise. Typical situations where @value{GDBN}
375will use software watchpoints are:
376
377@itemize @bullet
378@item
379The watched memory region is too large for the underlying hardware
380watchpoint support. For example, each x86 debug register can watch up
381to 4 bytes of memory, so trying to watch data structures whose size is
382more than 16 bytes will cause @value{GDBN} to use software
383watchpoints.
384
385@item
386The value of the expression to be watched depends on data held in
387registers (as opposed to memory).
388
389@item
390Too many different watchpoints requested. (On some architectures,
391this situation is impossible to detect until the debugged program is
392resumed.) Note that x86 debug registers are used both for hardware
393breakpoints and for watchpoints, so setting too many hardware
394breakpoints might cause watchpoint insertion to fail.
395
396@item
397No hardware-assisted watchpoints provided by the target
398implementation.
399@end itemize
400
401Software watchpoints are very slow, since @value{GDBN} needs to
402single-step the program being debugged and test the value of the
403watched expression(s) after each instruction. The rest of this
404section is mostly irrelevant for software watchpoints.
405
406@value{GDBN} uses several macros and primitives to support hardware
407watchpoints:
408
409@table @code
410@findex TARGET_HAS_HARDWARE_WATCHPOINTS
411@item TARGET_HAS_HARDWARE_WATCHPOINTS
412If defined, the target supports hardware watchpoints.
413
414@findex TARGET_CAN_USE_HARDWARE_WATCHPOINT
415@item TARGET_CAN_USE_HARDWARE_WATCHPOINT (@var{type}, @var{count}, @var{other})
416Return the number of hardware watchpoints of type @var{type} that are
417possible to be set. The value is positive if @var{count} watchpoints
418of this type can be set, zero if setting watchpoints of this type is
419not supported, and negative if @var{count} is more than the maximum
420number of watchpoints of type @var{type} that can be set. @var{other}
421is non-zero if other types of watchpoints are currently enabled (there
422are architectures which cannot set watchpoints of different types at
423the same time).
424
425@findex TARGET_REGION_OK_FOR_HW_WATCHPOINT
426@item TARGET_REGION_OK_FOR_HW_WATCHPOINT (@var{addr}, @var{len})
427Return non-zero if hardware watchpoints can be used to watch a region
428whose address is @var{addr} and whose length in bytes is @var{len}.
429
430@findex TARGET_REGION_SIZE_OK_FOR_HW_WATCHPOINT
431@item TARGET_REGION_SIZE_OK_FOR_HW_WATCHPOINT (@var{size})
432Return non-zero if hardware watchpoints can be used to watch a region
433whose size is @var{size}. @value{GDBN} only uses this macro as a
434fall-back, in case @code{TARGET_REGION_OK_FOR_HW_WATCHPOINT} is not
435defined.
436
437@findex TARGET_DISABLE_HW_WATCHPOINTS
438@item TARGET_DISABLE_HW_WATCHPOINTS (@var{pid})
439Disables watchpoints in the process identified by @var{pid}. This is
440used, e.g., on HP-UX which provides operations to disable and enable
441the page-level memory protection that implements hardware watchpoints
442on that platform.
443
444@findex TARGET_ENABLE_HW_WATCHPOINTS
445@item TARGET_ENABLE_HW_WATCHPOINTS (@var{pid})
446Enables watchpoints in the process identified by @var{pid}. This is
447used, e.g., on HP-UX which provides operations to disable and enable
448the page-level memory protection that implements hardware watchpoints
449on that platform.
450
451@findex TARGET_RANGE_PROFITABLE_FOR_HW_WATCHPOINT
452@item TARGET_RANGE_PROFITABLE_FOR_HW_WATCHPOINT (@var{pid},@var{start},@var{len})
453Some addresses may not be profitable to use hardware to watch, or may
454be difficult to understand when the addressed object is out of scope,
455and hence should not be watched with hardware watchpoints. On some
456targets, this may have severe performance penalties, such that we
457might as well use regular watchpoints, and save (possibly precious)
458hardware watchpoints for other locations.
459
460@findex target_insert_watchpoint
461@findex target_remove_watchpoint
462@item target_insert_watchpoint (@var{addr}, @var{len}, @var{type})
463@itemx target_remove_watchpoint (@var{addr}, @var{len}, @var{type})
464Insert or remove a hardware watchpoint starting at @var{addr}, for
465@var{len} bytes. @var{type} is the watchpoint type, one of the
466possible values of the enumerated data type @code{target_hw_bp_type},
467defined by @file{breakpoint.h} as follows:
468
469@example
470 enum target_hw_bp_type
471 @{
472 hw_write = 0, /* Common (write) HW watchpoint */
473 hw_read = 1, /* Read HW watchpoint */
474 hw_access = 2, /* Access (read or write) HW watchpoint */
475 hw_execute = 3 /* Execute HW breakpoint */
476 @};
477@end example
478
479@noindent
480These two macros should return 0 for success, non-zero for failure.
481
482@cindex insert or remove hardware breakpoint
483@findex target_remove_hw_breakpoint
484@findex target_insert_hw_breakpoint
485@item target_remove_hw_breakpoint (@var{addr}, @var{shadow})
486@itemx target_insert_hw_breakpoint (@var{addr}, @var{shadow})
487Insert or remove a hardware-assisted breakpoint at address @var{addr}.
488Returns zero for success, non-zero for failure. @var{shadow} is the
489real contents of the byte where the breakpoint has been inserted; it
490is generally not valid when hardware breakpoints are used, but since
491no other code touches these values, the implementations of the above
492two macros can use them for their internal purposes.
493
494@findex target_stopped_data_address
495@item target_stopped_data_address ()
496If the inferior has some watchpoint that triggered, return the address
497associated with that watchpoint. Otherwise, return zero.
498
499@findex DECR_PC_AFTER_HW_BREAK
500@item DECR_PC_AFTER_HW_BREAK
501If defined, @value{GDBN} decrements the program counter by the value
502of @code{DECR_PC_AFTER_HW_BREAK} after a hardware break-point. This
503overrides the value of @code{DECR_PC_AFTER_BREAK} when a breakpoint
504that breaks is a hardware-assisted breakpoint.
505
506@findex HAVE_STEPPABLE_WATCHPOINT
507@item HAVE_STEPPABLE_WATCHPOINT
508If defined to a non-zero value, it is not necessary to disable a
509watchpoint to step over it.
510
511@findex HAVE_NONSTEPPABLE_WATCHPOINT
512@item HAVE_NONSTEPPABLE_WATCHPOINT
513If defined to a non-zero value, @value{GDBN} should disable a
514watchpoint to step the inferior over it.
515
516@findex HAVE_CONTINUABLE_WATCHPOINT
517@item HAVE_CONTINUABLE_WATCHPOINT
518If defined to a non-zero value, it is possible to continue the
519inferior after a watchpoint has been hit.
520
521@findex CANNOT_STEP_HW_WATCHPOINTS
522@item CANNOT_STEP_HW_WATCHPOINTS
523If this is defined to a non-zero value, @value{GDBN} will remove all
524watchpoints before stepping the inferior.
525
526@findex STOPPED_BY_WATCHPOINT
527@item STOPPED_BY_WATCHPOINT (@var{wait_status})
528Return non-zero if stopped by a watchpoint. @var{wait_status} is of
529the type @code{struct target_waitstatus}, defined by @file{target.h}.
530@end table
531
532@subsection x86 Watchpoints
533@cindex x86 debug registers
534@cindex watchpoints, on x86
535
536The 32-bit Intel x86 (a.k.a.@: ia32) processors feature special debug
537registers designed to facilitate debugging. @value{GDBN} provides a
538generic library of functions that x86-based ports can use to implement
539support for watchpoints and hardware-assisted breakpoints. This
540subsection documents the x86 watchpoint facilities in @value{GDBN}.
541
542To use the generic x86 watchpoint support, a port should do the
543following:
544
545@itemize @bullet
546@findex I386_USE_GENERIC_WATCHPOINTS
547@item
548Define the macro @code{I386_USE_GENERIC_WATCHPOINTS} somewhere in the
549target-dependent headers.
550
551@item
552Include the @file{config/i386/nm-i386.h} header file @emph{after}
553defining @code{I386_USE_GENERIC_WATCHPOINTS}.
554
555@item
556Add @file{i386-nat.o} to the value of the Make variable
557@code{NATDEPFILES} (@pxref{Native Debugging, NATDEPFILES}) or
558@code{TDEPFILES} (@pxref{Target Architecture Definition, TDEPFILES}).
559
560@item
561Provide implementations for the @code{I386_DR_LOW_*} macros described
562below. Typically, each macro should call a target-specific function
563which does the real work.
564@end itemize
565
566The x86 watchpoint support works by maintaining mirror images of the
567debug registers. Values are copied between the mirror images and the
568real debug registers via a set of macros which each target needs to
569provide:
570
571@table @code
572@findex I386_DR_LOW_SET_CONTROL
573@item I386_DR_LOW_SET_CONTROL (@var{val})
574Set the Debug Control (DR7) register to the value @var{val}.
575
576@findex I386_DR_LOW_SET_ADDR
577@item I386_DR_LOW_SET_ADDR (@var{idx}, @var{addr})
578Put the address @var{addr} into the debug register number @var{idx}.
579
580@findex I386_DR_LOW_RESET_ADDR
581@item I386_DR_LOW_RESET_ADDR (@var{idx})
582Reset (i.e.@: zero out) the address stored in the debug register
583number @var{idx}.
584
585@findex I386_DR_LOW_GET_STATUS
586@item I386_DR_LOW_GET_STATUS
587Return the value of the Debug Status (DR6) register. This value is
588used immediately after it is returned by
589@code{I386_DR_LOW_GET_STATUS}, so as to support per-thread status
590register values.
591@end table
592
593For each one of the 4 debug registers (whose indices are from 0 to 3)
594that store addresses, a reference count is maintained by @value{GDBN},
595to allow sharing of debug registers by several watchpoints. This
596allows users to define several watchpoints that watch the same
597expression, but with different conditions and/or commands, without
598wasting debug registers which are in short supply. @value{GDBN}
599maintains the reference counts internally, targets don't have to do
600anything to use this feature.
601
602The x86 debug registers can each watch a region that is 1, 2, or 4
603bytes long. The ia32 architecture requires that each watched region
604be appropriately aligned: 2-byte region on 2-byte boundary, 4-byte
605region on 4-byte boundary. However, the x86 watchpoint support in
606@value{GDBN} can watch unaligned regions and regions larger than 4
607bytes (up to 16 bytes) by allocating several debug registers to watch
608a single region. This allocation of several registers per a watched
609region is also done automatically without target code intervention.
610
611The generic x86 watchpoint support provides the following API for the
612@value{GDBN}'s application code:
613
614@table @code
615@findex i386_region_ok_for_watchpoint
616@item i386_region_ok_for_watchpoint (@var{addr}, @var{len})
617The macro @code{TARGET_REGION_OK_FOR_HW_WATCHPOINT} is set to call
618this function. It counts the number of debug registers required to
619watch a given region, and returns a non-zero value if that number is
620less than 4, the number of debug registers available to x86
621processors.
622
623@findex i386_stopped_data_address
624@item i386_stopped_data_address (void)
625The macros @code{STOPPED_BY_WATCHPOINT} and
626@code{target_stopped_data_address} are set to call this function. The
627argument passed to @code{STOPPED_BY_WATCHPOINT} is ignored. This
628function examines the breakpoint condition bits in the DR6 Debug
629Status register, as returned by the @code{I386_DR_LOW_GET_STATUS}
630macro, and returns the address associated with the first bit that is
631set in DR6.
632
633@findex i386_insert_watchpoint
634@findex i386_remove_watchpoint
635@item i386_insert_watchpoint (@var{addr}, @var{len}, @var{type})
636@itemx i386_remove_watchpoint (@var{addr}, @var{len}, @var{type})
637Insert or remove a watchpoint. The macros
638@code{target_insert_watchpoint} and @code{target_remove_watchpoint}
639are set to call these functions. @code{i386_insert_watchpoint} first
640looks for a debug register which is already set to watch the same
641region for the same access types; if found, it just increments the
642reference count of that debug register, thus implementing debug
643register sharing between watchpoints. If no such register is found,
644the function looks for a vacant debug register, sets its mirrorred
645value to @var{addr}, sets the mirrorred value of DR7 Debug Control
646register as appropriate for the @var{len} and @var{type} parameters,
647and then passes the new values of the debug register and DR7 to the
648inferior by calling @code{I386_DR_LOW_SET_ADDR} and
649@code{I386_DR_LOW_SET_CONTROL}. If more than one debug register is
650required to cover the given region, the above process is repeated for
651each debug register.
652
653@code{i386_remove_watchpoint} does the opposite: it resets the address
654in the mirrorred value of the debug register and its read/write and
655length bits in the mirrorred value of DR7, then passes these new
656values to the inferior via @code{I386_DR_LOW_RESET_ADDR} and
657@code{I386_DR_LOW_SET_CONTROL}. If a register is shared by several
658watchpoints, each time a @code{i386_remove_watchpoint} is called, it
659decrements the reference count, and only calls
660@code{I386_DR_LOW_RESET_ADDR} and @code{I386_DR_LOW_SET_CONTROL} when
661the count goes to zero.
662
663@findex i386_insert_hw_breakpoint
664@findex i386_remove_hw_breakpoint
665@item i386_insert_hw_breakpoint (@var{addr}, @var{shadow}
666@itemx i386_remove_hw_breakpoint (@var{addr}, @var{shadow})
667These functions insert and remove hardware-assisted breakpoints. The
668macros @code{target_insert_hw_breakpoint} and
669@code{target_remove_hw_breakpoint} are set to call these functions.
670These functions work like @code{i386_insert_watchpoint} and
671@code{i386_remove_watchpoint}, respectively, except that they set up
672the debug registers to watch instruction execution, and each
673hardware-assisted breakpoint always requires exactly one debug
674register.
675
676@findex i386_stopped_by_hwbp
677@item i386_stopped_by_hwbp (void)
678This function returns non-zero if the inferior has some watchpoint or
679hardware breakpoint that triggered. It works like
680@code{i386_stopped_data_address}, except that it doesn't return the
681address whose watchpoint triggered.
682
683@findex i386_cleanup_dregs
684@item i386_cleanup_dregs (void)
685This function clears all the reference counts, addresses, and control
686bits in the mirror images of the debug registers. It doesn't affect
687the actual debug registers in the inferior process.
688@end table
689
690@noindent
691@strong{Notes:}
692@enumerate 1
693@item
694x86 processors support setting watchpoints on I/O reads or writes.
695However, since no target supports this (as of March 2001), and since
696@code{enum target_hw_bp_type} doesn't even have an enumeration for I/O
697watchpoints, this feature is not yet available to @value{GDBN} running
698on x86.
699
700@item
701x86 processors can enable watchpoints locally, for the current task
702only, or globally, for all the tasks. For each debug register,
703there's a bit in the DR7 Debug Control register that determines
704whether the associated address is watched locally or globally. The
705current implementation of x86 watchpoint support in @value{GDBN}
706always sets watchpoints to be locally enabled, since global
707watchpoints might interfere with the underlying OS and are probably
708unavailable in many platforms.
709@end enumerate
710
c906108c
SS
711@node User Interface
712
713@chapter User Interface
714
25822942 715@value{GDBN} has several user interfaces. Although the command-line interface
c906108c
SS
716is the most common and most familiar, there are others.
717
718@section Command Interpreter
719
56caf160 720@cindex command interpreter
0ee54786 721@cindex CLI
25822942 722The command interpreter in @value{GDBN} is fairly simple. It is designed to
c906108c
SS
723allow for the set of commands to be augmented dynamically, and also
724has a recursive subcommand capability, where the first argument to
725a command may itself direct a lookup on a different command list.
726
56caf160
EZ
727For instance, the @samp{set} command just starts a lookup on the
728@code{setlist} command list, while @samp{set thread} recurses
c906108c
SS
729to the @code{set_thread_cmd_list}.
730
56caf160
EZ
731@findex add_cmd
732@findex add_com
c906108c
SS
733To add commands in general, use @code{add_cmd}. @code{add_com} adds to
734the main command list, and should be used for those commands. The usual
cfeada60 735place to add commands is in the @code{_initialize_@var{xyz}} routines at
9742079a 736the ends of most source files.
cfeada60 737
56caf160
EZ
738@cindex deprecating commands
739@findex deprecate_cmd
cfeada60
FN
740Before removing commands from the command set it is a good idea to
741deprecate them for some time. Use @code{deprecate_cmd} on commands or
742aliases to set the deprecated flag. @code{deprecate_cmd} takes a
743@code{struct cmd_list_element} as it's first argument. You can use the
744return value from @code{add_com} or @code{add_cmd} to deprecate the
745command immediately after it is created.
746
c72e7388 747The first time a command is used the user will be warned and offered a
cfeada60
FN
748replacement (if one exists). Note that the replacement string passed to
749@code{deprecate_cmd} should be the full name of the command, i.e. the
750entire string the user should type at the command line.
c906108c 751
0ee54786
EZ
752@section UI-Independent Output---the @code{ui_out} Functions
753@c This section is based on the documentation written by Fernando
754@c Nasser <fnasser@redhat.com>.
755
756@cindex @code{ui_out} functions
757The @code{ui_out} functions present an abstraction level for the
758@value{GDBN} output code. They hide the specifics of different user
759interfaces supported by @value{GDBN}, and thus free the programmer
760from the need to write several versions of the same code, one each for
761every UI, to produce output.
762
763@subsection Overview and Terminology
764
765In general, execution of each @value{GDBN} command produces some sort
766of output, and can even generate an input request.
767
768Output can be generated for the following purposes:
769
770@itemize @bullet
771@item
772to display a @emph{result} of an operation;
773
774@item
775to convey @emph{info} or produce side-effects of a requested
776operation;
777
778@item
779to provide a @emph{notification} of an asynchronous event (including
780progress indication of a prolonged asynchronous operation);
781
782@item
783to display @emph{error messages} (including warnings);
784
785@item
786to show @emph{debug data};
787
788@item
789to @emph{query} or prompt a user for input (a special case).
790@end itemize
791
792@noindent
793This section mainly concentrates on how to build result output,
794although some of it also applies to other kinds of output.
795
796Generation of output that displays the results of an operation
797involves one or more of the following:
798
799@itemize @bullet
800@item
801output of the actual data
802
803@item
804formatting the output as appropriate for console output, to make it
805easily readable by humans
806
807@item
808machine oriented formatting--a more terse formatting to allow for easy
809parsing by programs which read @value{GDBN}'s output
810
811@item
c72e7388
AC
812annotation, whose purpose is to help legacy GUIs to identify interesting
813parts in the output
0ee54786
EZ
814@end itemize
815
816The @code{ui_out} routines take care of the first three aspects.
c72e7388
AC
817Annotations are provided by separate annotation routines. Note that use
818of annotations for an interface between a GUI and @value{GDBN} is
0ee54786
EZ
819deprecated.
820
c72e7388
AC
821Output can be in the form of a single item, which we call a @dfn{field};
822a @dfn{list} consisting of identical fields; a @dfn{tuple} consisting of
823non-identical fields; or a @dfn{table}, which is a tuple consisting of a
824header and a body. In a BNF-like form:
0ee54786 825
c72e7388
AC
826@table @code
827@item <table> @expansion{}
828@code{<header> <body>}
829@item <header> @expansion{}
830@code{@{ <column> @}}
831@item <column> @expansion{}
832@code{<width> <alignment> <title>}
833@item <body> @expansion{}
834@code{@{<row>@}}
835@end table
0ee54786
EZ
836
837
838@subsection General Conventions
839
c72e7388
AC
840Most @code{ui_out} routines are of type @code{void}, the exceptions are
841@code{ui_out_stream_new} (which returns a pointer to the newly created
842object) and the @code{make_cleanup} routines.
0ee54786 843
c72e7388
AC
844The first parameter is always the @code{ui_out} vector object, a pointer
845to a @code{struct ui_out}.
0ee54786 846
c72e7388
AC
847The @var{format} parameter is like in @code{printf} family of functions.
848When it is present, there must also be a variable list of arguments
849sufficient used to satisfy the @code{%} specifiers in the supplied
0ee54786
EZ
850format.
851
c72e7388
AC
852When a character string argument is not used in a @code{ui_out} function
853call, a @code{NULL} pointer has to be supplied instead.
0ee54786
EZ
854
855
c72e7388 856@subsection Table, Tuple and List Functions
0ee54786
EZ
857
858@cindex list output functions
859@cindex table output functions
c72e7388
AC
860@cindex tuple output functions
861This section introduces @code{ui_out} routines for building lists,
862tuples and tables. The routines to output the actual data items
863(fields) are presented in the next section.
0ee54786 864
c72e7388
AC
865To recap: A @dfn{tuple} is a sequence of @dfn{fields}, each field
866containing information about an object; a @dfn{list} is a sequence of
867fields where each field describes an identical object.
0ee54786 868
c72e7388
AC
869Use the @dfn{table} functions when your output consists of a list of
870rows (tuples) and the console output should include a heading. Use this
871even when you are listing just one object but you still want the header.
0ee54786
EZ
872
873@cindex nesting level in @code{ui_out} functions
c72e7388
AC
874Tables can not be nested. Tuples and lists can be nested up to a
875maximum of five levels.
0ee54786
EZ
876
877The overall structure of the table output code is something like this:
878
879@example
880 ui_out_table_begin
881 ui_out_table_header
c72e7388 882 @dots{}
0ee54786 883 ui_out_table_body
c72e7388 884 ui_out_tuple_begin
0ee54786 885 ui_out_field_*
c72e7388
AC
886 @dots{}
887 ui_out_tuple_end
888 @dots{}
0ee54786
EZ
889 ui_out_table_end
890@end example
891
c72e7388 892Here is the description of table-, tuple- and list-related @code{ui_out}
0ee54786
EZ
893functions:
894
c72e7388
AC
895@deftypefun void ui_out_table_begin (struct ui_out *@var{uiout}, int @var{nbrofcols}, int @var{nr_rows}, const char *@var{tblid})
896The function @code{ui_out_table_begin} marks the beginning of the output
897of a table. It should always be called before any other @code{ui_out}
898function for a given table. @var{nbrofcols} is the number of columns in
899the table. @var{nr_rows} is the number of rows in the table.
900@var{tblid} is an optional string identifying the table. The string
901pointed to by @var{tblid} is copied by the implementation of
902@code{ui_out_table_begin}, so the application can free the string if it
903was @code{malloc}ed.
0ee54786
EZ
904
905The companion function @code{ui_out_table_end}, described below, marks
906the end of the table's output.
907@end deftypefun
908
c72e7388
AC
909@deftypefun void ui_out_table_header (struct ui_out *@var{uiout}, int @var{width}, enum ui_align @var{alignment}, const char *@var{colhdr})
910@code{ui_out_table_header} provides the header information for a single
911table column. You call this function several times, one each for every
912column of the table, after @code{ui_out_table_begin}, but before
913@code{ui_out_table_body}.
0ee54786
EZ
914
915The value of @var{width} gives the column width in characters. The
916value of @var{alignment} is one of @code{left}, @code{center}, and
917@code{right}, and it specifies how to align the header: left-justify,
918center, or right-justify it. @var{colhdr} points to a string that
919specifies the column header; the implementation copies that string, so
c72e7388
AC
920column header strings in @code{malloc}ed storage can be freed after the
921call.
0ee54786
EZ
922@end deftypefun
923
924@deftypefun void ui_out_table_body (struct ui_out *@var{uiout})
c72e7388 925This function delimits the table header from the table body.
0ee54786
EZ
926@end deftypefun
927
928@deftypefun void ui_out_table_end (struct ui_out *@var{uiout})
c72e7388
AC
929This function signals the end of a table's output. It should be called
930after the table body has been produced by the list and field output
931functions.
0ee54786
EZ
932
933There should be exactly one call to @code{ui_out_table_end} for each
c72e7388
AC
934call to @code{ui_out_table_begin}, otherwise the @code{ui_out} functions
935will signal an internal error.
0ee54786
EZ
936@end deftypefun
937
c72e7388 938The output of the tuples that represent the table rows must follow the
0ee54786 939call to @code{ui_out_table_body} and precede the call to
c72e7388
AC
940@code{ui_out_table_end}. You build a tuple by calling
941@code{ui_out_tuple_begin} and @code{ui_out_tuple_end}, with suitable
0ee54786
EZ
942calls to functions which actually output fields between them.
943
c72e7388
AC
944@deftypefun void ui_out_tuple_begin (struct ui_out *@var{uiout}, const char *@var{id})
945This function marks the beginning of a tuple output. @var{id} points
946to an optional string that identifies the tuple; it is copied by the
947implementation, and so strings in @code{malloc}ed storage can be freed
948after the call.
949@end deftypefun
950
951@deftypefun void ui_out_tuple_end (struct ui_out *@var{uiout})
952This function signals an end of a tuple output. There should be exactly
953one call to @code{ui_out_tuple_end} for each call to
954@code{ui_out_tuple_begin}, otherwise an internal @value{GDBN} error will
955be signaled.
956@end deftypefun
957
958@deftypefun struct cleanup *make_cleanup_ui_out_tuple_begin_end (struct ui_out *@var{uiout}, const char *@var{id})
959This function first opens the tuple and then establishes a cleanup
960(@pxref{Coding, Cleanups}) to close the tuple. It provides a convenient
961and correct implementation of the non-portable@footnote{The function
962cast is not portable ISO-C.} code sequence:
963@smallexample
964struct cleanup *old_cleanup;
965ui_out_tuple_begin (uiout, "...");
966old_cleanup = make_cleanup ((void(*)(void *)) ui_out_tuple_end,
967 uiout);
968@end smallexample
969@end deftypefun
970
971@deftypefun void ui_out_list_begin (struct ui_out *@var{uiout}, const char *@var{id})
972This function marks the beginning of a list output. @var{id} points to
973an optional string that identifies the list; it is copied by the
974implementation, and so strings in @code{malloc}ed storage can be freed
975after the call.
0ee54786
EZ
976@end deftypefun
977
978@deftypefun void ui_out_list_end (struct ui_out *@var{uiout})
c72e7388
AC
979This function signals an end of a list output. There should be exactly
980one call to @code{ui_out_list_end} for each call to
981@code{ui_out_list_begin}, otherwise an internal @value{GDBN} error will
982be signaled.
983@end deftypefun
984
985@deftypefun struct cleanup *make_cleanup_ui_out_list_begin_end (struct ui_out *@var{uiout}, const char *@var{id})
986Similar to @code{make_cleanup_ui_out_tuple_begin_end}, this function
987opens a list and then establishes cleanup (@pxref{Coding, Cleanups})
988that will close the list.list.
0ee54786
EZ
989@end deftypefun
990
991@subsection Item Output Functions
992
993@cindex item output functions
994@cindex field output functions
995@cindex data output
996The functions described below produce output for the actual data
997items, or fields, which contain information about the object.
998
999Choose the appropriate function accordingly to your particular needs.
1000
1001@deftypefun void ui_out_field_fmt (struct ui_out *@var{uiout}, char *@var{fldname}, char *@var{format}, ...)
1002This is the most general output function. It produces the
1003representation of the data in the variable-length argument list
1004according to formatting specifications in @var{format}, a
1005@code{printf}-like format string. The optional argument @var{fldname}
1006supplies the name of the field. The data items themselves are
1007supplied as additional arguments after @var{format}.
1008
1009This generic function should be used only when it is not possible to
1010use one of the specialized versions (see below).
