*** empty log message ***
[deliverable/binutils-gdb.git] / gdb / doc / gdbint.texinfo
CommitLineData
9742079a 1\input texinfo @c -*- texinfo -*-
c906108c 2@setfilename gdbint.info
25822942 3@include gdb-cfg.texi
03727ca6 4@dircategory Software development
e9c75b65 5@direntry
c906108c 6* Gdb-Internals: (gdbint). The GNU debugger's internals.
e9c75b65 7@end direntry
c906108c
SS
8
9@ifinfo
25822942 10This file documents the internals of the GNU debugger @value{GDBN}.
c02a867d 11Copyright (C) 1990, 1991, 1992, 1993, 1994, 1996, 1998, 1999, 2000, 2001,
c91d38aa 12 2002, 2003, 2004, 2005, 2006
e9c75b65 13 Free Software Foundation, Inc.
c906108c
SS
14Contributed by Cygnus Solutions. Written by John Gilmore.
15Second Edition by Stan Shebs.
16
e9c75b65
EZ
17Permission is granted to copy, distribute and/or modify this document
18under the terms of the GNU Free Documentation License, Version 1.1 or
2a6585f0 19any later version published by the Free Software Foundation; with no
e5249f67
AC
20Invariant Sections, with no Front-Cover Texts, and with no Back-Cover
21Texts. A copy of the license is included in the section entitled ``GNU
22Free Documentation License''.
c906108c
SS
23@end ifinfo
24
25@setchapternewpage off
25822942 26@settitle @value{GDBN} Internals
c906108c 27
56caf160
EZ
28@syncodeindex fn cp
29@syncodeindex vr cp
30
c906108c 31@titlepage
25822942 32@title @value{GDBN} Internals
c906108c
SS
33@subtitle{A guide to the internals of the GNU debugger}
34@author John Gilmore
35@author Cygnus Solutions
36@author Second Edition:
37@author Stan Shebs
38@author Cygnus Solutions
39@page
40@tex
41\def\$#1${{#1}} % Kluge: collect RCS revision info without $...$
42\xdef\manvers{\$Revision$} % For use in headers, footers too
43{\parskip=0pt
44\hfill Cygnus Solutions\par
45\hfill \manvers\par
46\hfill \TeX{}info \texinfoversion\par
47}
48@end tex
49
50@vskip 0pt plus 1filll
1e698235 51Copyright @copyright{} 1990,1991,1992,1993,1994,1996,1998,1999,2000,2001,
c91d38aa 52 2002, 2003, 2004, 2005, 2006 Free Software Foundation, Inc.
c906108c 53
e9c75b65
EZ
54Permission is granted to copy, distribute and/or modify this document
55under the terms of the GNU Free Documentation License, Version 1.1 or
2a6585f0 56any later version published by the Free Software Foundation; with no
e5249f67
AC
57Invariant Sections, with no Front-Cover Texts, and with no Back-Cover
58Texts. A copy of the license is included in the section entitled ``GNU
59Free Documentation License''.
c906108c
SS
60@end titlepage
61
449f3b6c 62@contents
449f3b6c 63
c906108c
SS
64@node Top
65@c Perhaps this should be the title of the document (but only for info,
66@c not for TeX). Existing GNU manuals seem inconsistent on this point.
67@top Scope of this Document
68
25822942
DB
69This document documents the internals of the GNU debugger, @value{GDBN}. It
70includes description of @value{GDBN}'s key algorithms and operations, as well
71as the mechanisms that adapt @value{GDBN} to specific hosts and targets.
c906108c
SS
72
73@menu
74* Requirements::
75* Overall Structure::
76* Algorithms::
77* User Interface::
89437448 78* libgdb::
c906108c
SS
79* Symbol Handling::
80* Language Support::
81* Host Definition::
82* Target Architecture Definition::
83* Target Vector Definition::
84* Native Debugging::
85* Support Libraries::
86* Coding::
87* Porting GDB::
d52fe014 88* Versions and Branches::
55f6ca0f 89* Start of New Year Procedure::
8973da3a 90* Releasing GDB::
085dd6e6 91* Testsuite::
c906108c 92* Hints::
aab4e0ec 93
bcd7e15f 94* GDB Observers:: @value{GDBN} Currently available observers
aab4e0ec 95* GNU Free Documentation License:: The license for this documentation
56caf160 96* Index::
c906108c
SS
97@end menu
98
99@node Requirements
100
101@chapter Requirements
56caf160 102@cindex requirements for @value{GDBN}
c906108c
SS
103
104Before diving into the internals, you should understand the formal
56caf160
EZ
105requirements and other expectations for @value{GDBN}. Although some
106of these may seem obvious, there have been proposals for @value{GDBN}
107that have run counter to these requirements.
c906108c 108
56caf160
EZ
109First of all, @value{GDBN} is a debugger. It's not designed to be a
110front panel for embedded systems. It's not a text editor. It's not a
111shell. It's not a programming environment.
c906108c 112
56caf160
EZ
113@value{GDBN} is an interactive tool. Although a batch mode is
114available, @value{GDBN}'s primary role is to interact with a human
115programmer.
c906108c 116
56caf160
EZ
117@value{GDBN} should be responsive to the user. A programmer hot on
118the trail of a nasty bug, and operating under a looming deadline, is
119going to be very impatient of everything, including the response time
120to debugger commands.
c906108c 121
56caf160
EZ
122@value{GDBN} should be relatively permissive, such as for expressions.
123While the compiler should be picky (or have the option to be made
be9c6c35 124picky), since source code lives for a long time usually, the
56caf160
EZ
125programmer doing debugging shouldn't be spending time figuring out to
126mollify the debugger.
c906108c 127
56caf160
EZ
128@value{GDBN} will be called upon to deal with really large programs.
129Executable sizes of 50 to 100 megabytes occur regularly, and we've
130heard reports of programs approaching 1 gigabyte in size.
c906108c 131
56caf160
EZ
132@value{GDBN} should be able to run everywhere. No other debugger is
133available for even half as many configurations as @value{GDBN}
134supports.
c906108c
SS
135
136
137@node Overall Structure
138
139@chapter Overall Structure
140
56caf160
EZ
141@value{GDBN} consists of three major subsystems: user interface,
142symbol handling (the @dfn{symbol side}), and target system handling (the
143@dfn{target side}).
c906108c 144
2e685b93 145The user interface consists of several actual interfaces, plus
c906108c
SS
146supporting code.
147
148The symbol side consists of object file readers, debugging info
149interpreters, symbol table management, source language expression
150parsing, type and value printing.
151
152The target side consists of execution control, stack frame analysis, and
153physical target manipulation.
154
155The target side/symbol side division is not formal, and there are a
156number of exceptions. For instance, core file support involves symbolic
157elements (the basic core file reader is in BFD) and target elements (it
158supplies the contents of memory and the values of registers). Instead,
159this division is useful for understanding how the minor subsystems
160should fit together.
161
162@section The Symbol Side
163
56caf160
EZ
164The symbolic side of @value{GDBN} can be thought of as ``everything
165you can do in @value{GDBN} without having a live program running''.
166For instance, you can look at the types of variables, and evaluate
167many kinds of expressions.
c906108c
SS
168
169@section The Target Side
170
56caf160
EZ
171The target side of @value{GDBN} is the ``bits and bytes manipulator''.
172Although it may make reference to symbolic info here and there, most
173of the target side will run with only a stripped executable
174available---or even no executable at all, in remote debugging cases.
c906108c
SS
175
176Operations such as disassembly, stack frame crawls, and register
177display, are able to work with no symbolic info at all. In some cases,
25822942 178such as disassembly, @value{GDBN} will use symbolic info to present addresses
c906108c
SS
179relative to symbols rather than as raw numbers, but it will work either
180way.
181
182@section Configurations
183
56caf160
EZ
184@cindex host
185@cindex target
25822942 186@dfn{Host} refers to attributes of the system where @value{GDBN} runs.
c906108c
SS
187@dfn{Target} refers to the system where the program being debugged
188executes. In most cases they are the same machine, in which case a
189third type of @dfn{Native} attributes come into play.
190
191Defines and include files needed to build on the host are host support.
192Examples are tty support, system defined types, host byte order, host
193float format.
194
195Defines and information needed to handle the target format are target
196dependent. Examples are the stack frame format, instruction set,
197breakpoint instruction, registers, and how to set up and tear down the stack
198to call a function.
199
200Information that is only needed when the host and target are the same,
201is native dependent. One example is Unix child process support; if the
202host and target are not the same, doing a fork to start the target
203process is a bad idea. The various macros needed for finding the
204registers in the @code{upage}, running @code{ptrace}, and such are all
205in the native-dependent files.
206
207Another example of native-dependent code is support for features that
208are really part of the target environment, but which require
209@code{#include} files that are only available on the host system. Core
210file handling and @code{setjmp} handling are two common cases.
211
25822942 212When you want to make @value{GDBN} work ``native'' on a particular machine, you
c906108c
SS
213have to include all three kinds of information.
214
215
216@node Algorithms
217
218@chapter Algorithms
56caf160 219@cindex algorithms
c906108c 220
56caf160
EZ
221@value{GDBN} uses a number of debugging-specific algorithms. They are
222often not very complicated, but get lost in the thicket of special
223cases and real-world issues. This chapter describes the basic
224algorithms and mentions some of the specific target definitions that
225they use.
c906108c
SS
226
227@section Frames
228
56caf160
EZ
229@cindex frame
230@cindex call stack frame
231A frame is a construct that @value{GDBN} uses to keep track of calling
232and called functions.
c906108c 233
410dd08e 234@cindex frame, unwind
c5e30d01
AC
235@value{GDBN}'s frame model, a fresh design, was implemented with the
236need to support @sc{dwarf}'s Call Frame Information in mind. In fact,
237the term ``unwind'' is taken directly from that specification.
238Developers wishing to learn more about unwinders, are encouraged to
239read the the @sc{dwarf} specification.
410dd08e
JB
240
241@findex frame_register_unwind
c5e30d01
AC
242@findex get_frame_register
243@value{GDBN}'s model is that you find a frame's registers by
244``unwinding'' them from the next younger frame. That is,
245@samp{get_frame_register} which returns the value of a register in
246frame #1 (the next-to-youngest frame), is implemented by calling frame
247#0's @code{frame_register_unwind} (the youngest frame). But then the
248obvious question is: how do you access the registers of the youngest
249frame itself?
410dd08e
JB
250
251@cindex sentinel frame
252@findex get_frame_type
253@vindex SENTINEL_FRAME
254To answer this question, GDB has the @dfn{sentinel} frame, the
255``-1st'' frame. Unwinding registers from the sentinel frame gives you
256the current values of the youngest real frame's registers. If @var{f}
257is a sentinel frame, then @code{get_frame_type (@var{f}) ==
258SENTINEL_FRAME}.
259
7d30c22d
JB
260@section Prologue Analysis
261
262@cindex prologue analysis
263@cindex call frame information
264@cindex CFI (call frame information)
265To produce a backtrace and allow the user to manipulate older frames'
266variables and arguments, @value{GDBN} needs to find the base addresses
267of older frames, and discover where those frames' registers have been
268saved. Since a frame's ``callee-saves'' registers get saved by
269younger frames if and when they're reused, a frame's registers may be
270scattered unpredictably across younger frames. This means that
271changing the value of a register-allocated variable in an older frame
272may actually entail writing to a save slot in some younger frame.
273
274Modern versions of GCC emit Dwarf call frame information (``CFI''),
275which describes how to find frame base addresses and saved registers.
276But CFI is not always available, so as a fallback @value{GDBN} uses a
277technique called @dfn{prologue analysis} to find frame sizes and saved
278registers. A prologue analyzer disassembles the function's machine
279code starting from its entry point, and looks for instructions that
280allocate frame space, save the stack pointer in a frame pointer
281register, save registers, and so on. Obviously, this can't be done
b247355e 282accurately in general, but it's tractable to do well enough to be very
7d30c22d
JB
283helpful. Prologue analysis predates the GNU toolchain's support for
284CFI; at one time, prologue analysis was the only mechanism
285@value{GDBN} used for stack unwinding at all, when the function
286calling conventions didn't specify a fixed frame layout.
287
288In the olden days, function prologues were generated by hand-written,
289target-specific code in GCC, and treated as opaque and untouchable by
290optimizers. Looking at this code, it was usually straightforward to
291write a prologue analyzer for @value{GDBN} that would accurately
292understand all the prologues GCC would generate. However, over time
293GCC became more aggressive about instruction scheduling, and began to
294understand more about the semantics of the prologue instructions
295themselves; in response, @value{GDBN}'s analyzers became more complex
296and fragile. Keeping the prologue analyzers working as GCC (and the
297instruction sets themselves) evolved became a substantial task.
298
299@cindex @file{prologue-value.c}
300@cindex abstract interpretation of function prologues
301@cindex pseudo-evaluation of function prologues
302To try to address this problem, the code in @file{prologue-value.h}
303and @file{prologue-value.c} provides a general framework for writing
304prologue analyzers that are simpler and more robust than ad-hoc
305analyzers. When we analyze a prologue using the prologue-value
306framework, we're really doing ``abstract interpretation'' or
307``pseudo-evaluation'': running the function's code in simulation, but
308using conservative approximations of the values registers and memory
309would hold when the code actually runs. For example, if our function
310starts with the instruction:
311
312@example
313addi r1, 42 # add 42 to r1
314@end example
315@noindent
316we don't know exactly what value will be in @code{r1} after executing
317this instruction, but we do know it'll be 42 greater than its original
318value.
319
320If we then see an instruction like:
321
322@example
323addi r1, 22 # add 22 to r1
324@end example
325@noindent
326we still don't know what @code{r1's} value is, but again, we can say
327it is now 64 greater than its original value.
328
329If the next instruction were:
330
331@example
332mov r2, r1 # set r2 to r1's value
333@end example
334@noindent
335then we can say that @code{r2's} value is now the original value of
336@code{r1} plus 64.
337
338It's common for prologues to save registers on the stack, so we'll
339need to track the values of stack frame slots, as well as the
340registers. So after an instruction like this:
341
342@example
343mov (fp+4), r2
344@end example
345@noindent
346then we'd know that the stack slot four bytes above the frame pointer
347holds the original value of @code{r1} plus 64.
348
349And so on.
350
351Of course, this can only go so far before it gets unreasonable. If we
352wanted to be able to say anything about the value of @code{r1} after
353the instruction:
354
355@example
356xor r1, r3 # exclusive-or r1 and r3, place result in r1
357@end example
358@noindent
359then things would get pretty complex. But remember, we're just doing
360a conservative approximation; if exclusive-or instructions aren't
361relevant to prologues, we can just say @code{r1}'s value is now
362``unknown''. We can ignore things that are too complex, if that loss of
363information is acceptable for our application.
364
365So when we say ``conservative approximation'' here, what we mean is an
366approximation that is either accurate, or marked ``unknown'', but
367never inaccurate.
368
369Using this framework, a prologue analyzer is simply an interpreter for
370machine code, but one that uses conservative approximations for the
371contents of registers and memory instead of actual values. Starting
372from the function's entry point, you simulate instructions up to the
373current PC, or an instruction that you don't know how to simulate.
374Now you can examine the state of the registers and stack slots you've
375kept track of.
376
377@itemize @bullet
378
379@item
380To see how large your stack frame is, just check the value of the
381stack pointer register; if it's the original value of the SP
382minus a constant, then that constant is the stack frame's size.
383If the SP's value has been marked as ``unknown'', then that means
384the prologue has done something too complex for us to track, and
385we don't know the frame size.
386
387@item
388To see where we've saved the previous frame's registers, we just
389search the values we've tracked --- stack slots, usually, but
390registers, too, if you want --- for something equal to the register's
391original value. If the calling conventions suggest a standard place
392to save a given register, then we can check there first, but really,
393anything that will get us back the original value will probably work.
394@end itemize
395
396This does take some work. But prologue analyzers aren't
397quick-and-simple pattern patching to recognize a few fixed prologue
398forms any more; they're big, hairy functions. Along with inferior
399function calls, prologue analysis accounts for a substantial portion
400of the time needed to stabilize a @value{GDBN} port. So it's
401worthwhile to look for an approach that will be easier to understand
402and maintain. In the approach described above:
403
404@itemize @bullet
405
406@item
407It's easier to see that the analyzer is correct: you just see
b247355e 408whether the analyzer properly (albeit conservatively) simulates
7d30c22d
JB
409the effect of each instruction.
410
411@item
412It's easier to extend the analyzer: you can add support for new
413instructions, and know that you haven't broken anything that
414wasn't already broken before.
415
416@item
417It's orthogonal: to gather new information, you don't need to
418complicate the code for each instruction. As long as your domain
419of conservative values is already detailed enough to tell you
420what you need, then all the existing instruction simulations are
421already gathering the right data for you.
422
423@end itemize
424
425The file @file{prologue-value.h} contains detailed comments explaining
426the framework and how to use it.
427
428
c906108c
SS
429@section Breakpoint Handling
430
56caf160 431@cindex breakpoints
c906108c
SS
432In general, a breakpoint is a user-designated location in the program
433where the user wants to regain control if program execution ever reaches
434that location.
435
436There are two main ways to implement breakpoints; either as ``hardware''
437breakpoints or as ``software'' breakpoints.
438
56caf160
EZ
439@cindex hardware breakpoints
440@cindex program counter
c906108c
SS
441Hardware breakpoints are sometimes available as a builtin debugging
442features with some chips. Typically these work by having dedicated
443register into which the breakpoint address may be stored. If the PC
56caf160 444(shorthand for @dfn{program counter})
c906108c 445ever matches a value in a breakpoint registers, the CPU raises an
56caf160
EZ
446exception and reports it to @value{GDBN}.
447
448Another possibility is when an emulator is in use; many emulators
449include circuitry that watches the address lines coming out from the
450processor, and force it to stop if the address matches a breakpoint's
451address.
452
453A third possibility is that the target already has the ability to do
454breakpoints somehow; for instance, a ROM monitor may do its own
455software breakpoints. So although these are not literally ``hardware
456breakpoints'', from @value{GDBN}'s point of view they work the same;
50e3ee83 457@value{GDBN} need not do anything more than set the breakpoint and wait
56caf160 458for something to happen.
c906108c
SS
459
460Since they depend on hardware resources, hardware breakpoints may be
56caf160 461limited in number; when the user asks for more, @value{GDBN} will
9742079a 462start trying to set software breakpoints. (On some architectures,
937f164b 463notably the 32-bit x86 platforms, @value{GDBN} cannot always know
9742079a
EZ
464whether there's enough hardware resources to insert all the hardware
465breakpoints and watchpoints. On those platforms, @value{GDBN} prints
466an error message only when the program being debugged is continued.)
56caf160
EZ
467
468@cindex software breakpoints
469Software breakpoints require @value{GDBN} to do somewhat more work.
470The basic theory is that @value{GDBN} will replace a program
471instruction with a trap, illegal divide, or some other instruction
472that will cause an exception, and then when it's encountered,
473@value{GDBN} will take the exception and stop the program. When the
474user says to continue, @value{GDBN} will restore the original
c906108c
SS
475instruction, single-step, re-insert the trap, and continue on.
476
477Since it literally overwrites the program being tested, the program area
be9c6c35 478must be writable, so this technique won't work on programs in ROM. It
c906108c 479can also distort the behavior of programs that examine themselves,
56caf160 480although such a situation would be highly unusual.
c906108c
SS
481
482Also, the software breakpoint instruction should be the smallest size of
483instruction, so it doesn't overwrite an instruction that might be a jump
484target, and cause disaster when the program jumps into the middle of the
485breakpoint instruction. (Strictly speaking, the breakpoint must be no
486larger than the smallest interval between instructions that may be jump
487targets; perhaps there is an architecture where only even-numbered
488instructions may jumped to.) Note that it's possible for an instruction
489set not to have any instructions usable for a software breakpoint,
490although in practice only the ARC has failed to define such an
491instruction.
492
56caf160 493@findex BREAKPOINT
c906108c
SS
494The basic definition of the software breakpoint is the macro
495@code{BREAKPOINT}.
496
497Basic breakpoint object handling is in @file{breakpoint.c}. However,
498much of the interesting breakpoint action is in @file{infrun.c}.
499
8181d85f
DJ
500@table @code
501@cindex insert or remove software breakpoint
502@findex target_remove_breakpoint
503@findex target_insert_breakpoint
504@item target_remove_breakpoint (@var{bp_tgt})
505@itemx target_insert_breakpoint (@var{bp_tgt})
506Insert or remove a software breakpoint at address
507@code{@var{bp_tgt}->placed_address}. Returns zero for success,
508non-zero for failure. On input, @var{bp_tgt} contains the address of the
509breakpoint, and is otherwise initialized to zero. The fields of the
510@code{struct bp_target_info} pointed to by @var{bp_tgt} are updated
511to contain other information about the breakpoint on output. The field
512@code{placed_address} may be updated if the breakpoint was placed at a
513related address; the field @code{shadow_contents} contains the real
514contents of the bytes where the breakpoint has been inserted,
515if reading memory would return the breakpoint instead of the
516underlying memory; the field @code{shadow_len} is the length of
517memory cached in @code{shadow_contents}, if any; and the field
518@code{placed_size} is optionally set and used by the target, if
519it could differ from @code{shadow_len}.
520
521For example, the remote target @samp{Z0} packet does not require
522shadowing memory, so @code{shadow_len} is left at zero. However,
523the length reported by @code{BREAKPOINT_FROM_PC} is cached in
524@code{placed_size}, so that a matching @samp{z0} packet can be
525used to remove the breakpoint.
526
527@cindex insert or remove hardware breakpoint
528@findex target_remove_hw_breakpoint
529@findex target_insert_hw_breakpoint
530@item target_remove_hw_breakpoint (@var{bp_tgt})
531@itemx target_insert_hw_breakpoint (@var{bp_tgt})
532Insert or remove a hardware-assisted breakpoint at address
533@code{@var{bp_tgt}->placed_address}. Returns zero for success,
534non-zero for failure. See @code{target_insert_breakpoint} for
535a description of the @code{struct bp_target_info} pointed to by
536@var{bp_tgt}; the @code{shadow_contents} and
537@code{shadow_len} members are not used for hardware breakpoints,
538but @code{placed_size} may be.
539@end table
540
c906108c
SS
541@section Single Stepping
542
543@section Signal Handling
544
545@section Thread Handling
546
547@section Inferior Function Calls
548
549@section Longjmp Support
550
56caf160 551@cindex @code{longjmp} debugging
25822942 552@value{GDBN} has support for figuring out that the target is doing a
c906108c
SS
553@code{longjmp} and for stopping at the target of the jump, if we are
554stepping. This is done with a few specialized internal breakpoints,
56caf160
EZ
555which are visible in the output of the @samp{maint info breakpoint}
556command.
c906108c 557
56caf160 558@findex GET_LONGJMP_TARGET
c906108c
SS
559To make this work, you need to define a macro called
560@code{GET_LONGJMP_TARGET}, which will examine the @code{jmp_buf}
561structure and extract the longjmp target address. Since @code{jmp_buf}
562is target specific, you will need to define it in the appropriate
56caf160 563@file{tm-@var{target}.h} file. Look in @file{tm-sun4os4.h} and
c906108c
SS
564@file{sparc-tdep.c} for examples of how to do this.
565
9742079a
EZ
566@section Watchpoints
567@cindex watchpoints
568
569Watchpoints are a special kind of breakpoints (@pxref{Algorithms,
570breakpoints}) which break when data is accessed rather than when some
571instruction is executed. When you have data which changes without
572your knowing what code does that, watchpoints are the silver bullet to
573hunt down and kill such bugs.
574
575@cindex hardware watchpoints
576@cindex software watchpoints
577Watchpoints can be either hardware-assisted or not; the latter type is
578known as ``software watchpoints.'' @value{GDBN} always uses
579hardware-assisted watchpoints if they are available, and falls back on
580software watchpoints otherwise. Typical situations where @value{GDBN}
581will use software watchpoints are:
582
583@itemize @bullet
584@item
585The watched memory region is too large for the underlying hardware
586watchpoint support. For example, each x86 debug register can watch up
587to 4 bytes of memory, so trying to watch data structures whose size is
588more than 16 bytes will cause @value{GDBN} to use software
589watchpoints.
590
591@item
592The value of the expression to be watched depends on data held in
593registers (as opposed to memory).
594
595@item
596Too many different watchpoints requested. (On some architectures,
597this situation is impossible to detect until the debugged program is
598resumed.) Note that x86 debug registers are used both for hardware
599breakpoints and for watchpoints, so setting too many hardware
600breakpoints might cause watchpoint insertion to fail.
601
602@item
603No hardware-assisted watchpoints provided by the target
604implementation.
605@end itemize
606
607Software watchpoints are very slow, since @value{GDBN} needs to
608single-step the program being debugged and test the value of the
609watched expression(s) after each instruction. The rest of this
610section is mostly irrelevant for software watchpoints.
611
b6b8ece6
EZ
612When the inferior stops, @value{GDBN} tries to establish, among other
613possible reasons, whether it stopped due to a watchpoint being hit.
614For a data-write watchpoint, it does so by evaluating, for each
615watchpoint, the expression whose value is being watched, and testing
616whether the watched value has changed. For data-read and data-access
617watchpoints, @value{GDBN} needs the target to supply a primitive that
618returns the address of the data that was accessed or read (see the
619description of @code{target_stopped_data_address} below): if this
620primitive returns a valid address, @value{GDBN} infers that a
621watchpoint triggered if it watches an expression whose evaluation uses
622that address.
623
9742079a
EZ
624@value{GDBN} uses several macros and primitives to support hardware
625watchpoints:
626
627@table @code
628@findex TARGET_HAS_HARDWARE_WATCHPOINTS
629@item TARGET_HAS_HARDWARE_WATCHPOINTS
630If defined, the target supports hardware watchpoints.
631
632@findex TARGET_CAN_USE_HARDWARE_WATCHPOINT
633@item TARGET_CAN_USE_HARDWARE_WATCHPOINT (@var{type}, @var{count}, @var{other})
634Return the number of hardware watchpoints of type @var{type} that are
635possible to be set. The value is positive if @var{count} watchpoints
636of this type can be set, zero if setting watchpoints of this type is
637not supported, and negative if @var{count} is more than the maximum
638number of watchpoints of type @var{type} that can be set. @var{other}
639is non-zero if other types of watchpoints are currently enabled (there
640are architectures which cannot set watchpoints of different types at
641the same time).
642
643@findex TARGET_REGION_OK_FOR_HW_WATCHPOINT
644@item TARGET_REGION_OK_FOR_HW_WATCHPOINT (@var{addr}, @var{len})
645Return non-zero if hardware watchpoints can be used to watch a region
646whose address is @var{addr} and whose length in bytes is @var{len}.
647
b6b8ece6 648@cindex insert or remove hardware watchpoint
9742079a
EZ
649@findex target_insert_watchpoint
650@findex target_remove_watchpoint
651@item target_insert_watchpoint (@var{addr}, @var{len}, @var{type})
652@itemx target_remove_watchpoint (@var{addr}, @var{len}, @var{type})
653Insert or remove a hardware watchpoint starting at @var{addr}, for
654@var{len} bytes. @var{type} is the watchpoint type, one of the
655possible values of the enumerated data type @code{target_hw_bp_type},
656defined by @file{breakpoint.h} as follows:
657
474c8240 658@smallexample
9742079a
EZ
659 enum target_hw_bp_type
660 @{
661 hw_write = 0, /* Common (write) HW watchpoint */
662 hw_read = 1, /* Read HW watchpoint */
663 hw_access = 2, /* Access (read or write) HW watchpoint */
664 hw_execute = 3 /* Execute HW breakpoint */
665 @};
474c8240 666@end smallexample
9742079a
EZ
667
668@noindent
669These two macros should return 0 for success, non-zero for failure.
670
9742079a 671@findex target_stopped_data_address
ac77d04f
JJ
672@item target_stopped_data_address (@var{addr_p})
673If the inferior has some watchpoint that triggered, place the address
674associated with the watchpoint at the location pointed to by
b6b8ece6
EZ
675@var{addr_p} and return non-zero. Otherwise, return zero. Note that
676this primitive is used by @value{GDBN} only on targets that support
677data-read or data-access type watchpoints, so targets that have
678support only for data-write watchpoints need not implement these
679primitives.
9742079a 680
9742079a
EZ
681@findex HAVE_STEPPABLE_WATCHPOINT
682@item HAVE_STEPPABLE_WATCHPOINT
683If defined to a non-zero value, it is not necessary to disable a
684watchpoint to step over it.
685
686@findex HAVE_NONSTEPPABLE_WATCHPOINT
687@item HAVE_NONSTEPPABLE_WATCHPOINT
688If defined to a non-zero value, @value{GDBN} should disable a
689watchpoint to step the inferior over it.
690
691@findex HAVE_CONTINUABLE_WATCHPOINT
692@item HAVE_CONTINUABLE_WATCHPOINT
693If defined to a non-zero value, it is possible to continue the
694inferior after a watchpoint has been hit.
695
696@findex CANNOT_STEP_HW_WATCHPOINTS
697@item CANNOT_STEP_HW_WATCHPOINTS
698If this is defined to a non-zero value, @value{GDBN} will remove all
699watchpoints before stepping the inferior.
700
701@findex STOPPED_BY_WATCHPOINT
702@item STOPPED_BY_WATCHPOINT (@var{wait_status})
703Return non-zero if stopped by a watchpoint. @var{wait_status} is of
704the type @code{struct target_waitstatus}, defined by @file{target.h}.
b6b8ece6
EZ
705Normally, this macro is defined to invoke the function pointed to by
706the @code{to_stopped_by_watchpoint} member of the structure (of the
707type @code{target_ops}, defined on @file{target.h}) that describes the
708target-specific operations; @code{to_stopped_by_watchpoint} ignores
709the @var{wait_status} argument.
710
711@value{GDBN} does not require the non-zero value returned by
712@code{STOPPED_BY_WATCHPOINT} to be 100% correct, so if a target cannot
713determine for sure whether the inferior stopped due to a watchpoint,
714it could return non-zero ``just in case''.
9742079a
EZ
715@end table
716
717@subsection x86 Watchpoints
718@cindex x86 debug registers
719@cindex watchpoints, on x86
720
721The 32-bit Intel x86 (a.k.a.@: ia32) processors feature special debug
722registers designed to facilitate debugging. @value{GDBN} provides a
723generic library of functions that x86-based ports can use to implement
724support for watchpoints and hardware-assisted breakpoints. This
725subsection documents the x86 watchpoint facilities in @value{GDBN}.
726
727To use the generic x86 watchpoint support, a port should do the
728following:
729
730@itemize @bullet
731@findex I386_USE_GENERIC_WATCHPOINTS
732@item
733Define the macro @code{I386_USE_GENERIC_WATCHPOINTS} somewhere in the
734target-dependent headers.
735
736@item
737Include the @file{config/i386/nm-i386.h} header file @emph{after}
738defining @code{I386_USE_GENERIC_WATCHPOINTS}.
739
740@item
741Add @file{i386-nat.o} to the value of the Make variable
742@code{NATDEPFILES} (@pxref{Native Debugging, NATDEPFILES}) or
743@code{TDEPFILES} (@pxref{Target Architecture Definition, TDEPFILES}).
744
745@item
746Provide implementations for the @code{I386_DR_LOW_*} macros described
747below. Typically, each macro should call a target-specific function
748which does the real work.
749@end itemize
750
751The x86 watchpoint support works by maintaining mirror images of the
752debug registers. Values are copied between the mirror images and the
753real debug registers via a set of macros which each target needs to
754provide:
755
756@table @code
757@findex I386_DR_LOW_SET_CONTROL
758@item I386_DR_LOW_SET_CONTROL (@var{val})
759Set the Debug Control (DR7) register to the value @var{val}.
760
761@findex I386_DR_LOW_SET_ADDR
762@item I386_DR_LOW_SET_ADDR (@var{idx}, @var{addr})
763Put the address @var{addr} into the debug register number @var{idx}.
764
765@findex I386_DR_LOW_RESET_ADDR
766@item I386_DR_LOW_RESET_ADDR (@var{idx})
767Reset (i.e.@: zero out) the address stored in the debug register
768number @var{idx}.
769
770@findex I386_DR_LOW_GET_STATUS
771@item I386_DR_LOW_GET_STATUS
772Return the value of the Debug Status (DR6) register. This value is
773used immediately after it is returned by
774@code{I386_DR_LOW_GET_STATUS}, so as to support per-thread status
775register values.
776@end table
777
778For each one of the 4 debug registers (whose indices are from 0 to 3)
779that store addresses, a reference count is maintained by @value{GDBN},
780to allow sharing of debug registers by several watchpoints. This
781allows users to define several watchpoints that watch the same
782expression, but with different conditions and/or commands, without
783wasting debug registers which are in short supply. @value{GDBN}
784maintains the reference counts internally, targets don't have to do
785anything to use this feature.
786
787The x86 debug registers can each watch a region that is 1, 2, or 4
788bytes long. The ia32 architecture requires that each watched region
789be appropriately aligned: 2-byte region on 2-byte boundary, 4-byte
790region on 4-byte boundary. However, the x86 watchpoint support in
791@value{GDBN} can watch unaligned regions and regions larger than 4
792bytes (up to 16 bytes) by allocating several debug registers to watch
793a single region. This allocation of several registers per a watched
794region is also done automatically without target code intervention.
795
796The generic x86 watchpoint support provides the following API for the
797@value{GDBN}'s application code:
798
799@table @code
800@findex i386_region_ok_for_watchpoint
801@item i386_region_ok_for_watchpoint (@var{addr}, @var{len})
802The macro @code{TARGET_REGION_OK_FOR_HW_WATCHPOINT} is set to call
803this function. It counts the number of debug registers required to
804watch a given region, and returns a non-zero value if that number is
805less than 4, the number of debug registers available to x86
806processors.
807
808@findex i386_stopped_data_address
ac77d04f
JJ
809@item i386_stopped_data_address (@var{addr_p})
810The target function
811@code{target_stopped_data_address} is set to call this function.
812This
9742079a
EZ
813function examines the breakpoint condition bits in the DR6 Debug
814Status register, as returned by the @code{I386_DR_LOW_GET_STATUS}
815macro, and returns the address associated with the first bit that is
816set in DR6.
817
ac77d04f
JJ
818@findex i386_stopped_by_watchpoint
819@item i386_stopped_by_watchpoint (void)
820The macro @code{STOPPED_BY_WATCHPOINT}
821is set to call this function. The
822argument passed to @code{STOPPED_BY_WATCHPOINT} is ignored. This
823function examines the breakpoint condition bits in the DR6 Debug
824Status register, as returned by the @code{I386_DR_LOW_GET_STATUS}
825macro, and returns true if any bit is set. Otherwise, false is
826returned.
827
9742079a
EZ
828@findex i386_insert_watchpoint
829@findex i386_remove_watchpoint
830@item i386_insert_watchpoint (@var{addr}, @var{len}, @var{type})
831@itemx i386_remove_watchpoint (@var{addr}, @var{len}, @var{type})
832Insert or remove a watchpoint. The macros
833@code{target_insert_watchpoint} and @code{target_remove_watchpoint}
834are set to call these functions. @code{i386_insert_watchpoint} first
835looks for a debug register which is already set to watch the same
836region for the same access types; if found, it just increments the
837reference count of that debug register, thus implementing debug
838register sharing between watchpoints. If no such register is found,
937f164b
FF
839the function looks for a vacant debug register, sets its mirrored
840value to @var{addr}, sets the mirrored value of DR7 Debug Control
9742079a
EZ
841register as appropriate for the @var{len} and @var{type} parameters,
842and then passes the new values of the debug register and DR7 to the
843inferior by calling @code{I386_DR_LOW_SET_ADDR} and
844@code{I386_DR_LOW_SET_CONTROL}. If more than one debug register is
845required to cover the given region, the above process is repeated for
846each debug register.
847
848@code{i386_remove_watchpoint} does the opposite: it resets the address
937f164b
FF
849in the mirrored value of the debug register and its read/write and
850length bits in the mirrored value of DR7, then passes these new
9742079a
EZ
851values to the inferior via @code{I386_DR_LOW_RESET_ADDR} and
852@code{I386_DR_LOW_SET_CONTROL}. If a register is shared by several
853watchpoints, each time a @code{i386_remove_watchpoint} is called, it
854decrements the reference count, and only calls
855@code{I386_DR_LOW_RESET_ADDR} and @code{I386_DR_LOW_SET_CONTROL} when
856the count goes to zero.
857
858@findex i386_insert_hw_breakpoint
859@findex i386_remove_hw_breakpoint
8181d85f
DJ
860@item i386_insert_hw_breakpoint (@var{bp_tgt})
861@itemx i386_remove_hw_breakpoint (@var{bp_tgt})
9742079a
EZ
862These functions insert and remove hardware-assisted breakpoints. The
863macros @code{target_insert_hw_breakpoint} and
864@code{target_remove_hw_breakpoint} are set to call these functions.
8181d85f
DJ
865The argument is a @code{struct bp_target_info *}, as described in
866the documentation for @code{target_insert_breakpoint}.
9742079a
EZ
867These functions work like @code{i386_insert_watchpoint} and
868@code{i386_remove_watchpoint}, respectively, except that they set up
869the debug registers to watch instruction execution, and each
870hardware-assisted breakpoint always requires exactly one debug
871register.
872
873@findex i386_stopped_by_hwbp
874@item i386_stopped_by_hwbp (void)
875This function returns non-zero if the inferior has some watchpoint or
876hardware breakpoint that triggered. It works like
ac77d04f 877@code{i386_stopped_data_address}, except that it doesn't record the
9742079a
EZ
878address whose watchpoint triggered.
879
880@findex i386_cleanup_dregs
881@item i386_cleanup_dregs (void)
882This function clears all the reference counts, addresses, and control
883bits in the mirror images of the debug registers. It doesn't affect
884the actual debug registers in the inferior process.
885@end table
886
887@noindent
888@strong{Notes:}
889@enumerate 1
890@item
891x86 processors support setting watchpoints on I/O reads or writes.
892However, since no target supports this (as of March 2001), and since
893@code{enum target_hw_bp_type} doesn't even have an enumeration for I/O
894watchpoints, this feature is not yet available to @value{GDBN} running
895on x86.
896
897@item
898x86 processors can enable watchpoints locally, for the current task
899only, or globally, for all the tasks. For each debug register,
900there's a bit in the DR7 Debug Control register that determines
901whether the associated address is watched locally or globally. The
902current implementation of x86 watchpoint support in @value{GDBN}
903always sets watchpoints to be locally enabled, since global
904watchpoints might interfere with the underlying OS and are probably
905unavailable in many platforms.
906@end enumerate
907
5c95884b
MS
908@section Checkpoints
909@cindex checkpoints
910@cindex restart
911In the abstract, a checkpoint is a point in the execution history of
912the program, which the user may wish to return to at some later time.
913
914Internally, a checkpoint is a saved copy of the program state, including
915whatever information is required in order to restore the program to that
916state at a later time. This can be expected to include the state of
917registers and memory, and may include external state such as the state
918of open files and devices.
919
920There are a number of ways in which checkpoints may be implemented
b247355e 921in gdb, e.g.@: as corefiles, as forked processes, and as some opaque
5c95884b
MS
922method implemented on the target side.
923
924A corefile can be used to save an image of target memory and register
925state, which can in principle be restored later --- but corefiles do
926not typically include information about external entities such as
927open files. Currently this method is not implemented in gdb.
928
929A forked process can save the state of user memory and registers,
930as well as some subset of external (kernel) state. This method
931is used to implement checkpoints on Linux, and in principle might
932be used on other systems.
933
b247355e 934Some targets, e.g.@: simulators, might have their own built-in
5c95884b
MS
935method for saving checkpoints, and gdb might be able to take
936advantage of that capability without necessarily knowing any
937details of how it is done.