1011@end deftypefun
1012
c72e7388 1013@deftypefun void ui_out_field_int (struct ui_out *@var{uiout}, const char *@var{fldname}, int @var{value})
0ee54786
EZ
1014This function outputs a value of an @code{int} variable. It uses the
1015@code{"%d"} output conversion specification. @var{fldname} specifies
1016the name of the field.
1017@end deftypefun
1018
c72e7388 1019@deftypefun void ui_out_field_core_addr (struct ui_out *@var{uiout}, const char *@var{fldname}, CORE_ADDR @var{address})
0ee54786
EZ
1020This function outputs an address.
1021@end deftypefun
1022
c72e7388 1023@deftypefun void ui_out_field_string (struct ui_out *@var{uiout}, const char *@var{fldname}, const char *@var{string})
0ee54786
EZ
1024This function outputs a string using the @code{"%s"} conversion
1025specification.
1026@end deftypefun
1027
1028Sometimes, there's a need to compose your output piece by piece using
1029functions that operate on a stream, such as @code{value_print} or
1030@code{fprintf_symbol_filtered}. These functions accept an argument of
1031the type @code{struct ui_file *}, a pointer to a @code{ui_file} object
1032used to store the data stream used for the output. When you use one
1033of these functions, you need a way to pass their results stored in a
1034@code{ui_file} object to the @code{ui_out} functions. To this end,
1035you first create a @code{ui_stream} object by calling
1036@code{ui_out_stream_new}, pass the @code{stream} member of that
1037@code{ui_stream} object to @code{value_print} and similar functions,
1038and finally call @code{ui_out_field_stream} to output the field you
1039constructed. When the @code{ui_stream} object is no longer needed,
1040you should destroy it and free its memory by calling
1041@code{ui_out_stream_delete}.
1042
1043@deftypefun struct ui_stream *ui_out_stream_new (struct ui_out *@var{uiout})
1044This function creates a new @code{ui_stream} object which uses the
1045same output methods as the @code{ui_out} object whose pointer is
1046passed in @var{uiout}. It returns a pointer to the newly created
1047@code{ui_stream} object.
1048@end deftypefun
1049
1050@deftypefun void ui_out_stream_delete (struct ui_stream *@var{streambuf})
1051This functions destroys a @code{ui_stream} object specified by
1052@var{streambuf}.
1053@end deftypefun
1054
c72e7388 1055@deftypefun void ui_out_field_stream (struct ui_out *@var{uiout}, const char *@var{fieldname}, struct ui_stream *@var{streambuf})
0ee54786
EZ
1056This function consumes all the data accumulated in
1057@code{streambuf->stream} and outputs it like
1058@code{ui_out_field_string} does. After a call to
1059@code{ui_out_field_stream}, the accumulated data no longer exists, but
1060the stream is still valid and may be used for producing more fields.
1061@end deftypefun
1062
1063@strong{Important:} If there is any chance that your code could bail
1064out before completing output generation and reaching the point where
1065@code{ui_out_stream_delete} is called, it is necessary to set up a
1066cleanup, to avoid leaking memory and other resources. Here's a
1067skeleton code to do that:
1068
1069@smallexample
1070 struct ui_stream *mybuf = ui_out_stream_new (uiout);
1071 struct cleanup *old = make_cleanup (ui_out_stream_delete, mybuf);
1072 ...
1073 do_cleanups (old);
1074@end smallexample
1075
1076If the function already has the old cleanup chain set (for other kinds
1077of cleanups), you just have to add your cleanup to it:
1078
1079@smallexample
1080 mybuf = ui_out_stream_new (uiout);
1081 make_cleanup (ui_out_stream_delete, mybuf);
1082@end smallexample
1083
1084Note that with cleanups in place, you should not call
1085@code{ui_out_stream_delete} directly, or you would attempt to free the
1086same buffer twice.
1087
1088@subsection Utility Output Functions
1089
c72e7388 1090@deftypefun void ui_out_field_skip (struct ui_out *@var{uiout}, const char *@var{fldname})
0ee54786
EZ
1091This function skips a field in a table. Use it if you have to leave
1092an empty field without disrupting the table alignment. The argument
1093@var{fldname} specifies a name for the (missing) filed.
1094@end deftypefun
1095
c72e7388 1096@deftypefun void ui_out_text (struct ui_out *@var{uiout}, const char *@var{string})
0ee54786
EZ
1097This function outputs the text in @var{string} in a way that makes it
1098easy to be read by humans. For example, the console implementation of
1099this method filters the text through a built-in pager, to prevent it
1100from scrolling off the visible portion of the screen.
1101
1102Use this function for printing relatively long chunks of text around
1103the actual field data: the text it produces is not aligned according
1104to the table's format. Use @code{ui_out_field_string} to output a
1105string field, and use @code{ui_out_message}, described below, to
1106output short messages.
1107@end deftypefun
1108
1109@deftypefun void ui_out_spaces (struct ui_out *@var{uiout}, int @var{nspaces})
1110This function outputs @var{nspaces} spaces. It is handy to align the
1111text produced by @code{ui_out_text} with the rest of the table or
1112list.
1113@end deftypefun
1114
c72e7388 1115@deftypefun void ui_out_message (struct ui_out *@var{uiout}, int @var{verbosity}, const char *@var{format}, ...)
0ee54786
EZ
1116This function produces a formatted message, provided that the current
1117verbosity level is at least as large as given by @var{verbosity}. The
1118current verbosity level is specified by the user with the @samp{set
1119verbositylevel} command.@footnote{As of this writing (April 2001),
1120setting verbosity level is not yet implemented, and is always returned
1121as zero. So calling @code{ui_out_message} with a @var{verbosity}
1122argument more than zero will cause the message to never be printed.}
1123@end deftypefun
1124
1125@deftypefun void ui_out_wrap_hint (struct ui_out *@var{uiout}, char *@var{indent})
1126This function gives the console output filter (a paging filter) a hint
1127of where to break lines which are too long. Ignored for all other
1128output consumers. @var{indent}, if non-@code{NULL}, is the string to
1129be printed to indent the wrapped text on the next line; it must remain
1130accessible until the next call to @code{ui_out_wrap_hint}, or until an
1131explicit newline is produced by one of the other functions. If
1132@var{indent} is @code{NULL}, the wrapped text will not be indented.
1133@end deftypefun
1134
1135@deftypefun void ui_out_flush (struct ui_out *@var{uiout})
1136This function flushes whatever output has been accumulated so far, if
1137the UI buffers output.
1138@end deftypefun
1139
1140
1141@subsection Examples of Use of @code{ui_out} functions
1142
1143@cindex using @code{ui_out} functions
1144@cindex @code{ui_out} functions, usage examples
1145This section gives some practical examples of using the @code{ui_out}
1146functions to generalize the old console-oriented code in
1147@value{GDBN}. The examples all come from functions defined on the
1148@file{breakpoints.c} file.
1149
1150This example, from the @code{breakpoint_1} function, shows how to
1151produce a table.
1152
1153The original code was:
1154
1155@example
1156 if (!found_a_breakpoint++)
1157 @{
1158 annotate_breakpoints_headers ();
1159
1160 annotate_field (0);
1161 printf_filtered ("Num ");
1162 annotate_field (1);
1163 printf_filtered ("Type ");
1164 annotate_field (2);
1165 printf_filtered ("Disp ");
1166 annotate_field (3);
1167 printf_filtered ("Enb ");
1168 if (addressprint)
1169 @{
1170 annotate_field (4);
1171 printf_filtered ("Address ");
1172 @}
1173 annotate_field (5);
1174 printf_filtered ("What\n");
1175
1176 annotate_breakpoints_table ();
1177 @}
1178@end example
1179
1180Here's the new version:
1181
1182@example
c72e7388
AC
1183 nr_printable_breakpoints = @dots{};
1184
1185 if (addressprint)
1186 ui_out_table_begin (ui, 6, nr_printable_breakpoints, "BreakpointTable");
1187 else
1188 ui_out_table_begin (ui, 5, nr_printable_breakpoints, "BreakpointTable");
1189
1190 if (nr_printable_breakpoints > 0)
1191 annotate_breakpoints_headers ();
1192 if (nr_printable_breakpoints > 0)
1193 annotate_field (0);
1194 ui_out_table_header (uiout, 3, ui_left, "number", "Num"); /* 1 */
1195 if (nr_printable_breakpoints > 0)
1196 annotate_field (1);
1197 ui_out_table_header (uiout, 14, ui_left, "type", "Type"); /* 2 */
1198 if (nr_printable_breakpoints > 0)
1199 annotate_field (2);
1200 ui_out_table_header (uiout, 4, ui_left, "disp", "Disp"); /* 3 */
1201 if (nr_printable_breakpoints > 0)
1202 annotate_field (3);
1203 ui_out_table_header (uiout, 3, ui_left, "enabled", "Enb"); /* 4 */
1204 if (addressprint)
1205 @{
1206 if (nr_printable_breakpoints > 0)
1207 annotate_field (4);
1208 if (TARGET_ADDR_BIT <= 32)
1209 ui_out_table_header (uiout, 10, ui_left, "addr", "Address");/* 5 */
0ee54786 1210 else
c72e7388
AC
1211 ui_out_table_header (uiout, 18, ui_left, "addr", "Address");/* 5 */
1212 @}
1213 if (nr_printable_breakpoints > 0)
1214 annotate_field (5);
1215 ui_out_table_header (uiout, 40, ui_noalign, "what", "What"); /* 6 */
1216 ui_out_table_body (uiout);
1217 if (nr_printable_breakpoints > 0)
1218 annotate_breakpoints_table ();
0ee54786
EZ
1219@end example
1220
1221This example, from the @code{print_one_breakpoint} function, shows how
1222to produce the actual data for the table whose structure was defined
1223in the above example. The original code was:
1224
1225@example
1226 annotate_record ();
1227 annotate_field (0);
1228 printf_filtered ("%-3d ", b->number);
1229 annotate_field (1);
1230 if ((int)b->type > (sizeof(bptypes)/sizeof(bptypes[0]))
1231 || ((int) b->type != bptypes[(int) b->type].type))
1232 internal_error ("bptypes table does not describe type #%d.",
1233 (int)b->type);
1234 printf_filtered ("%-14s ", bptypes[(int)b->type].description);
1235 annotate_field (2);
1236 printf_filtered ("%-4s ", bpdisps[(int)b->disposition]);
1237 annotate_field (3);
1238 printf_filtered ("%-3c ", bpenables[(int)b->enable]);
c72e7388 1239 @dots{}
0ee54786
EZ
1240@end example
1241
1242This is the new version:
1243
1244@example
1245 annotate_record ();
c72e7388 1246 ui_out_tuple_begin (uiout, "bkpt");
0ee54786
EZ
1247 annotate_field (0);
1248 ui_out_field_int (uiout, "number", b->number);
1249 annotate_field (1);
1250 if (((int) b->type > (sizeof (bptypes) / sizeof (bptypes[0])))
1251 || ((int) b->type != bptypes[(int) b->type].type))
1252 internal_error ("bptypes table does not describe type #%d.",
1253 (int) b->type);
1254 ui_out_field_string (uiout, "type", bptypes[(int)b->type].description);
1255 annotate_field (2);
1256 ui_out_field_string (uiout, "disp", bpdisps[(int)b->disposition]);
1257 annotate_field (3);
1258 ui_out_field_fmt (uiout, "enabled", "%c", bpenables[(int)b->enable]);
c72e7388 1259 @dots{}
0ee54786
EZ
1260@end example
1261
1262This example, also from @code{print_one_breakpoint}, shows how to
1263produce a complicated output field using the @code{print_expression}
1264functions which requires a stream to be passed. It also shows how to
1265automate stream destruction with cleanups. The original code was:
1266
1267@example
1268 annotate_field (5);
1269 print_expression (b->exp, gdb_stdout);
1270@end example
1271
1272The new version is:
1273
1274@example
1275 struct ui_stream *stb = ui_out_stream_new (uiout);
1276 struct cleanup *old_chain = make_cleanup_ui_out_stream_delete (stb);
1277 ...
1278 annotate_field (5);
1279 print_expression (b->exp, stb->stream);
1280 ui_out_field_stream (uiout, "what", local_stream);
1281@end example
1282
1283This example, also from @code{print_one_breakpoint}, shows how to use
1284@code{ui_out_text} and @code{ui_out_field_string}. The original code
1285was:
1286
1287@example
1288 annotate_field (5);
1289 if (b->dll_pathname == NULL)
1290 printf_filtered ("<any library> ");
1291 else
1292 printf_filtered ("library \"%s\" ", b->dll_pathname);
1293@end example
1294
1295It became:
1296
1297@example
1298 annotate_field (5);
1299 if (b->dll_pathname == NULL)
1300 @{
1301 ui_out_field_string (uiout, "what", "<any library>");
1302 ui_out_spaces (uiout, 1);
1303 @}
1304 else
1305 @{
1306 ui_out_text (uiout, "library \"");
1307 ui_out_field_string (uiout, "what", b->dll_pathname);
1308 ui_out_text (uiout, "\" ");
1309 @}
1310@end example
1311
1312The following example from @code{print_one_breakpoint} shows how to
1313use @code{ui_out_field_int} and @code{ui_out_spaces}. The original
1314code was:
1315
1316@example
1317 annotate_field (5);
1318 if (b->forked_inferior_pid != 0)
1319 printf_filtered ("process %d ", b->forked_inferior_pid);
1320@end example
1321
1322It became:
1323
1324@example
1325 annotate_field (5);
1326 if (b->forked_inferior_pid != 0)
1327 @{
1328 ui_out_text (uiout, "process ");
1329 ui_out_field_int (uiout, "what", b->forked_inferior_pid);
1330 ui_out_spaces (uiout, 1);
1331 @}
1332@end example
1333
1334Here's an example of using @code{ui_out_field_string}. The original
1335code was:
1336
1337@example
1338 annotate_field (5);
1339 if (b->exec_pathname != NULL)
1340 printf_filtered ("program \"%s\" ", b->exec_pathname);
1341@end example
1342
1343It became:
1344
1345@example
1346 annotate_field (5);
1347 if (b->exec_pathname != NULL)
1348 @{
1349 ui_out_text (uiout, "program \"");
1350 ui_out_field_string (uiout, "what", b->exec_pathname);
1351 ui_out_text (uiout, "\" ");
1352 @}
1353@end example
1354
1355Finally, here's an example of printing an address. The original code:
1356
1357@example
1358 annotate_field (4);
1359 printf_filtered ("%s ",
1360 local_hex_string_custom ((unsigned long) b->address, "08l"));
1361@end example
1362
1363It became:
1364
1365@example
1366 annotate_field (4);
1367 ui_out_field_core_addr (uiout, "Address", b->address);
1368@end example
1369
1370
c906108c
SS
1371@section Console Printing
1372
1373@section TUI
1374
89437448 1375@node libgdb
c906108c 1376
89437448
AC
1377@chapter libgdb
1378
1379@section libgdb 1.0
1380@cindex @code{libgdb}
1381@code{libgdb} 1.0 was an abortive project of years ago. The theory was
1382to provide an API to @value{GDBN}'s functionality.
1383
1384@section libgdb 2.0
56caf160 1385@cindex @code{libgdb}
89437448
AC
1386@code{libgdb} 2.0 is an ongoing effort to update @value{GDBN} so that is
1387better able to support graphical and other environments.
1388
1389Since @code{libgdb} development is on-going, its architecture is still
1390evolving. The following components have so far been identified:
1391
1392@itemize @bullet
1393@item
1394Observer - @file{gdb-events.h}.
1395@item
1396Builder - @file{ui-out.h}
1397@item
1398Event Loop - @file{event-loop.h}
1399@item
1400Library - @file{gdb.h}
1401@end itemize
1402
1403The model that ties these components together is described below.
1404
1405@section The @code{libgdb} Model
1406
1407A client of @code{libgdb} interacts with the library in two ways.
1408
1409@itemize @bullet
1410@item
1411As an observer (using @file{gdb-events}) receiving notifications from
1412@code{libgdb} of any internal state changes (break point changes, run
1413state, etc).
1414@item
1415As a client querying @code{libgdb} (using the @file{ui-out} builder) to
1416obtain various status values from @value{GDBN}.
1417@end itemize
1418
1419Since @code{libgdb} could have multiple clients (e.g. a GUI supporting
1420the existing @value{GDBN} CLI), those clients must co-operate when
1421controlling @code{libgdb}. In particular, a client must ensure that
1422@code{libgdb} is idle (i.e. no other client is using @code{libgdb})
1423before responding to a @file{gdb-event} by making a query.
1424
1425@section CLI support
1426
1427At present @value{GDBN}'s CLI is very much entangled in with the core of
1428@code{libgdb}. Consequently, a client wishing to include the CLI in
1429their interface needs to carefully co-ordinate its own and the CLI's
1430requirements.
1431
1432It is suggested that the client set @code{libgdb} up to be bi-modal
1433(alternate between CLI and client query modes). The notes below sketch
1434out the theory:
1435
1436@itemize @bullet
1437@item
1438The client registers itself as an observer of @code{libgdb}.
1439@item
1440The client create and install @code{cli-out} builder using its own
1441versions of the @code{ui-file} @code{gdb_stderr}, @code{gdb_stdtarg} and
1442@code{gdb_stdout} streams.
1443@item
1444The client creates a separate custom @code{ui-out} builder that is only
1445used while making direct queries to @code{libgdb}.
1446@end itemize
1447
1448When the client receives input intended for the CLI, it simply passes it
1449along. Since the @code{cli-out} builder is installed by default, all
1450the CLI output in response to that command is routed (pronounced rooted)
1451through to the client controlled @code{gdb_stdout} et.@: al.@: streams.
1452At the same time, the client is kept abreast of internal changes by
1453virtue of being a @code{libgdb} observer.
1454
1455The only restriction on the client is that it must wait until
1456@code{libgdb} becomes idle before initiating any queries (using the
1457client's custom builder).
1458
1459@section @code{libgdb} components
1460
1461@subheading Observer - @file{gdb-events.h}
1462@file{gdb-events} provides the client with a very raw mechanism that can
1463be used to implement an observer. At present it only allows for one
1464observer and that observer must, internally, handle the need to delay
1465the processing of any event notifications until after @code{libgdb} has
1466finished the current command.
1467
1468@subheading Builder - @file{ui-out.h}
1469@file{ui-out} provides the infrastructure necessary for a client to
1470create a builder. That builder is then passed down to @code{libgdb}
1471when doing any queries.
1472
1473@subheading Event Loop - @file{event-loop.h}
1474@c There could be an entire section on the event-loop
1475@file{event-loop}, currently non-re-entrant, provides a simple event
1476loop. A client would need to either plug its self into this loop or,
1477implement a new event-loop that GDB would use.
1478
1479The event-loop will eventually be made re-entrant. This is so that
1480@value{GDB} can better handle the problem of some commands blocking
1481instead of returning.
1482
1483@subheading Library - @file{gdb.h}
1484@file{libgdb} is the most obvious component of this system. It provides
1485the query interface. Each function is parameterized by a @code{ui-out}
1486builder. The result of the query is constructed using that builder
1487before the query function returns.
c906108c
SS
1488
1489@node Symbol Handling
1490
1491@chapter Symbol Handling
1492
25822942 1493Symbols are a key part of @value{GDBN}'s operation. Symbols include variables,
c906108c
SS
1494functions, and types.
1495
1496@section Symbol Reading
1497
56caf160
EZ
1498@cindex symbol reading
1499@cindex reading of symbols
1500@cindex symbol files
1501@value{GDBN} reads symbols from @dfn{symbol files}. The usual symbol
1502file is the file containing the program which @value{GDBN} is
1503debugging. @value{GDBN} can be directed to use a different file for
1504symbols (with the @samp{symbol-file} command), and it can also read
1505more symbols via the @samp{add-file} and @samp{load} commands, or while
1506reading symbols from shared libraries.
1507
1508@findex find_sym_fns
1509Symbol files are initially opened by code in @file{symfile.c} using
1510the BFD library (@pxref{Support Libraries}). BFD identifies the type
1511of the file by examining its header. @code{find_sym_fns} then uses
1512this identification to locate a set of symbol-reading functions.
1513
1514@findex add_symtab_fns
1515@cindex @code{sym_fns} structure
1516@cindex adding a symbol-reading module
1517Symbol-reading modules identify themselves to @value{GDBN} by calling
c906108c
SS
1518@code{add_symtab_fns} during their module initialization. The argument
1519to @code{add_symtab_fns} is a @code{struct sym_fns} which contains the
1520name (or name prefix) of the symbol format, the length of the prefix,
1521and pointers to four functions. These functions are called at various
56caf160 1522times to process symbol files whose identification matches the specified
c906108c
SS
1523prefix.
1524
1525The functions supplied by each module are:
1526
1527@table @code
1528@item @var{xyz}_symfile_init(struct sym_fns *sf)
1529
56caf160 1530@cindex secondary symbol file
c906108c
SS
1531Called from @code{symbol_file_add} when we are about to read a new
1532symbol file. This function should clean up any internal state (possibly
1533resulting from half-read previous files, for example) and prepare to
56caf160
EZ
1534read a new symbol file. Note that the symbol file which we are reading
1535might be a new ``main'' symbol file, or might be a secondary symbol file
c906108c
SS
1536whose symbols are being added to the existing symbol table.
1537
1538The argument to @code{@var{xyz}_symfile_init} is a newly allocated
1539@code{struct sym_fns} whose @code{bfd} field contains the BFD for the
1540new symbol file being read. Its @code{private} field has been zeroed,
1541and can be modified as desired. Typically, a struct of private
1542information will be @code{malloc}'d, and a pointer to it will be placed
1543in the @code{private} field.
1544
1545There is no result from @code{@var{xyz}_symfile_init}, but it can call
1546@code{error} if it detects an unavoidable problem.
1547
1548@item @var{xyz}_new_init()
1549
1550Called from @code{symbol_file_add} when discarding existing symbols.
56caf160
EZ
1551This function needs only handle the symbol-reading module's internal
1552state; the symbol table data structures visible to the rest of
1553@value{GDBN} will be discarded by @code{symbol_file_add}. It has no
1554arguments and no result. It may be called after
1555@code{@var{xyz}_symfile_init}, if a new symbol table is being read, or
1556may be called alone if all symbols are simply being discarded.
c906108c
SS
1557
1558@item @var{xyz}_symfile_read(struct sym_fns *sf, CORE_ADDR addr, int mainline)
1559
1560Called from @code{symbol_file_add} to actually read the symbols from a
1561symbol-file into a set of psymtabs or symtabs.
1562
56caf160 1563@code{sf} points to the @code{struct sym_fns} originally passed to
c906108c
SS
1564@code{@var{xyz}_sym_init} for possible initialization. @code{addr} is
1565the offset between the file's specified start address and its true
1566address in memory. @code{mainline} is 1 if this is the main symbol
1567table being read, and 0 if a secondary symbol file (e.g. shared library
1568or dynamically loaded file) is being read.@refill
1569@end table
1570
1571In addition, if a symbol-reading module creates psymtabs when
1572@var{xyz}_symfile_read is called, these psymtabs will contain a pointer
1573to a function @code{@var{xyz}_psymtab_to_symtab}, which can be called
25822942 1574from any point in the @value{GDBN} symbol-handling code.
c906108c
SS
1575
1576@table @code
1577@item @var{xyz}_psymtab_to_symtab (struct partial_symtab *pst)
1578
56caf160 1579Called from @code{psymtab_to_symtab} (or the @code{PSYMTAB_TO_SYMTAB} macro) if
c906108c
SS
1580the psymtab has not already been read in and had its @code{pst->symtab}
1581pointer set. The argument is the psymtab to be fleshed-out into a
56caf160
EZ
1582symtab. Upon return, @code{pst->readin} should have been set to 1, and
1583@code{pst->symtab} should contain a pointer to the new corresponding symtab, or
c906108c
SS
1584zero if there were no symbols in that part of the symbol file.
1585@end table
1586
1587@section Partial Symbol Tables
1588
56caf160 1589@value{GDBN} has three types of symbol tables:
c906108c
SS
1590
1591@itemize @bullet
56caf160
EZ
1592@cindex full symbol table
1593@cindex symtabs
1594@item
1595Full symbol tables (@dfn{symtabs}). These contain the main
1596information about symbols and addresses.
c906108c 1597
56caf160
EZ
1598@cindex psymtabs
1599@item
1600Partial symbol tables (@dfn{psymtabs}). These contain enough
c906108c
SS
1601information to know when to read the corresponding part of the full
1602symbol table.
1603
56caf160
EZ
1604@cindex minimal symbol table
1605@cindex minsymtabs
1606@item
1607Minimal symbol tables (@dfn{msymtabs}). These contain information
c906108c 1608gleaned from non-debugging symbols.
c906108c
SS
1609@end itemize
1610
56caf160 1611@cindex partial symbol table
c906108c
SS
1612This section describes partial symbol tables.
1613
1614A psymtab is constructed by doing a very quick pass over an executable
1615file's debugging information. Small amounts of information are
56caf160 1616extracted---enough to identify which parts of the symbol table will
c906108c 1617need to be re-read and fully digested later, when the user needs the
25822942 1618information. The speed of this pass causes @value{GDBN} to start up very
c906108c
SS
1619quickly. Later, as the detailed rereading occurs, it occurs in small
1620pieces, at various times, and the delay therefrom is mostly invisible to
1621the user.
1622@c (@xref{Symbol Reading}.)
1623
1624The symbols that show up in a file's psymtab should be, roughly, those
1625visible to the debugger's user when the program is not running code from
1626that file. These include external symbols and types, static symbols and
56caf160 1627types, and @code{enum} values declared at file scope.
c906108c
SS
1628
1629The psymtab also contains the range of instruction addresses that the
1630full symbol table would represent.
1631
56caf160
EZ
1632@cindex finding a symbol
1633@cindex symbol lookup
c906108c
SS
1634The idea is that there are only two ways for the user (or much of the
1635code in the debugger) to reference a symbol:
1636
1637@itemize @bullet
56caf160
EZ
1638@findex find_pc_function
1639@findex find_pc_line
1640@item
1641By its address (e.g. execution stops at some address which is inside a
1642function in this file). The address will be noticed to be in the
1643range of this psymtab, and the full symtab will be read in.
1644@code{find_pc_function}, @code{find_pc_line}, and other
1645@code{find_pc_@dots{}} functions handle this.
c906108c 1646
56caf160
EZ
1647@cindex lookup_symbol
1648@item
1649By its name
c906108c
SS
1650(e.g. the user asks to print a variable, or set a breakpoint on a
1651function). Global names and file-scope names will be found in the
1652psymtab, which will cause the symtab to be pulled in. Local names will
1653have to be qualified by a global name, or a file-scope name, in which
1654case we will have already read in the symtab as we evaluated the
56caf160 1655qualifier. Or, a local symbol can be referenced when we are ``in'' a
c906108c
SS
1656local scope, in which case the first case applies. @code{lookup_symbol}
1657does most of the work here.
c906108c
SS
1658@end itemize
1659
1660The only reason that psymtabs exist is to cause a symtab to be read in
1661at the right moment. Any symbol that can be elided from a psymtab,
1662while still causing that to happen, should not appear in it. Since
1663psymtabs don't have the idea of scope, you can't put local symbols in
1664them anyway. Psymtabs don't have the idea of the type of a symbol,
1665either, so types need not appear, unless they will be referenced by
1666name.
1667
56caf160
EZ
1668It is a bug for @value{GDBN} to behave one way when only a psymtab has
1669been read, and another way if the corresponding symtab has been read
1670in. Such bugs are typically caused by a psymtab that does not contain
1671all the visible symbols, or which has the wrong instruction address
1672ranges.
c906108c 1673
56caf160 1674The psymtab for a particular section of a symbol file (objfile) could be
c906108c
SS
1675thrown away after the symtab has been read in. The symtab should always
1676be searched before the psymtab, so the psymtab will never be used (in a
1677bug-free environment). Currently, psymtabs are allocated on an obstack,
1678and all the psymbols themselves are allocated in a pair of large arrays
1679on an obstack, so there is little to be gained by trying to free them
1680unless you want to do a lot more work.
1681
1682@section Types
1683
56caf160 1684@unnumberedsubsec Fundamental Types (e.g., @code{FT_VOID}, @code{FT_BOOLEAN}).
c906108c 1685
56caf160 1686@cindex fundamental types
25822942 1687These are the fundamental types that @value{GDBN} uses internally. Fundamental
c906108c
SS
1688types from the various debugging formats (stabs, ELF, etc) are mapped
1689into one of these. They are basically a union of all fundamental types
56caf160
EZ
1690that @value{GDBN} knows about for all the languages that @value{GDBN}
1691knows about.
c906108c 1692
56caf160 1693@unnumberedsubsec Type Codes (e.g., @code{TYPE_CODE_PTR}, @code{TYPE_CODE_ARRAY}).
c906108c 1694
56caf160
EZ
1695@cindex type codes
1696Each time @value{GDBN} builds an internal type, it marks it with one
1697of these types. The type may be a fundamental type, such as
1698@code{TYPE_CODE_INT}, or a derived type, such as @code{TYPE_CODE_PTR}
1699which is a pointer to another type. Typically, several @code{FT_*}
1700types map to one @code{TYPE_CODE_*} type, and are distinguished by
1701other members of the type struct, such as whether the type is signed
1702or unsigned, and how many bits it uses.
c906108c 1703
56caf160 1704@unnumberedsubsec Builtin Types (e.g., @code{builtin_type_void}, @code{builtin_type_char}).
c906108c
SS
1705
1706These are instances of type structs that roughly correspond to
56caf160
EZ
1707fundamental types and are created as global types for @value{GDBN} to
1708use for various ugly historical reasons. We eventually want to
1709eliminate these. Note for example that @code{builtin_type_int}
1710initialized in @file{gdbtypes.c} is basically the same as a
1711@code{TYPE_CODE_INT} type that is initialized in @file{c-lang.c} for
1712an @code{FT_INTEGER} fundamental type. The difference is that the
1713@code{builtin_type} is not associated with any particular objfile, and
1714only one instance exists, while @file{c-lang.c} builds as many
1715@code{TYPE_CODE_INT} types as needed, with each one associated with
1716some particular objfile.
c906108c
SS
1717
1718@section Object File Formats
56caf160 1719@cindex object file formats
c906108c
SS
1720
1721@subsection a.out
1722
56caf160
EZ
1723@cindex @code{a.out} format
1724The @code{a.out} format is the original file format for Unix. It
1725consists of three sections: @code{text}, @code{data}, and @code{bss},
1726which are for program code, initialized data, and uninitialized data,
1727respectively.
c906108c 1728
56caf160 1729The @code{a.out} format is so simple that it doesn't have any reserved
c906108c 1730place for debugging information. (Hey, the original Unix hackers used
56caf160
EZ
1731@samp{adb}, which is a machine-language debugger!) The only debugging
1732format for @code{a.out} is stabs, which is encoded as a set of normal
c906108c
SS
1733symbols with distinctive attributes.
1734
56caf160 1735The basic @code{a.out} reader is in @file{dbxread.c}.
c906108c
SS
1736
1737@subsection COFF
1738
56caf160 1739@cindex COFF format
c906108c
SS
1740The COFF format was introduced with System V Release 3 (SVR3) Unix.
1741COFF files may have multiple sections, each prefixed by a header. The
1742number of sections is limited.
1743
1744The COFF specification includes support for debugging. Although this
1745was a step forward, the debugging information was woefully limited. For
1746instance, it was not possible to represent code that came from an
1747included file.
1748
1749The COFF reader is in @file{coffread.c}.
1750
1751@subsection ECOFF
1752
56caf160 1753@cindex ECOFF format
c906108c
SS
1754ECOFF is an extended COFF originally introduced for Mips and Alpha
1755workstations.
1756
1757The basic ECOFF reader is in @file{mipsread.c}.
1758
1759@subsection XCOFF
1760
56caf160 1761@cindex XCOFF format
c906108c
SS
1762The IBM RS/6000 running AIX uses an object file format called XCOFF.
1763The COFF sections, symbols, and line numbers are used, but debugging
56caf160
EZ
1764symbols are @code{dbx}-style stabs whose strings are located in the
1765@code{.debug} section (rather than the string table). For more
1766information, see @ref{Top,,,stabs,The Stabs Debugging Format}.
c906108c
SS
1767
1768The shared library scheme has a clean interface for figuring out what
1769shared libraries are in use, but the catch is that everything which
1770refers to addresses (symbol tables and breakpoints at least) needs to be
1771relocated for both shared libraries and the main executable. At least
1772using the standard mechanism this can only be done once the program has
1773been run (or the core file has been read).
1774
1775@subsection PE
1776
56caf160
EZ
1777@cindex PE-COFF format
1778Windows 95 and NT use the PE (@dfn{Portable Executable}) format for their
c906108c
SS
1779executables. PE is basically COFF with additional headers.
1780
25822942 1781While BFD includes special PE support, @value{GDBN} needs only the basic
c906108c
SS
1782COFF reader.
1783
1784@subsection ELF
1785
56caf160 1786@cindex ELF format
c906108c
SS
1787The ELF format came with System V Release 4 (SVR4) Unix. ELF is similar
1788to COFF in being organized into a number of sections, but it removes
1789many of COFF's limitations.
1790
1791The basic ELF reader is in @file{elfread.c}.
1792
1793@subsection SOM
1794
56caf160 1795@cindex SOM format
c906108c
SS
1796SOM is HP's object file and debug format (not to be confused with IBM's
1797SOM, which is a cross-language ABI).
1798
1799The SOM reader is in @file{hpread.c}.
1800
1801@subsection Other File Formats
1802
56caf160 1803@cindex Netware Loadable Module format
25822942 1804Other file formats that have been supported by @value{GDBN} include Netware
4a98ee0e 1805Loadable Modules (@file{nlmread.c}).
c906108c
SS
1806
1807@section Debugging File Formats
1808
1809This section describes characteristics of debugging information that
1810are independent of the object file format.
1811
1812@subsection stabs
1813
56caf160 1814@cindex stabs debugging info
c906108c
SS
1815@code{stabs} started out as special symbols within the @code{a.out}
1816format. Since then, it has been encapsulated into other file
1817formats, such as COFF and ELF.
1818
1819While @file{dbxread.c} does some of the basic stab processing,
1820including for encapsulated versions, @file{stabsread.c} does
1821the real work.
1822
1823@subsection COFF
1824
56caf160 1825@cindex COFF debugging info
c906108c
SS
1826The basic COFF definition includes debugging information. The level
1827of support is minimal and non-extensible, and is not often used.
1828
1829@subsection Mips debug (Third Eye)
1830
56caf160 1831@cindex ECOFF debugging info
c906108c
SS
1832ECOFF includes a definition of a special debug format.
1833
1834The file @file{mdebugread.c} implements reading for this format.
1835
1836@subsection DWARF 1
1837
56caf160 1838@cindex DWARF 1 debugging info
c906108c
SS
1839DWARF 1 is a debugging format that was originally designed to be
1840used with ELF in SVR4 systems.
1841
1842@c CHILL_PRODUCER
1843@c GCC_PRODUCER
1844@c GPLUS_PRODUCER
1845@c LCC_PRODUCER
1846@c If defined, these are the producer strings in a DWARF 1 file. All of
1847@c these have reasonable defaults already.
1848
1849The DWARF 1 reader is in @file{dwarfread.c}.
1850
1851@subsection DWARF 2
1852
56caf160 1853@cindex DWARF 2 debugging info
c906108c
SS
1854DWARF 2 is an improved but incompatible version of DWARF 1.
1855
1856The DWARF 2 reader is in @file{dwarf2read.c}.
1857
1858@subsection SOM
1859
56caf160 1860@cindex SOM debugging info
c906108c
SS
1861Like COFF, the SOM definition includes debugging information.
1862
25822942 1863@section Adding a New Symbol Reader to @value{GDBN}
c906108c 1864
56caf160
EZ
1865@cindex adding debugging info reader
1866If you are using an existing object file format (@code{a.out}, COFF, ELF, etc),
c906108c
SS
1867there is probably little to be done.
1868
1869If you need to add a new object file format, you must first add it to
1870BFD. This is beyond the scope of this document.
1871
1872You must then arrange for the BFD code to provide access to the
25822942 1873debugging symbols. Generally @value{GDBN} will have to call swapping routines
c906108c 1874from BFD and a few other BFD internal routines to locate the debugging
25822942 1875information. As much as possible, @value{GDBN} should not depend on the BFD
c906108c
SS
1876internal data structures.
1877
1878For some targets (e.g., COFF), there is a special transfer vector used
1879to call swapping routines, since the external data structures on various
1880platforms have different sizes and layouts. Specialized routines that
1881will only ever be implemented by one object file format may be called
1882directly. This interface should be described in a file
56caf160 1883@file{bfd/lib@var{xyz}.h}, which is included by @value{GDBN}.
c906108c
SS
1884
1885
1886@node Language Support
1887
1888@chapter Language Support
1889
56caf160
EZ
1890@cindex language support
1891@value{GDBN}'s language support is mainly driven by the symbol reader,
1892although it is possible for the user to set the source language
1893manually.
c906108c 1894
56caf160
EZ
1895@value{GDBN} chooses the source language by looking at the extension
1896of the file recorded in the debug info; @file{.c} means C, @file{.f}
1897means Fortran, etc. It may also use a special-purpose language
1898identifier if the debug format supports it, like with DWARF.
c906108c 1899
25822942 1900@section Adding a Source Language to @value{GDBN}
c906108c 1901
56caf160
EZ
1902@cindex adding source language
1903To add other languages to @value{GDBN}'s expression parser, follow the
1904following steps:
c906108c
SS
1905
1906@table @emph
1907@item Create the expression parser.
1908
56caf160 1909@cindex expression parser
c906108c 1910This should reside in a file @file{@var{lang}-exp.y}. Routines for
56caf160 1911building parsed expressions into a @code{union exp_element} list are in
c906108c
SS
1912@file{parse.c}.
1913
56caf160 1914@cindex language parser
c906108c
SS
1915Since we can't depend upon everyone having Bison, and YACC produces
1916parsers that define a bunch of global names, the following lines
56caf160 1917@strong{must} be included at the top of the YACC parser, to prevent the
c906108c
SS
1918various parsers from defining the same global names:
1919
1920@example
56caf160
EZ
1921#define yyparse @var{lang}_parse
1922#define yylex @var{lang}_lex
1923#define yyerror @var{lang}_error
1924#define yylval @var{lang}_lval
1925#define yychar @var{lang}_char
1926#define yydebug @var{lang}_debug
1927#define yypact @var{lang}_pact
1928#define yyr1 @var{lang}_r1
1929#define yyr2 @var{lang}_r2
1930#define yydef @var{lang}_def
1931#define yychk @var{lang}_chk
1932#define yypgo @var{lang}_pgo
1933#define yyact @var{lang}_act
1934#define yyexca @var{lang}_exca
1935#define yyerrflag @var{lang}_errflag
1936#define yynerrs @var{lang}_nerrs
c906108c
SS
1937@end example
1938
1939At the bottom of your parser, define a @code{struct language_defn} and
1940initialize it with the right values for your language. Define an
1941@code{initialize_@var{lang}} routine and have it call
25822942 1942@samp{add_language(@var{lang}_language_defn)} to tell the rest of @value{GDBN}
c906108c
SS
1943that your language exists. You'll need some other supporting variables
1944and functions, which will be used via pointers from your
1945@code{@var{lang}_language_defn}. See the declaration of @code{struct
1946language_defn} in @file{language.h}, and the other @file{*-exp.y} files,
1947for more information.
1948
1949@item Add any evaluation routines, if necessary
1950
56caf160
EZ
1951@cindex expression evaluation routines
1952@findex evaluate_subexp
1953@findex prefixify_subexp
1954@findex length_of_subexp
c906108c
SS
1955If you need new opcodes (that represent the operations of the language),
1956add them to the enumerated type in @file{expression.h}. Add support
56caf160
EZ
1957code for these operations in the @code{evaluate_subexp} function
1958defined in the file @file{eval.c}. Add cases
c906108c 1959for new opcodes in two functions from @file{parse.c}:
56caf160 1960@code{prefixify_subexp} and @code{length_of_subexp}. These compute
c906108c
SS
1961the number of @code{exp_element}s that a given operation takes up.
1962
1963@item Update some existing code
1964
1965Add an enumerated identifier for your language to the enumerated type
1966@code{enum language} in @file{defs.h}.
1967
1968Update the routines in @file{language.c} so your language is included.
1969These routines include type predicates and such, which (in some cases)
1970are language dependent. If your language does not appear in the switch
1971statement, an error is reported.
1972
56caf160 1973@vindex current_language
c906108c
SS
1974Also included in @file{language.c} is the code that updates the variable
1975@code{current_language}, and the routines that translate the
1976@code{language_@var{lang}} enumerated identifier into a printable
1977string.
1978
56caf160 1979@findex _initialize_language
c906108c
SS
1980Update the function @code{_initialize_language} to include your
1981language. This function picks the default language upon startup, so is
25822942 1982dependent upon which languages that @value{GDBN} is built for.
c906108c 1983
56caf160 1984@findex allocate_symtab
c906108c
SS
1985Update @code{allocate_symtab} in @file{symfile.c} and/or symbol-reading
1986code so that the language of each symtab (source file) is set properly.
1987This is used to determine the language to use at each stack frame level.
1988Currently, the language is set based upon the extension of the source
1989file. If the language can be better inferred from the symbol
1990information, please set the language of the symtab in the symbol-reading
1991code.
1992
56caf160
EZ
1993@findex print_subexp
1994@findex op_print_tab
1995Add helper code to @code{print_subexp} (in @file{expprint.c}) to handle any new
c906108c
SS
1996expression opcodes you have added to @file{expression.h}. Also, add the
1997printed representations of your operators to @code{op_print_tab}.
1998
1999@item Add a place of call
2000
56caf160 2001@findex parse_exp_1
c906108c 2002Add a call to @code{@var{lang}_parse()} and @code{@var{lang}_error} in
56caf160 2003@code{parse_exp_1} (defined in @file{parse.c}).
c906108c
SS
2004
2005@item Use macros to trim code
2006
56caf160 2007@cindex trimming language-dependent code
25822942
DB
2008The user has the option of building @value{GDBN} for some or all of the
2009languages. If the user decides to build @value{GDBN} for the language
c906108c
SS
2010@var{lang}, then every file dependent on @file{language.h} will have the
2011macro @code{_LANG_@var{lang}} defined in it. Use @code{#ifdef}s to
2012leave out large routines that the user won't need if he or she is not
2013using your language.
2014
25822942 2015Note that you do not need to do this in your YACC parser, since if @value{GDBN}
c906108c 2016is not build for @var{lang}, then @file{@var{lang}-exp.tab.o} (the
25822942 2017compiled form of your parser) is not linked into @value{GDBN} at all.
c906108c 2018
56caf160
EZ
2019See the file @file{configure.in} for how @value{GDBN} is configured
2020for different languages.
c906108c
SS
2021
2022@item Edit @file{Makefile.in}
2023
2024Add dependencies in @file{Makefile.in}. Make sure you update the macro
2025variables such as @code{HFILES} and @code{OBJS}, otherwise your code may
2026not get linked in, or, worse yet, it may not get @code{tar}red into the
2027distribution!
c906108c
SS
2028@end table
2029
2030
2031@node Host Definition
2032
2033@chapter Host Definition
2034
af6c57ea
AC
2035@emph{Maintainer's note: In theory, new targets no longer need to use
2036the host framework described below. Instead it should be possible to
2037handle everything using autoconf. Patches eliminating this framework
2038welcome.}
2039
56caf160 2040With the advent of Autoconf, it's rarely necessary to have host
c906108c
SS
2041definition machinery anymore.
2042
2043@section Adding a New Host
2044
56caf160
EZ
2045@cindex adding a new host
2046@cindex host, adding
2047Most of @value{GDBN}'s host configuration support happens via
2048Autoconf. New host-specific definitions should be rarely needed.
2049@value{GDBN} still uses the host-specific definitions and files listed
2050below, but these mostly exist for historical reasons, and should
2051eventually disappear.
c906108c 2052
25822942 2053Several files control @value{GDBN}'s configuration for host systems:
c906108c
SS
2054
2055@table @file
56caf160 2056@vindex XDEPFILES
c906108c
SS
2057@item gdb/config/@var{arch}/@var{xyz}.mh
2058Specifies Makefile fragments needed when hosting on machine @var{xyz}.
2059In particular, this lists the required machine-dependent object files,
2060by defining @samp{XDEPFILES=@dots{}}. Also specifies the header file
2061which describes host @var{xyz}, by defining @code{XM_FILE=
2062xm-@var{xyz}.h}. You can also define @code{CC}, @code{SYSV_DEFINE},
2063@code{XM_CFLAGS}, @code{XM_ADD_FILES}, @code{XM_CLIBS}, @code{XM_CDEPS},
2064etc.; see @file{Makefile.in}.
2065
2066@item gdb/config/@var{arch}/xm-@var{xyz}.h
56caf160 2067(@file{xm.h} is a link to this file, created by @code{configure}). Contains C
c906108c
SS
2068macro definitions describing the host system environment, such as byte
2069order, host C compiler and library.
2070
2071@item gdb/@var{xyz}-xdep.c
2072Contains any miscellaneous C code required for this machine as a host.
2073On most machines it doesn't exist at all. If it does exist, put
2074@file{@var{xyz}-xdep.o} into the @code{XDEPFILES} line in
2075@file{gdb/config/@var{arch}/@var{xyz}.mh}.
c906108c
SS
2076@end table
2077
2078@subheading Generic Host Support Files
2079
56caf160 2080@cindex generic host support
c906108c
SS
2081There are some ``generic'' versions of routines that can be used by
2082various systems. These can be customized in various ways by macros
2083defined in your @file{xm-@var{xyz}.h} file. If these routines work for
2084the @var{xyz} host, you can just include the generic file's name (with
2085@samp{.o}, not @samp{.c}) in @code{XDEPFILES}.
2086
2087Otherwise, if your machine needs custom support routines, you will need
2088to write routines that perform the same functions as the generic file.
2089Put them into @code{@var{xyz}-xdep.c}, and put @code{@var{xyz}-xdep.o}
2090into @code{XDEPFILES}.
2091
2092@table @file
56caf160
EZ
2093@cindex remote debugging support
2094@cindex serial line support
c906108c
SS
2095@item ser-unix.c
2096This contains serial line support for Unix systems. This is always
2097included, via the makefile variable @code{SER_HARDWIRE}; override this
2098variable in the @file{.mh} file to avoid it.
2099
2100@item ser-go32.c
2101This contains serial line support for 32-bit programs running under DOS,
56caf160 2102using the DJGPP (a.k.a.@: GO32) execution environment.
c906108c 2103
56caf160 2104@cindex TCP remote support
c906108c
SS
2105@item ser-tcp.c
2106This contains generic TCP support using sockets.
c906108c
SS
2107@end table
2108
2109@section Host Conditionals
2110
56caf160
EZ
2111When @value{GDBN} is configured and compiled, various macros are
2112defined or left undefined, to control compilation based on the
2113attributes of the host system. These macros and their meanings (or if
2114the meaning is not documented here, then one of the source files where
2115they are used is indicated) are:
c906108c 2116
56caf160 2117@ftable @code
25822942 2118@item @value{GDBN}INIT_FILENAME
56caf160
EZ
2119The default name of @value{GDBN}'s initialization file (normally
2120@file{.gdbinit}).
c906108c
SS
2121
2122@item MEM_FNS_DECLARED
2123Your host config file defines this if it includes declarations of
2124@code{memcpy} and @code{memset}. Define this to avoid conflicts between
2125the native include files and the declarations in @file{defs.h}.
2126
cce74817
JM
2127@item NO_STD_REGS
2128This macro is deprecated.
2129
c906108c
SS
2130@item NO_SYS_FILE
2131Define this if your system does not have a @code{<sys/file.h>}.
2132
2133@item SIGWINCH_HANDLER
2134If your host defines @code{SIGWINCH}, you can define this to be the name
2135of a function to be called if @code{SIGWINCH} is received.
2136
2137@item SIGWINCH_HANDLER_BODY
2138Define this to expand into code that will define the function named by
2139the expansion of @code{SIGWINCH_HANDLER}.
2140
2141@item ALIGN_STACK_ON_STARTUP
56caf160 2142@cindex stack alignment
c906108c
SS
2143Define this if your system is of a sort that will crash in
2144@code{tgetent} if the stack happens not to be longword-aligned when
2145@code{main} is called. This is a rare situation, but is known to occur
2146on several different types of systems.
2147
2148@item CRLF_SOURCE_FILES
56caf160 2149@cindex DOS text files
c906108c
SS
2150Define this if host files use @code{\r\n} rather than @code{\n} as a
2151line terminator. This will cause source file listings to omit @code{\r}
56caf160
EZ
2152characters when printing and it will allow @code{\r\n} line endings of files
2153which are ``sourced'' by gdb. It must be possible to open files in binary
c906108c
SS
2154mode using @code{O_BINARY} or, for fopen, @code{"rb"}.
2155
2156@item DEFAULT_PROMPT
56caf160 2157@cindex prompt
c906108c
SS
2158The default value of the prompt string (normally @code{"(gdb) "}).
2159
2160@item DEV_TTY
56caf160 2161@cindex terminal device
c906108c
SS
2162The name of the generic TTY device, defaults to @code{"/dev/tty"}.
2163
2164@item FCLOSE_PROVIDED
2165Define this if the system declares @code{fclose} in the headers included
2166in @code{defs.h}. This isn't needed unless your compiler is unusually
2167anal.
2168
2169@item FOPEN_RB
2170Define this if binary files are opened the same way as text files.
2171
2172@item GETENV_PROVIDED
2173Define this if the system declares @code{getenv} in its headers included
56caf160 2174in @code{defs.h}. This isn't needed unless your compiler is unusually
c906108c
SS
2175anal.
2176
2177@item HAVE_MMAP
56caf160 2178@findex mmap
c906108c
SS
2179In some cases, use the system call @code{mmap} for reading symbol
2180tables. For some machines this allows for sharing and quick updates.
2181
2182@item HAVE_SIGSETMASK
56caf160 2183@findex sigsetmask
c906108c 2184Define this if the host system has job control, but does not define
56caf160 2185@code{sigsetmask}. Currently, this is only true of the RS/6000.
c906108c
SS
2186
2187@item HAVE_TERMIO
2188Define this if the host system has @code{termio.h}.
2189
2190@item HOST_BYTE_ORDER
56caf160 2191@cindex byte order
c906108c
SS
2192The ordering of bytes in the host. This must be defined to be either
2193@code{BIG_ENDIAN} or @code{LITTLE_ENDIAN}.
2194
2195@item INT_MAX
9742079a
EZ
2196@itemx INT_MIN
2197@itemx LONG_MAX
2198@itemx UINT_MAX
2199@itemx ULONG_MAX
c906108c
SS
2200Values for host-side constants.
2201
2202@item ISATTY
2203Substitute for isatty, if not available.
2204
2205@item LONGEST
2206This is the longest integer type available on the host. If not defined,
2207it will default to @code{long long} or @code{long}, depending on
2208@code{CC_HAS_LONG_LONG}.
2209
2210@item CC_HAS_LONG_LONG
56caf160
EZ
2211@cindex @code{long long} data type
2212Define this if the host C compiler supports @code{long long}. This is set
2213by the @code{configure} script.
c906108c
SS
2214
2215@item PRINTF_HAS_LONG_LONG
2216Define this if the host can handle printing of long long integers via
56caf160
EZ
2217the printf format conversion specifier @code{ll}. This is set by the
2218@code{configure} script.
c906108c
SS
2219
2220@item HAVE_LONG_DOUBLE
56caf160
EZ
2221Define this if the host C compiler supports @code{long double}. This is
2222set by the @code{configure} script.
c906108c
SS
2223
2224@item PRINTF_HAS_LONG_DOUBLE
2225Define this if the host can handle printing of long double float-point
56caf160
EZ
2226numbers via the printf format conversion specifier @code{Lg}. This is
2227set by the @code{configure} script.
c906108c
SS
2228
2229@item SCANF_HAS_LONG_DOUBLE
2230Define this if the host can handle the parsing of long double
56caf160
EZ
2231float-point numbers via the scanf format conversion specifier
2232@code{Lg}. This is set by the @code{configure} script.
c906108c
SS
2233
2234@item LSEEK_NOT_LINEAR
2235Define this if @code{lseek (n)} does not necessarily move to byte number
2236@code{n} in the file. This is only used when reading source files. It
2237is normally faster to define @code{CRLF_SOURCE_FILES} when possible.
2238
2239@item L_SET
56caf160
EZ
2240This macro is used as the argument to @code{lseek} (or, most commonly,
2241@code{bfd_seek}). FIXME, should be replaced by SEEK_SET instead,
2242which is the POSIX equivalent.
c906108c 2243
c906108c
SS
2244@item MALLOC_INCOMPATIBLE
2245Define this if the system's prototype for @code{malloc} differs from the
56caf160 2246@sc{ansi} definition.
c906108c
SS
2247
2248@item MMAP_BASE_ADDRESS
2249When using HAVE_MMAP, the first mapping should go at this address.
2250
2251@item MMAP_INCREMENT
2252when using HAVE_MMAP, this is the increment between mappings.
2253
c906108c
SS
2254@item NORETURN
2255If defined, this should be one or more tokens, such as @code{volatile},
2256that can be used in both the declaration and definition of functions to
2257indicate that they never return. The default is already set correctly
2258if compiling with GCC. This will almost never need to be defined.
2259
2260@item ATTR_NORETURN
2261If defined, this should be one or more tokens, such as
2262@code{__attribute__ ((noreturn))}, that can be used in the declarations
2263of functions to indicate that they never return. The default is already
2264set correctly if compiling with GCC. This will almost never need to be
2265defined.
2266
7a292a7a 2267@item USE_GENERIC_DUMMY_FRAMES
56caf160 2268@cindex generic dummy frames
7a292a7a
SS
2269Define this to 1 if the target is using the generic inferior function
2270call code. See @code{blockframe.c} for more information.
2271
c906108c 2272@item USE_MMALLOC
56caf160
EZ
2273@findex mmalloc
2274@value{GDBN} will use the @code{mmalloc} library for memory allocation
2275for symbol reading if this symbol is defined. Be careful defining it
2276since there are systems on which @code{mmalloc} does not work for some
2277reason. One example is the DECstation, where its RPC library can't
2278cope with our redefinition of @code{malloc} to call @code{mmalloc}.