938
939
bcd7e15f
JB
940@section Observing changes in @value{GDBN} internals
941@cindex observer pattern interface
942@cindex notifications about changes in internals
943
944In order to function properly, several modules need to be notified when
945some changes occur in the @value{GDBN} internals. Traditionally, these
946modules have relied on several paradigms, the most common ones being
947hooks and gdb-events. Unfortunately, none of these paradigms was
948versatile enough to become the standard notification mechanism in
949@value{GDBN}. The fact that they only supported one ``client'' was also
950a strong limitation.
951
952A new paradigm, based on the Observer pattern of the @cite{Design
953Patterns} book, has therefore been implemented. The goal was to provide
954a new interface overcoming the issues with the notification mechanisms
955previously available. This new interface needed to be strongly typed,
956easy to extend, and versatile enough to be used as the standard
957interface when adding new notifications.
958
959See @ref{GDB Observers} for a brief description of the observers
960currently implemented in GDB. The rationale for the current
961implementation is also briefly discussed.
962
c906108c
SS
963@node User Interface
964
965@chapter User Interface
966
25822942 967@value{GDBN} has several user interfaces. Although the command-line interface
c906108c
SS
968is the most common and most familiar, there are others.
969
970@section Command Interpreter
971
56caf160 972@cindex command interpreter
0ee54786 973@cindex CLI
25822942 974The command interpreter in @value{GDBN} is fairly simple. It is designed to
c906108c
SS
975allow for the set of commands to be augmented dynamically, and also
976has a recursive subcommand capability, where the first argument to
977a command may itself direct a lookup on a different command list.
978
56caf160
EZ
979For instance, the @samp{set} command just starts a lookup on the
980@code{setlist} command list, while @samp{set thread} recurses
c906108c
SS
981to the @code{set_thread_cmd_list}.
982
56caf160
EZ
983@findex add_cmd
984@findex add_com
c906108c
SS
985To add commands in general, use @code{add_cmd}. @code{add_com} adds to
986the main command list, and should be used for those commands. The usual
cfeada60 987place to add commands is in the @code{_initialize_@var{xyz}} routines at
9742079a 988the ends of most source files.
cfeada60 989
40dd2248
TT
990@findex add_setshow_cmd
991@findex add_setshow_cmd_full
992To add paired @samp{set} and @samp{show} commands, use
993@code{add_setshow_cmd} or @code{add_setshow_cmd_full}. The former is
994a slightly simpler interface which is useful when you don't need to
995further modify the new command structures, while the latter returns
996the new command structures for manipulation.
997
56caf160
EZ
998@cindex deprecating commands
999@findex deprecate_cmd
cfeada60
FN
1000Before removing commands from the command set it is a good idea to
1001deprecate them for some time. Use @code{deprecate_cmd} on commands or
1002aliases to set the deprecated flag. @code{deprecate_cmd} takes a
1003@code{struct cmd_list_element} as it's first argument. You can use the
1004return value from @code{add_com} or @code{add_cmd} to deprecate the
1005command immediately after it is created.
1006
c72e7388 1007The first time a command is used the user will be warned and offered a
cfeada60
FN
1008replacement (if one exists). Note that the replacement string passed to
1009@code{deprecate_cmd} should be the full name of the command, i.e. the
1010entire string the user should type at the command line.
c906108c 1011
0ee54786
EZ
1012@section UI-Independent Output---the @code{ui_out} Functions
1013@c This section is based on the documentation written by Fernando
1014@c Nasser <fnasser@redhat.com>.
1015
1016@cindex @code{ui_out} functions
1017The @code{ui_out} functions present an abstraction level for the
1018@value{GDBN} output code. They hide the specifics of different user
1019interfaces supported by @value{GDBN}, and thus free the programmer
1020from the need to write several versions of the same code, one each for
1021every UI, to produce output.
1022
1023@subsection Overview and Terminology
1024
1025In general, execution of each @value{GDBN} command produces some sort
1026of output, and can even generate an input request.
1027
1028Output can be generated for the following purposes:
1029
1030@itemize @bullet
1031@item
1032to display a @emph{result} of an operation;
1033
1034@item
1035to convey @emph{info} or produce side-effects of a requested
1036operation;
1037
1038@item
1039to provide a @emph{notification} of an asynchronous event (including
1040progress indication of a prolonged asynchronous operation);
1041
1042@item
1043to display @emph{error messages} (including warnings);
1044
1045@item
1046to show @emph{debug data};
1047
1048@item
1049to @emph{query} or prompt a user for input (a special case).
1050@end itemize
1051
1052@noindent
1053This section mainly concentrates on how to build result output,
1054although some of it also applies to other kinds of output.
1055
1056Generation of output that displays the results of an operation
1057involves one or more of the following:
1058
1059@itemize @bullet
1060@item
1061output of the actual data
1062
1063@item
1064formatting the output as appropriate for console output, to make it
1065easily readable by humans
1066
1067@item
1068machine oriented formatting--a more terse formatting to allow for easy
1069parsing by programs which read @value{GDBN}'s output
1070
1071@item
c72e7388
AC
1072annotation, whose purpose is to help legacy GUIs to identify interesting
1073parts in the output
0ee54786
EZ
1074@end itemize
1075
1076The @code{ui_out} routines take care of the first three aspects.
c72e7388
AC
1077Annotations are provided by separate annotation routines. Note that use
1078of annotations for an interface between a GUI and @value{GDBN} is
0ee54786
EZ
1079deprecated.
1080
c72e7388
AC
1081Output can be in the form of a single item, which we call a @dfn{field};
1082a @dfn{list} consisting of identical fields; a @dfn{tuple} consisting of
1083non-identical fields; or a @dfn{table}, which is a tuple consisting of a
1084header and a body. In a BNF-like form:
0ee54786 1085
c72e7388
AC
1086@table @code
1087@item <table> @expansion{}
1088@code{<header> <body>}
1089@item <header> @expansion{}
1090@code{@{ <column> @}}
1091@item <column> @expansion{}
1092@code{<width> <alignment> <title>}
1093@item <body> @expansion{}
1094@code{@{<row>@}}
1095@end table
0ee54786
EZ
1096
1097
1098@subsection General Conventions
1099
c72e7388
AC
1100Most @code{ui_out} routines are of type @code{void}, the exceptions are
1101@code{ui_out_stream_new} (which returns a pointer to the newly created
1102object) and the @code{make_cleanup} routines.
0ee54786 1103
c72e7388
AC
1104The first parameter is always the @code{ui_out} vector object, a pointer
1105to a @code{struct ui_out}.
0ee54786 1106
c72e7388
AC
1107The @var{format} parameter is like in @code{printf} family of functions.
1108When it is present, there must also be a variable list of arguments
1109sufficient used to satisfy the @code{%} specifiers in the supplied
0ee54786
EZ
1110format.
1111
c72e7388
AC
1112When a character string argument is not used in a @code{ui_out} function
1113call, a @code{NULL} pointer has to be supplied instead.
0ee54786
EZ
1114
1115
c72e7388 1116@subsection Table, Tuple and List Functions
0ee54786
EZ
1117
1118@cindex list output functions
1119@cindex table output functions
c72e7388
AC
1120@cindex tuple output functions
1121This section introduces @code{ui_out} routines for building lists,
1122tuples and tables. The routines to output the actual data items
1123(fields) are presented in the next section.
0ee54786 1124
c72e7388
AC
1125To recap: A @dfn{tuple} is a sequence of @dfn{fields}, each field
1126containing information about an object; a @dfn{list} is a sequence of
1127fields where each field describes an identical object.
0ee54786 1128
c72e7388
AC
1129Use the @dfn{table} functions when your output consists of a list of
1130rows (tuples) and the console output should include a heading. Use this
1131even when you are listing just one object but you still want the header.
0ee54786
EZ
1132
1133@cindex nesting level in @code{ui_out} functions
c72e7388
AC
1134Tables can not be nested. Tuples and lists can be nested up to a
1135maximum of five levels.
0ee54786
EZ
1136
1137The overall structure of the table output code is something like this:
1138
474c8240 1139@smallexample
0ee54786
EZ
1140 ui_out_table_begin
1141 ui_out_table_header
c72e7388 1142 @dots{}
0ee54786 1143 ui_out_table_body
c72e7388 1144 ui_out_tuple_begin
0ee54786 1145 ui_out_field_*
c72e7388
AC
1146 @dots{}
1147 ui_out_tuple_end
1148 @dots{}
0ee54786 1149 ui_out_table_end
474c8240 1150@end smallexample
0ee54786 1151
c72e7388 1152Here is the description of table-, tuple- and list-related @code{ui_out}
0ee54786
EZ
1153functions:
1154
c72e7388
AC
1155@deftypefun void ui_out_table_begin (struct ui_out *@var{uiout}, int @var{nbrofcols}, int @var{nr_rows}, const char *@var{tblid})
1156The function @code{ui_out_table_begin} marks the beginning of the output
1157of a table. It should always be called before any other @code{ui_out}
1158function for a given table. @var{nbrofcols} is the number of columns in
1159the table. @var{nr_rows} is the number of rows in the table.
1160@var{tblid} is an optional string identifying the table. The string
1161pointed to by @var{tblid} is copied by the implementation of
1162@code{ui_out_table_begin}, so the application can free the string if it
1163was @code{malloc}ed.
0ee54786
EZ
1164
1165The companion function @code{ui_out_table_end}, described below, marks
1166the end of the table's output.
1167@end deftypefun
1168
c72e7388
AC
1169@deftypefun void ui_out_table_header (struct ui_out *@var{uiout}, int @var{width}, enum ui_align @var{alignment}, const char *@var{colhdr})
1170@code{ui_out_table_header} provides the header information for a single
1171table column. You call this function several times, one each for every
1172column of the table, after @code{ui_out_table_begin}, but before
1173@code{ui_out_table_body}.
0ee54786
EZ
1174
1175The value of @var{width} gives the column width in characters. The
1176value of @var{alignment} is one of @code{left}, @code{center}, and
1177@code{right}, and it specifies how to align the header: left-justify,
1178center, or right-justify it. @var{colhdr} points to a string that
1179specifies the column header; the implementation copies that string, so
c72e7388
AC
1180column header strings in @code{malloc}ed storage can be freed after the
1181call.
0ee54786
EZ
1182@end deftypefun
1183
1184@deftypefun void ui_out_table_body (struct ui_out *@var{uiout})
c72e7388 1185This function delimits the table header from the table body.
0ee54786
EZ
1186@end deftypefun
1187
1188@deftypefun void ui_out_table_end (struct ui_out *@var{uiout})
c72e7388
AC
1189This function signals the end of a table's output. It should be called
1190after the table body has been produced by the list and field output
1191functions.
0ee54786
EZ
1192
1193There should be exactly one call to @code{ui_out_table_end} for each
c72e7388
AC
1194call to @code{ui_out_table_begin}, otherwise the @code{ui_out} functions
1195will signal an internal error.
0ee54786
EZ
1196@end deftypefun
1197
c72e7388 1198The output of the tuples that represent the table rows must follow the
0ee54786 1199call to @code{ui_out_table_body} and precede the call to
c72e7388
AC
1200@code{ui_out_table_end}. You build a tuple by calling
1201@code{ui_out_tuple_begin} and @code{ui_out_tuple_end}, with suitable
0ee54786
EZ
1202calls to functions which actually output fields between them.
1203
c72e7388
AC
1204@deftypefun void ui_out_tuple_begin (struct ui_out *@var{uiout}, const char *@var{id})
1205This function marks the beginning of a tuple output. @var{id} points
1206to an optional string that identifies the tuple; it is copied by the
1207implementation, and so strings in @code{malloc}ed storage can be freed
1208after the call.
1209@end deftypefun
1210
1211@deftypefun void ui_out_tuple_end (struct ui_out *@var{uiout})
1212This function signals an end of a tuple output. There should be exactly
1213one call to @code{ui_out_tuple_end} for each call to
1214@code{ui_out_tuple_begin}, otherwise an internal @value{GDBN} error will
1215be signaled.
1216@end deftypefun
1217
1218@deftypefun struct cleanup *make_cleanup_ui_out_tuple_begin_end (struct ui_out *@var{uiout}, const char *@var{id})
1219This function first opens the tuple and then establishes a cleanup
1220(@pxref{Coding, Cleanups}) to close the tuple. It provides a convenient
1221and correct implementation of the non-portable@footnote{The function
b9aa90c9 1222cast is not portable ISO C.} code sequence:
c72e7388
AC
1223@smallexample
1224struct cleanup *old_cleanup;
1225ui_out_tuple_begin (uiout, "...");
1226old_cleanup = make_cleanup ((void(*)(void *)) ui_out_tuple_end,
1227 uiout);
1228@end smallexample
1229@end deftypefun
1230
1231@deftypefun void ui_out_list_begin (struct ui_out *@var{uiout}, const char *@var{id})
1232This function marks the beginning of a list output. @var{id} points to
1233an optional string that identifies the list; it is copied by the
1234implementation, and so strings in @code{malloc}ed storage can be freed
1235after the call.
0ee54786
EZ
1236@end deftypefun
1237
1238@deftypefun void ui_out_list_end (struct ui_out *@var{uiout})
c72e7388
AC
1239This function signals an end of a list output. There should be exactly
1240one call to @code{ui_out_list_end} for each call to
1241@code{ui_out_list_begin}, otherwise an internal @value{GDBN} error will
1242be signaled.
1243@end deftypefun
1244
1245@deftypefun struct cleanup *make_cleanup_ui_out_list_begin_end (struct ui_out *@var{uiout}, const char *@var{id})
1246Similar to @code{make_cleanup_ui_out_tuple_begin_end}, this function
1247opens a list and then establishes cleanup (@pxref{Coding, Cleanups})
1248that will close the list.list.
0ee54786
EZ
1249@end deftypefun
1250
1251@subsection Item Output Functions
1252
1253@cindex item output functions
1254@cindex field output functions
1255@cindex data output
1256The functions described below produce output for the actual data
1257items, or fields, which contain information about the object.
1258
1259Choose the appropriate function accordingly to your particular needs.
1260
1261@deftypefun void ui_out_field_fmt (struct ui_out *@var{uiout}, char *@var{fldname}, char *@var{format}, ...)
1262This is the most general output function. It produces the
1263representation of the data in the variable-length argument list
1264according to formatting specifications in @var{format}, a
1265@code{printf}-like format string. The optional argument @var{fldname}
1266supplies the name of the field. The data items themselves are
1267supplied as additional arguments after @var{format}.
1268
1269This generic function should be used only when it is not possible to
1270use one of the specialized versions (see below).
1271@end deftypefun
1272
c72e7388 1273@deftypefun void ui_out_field_int (struct ui_out *@var{uiout}, const char *@var{fldname}, int @var{value})
0ee54786
EZ
1274This function outputs a value of an @code{int} variable. It uses the
1275@code{"%d"} output conversion specification. @var{fldname} specifies
1276the name of the field.
1277@end deftypefun
8d19fbd2
JJ
1278
1279@deftypefun void ui_out_field_fmt_int (struct ui_out *@var{uiout}, int @var{width}, enum ui_align @var{alignment}, const char *@var{fldname}, int @var{value})
1280This function outputs a value of an @code{int} variable. It differs from
1281@code{ui_out_field_int} in that the caller specifies the desired @var{width} and @var{alignment} of the output.
1282@var{fldname} specifies
1283the name of the field.
1284@end deftypefun
0ee54786 1285
c72e7388 1286@deftypefun void ui_out_field_core_addr (struct ui_out *@var{uiout}, const char *@var{fldname}, CORE_ADDR @var{address})
0ee54786
EZ
1287This function outputs an address.
1288@end deftypefun
1289
c72e7388 1290@deftypefun void ui_out_field_string (struct ui_out *@var{uiout}, const char *@var{fldname}, const char *@var{string})
0ee54786
EZ
1291This function outputs a string using the @code{"%s"} conversion
1292specification.
1293@end deftypefun
1294
1295Sometimes, there's a need to compose your output piece by piece using
1296functions that operate on a stream, such as @code{value_print} or
1297@code{fprintf_symbol_filtered}. These functions accept an argument of
1298the type @code{struct ui_file *}, a pointer to a @code{ui_file} object
1299used to store the data stream used for the output. When you use one
1300of these functions, you need a way to pass their results stored in a
1301@code{ui_file} object to the @code{ui_out} functions. To this end,
1302you first create a @code{ui_stream} object by calling
1303@code{ui_out_stream_new}, pass the @code{stream} member of that
1304@code{ui_stream} object to @code{value_print} and similar functions,
1305and finally call @code{ui_out_field_stream} to output the field you
1306constructed. When the @code{ui_stream} object is no longer needed,
1307you should destroy it and free its memory by calling
1308@code{ui_out_stream_delete}.
1309
1310@deftypefun struct ui_stream *ui_out_stream_new (struct ui_out *@var{uiout})
1311This function creates a new @code{ui_stream} object which uses the
1312same output methods as the @code{ui_out} object whose pointer is
1313passed in @var{uiout}. It returns a pointer to the newly created
1314@code{ui_stream} object.
1315@end deftypefun
1316
1317@deftypefun void ui_out_stream_delete (struct ui_stream *@var{streambuf})
1318This functions destroys a @code{ui_stream} object specified by
1319@var{streambuf}.
1320@end deftypefun
1321
c72e7388 1322@deftypefun void ui_out_field_stream (struct ui_out *@var{uiout}, const char *@var{fieldname}, struct ui_stream *@var{streambuf})
0ee54786
EZ
1323This function consumes all the data accumulated in
1324@code{streambuf->stream} and outputs it like
1325@code{ui_out_field_string} does. After a call to
1326@code{ui_out_field_stream}, the accumulated data no longer exists, but
1327the stream is still valid and may be used for producing more fields.
1328@end deftypefun
1329
1330@strong{Important:} If there is any chance that your code could bail
1331out before completing output generation and reaching the point where
1332@code{ui_out_stream_delete} is called, it is necessary to set up a
1333cleanup, to avoid leaking memory and other resources. Here's a
1334skeleton code to do that:
1335
1336@smallexample
1337 struct ui_stream *mybuf = ui_out_stream_new (uiout);
1338 struct cleanup *old = make_cleanup (ui_out_stream_delete, mybuf);
1339 ...
1340 do_cleanups (old);
1341@end smallexample
1342
1343If the function already has the old cleanup chain set (for other kinds
1344of cleanups), you just have to add your cleanup to it:
1345
1346@smallexample
1347 mybuf = ui_out_stream_new (uiout);
1348 make_cleanup (ui_out_stream_delete, mybuf);
1349@end smallexample
1350
1351Note that with cleanups in place, you should not call
1352@code{ui_out_stream_delete} directly, or you would attempt to free the
1353same buffer twice.
1354
1355@subsection Utility Output Functions
1356
c72e7388 1357@deftypefun void ui_out_field_skip (struct ui_out *@var{uiout}, const char *@var{fldname})
0ee54786
EZ
1358This function skips a field in a table. Use it if you have to leave
1359an empty field without disrupting the table alignment. The argument
1360@var{fldname} specifies a name for the (missing) filed.
1361@end deftypefun
1362
c72e7388 1363@deftypefun void ui_out_text (struct ui_out *@var{uiout}, const char *@var{string})
0ee54786
EZ
1364This function outputs the text in @var{string} in a way that makes it
1365easy to be read by humans. For example, the console implementation of
1366this method filters the text through a built-in pager, to prevent it
1367from scrolling off the visible portion of the screen.
1368
1369Use this function for printing relatively long chunks of text around
1370the actual field data: the text it produces is not aligned according
1371to the table's format. Use @code{ui_out_field_string} to output a
1372string field, and use @code{ui_out_message}, described below, to
1373output short messages.
1374@end deftypefun
1375
1376@deftypefun void ui_out_spaces (struct ui_out *@var{uiout}, int @var{nspaces})
1377This function outputs @var{nspaces} spaces. It is handy to align the
1378text produced by @code{ui_out_text} with the rest of the table or
1379list.
1380@end deftypefun
1381
c72e7388 1382@deftypefun void ui_out_message (struct ui_out *@var{uiout}, int @var{verbosity}, const char *@var{format}, ...)
0ee54786
EZ
1383This function produces a formatted message, provided that the current
1384verbosity level is at least as large as given by @var{verbosity}. The
1385current verbosity level is specified by the user with the @samp{set
1386verbositylevel} command.@footnote{As of this writing (April 2001),
1387setting verbosity level is not yet implemented, and is always returned
1388as zero. So calling @code{ui_out_message} with a @var{verbosity}
1389argument more than zero will cause the message to never be printed.}
1390@end deftypefun
1391
1392@deftypefun void ui_out_wrap_hint (struct ui_out *@var{uiout}, char *@var{indent})
1393This function gives the console output filter (a paging filter) a hint
1394of where to break lines which are too long. Ignored for all other
1395output consumers. @var{indent}, if non-@code{NULL}, is the string to
1396be printed to indent the wrapped text on the next line; it must remain
1397accessible until the next call to @code{ui_out_wrap_hint}, or until an
1398explicit newline is produced by one of the other functions. If
1399@var{indent} is @code{NULL}, the wrapped text will not be indented.
1400@end deftypefun
1401
1402@deftypefun void ui_out_flush (struct ui_out *@var{uiout})
1403This function flushes whatever output has been accumulated so far, if
1404the UI buffers output.
1405@end deftypefun
1406
1407
1408@subsection Examples of Use of @code{ui_out} functions
1409
1410@cindex using @code{ui_out} functions
1411@cindex @code{ui_out} functions, usage examples
1412This section gives some practical examples of using the @code{ui_out}
1413functions to generalize the old console-oriented code in
1414@value{GDBN}. The examples all come from functions defined on the
1415@file{breakpoints.c} file.
1416
1417This example, from the @code{breakpoint_1} function, shows how to
1418produce a table.
1419
1420The original code was:
1421
474c8240 1422@smallexample
0ee54786
EZ
1423 if (!found_a_breakpoint++)
1424 @{
1425 annotate_breakpoints_headers ();
1426
1427 annotate_field (0);
1428 printf_filtered ("Num ");
1429 annotate_field (1);
1430 printf_filtered ("Type ");
1431 annotate_field (2);
1432 printf_filtered ("Disp ");
1433 annotate_field (3);
1434 printf_filtered ("Enb ");
1435 if (addressprint)
1436 @{
1437 annotate_field (4);
1438 printf_filtered ("Address ");
1439 @}
1440 annotate_field (5);
1441 printf_filtered ("What\n");
1442
1443 annotate_breakpoints_table ();
1444 @}
474c8240 1445@end smallexample
0ee54786
EZ
1446
1447Here's the new version:
1448
474c8240 1449@smallexample
c72e7388
AC
1450 nr_printable_breakpoints = @dots{};
1451
1452 if (addressprint)
1453 ui_out_table_begin (ui, 6, nr_printable_breakpoints, "BreakpointTable");
1454 else
1455 ui_out_table_begin (ui, 5, nr_printable_breakpoints, "BreakpointTable");
1456
1457 if (nr_printable_breakpoints > 0)
1458 annotate_breakpoints_headers ();
1459 if (nr_printable_breakpoints > 0)
1460 annotate_field (0);
1461 ui_out_table_header (uiout, 3, ui_left, "number", "Num"); /* 1 */
1462 if (nr_printable_breakpoints > 0)
1463 annotate_field (1);
1464 ui_out_table_header (uiout, 14, ui_left, "type", "Type"); /* 2 */
1465 if (nr_printable_breakpoints > 0)
1466 annotate_field (2);
1467 ui_out_table_header (uiout, 4, ui_left, "disp", "Disp"); /* 3 */
1468 if (nr_printable_breakpoints > 0)
1469 annotate_field (3);
1470 ui_out_table_header (uiout, 3, ui_left, "enabled", "Enb"); /* 4 */
1471 if (addressprint)
1472 @{
1473 if (nr_printable_breakpoints > 0)
1474 annotate_field (4);
1475 if (TARGET_ADDR_BIT <= 32)
1476 ui_out_table_header (uiout, 10, ui_left, "addr", "Address");/* 5 */
0ee54786 1477 else
c72e7388
AC
1478 ui_out_table_header (uiout, 18, ui_left, "addr", "Address");/* 5 */
1479 @}
1480 if (nr_printable_breakpoints > 0)
1481 annotate_field (5);
1482 ui_out_table_header (uiout, 40, ui_noalign, "what", "What"); /* 6 */
1483 ui_out_table_body (uiout);
1484 if (nr_printable_breakpoints > 0)
1485 annotate_breakpoints_table ();
474c8240 1486@end smallexample
0ee54786
EZ
1487
1488This example, from the @code{print_one_breakpoint} function, shows how
1489to produce the actual data for the table whose structure was defined
1490in the above example. The original code was:
1491
474c8240 1492@smallexample
0ee54786
EZ
1493 annotate_record ();
1494 annotate_field (0);
1495 printf_filtered ("%-3d ", b->number);
1496 annotate_field (1);
1497 if ((int)b->type > (sizeof(bptypes)/sizeof(bptypes[0]))
1498 || ((int) b->type != bptypes[(int) b->type].type))
1499 internal_error ("bptypes table does not describe type #%d.",
1500 (int)b->type);
1501 printf_filtered ("%-14s ", bptypes[(int)b->type].description);
1502 annotate_field (2);
1503 printf_filtered ("%-4s ", bpdisps[(int)b->disposition]);
1504 annotate_field (3);
1505 printf_filtered ("%-3c ", bpenables[(int)b->enable]);
c72e7388 1506 @dots{}
474c8240 1507@end smallexample
0ee54786
EZ
1508
1509This is the new version:
1510
474c8240 1511@smallexample
0ee54786 1512 annotate_record ();
c72e7388 1513 ui_out_tuple_begin (uiout, "bkpt");
0ee54786
EZ
1514 annotate_field (0);
1515 ui_out_field_int (uiout, "number", b->number);
1516 annotate_field (1);
1517 if (((int) b->type > (sizeof (bptypes) / sizeof (bptypes[0])))
1518 || ((int) b->type != bptypes[(int) b->type].type))
1519 internal_error ("bptypes table does not describe type #%d.",
1520 (int) b->type);
1521 ui_out_field_string (uiout, "type", bptypes[(int)b->type].description);
1522 annotate_field (2);
1523 ui_out_field_string (uiout, "disp", bpdisps[(int)b->disposition]);
1524 annotate_field (3);
1525 ui_out_field_fmt (uiout, "enabled", "%c", bpenables[(int)b->enable]);
c72e7388 1526 @dots{}
474c8240 1527@end smallexample
0ee54786
EZ
1528
1529This example, also from @code{print_one_breakpoint}, shows how to
1530produce a complicated output field using the @code{print_expression}
1531functions which requires a stream to be passed. It also shows how to
1532automate stream destruction with cleanups. The original code was:
1533
474c8240 1534@smallexample
0ee54786
EZ
1535 annotate_field (5);
1536 print_expression (b->exp, gdb_stdout);
474c8240 1537@end smallexample
0ee54786
EZ
1538
1539The new version is:
1540
474c8240 1541@smallexample
0ee54786
EZ
1542 struct ui_stream *stb = ui_out_stream_new (uiout);
1543 struct cleanup *old_chain = make_cleanup_ui_out_stream_delete (stb);
1544 ...
1545 annotate_field (5);
1546 print_expression (b->exp, stb->stream);
1547 ui_out_field_stream (uiout, "what", local_stream);
474c8240 1548@end smallexample
0ee54786
EZ
1549
1550This example, also from @code{print_one_breakpoint}, shows how to use
1551@code{ui_out_text} and @code{ui_out_field_string}. The original code
1552was:
1553
474c8240 1554@smallexample
0ee54786
EZ
1555 annotate_field (5);
1556 if (b->dll_pathname == NULL)
1557 printf_filtered ("<any library> ");
1558 else
1559 printf_filtered ("library \"%s\" ", b->dll_pathname);
474c8240 1560@end smallexample
0ee54786
EZ
1561
1562It became:
1563
474c8240 1564@smallexample
0ee54786
EZ
1565 annotate_field (5);
1566 if (b->dll_pathname == NULL)
1567 @{
1568 ui_out_field_string (uiout, "what", "<any library>");
1569 ui_out_spaces (uiout, 1);
1570 @}
1571 else
1572 @{
1573 ui_out_text (uiout, "library \"");
1574 ui_out_field_string (uiout, "what", b->dll_pathname);
1575 ui_out_text (uiout, "\" ");
1576 @}
474c8240 1577@end smallexample
0ee54786
EZ
1578
1579The following example from @code{print_one_breakpoint} shows how to
1580use @code{ui_out_field_int} and @code{ui_out_spaces}. The original
1581code was:
1582
474c8240 1583@smallexample
0ee54786
EZ
1584 annotate_field (5);
1585 if (b->forked_inferior_pid != 0)
1586 printf_filtered ("process %d ", b->forked_inferior_pid);
474c8240 1587@end smallexample
0ee54786
EZ
1588
1589It became:
1590
474c8240 1591@smallexample
0ee54786
EZ
1592 annotate_field (5);
1593 if (b->forked_inferior_pid != 0)
1594 @{
1595 ui_out_text (uiout, "process ");
1596 ui_out_field_int (uiout, "what", b->forked_inferior_pid);
1597 ui_out_spaces (uiout, 1);
1598 @}
474c8240 1599@end smallexample
0ee54786
EZ
1600
1601Here's an example of using @code{ui_out_field_string}. The original
1602code was:
1603
474c8240 1604@smallexample
0ee54786
EZ
1605 annotate_field (5);
1606 if (b->exec_pathname != NULL)
1607 printf_filtered ("program \"%s\" ", b->exec_pathname);
474c8240 1608@end smallexample
0ee54786
EZ
1609
1610It became:
1611
474c8240 1612@smallexample
0ee54786
EZ
1613 annotate_field (5);
1614 if (b->exec_pathname != NULL)
1615 @{
1616 ui_out_text (uiout, "program \"");
1617 ui_out_field_string (uiout, "what", b->exec_pathname);
1618 ui_out_text (uiout, "\" ");
1619 @}
474c8240 1620@end smallexample
0ee54786
EZ
1621
1622Finally, here's an example of printing an address. The original code:
1623
474c8240 1624@smallexample
0ee54786
EZ
1625 annotate_field (4);
1626 printf_filtered ("%s ",
15a661f3 1627 hex_string_custom ((unsigned long) b->address, 8));
474c8240 1628@end smallexample
0ee54786
EZ
1629
1630It became:
1631
474c8240 1632@smallexample
0ee54786
EZ
1633 annotate_field (4);
1634 ui_out_field_core_addr (uiout, "Address", b->address);
474c8240 1635@end smallexample
0ee54786
EZ
1636
1637
c906108c
SS
1638@section Console Printing
1639
1640@section TUI
1641
89437448 1642@node libgdb
c906108c 1643
89437448
AC
1644@chapter libgdb
1645
1646@section libgdb 1.0
1647@cindex @code{libgdb}
1648@code{libgdb} 1.0 was an abortive project of years ago. The theory was
1649to provide an API to @value{GDBN}'s functionality.
1650
1651@section libgdb 2.0
56caf160 1652@cindex @code{libgdb}
89437448
AC
1653@code{libgdb} 2.0 is an ongoing effort to update @value{GDBN} so that is
1654better able to support graphical and other environments.
1655
1656Since @code{libgdb} development is on-going, its architecture is still
1657evolving. The following components have so far been identified:
1658
1659@itemize @bullet
1660@item
1661Observer - @file{gdb-events.h}.
1662@item
1663Builder - @file{ui-out.h}
1664@item
1665Event Loop - @file{event-loop.h}
1666@item
1667Library - @file{gdb.h}
1668@end itemize
1669
1670The model that ties these components together is described below.
1671
1672@section The @code{libgdb} Model
1673
1674A client of @code{libgdb} interacts with the library in two ways.
1675
1676@itemize @bullet
1677@item
1678As an observer (using @file{gdb-events}) receiving notifications from
1679@code{libgdb} of any internal state changes (break point changes, run
1680state, etc).
1681@item
1682As a client querying @code{libgdb} (using the @file{ui-out} builder) to
1683obtain various status values from @value{GDBN}.
1684@end itemize
1685
c1468174 1686Since @code{libgdb} could have multiple clients (e.g., a GUI supporting
89437448
AC
1687the existing @value{GDBN} CLI), those clients must co-operate when
1688controlling @code{libgdb}. In particular, a client must ensure that
1689@code{libgdb} is idle (i.e. no other client is using @code{libgdb})
1690before responding to a @file{gdb-event} by making a query.
1691
1692@section CLI support
1693
1694At present @value{GDBN}'s CLI is very much entangled in with the core of
1695@code{libgdb}. Consequently, a client wishing to include the CLI in
1696their interface needs to carefully co-ordinate its own and the CLI's
1697requirements.
1698
1699It is suggested that the client set @code{libgdb} up to be bi-modal
1700(alternate between CLI and client query modes). The notes below sketch
1701out the theory:
1702
1703@itemize @bullet
1704@item
1705The client registers itself as an observer of @code{libgdb}.
1706@item
1707The client create and install @code{cli-out} builder using its own
1708versions of the @code{ui-file} @code{gdb_stderr}, @code{gdb_stdtarg} and
1709@code{gdb_stdout} streams.
1710@item
1711The client creates a separate custom @code{ui-out} builder that is only
1712used while making direct queries to @code{libgdb}.
1713@end itemize
1714
1715When the client receives input intended for the CLI, it simply passes it
1716along. Since the @code{cli-out} builder is installed by default, all
1717the CLI output in response to that command is routed (pronounced rooted)
1718through to the client controlled @code{gdb_stdout} et.@: al.@: streams.
1719At the same time, the client is kept abreast of internal changes by
1720virtue of being a @code{libgdb} observer.
1721
1722The only restriction on the client is that it must wait until
1723@code{libgdb} becomes idle before initiating any queries (using the
1724client's custom builder).
1725
1726@section @code{libgdb} components
1727
1728@subheading Observer - @file{gdb-events.h}
1729@file{gdb-events} provides the client with a very raw mechanism that can
1730be used to implement an observer. At present it only allows for one
1731observer and that observer must, internally, handle the need to delay
1732the processing of any event notifications until after @code{libgdb} has
1733finished the current command.
1734
1735@subheading Builder - @file{ui-out.h}
1736@file{ui-out} provides the infrastructure necessary for a client to
1737create a builder. That builder is then passed down to @code{libgdb}
1738when doing any queries.
1739
1740@subheading Event Loop - @file{event-loop.h}
1741@c There could be an entire section on the event-loop
1742@file{event-loop}, currently non-re-entrant, provides a simple event
1743loop. A client would need to either plug its self into this loop or,
1744implement a new event-loop that GDB would use.
1745
1746The event-loop will eventually be made re-entrant. This is so that
a9f12a31 1747@value{GDBN} can better handle the problem of some commands blocking
89437448
AC
1748instead of returning.
1749
1750@subheading Library - @file{gdb.h}
1751@file{libgdb} is the most obvious component of this system. It provides
1752the query interface. Each function is parameterized by a @code{ui-out}
1753builder. The result of the query is constructed using that builder
1754before the query function returns.
c906108c
SS
1755
1756@node Symbol Handling
1757
1758@chapter Symbol Handling
1759
25822942 1760Symbols are a key part of @value{GDBN}'s operation. Symbols include variables,
c906108c
SS
1761functions, and types.
1762
1763@section Symbol Reading
1764
56caf160
EZ
1765@cindex symbol reading
1766@cindex reading of symbols
1767@cindex symbol files
1768@value{GDBN} reads symbols from @dfn{symbol files}. The usual symbol
1769file is the file containing the program which @value{GDBN} is
1770debugging. @value{GDBN} can be directed to use a different file for
1771symbols (with the @samp{symbol-file} command), and it can also read
1772more symbols via the @samp{add-file} and @samp{load} commands, or while
1773reading symbols from shared libraries.
1774
1775@findex find_sym_fns
1776Symbol files are initially opened by code in @file{symfile.c} using
1777the BFD library (@pxref{Support Libraries}). BFD identifies the type
1778of the file by examining its header. @code{find_sym_fns} then uses
1779this identification to locate a set of symbol-reading functions.
1780
1781@findex add_symtab_fns
1782@cindex @code{sym_fns} structure
1783@cindex adding a symbol-reading module
1784Symbol-reading modules identify themselves to @value{GDBN} by calling
c906108c
SS
1785@code{add_symtab_fns} during their module initialization. The argument
1786to @code{add_symtab_fns} is a @code{struct sym_fns} which contains the
1787name (or name prefix) of the symbol format, the length of the prefix,
1788and pointers to four functions. These functions are called at various
56caf160 1789times to process symbol files whose identification matches the specified
c906108c
SS
1790prefix.
1791
1792The functions supplied by each module are:
1793
1794@table @code
1795@item @var{xyz}_symfile_init(struct sym_fns *sf)
1796
56caf160 1797@cindex secondary symbol file
c906108c
SS
1798Called from @code{symbol_file_add} when we are about to read a new
1799symbol file. This function should clean up any internal state (possibly
1800resulting from half-read previous files, for example) and prepare to
56caf160
EZ
1801read a new symbol file. Note that the symbol file which we are reading
1802might be a new ``main'' symbol file, or might be a secondary symbol file
c906108c
SS
1803whose symbols are being added to the existing symbol table.
1804
1805The argument to @code{@var{xyz}_symfile_init} is a newly allocated
1806@code{struct sym_fns} whose @code{bfd} field contains the BFD for the
1807new symbol file being read. Its @code{private} field has been zeroed,
1808and can be modified as desired. Typically, a struct of private
1809information will be @code{malloc}'d, and a pointer to it will be placed
1810in the @code{private} field.
1811
1812There is no result from @code{@var{xyz}_symfile_init}, but it can call
1813@code{error} if it detects an unavoidable problem.
1814
1815@item @var{xyz}_new_init()
1816
1817Called from @code{symbol_file_add} when discarding existing symbols.
56caf160
EZ
1818This function needs only handle the symbol-reading module's internal
1819state; the symbol table data structures visible to the rest of
1820@value{GDBN} will be discarded by @code{symbol_file_add}. It has no
1821arguments and no result. It may be called after
1822@code{@var{xyz}_symfile_init}, if a new symbol table is being read, or
1823may be called alone if all symbols are simply being discarded.
c906108c
SS
1824
1825@item @var{xyz}_symfile_read(struct sym_fns *sf, CORE_ADDR addr, int mainline)
1826
1827Called from @code{symbol_file_add} to actually read the symbols from a
1828symbol-file into a set of psymtabs or symtabs.
1829
56caf160 1830@code{sf} points to the @code{struct sym_fns} originally passed to
c906108c
SS
1831@code{@var{xyz}_sym_init} for possible initialization. @code{addr} is
1832the offset between the file's specified start address and its true
1833address in memory. @code{mainline} is 1 if this is the main symbol
c1468174 1834table being read, and 0 if a secondary symbol file (e.g., shared library
c906108c
SS
1835or dynamically loaded file) is being read.@refill
1836@end table
1837
1838In addition, if a symbol-reading module creates psymtabs when
1839@var{xyz}_symfile_read is called, these psymtabs will contain a pointer
1840to a function @code{@var{xyz}_psymtab_to_symtab}, which can be called
25822942 1841from any point in the @value{GDBN} symbol-handling code.
c906108c
SS
1842
1843@table @code
1844@item @var{xyz}_psymtab_to_symtab (struct partial_symtab *pst)
1845
56caf160 1846Called from @code{psymtab_to_symtab} (or the @code{PSYMTAB_TO_SYMTAB} macro) if
c906108c
SS
1847the psymtab has not already been read in and had its @code{pst->symtab}
1848pointer set. The argument is the psymtab to be fleshed-out into a
56caf160
EZ
1849symtab. Upon return, @code{pst->readin} should have been set to 1, and
1850@code{pst->symtab} should contain a pointer to the new corresponding symtab, or
c906108c
SS
1851zero if there were no symbols in that part of the symbol file.