2279When defining @code{USE_MMALLOC}, you will also have to set
2280@code{MMALLOC} in the Makefile, to point to the @code{mmalloc} library. This
2281define is set when you configure with @samp{--with-mmalloc}.
c906108c
SS
2282
2283@item NO_MMCHECK
56caf160 2284@findex mmcheck
c906108c
SS
2285Define this if you are using @code{mmalloc}, but don't want the overhead
2286of checking the heap with @code{mmcheck}. Note that on some systems,
56caf160 2287the C runtime makes calls to @code{malloc} prior to calling @code{main}, and if
c906108c
SS
2288@code{free} is ever called with these pointers after calling
2289@code{mmcheck} to enable checking, a memory corruption abort is certain
56caf160
EZ
2290to occur. These systems can still use @code{mmalloc}, but must define
2291@code{NO_MMCHECK}.
c906108c
SS
2292
2293@item MMCHECK_FORCE
2294Define this to 1 if the C runtime allocates memory prior to
2295@code{mmcheck} being called, but that memory is never freed so we don't
2296have to worry about it triggering a memory corruption abort. The
2297default is 0, which means that @code{mmcheck} will only install the heap
2298checking functions if there has not yet been any memory allocation
56caf160 2299calls, and if it fails to install the functions, @value{GDBN} will issue a
c906108c 2300warning. This is currently defined if you configure using
56caf160 2301@samp{--with-mmalloc}.
c906108c
SS
2302
2303@item NO_SIGINTERRUPT
56caf160
EZ
2304@findex siginterrupt
2305Define this to indicate that @code{siginterrupt} is not available.
c906108c
SS
2306
2307@item R_OK
56caf160 2308Define if this is not in a system header file (typically, @file{unistd.h}).
c906108c
SS
2309
2310@item SEEK_CUR
9742079a 2311@itemx SEEK_SET
56caf160 2312Define these to appropriate value for the system @code{lseek}, if not already
c906108c
SS
2313defined.
2314
2315@item STOP_SIGNAL
56caf160
EZ
2316This is the signal for stopping @value{GDBN}. Defaults to
2317@code{SIGTSTP}. (Only redefined for the Convex.)
c906108c
SS
2318
2319@item USE_O_NOCTTY
56caf160 2320Define this if the interior's tty should be opened with the @code{O_NOCTTY}
c906108c
SS
2321flag. (FIXME: This should be a native-only flag, but @file{inflow.c} is
2322always linked in.)
2323
2324@item USG
2325Means that System V (prior to SVR4) include files are in use. (FIXME:
2326This symbol is abused in @file{infrun.c}, @file{regex.c},
2327@file{remote-nindy.c}, and @file{utils.c} for other things, at the
2328moment.)
2329
2330@item lint
56caf160 2331Define this to help placate @code{lint} in some situations.
c906108c
SS
2332
2333@item volatile
2334Define this to override the defaults of @code{__volatile__} or
2335@code{/**/}.
56caf160 2336@end ftable
c906108c
SS
2337
2338
2339@node Target Architecture Definition
2340
2341@chapter Target Architecture Definition
2342
56caf160
EZ
2343@cindex target architecture definition
2344@value{GDBN}'s target architecture defines what sort of
2345machine-language programs @value{GDBN} can work with, and how it works
2346with them.
c906108c 2347
af6c57ea
AC
2348The target architecture object is implemented as the C structure
2349@code{struct gdbarch *}. The structure, and its methods, are generated
2350using the Bourn shell script @file{gdbarch.sh}.
c906108c
SS
2351
2352@section Registers and Memory
2353
56caf160
EZ
2354@value{GDBN}'s model of the target machine is rather simple.
2355@value{GDBN} assumes the machine includes a bank of registers and a
2356block of memory. Each register may have a different size.
c906108c 2357
56caf160
EZ
2358@value{GDBN} does not have a magical way to match up with the
2359compiler's idea of which registers are which; however, it is critical
2360that they do match up accurately. The only way to make this work is
2361to get accurate information about the order that the compiler uses,
2362and to reflect that in the @code{REGISTER_NAME} and related macros.
c906108c 2363
25822942 2364@value{GDBN} can handle big-endian, little-endian, and bi-endian architectures.
c906108c 2365
93e79dbd
JB
2366@section Pointers Are Not Always Addresses
2367@cindex pointer representation
2368@cindex address representation
2369@cindex word-addressed machines
2370@cindex separate data and code address spaces
2371@cindex spaces, separate data and code address
2372@cindex address spaces, separate data and code
2373@cindex code pointers, word-addressed
2374@cindex converting between pointers and addresses
2375@cindex D10V addresses
2376
2377On almost all 32-bit architectures, the representation of a pointer is
2378indistinguishable from the representation of some fixed-length number
2379whose value is the byte address of the object pointed to. On such
56caf160 2380machines, the words ``pointer'' and ``address'' can be used interchangeably.
93e79dbd
JB
2381However, architectures with smaller word sizes are often cramped for
2382address space, so they may choose a pointer representation that breaks this
2383identity, and allows a larger code address space.
2384
2385For example, the Mitsubishi D10V is a 16-bit VLIW processor whose
2386instructions are 32 bits long@footnote{Some D10V instructions are
2387actually pairs of 16-bit sub-instructions. However, since you can't
2388jump into the middle of such a pair, code addresses can only refer to
2389full 32 bit instructions, which is what matters in this explanation.}.
2390If the D10V used ordinary byte addresses to refer to code locations,
2391then the processor would only be able to address 64kb of instructions.
2392However, since instructions must be aligned on four-byte boundaries, the
56caf160
EZ
2393low two bits of any valid instruction's byte address are always
2394zero---byte addresses waste two bits. So instead of byte addresses,
2395the D10V uses word addresses---byte addresses shifted right two bits---to
93e79dbd
JB
2396refer to code. Thus, the D10V can use 16-bit words to address 256kb of
2397code space.
2398
2399However, this means that code pointers and data pointers have different
2400forms on the D10V. The 16-bit word @code{0xC020} refers to byte address
2401@code{0xC020} when used as a data address, but refers to byte address
2402@code{0x30080} when used as a code address.
2403
2404(The D10V also uses separate code and data address spaces, which also
2405affects the correspondence between pointers and addresses, but we're
2406going to ignore that here; this example is already too long.)
2407
56caf160
EZ
2408To cope with architectures like this---the D10V is not the only
2409one!---@value{GDBN} tries to distinguish between @dfn{addresses}, which are
93e79dbd
JB
2410byte numbers, and @dfn{pointers}, which are the target's representation
2411of an address of a particular type of data. In the example above,
2412@code{0xC020} is the pointer, which refers to one of the addresses
2413@code{0xC020} or @code{0x30080}, depending on the type imposed upon it.
2414@value{GDBN} provides functions for turning a pointer into an address
2415and vice versa, in the appropriate way for the current architecture.
2416
2417Unfortunately, since addresses and pointers are identical on almost all
2418processors, this distinction tends to bit-rot pretty quickly. Thus,
2419each time you port @value{GDBN} to an architecture which does
2420distinguish between pointers and addresses, you'll probably need to
2421clean up some architecture-independent code.
2422
2423Here are functions which convert between pointers and addresses:
2424
2425@deftypefun CORE_ADDR extract_typed_address (void *@var{buf}, struct type *@var{type})
2426Treat the bytes at @var{buf} as a pointer or reference of type
2427@var{type}, and return the address it represents, in a manner
2428appropriate for the current architecture. This yields an address
2429@value{GDBN} can use to read target memory, disassemble, etc. Note that
2430@var{buf} refers to a buffer in @value{GDBN}'s memory, not the
2431inferior's.
2432
2433For example, if the current architecture is the Intel x86, this function
2434extracts a little-endian integer of the appropriate length from
2435@var{buf} and returns it. However, if the current architecture is the
2436D10V, this function will return a 16-bit integer extracted from
2437@var{buf}, multiplied by four if @var{type} is a pointer to a function.
2438
2439If @var{type} is not a pointer or reference type, then this function
2440will signal an internal error.
2441@end deftypefun
2442
2443@deftypefun CORE_ADDR store_typed_address (void *@var{buf}, struct type *@var{type}, CORE_ADDR @var{addr})
2444Store the address @var{addr} in @var{buf}, in the proper format for a
2445pointer of type @var{type} in the current architecture. Note that
2446@var{buf} refers to a buffer in @value{GDBN}'s memory, not the
2447inferior's.
2448
2449For example, if the current architecture is the Intel x86, this function
2450stores @var{addr} unmodified as a little-endian integer of the
2451appropriate length in @var{buf}. However, if the current architecture
2452is the D10V, this function divides @var{addr} by four if @var{type} is
2453a pointer to a function, and then stores it in @var{buf}.
2454
2455If @var{type} is not a pointer or reference type, then this function
2456will signal an internal error.
2457@end deftypefun
2458
2459@deftypefun CORE_ADDR value_as_pointer (value_ptr @var{val})
2460Assuming that @var{val} is a pointer, return the address it represents,
2461as appropriate for the current architecture.
2462
2463This function actually works on integral values, as well as pointers.
2464For pointers, it performs architecture-specific conversions as
2465described above for @code{extract_typed_address}.
2466@end deftypefun
2467
2468@deftypefun CORE_ADDR value_from_pointer (struct type *@var{type}, CORE_ADDR @var{addr})
2469Create and return a value representing a pointer of type @var{type} to
2470the address @var{addr}, as appropriate for the current architecture.
2471This function performs architecture-specific conversions as described
2472above for @code{store_typed_address}.
2473@end deftypefun
2474
2475
2476@value{GDBN} also provides functions that do the same tasks, but assume
2477that pointers are simply byte addresses; they aren't sensitive to the
2478current architecture, beyond knowing the appropriate endianness.
2479
2480@deftypefun CORE_ADDR extract_address (void *@var{addr}, int len)
2481Extract a @var{len}-byte number from @var{addr} in the appropriate
2482endianness for the current architecture, and return it. Note that
2483@var{addr} refers to @value{GDBN}'s memory, not the inferior's.
2484
2485This function should only be used in architecture-specific code; it
2486doesn't have enough information to turn bits into a true address in the
2487appropriate way for the current architecture. If you can, use
2488@code{extract_typed_address} instead.
2489@end deftypefun
2490
2491@deftypefun void store_address (void *@var{addr}, int @var{len}, LONGEST @var{val})
2492Store @var{val} at @var{addr} as a @var{len}-byte integer, in the
2493appropriate endianness for the current architecture. Note that
2494@var{addr} refers to a buffer in @value{GDBN}'s memory, not the
2495inferior's.
2496
2497This function should only be used in architecture-specific code; it
2498doesn't have enough information to turn a true address into bits in the
2499appropriate way for the current architecture. If you can, use
2500@code{store_typed_address} instead.
2501@end deftypefun
2502
2503
2504Here are some macros which architectures can define to indicate the
2505relationship between pointers and addresses. These have default
2506definitions, appropriate for architectures on which all pointers are
2507simple byte addresses.
2508
2509@deftypefn {Target Macro} CORE_ADDR POINTER_TO_ADDRESS (struct type *@var{type}, char *@var{buf})
2510Assume that @var{buf} holds a pointer of type @var{type}, in the
2511appropriate format for the current architecture. Return the byte
2512address the pointer refers to.
2513
2514This function may safely assume that @var{type} is either a pointer or a
56caf160 2515C@t{++} reference type.
93e79dbd
JB
2516@end deftypefn
2517
2518@deftypefn {Target Macro} void ADDRESS_TO_POINTER (struct type *@var{type}, char *@var{buf}, CORE_ADDR @var{addr})
2519Store in @var{buf} a pointer of type @var{type} representing the address
2520@var{addr}, in the appropriate format for the current architecture.
2521
2522This function may safely assume that @var{type} is either a pointer or a
56caf160 2523C@t{++} reference type.
93e79dbd
JB
2524@end deftypefn
2525
2526
9fb4dd36
JB
2527@section Using Different Register and Memory Data Representations
2528@cindex raw representation
2529@cindex virtual representation
2530@cindex representations, raw and virtual
2531@cindex register data formats, converting
2532@cindex @code{struct value}, converting register contents to
2533
af6c57ea
AC
2534@emph{Maintainer's note: The way GDB manipulates registers is undergoing
2535significant change. Many of the macros and functions refered to in the
2536sections below are likely to be made obsolete. See the file @file{TODO}
2537for more up-to-date information.}
2538
9fb4dd36
JB
2539Some architectures use one representation for a value when it lives in a
2540register, but use a different representation when it lives in memory.
25822942 2541In @value{GDBN}'s terminology, the @dfn{raw} representation is the one used in
9fb4dd36 2542the target registers, and the @dfn{virtual} representation is the one
25822942 2543used in memory, and within @value{GDBN} @code{struct value} objects.
9fb4dd36
JB
2544
2545For almost all data types on almost all architectures, the virtual and
2546raw representations are identical, and no special handling is needed.
2547However, they do occasionally differ. For example:
2548
2549@itemize @bullet
9fb4dd36 2550@item
56caf160 2551The x86 architecture supports an 80-bit @code{long double} type. However, when
9fb4dd36
JB
2552we store those values in memory, they occupy twelve bytes: the
2553floating-point number occupies the first ten, and the final two bytes
2554are unused. This keeps the values aligned on four-byte boundaries,
2555allowing more efficient access. Thus, the x86 80-bit floating-point
2556type is the raw representation, and the twelve-byte loosely-packed
2557arrangement is the virtual representation.
2558
2559@item
25822942
DB
2560Some 64-bit MIPS targets present 32-bit registers to @value{GDBN} as 64-bit
2561registers, with garbage in their upper bits. @value{GDBN} ignores the top 32
9fb4dd36
JB
2562bits. Thus, the 64-bit form, with garbage in the upper 32 bits, is the
2563raw representation, and the trimmed 32-bit representation is the
2564virtual representation.
9fb4dd36
JB
2565@end itemize
2566
2567In general, the raw representation is determined by the architecture, or
25822942
DB
2568@value{GDBN}'s interface to the architecture, while the virtual representation
2569can be chosen for @value{GDBN}'s convenience. @value{GDBN}'s register file,
56caf160
EZ
2570@code{registers}, holds the register contents in raw format, and the
2571@value{GDBN} remote protocol transmits register values in raw format.
9fb4dd36 2572
56caf160
EZ
2573Your architecture may define the following macros to request
2574conversions between the raw and virtual format:
9fb4dd36
JB
2575
2576@deftypefn {Target Macro} int REGISTER_CONVERTIBLE (int @var{reg})
2577Return non-zero if register number @var{reg}'s value needs different raw
2578and virtual formats.
6f6ef15a
EZ
2579
2580You should not use @code{REGISTER_CONVERT_TO_VIRTUAL} for a register
2581unless this macro returns a non-zero value for that register.
9fb4dd36
JB
2582@end deftypefn
2583
2584@deftypefn {Target Macro} int REGISTER_RAW_SIZE (int @var{reg})
2585The size of register number @var{reg}'s raw value. This is the number
25822942 2586of bytes the register will occupy in @code{registers}, or in a @value{GDBN}
9fb4dd36
JB
2587remote protocol packet.
2588@end deftypefn
2589
2590@deftypefn {Target Macro} int REGISTER_VIRTUAL_SIZE (int @var{reg})
2591The size of register number @var{reg}'s value, in its virtual format.
2592This is the size a @code{struct value}'s buffer will have, holding that
2593register's value.
2594@end deftypefn
2595
2596@deftypefn {Target Macro} struct type *REGISTER_VIRTUAL_TYPE (int @var{reg})
2597This is the type of the virtual representation of register number
2598@var{reg}. Note that there is no need for a macro giving a type for the
25822942 2599register's raw form; once the register's value has been obtained, @value{GDBN}
9fb4dd36
JB
2600always uses the virtual form.
2601@end deftypefn
2602
2603@deftypefn {Target Macro} void REGISTER_CONVERT_TO_VIRTUAL (int @var{reg}, struct type *@var{type}, char *@var{from}, char *@var{to})
2604Convert the value of register number @var{reg} to @var{type}, which
2605should always be @code{REGISTER_VIRTUAL_TYPE (@var{reg})}. The buffer
2606at @var{from} holds the register's value in raw format; the macro should
2607convert the value to virtual format, and place it at @var{to}.
2608
6f6ef15a
EZ
2609Note that @code{REGISTER_CONVERT_TO_VIRTUAL} and
2610@code{REGISTER_CONVERT_TO_RAW} take their @var{reg} and @var{type}
2611arguments in different orders.
2612
2613You should only use @code{REGISTER_CONVERT_TO_VIRTUAL} with registers
2614for which the @code{REGISTER_CONVERTIBLE} macro returns a non-zero
2615value.
9fb4dd36
JB
2616@end deftypefn
2617
2618@deftypefn {Target Macro} void REGISTER_CONVERT_TO_RAW (struct type *@var{type}, int @var{reg}, char *@var{from}, char *@var{to})
2619Convert the value of register number @var{reg} to @var{type}, which
2620should always be @code{REGISTER_VIRTUAL_TYPE (@var{reg})}. The buffer
2621at @var{from} holds the register's value in raw format; the macro should
2622convert the value to virtual format, and place it at @var{to}.
2623
2624Note that REGISTER_CONVERT_TO_VIRTUAL and REGISTER_CONVERT_TO_RAW take
2625their @var{reg} and @var{type} arguments in different orders.
2626@end deftypefn
2627
2628
c906108c
SS
2629@section Frame Interpretation
2630
2631@section Inferior Call Setup
2632
2633@section Compiler Characteristics
2634
2635@section Target Conditionals
2636
2637This section describes the macros that you can use to define the target
2638machine.
2639
2640@table @code
2641
2642@item ADDITIONAL_OPTIONS
56caf160
EZ
2643@itemx ADDITIONAL_OPTION_CASES
2644@itemx ADDITIONAL_OPTION_HANDLER
2645@itemx ADDITIONAL_OPTION_HELP
2646@findex ADDITIONAL_OPTION_HELP
2647@findex ADDITIONAL_OPTION_HANDLER
2648@findex ADDITIONAL_OPTION_CASES
2649@findex ADDITIONAL_OPTIONS
c906108c 2650These are a set of macros that allow the addition of additional command
25822942 2651line options to @value{GDBN}. They are currently used only for the unsupported
c906108c
SS
2652i960 Nindy target, and should not be used in any other configuration.
2653
2654@item ADDR_BITS_REMOVE (addr)
56caf160 2655@findex ADDR_BITS_REMOVE
adf40b2e
JM
2656If a raw machine instruction address includes any bits that are not
2657really part of the address, then define this macro to expand into an
56caf160 2658expression that zeroes those bits in @var{addr}. This is only used for
adf40b2e
JM
2659addresses of instructions, and even then not in all contexts.
2660
2661For example, the two low-order bits of the PC on the Hewlett-Packard PA
26622.0 architecture contain the privilege level of the corresponding
2663instruction. Since instructions must always be aligned on four-byte
2664boundaries, the processor masks out these bits to generate the actual
2665address of the instruction. ADDR_BITS_REMOVE should filter out these
2666bits with an expression such as @code{((addr) & ~3)}.
c906108c 2667
93e79dbd 2668@item ADDRESS_TO_POINTER (@var{type}, @var{buf}, @var{addr})
56caf160 2669@findex ADDRESS_TO_POINTER
93e79dbd
JB
2670Store in @var{buf} a pointer of type @var{type} representing the address
2671@var{addr}, in the appropriate format for the current architecture.
2672This macro may safely assume that @var{type} is either a pointer or a
56caf160 2673C@t{++} reference type.
93e79dbd
JB
2674@xref{Target Architecture Definition, , Pointers Are Not Always Addresses}.
2675
c906108c 2676@item BEFORE_MAIN_LOOP_HOOK
56caf160 2677@findex BEFORE_MAIN_LOOP_HOOK
c906108c
SS
2678Define this to expand into any code that you want to execute before the
2679main loop starts. Although this is not, strictly speaking, a target
2680conditional, that is how it is currently being used. Note that if a
2681configuration were to define it one way for a host and a different way
56caf160
EZ
2682for the target, @value{GDBN} will probably not compile, let alone run
2683correctly. This macro is currently used only for the unsupported i960 Nindy
2684target, and should not be used in any other configuration.
c906108c
SS
2685
2686@item BELIEVE_PCC_PROMOTION
56caf160
EZ
2687@findex BELIEVE_PCC_PROMOTION
2688Define if the compiler promotes a @code{short} or @code{char}
2689parameter to an @code{int}, but still reports the parameter as its
2690original type, rather than the promoted type.
c906108c
SS
2691
2692@item BELIEVE_PCC_PROMOTION_TYPE
56caf160
EZ
2693@findex BELIEVE_PCC_PROMOTION_TYPE
2694Define this if @value{GDBN} should believe the type of a @code{short}
2695argument when compiled by @code{pcc}, but look within a full int space to get
2696its value. Only defined for Sun-3 at present.
c906108c
SS
2697
2698@item BITS_BIG_ENDIAN
56caf160
EZ
2699@findex BITS_BIG_ENDIAN
2700Define this if the numbering of bits in the targets does @strong{not} match the
c906108c 2701endianness of the target byte order. A value of 1 means that the bits
56caf160 2702are numbered in a big-endian bit order, 0 means little-endian.
c906108c
SS
2703
2704@item BREAKPOINT
56caf160 2705@findex BREAKPOINT
c906108c
SS
2706This is the character array initializer for the bit pattern to put into
2707memory where a breakpoint is set. Although it's common to use a trap
2708instruction for a breakpoint, it's not required; for instance, the bit
2709pattern could be an invalid instruction. The breakpoint must be no
2710longer than the shortest instruction of the architecture.
2711
56caf160
EZ
2712@code{BREAKPOINT} has been deprecated in favor of
2713@code{BREAKPOINT_FROM_PC}.
7a292a7a 2714
c906108c 2715@item BIG_BREAKPOINT
56caf160
EZ
2716@itemx LITTLE_BREAKPOINT
2717@findex LITTLE_BREAKPOINT
2718@findex BIG_BREAKPOINT
c906108c
SS
2719Similar to BREAKPOINT, but used for bi-endian targets.
2720
56caf160
EZ
2721@code{BIG_BREAKPOINT} and @code{LITTLE_BREAKPOINT} have been deprecated in
2722favor of @code{BREAKPOINT_FROM_PC}.
7a292a7a 2723
c906108c 2724@item REMOTE_BREAKPOINT
56caf160
EZ
2725@itemx LITTLE_REMOTE_BREAKPOINT
2726@itemx BIG_REMOTE_BREAKPOINT
2727@findex BIG_REMOTE_BREAKPOINT
2728@findex LITTLE_REMOTE_BREAKPOINT
2729@findex REMOTE_BREAKPOINT
c906108c
SS
2730Similar to BREAKPOINT, but used for remote targets.
2731
56caf160
EZ
2732@code{BIG_REMOTE_BREAKPOINT} and @code{LITTLE_REMOTE_BREAKPOINT} have been
2733deprecated in favor of @code{BREAKPOINT_FROM_PC}.
c906108c 2734
56caf160
EZ
2735@item BREAKPOINT_FROM_PC (@var{pcptr}, @var{lenptr})
2736@findex BREAKPOINT_FROM_PC
c906108c 2737Use the program counter to determine the contents and size of a
56caf160
EZ
2738breakpoint instruction. It returns a pointer to a string of bytes
2739that encode a breakpoint instruction, stores the length of the string
2740to *@var{lenptr}, and adjusts pc (if necessary) to point to the actual
2741memory location where the breakpoint should be inserted.
c906108c
SS
2742
2743Although it is common to use a trap instruction for a breakpoint, it's
2744not required; for instance, the bit pattern could be an invalid
2745instruction. The breakpoint must be no longer than the shortest
2746instruction of the architecture.
2747
7a292a7a
SS
2748Replaces all the other @var{BREAKPOINT} macros.
2749
56caf160
EZ
2750@item MEMORY_INSERT_BREAKPOINT (@var{addr}, @var{contents_cache})
2751@itemx MEMORY_REMOVE_BREAKPOINT (@var{addr}, @var{contents_cache})
2752@findex MEMORY_REMOVE_BREAKPOINT
2753@findex MEMORY_INSERT_BREAKPOINT
917317f4
JM
2754Insert or remove memory based breakpoints. Reasonable defaults
2755(@code{default_memory_insert_breakpoint} and
2756@code{default_memory_remove_breakpoint} respectively) have been
2757provided so that it is not necessary to define these for most
2758architectures. Architectures which may want to define
56caf160 2759@code{MEMORY_INSERT_BREAKPOINT} and @code{MEMORY_REMOVE_BREAKPOINT} will
917317f4
JM
2760likely have instructions that are oddly sized or are not stored in a
2761conventional manner.
2762
2763It may also be desirable (from an efficiency standpoint) to define
2764custom breakpoint insertion and removal routines if
56caf160 2765@code{BREAKPOINT_FROM_PC} needs to read the target's memory for some
917317f4
JM
2766reason.
2767
7a292a7a 2768@item CALL_DUMMY_P
56caf160 2769@findex CALL_DUMMY_P
7a292a7a
SS
2770A C expresson that is non-zero when the target suports inferior function
2771calls.
2772
2773@item CALL_DUMMY_WORDS
56caf160
EZ
2774@findex CALL_DUMMY_WORDS
2775Pointer to an array of @code{LONGEST} words of data containing
2776host-byte-ordered @code{REGISTER_BYTES} sized values that partially
7a292a7a
SS
2777specify the sequence of instructions needed for an inferior function
2778call.
2779
56caf160 2780Should be deprecated in favor of a macro that uses target-byte-ordered
7a292a7a
SS
2781data.
2782
2783@item SIZEOF_CALL_DUMMY_WORDS
56caf160
EZ
2784@findex SIZEOF_CALL_DUMMY_WORDS
2785The size of @code{CALL_DUMMY_WORDS}. When @code{CALL_DUMMY_P} this must
2786return a positive value. See also @code{CALL_DUMMY_LENGTH}.
c906108c
SS
2787
2788@item CALL_DUMMY
56caf160
EZ
2789@findex CALL_DUMMY
2790A static initializer for @code{CALL_DUMMY_WORDS}. Deprecated.
7a292a7a 2791
c906108c 2792@item CALL_DUMMY_LOCATION
56caf160
EZ
2793@findex CALL_DUMMY_LOCATION
2794See the file @file{inferior.h}.
7a292a7a 2795
c906108c 2796@item CALL_DUMMY_STACK_ADJUST
56caf160 2797@findex CALL_DUMMY_STACK_ADJUST
7a292a7a
SS
2798Stack adjustment needed when performing an inferior function call.
2799
56caf160 2800Should be deprecated in favor of something like @code{STACK_ALIGN}.
7a292a7a
SS
2801
2802@item CALL_DUMMY_STACK_ADJUST_P
56caf160
EZ
2803@findex CALL_DUMMY_STACK_ADJUST_P
2804Predicate for use of @code{CALL_DUMMY_STACK_ADJUST}.
7a292a7a 2805
56caf160 2806Should be deprecated in favor of something like @code{STACK_ALIGN}.
c906108c 2807
56caf160
EZ
2808@item CANNOT_FETCH_REGISTER (@var{regno})
2809@findex CANNOT_FETCH_REGISTER
c906108c
SS
2810A C expression that should be nonzero if @var{regno} cannot be fetched
2811from an inferior process. This is only relevant if
2812@code{FETCH_INFERIOR_REGISTERS} is not defined.
2813
56caf160
EZ
2814@item CANNOT_STORE_REGISTER (@var{regno})
2815@findex CANNOT_STORE_REGISTER
c906108c
SS
2816A C expression that should be nonzero if @var{regno} should not be
2817written to the target. This is often the case for program counters,
56caf160
EZ
2818status words, and other special registers. If this is not defined,
2819@value{GDBN} will assume that all registers may be written.
c906108c
SS
2820
2821@item DO_DEFERRED_STORES
a5d7c491 2822@itemx CLEAR_DEFERRED_STORES
56caf160
EZ
2823@findex CLEAR_DEFERRED_STORES
2824@findex DO_DEFERRED_STORES
c906108c
SS
2825Define this to execute any deferred stores of registers into the inferior,
2826and to cancel any deferred stores.
2827
2828Currently only implemented correctly for native Sparc configurations?
2829
ef36d45e 2830@item COERCE_FLOAT_TO_DOUBLE (@var{formal}, @var{actual})
56caf160
EZ
2831@findex COERCE_FLOAT_TO_DOUBLE
2832@cindex promotion to @code{double}
ef36d45e
JB
2833If we are calling a function by hand, and the function was declared
2834(according to the debug info) without a prototype, should we
56caf160
EZ
2835automatically promote @code{float}s to @code{double}s? This macro
2836must evaluate to non-zero if we should, or zero if we should leave the
2837value alone.
ef36d45e
JB
2838
2839The argument @var{actual} is the type of the value we want to pass to
2840the function. The argument @var{formal} is the type of this argument,
2841as it appears in the function's definition. Note that @var{formal} may
2842be zero if we have no debugging information for the function, or if
2843we're passing more arguments than are officially declared (for example,
2844varargs). This macro is never invoked if the function definitely has a
2845prototype.
2846
56caf160
EZ
2847@findex set_gdbarch_coerce_float_to_double
2848@findex standard_coerce_float_to_double
ef36d45e
JB
2849The default behavior is to promote only when we have no type information
2850for the formal parameter. This is different from the obvious behavior,
2851which would be to promote whenever we have no prototype, just as the
2852compiler does. It's annoying, but some older targets rely on this. If
56caf160
EZ
2853you want @value{GDBN} to follow the typical compiler behavior---to always
2854promote when there is no prototype in scope---your gdbarch @code{init}
ef36d45e
JB
2855function can call @code{set_gdbarch_coerce_float_to_double} and select
2856the @code{standard_coerce_float_to_double} function.
2857
c906108c 2858@item CPLUS_MARKER
56caf160
EZ
2859@findex CPLUS_MARKERz
2860Define this to expand into the character that G@t{++} uses to distinguish
c906108c
SS
2861compiler-generated identifiers from programmer-specified identifiers.
2862By default, this expands into @code{'$'}. Most System V targets should
2863define this to @code{'.'}.
2864
2865@item DBX_PARM_SYMBOL_CLASS
56caf160 2866@findex DBX_PARM_SYMBOL_CLASS
c906108c
SS
2867Hook for the @code{SYMBOL_CLASS} of a parameter when decoding DBX symbol
2868information. In the i960, parameters can be stored as locals or as
2869args, depending on the type of the debug record.
2870
2871@item DECR_PC_AFTER_BREAK
56caf160 2872@findex DECR_PC_AFTER_BREAK
c906108c
SS
2873Define this to be the amount by which to decrement the PC after the
2874program encounters a breakpoint. This is often the number of bytes in
56caf160 2875@code{BREAKPOINT}, though not always. For most targets this value will be 0.
c906108c
SS
2876
2877@item DECR_PC_AFTER_HW_BREAK
56caf160 2878@findex DECR_PC_AFTER_HW_BREAK
c906108c
SS
2879Similarly, for hardware breakpoints.
2880
56caf160
EZ
2881@item DISABLE_UNSETTABLE_BREAK (@var{addr})
2882@findex DISABLE_UNSETTABLE_BREAK
c906108c
SS
2883If defined, this should evaluate to 1 if @var{addr} is in a shared
2884library in which breakpoints cannot be set and so should be disabled.
2885
2886@item DO_REGISTERS_INFO
56caf160 2887@findex DO_REGISTERS_INFO
c906108c
SS
2888If defined, use this to print the value of a register or all registers.
2889
0dcedd82 2890@item DWARF_REG_TO_REGNUM
56caf160 2891@findex DWARF_REG_TO_REGNUM
0dcedd82
AC
2892Convert DWARF register number into @value{GDBN} regnum. If not defined,
2893no conversion will be performed.
2894
2895@item DWARF2_REG_TO_REGNUM
56caf160 2896@findex DWARF2_REG_TO_REGNUM
0dcedd82
AC
2897Convert DWARF2 register number into @value{GDBN} regnum. If not
2898defined, no conversion will be performed.
2899
2900@item ECOFF_REG_TO_REGNUM
56caf160 2901@findex ECOFF_REG_TO_REGNUM
0dcedd82
AC
2902Convert ECOFF register number into @value{GDBN} regnum. If not defined,
2903no conversion will be performed.
2904
c906108c 2905@item END_OF_TEXT_DEFAULT
56caf160
EZ
2906@findex END_OF_TEXT_DEFAULT
2907This is an expression that should designate the end of the text section.
2908@c (? FIXME ?)
c906108c 2909
56caf160
EZ
2910@item EXTRACT_RETURN_VALUE(@var{type}, @var{regbuf}, @var{valbuf})
2911@findex EXTRACT_RETURN_VALUE
c906108c
SS
2912Define this to extract a function's return value of type @var{type} from
2913the raw register state @var{regbuf} and copy that, in virtual format,
2914into @var{valbuf}.
2915
56caf160
EZ
2916@item EXTRACT_STRUCT_VALUE_ADDRESS(@var{regbuf})
2917@findex EXTRACT_STRUCT_VALUE_ADDRESS
83aa8bc6
AC
2918When defined, extract from the array @var{regbuf} (containing the raw
2919register state) the @code{CORE_ADDR} at which a function should return
2920its structure value.
ac9a91a7 2921
83aa8bc6
AC
2922If not defined, @code{EXTRACT_RETURN_VALUE} is used.
2923
2924@item EXTRACT_STRUCT_VALUE_ADDRESS_P()
56caf160
EZ
2925@findex EXTRACT_STRUCT_VALUE_ADDRESS_P
2926Predicate for @code{EXTRACT_STRUCT_VALUE_ADDRESS}.
c906108c
SS
2927
2928@item FLOAT_INFO
56caf160
EZ
2929@findex FLOAT_INFO
2930If defined, then the @samp{info float} command will print information about
c906108c
SS
2931the processor's floating point unit.
2932
2933@item FP_REGNUM
56caf160 2934@findex FP_REGNUM
cce74817
JM
2935If the virtual frame pointer is kept in a register, then define this
2936macro to be the number (greater than or equal to zero) of that register.
2937
2938This should only need to be defined if @code{TARGET_READ_FP} and
2939@code{TARGET_WRITE_FP} are not defined.
c906108c 2940
56caf160
EZ
2941@item FRAMELESS_FUNCTION_INVOCATION(@var{fi})
2942@findex FRAMELESS_FUNCTION_INVOCATION
392a587b
JM
2943Define this to an expression that returns 1 if the function invocation
2944represented by @var{fi} does not have a stack frame associated with it.
2945Otherwise return 0.
c906108c 2946
a5d7c491 2947@item FRAME_ARGS_ADDRESS_CORRECT
56caf160
EZ
2948@findex FRAME_ARGS_ADDRESS_CORRECT
2949See @file{stack.c}.
c906108c 2950
56caf160
EZ
2951@item FRAME_CHAIN(@var{frame})
2952@findex FRAME_CHAIN
c906108c
SS
2953Given @var{frame}, return a pointer to the calling frame.
2954
56caf160
EZ
2955@item FRAME_CHAIN_COMBINE(@var{chain}, @var{frame})
2956@findex FRAME_CHAIN_COMBINE
c906108c
SS
2957Define this to take the frame chain pointer and the frame's nominal
2958address and produce the nominal address of the caller's frame.
2959Presently only defined for HP PA.
2960
56caf160
EZ
2961@item FRAME_CHAIN_VALID(@var{chain}, @var{thisframe})
2962@findex FRAME_CHAIN_VALID
c906108c 2963Define this to be an expression that returns zero if the given frame is
c4093a6a 2964an outermost frame, with no caller, and nonzero otherwise. Several
56caf160 2965common definitions are available:
c4093a6a 2966
56caf160
EZ
2967@itemize @bullet
2968@item
c4093a6a
JM
2969@code{file_frame_chain_valid} is nonzero if the chain pointer is nonzero
2970and given frame's PC is not inside the startup file (such as
56caf160
EZ
2971@file{crt0.o}).
2972
2973@item
2974@code{func_frame_chain_valid} is nonzero if the chain
2975pointer is nonzero and the given frame's PC is not in @code{main} or a
2976known entry point function (such as @code{_start}).
2977
2978@item
c4093a6a
JM
2979@code{generic_file_frame_chain_valid} and
2980@code{generic_func_frame_chain_valid} are equivalent implementations for
2981targets using generic dummy frames.
56caf160 2982@end itemize
c906108c 2983
56caf160
EZ
2984@item FRAME_INIT_SAVED_REGS(@var{frame})
2985@findex FRAME_INIT_SAVED_REGS
c906108c
SS
2986See @file{frame.h}. Determines the address of all registers in the
2987current stack frame storing each in @code{frame->saved_regs}. Space for
2988@code{frame->saved_regs} shall be allocated by
2989@code{FRAME_INIT_SAVED_REGS} using either
2990@code{frame_saved_regs_zalloc} or @code{frame_obstack_alloc}.
2991
56caf160 2992@code{FRAME_FIND_SAVED_REGS} and @code{EXTRA_FRAME_INFO} are deprecated.
c906108c 2993
56caf160
EZ
2994@item FRAME_NUM_ARGS (@var{fi})
2995@findex FRAME_NUM_ARGS
392a587b
JM
2996For the frame described by @var{fi} return the number of arguments that
2997are being passed. If the number of arguments is not known, return
2998@code{-1}.
c906108c 2999
56caf160
EZ
3000@item FRAME_SAVED_PC(@var{frame})
3001@findex FRAME_SAVED_PC
3002Given @var{frame}, return the pc saved there. This is the return
c906108c
SS
3003address.
3004
3005@item FUNCTION_EPILOGUE_SIZE
56caf160 3006@findex FUNCTION_EPILOGUE_SIZE
c906108c
SS
3007For some COFF targets, the @code{x_sym.x_misc.x_fsize} field of the
3008function end symbol is 0. For such targets, you must define
3009@code{FUNCTION_EPILOGUE_SIZE} to expand into the standard size of a
3010function's epilogue.
3011
f7cb2b90 3012@item FUNCTION_START_OFFSET
56caf160 3013@findex FUNCTION_START_OFFSET
f7cb2b90
JB
3014An integer, giving the offset in bytes from a function's address (as
3015used in the values of symbols, function pointers, etc.), and the
3016function's first genuine instruction.
3017
3018This is zero on almost all machines: the function's address is usually
3019the address of its first instruction. However, on the VAX, for example,
3020each function starts with two bytes containing a bitmask indicating
3021which registers to save upon entry to the function. The VAX @code{call}
3022instructions check this value, and save the appropriate registers
3023automatically. Thus, since the offset from the function's address to
3024its first instruction is two bytes, @code{FUNCTION_START_OFFSET} would
3025be 2 on the VAX.
3026
c906108c 3027@item GCC_COMPILED_FLAG_SYMBOL
56caf160
EZ
3028@itemx GCC2_COMPILED_FLAG_SYMBOL
3029@findex GCC2_COMPILED_FLAG_SYMBOL
3030@findex GCC_COMPILED_FLAG_SYMBOL
3031If defined, these are the names of the symbols that @value{GDBN} will
3032look for to detect that GCC compiled the file. The default symbols
3033are @code{gcc_compiled.} and @code{gcc2_compiled.},
3034respectively. (Currently only defined for the Delta 68.)
c906108c 3035
25822942 3036@item @value{GDBN}_MULTI_ARCH
56caf160 3037@findex @value{GDBN}_MULTI_ARCH
0f71a2f6 3038If defined and non-zero, enables suport for multiple architectures
25822942 3039within @value{GDBN}.
0f71a2f6 3040
56caf160 3041This support can be enabled at two levels. At level one, only
0f71a2f6
JM
3042definitions for previously undefined macros are provided; at level two,
3043a multi-arch definition of all architecture dependant macros will be
3044defined.
3045
25822942 3046@item @value{GDBN}_TARGET_IS_HPPA
56caf160
EZ
3047@findex @value{GDBN}_TARGET_IS_HPPA
3048This determines whether horrible kludge code in @file{dbxread.c} and
3049@file{partial-stab.h} is used to mangle multiple-symbol-table files from
3050HPPA's. This should all be ripped out, and a scheme like @file{elfread.c}
3051used instead.
c906108c 3052
c906108c 3053@item GET_LONGJMP_TARGET
56caf160 3054@findex GET_LONGJMP_TARGET
c906108c
SS
3055For most machines, this is a target-dependent parameter. On the
3056DECstation and the Iris, this is a native-dependent parameter, since
56caf160 3057trhe header file @file{setjmp.h} is needed to define it.
c906108c 3058
56caf160
EZ
3059This macro determines the target PC address that @code{longjmp} will jump to,
3060assuming that we have just stopped at a @code{longjmp} breakpoint. It takes a
3061@code{CORE_ADDR *} as argument, and stores the target PC value through this
c906108c
SS
3062pointer. It examines the current state of the machine as needed.
3063
3064@item GET_SAVED_REGISTER
56caf160
EZ
3065@findex GET_SAVED_REGISTER
3066@findex get_saved_register
c906108c 3067Define this if you need to supply your own definition for the function
7a292a7a 3068@code{get_saved_register}.
c906108c
SS
3069
3070@item HAVE_REGISTER_WINDOWS
56caf160 3071@findex HAVE_REGISTER_WINDOWS
c906108c 3072Define this if the target has register windows.
56caf160
EZ
3073
3074@item REGISTER_IN_WINDOW_P (@var{regnum})
3075@findex REGISTER_IN_WINDOW_P
c906108c
SS
3076Define this to be an expression that is 1 if the given register is in
3077the window.
3078
3079@item IBM6000_TARGET
56caf160 3080@findex IBM6000_TARGET
c906108c
SS
3081Shows that we are configured for an IBM RS/6000 target. This
3082conditional should be eliminated (FIXME) and replaced by
56caf160 3083feature-specific macros. It was introduced in a haste and we are
c906108c
SS
3084repenting at leisure.
3085
9742079a
EZ
3086@item I386_USE_GENERIC_WATCHPOINTS
3087An x86-based target can define this to use the generic x86 watchpoint
3088support; see @ref{Algorithms, I386_USE_GENERIC_WATCHPOINTS}.
3089
2df3850c 3090@item SYMBOLS_CAN_START_WITH_DOLLAR
56caf160 3091@findex SYMBOLS_CAN_START_WITH_DOLLAR
2df3850c 3092Some systems have routines whose names start with @samp{$}. Giving this
25822942 3093macro a non-zero value tells @value{GDBN}'s expression parser to check for such
2df3850c
JM
3094routines when parsing tokens that begin with @samp{$}.
3095
3096On HP-UX, certain system routines (millicode) have names beginning with
3097@samp{$} or @samp{$$}. For example, @code{$$dyncall} is a millicode
3098routine that handles inter-space procedure calls on PA-RISC.
3099
c906108c 3100@item IEEE_FLOAT
56caf160 3101@findex IEEE_FLOAT
c906108c
SS
3102Define this if the target system uses IEEE-format floating point numbers.
3103
56caf160
EZ
3104@item INIT_EXTRA_FRAME_INFO (@var{fromleaf}, @var{frame})
3105@findex INIT_EXTRA_FRAME_INFO
c906108c
SS
3106If additional information about the frame is required this should be
3107stored in @code{frame->extra_info}. Space for @code{frame->extra_info}
3108is allocated using @code{frame_obstack_alloc}.
3109
56caf160
EZ
3110@item INIT_FRAME_PC (@var{fromleaf}, @var{prev})
3111@findex INIT_FRAME_PC
c906108c
SS
3112This is a C statement that sets the pc of the frame pointed to by
3113@var{prev}. [By default...]
3114
56caf160
EZ
3115@item INNER_THAN (@var{lhs}, @var{rhs})
3116@findex INNER_THAN
c906108c
SS
3117Returns non-zero if stack address @var{lhs} is inner than (nearer to the
3118stack top) stack address @var{rhs}. Define this as @code{lhs < rhs} if
3119the target's stack grows downward in memory, or @code{lhs > rsh} if the
3120stack grows upward.
3121
56caf160
EZ
3122@item IN_SIGTRAMP (@var{pc}, @var{name})
3123@findex IN_SIGTRAMP
3124Define this to return non-zero if the given @var{pc} and/or @var{name}
3125indicates that the current function is a @code{sigtramp}.
c906108c 3126
56caf160
EZ
3127@item SIGTRAMP_START (@var{pc})
3128@findex SIGTRAMP_START
3129@itemx SIGTRAMP_END (@var{pc})
3130@findex SIGTRAMP_END
3131Define these to be the start and end address of the @code{sigtramp} for the
c906108c
SS
3132given @var{pc}. On machines where the address is just a compile time
3133constant, the macro expansion will typically just ignore the supplied
3134@var{pc}.
3135
56caf160
EZ
3136@item IN_SOLIB_CALL_TRAMPOLINE (@var{pc}, @var{name})
3137@findex IN_SOLIB_CALL_TRAMPOLINE
c906108c
SS
3138Define this to evaluate to nonzero if the program is stopped in the
3139trampoline that connects to a shared library.
3140
56caf160
EZ
3141@item IN_SOLIB_RETURN_TRAMPOLINE (@var{pc}, @var{name})
3142@findex IN_SOLIB_RETURN_TRAMPOLINE
c906108c
SS
3143Define this to evaluate to nonzero if the program is stopped in the
3144trampoline that returns from a shared library.
3145
56caf160
EZ
3146@item IN_SOLIB_DYNSYM_RESOLVE_CODE (@var{pc})
3147@findex IN_SOLIB_DYNSYM_RESOLVE_CODE
d4f3574e
SS
3148Define this to evaluate to nonzero if the program is stopped in the
3149dynamic linker.
3150
56caf160
EZ
3151@item SKIP_SOLIB_RESOLVER (@var{pc})
3152@findex SKIP_SOLIB_RESOLVER
d4f3574e
SS
3153Define this to evaluate to the (nonzero) address at which execution
3154should continue to get past the dynamic linker's symbol resolution
3155function. A zero value indicates that it is not important or necessary
3156to set a breakpoint to get through the dynamic linker and that single
3157stepping will suffice.
3158
56caf160
EZ
3159@item IS_TRAPPED_INTERNALVAR (@var{name})
3160@findex IS_TRAPPED_INTERNALVAR
c906108c
SS
3161This is an ugly hook to allow the specification of special actions that
3162should occur as a side-effect of setting the value of a variable
25822942 3163internal to @value{GDBN}. Currently only used by the h8500. Note that this
c906108c
SS
3164could be either a host or target conditional.
3165
3166@item NEED_TEXT_START_END
56caf160 3167@findex NEED_TEXT_START_END
25822942 3168Define this if @value{GDBN} should determine the start and end addresses of the
c906108c
SS
3169text section. (Seems dubious.)
3170
3171@item NO_HIF_SUPPORT
56caf160 3172@findex NO_HIF_SUPPORT
c906108c
SS
3173(Specific to the a29k.)
3174
93e79dbd 3175@item POINTER_TO_ADDRESS (@var{type}, @var{buf})
56caf160 3176@findex POINTER_TO_ADDRESS
93e79dbd
JB
3177Assume that @var{buf} holds a pointer of type @var{type}, in the
3178appropriate format for the current architecture. Return the byte
3179address the pointer refers to.
3180@xref{Target Architecture Definition, , Pointers Are Not Always Addresses}.
3181
9fb4dd36 3182@item REGISTER_CONVERTIBLE (@var{reg})
56caf160 3183@findex REGISTER_CONVERTIBLE
9fb4dd36 3184Return non-zero if @var{reg} uses different raw and virtual formats.
4281a42e 3185@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
3186
3187@item REGISTER_RAW_SIZE (@var{reg})
56caf160 3188@findex REGISTER_RAW_SIZE
9fb4dd36 3189Return the raw size of @var{reg}.
4281a42e 3190@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
3191
3192@item REGISTER_VIRTUAL_SIZE (@var{reg})
56caf160 3193@findex REGISTER_VIRTUAL_SIZE
9fb4dd36 3194Return the virtual size of @var{reg}.
4281a42e 3195@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
3196
3197@item REGISTER_VIRTUAL_TYPE (@var{reg})
56caf160 3198@findex REGISTER_VIRTUAL_TYPE
9fb4dd36 3199Return the virtual type of @var{reg}.
4281a42e 3200@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
3201
3202@item REGISTER_CONVERT_TO_VIRTUAL(@var{reg}, @var{type}, @var{from}, @var{to})
56caf160 3203@findex REGISTER_CONVERT_TO_VIRTUAL
9fb4dd36 3204Convert the value of register @var{reg} from its raw form to its virtual
4281a42e
JB
3205form.
3206@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36
JB
3207
3208@item REGISTER_CONVERT_TO_RAW(@var{type}, @var{reg}, @var{from}, @var{to})
56caf160 3209@findex REGISTER_CONVERT_TO_RAW
9fb4dd36 3210Convert the value of register @var{reg} from its virtual form to its raw
4281a42e
JB
3211form.
3212@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36 3213
e5419804
JB
3214@item RETURN_VALUE_ON_STACK(@var{type})
3215@findex RETURN_VALUE_ON_STACK
3216@cindex returning structures by value
3217@cindex structures, returning by value
3218
3219Return non-zero if values of type TYPE are returned on the stack, using
3220the ``struct convention'' (i.e., the caller provides a pointer to a
3221buffer in which the callee should store the return value). This
3222controls how the @samp{finish} command finds a function's return value,
3223and whether an inferior function call reserves space on the stack for
3224the return value.
3225
3226The full logic @value{GDBN} uses here is kind of odd.
e5419804 3227
56caf160 3228@itemize @bullet
e5419804
JB
3229@item
3230If the type being returned by value is not a structure, union, or array,
3231and @code{RETURN_VALUE_ON_STACK} returns zero, then @value{GDBN}
3232concludes the value is not returned using the struct convention.
3233
3234@item
3235Otherwise, @value{GDBN} calls @code{USE_STRUCT_CONVENTION} (see below).
3236If that returns non-zero, @value{GDBN} assumes the struct convention is
3237in use.
e5419804
JB
3238@end itemize
3239
3240In other words, to indicate that a given type is returned by value using
3241the struct convention, that type must be either a struct, union, array,
3242or something @code{RETURN_VALUE_ON_STACK} likes, @emph{and} something
3243that @code{USE_STRUCT_CONVENTION} likes.
3244
56caf160 3245Note that, in C and C@t{++}, arrays are never returned by value. In those
e5419804
JB
3246languages, these predicates will always see a pointer type, never an
3247array type. All the references above to arrays being returned by value
3248apply only to other languages.
3249
b0ed3589 3250@item SOFTWARE_SINGLE_STEP_P()
56caf160 3251@findex SOFTWARE_SINGLE_STEP_P
c906108c 3252Define this as 1 if the target does not have a hardware single-step
56caf160 3253mechanism. The macro @code{SOFTWARE_SINGLE_STEP} must also be defined.
c906108c 3254
56caf160
EZ
3255@item SOFTWARE_SINGLE_STEP(@var{signal}, @var{insert_breapoints_p})
3256@findex SOFTWARE_SINGLE_STEP
3257A function that inserts or removes (depending on
c906108c 3258@var{insert_breapoints_p}) breakpoints at each possible destinations of
56caf160 3259the next instruction. See @file{sparc-tdep.c} and @file{rs6000-tdep.c}
c906108c
SS
3260for examples.
3261
da59e081 3262@item SOFUN_ADDRESS_MAYBE_MISSING
56caf160 3263@findex SOFUN_ADDRESS_MAYBE_MISSING
da59e081
JM
3264Somebody clever observed that, the more actual addresses you have in the
3265debug information, the more time the linker has to spend relocating
3266them. So whenever there's some other way the debugger could find the
3267address it needs, you should omit it from the debug info, to make
3268linking faster.
3269
3270@code{SOFUN_ADDRESS_MAYBE_MISSING} indicates that a particular set of
3271hacks of this sort are in use, affecting @code{N_SO} and @code{N_FUN}
3272entries in stabs-format debugging information. @code{N_SO} stabs mark
3273the beginning and ending addresses of compilation units in the text
3274segment. @code{N_FUN} stabs mark the starts and ends of functions.
3275
3276@code{SOFUN_ADDRESS_MAYBE_MISSING} means two things:
da59e081 3277
56caf160 3278@itemize @bullet
da59e081
JM
3279@item
3280@code{N_FUN} stabs have an address of zero. Instead, you should find the
3281addresses where the function starts by taking the function name from
56caf160
EZ
3282the stab, and then looking that up in the minsyms (the
3283linker/assembler symbol table). In other words, the stab has the
3284name, and the linker/assembler symbol table is the only place that carries
da59e081
JM
3285the address.
3286
3287@item
3288@code{N_SO} stabs have an address of zero, too. You just look at the
3289@code{N_FUN} stabs that appear before and after the @code{N_SO} stab,
3290and guess the starting and ending addresses of the compilation unit from
3291them.
da59e081
JM
3292@end itemize
3293
c906108c 3294@item PCC_SOL_BROKEN
56caf160 3295@findex PCC_SOL_BROKEN
c906108c
SS
3296(Used only in the Convex target.)
3297
3298@item PC_IN_CALL_DUMMY
56caf160
EZ
3299@findex PC_IN_CALL_DUMMY
3300See @file{inferior.h}.
c906108c
SS
3301
3302@item PC_LOAD_SEGMENT
56caf160 3303@findex PC_LOAD_SEGMENT
c906108c
SS
3304If defined, print information about the load segment for the program
3305counter. (Defined only for the RS/6000.)
3306
3307@item PC_REGNUM
56caf160 3308@findex PC_REGNUM
c906108c 3309If the program counter is kept in a register, then define this macro to
cce74817
JM
3310be the number (greater than or equal to zero) of that register.
3311
3312This should only need to be defined if @code{TARGET_READ_PC} and
3313@code{TARGET_WRITE_PC} are not defined.
c906108c
SS
3314
3315@item NPC_REGNUM
56caf160 3316@findex NPC_REGNUM
c906108c
SS
3317The number of the ``next program counter'' register, if defined.
3318
3319@item NNPC_REGNUM
56caf160 3320@findex NNPC_REGNUM
c906108c
SS
3321The number of the ``next next program counter'' register, if defined.
3322Currently, this is only defined for the Motorola 88K.
3323
2df3850c 3324@item PARM_BOUNDARY
56caf160 3325@findex PARM_BOUNDARY
2df3850c
JM
3326If non-zero, round arguments to a boundary of this many bits before
3327pushing them on the stack.
3328
56caf160
EZ
3329@item PRINT_REGISTER_HOOK (@var{regno})
3330@findex PRINT_REGISTER_HOOK
c906108c
SS
3331If defined, this must be a function that prints the contents of the
3332given register to standard output.
3333
3334@item PRINT_TYPELESS_INTEGER
56caf160 3335@findex PRINT_TYPELESS_INTEGER
c906108c
SS
3336This is an obscure substitute for @code{print_longest} that seems to
3337have been defined for the Convex target.