1852@end table
1853
1854@section Partial Symbol Tables
1855
56caf160 1856@value{GDBN} has three types of symbol tables:
c906108c
SS
1857
1858@itemize @bullet
56caf160
EZ
1859@cindex full symbol table
1860@cindex symtabs
1861@item
1862Full symbol tables (@dfn{symtabs}). These contain the main
1863information about symbols and addresses.
c906108c 1864
56caf160
EZ
1865@cindex psymtabs
1866@item
1867Partial symbol tables (@dfn{psymtabs}). These contain enough
c906108c
SS
1868information to know when to read the corresponding part of the full
1869symbol table.
1870
56caf160
EZ
1871@cindex minimal symbol table
1872@cindex minsymtabs
1873@item
1874Minimal symbol tables (@dfn{msymtabs}). These contain information
c906108c 1875gleaned from non-debugging symbols.
c906108c
SS
1876@end itemize
1877
56caf160 1878@cindex partial symbol table
c906108c
SS
1879This section describes partial symbol tables.
1880
1881A psymtab is constructed by doing a very quick pass over an executable
1882file's debugging information. Small amounts of information are
56caf160 1883extracted---enough to identify which parts of the symbol table will
c906108c 1884need to be re-read and fully digested later, when the user needs the
25822942 1885information. The speed of this pass causes @value{GDBN} to start up very
c906108c
SS
1886quickly. Later, as the detailed rereading occurs, it occurs in small
1887pieces, at various times, and the delay therefrom is mostly invisible to
1888the user.
1889@c (@xref{Symbol Reading}.)
1890
1891The symbols that show up in a file's psymtab should be, roughly, those
1892visible to the debugger's user when the program is not running code from
1893that file. These include external symbols and types, static symbols and
56caf160 1894types, and @code{enum} values declared at file scope.
c906108c
SS
1895
1896The psymtab also contains the range of instruction addresses that the
1897full symbol table would represent.
1898
56caf160
EZ
1899@cindex finding a symbol
1900@cindex symbol lookup
c906108c
SS
1901The idea is that there are only two ways for the user (or much of the
1902code in the debugger) to reference a symbol:
1903
1904@itemize @bullet
56caf160
EZ
1905@findex find_pc_function
1906@findex find_pc_line
1907@item
c1468174 1908By its address (e.g., execution stops at some address which is inside a
56caf160
EZ
1909function in this file). The address will be noticed to be in the
1910range of this psymtab, and the full symtab will be read in.
1911@code{find_pc_function}, @code{find_pc_line}, and other
1912@code{find_pc_@dots{}} functions handle this.
c906108c 1913
56caf160
EZ
1914@cindex lookup_symbol
1915@item
1916By its name
c1468174 1917(e.g., the user asks to print a variable, or set a breakpoint on a
c906108c
SS
1918function). Global names and file-scope names will be found in the
1919psymtab, which will cause the symtab to be pulled in. Local names will
1920have to be qualified by a global name, or a file-scope name, in which
1921case we will have already read in the symtab as we evaluated the
56caf160 1922qualifier. Or, a local symbol can be referenced when we are ``in'' a
c906108c
SS
1923local scope, in which case the first case applies. @code{lookup_symbol}
1924does most of the work here.
c906108c
SS
1925@end itemize
1926
1927The only reason that psymtabs exist is to cause a symtab to be read in
1928at the right moment. Any symbol that can be elided from a psymtab,
1929while still causing that to happen, should not appear in it. Since
1930psymtabs don't have the idea of scope, you can't put local symbols in
1931them anyway. Psymtabs don't have the idea of the type of a symbol,
1932either, so types need not appear, unless they will be referenced by
1933name.
1934
56caf160
EZ
1935It is a bug for @value{GDBN} to behave one way when only a psymtab has
1936been read, and another way if the corresponding symtab has been read
1937in. Such bugs are typically caused by a psymtab that does not contain
1938all the visible symbols, or which has the wrong instruction address
1939ranges.
c906108c 1940
56caf160 1941The psymtab for a particular section of a symbol file (objfile) could be
c906108c
SS
1942thrown away after the symtab has been read in. The symtab should always
1943be searched before the psymtab, so the psymtab will never be used (in a
1944bug-free environment). Currently, psymtabs are allocated on an obstack,
1945and all the psymbols themselves are allocated in a pair of large arrays
1946on an obstack, so there is little to be gained by trying to free them
1947unless you want to do a lot more work.
1948
1949@section Types
1950
56caf160 1951@unnumberedsubsec Fundamental Types (e.g., @code{FT_VOID}, @code{FT_BOOLEAN}).
c906108c 1952
56caf160 1953@cindex fundamental types
25822942 1954These are the fundamental types that @value{GDBN} uses internally. Fundamental
c906108c
SS
1955types from the various debugging formats (stabs, ELF, etc) are mapped
1956into one of these. They are basically a union of all fundamental types
56caf160
EZ
1957that @value{GDBN} knows about for all the languages that @value{GDBN}
1958knows about.
c906108c 1959
56caf160 1960@unnumberedsubsec Type Codes (e.g., @code{TYPE_CODE_PTR}, @code{TYPE_CODE_ARRAY}).
c906108c 1961
56caf160
EZ
1962@cindex type codes
1963Each time @value{GDBN} builds an internal type, it marks it with one
1964of these types. The type may be a fundamental type, such as
1965@code{TYPE_CODE_INT}, or a derived type, such as @code{TYPE_CODE_PTR}
1966which is a pointer to another type. Typically, several @code{FT_*}
1967types map to one @code{TYPE_CODE_*} type, and are distinguished by
1968other members of the type struct, such as whether the type is signed
1969or unsigned, and how many bits it uses.
c906108c 1970
56caf160 1971@unnumberedsubsec Builtin Types (e.g., @code{builtin_type_void}, @code{builtin_type_char}).
c906108c
SS
1972
1973These are instances of type structs that roughly correspond to
56caf160
EZ
1974fundamental types and are created as global types for @value{GDBN} to
1975use for various ugly historical reasons. We eventually want to
1976eliminate these. Note for example that @code{builtin_type_int}
1977initialized in @file{gdbtypes.c} is basically the same as a
1978@code{TYPE_CODE_INT} type that is initialized in @file{c-lang.c} for
1979an @code{FT_INTEGER} fundamental type. The difference is that the
1980@code{builtin_type} is not associated with any particular objfile, and
1981only one instance exists, while @file{c-lang.c} builds as many
1982@code{TYPE_CODE_INT} types as needed, with each one associated with
1983some particular objfile.
c906108c
SS
1984
1985@section Object File Formats
56caf160 1986@cindex object file formats
c906108c
SS
1987
1988@subsection a.out
1989
56caf160
EZ
1990@cindex @code{a.out} format
1991The @code{a.out} format is the original file format for Unix. It
1992consists of three sections: @code{text}, @code{data}, and @code{bss},
1993which are for program code, initialized data, and uninitialized data,
1994respectively.
c906108c 1995
56caf160 1996The @code{a.out} format is so simple that it doesn't have any reserved
c906108c 1997place for debugging information. (Hey, the original Unix hackers used
56caf160
EZ
1998@samp{adb}, which is a machine-language debugger!) The only debugging
1999format for @code{a.out} is stabs, which is encoded as a set of normal
c906108c
SS
2000symbols with distinctive attributes.
2001
56caf160 2002The basic @code{a.out} reader is in @file{dbxread.c}.
c906108c
SS
2003
2004@subsection COFF
2005
56caf160 2006@cindex COFF format
c906108c
SS
2007The COFF format was introduced with System V Release 3 (SVR3) Unix.
2008COFF files may have multiple sections, each prefixed by a header. The
2009number of sections is limited.
2010
2011The COFF specification includes support for debugging. Although this
2012was a step forward, the debugging information was woefully limited. For
2013instance, it was not possible to represent code that came from an
2014included file.
2015
2016The COFF reader is in @file{coffread.c}.
2017
2018@subsection ECOFF
2019
56caf160 2020@cindex ECOFF format
c906108c
SS
2021ECOFF is an extended COFF originally introduced for Mips and Alpha
2022workstations.
2023
2024The basic ECOFF reader is in @file{mipsread.c}.
2025
2026@subsection XCOFF
2027
56caf160 2028@cindex XCOFF format
c906108c
SS
2029The IBM RS/6000 running AIX uses an object file format called XCOFF.
2030The COFF sections, symbols, and line numbers are used, but debugging
56caf160
EZ
2031symbols are @code{dbx}-style stabs whose strings are located in the
2032@code{.debug} section (rather than the string table). For more
2033information, see @ref{Top,,,stabs,The Stabs Debugging Format}.
c906108c
SS
2034
2035The shared library scheme has a clean interface for figuring out what
2036shared libraries are in use, but the catch is that everything which
2037refers to addresses (symbol tables and breakpoints at least) needs to be
2038relocated for both shared libraries and the main executable. At least
2039using the standard mechanism this can only be done once the program has
2040been run (or the core file has been read).
2041
2042@subsection PE
2043
56caf160
EZ
2044@cindex PE-COFF format
2045Windows 95 and NT use the PE (@dfn{Portable Executable}) format for their
c906108c
SS
2046executables. PE is basically COFF with additional headers.
2047
25822942 2048While BFD includes special PE support, @value{GDBN} needs only the basic
c906108c
SS
2049COFF reader.
2050
2051@subsection ELF
2052
56caf160 2053@cindex ELF format
c906108c
SS
2054The ELF format came with System V Release 4 (SVR4) Unix. ELF is similar
2055to COFF in being organized into a number of sections, but it removes
2056many of COFF's limitations.
2057
2058The basic ELF reader is in @file{elfread.c}.
2059
2060@subsection SOM
2061
56caf160 2062@cindex SOM format
c906108c
SS
2063SOM is HP's object file and debug format (not to be confused with IBM's
2064SOM, which is a cross-language ABI).
2065
2066The SOM reader is in @file{hpread.c}.
2067
2068@subsection Other File Formats
2069
56caf160 2070@cindex Netware Loadable Module format
25822942 2071Other file formats that have been supported by @value{GDBN} include Netware
4a98ee0e 2072Loadable Modules (@file{nlmread.c}).
c906108c
SS
2073
2074@section Debugging File Formats
2075
2076This section describes characteristics of debugging information that
2077are independent of the object file format.
2078
2079@subsection stabs
2080
56caf160 2081@cindex stabs debugging info
c906108c
SS
2082@code{stabs} started out as special symbols within the @code{a.out}
2083format. Since then, it has been encapsulated into other file
2084formats, such as COFF and ELF.
2085
2086While @file{dbxread.c} does some of the basic stab processing,
2087including for encapsulated versions, @file{stabsread.c} does
2088the real work.
2089
2090@subsection COFF
2091
56caf160 2092@cindex COFF debugging info
c906108c
SS
2093The basic COFF definition includes debugging information. The level
2094of support is minimal and non-extensible, and is not often used.
2095
2096@subsection Mips debug (Third Eye)
2097
56caf160 2098@cindex ECOFF debugging info
c906108c
SS
2099ECOFF includes a definition of a special debug format.
2100
2101The file @file{mdebugread.c} implements reading for this format.
2102
2103@subsection DWARF 1
2104
56caf160 2105@cindex DWARF 1 debugging info
c906108c
SS
2106DWARF 1 is a debugging format that was originally designed to be
2107used with ELF in SVR4 systems.
2108
c906108c
SS
2109@c GCC_PRODUCER
2110@c GPLUS_PRODUCER
2111@c LCC_PRODUCER
2112@c If defined, these are the producer strings in a DWARF 1 file. All of
2113@c these have reasonable defaults already.
2114
2115The DWARF 1 reader is in @file{dwarfread.c}.
2116
2117@subsection DWARF 2
2118
56caf160 2119@cindex DWARF 2 debugging info
c906108c
SS
2120DWARF 2 is an improved but incompatible version of DWARF 1.
2121
2122The DWARF 2 reader is in @file{dwarf2read.c}.
2123
2124@subsection SOM
2125
56caf160 2126@cindex SOM debugging info
c906108c
SS
2127Like COFF, the SOM definition includes debugging information.
2128
25822942 2129@section Adding a New Symbol Reader to @value{GDBN}
c906108c 2130
56caf160
EZ
2131@cindex adding debugging info reader
2132If you are using an existing object file format (@code{a.out}, COFF, ELF, etc),
c906108c
SS
2133there is probably little to be done.
2134
2135If you need to add a new object file format, you must first add it to
2136BFD. This is beyond the scope of this document.
2137
2138You must then arrange for the BFD code to provide access to the
25822942 2139debugging symbols. Generally @value{GDBN} will have to call swapping routines
c906108c 2140from BFD and a few other BFD internal routines to locate the debugging
25822942 2141information. As much as possible, @value{GDBN} should not depend on the BFD
c906108c
SS
2142internal data structures.
2143
2144For some targets (e.g., COFF), there is a special transfer vector used
2145to call swapping routines, since the external data structures on various
2146platforms have different sizes and layouts. Specialized routines that
2147will only ever be implemented by one object file format may be called
2148directly. This interface should be described in a file
56caf160 2149@file{bfd/lib@var{xyz}.h}, which is included by @value{GDBN}.
c906108c 2150
c91d38aa
DJ
2151@section Memory Management for Symbol Files
2152
2153Most memory associated with a loaded symbol file is stored on
2154its @code{objfile_obstack}. This includes symbols, types,
2155namespace data, and other information produced by the symbol readers.
2156
2157Because this data lives on the objfile's obstack, it is automatically
2158released when the objfile is unloaded or reloaded. Therefore one
2159objfile must not reference symbol or type data from another objfile;
2160they could be unloaded at different times.
2161
2162User convenience variables, et cetera, have associated types. Normally
2163these types live in the associated objfile. However, when the objfile
2164is unloaded, those types are deep copied to global memory, so that
2165the values of the user variables and history items are not lost.
2166
c906108c
SS
2167
2168@node Language Support
2169
2170@chapter Language Support
2171
56caf160
EZ
2172@cindex language support
2173@value{GDBN}'s language support is mainly driven by the symbol reader,
2174although it is possible for the user to set the source language
2175manually.
c906108c 2176
56caf160
EZ
2177@value{GDBN} chooses the source language by looking at the extension
2178of the file recorded in the debug info; @file{.c} means C, @file{.f}
2179means Fortran, etc. It may also use a special-purpose language
2180identifier if the debug format supports it, like with DWARF.
c906108c 2181
25822942 2182@section Adding a Source Language to @value{GDBN}
c906108c 2183
56caf160
EZ
2184@cindex adding source language
2185To add other languages to @value{GDBN}'s expression parser, follow the
2186following steps:
c906108c
SS
2187
2188@table @emph
2189@item Create the expression parser.
2190
56caf160 2191@cindex expression parser
c906108c 2192This should reside in a file @file{@var{lang}-exp.y}. Routines for
56caf160 2193building parsed expressions into a @code{union exp_element} list are in
c906108c
SS
2194@file{parse.c}.
2195
56caf160 2196@cindex language parser
c906108c
SS
2197Since we can't depend upon everyone having Bison, and YACC produces
2198parsers that define a bunch of global names, the following lines
56caf160 2199@strong{must} be included at the top of the YACC parser, to prevent the
c906108c
SS
2200various parsers from defining the same global names:
2201
474c8240 2202@smallexample
56caf160
EZ
2203#define yyparse @var{lang}_parse
2204#define yylex @var{lang}_lex
2205#define yyerror @var{lang}_error
2206#define yylval @var{lang}_lval
2207#define yychar @var{lang}_char
2208#define yydebug @var{lang}_debug
2209#define yypact @var{lang}_pact
2210#define yyr1 @var{lang}_r1
2211#define yyr2 @var{lang}_r2
2212#define yydef @var{lang}_def
2213#define yychk @var{lang}_chk
2214#define yypgo @var{lang}_pgo
2215#define yyact @var{lang}_act
2216#define yyexca @var{lang}_exca
2217#define yyerrflag @var{lang}_errflag
2218#define yynerrs @var{lang}_nerrs
474c8240 2219@end smallexample
c906108c
SS
2220
2221At the bottom of your parser, define a @code{struct language_defn} and
2222initialize it with the right values for your language. Define an
2223@code{initialize_@var{lang}} routine and have it call
25822942 2224@samp{add_language(@var{lang}_language_defn)} to tell the rest of @value{GDBN}
c906108c
SS
2225that your language exists. You'll need some other supporting variables
2226and functions, which will be used via pointers from your
2227@code{@var{lang}_language_defn}. See the declaration of @code{struct
2228language_defn} in @file{language.h}, and the other @file{*-exp.y} files,
2229for more information.
2230
2231@item Add any evaluation routines, if necessary
2232
56caf160
EZ
2233@cindex expression evaluation routines
2234@findex evaluate_subexp
2235@findex prefixify_subexp
2236@findex length_of_subexp
c906108c
SS
2237If you need new opcodes (that represent the operations of the language),
2238add them to the enumerated type in @file{expression.h}. Add support
56caf160
EZ
2239code for these operations in the @code{evaluate_subexp} function
2240defined in the file @file{eval.c}. Add cases
c906108c 2241for new opcodes in two functions from @file{parse.c}:
56caf160 2242@code{prefixify_subexp} and @code{length_of_subexp}. These compute
c906108c
SS
2243the number of @code{exp_element}s that a given operation takes up.
2244
2245@item Update some existing code
2246
2247Add an enumerated identifier for your language to the enumerated type
2248@code{enum language} in @file{defs.h}.
2249
2250Update the routines in @file{language.c} so your language is included.
2251These routines include type predicates and such, which (in some cases)
2252are language dependent. If your language does not appear in the switch
2253statement, an error is reported.
2254
56caf160 2255@vindex current_language
c906108c
SS
2256Also included in @file{language.c} is the code that updates the variable
2257@code{current_language}, and the routines that translate the
2258@code{language_@var{lang}} enumerated identifier into a printable
2259string.
2260
56caf160 2261@findex _initialize_language
c906108c
SS
2262Update the function @code{_initialize_language} to include your
2263language. This function picks the default language upon startup, so is
25822942 2264dependent upon which languages that @value{GDBN} is built for.
c906108c 2265
56caf160 2266@findex allocate_symtab
c906108c
SS
2267Update @code{allocate_symtab} in @file{symfile.c} and/or symbol-reading
2268code so that the language of each symtab (source file) is set properly.
2269This is used to determine the language to use at each stack frame level.
2270Currently, the language is set based upon the extension of the source
2271file. If the language can be better inferred from the symbol
2272information, please set the language of the symtab in the symbol-reading
2273code.
2274
56caf160
EZ
2275@findex print_subexp
2276@findex op_print_tab
2277Add helper code to @code{print_subexp} (in @file{expprint.c}) to handle any new
c906108c
SS
2278expression opcodes you have added to @file{expression.h}. Also, add the
2279printed representations of your operators to @code{op_print_tab}.
2280
2281@item Add a place of call
2282
56caf160 2283@findex parse_exp_1
c906108c 2284Add a call to @code{@var{lang}_parse()} and @code{@var{lang}_error} in
56caf160 2285@code{parse_exp_1} (defined in @file{parse.c}).
c906108c
SS
2286
2287@item Use macros to trim code
2288
56caf160 2289@cindex trimming language-dependent code
25822942
DB
2290The user has the option of building @value{GDBN} for some or all of the
2291languages. If the user decides to build @value{GDBN} for the language
c906108c
SS
2292@var{lang}, then every file dependent on @file{language.h} will have the
2293macro @code{_LANG_@var{lang}} defined in it. Use @code{#ifdef}s to
2294leave out large routines that the user won't need if he or she is not
2295using your language.
2296
25822942 2297Note that you do not need to do this in your YACC parser, since if @value{GDBN}
c906108c 2298is not build for @var{lang}, then @file{@var{lang}-exp.tab.o} (the
25822942 2299compiled form of your parser) is not linked into @value{GDBN} at all.
c906108c 2300
56caf160
EZ
2301See the file @file{configure.in} for how @value{GDBN} is configured
2302for different languages.
c906108c
SS
2303
2304@item Edit @file{Makefile.in}
2305
2306Add dependencies in @file{Makefile.in}. Make sure you update the macro
2307variables such as @code{HFILES} and @code{OBJS}, otherwise your code may
2308not get linked in, or, worse yet, it may not get @code{tar}red into the
2309distribution!
c906108c
SS
2310@end table
2311
2312
2313@node Host Definition
2314
2315@chapter Host Definition
2316
56caf160 2317With the advent of Autoconf, it's rarely necessary to have host
7fd60527
AC
2318definition machinery anymore. The following information is provided,
2319mainly, as an historical reference.
c906108c
SS
2320
2321@section Adding a New Host
2322
56caf160
EZ
2323@cindex adding a new host
2324@cindex host, adding
7fd60527
AC
2325@value{GDBN}'s host configuration support normally happens via Autoconf.
2326New host-specific definitions should not be needed. Older hosts
2327@value{GDBN} still use the host-specific definitions and files listed
2328below, but these mostly exist for historical reasons, and will
56caf160 2329eventually disappear.
c906108c 2330
c906108c 2331@table @file
c906108c 2332@item gdb/config/@var{arch}/@var{xyz}.mh
7fd60527
AC
2333This file once contained both host and native configuration information
2334(@pxref{Native Debugging}) for the machine @var{xyz}. The host
2335configuration information is now handed by Autoconf.
2336
2337Host configuration information included a definition of
2338@code{XM_FILE=xm-@var{xyz}.h} and possibly definitions for @code{CC},
7708fa01
AC
2339@code{SYSV_DEFINE}, @code{XM_CFLAGS}, @code{XM_ADD_FILES},
2340@code{XM_CLIBS}, @code{XM_CDEPS}, etc.; see @file{Makefile.in}.
c906108c 2341
7fd60527
AC
2342New host only configurations do not need this file.
2343
c906108c 2344@item gdb/config/@var{arch}/xm-@var{xyz}.h
7fd60527
AC
2345This file once contained definitions and includes required when hosting
2346gdb on machine @var{xyz}. Those definitions and includes are now
2347handled by Autoconf.
2348
2349New host and native configurations do not need this file.
2350
2351@emph{Maintainer's note: Some hosts continue to use the @file{xm-xyz.h}
2352file to define the macros @var{HOST_FLOAT_FORMAT},
2353@var{HOST_DOUBLE_FORMAT} and @var{HOST_LONG_DOUBLE_FORMAT}. That code
2354also needs to be replaced with either an Autoconf or run-time test.}
c906108c 2355
c906108c
SS
2356@end table
2357
2358@subheading Generic Host Support Files
2359
56caf160 2360@cindex generic host support
c906108c
SS
2361There are some ``generic'' versions of routines that can be used by
2362various systems. These can be customized in various ways by macros
2363defined in your @file{xm-@var{xyz}.h} file. If these routines work for
2364the @var{xyz} host, you can just include the generic file's name (with
2365@samp{.o}, not @samp{.c}) in @code{XDEPFILES}.
2366
2367Otherwise, if your machine needs custom support routines, you will need
2368to write routines that perform the same functions as the generic file.
2369Put them into @code{@var{xyz}-xdep.c}, and put @code{@var{xyz}-xdep.o}
2370into @code{XDEPFILES}.
2371
2372@table @file
56caf160
EZ
2373@cindex remote debugging support
2374@cindex serial line support
c906108c
SS
2375@item ser-unix.c
2376This contains serial line support for Unix systems. This is always
2377included, via the makefile variable @code{SER_HARDWIRE}; override this
2378variable in the @file{.mh} file to avoid it.
2379
2380@item ser-go32.c
2381This contains serial line support for 32-bit programs running under DOS,
56caf160 2382using the DJGPP (a.k.a.@: GO32) execution environment.
c906108c 2383
56caf160 2384@cindex TCP remote support
c906108c
SS
2385@item ser-tcp.c
2386This contains generic TCP support using sockets.
c906108c
SS
2387@end table
2388
2389@section Host Conditionals
2390
56caf160
EZ
2391When @value{GDBN} is configured and compiled, various macros are
2392defined or left undefined, to control compilation based on the
2393attributes of the host system. These macros and their meanings (or if
2394the meaning is not documented here, then one of the source files where
2395they are used is indicated) are:
c906108c 2396
56caf160 2397@ftable @code
25822942 2398@item @value{GDBN}INIT_FILENAME
56caf160
EZ
2399The default name of @value{GDBN}'s initialization file (normally
2400@file{.gdbinit}).
c906108c 2401
cce74817
JM
2402@item NO_STD_REGS
2403This macro is deprecated.
2404
c906108c
SS
2405@item SIGWINCH_HANDLER
2406If your host defines @code{SIGWINCH}, you can define this to be the name
2407of a function to be called if @code{SIGWINCH} is received.
2408
2409@item SIGWINCH_HANDLER_BODY
2410Define this to expand into code that will define the function named by
2411the expansion of @code{SIGWINCH_HANDLER}.
2412
2413@item ALIGN_STACK_ON_STARTUP
56caf160 2414@cindex stack alignment
c906108c
SS
2415Define this if your system is of a sort that will crash in
2416@code{tgetent} if the stack happens not to be longword-aligned when
2417@code{main} is called. This is a rare situation, but is known to occur
2418on several different types of systems.
2419
2420@item CRLF_SOURCE_FILES
56caf160 2421@cindex DOS text files
c906108c
SS
2422Define this if host files use @code{\r\n} rather than @code{\n} as a
2423line terminator. This will cause source file listings to omit @code{\r}
56caf160
EZ
2424characters when printing and it will allow @code{\r\n} line endings of files
2425which are ``sourced'' by gdb. It must be possible to open files in binary
c906108c
SS
2426mode using @code{O_BINARY} or, for fopen, @code{"rb"}.
2427
2428@item DEFAULT_PROMPT
56caf160 2429@cindex prompt
c906108c
SS
2430The default value of the prompt string (normally @code{"(gdb) "}).
2431
2432@item DEV_TTY
56caf160 2433@cindex terminal device
c906108c
SS
2434The name of the generic TTY device, defaults to @code{"/dev/tty"}.
2435
c906108c
SS
2436@item FOPEN_RB
2437Define this if binary files are opened the same way as text files.
2438
c906108c 2439@item HAVE_MMAP
56caf160 2440@findex mmap
c906108c
SS
2441In some cases, use the system call @code{mmap} for reading symbol
2442tables. For some machines this allows for sharing and quick updates.
2443
c906108c
SS
2444@item HAVE_TERMIO
2445Define this if the host system has @code{termio.h}.
2446
c906108c 2447@item INT_MAX
9742079a
EZ
2448@itemx INT_MIN
2449@itemx LONG_MAX
2450@itemx UINT_MAX
2451@itemx ULONG_MAX
c906108c
SS
2452Values for host-side constants.
2453
2454@item ISATTY
2455Substitute for isatty, if not available.
2456
2457@item LONGEST
2458This is the longest integer type available on the host. If not defined,
2459it will default to @code{long long} or @code{long}, depending on
2460@code{CC_HAS_LONG_LONG}.
2461
2462@item CC_HAS_LONG_LONG
56caf160
EZ
2463@cindex @code{long long} data type
2464Define this if the host C compiler supports @code{long long}. This is set
2465by the @code{configure} script.
c906108c
SS
2466
2467@item PRINTF_HAS_LONG_LONG
2468Define this if the host can handle printing of long long integers via
56caf160
EZ
2469the printf format conversion specifier @code{ll}. This is set by the
2470@code{configure} script.
c906108c
SS
2471
2472@item HAVE_LONG_DOUBLE
56caf160
EZ
2473Define this if the host C compiler supports @code{long double}. This is
2474set by the @code{configure} script.
c906108c
SS
2475
2476@item PRINTF_HAS_LONG_DOUBLE
2477Define this if the host can handle printing of long double float-point
56caf160
EZ
2478numbers via the printf format conversion specifier @code{Lg}. This is
2479set by the @code{configure} script.
c906108c
SS
2480
2481@item SCANF_HAS_LONG_DOUBLE
2482Define this if the host can handle the parsing of long double
56caf160
EZ
2483float-point numbers via the scanf format conversion specifier
2484@code{Lg}. This is set by the @code{configure} script.
c906108c
SS
2485
2486@item LSEEK_NOT_LINEAR
2487Define this if @code{lseek (n)} does not necessarily move to byte number
2488@code{n} in the file. This is only used when reading source files. It
2489is normally faster to define @code{CRLF_SOURCE_FILES} when possible.
2490
2491@item L_SET
56caf160
EZ
2492This macro is used as the argument to @code{lseek} (or, most commonly,
2493@code{bfd_seek}). FIXME, should be replaced by SEEK_SET instead,
2494which is the POSIX equivalent.
c906108c 2495
c906108c
SS
2496@item NORETURN
2497If defined, this should be one or more tokens, such as @code{volatile},
2498that can be used in both the declaration and definition of functions to
2499indicate that they never return. The default is already set correctly
2500if compiling with GCC. This will almost never need to be defined.
2501
2502@item ATTR_NORETURN
2503If defined, this should be one or more tokens, such as
2504@code{__attribute__ ((noreturn))}, that can be used in the declarations
2505of functions to indicate that they never return. The default is already
2506set correctly if compiling with GCC. This will almost never need to be
2507defined.
2508
c906108c 2509@item SEEK_CUR
9742079a 2510@itemx SEEK_SET
56caf160 2511Define these to appropriate value for the system @code{lseek}, if not already
c906108c
SS
2512defined.
2513
2514@item STOP_SIGNAL
56caf160
EZ
2515This is the signal for stopping @value{GDBN}. Defaults to
2516@code{SIGTSTP}. (Only redefined for the Convex.)
c906108c 2517
c906108c
SS
2518@item USG
2519Means that System V (prior to SVR4) include files are in use. (FIXME:
7ca9f392
AC
2520This symbol is abused in @file{infrun.c}, @file{regex.c}, and
2521@file{utils.c} for other things, at the moment.)
c906108c
SS
2522
2523@item lint
56caf160 2524Define this to help placate @code{lint} in some situations.
c906108c
SS
2525
2526@item volatile
2527Define this to override the defaults of @code{__volatile__} or
2528@code{/**/}.
56caf160 2529@end ftable
c906108c
SS
2530
2531
2532@node Target Architecture Definition
2533
2534@chapter Target Architecture Definition
2535
56caf160
EZ
2536@cindex target architecture definition
2537@value{GDBN}'s target architecture defines what sort of
2538machine-language programs @value{GDBN} can work with, and how it works
2539with them.
c906108c 2540
af6c57ea
AC
2541The target architecture object is implemented as the C structure
2542@code{struct gdbarch *}. The structure, and its methods, are generated
93c2c750 2543using the Bourne shell script @file{gdbarch.sh}.
c906108c 2544
70f80edf
JT
2545@section Operating System ABI Variant Handling
2546@cindex OS ABI variants
2547
2548@value{GDBN} provides a mechanism for handling variations in OS
2549ABIs. An OS ABI variant may have influence over any number of
2550variables in the target architecture definition. There are two major
2551components in the OS ABI mechanism: sniffers and handlers.
2552
2553A @dfn{sniffer} examines a file matching a BFD architecture/flavour pair
2554(the architecture may be wildcarded) in an attempt to determine the
2555OS ABI of that file. Sniffers with a wildcarded architecture are considered
2556to be @dfn{generic}, while sniffers for a specific architecture are
2557considered to be @dfn{specific}. A match from a specific sniffer
2558overrides a match from a generic sniffer. Multiple sniffers for an
2559architecture/flavour may exist, in order to differentiate between two
2560different operating systems which use the same basic file format. The
2561OS ABI framework provides a generic sniffer for ELF-format files which
2562examines the @code{EI_OSABI} field of the ELF header, as well as note
2563sections known to be used by several operating systems.
2564
2565@cindex fine-tuning @code{gdbarch} structure
2566A @dfn{handler} is used to fine-tune the @code{gdbarch} structure for the
2567selected OS ABI. There may be only one handler for a given OS ABI
2568for each BFD architecture.
2569
2570The following OS ABI variants are defined in @file{osabi.h}:
2571
2572@table @code
2573
2574@findex GDB_OSABI_UNKNOWN
2575@item GDB_OSABI_UNKNOWN
2576The ABI of the inferior is unknown. The default @code{gdbarch}
2577settings for the architecture will be used.
2578
2579@findex GDB_OSABI_SVR4
2580@item GDB_OSABI_SVR4
2581UNIX System V Release 4
2582
2583@findex GDB_OSABI_HURD
2584@item GDB_OSABI_HURD
2585GNU using the Hurd kernel
2586
2587@findex GDB_OSABI_SOLARIS
2588@item GDB_OSABI_SOLARIS
2589Sun Solaris
2590
2591@findex GDB_OSABI_OSF1
2592@item GDB_OSABI_OSF1
2593OSF/1, including Digital UNIX and Compaq Tru64 UNIX
2594
2595@findex GDB_OSABI_LINUX
2596@item GDB_OSABI_LINUX
2597GNU using the Linux kernel
2598
2599@findex GDB_OSABI_FREEBSD_AOUT
2600@item GDB_OSABI_FREEBSD_AOUT
2601FreeBSD using the a.out executable format
2602
2603@findex GDB_OSABI_FREEBSD_ELF
2604@item GDB_OSABI_FREEBSD_ELF
2605FreeBSD using the ELF executable format
2606
2607@findex GDB_OSABI_NETBSD_AOUT
2608@item GDB_OSABI_NETBSD_AOUT
2609NetBSD using the a.out executable format
2610
2611@findex GDB_OSABI_NETBSD_ELF
2612@item GDB_OSABI_NETBSD_ELF
2613NetBSD using the ELF executable format
2614
2615@findex GDB_OSABI_WINCE
2616@item GDB_OSABI_WINCE
2617Windows CE
2618
1029b7fa
MK
2619@findex GDB_OSABI_GO32
2620@item GDB_OSABI_GO32
2621DJGPP
2622
2623@findex GDB_OSABI_NETWARE
2624@item GDB_OSABI_NETWARE
2625Novell NetWare
2626
70f80edf
JT
2627@findex GDB_OSABI_ARM_EABI_V1
2628@item GDB_OSABI_ARM_EABI_V1
2629ARM Embedded ABI version 1
2630
2631@findex GDB_OSABI_ARM_EABI_V2
2632@item GDB_OSABI_ARM_EABI_V2
2633ARM Embedded ABI version 2
2634
2635@findex GDB_OSABI_ARM_APCS
2636@item GDB_OSABI_ARM_APCS
2637Generic ARM Procedure Call Standard
2638
2639@end table
2640
2641Here are the functions that make up the OS ABI framework:
2642
2643@deftypefun const char *gdbarch_osabi_name (enum gdb_osabi @var{osabi})
2644Return the name of the OS ABI corresponding to @var{osabi}.
2645@end deftypefun
2646
c133ab7a 2647@deftypefun void gdbarch_register_osabi (enum bfd_architecture @var{arch}, unsigned long @var{machine}, enum gdb_osabi @var{osabi}, void (*@var{init_osabi})(struct gdbarch_info @var{info}, struct gdbarch *@var{gdbarch}))
70f80edf 2648Register the OS ABI handler specified by @var{init_osabi} for the
c133ab7a
MK
2649architecture, machine type and OS ABI specified by @var{arch},
2650@var{machine} and @var{osabi}. In most cases, a value of zero for the
2651machine type, which implies the architecture's default machine type,
2652will suffice.
70f80edf
JT
2653@end deftypefun
2654
2655@deftypefun void gdbarch_register_osabi_sniffer (enum bfd_architecture @var{arch}, enum bfd_flavour @var{flavour}, enum gdb_osabi (*@var{sniffer})(bfd *@var{abfd}))
2656Register the OS ABI file sniffer specified by @var{sniffer} for the
2657BFD architecture/flavour pair specified by @var{arch} and @var{flavour}.
2658If @var{arch} is @code{bfd_arch_unknown}, the sniffer is considered to
2659be generic, and is allowed to examine @var{flavour}-flavoured files for
2660any architecture.
2661@end deftypefun
2662
2663@deftypefun enum gdb_osabi gdbarch_lookup_osabi (bfd *@var{abfd})
2664Examine the file described by @var{abfd} to determine its OS ABI.
2665The value @code{GDB_OSABI_UNKNOWN} is returned if the OS ABI cannot
2666be determined.
2667@end deftypefun
2668
2669@deftypefun void gdbarch_init_osabi (struct gdbarch info @var{info}, struct gdbarch *@var{gdbarch}, enum gdb_osabi @var{osabi})
2670Invoke the OS ABI handler corresponding to @var{osabi} to fine-tune the
2671@code{gdbarch} structure specified by @var{gdbarch}. If a handler
2672corresponding to @var{osabi} has not been registered for @var{gdbarch}'s
2673architecture, a warning will be issued and the debugging session will continue
2674with the defaults already established for @var{gdbarch}.
2675@end deftypefun
2676
c906108c
SS
2677@section Registers and Memory
2678
56caf160
EZ
2679@value{GDBN}'s model of the target machine is rather simple.
2680@value{GDBN} assumes the machine includes a bank of registers and a
2681block of memory. Each register may have a different size.
c906108c 2682
56caf160
EZ
2683@value{GDBN} does not have a magical way to match up with the
2684compiler's idea of which registers are which; however, it is critical
2685that they do match up accurately. The only way to make this work is
2686to get accurate information about the order that the compiler uses,
2687and to reflect that in the @code{REGISTER_NAME} and related macros.
c906108c 2688
25822942 2689@value{GDBN} can handle big-endian, little-endian, and bi-endian architectures.
c906108c 2690
93e79dbd
JB
2691@section Pointers Are Not Always Addresses
2692@cindex pointer representation
2693@cindex address representation
2694@cindex word-addressed machines
2695@cindex separate data and code address spaces
2696@cindex spaces, separate data and code address
2697@cindex address spaces, separate data and code
2698@cindex code pointers, word-addressed
2699@cindex converting between pointers and addresses
2700@cindex D10V addresses
2701
2702On almost all 32-bit architectures, the representation of a pointer is
2703indistinguishable from the representation of some fixed-length number
2704whose value is the byte address of the object pointed to. On such
56caf160 2705machines, the words ``pointer'' and ``address'' can be used interchangeably.
93e79dbd
JB
2706However, architectures with smaller word sizes are often cramped for
2707address space, so they may choose a pointer representation that breaks this
2708identity, and allows a larger code address space.
2709
172c2a43 2710For example, the Renesas D10V is a 16-bit VLIW processor whose
93e79dbd
JB
2711instructions are 32 bits long@footnote{Some D10V instructions are
2712actually pairs of 16-bit sub-instructions. However, since you can't
2713jump into the middle of such a pair, code addresses can only refer to
2714full 32 bit instructions, which is what matters in this explanation.}.
2715If the D10V used ordinary byte addresses to refer to code locations,
2716then the processor would only be able to address 64kb of instructions.
2717However, since instructions must be aligned on four-byte boundaries, the
56caf160
EZ
2718low two bits of any valid instruction's byte address are always
2719zero---byte addresses waste two bits. So instead of byte addresses,
2720the D10V uses word addresses---byte addresses shifted right two bits---to
93e79dbd
JB
2721refer to code. Thus, the D10V can use 16-bit words to address 256kb of
2722code space.
2723
2724However, this means that code pointers and data pointers have different
2725forms on the D10V. The 16-bit word @code{0xC020} refers to byte address
2726@code{0xC020} when used as a data address, but refers to byte address
2727@code{0x30080} when used as a code address.
2728
2729(The D10V also uses separate code and data address spaces, which also
2730affects the correspondence between pointers and addresses, but we're
2731going to ignore that here; this example is already too long.)
2732
56caf160
EZ
2733To cope with architectures like this---the D10V is not the only
2734one!---@value{GDBN} tries to distinguish between @dfn{addresses}, which are
93e79dbd
JB
2735byte numbers, and @dfn{pointers}, which are the target's representation
2736of an address of a particular type of data. In the example above,
2737@code{0xC020} is the pointer, which refers to one of the addresses
2738@code{0xC020} or @code{0x30080}, depending on the type imposed upon it.