3338
3339@item PROCESS_LINENUMBER_HOOK
56caf160 3340@findex PROCESS_LINENUMBER_HOOK
c906108c
SS
3341A hook defined for XCOFF reading.
3342
3343@item PROLOGUE_FIRSTLINE_OVERLAP
56caf160 3344@findex PROLOGUE_FIRSTLINE_OVERLAP
c906108c
SS
3345(Only used in unsupported Convex configuration.)
3346
3347@item PS_REGNUM
56caf160 3348@findex PS_REGNUM
c906108c
SS
3349If defined, this is the number of the processor status register. (This
3350definition is only used in generic code when parsing "$ps".)
3351
3352@item POP_FRAME
56caf160
EZ
3353@findex POP_FRAME
3354@findex call_function_by_hand
3355@findex return_command
c906108c 3356Used in @samp{call_function_by_hand} to remove an artificial stack
1c6147de 3357frame and in @samp{return_command} to remove a real stack frame.
c906108c 3358
56caf160
EZ
3359@item PUSH_ARGUMENTS (@var{nargs}, @var{args}, @var{sp}, @var{struct_return}, @var{struct_addr})
3360@findex PUSH_ARGUMENTS
392a587b 3361Define this to push arguments onto the stack for inferior function
56caf160 3362call. Returns the updated stack pointer value.
c906108c
SS
3363
3364@item PUSH_DUMMY_FRAME
56caf160 3365@findex PUSH_DUMMY_FRAME
c906108c
SS
3366Used in @samp{call_function_by_hand} to create an artificial stack frame.
3367
3368@item REGISTER_BYTES
56caf160 3369@findex REGISTER_BYTES
25822942 3370The total amount of space needed to store @value{GDBN}'s copy of the machine's
c906108c
SS
3371register state.
3372
56caf160
EZ
3373@item REGISTER_NAME(@var{i})
3374@findex REGISTER_NAME
3375Return the name of register @var{i} as a string. May return @code{NULL}
3376or @code{NUL} to indicate that register @var{i} is not valid.
c906108c 3377
7a292a7a 3378@item REGISTER_NAMES
56caf160
EZ
3379@findex REGISTER_NAMES
3380Deprecated in favor of @code{REGISTER_NAME}.
7a292a7a 3381
56caf160
EZ
3382@item REG_STRUCT_HAS_ADDR (@var{gcc_p}, @var{type})
3383@findex REG_STRUCT_HAS_ADDR
c906108c
SS
3384Define this to return 1 if the given type will be passed by pointer
3385rather than directly.
3386
56caf160
EZ
3387@item SAVE_DUMMY_FRAME_TOS (@var{sp})
3388@findex SAVE_DUMMY_FRAME_TOS
43ff13b4
JM
3389Used in @samp{call_function_by_hand} to notify the target dependent code
3390of the top-of-stack value that will be passed to the the inferior code.
56caf160 3391This is the value of the @code{SP} after both the dummy frame and space
43ff13b4
JM
3392for parameters/results have been allocated on the stack.
3393
c906108c 3394@item SDB_REG_TO_REGNUM
56caf160 3395@findex SDB_REG_TO_REGNUM
25822942 3396Define this to convert sdb register numbers into @value{GDBN} regnums. If not
c906108c
SS
3397defined, no conversion will be done.
3398
3399@item SHIFT_INST_REGS
56caf160 3400@findex SHIFT_INST_REGS
c906108c
SS
3401(Only used for m88k targets.)
3402
c2c6d25f 3403@item SKIP_PERMANENT_BREAKPOINT
56caf160 3404@findex SKIP_PERMANENT_BREAKPOINT
25822942 3405Advance the inferior's PC past a permanent breakpoint. @value{GDBN} normally
c2c6d25f
JM
3406steps over a breakpoint by removing it, stepping one instruction, and
3407re-inserting the breakpoint. However, permanent breakpoints are
3408hardwired into the inferior, and can't be removed, so this strategy
56caf160 3409doesn't work. Calling @code{SKIP_PERMANENT_BREAKPOINT} adjusts the processor's
c2c6d25f
JM
3410state so that execution will resume just after the breakpoint. This
3411macro does the right thing even when the breakpoint is in the delay slot
3412of a branch or jump.
3413
56caf160
EZ
3414@item SKIP_PROLOGUE (@var{pc})
3415@findex SKIP_PROLOGUE
b83266a0
SS
3416A C expression that returns the address of the ``real'' code beyond the
3417function entry prologue found at @var{pc}.
c906108c
SS
3418
3419@item SKIP_PROLOGUE_FRAMELESS_P
56caf160 3420@findex SKIP_PROLOGUE_FRAMELESS_P
b83266a0
SS
3421A C expression that should behave similarly, but that can stop as soon
3422as the function is known to have a frame. If not defined,
c906108c
SS
3423@code{SKIP_PROLOGUE} will be used instead.
3424
56caf160
EZ
3425@item SKIP_TRAMPOLINE_CODE (@var{pc})
3426@findex SKIP_TRAMPOLINE_CODE
c906108c
SS
3427If the target machine has trampoline code that sits between callers and
3428the functions being called, then define this macro to return a new PC
3429that is at the start of the real function.
3430
3431@item SP_REGNUM
56caf160 3432@findex SP_REGNUM
cce74817
JM
3433If the stack-pointer is kept in a register, then define this macro to be
3434the number (greater than or equal to zero) of that register.
3435
3436This should only need to be defined if @code{TARGET_WRITE_SP} and
3437@code{TARGET_WRITE_SP} are not defined.
c906108c
SS
3438
3439@item STAB_REG_TO_REGNUM
56caf160 3440@findex STAB_REG_TO_REGNUM
c906108c 3441Define this to convert stab register numbers (as gotten from `r'
25822942 3442declarations) into @value{GDBN} regnums. If not defined, no conversion will be
c906108c
SS
3443done.
3444
56caf160
EZ
3445@item STACK_ALIGN (@var{addr})
3446@findex STACK_ALIGN
c906108c
SS
3447Define this to adjust the address to the alignment required for the
3448processor's stack.
3449
56caf160
EZ
3450@item STEP_SKIPS_DELAY (@var{addr})
3451@findex STEP_SKIPS_DELAY
c906108c
SS
3452Define this to return true if the address is of an instruction with a
3453delay slot. If a breakpoint has been placed in the instruction's delay
25822942 3454slot, @value{GDBN} will single-step over that instruction before resuming
c906108c
SS
3455normally. Currently only defined for the Mips.
3456
56caf160
EZ
3457@item STORE_RETURN_VALUE (@var{type}, @var{valbuf})
3458@findex STORE_RETURN_VALUE
c906108c
SS
3459A C expression that stores a function return value of type @var{type},
3460where @var{valbuf} is the address of the value to be stored.
3461
3462@item SUN_FIXED_LBRAC_BUG
56caf160 3463@findex SUN_FIXED_LBRAC_BUG
c906108c
SS
3464(Used only for Sun-3 and Sun-4 targets.)
3465
3466@item SYMBOL_RELOADING_DEFAULT
56caf160
EZ
3467@findex SYMBOL_RELOADING_DEFAULT
3468The default value of the ``symbol-reloading'' variable. (Never defined in
c906108c
SS
3469current sources.)
3470
3471@item TARGET_BYTE_ORDER_DEFAULT
56caf160 3472@findex TARGET_BYTE_ORDER_DEFAULT
c906108c
SS
3473The ordering of bytes in the target. This must be either
3474@code{BIG_ENDIAN} or @code{LITTLE_ENDIAN}. This macro replaces
56caf160 3475@code{TARGET_BYTE_ORDER} which is deprecated.
c906108c
SS
3476
3477@item TARGET_BYTE_ORDER_SELECTABLE_P
56caf160 3478@findex TARGET_BYTE_ORDER_SELECTABLE_P
c906108c
SS
3479Non-zero if the target has both @code{BIG_ENDIAN} and
3480@code{LITTLE_ENDIAN} variants. This macro replaces
56caf160 3481@code{TARGET_BYTE_ORDER_SELECTABLE} which is deprecated.
c906108c
SS
3482
3483@item TARGET_CHAR_BIT
56caf160 3484@findex TARGET_CHAR_BIT
c906108c
SS
3485Number of bits in a char; defaults to 8.
3486
3487@item TARGET_COMPLEX_BIT
56caf160 3488@findex TARGET_COMPLEX_BIT
c906108c
SS
3489Number of bits in a complex number; defaults to @code{2 * TARGET_FLOAT_BIT}.
3490
ac9a91a7
JM
3491At present this macro is not used.
3492
c906108c 3493@item TARGET_DOUBLE_BIT
56caf160 3494@findex TARGET_DOUBLE_BIT
c906108c
SS
3495Number of bits in a double float; defaults to @code{8 * TARGET_CHAR_BIT}.
3496
3497@item TARGET_DOUBLE_COMPLEX_BIT
56caf160 3498@findex TARGET_DOUBLE_COMPLEX_BIT
c906108c
SS
3499Number of bits in a double complex; defaults to @code{2 * TARGET_DOUBLE_BIT}.
3500
ac9a91a7
JM
3501At present this macro is not used.
3502
c906108c 3503@item TARGET_FLOAT_BIT
56caf160 3504@findex TARGET_FLOAT_BIT
c906108c
SS
3505Number of bits in a float; defaults to @code{4 * TARGET_CHAR_BIT}.
3506
3507@item TARGET_INT_BIT
56caf160 3508@findex TARGET_INT_BIT
c906108c
SS
3509Number of bits in an integer; defaults to @code{4 * TARGET_CHAR_BIT}.
3510
3511@item TARGET_LONG_BIT
56caf160 3512@findex TARGET_LONG_BIT
c906108c
SS
3513Number of bits in a long integer; defaults to @code{4 * TARGET_CHAR_BIT}.
3514
3515@item TARGET_LONG_DOUBLE_BIT
56caf160 3516@findex TARGET_LONG_DOUBLE_BIT
c906108c
SS
3517Number of bits in a long double float;
3518defaults to @code{2 * TARGET_DOUBLE_BIT}.
3519
3520@item TARGET_LONG_LONG_BIT
56caf160 3521@findex TARGET_LONG_LONG_BIT
c906108c
SS
3522Number of bits in a long long integer; defaults to @code{2 * TARGET_LONG_BIT}.
3523
3524@item TARGET_PTR_BIT
56caf160 3525@findex TARGET_PTR_BIT
c906108c
SS
3526Number of bits in a pointer; defaults to @code{TARGET_INT_BIT}.
3527
3528@item TARGET_SHORT_BIT
56caf160 3529@findex TARGET_SHORT_BIT
c906108c
SS
3530Number of bits in a short integer; defaults to @code{2 * TARGET_CHAR_BIT}.
3531
3532@item TARGET_READ_PC
56caf160
EZ
3533@findex TARGET_READ_PC
3534@itemx TARGET_WRITE_PC (@var{val}, @var{pid})
3535@findex TARGET_WRITE_PC
3536@itemx TARGET_READ_SP
3537@findex TARGET_READ_SP
3538@itemx TARGET_WRITE_SP
3539@findex TARGET_WRITE_SP
3540@itemx TARGET_READ_FP
3541@findex TARGET_READ_FP
3542@itemx TARGET_WRITE_FP
3543@findex TARGET_WRITE_FP
3544@findex read_pc
3545@findex write_pc
3546@findex read_sp
3547@findex write_sp
3548@findex read_fp
3549@findex write_fp
c906108c
SS
3550These change the behavior of @code{read_pc}, @code{write_pc},
3551@code{read_sp}, @code{write_sp}, @code{read_fp} and @code{write_fp}.
25822942 3552For most targets, these may be left undefined. @value{GDBN} will call the read
c906108c
SS
3553and write register functions with the relevant @code{_REGNUM} argument.
3554
3555These macros are useful when a target keeps one of these registers in a
3556hard to get at place; for example, part in a segment register and part
3557in an ordinary register.
3558
56caf160
EZ
3559@item TARGET_VIRTUAL_FRAME_POINTER(@var{pc}, @var{regp}, @var{offsetp})
3560@findex TARGET_VIRTUAL_FRAME_POINTER
c906108c 3561Returns a @code{(register, offset)} pair representing the virtual
56caf160 3562frame pointer in use at the code address @var{pc}. If virtual
c906108c
SS
3563frame pointers are not used, a default definition simply returns
3564@code{FP_REGNUM}, with an offset of zero.
3565
9742079a
EZ
3566@item TARGET_HAS_HARDWARE_WATCHPOINTS
3567If non-zero, the target has support for hardware-assisted
3568watchpoints. @xref{Algorithms, watchpoints}, for more details and
3569other related macros.
3570
56caf160
EZ
3571@item USE_STRUCT_CONVENTION (@var{gcc_p}, @var{type})
3572@findex USE_STRUCT_CONVENTION
c906108c
SS
3573If defined, this must be an expression that is nonzero if a value of the
3574given @var{type} being returned from a function must have space
3575allocated for it on the stack. @var{gcc_p} is true if the function
3576being considered is known to have been compiled by GCC; this is helpful
3577for systems where GCC is known to use different calling convention than
3578other compilers.
3579
56caf160
EZ
3580@item VARIABLES_INSIDE_BLOCK (@var{desc}, @var{gcc_p})
3581@findex VARIABLES_INSIDE_BLOCK
c906108c
SS
3582For dbx-style debugging information, if the compiler puts variable
3583declarations inside LBRAC/RBRAC blocks, this should be defined to be
3584nonzero. @var{desc} is the value of @code{n_desc} from the
25822942 3585@code{N_RBRAC} symbol, and @var{gcc_p} is true if @value{GDBN} has noticed the
c906108c
SS
3586presence of either the @code{GCC_COMPILED_SYMBOL} or the
3587@code{GCC2_COMPILED_SYMBOL}. By default, this is 0.
3588
56caf160
EZ
3589@item OS9K_VARIABLES_INSIDE_BLOCK (@var{desc}, @var{gcc_p})
3590@findex OS9K_VARIABLES_INSIDE_BLOCK
c906108c 3591Similarly, for OS/9000. Defaults to 1.
c906108c
SS
3592@end table
3593
3594Motorola M68K target conditionals.
3595
56caf160 3596@ftable @code
c906108c
SS
3597@item BPT_VECTOR
3598Define this to be the 4-bit location of the breakpoint trap vector. If
3599not defined, it will default to @code{0xf}.
3600
3601@item REMOTE_BPT_VECTOR
3602Defaults to @code{1}.
56caf160 3603@end ftable
c906108c
SS
3604
3605@section Adding a New Target
3606
56caf160 3607@cindex adding a target
af6c57ea 3608The following files add a target to @value{GDBN}:
c906108c
SS
3609
3610@table @file
56caf160 3611@vindex TDEPFILES
c906108c
SS
3612@item gdb/config/@var{arch}/@var{ttt}.mt
3613Contains a Makefile fragment specific to this target. Specifies what
3614object files are needed for target @var{ttt}, by defining
104c1213
JM
3615@samp{TDEPFILES=@dots{}} and @samp{TDEPLIBS=@dots{}}. Also specifies
3616the header file which describes @var{ttt}, by defining @samp{TM_FILE=
3617tm-@var{ttt}.h}.
3618
3619You can also define @samp{TM_CFLAGS}, @samp{TM_CLIBS}, @samp{TM_CDEPS},
3620but these are now deprecated, replaced by autoconf, and may go away in
25822942 3621future versions of @value{GDBN}.
c906108c 3622
c906108c
SS
3623@item gdb/@var{ttt}-tdep.c
3624Contains any miscellaneous code required for this target machine. On
3625some machines it doesn't exist at all. Sometimes the macros in
3626@file{tm-@var{ttt}.h} become very complicated, so they are implemented
3627as functions here instead, and the macro is simply defined to call the
3628function. This is vastly preferable, since it is easier to understand
3629and debug.
3630
af6c57ea
AC
3631@item gdb/@var{arch}-tdep.c
3632@itemx gdb/@var{arch}-tdep.h
3633This often exists to describe the basic layout of the target machine's
3634processor chip (registers, stack, etc.). If used, it is included by
3635@file{@var{ttt}-tdep.h}. It can be shared among many targets that use
3636the same processor.
3637
3638@item gdb/config/@var{arch}/tm-@var{ttt}.h
3639(@file{tm.h} is a link to this file, created by @code{configure}). Contains
3640macro definitions about the target machine's registers, stack frame
3641format and instructions.
3642
3643New targets do not need this file and should not create it.
3644
c906108c
SS
3645@item gdb/config/@var{arch}/tm-@var{arch}.h
3646This often exists to describe the basic layout of the target machine's
56caf160 3647processor chip (registers, stack, etc.). If used, it is included by
c906108c
SS
3648@file{tm-@var{ttt}.h}. It can be shared among many targets that use the
3649same processor.
3650
af6c57ea
AC
3651New targets do not need this file and should not create it.
3652
c906108c
SS
3653@end table
3654
3655If you are adding a new operating system for an existing CPU chip, add a
3656@file{config/tm-@var{os}.h} file that describes the operating system
3657facilities that are unusual (extra symbol table info; the breakpoint
56caf160 3658instruction needed; etc.). Then write a @file{@var{arch}/tm-@var{os}.h}
c906108c
SS
3659that just @code{#include}s @file{tm-@var{arch}.h} and
3660@file{config/tm-@var{os}.h}.
3661
3662
3663@node Target Vector Definition
3664
3665@chapter Target Vector Definition
56caf160 3666@cindex target vector
c906108c 3667
56caf160
EZ
3668The target vector defines the interface between @value{GDBN}'s
3669abstract handling of target systems, and the nitty-gritty code that
3670actually exercises control over a process or a serial port.
3671@value{GDBN} includes some 30-40 different target vectors; however,
3672each configuration of @value{GDBN} includes only a few of them.
c906108c
SS
3673
3674@section File Targets
3675
3676Both executables and core files have target vectors.
3677
3678@section Standard Protocol and Remote Stubs
3679
56caf160
EZ
3680@value{GDBN}'s file @file{remote.c} talks a serial protocol to code
3681that runs in the target system. @value{GDBN} provides several sample
3682@dfn{stubs} that can be integrated into target programs or operating
3683systems for this purpose; they are named @file{*-stub.c}.
c906108c 3684
56caf160
EZ
3685The @value{GDBN} user's manual describes how to put such a stub into
3686your target code. What follows is a discussion of integrating the
3687SPARC stub into a complicated operating system (rather than a simple
3688program), by Stu Grossman, the author of this stub.
c906108c
SS
3689
3690The trap handling code in the stub assumes the following upon entry to
56caf160 3691@code{trap_low}:
c906108c
SS
3692
3693@enumerate
56caf160
EZ
3694@item
3695%l1 and %l2 contain pc and npc respectively at the time of the trap;
c906108c 3696
56caf160
EZ
3697@item
3698traps are disabled;
c906108c 3699
56caf160
EZ
3700@item
3701you are in the correct trap window.
c906108c
SS
3702@end enumerate
3703
3704As long as your trap handler can guarantee those conditions, then there
56caf160 3705is no reason why you shouldn't be able to ``share'' traps with the stub.
c906108c
SS
3706The stub has no requirement that it be jumped to directly from the
3707hardware trap vector. That is why it calls @code{exceptionHandler()},
3708which is provided by the external environment. For instance, this could
56caf160 3709set up the hardware traps to actually execute code which calls the stub
c906108c
SS
3710first, and then transfers to its own trap handler.
3711
3712For the most point, there probably won't be much of an issue with
56caf160 3713``sharing'' traps, as the traps we use are usually not used by the kernel,
c906108c
SS
3714and often indicate unrecoverable error conditions. Anyway, this is all
3715controlled by a table, and is trivial to modify. The most important
3716trap for us is for @code{ta 1}. Without that, we can't single step or
3717do breakpoints. Everything else is unnecessary for the proper operation
3718of the debugger/stub.
3719
3720From reading the stub, it's probably not obvious how breakpoints work.
25822942 3721They are simply done by deposit/examine operations from @value{GDBN}.
c906108c
SS
3722
3723@section ROM Monitor Interface
3724
3725@section Custom Protocols
3726
3727@section Transport Layer
3728
3729@section Builtin Simulator
3730
3731
3732@node Native Debugging
3733
3734@chapter Native Debugging
56caf160 3735@cindex native debugging
c906108c 3736
25822942 3737Several files control @value{GDBN}'s configuration for native support:
c906108c
SS
3738
3739@table @file
56caf160 3740@vindex NATDEPFILES
c906108c
SS
3741@item gdb/config/@var{arch}/@var{xyz}.mh
3742Specifies Makefile fragments needed when hosting @emph{or native} on
3743machine @var{xyz}. In particular, this lists the required
3744native-dependent object files, by defining @samp{NATDEPFILES=@dots{}}.
3745Also specifies the header file which describes native support on
3746@var{xyz}, by defining @samp{NAT_FILE= nm-@var{xyz}.h}. You can also
3747define @samp{NAT_CFLAGS}, @samp{NAT_ADD_FILES}, @samp{NAT_CLIBS},
3748@samp{NAT_CDEPS}, etc.; see @file{Makefile.in}.
3749
3750@item gdb/config/@var{arch}/nm-@var{xyz}.h
56caf160 3751(@file{nm.h} is a link to this file, created by @code{configure}). Contains C
c906108c
SS
3752macro definitions describing the native system environment, such as
3753child process control and core file support.
3754
3755@item gdb/@var{xyz}-nat.c
3756Contains any miscellaneous C code required for this native support of
3757this machine. On some machines it doesn't exist at all.
c906108c
SS
3758@end table
3759
3760There are some ``generic'' versions of routines that can be used by
3761various systems. These can be customized in various ways by macros
3762defined in your @file{nm-@var{xyz}.h} file. If these routines work for
3763the @var{xyz} host, you can just include the generic file's name (with
3764@samp{.o}, not @samp{.c}) in @code{NATDEPFILES}.
3765
3766Otherwise, if your machine needs custom support routines, you will need
3767to write routines that perform the same functions as the generic file.
56caf160 3768Put them into @file{@var{xyz}-nat.c}, and put @file{@var{xyz}-nat.o}
c906108c
SS
3769into @code{NATDEPFILES}.
3770
3771@table @file
c906108c
SS
3772@item inftarg.c
3773This contains the @emph{target_ops vector} that supports Unix child
3774processes on systems which use ptrace and wait to control the child.
3775
3776@item procfs.c
3777This contains the @emph{target_ops vector} that supports Unix child
3778processes on systems which use /proc to control the child.
3779
3780@item fork-child.c
56caf160
EZ
3781This does the low-level grunge that uses Unix system calls to do a ``fork
3782and exec'' to start up a child process.
c906108c
SS
3783
3784@item infptrace.c
3785This is the low level interface to inferior processes for systems using
3786the Unix @code{ptrace} call in a vanilla way.
c906108c
SS
3787@end table
3788
3789@section Native core file Support
56caf160 3790@cindex native core files
c906108c
SS
3791
3792@table @file
56caf160 3793@findex fetch_core_registers
c906108c
SS
3794@item core-aout.c::fetch_core_registers()
3795Support for reading registers out of a core file. This routine calls
3796@code{register_addr()}, see below. Now that BFD is used to read core
3797files, virtually all machines should use @code{core-aout.c}, and should
3798just provide @code{fetch_core_registers} in @code{@var{xyz}-nat.c} (or
3799@code{REGISTER_U_ADDR} in @code{nm-@var{xyz}.h}).
3800
3801@item core-aout.c::register_addr()
3802If your @code{nm-@var{xyz}.h} file defines the macro
3803@code{REGISTER_U_ADDR(addr, blockend, regno)}, it should be defined to
25822942 3804set @code{addr} to the offset within the @samp{user} struct of @value{GDBN}
c906108c
SS
3805register number @code{regno}. @code{blockend} is the offset within the
3806``upage'' of @code{u.u_ar0}. If @code{REGISTER_U_ADDR} is defined,
3807@file{core-aout.c} will define the @code{register_addr()} function and
3808use the macro in it. If you do not define @code{REGISTER_U_ADDR}, but
3809you are using the standard @code{fetch_core_registers()}, you will need
3810to define your own version of @code{register_addr()}, put it into your
3811@code{@var{xyz}-nat.c} file, and be sure @code{@var{xyz}-nat.o} is in
3812the @code{NATDEPFILES} list. If you have your own
3813@code{fetch_core_registers()}, you may not need a separate
3814@code{register_addr()}. Many custom @code{fetch_core_registers()}
3815implementations simply locate the registers themselves.@refill
c906108c
SS
3816@end table
3817
25822942 3818When making @value{GDBN} run native on a new operating system, to make it
c906108c
SS
3819possible to debug core files, you will need to either write specific
3820code for parsing your OS's core files, or customize
3821@file{bfd/trad-core.c}. First, use whatever @code{#include} files your
3822machine uses to define the struct of registers that is accessible
3823(possibly in the u-area) in a core file (rather than
3824@file{machine/reg.h}), and an include file that defines whatever header
56caf160
EZ
3825exists on a core file (e.g. the u-area or a @code{struct core}). Then
3826modify @code{trad_unix_core_file_p} to use these values to set up the
c906108c
SS
3827section information for the data segment, stack segment, any other
3828segments in the core file (perhaps shared library contents or control
3829information), ``registers'' segment, and if there are two discontiguous
3830sets of registers (e.g. integer and float), the ``reg2'' segment. This
3831section information basically delimits areas in the core file in a
3832standard way, which the section-reading routines in BFD know how to seek
3833around in.
3834
25822942 3835Then back in @value{GDBN}, you need a matching routine called
56caf160 3836@code{fetch_core_registers}. If you can use the generic one, it's in
c906108c
SS
3837@file{core-aout.c}; if not, it's in your @file{@var{xyz}-nat.c} file.
3838It will be passed a char pointer to the entire ``registers'' segment,
3839its length, and a zero; or a char pointer to the entire ``regs2''
3840segment, its length, and a 2. The routine should suck out the supplied
25822942 3841register values and install them into @value{GDBN}'s ``registers'' array.
c906108c
SS
3842
3843If your system uses @file{/proc} to control processes, and uses ELF
3844format core files, then you may be able to use the same routines for
3845reading the registers out of processes and out of core files.
3846
3847@section ptrace
3848
3849@section /proc
3850
3851@section win32
3852
3853@section shared libraries
3854
3855@section Native Conditionals
56caf160 3856@cindex native conditionals
c906108c 3857
56caf160
EZ
3858When @value{GDBN} is configured and compiled, various macros are
3859defined or left undefined, to control compilation when the host and
3860target systems are the same. These macros should be defined (or left
3861undefined) in @file{nm-@var{system}.h}.
c906108c
SS
3862
3863@table @code
c906108c 3864@item ATTACH_DETACH
56caf160 3865@findex ATTACH_DETACH
25822942 3866If defined, then @value{GDBN} will include support for the @code{attach} and
c906108c
SS
3867@code{detach} commands.
3868
3869@item CHILD_PREPARE_TO_STORE
56caf160 3870@findex CHILD_PREPARE_TO_STORE
c906108c
SS
3871If the machine stores all registers at once in the child process, then
3872define this to ensure that all values are correct. This usually entails
3873a read from the child.
3874
3875[Note that this is incorrectly defined in @file{xm-@var{system}.h} files
3876currently.]
3877
3878@item FETCH_INFERIOR_REGISTERS
56caf160 3879@findex FETCH_INFERIOR_REGISTERS
c906108c
SS
3880Define this if the native-dependent code will provide its own routines
3881@code{fetch_inferior_registers} and @code{store_inferior_registers} in
56caf160 3882@file{@var{host}-nat.c}. If this symbol is @emph{not} defined, and
c906108c
SS
3883@file{infptrace.c} is included in this configuration, the default
3884routines in @file{infptrace.c} are used for these functions.
3885
3886@item FILES_INFO_HOOK
56caf160 3887@findex FILES_INFO_HOOK
c906108c
SS
3888(Only defined for Convex.)
3889
3890@item FP0_REGNUM
56caf160 3891@findex FP0_REGNUM
c906108c
SS
3892This macro is normally defined to be the number of the first floating
3893point register, if the machine has such registers. As such, it would
56caf160 3894appear only in target-specific code. However, @file{/proc} support uses this
c906108c
SS
3895to decide whether floats are in use on this target.
3896
3897@item GET_LONGJMP_TARGET
56caf160 3898@findex GET_LONGJMP_TARGET
c906108c
SS
3899For most machines, this is a target-dependent parameter. On the
3900DECstation and the Iris, this is a native-dependent parameter, since
56caf160 3901@file{setjmp.h} is needed to define it.
c906108c 3902
56caf160 3903This macro determines the target PC address that @code{longjmp} will jump to,
c906108c 3904assuming that we have just stopped at a longjmp breakpoint. It takes a
56caf160 3905@code{CORE_ADDR *} as argument, and stores the target PC value through this
c906108c
SS
3906pointer. It examines the current state of the machine as needed.
3907
9742079a
EZ
3908@item I386_USE_GENERIC_WATCHPOINTS
3909An x86-based machine can define this to use the generic x86 watchpoint
3910support; see @ref{Algorithms, I386_USE_GENERIC_WATCHPOINTS}.
3911
c906108c 3912@item KERNEL_U_ADDR
56caf160 3913@findex KERNEL_U_ADDR
c906108c 3914Define this to the address of the @code{u} structure (the ``user
25822942 3915struct'', also known as the ``u-page'') in kernel virtual memory. @value{GDBN}
c906108c
SS
3916needs to know this so that it can subtract this address from absolute
3917addresses in the upage, that are obtained via ptrace or from core files.
3918On systems that don't need this value, set it to zero.
3919
3920@item KERNEL_U_ADDR_BSD
56caf160 3921@findex KERNEL_U_ADDR_BSD
25822942 3922Define this to cause @value{GDBN} to determine the address of @code{u} at
c906108c
SS
3923runtime, by using Berkeley-style @code{nlist} on the kernel's image in
3924the root directory.
3925
3926@item KERNEL_U_ADDR_HPUX
56caf160 3927@findex KERNEL_U_ADDR_HPUX
25822942 3928Define this to cause @value{GDBN} to determine the address of @code{u} at
c906108c
SS
3929runtime, by using HP-style @code{nlist} on the kernel's image in the
3930root directory.
3931
3932@item ONE_PROCESS_WRITETEXT
56caf160 3933@findex ONE_PROCESS_WRITETEXT
c906108c
SS
3934Define this to be able to, when a breakpoint insertion fails, warn the
3935user that another process may be running with the same executable.
3936
56caf160
EZ
3937@item PREPARE_TO_PROCEED (@var{select_it})
3938@findex PREPARE_TO_PROCEED
adf40b2e
JM
3939This (ugly) macro allows a native configuration to customize the way the
3940@code{proceed} function in @file{infrun.c} deals with switching between
3941threads.
3942
3943In a multi-threaded task we may select another thread and then continue
3944or step. But if the old thread was stopped at a breakpoint, it will
3945immediately cause another breakpoint stop without any execution (i.e. it
25822942 3946will report a breakpoint hit incorrectly). So @value{GDBN} must step over it
adf40b2e
JM
3947first.
3948
3949If defined, @code{PREPARE_TO_PROCEED} should check the current thread
3950against the thread that reported the most recent event. If a step-over
3951is required, it returns TRUE. If @var{select_it} is non-zero, it should
3952reselect the old thread.
3953
c906108c 3954@item PROC_NAME_FMT
56caf160 3955@findex PROC_NAME_FMT
c906108c
SS
3956Defines the format for the name of a @file{/proc} device. Should be
3957defined in @file{nm.h} @emph{only} in order to override the default
3958definition in @file{procfs.c}.
3959
3960@item PTRACE_FP_BUG
56caf160
EZ
3961@findex PTRACE_FP_BUG
3962See @file{mach386-xdep.c}.
c906108c
SS
3963
3964@item PTRACE_ARG3_TYPE
56caf160 3965@findex PTRACE_ARG3_TYPE
c906108c
SS
3966The type of the third argument to the @code{ptrace} system call, if it
3967exists and is different from @code{int}.
3968
3969@item REGISTER_U_ADDR
56caf160 3970@findex REGISTER_U_ADDR
c906108c
SS
3971Defines the offset of the registers in the ``u area''.
3972
3973@item SHELL_COMMAND_CONCAT
56caf160 3974@findex SHELL_COMMAND_CONCAT
c906108c
SS
3975If defined, is a string to prefix on the shell command used to start the
3976inferior.
3977
3978@item SHELL_FILE
56caf160 3979@findex SHELL_FILE
c906108c
SS
3980If defined, this is the name of the shell to use to run the inferior.
3981Defaults to @code{"/bin/sh"}.
3982
56caf160
EZ
3983@item SOLIB_ADD (@var{filename}, @var{from_tty}, @var{targ})
3984@findex SOLIB_ADD
c906108c 3985Define this to expand into an expression that will cause the symbols in
25822942 3986@var{filename} to be added to @value{GDBN}'s symbol table.
c906108c
SS
3987
3988@item SOLIB_CREATE_INFERIOR_HOOK
56caf160 3989@findex SOLIB_CREATE_INFERIOR_HOOK
c906108c
SS
3990Define this to expand into any shared-library-relocation code that you
3991want to be run just after the child process has been forked.
3992
3993@item START_INFERIOR_TRAPS_EXPECTED
56caf160
EZ
3994@findex START_INFERIOR_TRAPS_EXPECTED
3995When starting an inferior, @value{GDBN} normally expects to trap
3996twice; once when
c906108c
SS
3997the shell execs, and once when the program itself execs. If the actual
3998number of traps is something other than 2, then define this macro to
3999expand into the number expected.
4000
4001@item SVR4_SHARED_LIBS
56caf160 4002@findex SVR4_SHARED_LIBS
c906108c
SS
4003Define this to indicate that SVR4-style shared libraries are in use.
4004
4005@item USE_PROC_FS
56caf160 4006@findex USE_PROC_FS
c906108c 4007This determines whether small routines in @file{*-tdep.c}, which
56caf160
EZ
4008translate register values between @value{GDBN}'s internal
4009representation and the @file{/proc} representation, are compiled.
c906108c
SS
4010
4011@item U_REGS_OFFSET
56caf160 4012@findex U_REGS_OFFSET
c906108c
SS
4013This is the offset of the registers in the upage. It need only be
4014defined if the generic ptrace register access routines in
4015@file{infptrace.c} are being used (that is, @file{infptrace.c} is
4016configured in, and @code{FETCH_INFERIOR_REGISTERS} is not defined). If
4017the default value from @file{infptrace.c} is good enough, leave it
4018undefined.
4019
4020The default value means that u.u_ar0 @emph{points to} the location of
4021the registers. I'm guessing that @code{#define U_REGS_OFFSET 0} means
56caf160 4022that @code{u.u_ar0} @emph{is} the location of the registers.
c906108c
SS
4023
4024@item CLEAR_SOLIB
56caf160
EZ
4025@findex CLEAR_SOLIB
4026See @file{objfiles.c}.
c906108c
SS
4027
4028@item DEBUG_PTRACE
56caf160
EZ
4029@findex DEBUG_PTRACE
4030Define this to debug @code{ptrace} calls.
c906108c
SS
4031@end table
4032
4033
4034@node Support Libraries
4035
4036@chapter Support Libraries
4037
4038@section BFD
56caf160 4039@cindex BFD library
c906108c 4040
25822942 4041BFD provides support for @value{GDBN} in several ways:
c906108c
SS
4042
4043@table @emph
c906108c
SS
4044@item identifying executable and core files
4045BFD will identify a variety of file types, including a.out, coff, and
4046several variants thereof, as well as several kinds of core files.
4047
4048@item access to sections of files
4049BFD parses the file headers to determine the names, virtual addresses,
4050sizes, and file locations of all the various named sections in files
56caf160
EZ
4051(such as the text section or the data section). @value{GDBN} simply
4052calls BFD to read or write section @var{x} at byte offset @var{y} for
4053length @var{z}.
c906108c
SS
4054
4055@item specialized core file support
4056BFD provides routines to determine the failing command name stored in a
4057core file, the signal with which the program failed, and whether a core
56caf160 4058file matches (i.e.@: could be a core dump of) a particular executable
c906108c
SS
4059file.
4060
4061@item locating the symbol information
25822942
DB
4062@value{GDBN} uses an internal interface of BFD to determine where to find the
4063symbol information in an executable file or symbol-file. @value{GDBN} itself
c906108c 4064handles the reading of symbols, since BFD does not ``understand'' debug
25822942 4065symbols, but @value{GDBN} uses BFD's cached information to find the symbols,
c906108c 4066string table, etc.
c906108c
SS
4067@end table
4068
4069@section opcodes
56caf160 4070@cindex opcodes library
c906108c 4071
25822942 4072The opcodes library provides @value{GDBN}'s disassembler. (It's a separate
c906108c
SS
4073library because it's also used in binutils, for @file{objdump}).
4074
4075@section readline
4076
4077@section mmalloc
4078
4079@section libiberty
4080
4081@section gnu-regex
56caf160 4082@cindex regular expressions library
c906108c
SS
4083
4084Regex conditionals.
4085
4086@table @code
c906108c
SS
4087@item C_ALLOCA
4088
4089@item NFAILURES
4090
4091@item RE_NREGS
4092
4093@item SIGN_EXTEND_CHAR
4094
4095@item SWITCH_ENUM_BUG
4096
4097@item SYNTAX_TABLE
4098
4099@item Sword
4100
4101@item sparc
c906108c
SS
4102@end table
4103
4104@section include
4105
4106@node Coding
4107
4108@chapter Coding
4109
4110This chapter covers topics that are lower-level than the major
25822942 4111algorithms of @value{GDBN}.
c906108c
SS
4112
4113@section Cleanups
56caf160 4114@cindex cleanups
c906108c
SS
4115
4116Cleanups are a structured way to deal with things that need to be done
4117later. When your code does something (like @code{malloc} some memory,
56caf160 4118or open a file) that needs to be undone later (e.g., free the memory or
c906108c
SS
4119close the file), it can make a cleanup. The cleanup will be done at
4120some future point: when the command is finished, when an error occurs,
4121or when your code decides it's time to do cleanups.
4122
4123You can also discard cleanups, that is, throw them away without doing
4124what they say. This is only done if you ask that it be done.
4125
4126Syntax:
4127
4128@table @code
c906108c
SS
4129@item struct cleanup *@var{old_chain};
4130Declare a variable which will hold a cleanup chain handle.
4131
56caf160 4132@findex make_cleanup
c906108c
SS
4133@item @var{old_chain} = make_cleanup (@var{function}, @var{arg});
4134Make a cleanup which will cause @var{function} to be called with
4135@var{arg} (a @code{char *}) later. The result, @var{old_chain}, is a
4136handle that can be passed to @code{do_cleanups} or
4137@code{discard_cleanups} later. Unless you are going to call
4138@code{do_cleanups} or @code{discard_cleanups} yourself, you can ignore
4139the result from @code{make_cleanup}.
4140
56caf160 4141@findex do_cleanups
c906108c
SS
4142@item do_cleanups (@var{old_chain});
4143Perform all cleanups done since @code{make_cleanup} returned
4144@var{old_chain}. E.g.:
56caf160 4145
c906108c
SS
4146@example
4147make_cleanup (a, 0);
4148old = make_cleanup (b, 0);
4149do_cleanups (old);
4150@end example
56caf160 4151
c906108c
SS
4152@noindent
4153will call @code{b()} but will not call @code{a()}. The cleanup that
4154calls @code{a()} will remain in the cleanup chain, and will be done
4155later unless otherwise discarded.@refill
4156
56caf160 4157@findex discard_cleanups
c906108c
SS
4158@item discard_cleanups (@var{old_chain});
4159Same as @code{do_cleanups} except that it just removes the cleanups from
4160the chain and does not call the specified functions.
c906108c
SS
4161@end table
4162
4163Some functions, e.g. @code{fputs_filtered()} or @code{error()}, specify
4164that they ``should not be called when cleanups are not in place''. This
4165means that any actions you need to reverse in the case of an error or
4166interruption must be on the cleanup chain before you call these
4167functions, since they might never return to your code (they
4168@samp{longjmp} instead).
4169
4170@section Wrapping Output Lines
56caf160 4171@cindex line wrap in output
c906108c 4172
56caf160 4173@findex wrap_here
c906108c
SS
4174Output that goes through @code{printf_filtered} or @code{fputs_filtered}
4175or @code{fputs_demangled} needs only to have calls to @code{wrap_here}
4176added in places that would be good breaking points. The utility
4177routines will take care of actually wrapping if the line width is
4178exceeded.
4179
4180The argument to @code{wrap_here} is an indentation string which is
4181printed @emph{only} if the line breaks there. This argument is saved
4182away and used later. It must remain valid until the next call to
4183@code{wrap_here} or until a newline has been printed through the
4184@code{*_filtered} functions. Don't pass in a local variable and then
4185return!
4186
56caf160 4187It is usually best to call @code{wrap_here} after printing a comma or
c906108c
SS
4188space. If you call it before printing a space, make sure that your
4189indentation properly accounts for the leading space that will print if
4190the line wraps there.
4191
4192Any function or set of functions that produce filtered output must
4193finish by printing a newline, to flush the wrap buffer, before switching
56caf160 4194to unfiltered (@code{printf}) output. Symbol reading routines that
c906108c
SS
4195print warnings are a good example.
4196
25822942 4197@section @value{GDBN} Coding Standards
56caf160 4198@cindex coding standards
c906108c 4199
25822942 4200@value{GDBN} follows the GNU coding standards, as described in
c906108c 4201@file{etc/standards.texi}. This file is also available for anonymous
af6c57ea
AC
4202FTP from GNU archive sites. @value{GDBN} takes a strict interpretation
4203of the standard; in general, when the GNU standard recommends a practice
4204but does not require it, @value{GDBN} requires it.
c906108c 4205
56caf160
EZ
4206@value{GDBN} follows an additional set of coding standards specific to
4207@value{GDBN}, as described in the following sections.
c906108c 4208
af6c57ea
AC
4209
4210@subsection ISO-C
4211
4212@value{GDBN} assumes an ISO-C compliant compiler.
4213
4214@value{GDBN} does not assume an ISO-C or POSIX compliant C library.
4215
4216
4217@subsection Memory Management
4218
4219@value{GDBN} does not use the functions @code{malloc}, @code{realloc},
4220@code{calloc}, @code{free} and @code{asprintf}.
4221
4222@value{GDBN} uses the functions @code{xmalloc}, @code{xrealloc} and
4223@code{xcalloc} when allocating memory. Unlike @code{malloc} et.al.@:
4224these functions do not return when the memory pool is empty. Instead,
4225they unwind the stack using cleanups. These functions return
4226@code{NULL} when requested to allocate a chunk of memory of size zero.
4227
4228@emph{Pragmatics: By using these functions, the need to check every
4229memory allocation is removed. These functions provide portable
4230behavior.}
4231
4232@value{GDBN} does not use the function @code{free}.
4233
4234@value{GDBN} uses the function @code{xfree} to return memory to the
4235memory pool. Consistent with ISO-C, this function ignores a request to
4236free a @code{NULL} pointer.
4237
4238@emph{Pragmatics: On some systems @code{free} fails when passed a
4239@code{NULL} pointer.}
4240
4241@value{GDBN} can use the non-portable function @code{alloca} for the
4242allocation of small temporary values (such as strings).
4243
4244@emph{Pragmatics: This function is very non-portable. Some systems
4245restrict the memory being allocated to no more than a few kilobytes.}
4246
4247@value{GDBN} uses the string function @code{xstrdup} and the print
4248function @code{xasprintf}.
4249
4250@emph{Pragmatics: @code{asprintf} and @code{strdup} can fail. Print
4251functions such as @code{sprintf} are very prone to buffer overflow
4252errors.}
4253
4254
4255@subsection Compiler Warnings
56caf160 4256@cindex compiler warnings
af6c57ea
AC
4257
4258With few exceptions, developers should include the configuration option
4259@samp{--enable-gdb-build-warnings=,-Werror} when building @value{GDBN}.
4260The exceptions are listed in the file @file{gdb/MAINTAINERS}.
4261
4262This option causes @value{GDBN} (when built using GCC) to be compiled
4263with a carefully selected list of compiler warning flags. Any warnings
4264from those flags being treated as errors.
4265
4266The current list of warning flags includes:
4267
4268@table @samp
4269@item -Wimplicit
4270Since @value{GDBN} coding standard requires all functions to be declared
4271using a prototype, the flag has the side effect of ensuring that
4272prototyped functions are always visible with out resorting to
4273@samp{-Wstrict-prototypes}.
4274
4275@item -Wreturn-type
4276Such code often appears to work except on instruction set architectures
4277that use register windows.
4278
4279@item -Wcomment
4280
4281@item -Wtrigraphs
4282
4283@item -Wformat
4284Since @value{GDBN} uses the @code{format printf} attribute on all
4285@code{printf} like functions this checks not just @code{printf} calls
4286but also calls to functions such as @code{fprintf_unfiltered}.
4287
4288@item -Wparentheses
4289This warning includes uses of the assignment operator within an
4290@code{if} statement.
4291
4292@item -Wpointer-arith
4293
4294@item -Wuninitialized
4295@end table
4296
4297@emph{Pragmatics: Due to the way that @value{GDBN} is implemented most
4298functions have unused parameters. Consequently the warning
4299@samp{-Wunused-parameter} is precluded from the list. The macro
4300@code{ATTRIBUTE_UNUSED} is not used as it leads to false negatives ---
4301it is not an error to have @code{ATTRIBUTE_UNUSED} on a parameter that
4302is being used. The options @samp{-Wall} and @samp{-Wunused} are also
4303precluded because they both include @samp{-Wunused-parameter}.}
4304
4305@emph{Pragmatics: @value{GDBN} has not simply accepted the warnings
4306enabled by @samp{-Wall -Werror -W...}. Instead it is selecting warnings
4307when and where their benefits can be demonstrated.}
c906108c
SS
4308
4309@subsection Formatting
4310
56caf160 4311@cindex source code formatting
c906108c
SS
4312The standard GNU recommendations for formatting must be followed
4313strictly.
4314
af6c57ea
AC
4315A function declaration should not have its name in column zero. A
4316function definition should have its name in column zero.
4317
4318@example
4319/* Declaration */
4320static void foo (void);
4321/* Definition */
4322void
4323foo (void)
4324@{
4325@}
4326@end example
4327
4328@emph{Pragmatics: This simplifies scripting. Function definitions can
4329be found using @samp{^function-name}.}
c906108c 4330
af6c57ea
AC
4331There must be a space between a function or macro name and the opening
4332parenthesis of its argument list (except for macro definitions, as
4333required by C). There must not be a space after an open paren/bracket
4334or before a close paren/bracket.
c906108c
SS
4335
4336While additional whitespace is generally helpful for reading, do not use
4337more than one blank line to separate blocks, and avoid adding whitespace
af6c57ea
AC
4338after the end of a program line (as of 1/99, some 600 lines had
4339whitespace after the semicolon). Excess whitespace causes difficulties
4340for @code{diff} and @code{patch} utilities.
4341
4342Pointers are declared using the traditional K&R C style:
4343
4344@example
4345void *foo;
4346@end example
4347
4348@noindent
4349and not:
4350
4351@example
4352void * foo;
4353void* foo;
4354@end example
c906108c
SS
4355
4356@subsection Comments
4357
56caf160 4358@cindex comment formatting
c906108c
SS
4359The standard GNU requirements on comments must be followed strictly.
4360
af6c57ea
AC
4361Block comments must appear in the following form, with no @code{/*}- or
4362@code{*/}-only lines, and no leading @code{*}:
c906108c 4363
56caf160 4364@example
c906108c
SS
4365/* Wait for control to return from inferior to debugger. If inferior
4366 gets a signal, we may decide to start it up again instead of
4367 returning. That is why there is a loop in this function. When
4368 this function actually returns it means the inferior should be left
25822942 4369 stopped and @value{GDBN} should read more commands. */
c906108c
SS
4370@end example
4371
4372(Note that this format is encouraged by Emacs; tabbing for a multi-line
56caf160 4373comment works correctly, and @kbd{M-q} fills the block consistently.)
c906108c
SS
4374
4375Put a blank line between the block comments preceding function or
4376variable definitions, and the definition itself.
4377
4378In general, put function-body comments on lines by themselves, rather
4379than trying to fit them into the 20 characters left at the end of a
4380line, since either the comment or the code will inevitably get longer
4381than will fit, and then somebody will have to move it anyhow.
4382
4383@subsection C Usage
4384
56caf160 4385@cindex C data types
c906108c
SS
4386Code must not depend on the sizes of C data types, the format of the
4387host's floating point numbers, the alignment of anything, or the order
4388of evaluation of expressions.
4389
56caf160 4390@cindex function usage
c906108c 4391Use functions freely. There are only a handful of compute-bound areas
56caf160
EZ
4392in @value{GDBN} that might be affected by the overhead of a function
4393call, mainly in symbol reading. Most of @value{GDBN}'s performance is
4394limited by the target interface (whether serial line or system call).
c906108c
SS
4395
4396However, use functions with moderation. A thousand one-line functions
4397are just as hard to understand as a single thousand-line function.
4398
af6c57ea
AC
4399@emph{Macros are bad, M'kay.}
4400
4401@cindex types
c906108c 4402
af6c57ea
AC
4403Declarations like @samp{struct foo *} should be used in preference to
4404declarations like @samp{typedef struct foo @{ @dots{} @} *foo_ptr}.
4405
4406
4407@subsection Function Prototypes
56caf160 4408@cindex function prototypes
af6c57ea
AC
4409
4410Prototypes must be used when both @emph{declaring} and @emph{defining}
4411a function. Prototypes for @value{GDBN} functions must include both the
4412argument type and name, with the name matching that used in the actual
4413function definition.
c906108c 4414
53a5351d
JM
4415All external functions should have a declaration in a header file that
4416callers include, except for @code{_initialize_*} functions, which must
4417be external so that @file{init.c} construction works, but shouldn't be
4418visible to random source files.
c906108c 4419
af6c57ea
AC
4420Where a source file needs a forward declaration of a static function,
4421that declaration must appear in a block near the top of the source file.
4422
4423
4424@subsection Internal Error Recovery
4425
4426During its execution, @value{GDBN} can encounter two types of errors.
4427User errors and internal errors. User errors include not only a user
4428entering an incorrect command but also problems arising from corrupt
4429object files and system errors when interacting with the target.
4430Internal errors include situtations where @value{GDBN} has detected, at
4431run time, a corrupt or erroneous situtation.
4432
4433When reporting an internal error, @value{GDBN} uses
4434@code{internal_error} and @code{gdb_assert}.
4435
4436@value{GDBN} must not call @code{abort} or @code{assert}.
4437
4438@emph{Pragmatics: There is no @code{internal_warning} function. Either
4439the code detected a user error, recovered from it and issued a
4440@code{warning} or the code failed to correctly recover from the user
4441error and issued an @code{internal_error}.}
4442
4443@subsection File Names
4444
4445Any file used when building the core of @value{GDBN} must be in lower
4446case. Any file used when building the core of @value{GDBN} must be 8.3
4447unique. These requirements apply to both source and generated files.
4448
4449@emph{Pragmatics: The core of @value{GDBN} must be buildable on many
4450platforms including DJGPP and MacOS/HFS. Every time an unfriendly file
4451is introduced to the build process both @file{Makefile.in} and
4452@file{configure.in} need to be modified accordingly. Compare the
4453convoluted conversion process needed to transform @file{COPYING} into
4454@file{copying.c} with the conversion needed to transform
4455@file{version.in} into @file{version.c}.}
4456
4457Any file non 8.3 compliant file (that is not used when building the core
4458of @value{GDBN}) must be added to @file{gdb/config/djgpp/fnchange.lst}.
4459
4460@emph{Pragmatics: This is clearly a compromise.}
4461
4462When @value{GDBN} has a local version of a system header file (ex
4463@file{string.h}) the file name based on the POSIX header prefixed with
4464@file{gdb_} (@file{gdb_string.h}).
4465
4466For other files @samp{-} is used as the separator.
4467
4468
4469@subsection Include Files
4470
4471All @file{.c} files should include @file{defs.h} first.
4472
4473All @file{.c} files should explicitly include the headers for any
4474declarations they refer to. They should not rely on files being
4475included indirectly.
4476
4477With the exception of the global definitions supplied by @file{defs.h},
4478a header file should explictily include the header declaring any
4479@code{typedefs} et.al.@: it refers to.
4480
4481@code{extern} declarations should never appear in @code{.c} files.
4482
4483All include files should be wrapped in:
4484
4485@example
4486#ifndef INCLUDE_FILE_NAME_H
4487#define INCLUDE_FILE_NAME_H
4488header body
4489#endif
4490@end example
4491
c906108c 4492
dab11f21 4493@subsection Clean Design and Portable Implementation
c906108c 4494
56caf160 4495@cindex design
c906108c 4496In addition to getting the syntax right, there's the little question of
25822942 4497semantics. Some things are done in certain ways in @value{GDBN} because long
c906108c
SS
4498experience has shown that the more obvious ways caused various kinds of
4499trouble.
4500
56caf160 4501@cindex assumptions about targets
c906108c
SS
4502You can't assume the byte order of anything that comes from a target
4503(including @var{value}s, object files, and instructions). Such things
56caf160
EZ
4504must be byte-swapped using @code{SWAP_TARGET_AND_HOST} in
4505@value{GDBN}, or one of the swap routines defined in @file{bfd.h},
4506such as @code{bfd_get_32}.
c906108c
SS
4507
4508You can't assume that you know what interface is being used to talk to
4509the target system. All references to the target must go through the
4510current @code{target_ops} vector.
4511
4512You can't assume that the host and target machines are the same machine
4513(except in the ``native'' support modules). In particular, you can't
4514assume that the target machine's header files will be available on the
4515host machine. Target code must bring along its own header files --
4516written from scratch or explicitly donated by their owner, to avoid
4517copyright problems.
4518
56caf160 4519@cindex portability
c906108c
SS
4520Insertion of new @code{#ifdef}'s will be frowned upon. It's much better
4521to write the code portably than to conditionalize it for various
4522systems.
4523
56caf160 4524@cindex system dependencies
c906108c
SS
4525New @code{#ifdef}'s which test for specific compilers or manufacturers
4526or operating systems are unacceptable. All @code{#ifdef}'s should test
4527for features. The information about which configurations contain which
4528features should be segregated into the configuration files. Experience
4529has proven far too often that a feature unique to one particular system
4530often creeps into other systems; and that a conditional based on some
4531predefined macro for your current system will become worthless over
4532time, as new versions of your system come out that behave differently
4533with regard to this feature.