2739@value{GDBN} provides functions for turning a pointer into an address
2740and vice versa, in the appropriate way for the current architecture.
2741
2742Unfortunately, since addresses and pointers are identical on almost all
2743processors, this distinction tends to bit-rot pretty quickly. Thus,
2744each time you port @value{GDBN} to an architecture which does
2745distinguish between pointers and addresses, you'll probably need to
2746clean up some architecture-independent code.
2747
2748Here are functions which convert between pointers and addresses:
2749
2750@deftypefun CORE_ADDR extract_typed_address (void *@var{buf}, struct type *@var{type})
2751Treat the bytes at @var{buf} as a pointer or reference of type
2752@var{type}, and return the address it represents, in a manner
2753appropriate for the current architecture. This yields an address
2754@value{GDBN} can use to read target memory, disassemble, etc. Note that
2755@var{buf} refers to a buffer in @value{GDBN}'s memory, not the
2756inferior's.
2757
2758For example, if the current architecture is the Intel x86, this function
2759extracts a little-endian integer of the appropriate length from
2760@var{buf} and returns it. However, if the current architecture is the
2761D10V, this function will return a 16-bit integer extracted from
2762@var{buf}, multiplied by four if @var{type} is a pointer to a function.
2763
2764If @var{type} is not a pointer or reference type, then this function
2765will signal an internal error.
2766@end deftypefun
2767
2768@deftypefun CORE_ADDR store_typed_address (void *@var{buf}, struct type *@var{type}, CORE_ADDR @var{addr})
2769Store the address @var{addr} in @var{buf}, in the proper format for a
2770pointer of type @var{type} in the current architecture. Note that
2771@var{buf} refers to a buffer in @value{GDBN}'s memory, not the
2772inferior's.
2773
2774For example, if the current architecture is the Intel x86, this function
2775stores @var{addr} unmodified as a little-endian integer of the
2776appropriate length in @var{buf}. However, if the current architecture
2777is the D10V, this function divides @var{addr} by four if @var{type} is
2778a pointer to a function, and then stores it in @var{buf}.
2779
2780If @var{type} is not a pointer or reference type, then this function
2781will signal an internal error.
2782@end deftypefun
2783
f23631e4 2784@deftypefun CORE_ADDR value_as_address (struct value *@var{val})
93e79dbd
JB
2785Assuming that @var{val} is a pointer, return the address it represents,
2786as appropriate for the current architecture.
2787
2788This function actually works on integral values, as well as pointers.
2789For pointers, it performs architecture-specific conversions as
2790described above for @code{extract_typed_address}.
2791@end deftypefun
2792
2793@deftypefun CORE_ADDR value_from_pointer (struct type *@var{type}, CORE_ADDR @var{addr})
2794Create and return a value representing a pointer of type @var{type} to
2795the address @var{addr}, as appropriate for the current architecture.
2796This function performs architecture-specific conversions as described
2797above for @code{store_typed_address}.
2798@end deftypefun
2799
93e79dbd
JB
2800Here are some macros which architectures can define to indicate the
2801relationship between pointers and addresses. These have default
2802definitions, appropriate for architectures on which all pointers are
fc0c74b1 2803simple unsigned byte addresses.
93e79dbd
JB
2804
2805@deftypefn {Target Macro} CORE_ADDR POINTER_TO_ADDRESS (struct type *@var{type}, char *@var{buf})
2806Assume that @var{buf} holds a pointer of type @var{type}, in the
2807appropriate format for the current architecture. Return the byte
2808address the pointer refers to.
2809
2810This function may safely assume that @var{type} is either a pointer or a
56caf160 2811C@t{++} reference type.
93e79dbd
JB
2812@end deftypefn
2813
2814@deftypefn {Target Macro} void ADDRESS_TO_POINTER (struct type *@var{type}, char *@var{buf}, CORE_ADDR @var{addr})
2815Store in @var{buf} a pointer of type @var{type} representing the address
2816@var{addr}, in the appropriate format for the current architecture.
2817
2818This function may safely assume that @var{type} is either a pointer or a
56caf160 2819C@t{++} reference type.
93e79dbd
JB
2820@end deftypefn
2821
b5b0480a
KB
2822@section Address Classes
2823@cindex address classes
2824@cindex DW_AT_byte_size
2825@cindex DW_AT_address_class
2826
2827Sometimes information about different kinds of addresses is available
2828via the debug information. For example, some programming environments
2829define addresses of several different sizes. If the debug information
2830distinguishes these kinds of address classes through either the size
2831info (e.g, @code{DW_AT_byte_size} in @w{DWARF 2}) or through an explicit
2832address class attribute (e.g, @code{DW_AT_address_class} in @w{DWARF 2}), the
2833following macros should be defined in order to disambiguate these
2834types within @value{GDBN} as well as provide the added information to
2835a @value{GDBN} user when printing type expressions.
2836
2837@deftypefn {Target Macro} int ADDRESS_CLASS_TYPE_FLAGS (int @var{byte_size}, int @var{dwarf2_addr_class})
2838Returns the type flags needed to construct a pointer type whose size
2839is @var{byte_size} and whose address class is @var{dwarf2_addr_class}.
2840This function is normally called from within a symbol reader. See
2841@file{dwarf2read.c}.
2842@end deftypefn
2843
2844@deftypefn {Target Macro} char *ADDRESS_CLASS_TYPE_FLAGS_TO_NAME (int @var{type_flags})
2845Given the type flags representing an address class qualifier, return
2846its name.
2847@end deftypefn
2848@deftypefn {Target Macro} int ADDRESS_CLASS_NAME_to_TYPE_FLAGS (int @var{name}, int *var{type_flags_ptr})
2849Given an address qualifier name, set the @code{int} refererenced by @var{type_flags_ptr} to the type flags
2850for that address class qualifier.
2851@end deftypefn
2852
2853Since the need for address classes is rather rare, none of
2854the address class macros defined by default. Predicate
2855macros are provided to detect when they are defined.
2856
2857Consider a hypothetical architecture in which addresses are normally
285832-bits wide, but 16-bit addresses are also supported. Furthermore,
2859suppose that the @w{DWARF 2} information for this architecture simply
2860uses a @code{DW_AT_byte_size} value of 2 to indicate the use of one
2861of these "short" pointers. The following functions could be defined
2862to implement the address class macros:
2863
2864@smallexample
2865somearch_address_class_type_flags (int byte_size,
2866 int dwarf2_addr_class)
f2abfe65 2867@{
b5b0480a
KB
2868 if (byte_size == 2)
2869 return TYPE_FLAG_ADDRESS_CLASS_1;
2870 else
2871 return 0;
f2abfe65 2872@}
b5b0480a
KB
2873
2874static char *
2875somearch_address_class_type_flags_to_name (int type_flags)
f2abfe65 2876@{
b5b0480a
KB
2877 if (type_flags & TYPE_FLAG_ADDRESS_CLASS_1)
2878 return "short";
2879 else
2880 return NULL;
f2abfe65 2881@}
b5b0480a
KB
2882
2883int
2884somearch_address_class_name_to_type_flags (char *name,
2885 int *type_flags_ptr)
f2abfe65 2886@{
b5b0480a 2887 if (strcmp (name, "short") == 0)
f2abfe65 2888 @{
b5b0480a
KB
2889 *type_flags_ptr = TYPE_FLAG_ADDRESS_CLASS_1;
2890 return 1;
f2abfe65 2891 @}
b5b0480a
KB
2892 else
2893 return 0;
f2abfe65 2894@}
b5b0480a
KB
2895@end smallexample
2896
2897The qualifier @code{@@short} is used in @value{GDBN}'s type expressions
2898to indicate the presence of one of these "short" pointers. E.g, if
2899the debug information indicates that @code{short_ptr_var} is one of these
2900short pointers, @value{GDBN} might show the following behavior:
2901
2902@smallexample
2903(gdb) ptype short_ptr_var
2904type = int * @@short
2905@end smallexample
2906
93e79dbd 2907
13d01224
AC
2908@section Raw and Virtual Register Representations
2909@cindex raw register representation
2910@cindex virtual register representation
2911@cindex representations, raw and virtual registers
2912
2913@emph{Maintainer note: This section is pretty much obsolete. The
2914functionality described here has largely been replaced by
2915pseudo-registers and the mechanisms described in @ref{Target
2916Architecture Definition, , Using Different Register and Memory Data
2917Representations}. See also @uref{http://www.gnu.org/software/gdb/bugs/,
2918Bug Tracking Database} and
2919@uref{http://sources.redhat.com/gdb/current/ari/, ARI Index} for more
2920up-to-date information.}
af6c57ea 2921
9fb4dd36
JB
2922Some architectures use one representation for a value when it lives in a
2923register, but use a different representation when it lives in memory.
25822942 2924In @value{GDBN}'s terminology, the @dfn{raw} representation is the one used in
9fb4dd36 2925the target registers, and the @dfn{virtual} representation is the one
25822942 2926used in memory, and within @value{GDBN} @code{struct value} objects.
9fb4dd36 2927
13d01224
AC
2928@emph{Maintainer note: Notice that the same mechanism is being used to
2929both convert a register to a @code{struct value} and alternative
2930register forms.}
2931
9fb4dd36
JB
2932For almost all data types on almost all architectures, the virtual and
2933raw representations are identical, and no special handling is needed.
2934However, they do occasionally differ. For example:
2935
2936@itemize @bullet
9fb4dd36 2937@item
56caf160 2938The x86 architecture supports an 80-bit @code{long double} type. However, when
9fb4dd36
JB
2939we store those values in memory, they occupy twelve bytes: the
2940floating-point number occupies the first ten, and the final two bytes
2941are unused. This keeps the values aligned on four-byte boundaries,
2942allowing more efficient access. Thus, the x86 80-bit floating-point
2943type is the raw representation, and the twelve-byte loosely-packed
2944arrangement is the virtual representation.
2945
2946@item
25822942
DB
2947Some 64-bit MIPS targets present 32-bit registers to @value{GDBN} as 64-bit
2948registers, with garbage in their upper bits. @value{GDBN} ignores the top 32
9fb4dd36
JB
2949bits. Thus, the 64-bit form, with garbage in the upper 32 bits, is the
2950raw representation, and the trimmed 32-bit representation is the
2951virtual representation.
9fb4dd36
JB
2952@end itemize
2953
2954In general, the raw representation is determined by the architecture, or
25822942
DB
2955@value{GDBN}'s interface to the architecture, while the virtual representation
2956can be chosen for @value{GDBN}'s convenience. @value{GDBN}'s register file,
56caf160
EZ
2957@code{registers}, holds the register contents in raw format, and the
2958@value{GDBN} remote protocol transmits register values in raw format.
9fb4dd36 2959
56caf160
EZ
2960Your architecture may define the following macros to request
2961conversions between the raw and virtual format:
9fb4dd36
JB
2962
2963@deftypefn {Target Macro} int REGISTER_CONVERTIBLE (int @var{reg})
2964Return non-zero if register number @var{reg}'s value needs different raw
2965and virtual formats.
6f6ef15a
EZ
2966
2967You should not use @code{REGISTER_CONVERT_TO_VIRTUAL} for a register
2968unless this macro returns a non-zero value for that register.
9fb4dd36
JB
2969@end deftypefn
2970
12c266ea 2971@deftypefn {Target Macro} int DEPRECATED_REGISTER_RAW_SIZE (int @var{reg})
9fb4dd36 2972The size of register number @var{reg}'s raw value. This is the number
25822942 2973of bytes the register will occupy in @code{registers}, or in a @value{GDBN}
9fb4dd36
JB
2974remote protocol packet.
2975@end deftypefn
2976
f30992d4 2977@deftypefn {Target Macro} int DEPRECATED_REGISTER_VIRTUAL_SIZE (int @var{reg})
9fb4dd36
JB
2978The size of register number @var{reg}'s value, in its virtual format.
2979This is the size a @code{struct value}'s buffer will have, holding that
2980register's value.
2981@end deftypefn
2982
2e092625 2983@deftypefn {Target Macro} struct type *DEPRECATED_REGISTER_VIRTUAL_TYPE (int @var{reg})
9fb4dd36
JB
2984This is the type of the virtual representation of register number
2985@var{reg}. Note that there is no need for a macro giving a type for the
25822942 2986register's raw form; once the register's value has been obtained, @value{GDBN}
9fb4dd36
JB
2987always uses the virtual form.
2988@end deftypefn
2989
2990@deftypefn {Target Macro} void REGISTER_CONVERT_TO_VIRTUAL (int @var{reg}, struct type *@var{type}, char *@var{from}, char *@var{to})
2991Convert the value of register number @var{reg} to @var{type}, which
2e092625 2992should always be @code{DEPRECATED_REGISTER_VIRTUAL_TYPE (@var{reg})}. The buffer
9fb4dd36
JB
2993at @var{from} holds the register's value in raw format; the macro should
2994convert the value to virtual format, and place it at @var{to}.
2995
6f6ef15a
EZ
2996Note that @code{REGISTER_CONVERT_TO_VIRTUAL} and
2997@code{REGISTER_CONVERT_TO_RAW} take their @var{reg} and @var{type}
2998arguments in different orders.
2999
3000You should only use @code{REGISTER_CONVERT_TO_VIRTUAL} with registers
3001for which the @code{REGISTER_CONVERTIBLE} macro returns a non-zero
3002value.
9fb4dd36
JB
3003@end deftypefn
3004
3005@deftypefn {Target Macro} void REGISTER_CONVERT_TO_RAW (struct type *@var{type}, int @var{reg}, char *@var{from}, char *@var{to})
3006Convert the value of register number @var{reg} to @var{type}, which
2e092625 3007should always be @code{DEPRECATED_REGISTER_VIRTUAL_TYPE (@var{reg})}. The buffer
9fb4dd36
JB
3008at @var{from} holds the register's value in raw format; the macro should
3009convert the value to virtual format, and place it at @var{to}.
3010
3011Note that REGISTER_CONVERT_TO_VIRTUAL and REGISTER_CONVERT_TO_RAW take
3012their @var{reg} and @var{type} arguments in different orders.
3013@end deftypefn
3014
3015
13d01224
AC
3016@section Using Different Register and Memory Data Representations
3017@cindex register representation
3018@cindex memory representation
3019@cindex representations, register and memory
3020@cindex register data formats, converting
3021@cindex @code{struct value}, converting register contents to
3022
3023@emph{Maintainer's note: The way GDB manipulates registers is undergoing
3024significant change. Many of the macros and functions refered to in this
3025section are likely to be subject to further revision. See
3026@uref{http://sources.redhat.com/gdb/current/ari/, A.R. Index} and
3027@uref{http://www.gnu.org/software/gdb/bugs, Bug Tracking Database} for
3028further information. cagney/2002-05-06.}
3029
3030Some architectures can represent a data object in a register using a
3031form that is different to the objects more normal memory representation.
3032For example:
3033
3034@itemize @bullet
3035
3036@item
3037The Alpha architecture can represent 32 bit integer values in
3038floating-point registers.
3039
3040@item
3041The x86 architecture supports 80-bit floating-point registers. The
3042@code{long double} data type occupies 96 bits in memory but only 80 bits
3043when stored in a register.
3044
3045@end itemize
3046
3047In general, the register representation of a data type is determined by
3048the architecture, or @value{GDBN}'s interface to the architecture, while
3049the memory representation is determined by the Application Binary
3050Interface.
3051
3052For almost all data types on almost all architectures, the two
3053representations are identical, and no special handling is needed.
3054However, they do occasionally differ. Your architecture may define the
3055following macros to request conversions between the register and memory
3056representations of a data type:
3057
3058@deftypefn {Target Macro} int CONVERT_REGISTER_P (int @var{reg})
3059Return non-zero if the representation of a data value stored in this
3060register may be different to the representation of that same data value
3061when stored in memory.
3062
3063When non-zero, the macros @code{REGISTER_TO_VALUE} and
3064@code{VALUE_TO_REGISTER} are used to perform any necessary conversion.
3065@end deftypefn
3066
3067@deftypefn {Target Macro} void REGISTER_TO_VALUE (int @var{reg}, struct type *@var{type}, char *@var{from}, char *@var{to})
3068Convert the value of register number @var{reg} to a data object of type
3069@var{type}. The buffer at @var{from} holds the register's value in raw
3070format; the converted value should be placed in the buffer at @var{to}.
3071
3072Note that @code{REGISTER_TO_VALUE} and @code{VALUE_TO_REGISTER} take
3073their @var{reg} and @var{type} arguments in different orders.
3074
3075You should only use @code{REGISTER_TO_VALUE} with registers for which
3076the @code{CONVERT_REGISTER_P} macro returns a non-zero value.
3077@end deftypefn
3078
3079@deftypefn {Target Macro} void VALUE_TO_REGISTER (struct type *@var{type}, int @var{reg}, char *@var{from}, char *@var{to})
3080Convert a data value of type @var{type} to register number @var{reg}'
3081raw format.
3082
3083Note that @code{REGISTER_TO_VALUE} and @code{VALUE_TO_REGISTER} take
3084their @var{reg} and @var{type} arguments in different orders.
3085
3086You should only use @code{VALUE_TO_REGISTER} with registers for which
3087the @code{CONVERT_REGISTER_P} macro returns a non-zero value.
3088@end deftypefn
3089
3090@deftypefn {Target Macro} void REGISTER_CONVERT_TO_TYPE (int @var{regnum}, struct type *@var{type}, char *@var{buf})
3091See @file{mips-tdep.c}. It does not do what you want.
3092@end deftypefn
3093
3094
c906108c
SS
3095@section Frame Interpretation
3096
3097@section Inferior Call Setup
3098
3099@section Compiler Characteristics
3100
3101@section Target Conditionals
3102
3103This section describes the macros that you can use to define the target
3104machine.
3105
3106@table @code
3107
c906108c 3108@item ADDR_BITS_REMOVE (addr)
56caf160 3109@findex ADDR_BITS_REMOVE
adf40b2e
JM
3110If a raw machine instruction address includes any bits that are not
3111really part of the address, then define this macro to expand into an
56caf160 3112expression that zeroes those bits in @var{addr}. This is only used for
adf40b2e
JM
3113addresses of instructions, and even then not in all contexts.
3114
3115For example, the two low-order bits of the PC on the Hewlett-Packard PA
31162.0 architecture contain the privilege level of the corresponding
3117instruction. Since instructions must always be aligned on four-byte
3118boundaries, the processor masks out these bits to generate the actual
3119address of the instruction. ADDR_BITS_REMOVE should filter out these
3120bits with an expression such as @code{((addr) & ~3)}.
c906108c 3121
b5b0480a
KB
3122@item ADDRESS_CLASS_NAME_TO_TYPE_FLAGS (@var{name}, @var{type_flags_ptr})
3123@findex ADDRESS_CLASS_NAME_TO_TYPE_FLAGS
3124If @var{name} is a valid address class qualifier name, set the @code{int}
3125referenced by @var{type_flags_ptr} to the mask representing the qualifier
3126and return 1. If @var{name} is not a valid address class qualifier name,
3127return 0.
3128
3129The value for @var{type_flags_ptr} should be one of
3130@code{TYPE_FLAG_ADDRESS_CLASS_1}, @code{TYPE_FLAG_ADDRESS_CLASS_2}, or
3131possibly some combination of these values or'd together.
3132@xref{Target Architecture Definition, , Address Classes}.
3133
3134@item ADDRESS_CLASS_NAME_TO_TYPE_FLAGS_P ()
3135@findex ADDRESS_CLASS_NAME_TO_TYPE_FLAGS_P
3136Predicate which indicates whether @code{ADDRESS_CLASS_NAME_TO_TYPE_FLAGS}
3137has been defined.
3138
3139@item ADDRESS_CLASS_TYPE_FLAGS (@var{byte_size}, @var{dwarf2_addr_class})
3140@findex ADDRESS_CLASS_TYPE_FLAGS (@var{byte_size}, @var{dwarf2_addr_class})
3141Given a pointers byte size (as described by the debug information) and
3142the possible @code{DW_AT_address_class} value, return the type flags
3143used by @value{GDBN} to represent this address class. The value
3144returned should be one of @code{TYPE_FLAG_ADDRESS_CLASS_1},
3145@code{TYPE_FLAG_ADDRESS_CLASS_2}, or possibly some combination of these
3146values or'd together.
3147@xref{Target Architecture Definition, , Address Classes}.
3148
3149@item ADDRESS_CLASS_TYPE_FLAGS_P ()
3150@findex ADDRESS_CLASS_TYPE_FLAGS_P
3151Predicate which indicates whether @code{ADDRESS_CLASS_TYPE_FLAGS} has
3152been defined.
3153
3154@item ADDRESS_CLASS_TYPE_FLAGS_TO_NAME (@var{type_flags})
3155@findex ADDRESS_CLASS_TYPE_FLAGS_TO_NAME
3156Return the name of the address class qualifier associated with the type
3157flags given by @var{type_flags}.
3158
3159@item ADDRESS_CLASS_TYPE_FLAGS_TO_NAME_P ()
3160@findex ADDRESS_CLASS_TYPE_FLAGS_TO_NAME_P
3161Predicate which indicates whether @code{ADDRESS_CLASS_TYPE_FLAGS_TO_NAME} has
3162been defined.
3163@xref{Target Architecture Definition, , Address Classes}.
3164
93e79dbd 3165@item ADDRESS_TO_POINTER (@var{type}, @var{buf}, @var{addr})
56caf160 3166@findex ADDRESS_TO_POINTER
93e79dbd
JB
3167Store in @var{buf} a pointer of type @var{type} representing the address
3168@var{addr}, in the appropriate format for the current architecture.
3169This macro may safely assume that @var{type} is either a pointer or a
56caf160 3170C@t{++} reference type.
93e79dbd
JB
3171@xref{Target Architecture Definition, , Pointers Are Not Always Addresses}.
3172
c906108c 3173@item BELIEVE_PCC_PROMOTION
56caf160
EZ
3174@findex BELIEVE_PCC_PROMOTION
3175Define if the compiler promotes a @code{short} or @code{char}
3176parameter to an @code{int}, but still reports the parameter as its
3177original type, rather than the promoted type.
c906108c 3178
c906108c 3179@item BITS_BIG_ENDIAN
56caf160
EZ
3180@findex BITS_BIG_ENDIAN
3181Define this if the numbering of bits in the targets does @strong{not} match the
c906108c 3182endianness of the target byte order. A value of 1 means that the bits
56caf160 3183are numbered in a big-endian bit order, 0 means little-endian.
c906108c
SS
3184
3185@item BREAKPOINT
56caf160 3186@findex BREAKPOINT
c906108c
SS
3187This is the character array initializer for the bit pattern to put into
3188memory where a breakpoint is set. Although it's common to use a trap
3189instruction for a breakpoint, it's not required; for instance, the bit
3190pattern could be an invalid instruction. The breakpoint must be no
3191longer than the shortest instruction of the architecture.
3192
56caf160
EZ
3193@code{BREAKPOINT} has been deprecated in favor of
3194@code{BREAKPOINT_FROM_PC}.
7a292a7a 3195
c906108c 3196@item BIG_BREAKPOINT
56caf160
EZ
3197@itemx LITTLE_BREAKPOINT
3198@findex LITTLE_BREAKPOINT
3199@findex BIG_BREAKPOINT
c906108c
SS
3200Similar to BREAKPOINT, but used for bi-endian targets.
3201
56caf160
EZ
3202@code{BIG_BREAKPOINT} and @code{LITTLE_BREAKPOINT} have been deprecated in
3203favor of @code{BREAKPOINT_FROM_PC}.
7a292a7a 3204
2dd0da42
AC
3205@item DEPRECATED_REMOTE_BREAKPOINT
3206@itemx DEPRECATED_LITTLE_REMOTE_BREAKPOINT
3207@itemx DEPRECATED_BIG_REMOTE_BREAKPOINT
3208@findex DEPRECATED_BIG_REMOTE_BREAKPOINT
3209@findex DEPRECATED_LITTLE_REMOTE_BREAKPOINT
3210@findex DEPRECATED_REMOTE_BREAKPOINT
3211Specify the breakpoint instruction sequence for a remote target.
3212@code{DEPRECATED_REMOTE_BREAKPOINT},
3213@code{DEPRECATED_BIG_REMOTE_BREAKPOINT} and
3214@code{DEPRECATED_LITTLE_REMOTE_BREAKPOINT} have been deprecated in
3215favor of @code{BREAKPOINT_FROM_PC} (@pxref{BREAKPOINT_FROM_PC}).
c906108c 3216
56caf160
EZ
3217@item BREAKPOINT_FROM_PC (@var{pcptr}, @var{lenptr})
3218@findex BREAKPOINT_FROM_PC
2dd0da42
AC
3219@anchor{BREAKPOINT_FROM_PC} Use the program counter to determine the
3220contents and size of a breakpoint instruction. It returns a pointer to
3221a string of bytes that encode a breakpoint instruction, stores the
3222length of the string to @code{*@var{lenptr}}, and adjusts the program
3223counter (if necessary) to point to the actual memory location where the
3224breakpoint should be inserted.
c906108c
SS
3225
3226Although it is common to use a trap instruction for a breakpoint, it's
3227not required; for instance, the bit pattern could be an invalid
3228instruction. The breakpoint must be no longer than the shortest
3229instruction of the architecture.
3230
7a292a7a
SS
3231Replaces all the other @var{BREAKPOINT} macros.
3232
8181d85f
DJ
3233@item MEMORY_INSERT_BREAKPOINT (@var{bp_tgt})
3234@itemx MEMORY_REMOVE_BREAKPOINT (@var{bp_tgt})
56caf160
EZ
3235@findex MEMORY_REMOVE_BREAKPOINT
3236@findex MEMORY_INSERT_BREAKPOINT
917317f4
JM
3237Insert or remove memory based breakpoints. Reasonable defaults
3238(@code{default_memory_insert_breakpoint} and
3239@code{default_memory_remove_breakpoint} respectively) have been
3240provided so that it is not necessary to define these for most
3241architectures. Architectures which may want to define
56caf160 3242@code{MEMORY_INSERT_BREAKPOINT} and @code{MEMORY_REMOVE_BREAKPOINT} will
917317f4
JM
3243likely have instructions that are oddly sized or are not stored in a
3244conventional manner.
3245
3246It may also be desirable (from an efficiency standpoint) to define
3247custom breakpoint insertion and removal routines if
56caf160 3248@code{BREAKPOINT_FROM_PC} needs to read the target's memory for some
917317f4
JM
3249reason.
3250
1485d690
KB
3251@item ADJUST_BREAKPOINT_ADDRESS (@var{address})
3252@findex ADJUST_BREAKPOINT_ADDRESS
3253@cindex breakpoint address adjusted
3254Given an address at which a breakpoint is desired, return a breakpoint
3255address adjusted to account for architectural constraints on
3256breakpoint placement. This method is not needed by most targets.
3257
3258The FR-V target (see @file{frv-tdep.c}) requires this method.
3259The FR-V is a VLIW architecture in which a number of RISC-like
3260instructions are grouped (packed) together into an aggregate
3261instruction or instruction bundle. When the processor executes
3262one of these bundles, the component instructions are executed
3263in parallel.
3264
3265In the course of optimization, the compiler may group instructions
3266from distinct source statements into the same bundle. The line number
3267information associated with one of the latter statements will likely
3268refer to some instruction other than the first one in the bundle. So,
3269if the user attempts to place a breakpoint on one of these latter
3270statements, @value{GDBN} must be careful to @emph{not} place the break
3271instruction on any instruction other than the first one in the bundle.
3272(Remember though that the instructions within a bundle execute
3273in parallel, so the @emph{first} instruction is the instruction
3274at the lowest address and has nothing to do with execution order.)
3275
3276The FR-V's @code{ADJUST_BREAKPOINT_ADDRESS} method will adjust a
3277breakpoint's address by scanning backwards for the beginning of
3278the bundle, returning the address of the bundle.
3279
3280Since the adjustment of a breakpoint may significantly alter a user's
3281expectation, @value{GDBN} prints a warning when an adjusted breakpoint
3282is initially set and each time that that breakpoint is hit.
3283
c906108c 3284@item CALL_DUMMY_LOCATION
56caf160
EZ
3285@findex CALL_DUMMY_LOCATION
3286See the file @file{inferior.h}.
7a292a7a 3287
7043d8dc
AC
3288This method has been replaced by @code{push_dummy_code}
3289(@pxref{push_dummy_code}).
3290
56caf160
EZ
3291@item CANNOT_FETCH_REGISTER (@var{regno})
3292@findex CANNOT_FETCH_REGISTER
c906108c
SS
3293A C expression that should be nonzero if @var{regno} cannot be fetched
3294from an inferior process. This is only relevant if
3295@code{FETCH_INFERIOR_REGISTERS} is not defined.
3296
56caf160
EZ
3297@item CANNOT_STORE_REGISTER (@var{regno})
3298@findex CANNOT_STORE_REGISTER
c906108c
SS
3299A C expression that should be nonzero if @var{regno} should not be
3300written to the target. This is often the case for program counters,
56caf160
EZ
3301status words, and other special registers. If this is not defined,
3302@value{GDBN} will assume that all registers may be written.
c906108c 3303
13d01224
AC
3304@item int CONVERT_REGISTER_P(@var{regnum})
3305@findex CONVERT_REGISTER_P
3306Return non-zero if register @var{regnum} can represent data values in a
3307non-standard form.
3308@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
3309
c906108c 3310@item DECR_PC_AFTER_BREAK
56caf160 3311@findex DECR_PC_AFTER_BREAK
c906108c
SS
3312Define this to be the amount by which to decrement the PC after the
3313program encounters a breakpoint. This is often the number of bytes in
56caf160 3314@code{BREAKPOINT}, though not always. For most targets this value will be 0.
c906108c 3315
56caf160
EZ
3316@item DISABLE_UNSETTABLE_BREAK (@var{addr})
3317@findex DISABLE_UNSETTABLE_BREAK
c906108c
SS
3318If defined, this should evaluate to 1 if @var{addr} is in a shared
3319library in which breakpoints cannot be set and so should be disabled.
3320
5e74b15c 3321@item PRINT_FLOAT_INFO()
0ab7a791 3322@findex PRINT_FLOAT_INFO
5e74b15c
RE
3323If defined, then the @samp{info float} command will print information about
3324the processor's floating point unit.
3325
0ab7a791
AC
3326@item print_registers_info (@var{gdbarch}, @var{frame}, @var{regnum}, @var{all})
3327@findex print_registers_info
3328If defined, pretty print the value of the register @var{regnum} for the
3329specified @var{frame}. If the value of @var{regnum} is -1, pretty print
3330either all registers (@var{all} is non zero) or a select subset of
3331registers (@var{all} is zero).
3332
3333The default method prints one register per line, and if @var{all} is
3334zero omits floating-point registers.
3335
e76f1f2e
AC
3336@item PRINT_VECTOR_INFO()
3337@findex PRINT_VECTOR_INFO
3338If defined, then the @samp{info vector} command will call this function
3339to print information about the processor's vector unit.
3340
3341By default, the @samp{info vector} command will print all vector
3342registers (the register's type having the vector attribute).
3343
0dcedd82 3344@item DWARF_REG_TO_REGNUM
56caf160 3345@findex DWARF_REG_TO_REGNUM
0dcedd82
AC
3346Convert DWARF register number into @value{GDBN} regnum. If not defined,
3347no conversion will be performed.
3348
3349@item DWARF2_REG_TO_REGNUM
56caf160 3350@findex DWARF2_REG_TO_REGNUM
0dcedd82
AC
3351Convert DWARF2 register number into @value{GDBN} regnum. If not
3352defined, no conversion will be performed.
3353
3354@item ECOFF_REG_TO_REGNUM
56caf160 3355@findex ECOFF_REG_TO_REGNUM
0dcedd82
AC
3356Convert ECOFF register number into @value{GDBN} regnum. If not defined,
3357no conversion will be performed.
3358
c906108c 3359@item END_OF_TEXT_DEFAULT
56caf160
EZ
3360@findex END_OF_TEXT_DEFAULT
3361This is an expression that should designate the end of the text section.
3362@c (? FIXME ?)
c906108c 3363
56caf160
EZ
3364@item EXTRACT_RETURN_VALUE(@var{type}, @var{regbuf}, @var{valbuf})
3365@findex EXTRACT_RETURN_VALUE
c906108c
SS
3366Define this to extract a function's return value of type @var{type} from
3367the raw register state @var{regbuf} and copy that, in virtual format,
3368into @var{valbuf}.
3369
92ad9cd9
AC
3370This method has been deprecated in favour of @code{gdbarch_return_value}
3371(@pxref{gdbarch_return_value}).
3372
74055713
AC
3373@item DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS(@var{regbuf})
3374@findex DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS
3375@anchor{DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS}
83aa8bc6
AC
3376When defined, extract from the array @var{regbuf} (containing the raw
3377register state) the @code{CORE_ADDR} at which a function should return
3378its structure value.
ac9a91a7 3379
92ad9cd9 3380@xref{gdbarch_return_value}.
83aa8bc6 3381
74055713
AC
3382@item DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS_P()
3383@findex DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS_P
3384Predicate for @code{DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS}.
c906108c 3385
0ba6dca9
AC
3386@item DEPRECATED_FP_REGNUM
3387@findex DEPRECATED_FP_REGNUM
cce74817
JM
3388If the virtual frame pointer is kept in a register, then define this
3389macro to be the number (greater than or equal to zero) of that register.
3390
0ba6dca9
AC
3391This should only need to be defined if @code{DEPRECATED_TARGET_READ_FP}
3392is not defined.
c906108c 3393
19772a2c
AC
3394@item DEPRECATED_FRAMELESS_FUNCTION_INVOCATION(@var{fi})
3395@findex DEPRECATED_FRAMELESS_FUNCTION_INVOCATION
392a587b
JM
3396Define this to an expression that returns 1 if the function invocation
3397represented by @var{fi} does not have a stack frame associated with it.
3398Otherwise return 0.
c906108c 3399
790eb8f5
AC
3400@item frame_align (@var{address})
3401@anchor{frame_align}
3402@findex frame_align
3403Define this to adjust @var{address} so that it meets the alignment
3404requirements for the start of a new stack frame. A stack frame's
3405alignment requirements are typically stronger than a target processors
f27dd7fd 3406stack alignment requirements (@pxref{DEPRECATED_STACK_ALIGN}).
790eb8f5
AC
3407
3408This function is used to ensure that, when creating a dummy frame, both
3409the initial stack pointer and (if needed) the address of the return
3410value are correctly aligned.
3411
f27dd7fd
AC
3412Unlike @code{DEPRECATED_STACK_ALIGN}, this function always adjusts the
3413address in the direction of stack growth.
790eb8f5
AC
3414
3415By default, no frame based stack alignment is performed.
3416
8b148df9
AC
3417@item int frame_red_zone_size
3418
3419The number of bytes, beyond the innermost-stack-address, reserved by the
3420@sc{abi}. A function is permitted to use this scratch area (instead of
3421allocating extra stack space).
3422
3423When performing an inferior function call, to ensure that it does not
3424modify this area, @value{GDBN} adjusts the innermost-stack-address by
3425@var{frame_red_zone_size} bytes before pushing parameters onto the
3426stack.
3427
3428By default, zero bytes are allocated. The value must be aligned
3429(@pxref{frame_align}).
3430
3431The @sc{amd64} (nee x86-64) @sc{abi} documentation refers to the
3432@emph{red zone} when describing this scratch area.
3433@cindex red zone
3434
618ce49f
AC
3435@item DEPRECATED_FRAME_CHAIN(@var{frame})
3436@findex DEPRECATED_FRAME_CHAIN
c906108c
SS
3437Given @var{frame}, return a pointer to the calling frame.
3438
618ce49f
AC
3439@item DEPRECATED_FRAME_CHAIN_VALID(@var{chain}, @var{thisframe})
3440@findex DEPRECATED_FRAME_CHAIN_VALID
95f90d25
DJ
3441Define this to be an expression that returns zero if the given frame is an
3442outermost frame, with no caller, and nonzero otherwise. Most normal
3443situations can be handled without defining this macro, including @code{NULL}
3444chain pointers, dummy frames, and frames whose PC values are inside the
3445startup file (e.g.@: @file{crt0.o}), inside @code{main}, or inside
3446@code{_start}.
c906108c 3447
f30ee0bc
AC
3448@item DEPRECATED_FRAME_INIT_SAVED_REGS(@var{frame})
3449@findex DEPRECATED_FRAME_INIT_SAVED_REGS
c906108c
SS
3450See @file{frame.h}. Determines the address of all registers in the
3451current stack frame storing each in @code{frame->saved_regs}. Space for
3452@code{frame->saved_regs} shall be allocated by
f30ee0bc
AC
3453@code{DEPRECATED_FRAME_INIT_SAVED_REGS} using
3454@code{frame_saved_regs_zalloc}.
c906108c 3455
fb8f8949 3456@code{FRAME_FIND_SAVED_REGS} is deprecated.
c906108c 3457
56caf160
EZ
3458@item FRAME_NUM_ARGS (@var{fi})
3459@findex FRAME_NUM_ARGS
392a587b
JM
3460For the frame described by @var{fi} return the number of arguments that
3461are being passed. If the number of arguments is not known, return
3462@code{-1}.
c906108c 3463
8bedc050
AC
3464@item DEPRECATED_FRAME_SAVED_PC(@var{frame})
3465@findex DEPRECATED_FRAME_SAVED_PC
3466@anchor{DEPRECATED_FRAME_SAVED_PC} Given @var{frame}, return the pc
3467saved there. This is the return address.
12cc2063
AC
3468
3469This method is deprecated. @xref{unwind_pc}.
3470
3471@item CORE_ADDR unwind_pc (struct frame_info *@var{this_frame})
3472@findex unwind_pc
3473@anchor{unwind_pc} Return the instruction address, in @var{this_frame}'s
3474caller, at which execution will resume after @var{this_frame} returns.
3475This is commonly refered to as the return address.
3476
3477The implementation, which must be frame agnostic (work with any frame),
3478is typically no more than:
3479
3480@smallexample
3481ULONGEST pc;
3482frame_unwind_unsigned_register (this_frame, D10V_PC_REGNUM, &pc);
3483return d10v_make_iaddr (pc);
3484@end smallexample
3485
3486@noindent
8bedc050 3487@xref{DEPRECATED_FRAME_SAVED_PC}, which this method replaces.
c906108c 3488
a9e5fdc2
AC
3489@item CORE_ADDR unwind_sp (struct frame_info *@var{this_frame})
3490@findex unwind_sp
3491@anchor{unwind_sp} Return the frame's inner most stack address. This is
3492commonly refered to as the frame's @dfn{stack pointer}.
3493
3494The implementation, which must be frame agnostic (work with any frame),
3495is typically no more than:
3496
3497@smallexample
3498ULONGEST sp;
3499frame_unwind_unsigned_register (this_frame, D10V_SP_REGNUM, &sp);
3500return d10v_make_daddr (sp);
3501@end smallexample
3502
3503@noindent
3504@xref{TARGET_READ_SP}, which this method replaces.
3505
c906108c 3506@item FUNCTION_EPILOGUE_SIZE
56caf160 3507@findex FUNCTION_EPILOGUE_SIZE
c906108c
SS
3508For some COFF targets, the @code{x_sym.x_misc.x_fsize} field of the
3509function end symbol is 0. For such targets, you must define
3510@code{FUNCTION_EPILOGUE_SIZE} to expand into the standard size of a
3511function's epilogue.
3512
782263ab
AC
3513@item DEPRECATED_FUNCTION_START_OFFSET
3514@findex DEPRECATED_FUNCTION_START_OFFSET
f7cb2b90
JB
3515An integer, giving the offset in bytes from a function's address (as
3516used in the values of symbols, function pointers, etc.), and the
3517function's first genuine instruction.