4534
4535Adding code that handles specific architectures, operating systems,
af6c57ea 4536target interfaces, or hosts, is not acceptable in generic code.
c906108c 4537
dab11f21
EZ
4538@cindex portable file name handling
4539@cindex file names, portability
4540One particularly notorious area where system dependencies tend to
4541creep in is handling of file names. The mainline @value{GDBN} code
4542assumes Posix semantics of file names: absolute file names begin with
4543a forward slash @file{/}, slashes are used to separate leading
4544directories, case-sensitive file names. These assumptions are not
4545necessarily true on non-Posix systems such as MS-Windows. To avoid
4546system-dependent code where you need to take apart or construct a file
4547name, use the following portable macros:
4548
4549@table @code
4550@findex HAVE_DOS_BASED_FILE_SYSTEM
4551@item HAVE_DOS_BASED_FILE_SYSTEM
4552This preprocessing symbol is defined to a non-zero value on hosts
4553whose filesystems belong to the MS-DOS/MS-Windows family. Use this
4554symbol to write conditional code which should only be compiled for
4555such hosts.
4556
4557@findex IS_DIR_SEPARATOR
4558@item IS_DIR_SEPARATOR (@var{c}
4559Evaluates to a non-zero value if @var{c} is a directory separator
4560character. On Unix and GNU/Linux systems, only a slash @file{/} is
4561such a character, but on Windows, both @file{/} and @file{\} will
4562pass.
4563
4564@findex IS_ABSOLUTE_PATH
4565@item IS_ABSOLUTE_PATH (@var{file})
4566Evaluates to a non-zero value if @var{file} is an absolute file name.
4567For Unix and GNU/Linux hosts, a name which begins with a slash
4568@file{/} is absolute. On DOS and Windows, @file{d:/foo} and
4569@file{x:\bar} are also absolute file names.
4570
4571@findex FILENAME_CMP
4572@item FILENAME_CMP (@var{f1}, @var{f2})
4573Calls a function which compares file names @var{f1} and @var{f2} as
4574appropriate for the underlying host filesystem. For Posix systems,
4575this simply calls @code{strcmp}; on case-insensitive filesystems it
4576will call @code{strcasecmp} instead.
4577
4578@findex DIRNAME_SEPARATOR
4579@item DIRNAME_SEPARATOR
4580Evaluates to a character which separates directories in
4581@code{PATH}-style lists, typically held in environment variables.
4582This character is @samp{:} on Unix, @samp{;} on DOS and Windows.
4583
4584@findex SLASH_STRING
4585@item SLASH_STRING
4586This evaluates to a constant string you should use to produce an
4587absolute filename from leading directories and the file's basename.
4588@code{SLASH_STRING} is @code{"/"} on most systems, but might be
4589@code{"\\"} for some Windows-based ports.
4590@end table
4591
4592In addition to using these macros, be sure to use portable library
4593functions whenever possible. For example, to extract a directory or a
4594basename part from a file name, use the @code{dirname} and
4595@code{basename} library functions (available in @code{libiberty} for
4596platforms which don't provide them), instead of searching for a slash
4597with @code{strrchr}.
4598
25822942
DB
4599Another way to generalize @value{GDBN} along a particular interface is with an
4600attribute struct. For example, @value{GDBN} has been generalized to handle
56caf160
EZ
4601multiple kinds of remote interfaces---not by @code{#ifdef}s everywhere, but
4602by defining the @code{target_ops} structure and having a current target (as
c906108c
SS
4603well as a stack of targets below it, for memory references). Whenever
4604something needs to be done that depends on which remote interface we are
56caf160
EZ
4605using, a flag in the current target_ops structure is tested (e.g.,
4606@code{target_has_stack}), or a function is called through a pointer in the
c906108c 4607current target_ops structure. In this way, when a new remote interface
56caf160 4608is added, only one module needs to be touched---the one that actually
c906108c
SS
4609implements the new remote interface. Other examples of
4610attribute-structs are BFD access to multiple kinds of object file
25822942 4611formats, or @value{GDBN}'s access to multiple source languages.
c906108c 4612
56caf160
EZ
4613Please avoid duplicating code. For example, in @value{GDBN} 3.x all
4614the code interfacing between @code{ptrace} and the rest of
4615@value{GDBN} was duplicated in @file{*-dep.c}, and so changing
4616something was very painful. In @value{GDBN} 4.x, these have all been
4617consolidated into @file{infptrace.c}. @file{infptrace.c} can deal
4618with variations between systems the same way any system-independent
4619file would (hooks, @code{#if defined}, etc.), and machines which are
4620radically different don't need to use @file{infptrace.c} at all.
c906108c 4621
af6c57ea
AC
4622All debugging code must be controllable using the @samp{set debug
4623@var{module}} command. Do not use @code{printf} to print trace
4624messages. Use @code{fprintf_unfiltered(gdb_stdlog, ...}. Do not use
4625@code{#ifdef DEBUG}.
4626
c906108c 4627
8487521e 4628@node Porting GDB
c906108c 4629
25822942 4630@chapter Porting @value{GDBN}
56caf160 4631@cindex porting to new machines
c906108c 4632
56caf160
EZ
4633Most of the work in making @value{GDBN} compile on a new machine is in
4634specifying the configuration of the machine. This is done in a
4635dizzying variety of header files and configuration scripts, which we
4636hope to make more sensible soon. Let's say your new host is called an
4637@var{xyz} (e.g., @samp{sun4}), and its full three-part configuration
4638name is @code{@var{arch}-@var{xvend}-@var{xos}} (e.g.,
4639@samp{sparc-sun-sunos4}). In particular:
c906108c 4640
56caf160
EZ
4641@itemize @bullet
4642@item
c906108c
SS
4643In the top level directory, edit @file{config.sub} and add @var{arch},
4644@var{xvend}, and @var{xos} to the lists of supported architectures,
4645vendors, and operating systems near the bottom of the file. Also, add
4646@var{xyz} as an alias that maps to
4647@code{@var{arch}-@var{xvend}-@var{xos}}. You can test your changes by
4648running
4649
4650@example
4651./config.sub @var{xyz}
4652@end example
56caf160 4653
c906108c
SS
4654@noindent
4655and
56caf160 4656
c906108c
SS
4657@example
4658./config.sub @code{@var{arch}-@var{xvend}-@var{xos}}
4659@end example
56caf160 4660
c906108c
SS
4661@noindent
4662which should both respond with @code{@var{arch}-@var{xvend}-@var{xos}}
4663and no error messages.
4664
56caf160 4665@noindent
c906108c
SS
4666You need to port BFD, if that hasn't been done already. Porting BFD is
4667beyond the scope of this manual.
4668
56caf160 4669@item
25822942 4670To configure @value{GDBN} itself, edit @file{gdb/configure.host} to recognize
c906108c
SS
4671your system and set @code{gdb_host} to @var{xyz}, and (unless your
4672desired target is already available) also edit @file{gdb/configure.tgt},
4673setting @code{gdb_target} to something appropriate (for instance,
4674@var{xyz}).
4675
56caf160 4676@item
25822942 4677Finally, you'll need to specify and define @value{GDBN}'s host-, native-, and
c906108c
SS
4678target-dependent @file{.h} and @file{.c} files used for your
4679configuration.
56caf160 4680@end itemize
c906108c 4681
25822942 4682@section Configuring @value{GDBN} for Release
c906108c 4683
56caf160
EZ
4684@cindex preparing a release
4685@cindex making a distribution tarball
c906108c
SS
4686From the top level directory (containing @file{gdb}, @file{bfd},
4687@file{libiberty}, and so on):
56caf160 4688
c906108c
SS
4689@example
4690make -f Makefile.in gdb.tar.gz
4691@end example
4692
56caf160 4693@noindent
c906108c
SS
4694This will properly configure, clean, rebuild any files that are
4695distributed pre-built (e.g. @file{c-exp.tab.c} or @file{refcard.ps}),
4696and will then make a tarfile. (If the top level directory has already
4697been configured, you can just do @code{make gdb.tar.gz} instead.)
4698
4699This procedure requires:
56caf160 4700
c906108c 4701@itemize @bullet
56caf160
EZ
4702
4703@item
4704symbolic links;
4705
4706@item
4707@code{makeinfo} (texinfo2 level);
4708
4709@item
4710@TeX{};
4711
4712@item
4713@code{dvips};
4714
4715@item
4716@code{yacc} or @code{bison}.
c906108c 4717@end itemize
56caf160 4718
c906108c
SS
4719@noindent
4720@dots{} and the usual slew of utilities (@code{sed}, @code{tar}, etc.).
4721
4722@subheading TEMPORARY RELEASE PROCEDURE FOR DOCUMENTATION
4723
4724@file{gdb.texinfo} is currently marked up using the texinfo-2 macros,
4725which are not yet a default for anything (but we have to start using
4726them sometime).
4727
4728For making paper, the only thing this implies is the right generation of
4729@file{texinfo.tex} needs to be included in the distribution.
4730
4731For making info files, however, rather than duplicating the texinfo2
4732distribution, generate @file{gdb-all.texinfo} locally, and include the
4733files @file{gdb.info*} in the distribution. Note the plural;
4734@code{makeinfo} will split the document into one overall file and five
4735or so included files.
4736
085dd6e6
JM
4737@node Testsuite
4738
4739@chapter Testsuite
56caf160 4740@cindex test suite
085dd6e6 4741
56caf160
EZ
4742The testsuite is an important component of the @value{GDBN} package.
4743While it is always worthwhile to encourage user testing, in practice
4744this is rarely sufficient; users typically use only a small subset of
4745the available commands, and it has proven all too common for a change
4746to cause a significant regression that went unnoticed for some time.
085dd6e6 4747
56caf160
EZ
4748The @value{GDBN} testsuite uses the DejaGNU testing framework.
4749DejaGNU is built using @code{Tcl} and @code{expect}. The tests
4750themselves are calls to various @code{Tcl} procs; the framework runs all the
4751procs and summarizes the passes and fails.
085dd6e6
JM
4752
4753@section Using the Testsuite
4754
56caf160 4755@cindex running the test suite
25822942 4756To run the testsuite, simply go to the @value{GDBN} object directory (or to the
085dd6e6
JM
4757testsuite's objdir) and type @code{make check}. This just sets up some
4758environment variables and invokes DejaGNU's @code{runtest} script. While
4759the testsuite is running, you'll get mentions of which test file is in use,
4760and a mention of any unexpected passes or fails. When the testsuite is
4761finished, you'll get a summary that looks like this:
56caf160 4762
085dd6e6
JM
4763@example
4764 === gdb Summary ===
4765
4766# of expected passes 6016
4767# of unexpected failures 58
4768# of unexpected successes 5
4769# of expected failures 183
4770# of unresolved testcases 3
4771# of untested testcases 5
4772@end example
56caf160 4773
085dd6e6
JM
4774The ideal test run consists of expected passes only; however, reality
4775conspires to keep us from this ideal. Unexpected failures indicate
56caf160
EZ
4776real problems, whether in @value{GDBN} or in the testsuite. Expected
4777failures are still failures, but ones which have been decided are too
4778hard to deal with at the time; for instance, a test case might work
4779everywhere except on AIX, and there is no prospect of the AIX case
4780being fixed in the near future. Expected failures should not be added
4781lightly, since you may be masking serious bugs in @value{GDBN}.
4782Unexpected successes are expected fails that are passing for some
4783reason, while unresolved and untested cases often indicate some minor
4784catastrophe, such as the compiler being unable to deal with a test
4785program.
4786
4787When making any significant change to @value{GDBN}, you should run the
4788testsuite before and after the change, to confirm that there are no
4789regressions. Note that truly complete testing would require that you
4790run the testsuite with all supported configurations and a variety of
4791compilers; however this is more than really necessary. In many cases
4792testing with a single configuration is sufficient. Other useful
4793options are to test one big-endian (Sparc) and one little-endian (x86)
4794host, a cross config with a builtin simulator (powerpc-eabi,
4795mips-elf), or a 64-bit host (Alpha).
4796
4797If you add new functionality to @value{GDBN}, please consider adding
4798tests for it as well; this way future @value{GDBN} hackers can detect
4799and fix their changes that break the functionality you added.
4800Similarly, if you fix a bug that was not previously reported as a test
4801failure, please add a test case for it. Some cases are extremely
4802difficult to test, such as code that handles host OS failures or bugs
4803in particular versions of compilers, and it's OK not to try to write
4804tests for all of those.
085dd6e6
JM
4805
4806@section Testsuite Organization
4807
56caf160 4808@cindex test suite organization
085dd6e6
JM
4809The testsuite is entirely contained in @file{gdb/testsuite}. While the
4810testsuite includes some makefiles and configury, these are very minimal,
4811and used for little besides cleaning up, since the tests themselves
25822942 4812handle the compilation of the programs that @value{GDBN} will run. The file
085dd6e6 4813@file{testsuite/lib/gdb.exp} contains common utility procs useful for
25822942 4814all @value{GDBN} tests, while the directory @file{testsuite/config} contains
085dd6e6
JM
4815configuration-specific files, typically used for special-purpose
4816definitions of procs like @code{gdb_load} and @code{gdb_start}.
4817
4818The tests themselves are to be found in @file{testsuite/gdb.*} and
4819subdirectories of those. The names of the test files must always end
4820with @file{.exp}. DejaGNU collects the test files by wildcarding
4821in the test directories, so both subdirectories and individual files
4822get chosen and run in alphabetical order.
4823
4824The following table lists the main types of subdirectories and what they
4825are for. Since DejaGNU finds test files no matter where they are
4826located, and since each test file sets up its own compilation and
4827execution environment, this organization is simply for convenience and
4828intelligibility.
4829
56caf160 4830@table @file
085dd6e6 4831@item gdb.base
085dd6e6 4832This is the base testsuite. The tests in it should apply to all
25822942 4833configurations of @value{GDBN} (but generic native-only tests may live here).
085dd6e6 4834The test programs should be in the subset of C that is valid K&R,
56caf160 4835ANSI/ISO, and C++ (@code{#ifdef}s are allowed if necessary, for instance
085dd6e6
JM
4836for prototypes).
4837
4838@item gdb.@var{lang}
56caf160 4839Language-specific tests for any language @var{lang} besides C. Examples are
085dd6e6
JM
4840@file{gdb.c++} and @file{gdb.java}.
4841
4842@item gdb.@var{platform}
085dd6e6
JM
4843Non-portable tests. The tests are specific to a specific configuration
4844(host or target), such as HP-UX or eCos. Example is @file{gdb.hp}, for
4845HP-UX.
4846
4847@item gdb.@var{compiler}
085dd6e6
JM
4848Tests specific to a particular compiler. As of this writing (June
48491999), there aren't currently any groups of tests in this category that
4850couldn't just as sensibly be made platform-specific, but one could
56caf160
EZ
4851imagine a @file{gdb.gcc}, for tests of @value{GDBN}'s handling of GCC
4852extensions.
085dd6e6
JM
4853
4854@item gdb.@var{subsystem}
25822942 4855Tests that exercise a specific @value{GDBN} subsystem in more depth. For
085dd6e6
JM
4856instance, @file{gdb.disasm} exercises various disassemblers, while
4857@file{gdb.stabs} tests pathways through the stabs symbol reader.
085dd6e6
JM
4858@end table
4859
4860@section Writing Tests
56caf160 4861@cindex writing tests
085dd6e6 4862
25822942 4863In many areas, the @value{GDBN} tests are already quite comprehensive; you
085dd6e6
JM
4864should be able to copy existing tests to handle new cases.
4865
4866You should try to use @code{gdb_test} whenever possible, since it
4867includes cases to handle all the unexpected errors that might happen.
4868However, it doesn't cost anything to add new test procedures; for
4869instance, @file{gdb.base/exprs.exp} defines a @code{test_expr} that
4870calls @code{gdb_test} multiple times.
4871
4872Only use @code{send_gdb} and @code{gdb_expect} when absolutely
25822942 4873necessary, such as when @value{GDBN} has several valid responses to a command.
085dd6e6
JM
4874
4875The source language programs do @emph{not} need to be in a consistent
25822942 4876style. Since @value{GDBN} is used to debug programs written in many different
085dd6e6 4877styles, it's worth having a mix of styles in the testsuite; for
25822942 4878instance, some @value{GDBN} bugs involving the display of source lines would
085dd6e6
JM
4879never manifest themselves if the programs used GNU coding style
4880uniformly.
4881
c906108c
SS
4882@node Hints
4883
4884@chapter Hints
4885
4886Check the @file{README} file, it often has useful information that does not
4887appear anywhere else in the directory.
4888
4889@menu
25822942 4890* Getting Started:: Getting started working on @value{GDBN}
33e16fad 4891* Debugging GDB:: Debugging @value{GDBN} with itself
c906108c
SS
4892@end menu
4893
4894@node Getting Started,,, Hints
4895
4896@section Getting Started
4897
25822942 4898@value{GDBN} is a large and complicated program, and if you first starting to
c906108c
SS
4899work on it, it can be hard to know where to start. Fortunately, if you
4900know how to go about it, there are ways to figure out what is going on.
4901
25822942
DB
4902This manual, the @value{GDBN} Internals manual, has information which applies
4903generally to many parts of @value{GDBN}.
c906108c
SS
4904
4905Information about particular functions or data structures are located in
4906comments with those functions or data structures. If you run across a
4907function or a global variable which does not have a comment correctly
25822942 4908explaining what is does, this can be thought of as a bug in @value{GDBN}; feel
c906108c
SS
4909free to submit a bug report, with a suggested comment if you can figure
4910out what the comment should say. If you find a comment which is
4911actually wrong, be especially sure to report that.
4912
4913Comments explaining the function of macros defined in host, target, or
4914native dependent files can be in several places. Sometimes they are
4915repeated every place the macro is defined. Sometimes they are where the
4916macro is used. Sometimes there is a header file which supplies a
4917default definition of the macro, and the comment is there. This manual
4918also documents all the available macros.
4919@c (@pxref{Host Conditionals}, @pxref{Target
4920@c Conditionals}, @pxref{Native Conditionals}, and @pxref{Obsolete
4921@c Conditionals})
4922
56caf160
EZ
4923Start with the header files. Once you have some idea of how
4924@value{GDBN}'s internal symbol tables are stored (see @file{symtab.h},
4925@file{gdbtypes.h}), you will find it much easier to understand the
4926code which uses and creates those symbol tables.
c906108c
SS
4927
4928You may wish to process the information you are getting somehow, to
4929enhance your understanding of it. Summarize it, translate it to another
25822942 4930language, add some (perhaps trivial or non-useful) feature to @value{GDBN}, use
c906108c
SS
4931the code to predict what a test case would do and write the test case
4932and verify your prediction, etc. If you are reading code and your eyes
4933are starting to glaze over, this is a sign you need to use a more active
4934approach.
4935
25822942 4936Once you have a part of @value{GDBN} to start with, you can find more
c906108c
SS
4937specifically the part you are looking for by stepping through each
4938function with the @code{next} command. Do not use @code{step} or you
4939will quickly get distracted; when the function you are stepping through
4940calls another function try only to get a big-picture understanding
4941(perhaps using the comment at the beginning of the function being
4942called) of what it does. This way you can identify which of the
4943functions being called by the function you are stepping through is the
4944one which you are interested in. You may need to examine the data
4945structures generated at each stage, with reference to the comments in
4946the header files explaining what the data structures are supposed to
4947look like.
4948
4949Of course, this same technique can be used if you are just reading the
4950code, rather than actually stepping through it. The same general
4951principle applies---when the code you are looking at calls something
4952else, just try to understand generally what the code being called does,
4953rather than worrying about all its details.
4954
56caf160
EZ
4955@cindex command implementation
4956A good place to start when tracking down some particular area is with
4957a command which invokes that feature. Suppose you want to know how
4958single-stepping works. As a @value{GDBN} user, you know that the
4959@code{step} command invokes single-stepping. The command is invoked
4960via command tables (see @file{command.h}); by convention the function
4961which actually performs the command is formed by taking the name of
4962the command and adding @samp{_command}, or in the case of an
4963@code{info} subcommand, @samp{_info}. For example, the @code{step}
4964command invokes the @code{step_command} function and the @code{info
4965display} command invokes @code{display_info}. When this convention is
4966not followed, you might have to use @code{grep} or @kbd{M-x
4967tags-search} in emacs, or run @value{GDBN} on itself and set a
4968breakpoint in @code{execute_command}.
4969
4970@cindex @code{bug-gdb} mailing list
c906108c
SS
4971If all of the above fail, it may be appropriate to ask for information
4972on @code{bug-gdb}. But @emph{never} post a generic question like ``I was
4973wondering if anyone could give me some tips about understanding
25822942 4974@value{GDBN}''---if we had some magic secret we would put it in this manual.
c906108c
SS
4975Suggestions for improving the manual are always welcome, of course.
4976
33e16fad 4977@node Debugging GDB,,,Hints
c906108c 4978
25822942 4979@section Debugging @value{GDBN} with itself
56caf160 4980@cindex debugging @value{GDBN}
c906108c 4981
25822942 4982If @value{GDBN} is limping on your machine, this is the preferred way to get it
c906108c
SS
4983fully functional. Be warned that in some ancient Unix systems, like
4984Ultrix 4.2, a program can't be running in one process while it is being
56caf160 4985debugged in another. Rather than typing the command @kbd{@w{./gdb
c906108c 4986./gdb}}, which works on Suns and such, you can copy @file{gdb} to
56caf160 4987@file{gdb2} and then type @kbd{@w{./gdb ./gdb2}}.
c906108c 4988
25822942 4989When you run @value{GDBN} in the @value{GDBN} source directory, it will read a
c906108c
SS
4990@file{.gdbinit} file that sets up some simple things to make debugging
4991gdb easier. The @code{info} command, when executed without a subcommand
25822942 4992in a @value{GDBN} being debugged by gdb, will pop you back up to the top level
c906108c
SS
4993gdb. See @file{.gdbinit} for details.
4994
4995If you use emacs, you will probably want to do a @code{make TAGS} after
4996you configure your distribution; this will put the machine dependent
4997routines for your local machine where they will be accessed first by
4998@kbd{M-.}
4999
25822942 5000Also, make sure that you've either compiled @value{GDBN} with your local cc, or
c906108c
SS
5001have run @code{fixincludes} if you are compiling with gcc.
5002
5003@section Submitting Patches
5004
56caf160 5005@cindex submitting patches
c906108c 5006Thanks for thinking of offering your changes back to the community of
25822942 5007@value{GDBN} users. In general we like to get well designed enhancements.
c906108c
SS
5008Thanks also for checking in advance about the best way to transfer the
5009changes.
5010
25822942
DB
5011The @value{GDBN} maintainers will only install ``cleanly designed'' patches.
5012This manual summarizes what we believe to be clean design for @value{GDBN}.
c906108c
SS
5013
5014If the maintainers don't have time to put the patch in when it arrives,
5015or if there is any question about a patch, it goes into a large queue
5016with everyone else's patches and bug reports.
5017
56caf160 5018@cindex legal papers for code contributions
c906108c
SS
5019The legal issue is that to incorporate substantial changes requires a
5020copyright assignment from you and/or your employer, granting ownership
5021of the changes to the Free Software Foundation. You can get the
9e0b60a8
JM
5022standard documents for doing this by sending mail to @code{gnu@@gnu.org}
5023and asking for it. We recommend that people write in "All programs
5024owned by the Free Software Foundation" as "NAME OF PROGRAM", so that
56caf160
EZ
5025changes in many programs (not just @value{GDBN}, but GAS, Emacs, GCC,
5026etc) can be
9e0b60a8 5027contributed with only one piece of legalese pushed through the
be9c6c35 5028bureaucracy and filed with the FSF. We can't start merging changes until
9e0b60a8
JM
5029this paperwork is received by the FSF (their rules, which we follow
5030since we maintain it for them).
c906108c
SS
5031
5032Technically, the easiest way to receive changes is to receive each
56caf160
EZ
5033feature as a small context diff or unidiff, suitable for @code{patch}.
5034Each message sent to me should include the changes to C code and
5035header files for a single feature, plus @file{ChangeLog} entries for
5036each directory where files were modified, and diffs for any changes
5037needed to the manuals (@file{gdb/doc/gdb.texinfo} or
5038@file{gdb/doc/gdbint.texinfo}). If there are a lot of changes for a
5039single feature, they can be split down into multiple messages.
9e0b60a8
JM
5040
5041In this way, if we read and like the feature, we can add it to the
c906108c 5042sources with a single patch command, do some testing, and check it in.
56caf160
EZ
5043If you leave out the @file{ChangeLog}, we have to write one. If you leave
5044out the doc, we have to puzzle out what needs documenting. Etc., etc.
c906108c 5045
9e0b60a8
JM
5046The reason to send each change in a separate message is that we will not
5047install some of the changes. They'll be returned to you with questions
5048or comments. If we're doing our job correctly, the message back to you
c906108c 5049will say what you have to fix in order to make the change acceptable.
9e0b60a8
JM
5050The reason to have separate messages for separate features is so that
5051the acceptable changes can be installed while one or more changes are
5052being reworked. If multiple features are sent in a single message, we
5053tend to not put in the effort to sort out the acceptable changes from
5054the unacceptable, so none of the features get installed until all are
5055acceptable.
5056
5057If this sounds painful or authoritarian, well, it is. But we get a lot
5058of bug reports and a lot of patches, and many of them don't get
5059installed because we don't have the time to finish the job that the bug
c906108c
SS
5060reporter or the contributor could have done. Patches that arrive
5061complete, working, and well designed, tend to get installed on the day
9e0b60a8
JM
5062they arrive. The others go into a queue and get installed as time
5063permits, which, since the maintainers have many demands to meet, may not
5064be for quite some time.
c906108c 5065
56caf160
EZ
5066Please send patches directly to
5067@email{gdb-patches@@sourceware.cygnus.com, the @value{GDBN} maintainers}.
c906108c
SS
5068
5069@section Obsolete Conditionals
56caf160 5070@cindex obsolete code
c906108c 5071
25822942 5072Fragments of old code in @value{GDBN} sometimes reference or set the following
c906108c
SS
5073configuration macros. They should not be used by new code, and old uses
5074should be removed as those parts of the debugger are otherwise touched.
5075
5076@table @code
c906108c
SS
5077@item STACK_END_ADDR
5078This macro used to define where the end of the stack appeared, for use
5079in interpreting core file formats that don't record this address in the
25822942
DB
5080core file itself. This information is now configured in BFD, and @value{GDBN}
5081gets the info portably from there. The values in @value{GDBN}'s configuration
c906108c 5082files should be moved into BFD configuration files (if needed there),
25822942 5083and deleted from all of @value{GDBN}'s config files.
c906108c
SS
5084
5085Any @file{@var{foo}-xdep.c} file that references STACK_END_ADDR
5086is so old that it has never been converted to use BFD. Now that's old!
5087
5088@item PYRAMID_CONTROL_FRAME_DEBUGGING
5089pyr-xdep.c
5090@item PYRAMID_CORE
5091pyr-xdep.c
5092@item PYRAMID_PTRACE
5093pyr-xdep.c
5094
5095@item REG_STACK_SEGMENT
5096exec.c
5097
5098@end table
5099
56caf160
EZ
5100@node Index
5101@unnumbered Index
5102
5103@printindex cp
5104
449f3b6c
AC
5105@c TeX can handle the contents at the start but makeinfo 3.12 can not
5106@ifinfo
c906108c 5107@contents
449f3b6c
AC
5108@end ifinfo
5109@ifhtml
5110@contents
5111@end ifhtml
5112
c906108c 5113@bye
This page took 0.347149 seconds and 4 git commands to generate.