3518
3519This is zero on almost all machines: the function's address is usually
782263ab
AC
3520the address of its first instruction. However, on the VAX, for
3521example, each function starts with two bytes containing a bitmask
3522indicating which registers to save upon entry to the function. The
3523VAX @code{call} instructions check this value, and save the
3524appropriate registers automatically. Thus, since the offset from the
3525function's address to its first instruction is two bytes,
3526@code{DEPRECATED_FUNCTION_START_OFFSET} would be 2 on the VAX.
f7cb2b90 3527
c906108c 3528@item GCC_COMPILED_FLAG_SYMBOL
56caf160
EZ
3529@itemx GCC2_COMPILED_FLAG_SYMBOL
3530@findex GCC2_COMPILED_FLAG_SYMBOL
3531@findex GCC_COMPILED_FLAG_SYMBOL
3532If defined, these are the names of the symbols that @value{GDBN} will
3533look for to detect that GCC compiled the file. The default symbols
3534are @code{gcc_compiled.} and @code{gcc2_compiled.},
3535respectively. (Currently only defined for the Delta 68.)
c906108c 3536
25822942 3537@item @value{GDBN}_MULTI_ARCH
56caf160 3538@findex @value{GDBN}_MULTI_ARCH
937f164b 3539If defined and non-zero, enables support for multiple architectures
25822942 3540within @value{GDBN}.
0f71a2f6 3541
56caf160 3542This support can be enabled at two levels. At level one, only
0f71a2f6 3543definitions for previously undefined macros are provided; at level two,
937f164b 3544a multi-arch definition of all architecture dependent macros will be
0f71a2f6
JM
3545defined.
3546
25822942 3547@item @value{GDBN}_TARGET_IS_HPPA
56caf160
EZ
3548@findex @value{GDBN}_TARGET_IS_HPPA
3549This determines whether horrible kludge code in @file{dbxread.c} and
3550@file{partial-stab.h} is used to mangle multiple-symbol-table files from
3551HPPA's. This should all be ripped out, and a scheme like @file{elfread.c}
3552used instead.
c906108c 3553
c906108c 3554@item GET_LONGJMP_TARGET
56caf160 3555@findex GET_LONGJMP_TARGET
c906108c
SS
3556For most machines, this is a target-dependent parameter. On the
3557DECstation and the Iris, this is a native-dependent parameter, since
937f164b 3558the header file @file{setjmp.h} is needed to define it.
c906108c 3559
56caf160
EZ
3560This macro determines the target PC address that @code{longjmp} will jump to,
3561assuming that we have just stopped at a @code{longjmp} breakpoint. It takes a
3562@code{CORE_ADDR *} as argument, and stores the target PC value through this
c906108c
SS
3563pointer. It examines the current state of the machine as needed.
3564
ac2adee5
AC
3565@item DEPRECATED_GET_SAVED_REGISTER
3566@findex DEPRECATED_GET_SAVED_REGISTER
c906108c 3567Define this if you need to supply your own definition for the function
ac2adee5 3568@code{DEPRECATED_GET_SAVED_REGISTER}.
c906108c 3569
268e2188
AC
3570@item DEPRECATED_IBM6000_TARGET
3571@findex DEPRECATED_IBM6000_TARGET
3572Shows that we are configured for an IBM RS/6000 system. This
c906108c 3573conditional should be eliminated (FIXME) and replaced by
56caf160 3574feature-specific macros. It was introduced in a haste and we are
c906108c
SS
3575repenting at leisure.
3576
9742079a
EZ
3577@item I386_USE_GENERIC_WATCHPOINTS
3578An x86-based target can define this to use the generic x86 watchpoint
3579support; see @ref{Algorithms, I386_USE_GENERIC_WATCHPOINTS}.
3580
2df3850c 3581@item SYMBOLS_CAN_START_WITH_DOLLAR
56caf160 3582@findex SYMBOLS_CAN_START_WITH_DOLLAR
2df3850c 3583Some systems have routines whose names start with @samp{$}. Giving this
25822942 3584macro a non-zero value tells @value{GDBN}'s expression parser to check for such
2df3850c
JM
3585routines when parsing tokens that begin with @samp{$}.
3586
3587On HP-UX, certain system routines (millicode) have names beginning with
3588@samp{$} or @samp{$$}. For example, @code{$$dyncall} is a millicode
3589routine that handles inter-space procedure calls on PA-RISC.
3590
e9582e71
AC
3591@item DEPRECATED_INIT_EXTRA_FRAME_INFO (@var{fromleaf}, @var{frame})
3592@findex DEPRECATED_INIT_EXTRA_FRAME_INFO
c906108c
SS
3593If additional information about the frame is required this should be
3594stored in @code{frame->extra_info}. Space for @code{frame->extra_info}
372613e3 3595is allocated using @code{frame_extra_info_zalloc}.
c906108c 3596
a5afb99f
AC
3597@item DEPRECATED_INIT_FRAME_PC (@var{fromleaf}, @var{prev})
3598@findex DEPRECATED_INIT_FRAME_PC
c906108c
SS
3599This is a C statement that sets the pc of the frame pointed to by
3600@var{prev}. [By default...]
3601
56caf160
EZ
3602@item INNER_THAN (@var{lhs}, @var{rhs})
3603@findex INNER_THAN
c906108c
SS
3604Returns non-zero if stack address @var{lhs} is inner than (nearer to the
3605stack top) stack address @var{rhs}. Define this as @code{lhs < rhs} if
3606the target's stack grows downward in memory, or @code{lhs > rsh} if the
3607stack grows upward.
3608
9e5abb06
CV
3609@item gdbarch_in_function_epilogue_p (@var{gdbarch}, @var{pc})
3610@findex gdbarch_in_function_epilogue_p
3611Returns non-zero if the given @var{pc} is in the epilogue of a function.
3612The epilogue of a function is defined as the part of a function where
3613the stack frame of the function already has been destroyed up to the
3614final `return from function call' instruction.
3615
aa2a3f87
AC
3616@item DEPRECATED_SIGTRAMP_START (@var{pc})
3617@findex DEPRECATED_SIGTRAMP_START
3618@itemx DEPRECATED_SIGTRAMP_END (@var{pc})
3619@findex DEPRECATED_SIGTRAMP_END
56caf160 3620Define these to be the start and end address of the @code{sigtramp} for the
c906108c
SS
3621given @var{pc}. On machines where the address is just a compile time
3622constant, the macro expansion will typically just ignore the supplied
3623@var{pc}.
3624
56caf160
EZ
3625@item IN_SOLIB_CALL_TRAMPOLINE (@var{pc}, @var{name})
3626@findex IN_SOLIB_CALL_TRAMPOLINE
c906108c
SS
3627Define this to evaluate to nonzero if the program is stopped in the
3628trampoline that connects to a shared library.
3629
56caf160
EZ
3630@item IN_SOLIB_RETURN_TRAMPOLINE (@var{pc}, @var{name})
3631@findex IN_SOLIB_RETURN_TRAMPOLINE
c906108c
SS
3632Define this to evaluate to nonzero if the program is stopped in the
3633trampoline that returns from a shared library.
3634
56caf160
EZ
3635@item IN_SOLIB_DYNSYM_RESOLVE_CODE (@var{pc})
3636@findex IN_SOLIB_DYNSYM_RESOLVE_CODE
d4f3574e
SS
3637Define this to evaluate to nonzero if the program is stopped in the
3638dynamic linker.
3639
56caf160
EZ
3640@item SKIP_SOLIB_RESOLVER (@var{pc})
3641@findex SKIP_SOLIB_RESOLVER
d4f3574e
SS
3642Define this to evaluate to the (nonzero) address at which execution
3643should continue to get past the dynamic linker's symbol resolution
3644function. A zero value indicates that it is not important or necessary
3645to set a breakpoint to get through the dynamic linker and that single
3646stepping will suffice.
3647
fc0c74b1
AC
3648@item INTEGER_TO_ADDRESS (@var{type}, @var{buf})
3649@findex INTEGER_TO_ADDRESS
3650@cindex converting integers to addresses
3651Define this when the architecture needs to handle non-pointer to address
3652conversions specially. Converts that value to an address according to
3653the current architectures conventions.
3654
3655@emph{Pragmatics: When the user copies a well defined expression from
3656their source code and passes it, as a parameter, to @value{GDBN}'s
3657@code{print} command, they should get the same value as would have been
3658computed by the target program. Any deviation from this rule can cause
3659major confusion and annoyance, and needs to be justified carefully. In
3660other words, @value{GDBN} doesn't really have the freedom to do these
3661conversions in clever and useful ways. It has, however, been pointed
3662out that users aren't complaining about how @value{GDBN} casts integers
3663to pointers; they are complaining that they can't take an address from a
3664disassembly listing and give it to @code{x/i}. Adding an architecture
3665method like @code{INTEGER_TO_ADDRESS} certainly makes it possible for
3666@value{GDBN} to ``get it right'' in all circumstances.}
3667
3668@xref{Target Architecture Definition, , Pointers Are Not Always
3669Addresses}.
3670
c906108c 3671@item NO_HIF_SUPPORT
56caf160 3672@findex NO_HIF_SUPPORT
c906108c
SS
3673(Specific to the a29k.)
3674
93e79dbd 3675@item POINTER_TO_ADDRESS (@var{type}, @var{buf})
56caf160 3676@findex POINTER_TO_ADDRESS
93e79dbd
JB
3677Assume that @var{buf} holds a pointer of type @var{type}, in the
3678appropriate format for the current architecture. Return the byte
3679address the pointer refers to.
3680@xref{Target Architecture Definition, , Pointers Are Not Always Addresses}.
3681
9fb4dd36 3682@item REGISTER_CONVERTIBLE (@var{reg})
56caf160 3683@findex REGISTER_CONVERTIBLE
9fb4dd36 3684Return non-zero if @var{reg} uses different raw and virtual formats.
13d01224
AC
3685@xref{Target Architecture Definition, , Raw and Virtual Register Representations}.
3686
3687@item REGISTER_TO_VALUE(@var{regnum}, @var{type}, @var{from}, @var{to})
3688@findex REGISTER_TO_VALUE
3689Convert the raw contents of register @var{regnum} into a value of type
3690@var{type}.
4281a42e 3691@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
9fb4dd36 3692
12c266ea
AC
3693@item DEPRECATED_REGISTER_RAW_SIZE (@var{reg})
3694@findex DEPRECATED_REGISTER_RAW_SIZE
b2e75d78
AC
3695Return the raw size of @var{reg}; defaults to the size of the register's
3696virtual type.
13d01224 3697@xref{Target Architecture Definition, , Raw and Virtual Register Representations}.
9fb4dd36 3698
617073a9
AC
3699@item register_reggroup_p (@var{gdbarch}, @var{regnum}, @var{reggroup})
3700@findex register_reggroup_p
3701@cindex register groups
3702Return non-zero if register @var{regnum} is a member of the register
3703group @var{reggroup}.
3704
3705By default, registers are grouped as follows:
3706
3707@table @code
3708@item float_reggroup
3709Any register with a valid name and a floating-point type.
3710@item vector_reggroup
3711Any register with a valid name and a vector type.
3712@item general_reggroup
3713Any register with a valid name and a type other than vector or
3714floating-point. @samp{float_reggroup}.
3715@item save_reggroup
3716@itemx restore_reggroup
3717@itemx all_reggroup
3718Any register with a valid name.
3719@end table
3720
f30992d4
AC
3721@item DEPRECATED_REGISTER_VIRTUAL_SIZE (@var{reg})
3722@findex DEPRECATED_REGISTER_VIRTUAL_SIZE
b2e75d78
AC
3723Return the virtual size of @var{reg}; defaults to the size of the
3724register's virtual type.
13d01224
AC
3725Return the virtual size of @var{reg}.
3726@xref{Target Architecture Definition, , Raw and Virtual Register Representations}.
9fb4dd36 3727
2e092625 3728@item DEPRECATED_REGISTER_VIRTUAL_TYPE (@var{reg})
56caf160 3729@findex REGISTER_VIRTUAL_TYPE
9fb4dd36 3730Return the virtual type of @var{reg}.
13d01224 3731@xref{Target Architecture Definition, , Raw and Virtual Register Representations}.
9fb4dd36 3732
77e7e267
AC
3733@item struct type *register_type (@var{gdbarch}, @var{reg})
3734@findex register_type
3735If defined, return the type of register @var{reg}. This function
2e092625 3736superseeds @code{DEPRECATED_REGISTER_VIRTUAL_TYPE}. @xref{Target Architecture
77e7e267
AC
3737Definition, , Raw and Virtual Register Representations}.
3738
9fb4dd36 3739@item REGISTER_CONVERT_TO_VIRTUAL(@var{reg}, @var{type}, @var{from}, @var{to})
56caf160 3740@findex REGISTER_CONVERT_TO_VIRTUAL
9fb4dd36 3741Convert the value of register @var{reg} from its raw form to its virtual
4281a42e 3742form.
13d01224 3743@xref{Target Architecture Definition, , Raw and Virtual Register Representations}.
9fb4dd36
JB
3744
3745@item REGISTER_CONVERT_TO_RAW(@var{type}, @var{reg}, @var{from}, @var{to})
56caf160 3746@findex REGISTER_CONVERT_TO_RAW
9fb4dd36 3747Convert the value of register @var{reg} from its virtual form to its raw
4281a42e 3748form.
13d01224 3749@xref{Target Architecture Definition, , Raw and Virtual Register Representations}.
9fb4dd36 3750
0ab4b752
MK
3751@item const struct regset *regset_from_core_section (struct gdbarch * @var{gdbarch}, const char * @var{sect_name}, size_t @var{sect_size})
3752@findex regset_from_core_section
3753Return the appropriate register set for a core file section with name
3754@var{sect_name} and size @var{sect_size}.
3755
b0ed3589 3756@item SOFTWARE_SINGLE_STEP_P()
56caf160 3757@findex SOFTWARE_SINGLE_STEP_P
c906108c 3758Define this as 1 if the target does not have a hardware single-step
56caf160 3759mechanism. The macro @code{SOFTWARE_SINGLE_STEP} must also be defined.
c906108c 3760
56caf160
EZ
3761@item SOFTWARE_SINGLE_STEP(@var{signal}, @var{insert_breapoints_p})
3762@findex SOFTWARE_SINGLE_STEP
3763A function that inserts or removes (depending on
c906108c 3764@var{insert_breapoints_p}) breakpoints at each possible destinations of
56caf160 3765the next instruction. See @file{sparc-tdep.c} and @file{rs6000-tdep.c}
c906108c
SS
3766for examples.
3767
da59e081 3768@item SOFUN_ADDRESS_MAYBE_MISSING
56caf160 3769@findex SOFUN_ADDRESS_MAYBE_MISSING
da59e081
JM
3770Somebody clever observed that, the more actual addresses you have in the
3771debug information, the more time the linker has to spend relocating
3772them. So whenever there's some other way the debugger could find the
3773address it needs, you should omit it from the debug info, to make
3774linking faster.
3775
3776@code{SOFUN_ADDRESS_MAYBE_MISSING} indicates that a particular set of
3777hacks of this sort are in use, affecting @code{N_SO} and @code{N_FUN}
3778entries in stabs-format debugging information. @code{N_SO} stabs mark
3779the beginning and ending addresses of compilation units in the text
3780segment. @code{N_FUN} stabs mark the starts and ends of functions.
3781
3782@code{SOFUN_ADDRESS_MAYBE_MISSING} means two things:
da59e081 3783
56caf160 3784@itemize @bullet
da59e081
JM
3785@item
3786@code{N_FUN} stabs have an address of zero. Instead, you should find the
3787addresses where the function starts by taking the function name from
56caf160
EZ
3788the stab, and then looking that up in the minsyms (the
3789linker/assembler symbol table). In other words, the stab has the
3790name, and the linker/assembler symbol table is the only place that carries
da59e081
JM
3791the address.
3792
3793@item
3794@code{N_SO} stabs have an address of zero, too. You just look at the
3795@code{N_FUN} stabs that appear before and after the @code{N_SO} stab,
3796and guess the starting and ending addresses of the compilation unit from
3797them.
da59e081
JM
3798@end itemize
3799
c906108c 3800@item PC_LOAD_SEGMENT
56caf160 3801@findex PC_LOAD_SEGMENT
c906108c
SS
3802If defined, print information about the load segment for the program
3803counter. (Defined only for the RS/6000.)
3804
3805@item PC_REGNUM
56caf160 3806@findex PC_REGNUM
c906108c 3807If the program counter is kept in a register, then define this macro to
cce74817
JM
3808be the number (greater than or equal to zero) of that register.
3809
3810This should only need to be defined if @code{TARGET_READ_PC} and
3811@code{TARGET_WRITE_PC} are not defined.
c906108c 3812
2df3850c 3813@item PARM_BOUNDARY
56caf160 3814@findex PARM_BOUNDARY
2df3850c
JM
3815If non-zero, round arguments to a boundary of this many bits before
3816pushing them on the stack.
3817
a38c9fe6
MK
3818@item stabs_argument_has_addr (@var{gdbarch}, @var{type})
3819@findex stabs_argument_has_addr
3820@findex DEPRECATED_REG_STRUCT_HAS_ADDR
3821@anchor{stabs_argument_has_addr} Define this to return nonzero if a
3822function argument of type @var{type} is passed by reference instead of
3823value.
3824
ee206350
AG
3825This method replaces @code{DEPRECATED_REG_STRUCT_HAS_ADDR}
3826(@pxref{DEPRECATED_REG_STRUCT_HAS_ADDR}).
a38c9fe6 3827
c906108c 3828@item PROCESS_LINENUMBER_HOOK
56caf160 3829@findex PROCESS_LINENUMBER_HOOK
c906108c
SS
3830A hook defined for XCOFF reading.
3831
3832@item PROLOGUE_FIRSTLINE_OVERLAP
56caf160 3833@findex PROLOGUE_FIRSTLINE_OVERLAP
c906108c
SS
3834(Only used in unsupported Convex configuration.)
3835
3836@item PS_REGNUM
56caf160 3837@findex PS_REGNUM
c906108c
SS
3838If defined, this is the number of the processor status register. (This
3839definition is only used in generic code when parsing "$ps".)
3840
749b82f6
AC
3841@item DEPRECATED_POP_FRAME
3842@findex DEPRECATED_POP_FRAME
3843@findex frame_pop
3844If defined, used by @code{frame_pop} to remove a stack frame. This
3845method has been superseeded by generic code.
c906108c 3846
d4b6d575 3847@item push_dummy_call (@var{gdbarch}, @var{function}, @var{regcache}, @var{pc_addr}, @var{nargs}, @var{args}, @var{sp}, @var{struct_return}, @var{struct_addr})
b81774d8
AC
3848@findex push_dummy_call
3849@findex DEPRECATED_PUSH_ARGUMENTS.
39fe6e80
AC
3850@anchor{push_dummy_call} Define this to push the dummy frame's call to
3851the inferior function onto the stack. In addition to pushing
3852@var{nargs}, the code should push @var{struct_addr} (when
3853@var{struct_return}), and the return address (@var{bp_addr}).
c906108c 3854
86fe4aaa 3855@var{function} is a pointer to a @code{struct value}; on architectures that use
d4b6d575
RC
3856function descriptors, this contains the function descriptor value.
3857
b24da7d0 3858Returns the updated top-of-stack pointer.
b81774d8
AC
3859
3860This method replaces @code{DEPRECATED_PUSH_ARGUMENTS}.
3861
7043d8dc
AC
3862@item CORE_ADDR push_dummy_code (@var{gdbarch}, @var{sp}, @var{funaddr}, @var{using_gcc}, @var{args}, @var{nargs}, @var{value_type}, @var{real_pc}, @var{bp_addr})
3863@findex push_dummy_code
7043d8dc
AC
3864@anchor{push_dummy_code} Given a stack based call dummy, push the
3865instruction sequence (including space for a breakpoint) to which the
3866called function should return.
3867
3868Set @var{bp_addr} to the address at which the breakpoint instruction
3869should be inserted, @var{real_pc} to the resume address when starting
3870the call sequence, and return the updated inner-most stack address.
3871
3872By default, the stack is grown sufficient to hold a frame-aligned
3873(@pxref{frame_align}) breakpoint, @var{bp_addr} is set to the address
3874reserved for that breakpoint, and @var{real_pc} set to @var{funaddr}.
3875
434b87dd 3876This method replaces @code{CALL_DUMMY_LOCATION},
28954179 3877@code{DEPRECATED_REGISTER_SIZE}.
7043d8dc 3878
56caf160
EZ
3879@item REGISTER_NAME(@var{i})
3880@findex REGISTER_NAME
3881Return the name of register @var{i} as a string. May return @code{NULL}
3882or @code{NUL} to indicate that register @var{i} is not valid.
c906108c 3883
8e823e25
MK
3884@item DEPRECATED_REG_STRUCT_HAS_ADDR (@var{gcc_p}, @var{type})
3885@findex DEPRECATED_REG_STRUCT_HAS_ADDR
a38c9fe6
MK
3886@anchor{DEPRECATED_REG_STRUCT_HAS_ADDR}Define this to return 1 if the
3887given type will be passed by pointer rather than directly.
3888
3889This method has been replaced by @code{stabs_argument_has_addr}
3890(@pxref{stabs_argument_has_addr}).
c906108c 3891
b24da7d0
AC
3892@item SAVE_DUMMY_FRAME_TOS (@var{sp})
3893@findex SAVE_DUMMY_FRAME_TOS
3894@anchor{SAVE_DUMMY_FRAME_TOS} Used in @samp{call_function_by_hand} to
3895notify the target dependent code of the top-of-stack value that will be
3896passed to the the inferior code. This is the value of the @code{SP}
3897after both the dummy frame and space for parameters/results have been
3898allocated on the stack. @xref{unwind_dummy_id}.
43ff13b4 3899
c906108c 3900@item SDB_REG_TO_REGNUM
56caf160 3901@findex SDB_REG_TO_REGNUM
25822942 3902Define this to convert sdb register numbers into @value{GDBN} regnums. If not
c906108c
SS
3903defined, no conversion will be done.
3904
963e2bb7 3905@item enum return_value_convention gdbarch_return_value (struct gdbarch *@var{gdbarch}, struct type *@var{valtype}, struct regcache *@var{regcache}, void *@var{readbuf}, const void *@var{writebuf})
92ad9cd9
AC
3906@findex gdbarch_return_value
3907@anchor{gdbarch_return_value} Given a function with a return-value of
3908type @var{rettype}, return which return-value convention that function
3909would use.
3910
3911@value{GDBN} currently recognizes two function return-value conventions:
3912@code{RETURN_VALUE_REGISTER_CONVENTION} where the return value is found
3913in registers; and @code{RETURN_VALUE_STRUCT_CONVENTION} where the return
3914value is found in memory and the address of that memory location is
3915passed in as the function's first parameter.
3916
963e2bb7
AC
3917If the register convention is being used, and @var{writebuf} is
3918non-@code{NULL}, also copy the return-value in @var{writebuf} into
92ad9cd9
AC
3919@var{regcache}.
3920
963e2bb7 3921If the register convention is being used, and @var{readbuf} is
92ad9cd9 3922non-@code{NULL}, also copy the return value from @var{regcache} into
963e2bb7 3923@var{readbuf} (@var{regcache} contains a copy of the registers from the
92ad9cd9
AC
3924just returned function).
3925
74055713 3926@xref{DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS}, for a description of how
92ad9cd9
AC
3927return-values that use the struct convention are handled.
3928
3929@emph{Maintainer note: This method replaces separate predicate, extract,
3930store methods. By having only one method, the logic needed to determine
3931the return-value convention need only be implemented in one place. If
3932@value{GDBN} were written in an @sc{oo} language, this method would
3933instead return an object that knew how to perform the register
3934return-value extract and store.}
3935
3936@emph{Maintainer note: This method does not take a @var{gcc_p}
3937parameter, and such a parameter should not be added. If an architecture
3938that requires per-compiler or per-function information be identified,
3939then the replacement of @var{rettype} with @code{struct value}
3940@var{function} should be persued.}
3941
3942@emph{Maintainer note: The @var{regcache} parameter limits this methods
3943to the inner most frame. While replacing @var{regcache} with a
3944@code{struct frame_info} @var{frame} parameter would remove that
3945limitation there has yet to be a demonstrated need for such a change.}
3946
c2c6d25f 3947@item SKIP_PERMANENT_BREAKPOINT
56caf160 3948@findex SKIP_PERMANENT_BREAKPOINT
25822942 3949Advance the inferior's PC past a permanent breakpoint. @value{GDBN} normally
c2c6d25f
JM
3950steps over a breakpoint by removing it, stepping one instruction, and
3951re-inserting the breakpoint. However, permanent breakpoints are
3952hardwired into the inferior, and can't be removed, so this strategy
56caf160 3953doesn't work. Calling @code{SKIP_PERMANENT_BREAKPOINT} adjusts the processor's
c2c6d25f
JM
3954state so that execution will resume just after the breakpoint. This
3955macro does the right thing even when the breakpoint is in the delay slot
3956of a branch or jump.
3957
56caf160
EZ
3958@item SKIP_PROLOGUE (@var{pc})
3959@findex SKIP_PROLOGUE
b83266a0
SS
3960A C expression that returns the address of the ``real'' code beyond the
3961function entry prologue found at @var{pc}.
c906108c 3962
56caf160
EZ
3963@item SKIP_TRAMPOLINE_CODE (@var{pc})
3964@findex SKIP_TRAMPOLINE_CODE
c906108c
SS
3965If the target machine has trampoline code that sits between callers and
3966the functions being called, then define this macro to return a new PC
3967that is at the start of the real function.
3968
3969@item SP_REGNUM
56caf160 3970@findex SP_REGNUM
cce74817 3971If the stack-pointer is kept in a register, then define this macro to be
6c0e89ed
AC
3972the number (greater than or equal to zero) of that register, or -1 if
3973there is no such register.
c906108c
SS
3974
3975@item STAB_REG_TO_REGNUM
56caf160 3976@findex STAB_REG_TO_REGNUM
c906108c 3977Define this to convert stab register numbers (as gotten from `r'
25822942 3978declarations) into @value{GDBN} regnums. If not defined, no conversion will be
c906108c
SS
3979done.
3980
f27dd7fd
AC
3981@item DEPRECATED_STACK_ALIGN (@var{addr})
3982@anchor{DEPRECATED_STACK_ALIGN}
3983@findex DEPRECATED_STACK_ALIGN
790eb8f5
AC
3984Define this to increase @var{addr} so that it meets the alignment
3985requirements for the processor's stack.
3986
3987Unlike @ref{frame_align}, this function always adjusts @var{addr}
3988upwards.
3989
3990By default, no stack alignment is performed.
c906108c 3991
56caf160
EZ
3992@item STEP_SKIPS_DELAY (@var{addr})
3993@findex STEP_SKIPS_DELAY
c906108c
SS
3994Define this to return true if the address is of an instruction with a
3995delay slot. If a breakpoint has been placed in the instruction's delay
25822942 3996slot, @value{GDBN} will single-step over that instruction before resuming
c906108c
SS
3997normally. Currently only defined for the Mips.
3998
ebba8386 3999@item STORE_RETURN_VALUE (@var{type}, @var{regcache}, @var{valbuf})
56caf160 4000@findex STORE_RETURN_VALUE
ebba8386
AC
4001A C expression that writes the function return value, found in
4002@var{valbuf}, into the @var{regcache}. @var{type} is the type of the
4003value that is to be returned.
c906108c 4004
92ad9cd9
AC
4005This method has been deprecated in favour of @code{gdbarch_return_value}
4006(@pxref{gdbarch_return_value}).
4007
c906108c 4008@item SYMBOL_RELOADING_DEFAULT
56caf160
EZ
4009@findex SYMBOL_RELOADING_DEFAULT
4010The default value of the ``symbol-reloading'' variable. (Never defined in
c906108c
SS
4011current sources.)
4012
c906108c 4013@item TARGET_CHAR_BIT
56caf160 4014@findex TARGET_CHAR_BIT
c906108c
SS
4015Number of bits in a char; defaults to 8.
4016
c3d3ce5b
JB
4017@item TARGET_CHAR_SIGNED
4018@findex TARGET_CHAR_SIGNED
4019Non-zero if @code{char} is normally signed on this architecture; zero if
4020it should be unsigned.
4021
4022The ISO C standard requires the compiler to treat @code{char} as
4023equivalent to either @code{signed char} or @code{unsigned char}; any
4024character in the standard execution set is supposed to be positive.
4025Most compilers treat @code{char} as signed, but @code{char} is unsigned
4026on the IBM S/390, RS6000, and PowerPC targets.
4027
c906108c 4028@item TARGET_COMPLEX_BIT
56caf160 4029@findex TARGET_COMPLEX_BIT
c906108c
SS
4030Number of bits in a complex number; defaults to @code{2 * TARGET_FLOAT_BIT}.
4031
ac9a91a7
JM
4032At present this macro is not used.
4033
c906108c 4034@item TARGET_DOUBLE_BIT
56caf160 4035@findex TARGET_DOUBLE_BIT
c906108c
SS
4036Number of bits in a double float; defaults to @code{8 * TARGET_CHAR_BIT}.
4037
4038@item TARGET_DOUBLE_COMPLEX_BIT
56caf160 4039@findex TARGET_DOUBLE_COMPLEX_BIT
c906108c
SS
4040Number of bits in a double complex; defaults to @code{2 * TARGET_DOUBLE_BIT}.
4041
ac9a91a7
JM
4042At present this macro is not used.
4043
c906108c 4044@item TARGET_FLOAT_BIT
56caf160 4045@findex TARGET_FLOAT_BIT
c906108c
SS
4046Number of bits in a float; defaults to @code{4 * TARGET_CHAR_BIT}.
4047
4048@item TARGET_INT_BIT
56caf160 4049@findex TARGET_INT_BIT
c906108c
SS
4050Number of bits in an integer; defaults to @code{4 * TARGET_CHAR_BIT}.
4051
4052@item TARGET_LONG_BIT
56caf160 4053@findex TARGET_LONG_BIT
c906108c
SS
4054Number of bits in a long integer; defaults to @code{4 * TARGET_CHAR_BIT}.
4055
4056@item TARGET_LONG_DOUBLE_BIT
56caf160 4057@findex TARGET_LONG_DOUBLE_BIT
c906108c
SS
4058Number of bits in a long double float;
4059defaults to @code{2 * TARGET_DOUBLE_BIT}.
4060
4061@item TARGET_LONG_LONG_BIT
56caf160 4062@findex TARGET_LONG_LONG_BIT
c906108c
SS
4063Number of bits in a long long integer; defaults to @code{2 * TARGET_LONG_BIT}.
4064
4065@item TARGET_PTR_BIT
56caf160 4066@findex TARGET_PTR_BIT
c906108c
SS
4067Number of bits in a pointer; defaults to @code{TARGET_INT_BIT}.
4068
4069@item TARGET_SHORT_BIT
56caf160 4070@findex TARGET_SHORT_BIT
c906108c
SS
4071Number of bits in a short integer; defaults to @code{2 * TARGET_CHAR_BIT}.
4072
4073@item TARGET_READ_PC
56caf160
EZ
4074@findex TARGET_READ_PC
4075@itemx TARGET_WRITE_PC (@var{val}, @var{pid})
4076@findex TARGET_WRITE_PC
0717ae8a 4077@anchor{TARGET_WRITE_PC}
56caf160
EZ
4078@itemx TARGET_READ_SP
4079@findex TARGET_READ_SP
56caf160
EZ
4080@itemx TARGET_READ_FP
4081@findex TARGET_READ_FP
56caf160
EZ
4082@findex read_pc
4083@findex write_pc
4084@findex read_sp
56caf160 4085@findex read_fp
a9e5fdc2 4086@anchor{TARGET_READ_SP} These change the behavior of @code{read_pc},
8d2c00cb 4087@code{write_pc}, and @code{read_sp}. For most targets, these may be
9c8dbfa9
AC
4088left undefined. @value{GDBN} will call the read and write register
4089functions with the relevant @code{_REGNUM} argument.
c906108c
SS
4090
4091These macros are useful when a target keeps one of these registers in a
4092hard to get at place; for example, part in a segment register and part
4093in an ordinary register.
4094
a9e5fdc2
AC
4095@xref{unwind_sp}, which replaces @code{TARGET_READ_SP}.
4096
56caf160
EZ
4097@item TARGET_VIRTUAL_FRAME_POINTER(@var{pc}, @var{regp}, @var{offsetp})
4098@findex TARGET_VIRTUAL_FRAME_POINTER
0ba6dca9
AC
4099Returns a @code{(register, offset)} pair representing the virtual frame
4100pointer in use at the code address @var{pc}. If virtual frame pointers
4101are not used, a default definition simply returns
4102@code{DEPRECATED_FP_REGNUM}, with an offset of zero.
c906108c 4103
9742079a
EZ
4104@item TARGET_HAS_HARDWARE_WATCHPOINTS
4105If non-zero, the target has support for hardware-assisted
4106watchpoints. @xref{Algorithms, watchpoints}, for more details and
4107other related macros.
4108
7ccaa899
EZ
4109@item TARGET_PRINT_INSN (@var{addr}, @var{info})
4110@findex TARGET_PRINT_INSN
4111This is the function used by @value{GDBN} to print an assembly
4112instruction. It prints the instruction at address @var{addr} in
4113debugged memory and returns the length of the instruction, in bytes. If
4114a target doesn't define its own printing routine, it defaults to an
d7a27068
AC
4115accessor function for the global pointer
4116@code{deprecated_tm_print_insn}. This usually points to a function in
4117the @code{opcodes} library (@pxref{Support Libraries, ,Opcodes}).
4118@var{info} is a structure (of type @code{disassemble_info}) defined in
4119@file{include/dis-asm.h} used to pass information to the instruction
4120decoding routine.
7ccaa899 4121
6314f104
AC
4122@item struct frame_id unwind_dummy_id (struct frame_info *@var{frame})
4123@findex unwind_dummy_id
4124@anchor{unwind_dummy_id} Given @var{frame} return a @code{struct
4125frame_id} that uniquely identifies an inferior function call's dummy
b24da7d0
AC
4126frame. The value returned must match the dummy frame stack value
4127previously saved using @code{SAVE_DUMMY_FRAME_TOS}.
4128@xref{SAVE_DUMMY_FRAME_TOS}.
6314f104 4129
b5622e8d
AC
4130@item DEPRECATED_USE_STRUCT_CONVENTION (@var{gcc_p}, @var{type})
4131@findex DEPRECATED_USE_STRUCT_CONVENTION
c906108c
SS
4132If defined, this must be an expression that is nonzero if a value of the
4133given @var{type} being returned from a function must have space
4134allocated for it on the stack. @var{gcc_p} is true if the function
4135being considered is known to have been compiled by GCC; this is helpful
4136for systems where GCC is known to use different calling convention than
4137other compilers.
4138
92ad9cd9
AC
4139This method has been deprecated in favour of @code{gdbarch_return_value}
4140(@pxref{gdbarch_return_value}).
4141
13d01224
AC
4142@item VALUE_TO_REGISTER(@var{type}, @var{regnum}, @var{from}, @var{to})
4143@findex VALUE_TO_REGISTER
4144Convert a value of type @var{type} into the raw contents of register
4145@var{regnum}'s.
4146@xref{Target Architecture Definition, , Using Different Register and Memory Data Representations}.
4147
56caf160
EZ
4148@item VARIABLES_INSIDE_BLOCK (@var{desc}, @var{gcc_p})
4149@findex VARIABLES_INSIDE_BLOCK
c906108c
SS
4150For dbx-style debugging information, if the compiler puts variable
4151declarations inside LBRAC/RBRAC blocks, this should be defined to be
4152nonzero. @var{desc} is the value of @code{n_desc} from the
25822942 4153@code{N_RBRAC} symbol, and @var{gcc_p} is true if @value{GDBN} has noticed the
c906108c
SS
4154presence of either the @code{GCC_COMPILED_SYMBOL} or the
4155@code{GCC2_COMPILED_SYMBOL}. By default, this is 0.
4156
56caf160
EZ
4157@item OS9K_VARIABLES_INSIDE_BLOCK (@var{desc}, @var{gcc_p})
4158@findex OS9K_VARIABLES_INSIDE_BLOCK
c906108c 4159Similarly, for OS/9000. Defaults to 1.
c906108c
SS
4160@end table
4161
4162Motorola M68K target conditionals.
4163
56caf160 4164@ftable @code
c906108c
SS
4165@item BPT_VECTOR
4166Define this to be the 4-bit location of the breakpoint trap vector. If
4167not defined, it will default to @code{0xf}.
4168
4169@item REMOTE_BPT_VECTOR
4170Defaults to @code{1}.
a23a7bf1
JB
4171
4172@item NAME_OF_MALLOC
4173@findex NAME_OF_MALLOC
4174A string containing the name of the function to call in order to
4175allocate some memory in the inferior. The default value is "malloc".
4176
56caf160 4177@end ftable
c906108c
SS
4178
4179@section Adding a New Target
4180
56caf160 4181@cindex adding a target
af6c57ea 4182The following files add a target to @value{GDBN}:
c906108c
SS
4183
4184@table @file
56caf160 4185@vindex TDEPFILES
c906108c
SS
4186@item gdb/config/@var{arch}/@var{ttt}.mt
4187Contains a Makefile fragment specific to this target. Specifies what
4188object files are needed for target @var{ttt}, by defining
104c1213
JM
4189@samp{TDEPFILES=@dots{}} and @samp{TDEPLIBS=@dots{}}. Also specifies
4190the header file which describes @var{ttt}, by defining @samp{TM_FILE=
4191tm-@var{ttt}.h}.
4192
4193You can also define @samp{TM_CFLAGS}, @samp{TM_CLIBS}, @samp{TM_CDEPS},
4194but these are now deprecated, replaced by autoconf, and may go away in
25822942 4195future versions of @value{GDBN}.
c906108c 4196
c906108c
SS
4197@item gdb/@var{ttt}-tdep.c
4198Contains any miscellaneous code required for this target machine. On
4199some machines it doesn't exist at all. Sometimes the macros in
4200@file{tm-@var{ttt}.h} become very complicated, so they are implemented
4201as functions here instead, and the macro is simply defined to call the
4202function. This is vastly preferable, since it is easier to understand
4203and debug.
4204
af6c57ea
AC
4205@item gdb/@var{arch}-tdep.c
4206@itemx gdb/@var{arch}-tdep.h
4207This often exists to describe the basic layout of the target machine's
4208processor chip (registers, stack, etc.). If used, it is included by
4209@file{@var{ttt}-tdep.h}. It can be shared among many targets that use
4210the same processor.
4211
4212@item gdb/config/@var{arch}/tm-@var{ttt}.h
4213(@file{tm.h} is a link to this file, created by @code{configure}). Contains
4214macro definitions about the target machine's registers, stack frame
4215format and instructions.
4216
4217New targets do not need this file and should not create it.
4218
c906108c
SS
4219@item gdb/config/@var{arch}/tm-@var{arch}.h
4220This often exists to describe the basic layout of the target machine's
56caf160 4221processor chip (registers, stack, etc.). If used, it is included by
c906108c
SS
4222@file{tm-@var{ttt}.h}. It can be shared among many targets that use the
4223same processor.
4224
af6c57ea
AC
4225New targets do not need this file and should not create it.
4226
c906108c
SS
4227@end table
4228
4229If you are adding a new operating system for an existing CPU chip, add a
4230@file{config/tm-@var{os}.h} file that describes the operating system
4231facilities that are unusual (extra symbol table info; the breakpoint
56caf160 4232instruction needed; etc.). Then write a @file{@var{arch}/tm-@var{os}.h}
c906108c
SS
4233that just @code{#include}s @file{tm-@var{arch}.h} and
4234@file{config/tm-@var{os}.h}.
4235
4236
3352e23e
AC
4237@section Converting an existing Target Architecture to Multi-arch
4238@cindex converting targets to multi-arch
4239
4240This section describes the current accepted best practice for converting
4241an existing target architecture to the multi-arch framework.
4242
4243The process consists of generating, testing, posting and committing a
4244sequence of patches. Each patch must contain a single change, for
4245instance:
4246
4247@itemize @bullet
4248
4249@item
4250Directly convert a group of functions into macros (the conversion does
4251not change the behavior of any of the functions).
4252
4253@item
4254Replace a non-multi-arch with a multi-arch mechanism (e.g.,
4255@code{FRAME_INFO}).
4256
4257@item
4258Enable multi-arch level one.
4259
4260@item
4261Delete one or more files.
4262
4263@end itemize
4264
4265@noindent
4266There isn't a size limit on a patch, however, a developer is strongly
4267encouraged to keep the patch size down.
4268
4269Since each patch is well defined, and since each change has been tested
4270and shows no regressions, the patches are considered @emph{fairly}
4271obvious. Such patches, when submitted by developers listed in the
4272@file{MAINTAINERS} file, do not need approval. Occasional steps in the
4273process may be more complicated and less clear. The developer is
4274expected to use their judgment and is encouraged to seek advice as
4275needed.
4276
4277@subsection Preparation
4278
4279The first step is to establish control. Build (with @option{-Werror}
4280enabled) and test the target so that there is a baseline against which
4281the debugger can be compared.
4282
4283At no stage can the test results regress or @value{GDBN} stop compiling
4284with @option{-Werror}.
4285
4286@subsection Add the multi-arch initialization code
4287
4288The objective of this step is to establish the basic multi-arch
4289framework. It involves
4290
4291@itemize @bullet
4292
4293@item
4294The addition of a @code{@var{arch}_gdbarch_init} function@footnote{The
4295above is from the original example and uses K&R C. @value{GDBN}
4296has since converted to ISO C but lets ignore that.} that creates
4297the architecture:
4298@smallexample
4299static struct gdbarch *
4300d10v_gdbarch_init (info, arches)
4301 struct gdbarch_info info;
4302 struct gdbarch_list *arches;
4303@{
4304 struct gdbarch *gdbarch;
4305 /* there is only one d10v architecture */
4306 if (arches != NULL)
4307 return arches->gdbarch;
4308 gdbarch = gdbarch_alloc (&info, NULL);
4309 return gdbarch;
4310@}
4311@end smallexample
4312@noindent
4313@emph{}
4314
4315@item
4316A per-architecture dump function to print any architecture specific
4317information:
4318@smallexample
4319static void
4320mips_dump_tdep (struct gdbarch *current_gdbarch,
4321 struct ui_file *file)
4322@{
4323 @dots{} code to print architecture specific info @dots{}
4324@}
4325@end smallexample
4326
4327@item
4328A change to @code{_initialize_@var{arch}_tdep} to register this new
4329architecture:
4330@smallexample
4331void
4332_initialize_mips_tdep (void)
4333@{
4334 gdbarch_register (bfd_arch_mips, mips_gdbarch_init,
4335 mips_dump_tdep);
4336@end smallexample
4337
4338@item
4339Add the macro @code{GDB_MULTI_ARCH}, defined as 0 (zero), to the file@*
4340@file{config/@var{arch}/tm-@var{arch}.h}.
4341
4342@end itemize
4343
4344@subsection Update multi-arch incompatible mechanisms
4345
4346Some mechanisms do not work with multi-arch. They include:
4347
4348@table @code
3352e23e 4349@item FRAME_FIND_SAVED_REGS
f30ee0bc 4350Replaced with @code{DEPRECATED_FRAME_INIT_SAVED_REGS}
3352e23e
AC
4351@end table
4352
4353@noindent
4354At this stage you could also consider converting the macros into
4355functions.
4356
4357@subsection Prepare for multi-arch level to one
4358
4359Temporally set @code{GDB_MULTI_ARCH} to @code{GDB_MULTI_ARCH_PARTIAL}
4360and then build and start @value{GDBN} (the change should not be
4361committed). @value{GDBN} may not build, and once built, it may die with
4362an internal error listing the architecture methods that must be
4363provided.
4364
4365Fix any build problems (patch(es)).
4366
4367Convert all the architecture methods listed, which are only macros, into
4368functions (patch(es)).
4369
4370Update @code{@var{arch}_gdbarch_init} to set all the missing
4371architecture methods and wrap the corresponding macros in @code{#if
4372!GDB_MULTI_ARCH} (patch(es)).
4373
4374@subsection Set multi-arch level one
4375
4376Change the value of @code{GDB_MULTI_ARCH} to GDB_MULTI_ARCH_PARTIAL (a
4377single patch).
4378
4379Any problems with throwing ``the switch'' should have been fixed
4380already.
4381
4382@subsection Convert remaining macros
4383
4384Suggest converting macros into functions (and setting the corresponding
4385architecture method) in small batches.
4386
4387@subsection Set multi-arch level to two
4388
4389This should go smoothly.
4390
4391@subsection Delete the TM file
4392
4393The @file{tm-@var{arch}.h} can be deleted. @file{@var{arch}.mt} and
4394@file{configure.in} updated.
4395
4396
c906108c
SS
4397@node Target Vector Definition
4398
4399@chapter Target Vector Definition
56caf160 4400@cindex target vector
c906108c 4401
56caf160
EZ
4402The target vector defines the interface between @value{GDBN}'s
4403abstract handling of target systems, and the nitty-gritty code that
4404actually exercises control over a process or a serial port.
4405@value{GDBN} includes some 30-40 different target vectors; however,
4406each configuration of @value{GDBN} includes only a few of them.
c906108c
SS
4407
4408@section File Targets
4409
4410Both executables and core files have target vectors.
4411
4412@section Standard Protocol and Remote Stubs
4413
56caf160
EZ
4414@value{GDBN}'s file @file{remote.c} talks a serial protocol to code
4415that runs in the target system. @value{GDBN} provides several sample
4416@dfn{stubs} that can be integrated into target programs or operating
4417systems for this purpose; they are named @file{*-stub.c}.
c906108c 4418
56caf160
EZ
4419The @value{GDBN} user's manual describes how to put such a stub into
4420your target code. What follows is a discussion of integrating the
4421SPARC stub into a complicated operating system (rather than a simple
4422program), by Stu Grossman, the author of this stub.
c906108c
SS
4423
4424The trap handling code in the stub assumes the following upon entry to
56caf160 4425@code{trap_low}:
c906108c
SS
4426
4427@enumerate
56caf160
EZ
4428@item
4429%l1 and %l2 contain pc and npc respectively at the time of the trap;
c906108c 4430
56caf160
EZ
4431@item
4432traps are disabled;
c906108c 4433
56caf160
EZ
4434@item
4435you are in the correct trap window.
c906108c
SS
4436@end enumerate
4437
4438As long as your trap handler can guarantee those conditions, then there
56caf160 4439is no reason why you shouldn't be able to ``share'' traps with the stub.
c906108c
SS
4440The stub has no requirement that it be jumped to directly from the
4441hardware trap vector. That is why it calls @code{exceptionHandler()},
4442which is provided by the external environment. For instance, this could
56caf160 4443set up the hardware traps to actually execute code which calls the stub
c906108c
SS
4444first, and then transfers to its own trap handler.
4445
4446For the most point, there probably won't be much of an issue with
56caf160 4447``sharing'' traps, as the traps we use are usually not used by the kernel,
c906108c
SS
4448and often indicate unrecoverable error conditions. Anyway, this is all
4449controlled by a table, and is trivial to modify. The most important
4450trap for us is for @code{ta 1}. Without that, we can't single step or
4451do breakpoints. Everything else is unnecessary for the proper operation
4452of the debugger/stub.
4453
4454From reading the stub, it's probably not obvious how breakpoints work.
25822942 4455They are simply done by deposit/examine operations from @value{GDBN}.
c906108c
SS
4456
4457@section ROM Monitor Interface
4458
4459@section Custom Protocols
4460
4461@section Transport Layer
4462
4463@section Builtin Simulator
4464
4465
4466@node Native Debugging
4467
4468@chapter Native Debugging
56caf160 4469@cindex native debugging
c906108c 4470
25822942 4471Several files control @value{GDBN}'s configuration for native support:
c906108c
SS
4472
4473@table @file
56caf160 4474@vindex NATDEPFILES
c906108c 4475@item gdb/config/@var{arch}/@var{xyz}.mh
7fd60527 4476Specifies Makefile fragments needed by a @emph{native} configuration on
c906108c
SS
4477machine @var{xyz}. In particular, this lists the required
4478native-dependent object files, by defining @samp{NATDEPFILES=@dots{}}.
4479Also specifies the header file which describes native support on
4480@var{xyz}, by defining @samp{NAT_FILE= nm-@var{xyz}.h}. You can also
4481define @samp{NAT_CFLAGS}, @samp{NAT_ADD_FILES}, @samp{NAT_CLIBS},
4482@samp{NAT_CDEPS}, etc.; see @file{Makefile.in}.
4483
7fd60527
AC
4484@emph{Maintainer's note: The @file{.mh} suffix is because this file
4485originally contained @file{Makefile} fragments for hosting @value{GDBN}
4486on machine @var{xyz}. While the file is no longer used for this
937f164b 4487purpose, the @file{.mh} suffix remains. Perhaps someone will
7fd60527
AC
4488eventually rename these fragments so that they have a @file{.mn}
4489suffix.}
4490
c906108c 4491@item gdb/config/@var{arch}/nm-@var{xyz}.h
56caf160 4492(@file{nm.h} is a link to this file, created by @code{configure}). Contains C
c906108c
SS
4493macro definitions describing the native system environment, such as
4494child process control and core file support.
4495
4496@item gdb/@var{xyz}-nat.c
4497Contains any miscellaneous C code required for this native support of
4498this machine. On some machines it doesn't exist at all.
c906108c
SS
4499@end table
4500
4501There are some ``generic'' versions of routines that can be used by
4502various systems. These can be customized in various ways by macros
4503defined in your @file{nm-@var{xyz}.h} file. If these routines work for
4504the @var{xyz} host, you can just include the generic file's name (with
4505@samp{.o}, not @samp{.c}) in @code{NATDEPFILES}.
4506
4507Otherwise, if your machine needs custom support routines, you will need
4508to write routines that perform the same functions as the generic file.
56caf160 4509Put them into @file{@var{xyz}-nat.c}, and put @file{@var{xyz}-nat.o}
c906108c
SS
4510into @code{NATDEPFILES}.
4511
4512@table @file
c906108c
SS
4513@item inftarg.c
4514This contains the @emph{target_ops vector} that supports Unix child
4515processes on systems which use ptrace and wait to control the child.
4516
4517@item procfs.c
4518This contains the @emph{target_ops vector} that supports Unix child
4519processes on systems which use /proc to control the child.
4520
4521@item fork-child.c
56caf160
EZ
4522This does the low-level grunge that uses Unix system calls to do a ``fork
4523and exec'' to start up a child process.
c906108c
SS
4524
4525@item infptrace.c
4526This is the low level interface to inferior processes for systems using
4527the Unix @code{ptrace} call in a vanilla way.
c906108c
SS
4528@end table
4529
4530@section Native core file Support
56caf160 4531@cindex native core files
c906108c
SS
4532
4533@table @file
56caf160 4534@findex fetch_core_registers
c906108c
SS
4535@item core-aout.c::fetch_core_registers()
4536Support for reading registers out of a core file. This routine calls
4537@code{register_addr()}, see below. Now that BFD is used to read core
4538files, virtually all machines should use @code{core-aout.c}, and should
4539just provide @code{fetch_core_registers} in @code{@var{xyz}-nat.c} (or
4540@code{REGISTER_U_ADDR} in @code{nm-@var{xyz}.h}).
4541
4542@item core-aout.c::register_addr()
4543If your @code{nm-@var{xyz}.h} file defines the macro
4544@code{REGISTER_U_ADDR(addr, blockend, regno)}, it should be defined to
25822942 4545set @code{addr} to the offset within the @samp{user} struct of @value{GDBN}
c906108c
SS
4546register number @code{regno}. @code{blockend} is the offset within the
4547``upage'' of @code{u.u_ar0}. If @code{REGISTER_U_ADDR} is defined,
4548@file{core-aout.c} will define the @code{register_addr()} function and
4549use the macro in it. If you do not define @code{REGISTER_U_ADDR}, but
4550you are using the standard @code{fetch_core_registers()}, you will need
4551to define your own version of @code{register_addr()}, put it into your
4552@code{@var{xyz}-nat.c} file, and be sure @code{@var{xyz}-nat.o} is in
4553the @code{NATDEPFILES} list. If you have your own
4554@code{fetch_core_registers()}, you may not need a separate
4555@code{register_addr()}. Many custom @code{fetch_core_registers()}
4556implementations simply locate the registers themselves.@refill
c906108c
SS
4557@end table
4558
25822942 4559When making @value{GDBN} run native on a new operating system, to make it
c906108c
SS
4560possible to debug core files, you will need to either write specific
4561code for parsing your OS's core files, or customize
4562@file{bfd/trad-core.c}. First, use whatever @code{#include} files your
4563machine uses to define the struct of registers that is accessible
4564(possibly in the u-area) in a core file (rather than
4565@file{machine/reg.h}), and an include file that defines whatever header
c1468174 4566exists on a core file (e.g., the u-area or a @code{struct core}). Then
56caf160 4567modify @code{trad_unix_core_file_p} to use these values to set up the
c906108c
SS
4568section information for the data segment, stack segment, any other
4569segments in the core file (perhaps shared library contents or control
4570information), ``registers'' segment, and if there are two discontiguous
c1468174 4571sets of registers (e.g., integer and float), the ``reg2'' segment. This
c906108c
SS
4572section information basically delimits areas in the core file in a
4573standard way, which the section-reading routines in BFD know how to seek
4574around in.
4575
25822942 4576Then back in @value{GDBN}, you need a matching routine called
56caf160 4577@code{fetch_core_registers}. If you can use the generic one, it's in
c906108c
SS
4578@file{core-aout.c}; if not, it's in your @file{@var{xyz}-nat.c} file.
4579It will be passed a char pointer to the entire ``registers'' segment,
4580its length, and a zero; or a char pointer to the entire ``regs2''
4581segment, its length, and a 2. The routine should suck out the supplied
25822942 4582register values and install them into @value{GDBN}'s ``registers'' array.
c906108c
SS
4583
4584If your system uses @file{/proc} to control processes, and uses ELF
4585format core files, then you may be able to use the same routines for
4586reading the registers out of processes and out of core files.
4587
4588@section ptrace
4589
4590@section /proc
4591
4592@section win32
4593
4594@section shared libraries
4595
4596@section Native Conditionals
56caf160 4597@cindex native conditionals
c906108c 4598
56caf160
EZ
4599When @value{GDBN} is configured and compiled, various macros are
4600defined or left undefined, to control compilation when the host and
4601target systems are the same. These macros should be defined (or left
4602undefined) in @file{nm-@var{system}.h}.
c906108c 4603
1f6d4158
AC
4604@table @code
4605
c906108c 4606@item CHILD_PREPARE_TO_STORE
56caf160 4607@findex CHILD_PREPARE_TO_STORE
c906108c
SS
4608If the machine stores all registers at once in the child process, then
4609define this to ensure that all values are correct. This usually entails
4610a read from the child.
4611
4612[Note that this is incorrectly defined in @file{xm-@var{system}.h} files
4613currently.]
4614
4615@item FETCH_INFERIOR_REGISTERS
56caf160 4616@findex FETCH_INFERIOR_REGISTERS
c906108c
SS
4617Define this if the native-dependent code will provide its own routines
4618@code{fetch_inferior_registers} and @code{store_inferior_registers} in
56caf160 4619@file{@var{host}-nat.c}. If this symbol is @emph{not} defined, and
c906108c
SS
4620@file{infptrace.c} is included in this configuration, the default
4621routines in @file{infptrace.c} are used for these functions.
4622
c906108c 4623@item FP0_REGNUM
56caf160 4624@findex FP0_REGNUM
c906108c
SS
4625This macro is normally defined to be the number of the first floating
4626point register, if the machine has such registers. As such, it would
56caf160 4627appear only in target-specific code. However, @file{/proc} support uses this
c906108c
SS
4628to decide whether floats are in use on this target.
4629
4630@item GET_LONGJMP_TARGET
56caf160 4631@findex GET_LONGJMP_TARGET
c906108c
SS
4632For most machines, this is a target-dependent parameter. On the
4633DECstation and the Iris, this is a native-dependent parameter, since
56caf160 4634@file{setjmp.h} is needed to define it.
c906108c 4635
56caf160 4636This macro determines the target PC address that @code{longjmp} will jump to,
c906108c 4637assuming that we have just stopped at a longjmp breakpoint. It takes a
56caf160 4638@code{CORE_ADDR *} as argument, and stores the target PC value through this
c906108c
SS
4639pointer. It examines the current state of the machine as needed.
4640
9742079a
EZ
4641@item I386_USE_GENERIC_WATCHPOINTS
4642An x86-based machine can define this to use the generic x86 watchpoint
4643support; see @ref{Algorithms, I386_USE_GENERIC_WATCHPOINTS}.
4644
c906108c 4645@item KERNEL_U_ADDR
56caf160 4646@findex KERNEL_U_ADDR
c906108c 4647Define this to the address of the @code{u} structure (the ``user
25822942 4648struct'', also known as the ``u-page'') in kernel virtual memory. @value{GDBN}
c906108c
SS
4649needs to know this so that it can subtract this address from absolute
4650addresses in the upage, that are obtained via ptrace or from core files.
4651On systems that don't need this value, set it to zero.
4652
c906108c 4653@item KERNEL_U_ADDR_HPUX
56caf160 4654@findex KERNEL_U_ADDR_HPUX
25822942 4655Define this to cause @value{GDBN} to determine the address of @code{u} at
c906108c
SS
4656runtime, by using HP-style @code{nlist} on the kernel's image in the
4657root directory.
4658
4659@item ONE_PROCESS_WRITETEXT
56caf160 4660@findex ONE_PROCESS_WRITETEXT
c906108c
SS
4661Define this to be able to, when a breakpoint insertion fails, warn the
4662user that another process may be running with the same executable.
4663
4664@item PROC_NAME_FMT
56caf160 4665@findex PROC_NAME_FMT
c906108c
SS
4666Defines the format for the name of a @file{/proc} device. Should be
4667defined in @file{nm.h} @emph{only} in order to override the default
4668definition in @file{procfs.c}.
4669
c906108c 4670@item PTRACE_ARG3_TYPE
56caf160 4671@findex PTRACE_ARG3_TYPE
c906108c
SS
4672The type of the third argument to the @code{ptrace} system call, if it
4673exists and is different from @code{int}.
4674
4675@item REGISTER_U_ADDR
56caf160 4676@findex REGISTER_U_ADDR
c906108c
SS
4677Defines the offset of the registers in the ``u area''.
4678
4679@item SHELL_COMMAND_CONCAT
56caf160 4680@findex SHELL_COMMAND_CONCAT
c906108c
SS
4681If defined, is a string to prefix on the shell command used to start the
4682inferior.
4683
4684@item SHELL_FILE
56caf160 4685@findex SHELL_FILE
c906108c
SS
4686If defined, this is the name of the shell to use to run the inferior.
4687Defaults to @code{"/bin/sh"}.
4688
990f9fe3 4689@item SOLIB_ADD (@var{filename}, @var{from_tty}, @var{targ}, @var{readsyms})
56caf160 4690@findex SOLIB_ADD
c906108c 4691Define this to expand into an expression that will cause the symbols in
990f9fe3
FF
4692@var{filename} to be added to @value{GDBN}'s symbol table. If
4693@var{readsyms} is zero symbols are not read but any necessary low level
4694processing for @var{filename} is still done.
c906108c
SS
4695
4696@item SOLIB_CREATE_INFERIOR_HOOK
56caf160 4697@findex SOLIB_CREATE_INFERIOR_HOOK
c906108c
SS
4698Define this to expand into any shared-library-relocation code that you
4699want to be run just after the child process has been forked.
4700
4701@item START_INFERIOR_TRAPS_EXPECTED
56caf160
EZ
4702@findex START_INFERIOR_TRAPS_EXPECTED
4703When starting an inferior, @value{GDBN} normally expects to trap
4704twice; once when
c906108c
SS
4705the shell execs, and once when the program itself execs. If the actual
4706number of traps is something other than 2, then define this macro to
4707expand into the number expected.
4708
c906108c 4709@item USE_PROC_FS
56caf160 4710@findex USE_PROC_FS
c906108c 4711This determines whether small routines in @file{*-tdep.c}, which
56caf160
EZ
4712translate register values between @value{GDBN}'s internal
4713representation and the @file{/proc} representation, are compiled.
c906108c
SS
4714
4715@item U_REGS_OFFSET
56caf160 4716@findex U_REGS_OFFSET
c906108c
SS
4717This is the offset of the registers in the upage. It need only be
4718defined if the generic ptrace register access routines in
4719@file{infptrace.c} are being used (that is, @file{infptrace.c} is
4720configured in, and @code{FETCH_INFERIOR_REGISTERS} is not defined). If
4721the default value from @file{infptrace.c} is good enough, leave it
4722undefined.
4723
4724The default value means that u.u_ar0 @emph{points to} the location of
4725the registers. I'm guessing that @code{#define U_REGS_OFFSET 0} means
56caf160 4726that @code{u.u_ar0} @emph{is} the location of the registers.
c906108c
SS
4727
4728@item CLEAR_SOLIB
56caf160
EZ
4729@findex CLEAR_SOLIB
4730See @file{objfiles.c}.
c906108c
SS
4731
4732@item DEBUG_PTRACE
56caf160
EZ
4733@findex DEBUG_PTRACE
4734Define this to debug @code{ptrace} calls.
c906108c
SS
4735@end table
4736
4737
4738@node Support Libraries
4739
4740@chapter Support Libraries
4741
4742@section BFD
56caf160 4743@cindex BFD library
c906108c 4744
25822942 4745BFD provides support for @value{GDBN} in several ways:
c906108c
SS
4746
4747@table @emph
c906108c
SS
4748@item identifying executable and core files
4749BFD will identify a variety of file types, including a.out, coff, and
4750several variants thereof, as well as several kinds of core files.
4751
4752@item access to sections of files
4753BFD parses the file headers to determine the names, virtual addresses,
4754sizes, and file locations of all the various named sections in files
56caf160
EZ
4755(such as the text section or the data section). @value{GDBN} simply
4756calls BFD to read or write section @var{x} at byte offset @var{y} for
4757length @var{z}.
c906108c
SS
4758
4759@item specialized core file support
4760BFD provides routines to determine the failing command name stored in a
4761core file, the signal with which the program failed, and whether a core
56caf160 4762file matches (i.e.@: could be a core dump of) a particular executable
c906108c
SS
4763file.
4764
4765@item locating the symbol information
25822942
DB
4766@value{GDBN} uses an internal interface of BFD to determine where to find the
4767symbol information in an executable file or symbol-file. @value{GDBN} itself
c906108c 4768handles the reading of symbols, since BFD does not ``understand'' debug
25822942 4769symbols, but @value{GDBN} uses BFD's cached information to find the symbols,
c906108c 4770string table, etc.
c906108c
SS
4771@end table
4772
4773@section opcodes
56caf160 4774@cindex opcodes library
c906108c 4775
25822942 4776The opcodes library provides @value{GDBN}'s disassembler. (It's a separate
c906108c
SS
4777library because it's also used in binutils, for @file{objdump}).
4778
4779@section readline
4780
4781@section mmalloc
4782
4783@section libiberty
1eb288ea
EZ
4784@cindex @code{libiberty} library
4785
4786The @code{libiberty} library provides a set of functions and features
4787that integrate and improve on functionality found in modern operating
4788systems. Broadly speaking, such features can be divided into three
4789groups: supplemental functions (functions that may be missing in some
4790environments and operating systems), replacement functions (providing
4791a uniform and easier to use interface for commonly used standard
4792functions), and extensions (which provide additional functionality
4793beyond standard functions).
4794
4795@value{GDBN} uses various features provided by the @code{libiberty}
4796library, for instance the C@t{++} demangler, the @acronym{IEEE}
4797floating format support functions, the input options parser
4798@samp{getopt}, the @samp{obstack} extension, and other functions.
4799
4800@subsection @code{obstacks} in @value{GDBN}
4801@cindex @code{obstacks}
4802
4803The obstack mechanism provides a convenient way to allocate and free
4804chunks of memory. Each obstack is a pool of memory that is managed
4805like a stack. Objects (of any nature, size and alignment) are
4806allocated and freed in a @acronym{LIFO} fashion on an obstack (see
4807@code{libiberty}'s documenatation for a more detailed explanation of
4808@code{obstacks}).
4809
4810The most noticeable use of the @code{obstacks} in @value{GDBN} is in
4811object files. There is an obstack associated with each internal
4812representation of an object file. Lots of things get allocated on
4813these @code{obstacks}: dictionary entries, blocks, blockvectors,
4814symbols, minimal symbols, types, vectors of fundamental types, class
4815fields of types, object files section lists, object files section
4816offets lists, line tables, symbol tables, partial symbol tables,
4817string tables, symbol table private data, macros tables, debug
4818information sections and entries, import and export lists (som),
4819unwind information (hppa), dwarf2 location expressions data. Plus
4820various strings such as directory names strings, debug format strings,
4821names of types.
4822
4823An essential and convenient property of all data on @code{obstacks} is
4824that memory for it gets allocated (with @code{obstack_alloc}) at
4825various times during a debugging sesssion, but it is released all at
4826once using the @code{obstack_free} function. The @code{obstack_free}
4827function takes a pointer to where in the stack it must start the
4828deletion from (much like the cleanup chains have a pointer to where to
4829start the cleanups). Because of the stack like structure of the
4830@code{obstacks}, this allows to free only a top portion of the
4831obstack. There are a few instances in @value{GDBN} where such thing
4832happens. Calls to @code{obstack_free} are done after some local data
4833is allocated to the obstack. Only the local data is deleted from the
4834obstack. Of course this assumes that nothing between the
4835@code{obstack_alloc} and the @code{obstack_free} allocates anything
4836else on the same obstack. For this reason it is best and safest to
4837use temporary @code{obstacks}.
4838
4839Releasing the whole obstack is also not safe per se. It is safe only
4840under the condition that we know the @code{obstacks} memory is no
4841longer needed. In @value{GDBN} we get rid of the @code{obstacks} only
4842when we get rid of the whole objfile(s), for instance upon reading a
4843new symbol file.
c906108c
SS
4844
4845@section gnu-regex
56caf160 4846@cindex regular expressions library
c906108c
SS
4847
4848Regex conditionals.
4849
4850@table @code
c906108c
SS
4851@item C_ALLOCA
4852
4853@item NFAILURES
4854
4855@item RE_NREGS
4856
4857@item SIGN_EXTEND_CHAR
4858
4859@item SWITCH_ENUM_BUG
4860
4861@item SYNTAX_TABLE
4862
4863@item Sword
4864
4865@item sparc
c906108c
SS
4866@end table
4867
4868@section include
4869
4870@node Coding
4871
4872@chapter Coding
4873
4874This chapter covers topics that are lower-level than the major
25822942 4875algorithms of @value{GDBN}.
c906108c
SS
4876
4877@section Cleanups
56caf160 4878@cindex cleanups
c906108c
SS
4879
4880Cleanups are a structured way to deal with things that need to be done
cc1cb004 4881later.
c906108c 4882
cc1cb004
AC
4883When your code does something (e.g., @code{xmalloc} some memory, or
4884@code{open} a file) that needs to be undone later (e.g., @code{xfree}
4885the memory or @code{close} the file), it can make a cleanup. The
4886cleanup will be done at some future point: when the command is finished
4887and control returns to the top level; when an error occurs and the stack
4888is unwound; or when your code decides it's time to explicitly perform
4889cleanups. Alternatively you can elect to discard the cleanups you
4890created.
c906108c
SS
4891
4892Syntax:
4893
4894@table @code
c906108c
SS
4895@item struct cleanup *@var{old_chain};
4896Declare a variable which will hold a cleanup chain handle.
4897
56caf160 4898@findex make_cleanup
c906108c
SS
4899@item @var{old_chain} = make_cleanup (@var{function}, @var{arg});
4900Make a cleanup which will cause @var{function} to be called with
4901@var{arg} (a @code{char *}) later. The result, @var{old_chain}, is a
cc1cb004
AC
4902handle that can later be passed to @code{do_cleanups} or
4903@code{discard_cleanups}. Unless you are going to call
4904@code{do_cleanups} or @code{discard_cleanups}, you can ignore the result
4905from @code{make_cleanup}.
c906108c 4906
56caf160 4907@findex do_cleanups
c906108c 4908@item do_cleanups (@var{old_chain});
cc1cb004
AC
4909Do all cleanups added to the chain since the corresponding
4910@code{make_cleanup} call was made.
4911
4912@findex discard_cleanups
4913@item discard_cleanups (@var{old_chain});
4914Same as @code{do_cleanups} except that it just removes the cleanups from
4915the chain and does not call the specified functions.
4916@end table
4917
4918Cleanups are implemented as a chain. The handle returned by
4919@code{make_cleanups} includes the cleanup passed to the call and any
4920later cleanups appended to the chain (but not yet discarded or
4921performed). E.g.:
56caf160 4922
474c8240 4923@smallexample
c906108c 4924make_cleanup (a, 0);
cc1cb004
AC
4925@{
4926 struct cleanup *old = make_cleanup (b, 0);
4927 make_cleanup (c, 0)
4928 ...
4929 do_cleanups (old);
4930@}
474c8240 4931@end smallexample
56caf160 4932
c906108c 4933@noindent
cc1cb004
AC
4934will call @code{c()} and @code{b()} but will not call @code{a()}. The
4935cleanup that calls @code{a()} will remain in the cleanup chain, and will
4936be done later unless otherwise discarded.@refill
4937
4938Your function should explicitly do or discard the cleanups it creates.
4939Failing to do this leads to non-deterministic behavior since the caller
4940will arbitrarily do or discard your functions cleanups. This need leads
4941to two common cleanup styles.
4942
4943The first style is try/finally. Before it exits, your code-block calls
4944@code{do_cleanups} with the old cleanup chain and thus ensures that your
4945code-block's cleanups are always performed. For instance, the following
4946code-segment avoids a memory leak problem (even when @code{error} is
4947called and a forced stack unwind occurs) by ensuring that the
4948@code{xfree} will always be called:
c906108c 4949
474c8240 4950@smallexample
cc1cb004
AC
4951struct cleanup *old = make_cleanup (null_cleanup, 0);
4952data = xmalloc (sizeof blah);
4953make_cleanup (xfree, data);
4954... blah blah ...
4955do_cleanups (old);
474c8240 4956@end smallexample
cc1cb004
AC
4957
4958The second style is try/except. Before it exits, your code-block calls
4959@code{discard_cleanups} with the old cleanup chain and thus ensures that
4960any created cleanups are not performed. For instance, the following
4961code segment, ensures that the file will be closed but only if there is
4962an error:
4963
474c8240 4964@smallexample
cc1cb004
AC
4965FILE *file = fopen ("afile", "r");
4966struct cleanup *old = make_cleanup (close_file, file);
4967... blah blah ...
4968discard_cleanups (old);
4969return file;
474c8240 4970@end smallexample
c906108c 4971
c1468174 4972Some functions, e.g., @code{fputs_filtered()} or @code{error()}, specify
c906108c
SS
4973that they ``should not be called when cleanups are not in place''. This
4974means that any actions you need to reverse in the case of an error or
4975interruption must be on the cleanup chain before you call these
4976functions, since they might never return to your code (they
4977@samp{longjmp} instead).
4978
ba8c9337
AC
4979@section Per-architecture module data
4980@cindex per-architecture module data
4981@cindex multi-arch data
4982@cindex data-pointer, per-architecture/per-module
4983
fc989b7a
AC
4984The multi-arch framework includes a mechanism for adding module
4985specific per-architecture data-pointers to the @code{struct gdbarch}
4986architecture object.
4987
4988A module registers one or more per-architecture data-pointers using:
4989
4990@deftypefun struct gdbarch_data *gdbarch_data_register_pre_init (gdbarch_data_pre_init_ftype *@var{pre_init})
4991@var{pre_init} is used to, on-demand, allocate an initial value for a
4992per-architecture data-pointer using the architecture's obstack (passed
4993in as a parameter). Since @var{pre_init} can be called during
4994architecture creation, it is not parameterized with the architecture.
4995and must not call modules that use per-architecture data.
4996@end deftypefun
ba8c9337 4997
fc989b7a
AC
4998@deftypefun struct gdbarch_data *gdbarch_data_register_post_init (gdbarch_data_post_init_ftype *@var{post_init})
4999@var{post_init} is used to obtain an initial value for a
5000per-architecture data-pointer @emph{after}. Since @var{post_init} is
5001always called after architecture creation, it both receives the fully
5002initialized architecture and is free to call modules that use
5003per-architecture data (care needs to be taken to ensure that those
5004other modules do not try to call back to this module as that will
5005create in cycles in the initialization call graph).
5006@end deftypefun
ba8c9337 5007
fc989b7a
AC
5008These functions return a @code{struct gdbarch_data} that is used to
5009identify the per-architecture data-pointer added for that module.
ba8c9337 5010
fc989b7a 5011The per-architecture data-pointer is accessed using the function:
ba8c9337 5012
fc989b7a
AC
5013@deftypefun void *gdbarch_data (struct gdbarch *@var{gdbarch}, struct gdbarch_data *@var{data_handle})
5014Given the architecture @var{arch} and module data handle
5015@var{data_handle} (returned by @code{gdbarch_data_register_pre_init}
5016or @code{gdbarch_data_register_post_init}), this function returns the
5017current value of the per-architecture data-pointer. If the data
5018pointer is @code{NULL}, it is first initialized by calling the
5019corresponding @var{pre_init} or @var{post_init} method.
ba8c9337
AC
5020@end deftypefun
5021
fc989b7a 5022The examples below assume the following definitions:
ba8c9337
AC
5023
5024@smallexample
e7f16015 5025struct nozel @{ int total; @};
ba8c9337 5026static struct gdbarch_data *nozel_handle;
ba8c9337
AC
5027@end smallexample
5028
fc989b7a
AC
5029A module can extend the architecture vector, adding additional
5030per-architecture data, using the @var{pre_init} method. The module's
5031per-architecture data is then initialized during architecture
5032creation.
ba8c9337 5033
fc989b7a
AC
5034In the below, the module's per-architecture @emph{nozel} is added. An
5035architecture can specify its nozel by calling @code{set_gdbarch_nozel}
5036from @code{gdbarch_init}.
ba8c9337
AC
5037
5038@smallexample
fc989b7a
AC
5039static void *
5040nozel_pre_init (struct obstack *obstack)
ba8c9337 5041@{
fc989b7a
AC
5042 struct nozel *data = OBSTACK_ZALLOC (obstack, struct nozel);
5043 return data;
5044@}
ba8c9337
AC
5045@end smallexample
5046
ba8c9337 5047@smallexample
fc989b7a
AC
5048extern void
5049set_gdbarch_nozel (struct gdbarch *gdbarch, int total)
ba8c9337 5050@{
ba8c9337 5051 struct nozel *data = gdbarch_data (gdbarch, nozel_handle);
fc989b7a 5052 data->total = nozel;
ba8c9337
AC
5053@}
5054@end smallexample
5055
fc989b7a
AC
5056A module can on-demand create architecture dependant data structures
5057using @code{post_init}.
ba8c9337 5058
fc989b7a
AC
5059In the below, the nozel's total is computed on-demand by
5060@code{nozel_post_init} using information obtained from the
5061architecture.
ba8c9337
AC
5062
5063@smallexample
fc989b7a
AC
5064static void *
5065nozel_post_init (struct gdbarch *gdbarch)
ba8c9337 5066@{
fc989b7a
AC
5067 struct nozel *data = GDBARCH_OBSTACK_ZALLOC (gdbarch, struct nozel);
5068 nozel->total = gdbarch@dots{} (gdbarch);
5069 return data;
ba8c9337
AC
5070@}
5071@end smallexample
5072
5073@smallexample
fc989b7a
AC
5074extern int
5075nozel_total (struct gdbarch *gdbarch)
ba8c9337 5076@{
fc989b7a
AC
5077 struct nozel *data = gdbarch_data (gdbarch, nozel_handle);
5078 return data->total;
ba8c9337
AC
5079@}
5080@end smallexample
5081
c906108c 5082@section Wrapping Output Lines
56caf160 5083@cindex line wrap in output
c906108c 5084
56caf160 5085@findex wrap_here
c906108c
SS
5086Output that goes through @code{printf_filtered} or @code{fputs_filtered}
5087or @code{fputs_demangled} needs only to have calls to @code{wrap_here}
5088added in places that would be good breaking points. The utility
5089routines will take care of actually wrapping if the line width is
5090exceeded.
5091
5092The argument to @code{wrap_here} is an indentation string which is
5093printed @emph{only} if the line breaks there. This argument is saved
5094away and used later. It must remain valid until the next call to
5095@code{wrap_here} or until a newline has been printed through the
5096@code{*_filtered} functions. Don't pass in a local variable and then
5097return!
5098
56caf160 5099It is usually best to call @code{wrap_here} after printing a comma or
c906108c
SS
5100space. If you call it before printing a space, make sure that your
5101indentation properly accounts for the leading space that will print if
5102the line wraps there.
5103
5104Any function or set of functions that produce filtered output must
5105finish by printing a newline, to flush the wrap buffer, before switching
56caf160 5106to unfiltered (@code{printf}) output. Symbol reading routines that
c906108c
SS
5107print warnings are a good example.
5108
25822942 5109@section @value{GDBN} Coding Standards
56caf160 5110@cindex coding standards
c906108c 5111
25822942 5112@value{GDBN} follows the GNU coding standards, as described in
c906108c 5113@file{etc/standards.texi}. This file is also available for anonymous
af6c57ea
AC
5114FTP from GNU archive sites. @value{GDBN} takes a strict interpretation
5115of the standard; in general, when the GNU standard recommends a practice
5116but does not require it, @value{GDBN} requires it.
c906108c 5117
56caf160
EZ
5118@value{GDBN} follows an additional set of coding standards specific to
5119@value{GDBN}, as described in the following sections.
c906108c 5120
af6c57ea 5121
b9aa90c9 5122@subsection ISO C
af6c57ea 5123
b9aa90c9
AC
5124@value{GDBN} assumes an ISO/IEC 9899:1990 (a.k.a.@: ISO C90) compliant
5125compiler.
af6c57ea 5126
b9aa90c9 5127@value{GDBN} does not assume an ISO C or POSIX compliant C library.
af6c57ea
AC
5128
5129
5130@subsection Memory Management
5131
5132@value{GDBN} does not use the functions @code{malloc}, @code{realloc},
5133@code{calloc}, @code{free} and @code{asprintf}.
5134
5135@value{GDBN} uses the functions @code{xmalloc}, @code{xrealloc} and
5136@code{xcalloc} when allocating memory. Unlike @code{malloc} et.al.@:
5137these functions do not return when the memory pool is empty. Instead,
5138they unwind the stack using cleanups. These functions return
5139@code{NULL} when requested to allocate a chunk of memory of size zero.
5140
5141@emph{Pragmatics: By using these functions, the need to check every
5142memory allocation is removed. These functions provide portable
5143behavior.}
5144
5145@value{GDBN} does not use the function @code{free}.
5146
5147@value{GDBN} uses the function @code{xfree} to return memory to the
5148memory pool. Consistent with ISO-C, this function ignores a request to
5149free a @code{NULL} pointer.
5150
5151@emph{Pragmatics: On some systems @code{free} fails when passed a
5152@code{NULL} pointer.}
5153
5154@value{GDBN} can use the non-portable function @code{alloca} for the
5155allocation of small temporary values (such as strings).
5156
5157@emph{Pragmatics: This function is very non-portable. Some systems
5158restrict the memory being allocated to no more than a few kilobytes.}
5159
5160@value{GDBN} uses the string function @code{xstrdup} and the print
b435e160 5161function @code{xstrprintf}.
af6c57ea
AC
5162
5163@emph{Pragmatics: @code{asprintf} and @code{strdup} can fail. Print
5164functions such as @code{sprintf} are very prone to buffer overflow
5165errors.}
5166
5167
5168@subsection Compiler Warnings
56caf160 5169@cindex compiler warnings
af6c57ea
AC
5170
5171With few exceptions, developers should include the configuration option
5172@samp{--enable-gdb-build-warnings=,-Werror} when building @value{GDBN}.
5173The exceptions are listed in the file @file{gdb/MAINTAINERS}.
5174
5175This option causes @value{GDBN} (when built using GCC) to be compiled
5176with a carefully selected list of compiler warning flags. Any warnings
5177from those flags being treated as errors.
5178
5179The current list of warning flags includes:
5180
5181@table @samp
5182@item -Wimplicit
5183Since @value{GDBN} coding standard requires all functions to be declared
5184using a prototype, the flag has the side effect of ensuring that
5185prototyped functions are always visible with out resorting to
5186@samp{-Wstrict-prototypes}.
5187
5188@item -Wreturn-type
5189Such code often appears to work except on instruction set architectures
5190that use register windows.
5191
5192@item -Wcomment
5193
5194@item -Wtrigraphs
5195
5196@item -Wformat
153721e6 5197@itemx -Wformat-nonliteral
af6c57ea 5198Since @value{GDBN} uses the @code{format printf} attribute on all
153721e6 5199@code{printf} like functions these check not just @code{printf} calls
af6c57ea
AC
5200but also calls to functions such as @code{fprintf_unfiltered}.
5201
5202@item -Wparentheses
5203This warning includes uses of the assignment operator within an
5204@code{if} statement.
5205
5206@item -Wpointer-arith
5207
5208@item -Wuninitialized
0f0cffd2
AC
5209
5210@item -Wunused-label
5211This warning has the additional benefit of detecting the absence of the
5212@code{case} reserved word in a switch statement:
5213@smallexample
5214enum @{ FD_SCHEDULED, NOTHING_SCHEDULED @} sched;
5215@dots{}
5216switch (sched)
5217 @{
5218 case FD_SCHEDULED:
5219 @dots{};
5220 break;
5221 NOTHING_SCHEDULED:
5222 @dots{};
5223 break;
5224 @}
5225@end smallexample
c9830293
AC
5226
5227@item -Wunused-function
7be93b9e
JB
5228
5229@item -Wno-pointer-sign
5230In version 4.0, GCC began warning about pointer argument passing or
5231assignment even when the source and destination differed only in
5232signedness. However, most @value{GDBN} code doesn't distinguish
5233carefully between @code{char} and @code{unsigned char}. In early 2006
5234the @value{GDBN} developers decided correcting these warnings wasn't
5235worth the time it would take.
5236
af6c57ea
AC
5237@end table
5238
5239@emph{Pragmatics: Due to the way that @value{GDBN} is implemented most
5240functions have unused parameters. Consequently the warning
5241@samp{-Wunused-parameter} is precluded from the list. The macro
5242@code{ATTRIBUTE_UNUSED} is not used as it leads to false negatives ---
5243it is not an error to have @code{ATTRIBUTE_UNUSED} on a parameter that
5244is being used. The options @samp{-Wall} and @samp{-Wunused} are also
5245precluded because they both include @samp{-Wunused-parameter}.}
5246
5247@emph{Pragmatics: @value{GDBN} has not simply accepted the warnings
5248enabled by @samp{-Wall -Werror -W...}. Instead it is selecting warnings
5249when and where their benefits can be demonstrated.}
c906108c
SS
5250
5251@subsection Formatting
5252
56caf160 5253@cindex source code formatting
c906108c
SS
5254The standard GNU recommendations for formatting must be followed
5255strictly.
5256
af6c57ea
AC
5257A function declaration should not have its name in column zero. A
5258function definition should have its name in column zero.
5259
474c8240 5260@smallexample
af6c57ea
AC
5261/* Declaration */
5262static void foo (void);
5263/* Definition */
5264void
5265foo (void)
5266@{
5267@}
474c8240 5268@end smallexample
af6c57ea
AC
5269
5270@emph{Pragmatics: This simplifies scripting. Function definitions can
5271be found using @samp{^function-name}.}
c906108c 5272
af6c57ea
AC
5273There must be a space between a function or macro name and the opening
5274parenthesis of its argument list (except for macro definitions, as
5275required by C). There must not be a space after an open paren/bracket
5276or before a close paren/bracket.
c906108c
SS
5277
5278While additional whitespace is generally helpful for reading, do not use
5279more than one blank line to separate blocks, and avoid adding whitespace
af6c57ea
AC
5280after the end of a program line (as of 1/99, some 600 lines had
5281whitespace after the semicolon). Excess whitespace causes difficulties
5282for @code{diff} and @code{patch} utilities.
5283
5284Pointers are declared using the traditional K&R C style:
5285
474c8240 5286@smallexample
af6c57ea 5287void *foo;
474c8240 5288@end smallexample
af6c57ea
AC
5289
5290@noindent
5291and not:
5292
474c8240 5293@smallexample
af6c57ea
AC
5294void * foo;
5295void* foo;
474c8240 5296@end smallexample
c906108c
SS
5297
5298@subsection Comments
5299
56caf160 5300@cindex comment formatting
c906108c
SS
5301The standard GNU requirements on comments must be followed strictly.
5302
af6c57ea
AC
5303Block comments must appear in the following form, with no @code{/*}- or
5304@code{*/}-only lines, and no leading @code{*}:
c906108c 5305
474c8240 5306@smallexample
c906108c
SS
5307/* Wait for control to return from inferior to debugger. If inferior
5308 gets a signal, we may decide to start it up again instead of
5309 returning. That is why there is a loop in this function. When
5310 this function actually returns it means the inferior should be left
25822942 5311 stopped and @value{GDBN} should read more commands. */
474c8240 5312@end smallexample
c906108c
SS
5313
5314(Note that this format is encouraged by Emacs; tabbing for a multi-line
56caf160 5315comment works correctly, and @kbd{M-q} fills the block consistently.)
c906108c
SS
5316
5317Put a blank line between the block comments preceding function or
5318variable definitions, and the definition itself.
5319
5320In general, put function-body comments on lines by themselves, rather
5321than trying to fit them into the 20 characters left at the end of a
5322line, since either the comment or the code will inevitably get longer
5323than will fit, and then somebody will have to move it anyhow.
5324
5325@subsection C Usage
5326
56caf160 5327@cindex C data types
c906108c
SS
5328Code must not depend on the sizes of C data types, the format of the
5329host's floating point numbers, the alignment of anything, or the order
5330of evaluation of expressions.
5331
56caf160 5332@cindex function usage
c906108c 5333Use functions freely. There are only a handful of compute-bound areas
56caf160
EZ
5334in @value{GDBN} that might be affected by the overhead of a function
5335call, mainly in symbol reading. Most of @value{GDBN}'s performance is
5336limited by the target interface (whether serial line or system call).
c906108c
SS
5337
5338However, use functions with moderation. A thousand one-line functions
5339are just as hard to understand as a single thousand-line function.
5340
af6c57ea 5341@emph{Macros are bad, M'kay.}
9e678452
CF
5342(But if you have to use a macro, make sure that the macro arguments are
5343protected with parentheses.)
af6c57ea
AC
5344
5345@cindex types
c906108c 5346
af6c57ea
AC
5347Declarations like @samp{struct foo *} should be used in preference to
5348declarations like @samp{typedef struct foo @{ @dots{} @} *foo_ptr}.
5349
5350
5351@subsection Function Prototypes
56caf160 5352@cindex function prototypes
af6c57ea
AC
5353
5354Prototypes must be used when both @emph{declaring} and @emph{defining}
5355a function. Prototypes for @value{GDBN} functions must include both the
5356argument type and name, with the name matching that used in the actual
5357function definition.
c906108c 5358
53a5351d
JM
5359All external functions should have a declaration in a header file that
5360callers include, except for @code{_initialize_*} functions, which must
5361be external so that @file{init.c} construction works, but shouldn't be
5362visible to random source files.
c906108c 5363
af6c57ea
AC
5364Where a source file needs a forward declaration of a static function,
5365that declaration must appear in a block near the top of the source file.
5366
5367
5368@subsection Internal Error Recovery
5369
5370During its execution, @value{GDBN} can encounter two types of errors.
5371User errors and internal errors. User errors include not only a user
5372entering an incorrect command but also problems arising from corrupt
5373object files and system errors when interacting with the target.
937f164b
FF
5374Internal errors include situations where @value{GDBN} has detected, at
5375run time, a corrupt or erroneous situation.
af6c57ea
AC
5376
5377When reporting an internal error, @value{GDBN} uses
5378@code{internal_error} and @code{gdb_assert}.
5379
5380@value{GDBN} must not call @code{abort} or @code{assert}.
5381
5382@emph{Pragmatics: There is no @code{internal_warning} function. Either
5383the code detected a user error, recovered from it and issued a
5384@code{warning} or the code failed to correctly recover from the user
5385error and issued an @code{internal_error}.}
5386
5387@subsection File Names
5388
5389Any file used when building the core of @value{GDBN} must be in lower
5390case. Any file used when building the core of @value{GDBN} must be 8.3
5391unique. These requirements apply to both source and generated files.
5392
5393@emph{Pragmatics: The core of @value{GDBN} must be buildable on many
5394platforms including DJGPP and MacOS/HFS. Every time an unfriendly file
5395is introduced to the build process both @file{Makefile.in} and
5396@file{configure.in} need to be modified accordingly. Compare the
5397convoluted conversion process needed to transform @file{COPYING} into
5398@file{copying.c} with the conversion needed to transform
5399@file{version.in} into @file{version.c}.}
5400
5401Any file non 8.3 compliant file (that is not used when building the core
5402of @value{GDBN}) must be added to @file{gdb/config/djgpp/fnchange.lst}.
5403
5404@emph{Pragmatics: This is clearly a compromise.}
5405
5406When @value{GDBN} has a local version of a system header file (ex
5407@file{string.h}) the file name based on the POSIX header prefixed with
b4177fca
DJ
5408@file{gdb_} (@file{gdb_string.h}). These headers should be relatively
5409independent: they should use only macros defined by @file{configure},
5410the compiler, or the host; they should include only system headers; they
5411should refer only to system types. They may be shared between multiple
5412programs, e.g.@: @value{GDBN} and @sc{gdbserver}.
af6c57ea
AC
5413
5414For other files @samp{-} is used as the separator.
5415
5416
5417@subsection Include Files
5418
e2b28d04 5419A @file{.c} file should include @file{defs.h} first.
af6c57ea 5420
e2b28d04
AC
5421A @file{.c} file should directly include the @code{.h} file of every
5422declaration and/or definition it directly refers to. It cannot rely on
5423indirect inclusion.
af6c57ea 5424
e2b28d04
AC
5425A @file{.h} file should directly include the @code{.h} file of every
5426declaration and/or definition it directly refers to. It cannot rely on
5427indirect inclusion. Exception: The file @file{defs.h} does not need to
5428be directly included.
af6c57ea 5429
e2b28d04 5430An external declaration should only appear in one include file.
af6c57ea 5431
e2b28d04
AC
5432An external declaration should never appear in a @code{.c} file.
5433Exception: a declaration for the @code{_initialize} function that
5434pacifies @option{-Wmissing-declaration}.
5435
5436A @code{typedef} definition should only appear in one include file.
5437
5438An opaque @code{struct} declaration can appear in multiple @file{.h}
5439files. Where possible, a @file{.h} file should use an opaque
5440@code{struct} declaration instead of an include.
5441
5442All @file{.h} files should be wrapped in:
af6c57ea 5443
474c8240 5444@smallexample
af6c57ea
AC
5445#ifndef INCLUDE_FILE_NAME_H
5446#define INCLUDE_FILE_NAME_H
5447header body
5448#endif
474c8240 5449@end smallexample
af6c57ea 5450
c906108c 5451
dab11f21 5452@subsection Clean Design and Portable Implementation
c906108c 5453
56caf160 5454@cindex design
c906108c 5455In addition to getting the syntax right, there's the little question of
25822942 5456semantics. Some things are done in certain ways in @value{GDBN} because long
c906108c
SS
5457experience has shown that the more obvious ways caused various kinds of
5458trouble.
5459
56caf160 5460@cindex assumptions about targets
c906108c
SS
5461You can't assume the byte order of anything that comes from a target
5462(including @var{value}s, object files, and instructions). Such things
56caf160
EZ
5463must be byte-swapped using @code{SWAP_TARGET_AND_HOST} in
5464@value{GDBN}, or one of the swap routines defined in @file{bfd.h},
5465such as @code{bfd_get_32}.
c906108c
SS
5466
5467You can't assume that you know what interface is being used to talk to
5468the target system. All references to the target must go through the
5469current @code{target_ops} vector.
5470
5471You can't assume that the host and target machines are the same machine
5472(except in the ``native'' support modules). In particular, you can't
5473assume that the target machine's header files will be available on the
5474host machine. Target code must bring along its own header files --
5475written from scratch or explicitly donated by their owner, to avoid
5476copyright problems.
5477
56caf160 5478@cindex portability
c906108c
SS
5479Insertion of new @code{#ifdef}'s will be frowned upon. It's much better
5480to write the code portably than to conditionalize it for various
5481systems.
5482
56caf160 5483@cindex system dependencies
c906108c
SS
5484New @code{#ifdef}'s which test for specific compilers or manufacturers
5485or operating systems are unacceptable. All @code{#ifdef}'s should test
5486for features. The information about which configurations contain which
5487features should be segregated into the configuration files. Experience
5488has proven far too often that a feature unique to one particular system
5489often creeps into other systems; and that a conditional based on some
5490predefined macro for your current system will become worthless over
5491time, as new versions of your system come out that behave differently
5492with regard to this feature.
5493
5494Adding code that handles specific architectures, operating systems,
af6c57ea 5495target interfaces, or hosts, is not acceptable in generic code.
c906108c 5496
dab11f21
EZ
5497@cindex portable file name handling
5498@cindex file names, portability
5499One particularly notorious area where system dependencies tend to
5500creep in is handling of file names. The mainline @value{GDBN} code
5501assumes Posix semantics of file names: absolute file names begin with
5502a forward slash @file{/}, slashes are used to separate leading
5503directories, case-sensitive file names. These assumptions are not
5504necessarily true on non-Posix systems such as MS-Windows. To avoid
5505system-dependent code where you need to take apart or construct a file
5506name, use the following portable macros:
5507
5508@table @code
5509@findex HAVE_DOS_BASED_FILE_SYSTEM
5510@item HAVE_DOS_BASED_FILE_SYSTEM
5511This preprocessing symbol is defined to a non-zero value on hosts
5512whose filesystems belong to the MS-DOS/MS-Windows family. Use this
5513symbol to write conditional code which should only be compiled for
5514such hosts.
5515
5516@findex IS_DIR_SEPARATOR
4be31470 5517@item IS_DIR_SEPARATOR (@var{c})
dab11f21
EZ
5518Evaluates to a non-zero value if @var{c} is a directory separator
5519character. On Unix and GNU/Linux systems, only a slash @file{/} is
5520such a character, but on Windows, both @file{/} and @file{\} will
5521pass.
5522
5523@findex IS_ABSOLUTE_PATH
5524@item IS_ABSOLUTE_PATH (@var{file})
5525Evaluates to a non-zero value if @var{file} is an absolute file name.
5526For Unix and GNU/Linux hosts, a name which begins with a slash
5527@file{/} is absolute. On DOS and Windows, @file{d:/foo} and
5528@file{x:\bar} are also absolute file names.
5529
5530@findex FILENAME_CMP
5531@item FILENAME_CMP (@var{f1}, @var{f2})
5532Calls a function which compares file names @var{f1} and @var{f2} as
5533appropriate for the underlying host filesystem. For Posix systems,
5534this simply calls @code{strcmp}; on case-insensitive filesystems it
5535will call @code{strcasecmp} instead.
5536
5537@findex DIRNAME_SEPARATOR
5538@item DIRNAME_SEPARATOR
5539Evaluates to a character which separates directories in
5540@code{PATH}-style lists, typically held in environment variables.
5541This character is @samp{:} on Unix, @samp{;} on DOS and Windows.
5542
5543@findex SLASH_STRING
5544@item SLASH_STRING
5545This evaluates to a constant string you should use to produce an
5546absolute filename from leading directories and the file's basename.
5547@code{SLASH_STRING} is @code{"/"} on most systems, but might be
5548@code{"\\"} for some Windows-based ports.
5549@end table
5550
5551In addition to using these macros, be sure to use portable library
5552functions whenever possible. For example, to extract a directory or a
5553basename part from a file name, use the @code{dirname} and
5554@code{basename} library functions (available in @code{libiberty} for
5555platforms which don't provide them), instead of searching for a slash
5556with @code{strrchr}.
5557
25822942
DB
5558Another way to generalize @value{GDBN} along a particular interface is with an
5559attribute struct. For example, @value{GDBN} has been generalized to handle
56caf160
EZ
5560multiple kinds of remote interfaces---not by @code{#ifdef}s everywhere, but
5561by defining the @code{target_ops} structure and having a current target (as
c906108c
SS
5562well as a stack of targets below it, for memory references). Whenever
5563something needs to be done that depends on which remote interface we are
56caf160
EZ
5564using, a flag in the current target_ops structure is tested (e.g.,
5565@code{target_has_stack}), or a function is called through a pointer in the
c906108c 5566current target_ops structure. In this way, when a new remote interface
56caf160 5567is added, only one module needs to be touched---the one that actually
c906108c
SS
5568implements the new remote interface. Other examples of
5569attribute-structs are BFD access to multiple kinds of object file
25822942 5570formats, or @value{GDBN}'s access to multiple source languages.
c906108c 5571
56caf160
EZ
5572Please avoid duplicating code. For example, in @value{GDBN} 3.x all
5573the code interfacing between @code{ptrace} and the rest of
5574@value{GDBN} was duplicated in @file{*-dep.c}, and so changing
5575something was very painful. In @value{GDBN} 4.x, these have all been
5576consolidated into @file{infptrace.c}. @file{infptrace.c} can deal
5577with variations between systems the same way any system-independent
5578file would (hooks, @code{#if defined}, etc.), and machines which are
5579radically different don't need to use @file{infptrace.c} at all.
c906108c 5580
af6c57ea
AC
5581All debugging code must be controllable using the @samp{set debug
5582@var{module}} command. Do not use @code{printf} to print trace
5583messages. Use @code{fprintf_unfiltered(gdb_stdlog, ...}. Do not use
5584@code{#ifdef DEBUG}.
5585
c906108c 5586
8487521e 5587@node Porting GDB
c906108c 5588
25822942 5589@chapter Porting @value{GDBN}
56caf160 5590@cindex porting to new machines
c906108c 5591
56caf160
EZ
5592Most of the work in making @value{GDBN} compile on a new machine is in
5593specifying the configuration of the machine. This is done in a
5594dizzying variety of header files and configuration scripts, which we
5595hope to make more sensible soon. Let's say your new host is called an
5596@var{xyz} (e.g., @samp{sun4}), and its full three-part configuration
5597name is @code{@var{arch}-@var{xvend}-@var{xos}} (e.g.,
5598@samp{sparc-sun-sunos4}). In particular:
c906108c 5599
56caf160
EZ
5600@itemize @bullet
5601@item
c906108c
SS
5602In the top level directory, edit @file{config.sub} and add @var{arch},
5603@var{xvend}, and @var{xos} to the lists of supported architectures,
5604vendors, and operating systems near the bottom of the file. Also, add
5605@var{xyz} as an alias that maps to
5606@code{@var{arch}-@var{xvend}-@var{xos}}. You can test your changes by
5607running
5608
474c8240 5609@smallexample
c906108c 5610./config.sub @var{xyz}
474c8240 5611@end smallexample
56caf160 5612
c906108c
SS
5613@noindent
5614and
56caf160 5615
474c8240 5616@smallexample
c906108c 5617./config.sub @code{@var{arch}-@var{xvend}-@var{xos}}
474c8240 5618@end smallexample
56caf160 5619
c906108c
SS
5620@noindent
5621which should both respond with @code{@var{arch}-@var{xvend}-@var{xos}}
5622and no error messages.
5623
56caf160 5624@noindent
c906108c
SS
5625You need to port BFD, if that hasn't been done already. Porting BFD is
5626beyond the scope of this manual.
5627
56caf160 5628@item
25822942 5629To configure @value{GDBN} itself, edit @file{gdb/configure.host} to recognize
c906108c
SS
5630your system and set @code{gdb_host} to @var{xyz}, and (unless your
5631desired target is already available) also edit @file{gdb/configure.tgt},
5632setting @code{gdb_target} to something appropriate (for instance,
5633@var{xyz}).
5634
7fd60527
AC
5635@emph{Maintainer's note: Work in progress. The file
5636@file{gdb/configure.host} originally needed to be modified when either a
5637new native target or a new host machine was being added to @value{GDBN}.
5638Recent changes have removed this requirement. The file now only needs
5639to be modified when adding a new native configuration. This will likely
5640changed again in the future.}
5641
56caf160 5642@item
25822942 5643Finally, you'll need to specify and define @value{GDBN}'s host-, native-, and
c906108c
SS
5644target-dependent @file{.h} and @file{.c} files used for your
5645configuration.
56caf160 5646@end itemize
c906108c 5647
d52fe014
AC
5648@node Versions and Branches
5649@chapter Versions and Branches
8973da3a 5650
d52fe014 5651@section Versions
8973da3a 5652
d52fe014
AC
5653@value{GDBN}'s version is determined by the file
5654@file{gdb/version.in} and takes one of the following forms:
fb0ff88f 5655
d52fe014
AC
5656@table @asis
5657@item @var{major}.@var{minor}
5658@itemx @var{major}.@var{minor}.@var{patchlevel}
53531fc1
AC
5659an official release (e.g., 6.2 or 6.2.1)
5660@item @var{major}.@var{minor}.@var{patchlevel}.@var{YYYY}@var{MM}@var{DD}
5661a snapshot taken at @var{YYYY}-@var{MM}-@var{DD}-gmt (e.g.,
56626.1.50.20020302, 6.1.90.20020304, or 6.1.0.20020308)
5663@item @var{major}.@var{minor}.@var{patchlevel}.@var{YYYY}@var{MM}@var{DD}-cvs
5664a @sc{cvs} check out drawn on @var{YYYY}-@var{MM}-@var{DD} (e.g.,
56656.1.50.20020302-cvs, 6.1.90.20020304-cvs, or 6.1.0.20020308-cvs)
5666@item @var{major}.@var{minor}.@var{patchlevel}.@var{YYYY}@var{MM}@var{DD} (@var{vendor})
d52fe014 5667a vendor specific release of @value{GDBN}, that while based on@*
53531fc1
AC
5668@var{major}.@var{minor}.@var{patchlevel}.@var{YYYY}@var{MM}@var{DD},
5669may include additional changes
d52fe014 5670@end table
fb0ff88f 5671
d52fe014
AC
5672@value{GDBN}'s mainline uses the @var{major} and @var{minor} version
5673numbers from the most recent release branch, with a @var{patchlevel}
53531fc1
AC
5674of 50. At the time each new release branch is created, the mainline's
5675@var{major} and @var{minor} version numbers are updated.
fb0ff88f 5676
53531fc1
AC
5677@value{GDBN}'s release branch is similar. When the branch is cut, the
5678@var{patchlevel} is changed from 50 to 90. As draft releases are
5679drawn from the branch, the @var{patchlevel} is incremented. Once the
5680first release (@var{major}.@var{minor}) has been made, the
5681@var{patchlevel} is set to 0 and updates have an incremented
5682@var{patchlevel}.
5683
5684For snapshots, and @sc{cvs} check outs, it is also possible to
5685identify the @sc{cvs} origin:
5686
5687@table @asis
5688@item @var{major}.@var{minor}.50.@var{YYYY}@var{MM}@var{DD}
5689drawn from the @sc{head} of mainline @sc{cvs} (e.g., 6.1.50.20020302)
5690@item @var{major}.@var{minor}.90.@var{YYYY}@var{MM}@var{DD}
5691@itemx @var{major}.@var{minor}.91.@var{YYYY}@var{MM}@var{DD} @dots{}
5692drawn from a release branch prior to the release (e.g.,
56936.1.90.20020304)
5694@item @var{major}.@var{minor}.0.@var{YYYY}@var{MM}@var{DD}
5695@itemx @var{major}.@var{minor}.1.@var{YYYY}@var{MM}@var{DD} @dots{}
5696drawn from a release branch after the release (e.g., 6.2.0.20020308)
5697@end table
fb0ff88f 5698
d52fe014
AC
5699If the previous @value{GDBN} version is 6.1 and the current version is
57006.2, then, substituting 6 for @var{major} and 1 or 2 for @var{minor},
5701here's an illustration of a typical sequence:
fb0ff88f 5702
d52fe014
AC
5703@smallexample
5704 <HEAD>
5705 |
53531fc1 57066.1.50.20020302-cvs
d52fe014 5707 |
53531fc1 5708 +--------------------------.
d52fe014 5709 | <gdb_6_2-branch>
d52fe014 5710 | |
53531fc1
AC
57116.2.50.20020303-cvs 6.1.90 (draft #1)
5712 | |
57136.2.50.20020304-cvs 6.1.90.20020304-cvs
5714 | |
57156.2.50.20020305-cvs 6.1.91 (draft #2)
d52fe014 5716 | |
53531fc1
AC
57176.2.50.20020306-cvs 6.1.91.20020306-cvs
5718 | |
57196.2.50.20020307-cvs 6.2 (release)
5720 | |
57216.2.50.20020308-cvs 6.2.0.20020308-cvs
5722 | |
57236.2.50.20020309-cvs 6.2.1 (update)
5724 | |
57256.2.50.20020310-cvs <branch closed>
d52fe014 5726 |
53531fc1 57276.2.50.20020311-cvs
d52fe014 5728 |
53531fc1 5729 +--------------------------.
d52fe014 5730 | <gdb_6_3-branch>
53531fc1
AC
5731 | |
57326.3.50.20020312-cvs 6.2.90 (draft #1)
5733 | |
d52fe014 5734@end smallexample
fb0ff88f 5735
d52fe014
AC
5736@section Release Branches
5737@cindex Release Branches
fb0ff88f 5738
d52fe014
AC
5739@value{GDBN} draws a release series (6.2, 6.2.1, @dots{}) from a
5740single release branch, and identifies that branch using the @sc{cvs}
5741branch tags:
fb0ff88f 5742
d52fe014
AC
5743@smallexample
5744gdb_@var{major}_@var{minor}-@var{YYYY}@var{MM}@var{DD}-branchpoint
5745gdb_@var{major}_@var{minor}-branch
5746gdb_@var{major}_@var{minor}-@var{YYYY}@var{MM}@var{DD}-release
5747@end smallexample
5748
5749@emph{Pragmatics: To help identify the date at which a branch or
5750release is made, both the branchpoint and release tags include the
5751date that they are cut (@var{YYYY}@var{MM}@var{DD}) in the tag. The
5752branch tag, denoting the head of the branch, does not need this.}
5753
5754@section Vendor Branches
5755@cindex vendor branches
fb0ff88f
AC
5756
5757To avoid version conflicts, vendors are expected to modify the file
5758@file{gdb/version.in} to include a vendor unique alphabetic identifier
5759(an official @value{GDBN} release never uses alphabetic characters in
d52fe014
AC
5760its version identifer). E.g., @samp{6.2widgit2}, or @samp{6.2 (Widgit
5761Inc Patch 2)}.
5762
5763@section Experimental Branches
5764@cindex experimental branches
5765
5766@subsection Guidelines
5767
5768@value{GDBN} permits the creation of branches, cut from the @sc{cvs}
5769repository, for experimental development. Branches make it possible
5770for developers to share preliminary work, and maintainers to examine
5771significant new developments.
fb0ff88f 5772
d52fe014 5773The following are a set of guidelines for creating such branches:
fb0ff88f 5774
d52fe014
AC
5775@table @emph
5776
5777@item a branch has an owner
5778The owner can set further policy for a branch, but may not change the
5779ground rules. In particular, they can set a policy for commits (be it
5780adding more reviewers or deciding who can commit).
5781
5782@item all commits are posted
5783All changes committed to a branch shall also be posted to
5784@email{gdb-patches@@sources.redhat.com, the @value{GDBN} patches
5785mailing list}. While commentary on such changes are encouraged, people
5786should remember that the changes only apply to a branch.
5787
5788@item all commits are covered by an assignment
5789This ensures that all changes belong to the Free Software Foundation,
5790and avoids the possibility that the branch may become contaminated.
5791
5792@item a branch is focused
5793A focused branch has a single objective or goal, and does not contain
5794unnecessary or irrelevant changes. Cleanups, where identified, being
5795be pushed into the mainline as soon as possible.
5796
5797@item a branch tracks mainline
5798This keeps the level of divergence under control. It also keeps the
5799pressure on developers to push cleanups and other stuff into the
5800mainline.
5801
5802@item a branch shall contain the entire @value{GDBN} module
5803The @value{GDBN} module @code{gdb} should be specified when creating a
5804branch (branches of individual files should be avoided). @xref{Tags}.
5805
5806@item a branch shall be branded using @file{version.in}
5807The file @file{gdb/version.in} shall be modified so that it identifies
5808the branch @var{owner} and branch @var{name}, e.g.,
53531fc1 5809@samp{6.2.50.20030303_owner_name} or @samp{6.2 (Owner Name)}.
d52fe014
AC
5810
5811@end table
fb0ff88f 5812
d52fe014
AC
5813@subsection Tags
5814@anchor{Tags}
fb0ff88f 5815
d52fe014
AC
5816To simplify the identification of @value{GDBN} branches, the following
5817branch tagging convention is strongly recommended:
fb0ff88f 5818
d52fe014 5819@table @code
fb0ff88f 5820
d52fe014
AC
5821@item @var{owner}_@var{name}-@var{YYYYMMDD}-branchpoint
5822@itemx @var{owner}_@var{name}-@var{YYYYMMDD}-branch
5823The branch point and corresponding branch tag. @var{YYYYMMDD} is the
5824date that the branch was created. A branch is created using the
5825sequence: @anchor{experimental branch tags}
474c8240 5826@smallexample
d52fe014
AC
5827cvs rtag @var{owner}_@var{name}-@var{YYYYMMDD}-branchpoint gdb
5828cvs rtag -b -r @var{owner}_@var{name}-@var{YYYYMMDD}-branchpoint \
5829 @var{owner}_@var{name}-@var{YYYYMMDD}-branch gdb
474c8240 5830@end smallexample
fb0ff88f 5831
d52fe014
AC
5832@item @var{owner}_@var{name}-@var{yyyymmdd}-mergepoint
5833The tagged point, on the mainline, that was used when merging the branch
5834on @var{yyyymmdd}. To merge in all changes since the branch was cut,
5835use a command sequence like:
474c8240 5836@smallexample
d52fe014
AC
5837cvs rtag @var{owner}_@var{name}-@var{yyyymmdd}-mergepoint gdb
5838cvs update \
5839 -j@var{owner}_@var{name}-@var{YYYYMMDD}-branchpoint
5840 -j@var{owner}_@var{name}-@var{yyyymmdd}-mergepoint
474c8240 5841@end smallexample
d52fe014
AC
5842@noindent
5843Similar sequences can be used to just merge in changes since the last
5844merge.
5845
5846@end table
fb0ff88f 5847
d52fe014
AC
5848@noindent
5849For further information on @sc{cvs}, see
5850@uref{http://www.gnu.org/software/cvs/, Concurrent Versions System}.
5851
55f6ca0f
JB
5852@node Start of New Year Procedure
5853@chapter Start of New Year Procedure
5854@cindex new year procedure
5855
5856At the start of each new year, the following actions should be performed:
5857
5858@itemize @bullet
5859@item
5860Rotate the ChangeLog file
5861
5862The current @file{ChangeLog} file should be renamed into
5863@file{ChangeLog-YYYY} where YYYY is the year that has just passed.
5864A new @file{ChangeLog} file should be created, and its contents should
5865contain a reference to the previous ChangeLog. The following should
5866also be preserved at the end of the new ChangeLog, in order to provide
5867the appropriate settings when editing this file with Emacs:
5868@smallexample
5869Local Variables:
5870mode: change-log
5871left-margin: 8
5872fill-column: 74
5873version-control: never
5874End:
5875@end smallexample
5876
5877@item
5878Update the copyright year in the startup message
5879
5880Update the copyright year in file @file{top.c}, function
5881@code{print_gdb_version}.
5882@end itemize
5883
d52fe014 5884@node Releasing GDB
fb0ff88f 5885
d52fe014
AC
5886@chapter Releasing @value{GDBN}
5887@cindex making a new release of gdb
fb0ff88f 5888
9bb0a4d8
AC
5889@section Branch Commit Policy
5890
5891The branch commit policy is pretty slack. @value{GDBN} releases 5.0,
58925.1 and 5.2 all used the below:
5893
5894@itemize @bullet
5895@item
5896The @file{gdb/MAINTAINERS} file still holds.
5897@item
5898Don't fix something on the branch unless/until it is also fixed in the
5899trunk. If this isn't possible, mentioning it in the @file{gdb/PROBLEMS}
4be31470 5900file is better than committing a hack.
9bb0a4d8
AC
5901@item
5902When considering a patch for the branch, suggested criteria include:
5903Does it fix a build? Does it fix the sequence @kbd{break main; run}
5904when debugging a static binary?
5905@item
5906The further a change is from the core of @value{GDBN}, the less likely
5907the change will worry anyone (e.g., target specific code).
5908@item
5909Only post a proposal to change the core of @value{GDBN} after you've
5910sent individual bribes to all the people listed in the
5911@file{MAINTAINERS} file @t{;-)}
5912@end itemize
5913
5914@emph{Pragmatics: Provided updates are restricted to non-core
5915functionality there is little chance that a broken change will be fatal.
5916This means that changes such as adding a new architectures or (within
5917reason) support for a new host are considered acceptable.}
5918
5919
cbb09e6a 5920@section Obsoleting code
8973da3a 5921
8642bc8f 5922Before anything else, poke the other developers (and around the source
4be31470
EZ
5923code) to see if there is anything that can be removed from @value{GDBN}
5924(an old target, an unused file).
8973da3a 5925
8642bc8f 5926Obsolete code is identified by adding an @code{OBSOLETE} prefix to every
cbb09e6a
AC
5927line. Doing this means that it is easy to identify something that has
5928been obsoleted when greping through the sources.
8973da3a 5929
cbb09e6a
AC
5930The process is done in stages --- this is mainly to ensure that the
5931wider @value{GDBN} community has a reasonable opportunity to respond.
5932Remember, everything on the Internet takes a week.
8973da3a 5933
cbb09e6a 5934@enumerate
8973da3a 5935@item
cbb09e6a
AC
5936Post the proposal on @email{gdb@@sources.redhat.com, the GDB mailing
5937list} Creating a bug report to track the task's state, is also highly
5938recommended.
8973da3a 5939@item
cbb09e6a 5940Wait a week or so.
8973da3a 5941@item
cbb09e6a
AC
5942Post the proposal on @email{gdb-announce@@sources.redhat.com, the GDB
5943Announcement mailing list}.
8973da3a 5944@item
cbb09e6a 5945Wait a week or so.
8973da3a 5946@item
cbb09e6a
AC
5947Go through and edit all relevant files and lines so that they are
5948prefixed with the word @code{OBSOLETE}.
5949@item
5950Wait until the next GDB version, containing this obsolete code, has been
5951released.
5952@item
5953Remove the obsolete code.
5954@end enumerate
5955
5956@noindent
5957@emph{Maintainer note: While removing old code is regrettable it is
5958hopefully better for @value{GDBN}'s long term development. Firstly it
5959helps the developers by removing code that is either no longer relevant
5960or simply wrong. Secondly since it removes any history associated with
5961the file (effectively clearing the slate) the developer has a much freer
5962hand when it comes to fixing broken files.}
8973da3a 5963
8973da3a 5964
9ae8b82c
AC
5965
5966@section Before the Branch
8973da3a 5967
8642bc8f
AC
5968The most important objective at this stage is to find and fix simple
5969changes that become a pain to track once the branch is created. For
5970instance, configuration problems that stop @value{GDBN} from even
5971building. If you can't get the problem fixed, document it in the
5972@file{gdb/PROBLEMS} file.
8973da3a 5973
9ae8b82c 5974@subheading Prompt for @file{gdb/NEWS}
8973da3a 5975
9ae8b82c
AC
5976People always forget. Send a post reminding them but also if you know
5977something interesting happened add it yourself. The @code{schedule}
5978script will mention this in its e-mail.
8973da3a 5979
9ae8b82c 5980@subheading Review @file{gdb/README}
8973da3a 5981
9ae8b82c
AC
5982Grab one of the nightly snapshots and then walk through the
5983@file{gdb/README} looking for anything that can be improved. The
5984@code{schedule} script will mention this in its e-mail.
8642bc8f
AC
5985
5986@subheading Refresh any imported files.
8973da3a 5987
8642bc8f 5988A number of files are taken from external repositories. They include:
8973da3a 5989
8642bc8f
AC
5990@itemize @bullet
5991@item
5992@file{texinfo/texinfo.tex}
5993@item
9ae8b82c
AC
5994@file{config.guess} et.@: al.@: (see the top-level @file{MAINTAINERS}
5995file)
5996@item
5997@file{etc/standards.texi}, @file{etc/make-stds.texi}
8642bc8f
AC
5998@end itemize
5999
9ae8b82c 6000@subheading Check the ARI
8642bc8f 6001
9ae8b82c
AC
6002@uref{http://sources.redhat.com/gdb/ari,,A.R.I.} is an @code{awk} script
6003(Awk Regression Index ;-) that checks for a number of errors and coding
6004conventions. The checks include things like using @code{malloc} instead
6005of @code{xmalloc} and file naming problems. There shouldn't be any
6006regressions.
8642bc8f 6007
9ae8b82c 6008@subsection Review the bug data base
8642bc8f 6009
9ae8b82c 6010Close anything obviously fixed.
8642bc8f 6011
9ae8b82c 6012@subsection Check all cross targets build
8642bc8f 6013
9ae8b82c 6014The targets are listed in @file{gdb/MAINTAINERS}.
8642bc8f 6015
8642bc8f 6016
30107679 6017@section Cut the Branch
8642bc8f 6018
30107679 6019@subheading Create the branch
8642bc8f 6020
474c8240 6021@smallexample
30107679
AC
6022$ u=5.1
6023$ v=5.2
6024$ V=`echo $v | sed 's/\./_/g'`
6025$ D=`date -u +%Y-%m-%d`
6026$ echo $u $V $D
60275.1 5_2 2002-03-03
6028$ echo cvs -f -d :ext:sources.redhat.com:/cvs/src rtag \
b247355e 6029-D $D-gmt gdb_$V-$D-branchpoint insight
30107679 6030cvs -f -d :ext:sources.redhat.com:/cvs/src rtag
b247355e 6031-D 2002-03-03-gmt gdb_5_2-2002-03-03-branchpoint insight
30107679
AC
6032$ ^echo ^^
6033...
6034$ echo cvs -f -d :ext:sources.redhat.com:/cvs/src rtag \
b247355e 6035-b -r gdb_$V-$D-branchpoint gdb_$V-branch insight
30107679 6036cvs -f -d :ext:sources.redhat.com:/cvs/src rtag \
b247355e 6037-b -r gdb_5_2-2002-03-03-branchpoint gdb_5_2-branch insight
30107679
AC
6038$ ^echo ^^
6039...
8642bc8f 6040$
474c8240 6041@end smallexample
8642bc8f
AC
6042
6043@itemize @bullet
6044@item
b247355e 6045By using @kbd{-D YYYY-MM-DD-gmt}, the branch is forced to an exact
30107679
AC
6046date/time.
6047@item
b247355e 6048The trunk is first tagged so that the branch point can easily be found.
30107679 6049@item
b247355e 6050Insight, which includes @value{GDBN}, is tagged at the same time.
8642bc8f 6051@item
b247355e 6052@file{version.in} gets bumped to avoid version number conflicts.
8642bc8f 6053@item
b247355e 6054The reading of @file{.cvsrc} is disabled using @file{-f}.
30107679
AC
6055@end itemize
6056
6057@subheading Update @file{version.in}
6058
6059@smallexample
6060$ u=5.1
6061$ v=5.2
6062$ V=`echo $v | sed 's/\./_/g'`
6063$ echo $u $v$V
60645.1 5_2
6065$ cd /tmp
6066$ echo cvs -f -d :ext:sources.redhat.com:/cvs/src co \
6067-r gdb_$V-branch src/gdb/version.in
6068cvs -f -d :ext:sources.redhat.com:/cvs/src co
6069 -r gdb_5_2-branch src/gdb/version.in
6070$ ^echo ^^
6071U src/gdb/version.in
6072$ cd src/gdb
6073$ echo $u.90-0000-00-00-cvs > version.in
6074$ cat version.in
60755.1.90-0000-00-00-cvs
6076$ cvs -f commit version.in
6077@end smallexample
6078
6079@itemize @bullet
6080@item
6081@file{0000-00-00} is used as a date to pump prime the version.in update
b247355e 6082mechanism.
30107679
AC
6083@item
6084@file{.90} and the previous branch version are used as fairly arbitrary
b247355e 6085initial branch version number.
8642bc8f
AC
6086@end itemize
6087
8642bc8f
AC
6088
6089@subheading Update the web and news pages
6090
30107679
AC
6091Something?
6092
8642bc8f
AC
6093@subheading Tweak cron to track the new branch
6094
30107679
AC
6095The file @file{gdbadmin/cron/crontab} contains gdbadmin's cron table.
6096This file needs to be updated so that:
6097
6098@itemize @bullet
6099@item
b247355e 6100A daily timestamp is added to the file @file{version.in}.
30107679 6101@item
b247355e 6102The new branch is included in the snapshot process.
30107679
AC
6103@end itemize
6104
6105@noindent
6106See the file @file{gdbadmin/cron/README} for how to install the updated
6107cron table.
6108
6109The file @file{gdbadmin/ss/README} should also be reviewed to reflect
6110any changes. That file is copied to both the branch/ and current/
6111snapshot directories.
6112
6113
6114@subheading Update the NEWS and README files
6115
6116The @file{NEWS} file needs to be updated so that on the branch it refers
6117to @emph{changes in the current release} while on the trunk it also
6118refers to @emph{changes since the current release}.
6119
6120The @file{README} file needs to be updated so that it refers to the
6121current release.
6122
6123@subheading Post the branch info
6124
6125Send an announcement to the mailing lists:
6126
6127@itemize @bullet
6128@item
6129@email{gdb-announce@@sources.redhat.com, GDB Announcement mailing list}
6130@item
6131@email{gdb@@sources.redhat.com, GDB Discsussion mailing list} and
6132@email{gdb-testers@@sources.redhat.com, GDB Discsussion mailing list}
16737d73 6133@end itemize
30107679
AC
6134
6135@emph{Pragmatics: The branch creation is sent to the announce list to
6136ensure that people people not subscribed to the higher volume discussion
6137list are alerted.}
6138
6139The announcement should include:
6140
6141@itemize @bullet
6142@item
b247355e 6143The branch tag.
30107679 6144@item
b247355e 6145How to check out the branch using CVS.
30107679 6146@item
b247355e 6147The date/number of weeks until the release.
30107679 6148@item
b247355e 6149The branch commit policy still holds.
16737d73 6150@end itemize
30107679 6151
8642bc8f
AC
6152@section Stabilize the branch
6153
6154Something goes here.
6155
6156@section Create a Release
6157
0816590b
AC
6158The process of creating and then making available a release is broken
6159down into a number of stages. The first part addresses the technical
6160process of creating a releasable tar ball. The later stages address the
6161process of releasing that tar ball.
8973da3a 6162
0816590b
AC
6163When making a release candidate just the first section is needed.
6164
6165@subsection Create a release candidate
6166
6167The objective at this stage is to create a set of tar balls that can be
6168made available as a formal release (or as a less formal release
6169candidate).
6170
6171@subsubheading Freeze the branch
6172
6173Send out an e-mail notifying everyone that the branch is frozen to
6174@email{gdb-patches@@sources.redhat.com}.
6175
6176@subsubheading Establish a few defaults.
8973da3a 6177
474c8240 6178@smallexample
0816590b
AC
6179$ b=gdb_5_2-branch
6180$ v=5.2
8642bc8f
AC
6181$ t=/sourceware/snapshot-tmp/gdbadmin-tmp
6182$ echo $t/$b/$v
0816590b 6183/sourceware/snapshot-tmp/gdbadmin-tmp/gdb_5_2-branch/5.2
8642bc8f
AC
6184$ mkdir -p $t/$b/$v
6185$ cd $t/$b/$v
6186$ pwd
0816590b 6187/sourceware/snapshot-tmp/gdbadmin-tmp/gdb_5_2-branch/5.2
8973da3a
AC
6188$ which autoconf
6189/home/gdbadmin/bin/autoconf
8642bc8f 6190$
474c8240 6191@end smallexample
8973da3a 6192
0816590b
AC
6193@noindent
6194Notes:
8973da3a 6195
0816590b
AC
6196@itemize @bullet
6197@item
6198Check the @code{autoconf} version carefully. You want to be using the
4a2b4636
JB
6199version taken from the @file{binutils} snapshot directory, which can be
6200found at @uref{ftp://sources.redhat.com/pub/binutils/}. It is very
0816590b
AC
6201unlikely that a system installed version of @code{autoconf} (e.g.,
6202@file{/usr/bin/autoconf}) is correct.
6203@end itemize
6204
6205@subsubheading Check out the relevant modules:
8973da3a 6206
474c8240 6207@smallexample
b247355e 6208$ for m in gdb insight
8642bc8f 6209do
8973da3a
AC
6210( mkdir -p $m && cd $m && cvs -q -f -d /cvs/src co -P -r $b $m )
6211done
8642bc8f 6212$
474c8240 6213@end smallexample
8973da3a 6214
0816590b
AC
6215@noindent
6216Note:
8642bc8f 6217
0816590b
AC
6218@itemize @bullet
6219@item
6220The reading of @file{.cvsrc} is disabled (@file{-f}) so that there isn't
6221any confusion between what is written here and what your local
6222@code{cvs} really does.
6223@end itemize
6224
6225@subsubheading Update relevant files.
8973da3a 6226
0816590b
AC
6227@table @file
6228
6229@item gdb/NEWS
8642bc8f
AC
6230
6231Major releases get their comments added as part of the mainline. Minor
6232releases should probably mention any significant bugs that were fixed.
6233
0816590b 6234Don't forget to include the @file{ChangeLog} entry.
8973da3a 6235
474c8240 6236@smallexample
8642bc8f
AC
6237$ emacs gdb/src/gdb/NEWS
6238...
6239c-x 4 a
6240...
6241c-x c-s c-x c-c
6242$ cp gdb/src/gdb/NEWS insight/src/gdb/NEWS
6243$ cp gdb/src/gdb/ChangeLog insight/src/gdb/ChangeLog
474c8240 6244@end smallexample
8973da3a 6245
0816590b
AC
6246@item gdb/README
6247
6248You'll need to update:
8973da3a 6249
0816590b
AC
6250@itemize @bullet
6251@item
b247355e 6252The version.
0816590b 6253@item
b247355e 6254The update date.
0816590b 6255@item
b247355e 6256Who did it.
0816590b 6257@end itemize
8973da3a 6258
474c8240 6259@smallexample
8642bc8f
AC
6260$ emacs gdb/src/gdb/README
6261...
8973da3a 6262c-x 4 a
8642bc8f 6263...
8973da3a 6264c-x c-s c-x c-c
8642bc8f
AC
6265$ cp gdb/src/gdb/README insight/src/gdb/README
6266$ cp gdb/src/gdb/ChangeLog insight/src/gdb/ChangeLog
474c8240 6267@end smallexample
8973da3a 6268
0816590b
AC
6269@emph{Maintainer note: Hopefully the @file{README} file was reviewed
6270before the initial branch was cut so just a simple substitute is needed
6271to get it updated.}
8973da3a 6272
8642bc8f
AC
6273@emph{Maintainer note: Other projects generate @file{README} and
6274@file{INSTALL} from the core documentation. This might be worth
6275pursuing.}
8973da3a 6276
0816590b 6277@item gdb/version.in
8973da3a 6278
474c8240 6279@smallexample
8642bc8f 6280$ echo $v > gdb/src/gdb/version.in
0816590b
AC
6281$ cat gdb/src/gdb/version.in
62825.2
8642bc8f 6283$ emacs gdb/src/gdb/version.in
8973da3a
AC
6284...
6285c-x 4 a
0816590b 6286... Bump to version ...
8973da3a 6287c-x c-s c-x c-c
8642bc8f
AC
6288$ cp gdb/src/gdb/version.in insight/src/gdb/version.in
6289$ cp gdb/src/gdb/ChangeLog insight/src/gdb/ChangeLog
474c8240 6290@end smallexample
8973da3a 6291
0816590b
AC
6292@end table
6293
6294@subsubheading Do the dirty work
6295
6296This is identical to the process used to create the daily snapshot.
8973da3a 6297
4ce8657e
MC
6298@smallexample
6299$ for m in gdb insight
6300do
6301( cd $m/src && gmake -f src-release $m.tar )
6302done
4ce8657e
MC
6303@end smallexample
6304
6305If the top level source directory does not have @file{src-release}
6306(@value{GDBN} version 5.3.1 or earlier), try these commands instead:
6307
474c8240 6308@smallexample
0816590b 6309$ for m in gdb insight
8642bc8f 6310do
0816590b 6311( cd $m/src && gmake -f Makefile.in $m.tar )
8973da3a 6312done
474c8240 6313@end smallexample
8973da3a 6314
0816590b 6315@subsubheading Check the source files
8642bc8f 6316
0816590b 6317You're looking for files that have mysteriously disappeared.
8642bc8f
AC
6318@kbd{distclean} has the habit of deleting files it shouldn't. Watch out
6319for the @file{version.in} update @kbd{cronjob}.
8973da3a 6320
474c8240 6321@smallexample
8642bc8f
AC
6322$ ( cd gdb/src && cvs -f -q -n update )
6323M djunpack.bat
0816590b 6324? gdb-5.1.91.tar
8642bc8f 6325? proto-toplev
0816590b 6326@dots{} lots of generated files @dots{}
8642bc8f
AC
6327M gdb/ChangeLog
6328M gdb/NEWS
6329M gdb/README
6330M gdb/version.in
0816590b 6331@dots{} lots of generated files @dots{}
8642bc8f 6332$
474c8240 6333@end smallexample
8973da3a 6334
0816590b 6335@noindent
8642bc8f
AC
6336@emph{Don't worry about the @file{gdb.info-??} or
6337@file{gdb/p-exp.tab.c}. They were generated (and yes @file{gdb.info-1}
6338was also generated only something strange with CVS means that they
6339didn't get supressed). Fixing it would be nice though.}
8973da3a 6340
0816590b 6341@subsubheading Create compressed versions of the release
8973da3a 6342
474c8240 6343@smallexample
0816590b
AC
6344$ cp */src/*.tar .
6345$ cp */src/*.bz2 .
6346$ ls -F
b247355e 6347gdb/ gdb-5.2.tar insight/ insight-5.2.tar
0816590b
AC
6348$ for m in gdb insight
6349do
6350bzip2 -v -9 -c $m-$v.tar > $m-$v.tar.bz2
6351gzip -v -9 -c $m-$v.tar > $m-$v.tar.gz
6352done
6353$
474c8240 6354@end smallexample
8973da3a 6355
0816590b
AC
6356@noindent
6357Note:
6358
6359@itemize @bullet
6360@item
6361A pipe such as @kbd{bunzip2 < xxx.bz2 | gzip -9 > xxx.gz} is not since,
6362in that mode, @code{gzip} does not know the name of the file and, hence,
6363can not include it in the compressed file. This is also why the release
6364process runs @code{tar} and @code{bzip2} as separate passes.
6365@end itemize
6366
6367@subsection Sanity check the tar ball
8973da3a 6368
0816590b 6369Pick a popular machine (Solaris/PPC?) and try the build on that.
8973da3a 6370
0816590b
AC
6371@smallexample
6372$ bunzip2 < gdb-5.2.tar.bz2 | tar xpf -
6373$ cd gdb-5.2
6374$ ./configure
6375$ make
6376@dots{}
6377$ ./gdb/gdb ./gdb/gdb
6378GNU gdb 5.2
6379@dots{}
6380(gdb) b main
6381Breakpoint 1 at 0x80732bc: file main.c, line 734.
6382(gdb) run
6383Starting program: /tmp/gdb-5.2/gdb/gdb
6384
6385Breakpoint 1, main (argc=1, argv=0xbffff8b4) at main.c:734
6386734 catch_errors (captured_main, &args, "", RETURN_MASK_ALL);
6387(gdb) print args
6388$1 = @{argc = 136426532, argv = 0x821b7f0@}
6389(gdb)
6390@end smallexample
8973da3a 6391
0816590b 6392@subsection Make a release candidate available
8973da3a 6393
0816590b 6394If this is a release candidate then the only remaining steps are:
8642bc8f 6395
0816590b
AC
6396@enumerate
6397@item
6398Commit @file{version.in} and @file{ChangeLog}
6399@item
6400Tweak @file{version.in} (and @file{ChangeLog} to read
6401@var{L}.@var{M}.@var{N}-0000-00-00-cvs so that the version update
6402process can restart.
6403@item
6404Make the release candidate available in
6405@uref{ftp://sources.redhat.com/pub/gdb/snapshots/branch}
6406@item
6407Notify the relevant mailing lists ( @email{gdb@@sources.redhat.com} and
6408@email{gdb-testers@@sources.redhat.com} that the candidate is available.
6409@end enumerate
8642bc8f 6410
0816590b 6411@subsection Make a formal release available
8642bc8f 6412
0816590b 6413(And you thought all that was required was to post an e-mail.)
8642bc8f 6414
0816590b 6415@subsubheading Install on sware
8642bc8f 6416
0816590b 6417Copy the new files to both the release and the old release directory:
8642bc8f 6418
474c8240 6419@smallexample
0816590b 6420$ cp *.bz2 *.gz ~ftp/pub/gdb/old-releases/
8642bc8f 6421$ cp *.bz2 *.gz ~ftp/pub/gdb/releases
474c8240 6422@end smallexample
8642bc8f 6423
0816590b
AC
6424@noindent
6425Clean up the releases directory so that only the most recent releases
6426are available (e.g. keep 5.2 and 5.2.1 but remove 5.1):
6427
6428@smallexample
6429$ cd ~ftp/pub/gdb/releases
6430$ rm @dots{}
6431@end smallexample
6432
6433@noindent
6434Update the file @file{README} and @file{.message} in the releases
6435directory:
6436
6437@smallexample
6438$ vi README
6439@dots{}
6440$ rm -f .message
6441$ ln README .message
6442@end smallexample
8642bc8f 6443
0816590b 6444@subsubheading Update the web pages.
8973da3a 6445
0816590b
AC
6446@table @file
6447
6448@item htdocs/download/ANNOUNCEMENT
6449This file, which is posted as the official announcement, includes:
8973da3a
AC
6450@itemize @bullet
6451@item
b247355e 6452General announcement.
8642bc8f 6453@item
0816590b
AC
6454News. If making an @var{M}.@var{N}.1 release, retain the news from
6455earlier @var{M}.@var{N} release.
8973da3a 6456@item
b247355e 6457Errata.
0816590b
AC
6458@end itemize
6459
6460@item htdocs/index.html
6461@itemx htdocs/news/index.html
6462@itemx htdocs/download/index.html
6463These files include:
6464@itemize @bullet
8642bc8f 6465@item
b247355e 6466Announcement of the most recent release.
8642bc8f 6467@item
b247355e 6468News entry (remember to update both the top level and the news directory).
8973da3a 6469@end itemize
0816590b 6470These pages also need to be regenerate using @code{index.sh}.
8973da3a 6471
0816590b 6472@item download/onlinedocs/
8642bc8f
AC
6473You need to find the magic command that is used to generate the online
6474docs from the @file{.tar.bz2}. The best way is to look in the output
0816590b 6475from one of the nightly @code{cron} jobs and then just edit accordingly.
8642bc8f
AC
6476Something like:
6477
474c8240 6478@smallexample
8642bc8f 6479$ ~/ss/update-web-docs \
0816590b 6480 ~ftp/pub/gdb/releases/gdb-5.2.tar.bz2 \
8642bc8f 6481 $PWD/www \
0816590b 6482 /www/sourceware/htdocs/gdb/download/onlinedocs \
8642bc8f 6483 gdb
474c8240 6484@end smallexample
8642bc8f 6485
0816590b
AC
6486@item download/ari/
6487Just like the online documentation. Something like:
8642bc8f 6488
0816590b
AC
6489@smallexample
6490$ /bin/sh ~/ss/update-web-ari \
6491 ~ftp/pub/gdb/releases/gdb-5.2.tar.bz2 \
6492 $PWD/www \
6493 /www/sourceware/htdocs/gdb/download/ari \
6494 gdb
6495@end smallexample
6496
6497@end table
6498
6499@subsubheading Shadow the pages onto gnu
6500
6501Something goes here.
6502
6503
6504@subsubheading Install the @value{GDBN} tar ball on GNU
6505
6506At the time of writing, the GNU machine was @kbd{gnudist.gnu.org} in
6507@file{~ftp/gnu/gdb}.
6508
6509@subsubheading Make the @file{ANNOUNCEMENT}
6510
6511Post the @file{ANNOUNCEMENT} file you created above to:
8642bc8f
AC
6512
6513@itemize @bullet
6514@item
6515@email{gdb-announce@@sources.redhat.com, GDB Announcement mailing list}
6516@item
0816590b
AC
6517@email{info-gnu@@gnu.org, General GNU Announcement list} (but delay it a
6518day or so to let things get out)
6519@item
6520@email{bug-gdb@@gnu.org, GDB Bug Report mailing list}
8642bc8f
AC
6521@end itemize
6522
0816590b 6523@subsection Cleanup
8642bc8f 6524
0816590b 6525The release is out but you're still not finished.
8642bc8f 6526
0816590b 6527@subsubheading Commit outstanding changes
8642bc8f 6528
0816590b 6529In particular you'll need to commit any changes to:
8642bc8f
AC
6530
6531@itemize @bullet
6532@item
6533@file{gdb/ChangeLog}
6534@item
6535@file{gdb/version.in}
6536@item
6537@file{gdb/NEWS}
6538@item
6539@file{gdb/README}
6540@end itemize
6541
0816590b 6542@subsubheading Tag the release
8642bc8f
AC
6543
6544Something like:
6545
474c8240 6546@smallexample
8642bc8f
AC
6547$ d=`date -u +%Y-%m-%d`
6548$ echo $d
65492002-01-24
6550$ ( cd insight/src/gdb && cvs -f -q update )
0816590b 6551$ ( cd insight/src && cvs -f -q tag gdb_5_2-$d-release )
474c8240 6552@end smallexample
8642bc8f 6553
0816590b 6554Insight is used since that contains more of the release than
b247355e 6555@value{GDBN}.
0816590b
AC
6556
6557@subsubheading Mention the release on the trunk
8642bc8f 6558
0816590b
AC
6559Just put something in the @file{ChangeLog} so that the trunk also
6560indicates when the release was made.
6561
6562@subsubheading Restart @file{gdb/version.in}
8642bc8f
AC
6563
6564If @file{gdb/version.in} does not contain an ISO date such as
6565@kbd{2002-01-24} then the daily @code{cronjob} won't update it. Having
6566committed all the release changes it can be set to
0816590b 6567@file{5.2.0_0000-00-00-cvs} which will restart things (yes the @kbd{_}
8642bc8f
AC
6568is important - it affects the snapshot process).
6569
6570Don't forget the @file{ChangeLog}.
6571
0816590b 6572@subsubheading Merge into trunk
8973da3a 6573
8642bc8f
AC
6574The files committed to the branch may also need changes merged into the
6575trunk.
8973da3a 6576
0816590b
AC
6577@subsubheading Revise the release schedule
6578
6579Post a revised release schedule to @email{gdb@@sources.redhat.com, GDB
6580Discussion List} with an updated announcement. The schedule can be
6581generated by running:
6582
6583@smallexample
6584$ ~/ss/schedule `date +%s` schedule
6585@end smallexample
6586
6587@noindent
6588The first parameter is approximate date/time in seconds (from the epoch)
6589of the most recent release.
6590
6591Also update the schedule @code{cronjob}.
6592
8642bc8f 6593@section Post release
8973da3a 6594
8642bc8f 6595Remove any @code{OBSOLETE} code.
8973da3a 6596
085dd6e6
JM
6597@node Testsuite
6598
6599@chapter Testsuite
56caf160 6600@cindex test suite
085dd6e6 6601
56caf160
EZ
6602The testsuite is an important component of the @value{GDBN} package.
6603While it is always worthwhile to encourage user testing, in practice
6604this is rarely sufficient; users typically use only a small subset of
6605the available commands, and it has proven all too common for a change
6606to cause a significant regression that went unnoticed for some time.
085dd6e6 6607
b247355e
NR
6608The @value{GDBN} testsuite uses the DejaGNU testing framework. The
6609tests themselves are calls to various @code{Tcl} procs; the framework
6610runs all the procs and summarizes the passes and fails.
085dd6e6
JM
6611
6612@section Using the Testsuite
6613
56caf160 6614@cindex running the test suite
25822942 6615To run the testsuite, simply go to the @value{GDBN} object directory (or to the
085dd6e6
JM
6616testsuite's objdir) and type @code{make check}. This just sets up some
6617environment variables and invokes DejaGNU's @code{runtest} script. While
6618the testsuite is running, you'll get mentions of which test file is in use,
6619and a mention of any unexpected passes or fails. When the testsuite is
6620finished, you'll get a summary that looks like this:
56caf160 6621
474c8240 6622@smallexample
085dd6e6
JM
6623 === gdb Summary ===
6624
6625# of expected passes 6016
6626# of unexpected failures 58
6627# of unexpected successes 5
6628# of expected failures 183
6629# of unresolved testcases 3
6630# of untested testcases 5
474c8240 6631@end smallexample
56caf160 6632
a9f158ec
JB
6633To run a specific test script, type:
6634@example
6635make check RUNTESTFLAGS='@var{tests}'
6636@end example
6637where @var{tests} is a list of test script file names, separated by
6638spaces.
6639
085dd6e6
JM
6640The ideal test run consists of expected passes only; however, reality
6641conspires to keep us from this ideal. Unexpected failures indicate
56caf160
EZ
6642real problems, whether in @value{GDBN} or in the testsuite. Expected
6643failures are still failures, but ones which have been decided are too
6644hard to deal with at the time; for instance, a test case might work
6645everywhere except on AIX, and there is no prospect of the AIX case
6646being fixed in the near future. Expected failures should not be added
6647lightly, since you may be masking serious bugs in @value{GDBN}.
6648Unexpected successes are expected fails that are passing for some
6649reason, while unresolved and untested cases often indicate some minor
6650catastrophe, such as the compiler being unable to deal with a test
6651program.
6652
6653When making any significant change to @value{GDBN}, you should run the
6654testsuite before and after the change, to confirm that there are no
6655regressions. Note that truly complete testing would require that you
6656run the testsuite with all supported configurations and a variety of
6657compilers; however this is more than really necessary. In many cases
6658testing with a single configuration is sufficient. Other useful
6659options are to test one big-endian (Sparc) and one little-endian (x86)
6660host, a cross config with a builtin simulator (powerpc-eabi,
6661mips-elf), or a 64-bit host (Alpha).
6662
6663If you add new functionality to @value{GDBN}, please consider adding
6664tests for it as well; this way future @value{GDBN} hackers can detect
6665and fix their changes that break the functionality you added.
6666Similarly, if you fix a bug that was not previously reported as a test
6667failure, please add a test case for it. Some cases are extremely
6668difficult to test, such as code that handles host OS failures or bugs
6669in particular versions of compilers, and it's OK not to try to write
6670tests for all of those.
085dd6e6 6671
e7dc800a
MC
6672DejaGNU supports separate build, host, and target machines. However,
6673some @value{GDBN} test scripts do not work if the build machine and
6674the host machine are not the same. In such an environment, these scripts
6675will give a result of ``UNRESOLVED'', like this:
6676
6677@smallexample
6678UNRESOLVED: gdb.base/example.exp: This test script does not work on a remote host.
6679@end smallexample
6680
085dd6e6
JM
6681@section Testsuite Organization
6682
56caf160 6683@cindex test suite organization
085dd6e6
JM
6684The testsuite is entirely contained in @file{gdb/testsuite}. While the
6685testsuite includes some makefiles and configury, these are very minimal,
6686and used for little besides cleaning up, since the tests themselves
25822942 6687handle the compilation of the programs that @value{GDBN} will run. The file
085dd6e6 6688@file{testsuite/lib/gdb.exp} contains common utility procs useful for
25822942 6689all @value{GDBN} tests, while the directory @file{testsuite/config} contains
085dd6e6
JM
6690configuration-specific files, typically used for special-purpose
6691definitions of procs like @code{gdb_load} and @code{gdb_start}.
6692
6693The tests themselves are to be found in @file{testsuite/gdb.*} and
6694subdirectories of those. The names of the test files must always end
6695with @file{.exp}. DejaGNU collects the test files by wildcarding
6696in the test directories, so both subdirectories and individual files
6697get chosen and run in alphabetical order.
6698
6699The following table lists the main types of subdirectories and what they
6700are for. Since DejaGNU finds test files no matter where they are
6701located, and since each test file sets up its own compilation and
6702execution environment, this organization is simply for convenience and
6703intelligibility.
6704
56caf160 6705@table @file
085dd6e6 6706@item gdb.base
085dd6e6 6707This is the base testsuite. The tests in it should apply to all
25822942 6708configurations of @value{GDBN} (but generic native-only tests may live here).
085dd6e6 6709The test programs should be in the subset of C that is valid K&R,
49efadf5 6710ANSI/ISO, and C@t{++} (@code{#ifdef}s are allowed if necessary, for instance
085dd6e6
JM
6711for prototypes).
6712
6713@item gdb.@var{lang}
56caf160 6714Language-specific tests for any language @var{lang} besides C. Examples are
af6cf26d 6715@file{gdb.cp} and @file{gdb.java}.
085dd6e6
JM
6716
6717@item gdb.@var{platform}
085dd6e6
JM
6718Non-portable tests. The tests are specific to a specific configuration
6719(host or target), such as HP-UX or eCos. Example is @file{gdb.hp}, for
6720HP-UX.
6721
6722@item gdb.@var{compiler}
085dd6e6
JM
6723Tests specific to a particular compiler. As of this writing (June
67241999), there aren't currently any groups of tests in this category that
6725couldn't just as sensibly be made platform-specific, but one could
56caf160
EZ
6726imagine a @file{gdb.gcc}, for tests of @value{GDBN}'s handling of GCC
6727extensions.
085dd6e6
JM
6728
6729@item gdb.@var{subsystem}
25822942 6730Tests that exercise a specific @value{GDBN} subsystem in more depth. For
085dd6e6
JM
6731instance, @file{gdb.disasm} exercises various disassemblers, while
6732@file{gdb.stabs} tests pathways through the stabs symbol reader.
085dd6e6
JM
6733@end table
6734
6735@section Writing Tests
56caf160 6736@cindex writing tests
085dd6e6 6737
25822942 6738In many areas, the @value{GDBN} tests are already quite comprehensive; you
085dd6e6
JM
6739should be able to copy existing tests to handle new cases.
6740
6741You should try to use @code{gdb_test} whenever possible, since it
6742includes cases to handle all the unexpected errors that might happen.
6743However, it doesn't cost anything to add new test procedures; for
6744instance, @file{gdb.base/exprs.exp} defines a @code{test_expr} that
6745calls @code{gdb_test} multiple times.
6746
6747Only use @code{send_gdb} and @code{gdb_expect} when absolutely
25822942 6748necessary, such as when @value{GDBN} has several valid responses to a command.
085dd6e6
JM
6749
6750The source language programs do @emph{not} need to be in a consistent
25822942 6751style. Since @value{GDBN} is used to debug programs written in many different
085dd6e6 6752styles, it's worth having a mix of styles in the testsuite; for
25822942 6753instance, some @value{GDBN} bugs involving the display of source lines would
085dd6e6
JM
6754never manifest themselves if the programs used GNU coding style
6755uniformly.
6756
c906108c
SS
6757@node Hints
6758
6759@chapter Hints
6760
6761Check the @file{README} file, it often has useful information that does not
6762appear anywhere else in the directory.
6763
6764@menu
25822942 6765* Getting Started:: Getting started working on @value{GDBN}
33e16fad 6766* Debugging GDB:: Debugging @value{GDBN} with itself
c906108c
SS
6767@end menu
6768
6769@node Getting Started,,, Hints
6770
6771@section Getting Started
6772
25822942 6773@value{GDBN} is a large and complicated program, and if you first starting to
c906108c
SS
6774work on it, it can be hard to know where to start. Fortunately, if you
6775know how to go about it, there are ways to figure out what is going on.
6776
25822942
DB
6777This manual, the @value{GDBN} Internals manual, has information which applies
6778generally to many parts of @value{GDBN}.
c906108c
SS
6779
6780Information about particular functions or data structures are located in
6781comments with those functions or data structures. If you run across a
6782function or a global variable which does not have a comment correctly
25822942 6783explaining what is does, this can be thought of as a bug in @value{GDBN}; feel
c906108c
SS
6784free to submit a bug report, with a suggested comment if you can figure
6785out what the comment should say. If you find a comment which is
6786actually wrong, be especially sure to report that.
6787
6788Comments explaining the function of macros defined in host, target, or
6789native dependent files can be in several places. Sometimes they are
6790repeated every place the macro is defined. Sometimes they are where the
6791macro is used. Sometimes there is a header file which supplies a
6792default definition of the macro, and the comment is there. This manual
6793also documents all the available macros.
6794@c (@pxref{Host Conditionals}, @pxref{Target
6795@c Conditionals}, @pxref{Native Conditionals}, and @pxref{Obsolete
6796@c Conditionals})
6797
56caf160
EZ
6798Start with the header files. Once you have some idea of how
6799@value{GDBN}'s internal symbol tables are stored (see @file{symtab.h},
6800@file{gdbtypes.h}), you will find it much easier to understand the
6801code which uses and creates those symbol tables.
c906108c
SS
6802
6803You may wish to process the information you are getting somehow, to
6804enhance your understanding of it. Summarize it, translate it to another
25822942 6805language, add some (perhaps trivial or non-useful) feature to @value{GDBN}, use
c906108c
SS
6806the code to predict what a test case would do and write the test case
6807and verify your prediction, etc. If you are reading code and your eyes
6808are starting to glaze over, this is a sign you need to use a more active
6809approach.
6810
25822942 6811Once you have a part of @value{GDBN} to start with, you can find more
c906108c
SS
6812specifically the part you are looking for by stepping through each
6813function with the @code{next} command. Do not use @code{step} or you
6814will quickly get distracted; when the function you are stepping through
6815calls another function try only to get a big-picture understanding
6816(perhaps using the comment at the beginning of the function being
6817called) of what it does. This way you can identify which of the
6818functions being called by the function you are stepping through is the
6819one which you are interested in. You may need to examine the data
6820structures generated at each stage, with reference to the comments in
6821the header files explaining what the data structures are supposed to
6822look like.
6823
6824Of course, this same technique can be used if you are just reading the
6825code, rather than actually stepping through it. The same general
6826principle applies---when the code you are looking at calls something
6827else, just try to understand generally what the code being called does,
6828rather than worrying about all its details.
6829
56caf160
EZ
6830@cindex command implementation
6831A good place to start when tracking down some particular area is with
6832a command which invokes that feature. Suppose you want to know how
6833single-stepping works. As a @value{GDBN} user, you know that the
6834@code{step} command invokes single-stepping. The command is invoked
6835via command tables (see @file{command.h}); by convention the function
6836which actually performs the command is formed by taking the name of
6837the command and adding @samp{_command}, or in the case of an
6838@code{info} subcommand, @samp{_info}. For example, the @code{step}
6839command invokes the @code{step_command} function and the @code{info
6840display} command invokes @code{display_info}. When this convention is
6841not followed, you might have to use @code{grep} or @kbd{M-x
6842tags-search} in emacs, or run @value{GDBN} on itself and set a
6843breakpoint in @code{execute_command}.
6844
6845@cindex @code{bug-gdb} mailing list
c906108c
SS
6846If all of the above fail, it may be appropriate to ask for information
6847on @code{bug-gdb}. But @emph{never} post a generic question like ``I was
6848wondering if anyone could give me some tips about understanding
25822942 6849@value{GDBN}''---if we had some magic secret we would put it in this manual.
c906108c
SS
6850Suggestions for improving the manual are always welcome, of course.
6851
33e16fad 6852@node Debugging GDB,,,Hints
c906108c 6853
25822942 6854@section Debugging @value{GDBN} with itself
56caf160 6855@cindex debugging @value{GDBN}
c906108c 6856
25822942 6857If @value{GDBN} is limping on your machine, this is the preferred way to get it
c906108c
SS
6858fully functional. Be warned that in some ancient Unix systems, like
6859Ultrix 4.2, a program can't be running in one process while it is being
56caf160 6860debugged in another. Rather than typing the command @kbd{@w{./gdb
c906108c 6861./gdb}}, which works on Suns and such, you can copy @file{gdb} to
56caf160 6862@file{gdb2} and then type @kbd{@w{./gdb ./gdb2}}.
c906108c 6863
25822942 6864When you run @value{GDBN} in the @value{GDBN} source directory, it will read a
c906108c
SS
6865@file{.gdbinit} file that sets up some simple things to make debugging
6866gdb easier. The @code{info} command, when executed without a subcommand
25822942 6867in a @value{GDBN} being debugged by gdb, will pop you back up to the top level
c906108c
SS
6868gdb. See @file{.gdbinit} for details.
6869
6870If you use emacs, you will probably want to do a @code{make TAGS} after
6871you configure your distribution; this will put the machine dependent
6872routines for your local machine where they will be accessed first by
6873@kbd{M-.}
6874
25822942 6875Also, make sure that you've either compiled @value{GDBN} with your local cc, or
c906108c
SS
6876have run @code{fixincludes} if you are compiling with gcc.
6877
6878@section Submitting Patches
6879
56caf160 6880@cindex submitting patches
c906108c 6881Thanks for thinking of offering your changes back to the community of
25822942 6882@value{GDBN} users. In general we like to get well designed enhancements.
c906108c
SS
6883Thanks also for checking in advance about the best way to transfer the
6884changes.
6885
25822942
DB
6886The @value{GDBN} maintainers will only install ``cleanly designed'' patches.
6887This manual summarizes what we believe to be clean design for @value{GDBN}.
c906108c
SS
6888
6889If the maintainers don't have time to put the patch in when it arrives,
6890or if there is any question about a patch, it goes into a large queue
6891with everyone else's patches and bug reports.
6892
56caf160 6893@cindex legal papers for code contributions
c906108c
SS
6894The legal issue is that to incorporate substantial changes requires a
6895copyright assignment from you and/or your employer, granting ownership
6896of the changes to the Free Software Foundation. You can get the
9e0b60a8
JM
6897standard documents for doing this by sending mail to @code{gnu@@gnu.org}
6898and asking for it. We recommend that people write in "All programs
6899owned by the Free Software Foundation" as "NAME OF PROGRAM", so that
56caf160
EZ
6900changes in many programs (not just @value{GDBN}, but GAS, Emacs, GCC,
6901etc) can be
9e0b60a8 6902contributed with only one piece of legalese pushed through the
be9c6c35 6903bureaucracy and filed with the FSF. We can't start merging changes until
9e0b60a8
JM
6904this paperwork is received by the FSF (their rules, which we follow
6905since we maintain it for them).
c906108c
SS
6906
6907Technically, the easiest way to receive changes is to receive each
56caf160
EZ
6908feature as a small context diff or unidiff, suitable for @code{patch}.
6909Each message sent to me should include the changes to C code and
6910header files for a single feature, plus @file{ChangeLog} entries for
6911each directory where files were modified, and diffs for any changes
6912needed to the manuals (@file{gdb/doc/gdb.texinfo} or
6913@file{gdb/doc/gdbint.texinfo}). If there are a lot of changes for a
6914single feature, they can be split down into multiple messages.
9e0b60a8
JM
6915
6916In this way, if we read and like the feature, we can add it to the
c906108c 6917sources with a single patch command, do some testing, and check it in.
56caf160
EZ
6918If you leave out the @file{ChangeLog}, we have to write one. If you leave
6919out the doc, we have to puzzle out what needs documenting. Etc., etc.
c906108c 6920
9e0b60a8
JM
6921The reason to send each change in a separate message is that we will not
6922install some of the changes. They'll be returned to you with questions
6923or comments. If we're doing our job correctly, the message back to you
c906108c 6924will say what you have to fix in order to make the change acceptable.
9e0b60a8
JM
6925The reason to have separate messages for separate features is so that
6926the acceptable changes can be installed while one or more changes are
6927being reworked. If multiple features are sent in a single message, we
6928tend to not put in the effort to sort out the acceptable changes from
6929the unacceptable, so none of the features get installed until all are
6930acceptable.
6931
6932If this sounds painful or authoritarian, well, it is. But we get a lot
6933of bug reports and a lot of patches, and many of them don't get
6934installed because we don't have the time to finish the job that the bug
c906108c
SS
6935reporter or the contributor could have done. Patches that arrive
6936complete, working, and well designed, tend to get installed on the day
9e0b60a8
JM
6937they arrive. The others go into a queue and get installed as time
6938permits, which, since the maintainers have many demands to meet, may not
6939be for quite some time.
c906108c 6940
56caf160 6941Please send patches directly to
47b95330 6942@email{gdb-patches@@sources.redhat.com, the @value{GDBN} maintainers}.
c906108c
SS
6943
6944@section Obsolete Conditionals
56caf160 6945@cindex obsolete code
c906108c 6946
25822942 6947Fragments of old code in @value{GDBN} sometimes reference or set the following
c906108c
SS
6948configuration macros. They should not be used by new code, and old uses
6949should be removed as those parts of the debugger are otherwise touched.
6950
6951@table @code
c906108c
SS
6952@item STACK_END_ADDR
6953This macro used to define where the end of the stack appeared, for use
6954in interpreting core file formats that don't record this address in the
25822942
DB
6955core file itself. This information is now configured in BFD, and @value{GDBN}
6956gets the info portably from there. The values in @value{GDBN}'s configuration
c906108c 6957files should be moved into BFD configuration files (if needed there),
25822942 6958and deleted from all of @value{GDBN}'s config files.
c906108c
SS
6959
6960Any @file{@var{foo}-xdep.c} file that references STACK_END_ADDR
6961is so old that it has never been converted to use BFD. Now that's old!
6962
c906108c
SS
6963@end table
6964
bcd7e15f 6965@include observer.texi
2154891a 6966@raisesections
aab4e0ec 6967@include fdl.texi
2154891a 6968@lowersections
aab4e0ec 6969
56caf160
EZ
6970@node Index
6971@unnumbered Index
6972
6973@printindex cp
6974
c906108c 6975@bye
This page took 0.84597 seconds and 4 git commands to generate.