--- /dev/null
+This is gdbint.info, produced by makeinfo version 4.8 from
+../../../../toolchain/android-toolchain/gdb-6.6/gdb/doc/gdbint.texinfo.
+
+INFO-DIR-SECTION Software development
+START-INFO-DIR-ENTRY
+* Gdb-Internals: (gdbint). The GNU debugger's internals.
+END-INFO-DIR-ENTRY
+
+ This file documents the internals of the GNU debugger GDB.
+Copyright (C) 1990, 1991, 1992, 1993, 1994, 1996, 1998, 1999, 2000,
+2001, 2002, 2003, 2004, 2005, 2006 Free Software Foundation, Inc.
+Contributed by Cygnus Solutions. Written by John Gilmore. Second
+Edition by Stan Shebs.
+
+ Permission is granted to copy, distribute and/or modify this document
+under the terms of the GNU Free Documentation License, Version 1.1 or
+any later version published by the Free Software Foundation; with no
+Invariant Sections, with no Front-Cover Texts, and with no Back-Cover
+Texts. A copy of the license is included in the section entitled "GNU
+Free Documentation License".
+
+\1f
+File: gdbint.info, Node: Top, Next: Requirements, Up: (dir)
+
+Scope of this Document
+**********************
+
+This document documents the internals of the GNU debugger, GDB. It
+includes description of GDB's key algorithms and operations, as well as
+the mechanisms that adapt GDB to specific hosts and targets.
+
+* Menu:
+
+* Requirements::
+* Overall Structure::
+* Algorithms::
+* User Interface::
+* libgdb::
+* Symbol Handling::
+* Language Support::
+* Host Definition::
+* Target Architecture Definition::
+* Target Vector Definition::
+* Native Debugging::
+* Support Libraries::
+* Coding::
+* Porting GDB::
+* Versions and Branches::
+* Start of New Year Procedure::
+* Releasing GDB::
+* Testsuite::
+* Hints::
+
+* GDB Observers:: GDB Currently available observers
+* GNU Free Documentation License:: The license for this documentation
+* Index::
+
+\1f
+File: gdbint.info, Node: Requirements, Next: Overall Structure, Prev: Top, Up: Top
+
+1 Requirements
+**************
+
+Before diving into the internals, you should understand the formal
+requirements and other expectations for GDB. Although some of these
+may seem obvious, there have been proposals for GDB that have run
+counter to these requirements.
+
+ First of all, GDB is a debugger. It's not designed to be a front
+panel for embedded systems. It's not a text editor. It's not a shell.
+It's not a programming environment.
+
+ GDB is an interactive tool. Although a batch mode is available,
+GDB's primary role is to interact with a human programmer.
+
+ GDB should be responsive to the user. A programmer hot on the trail
+of a nasty bug, and operating under a looming deadline, is going to be
+very impatient of everything, including the response time to debugger
+commands.
+
+ GDB should be relatively permissive, such as for expressions. While
+the compiler should be picky (or have the option to be made picky),
+since source code lives for a long time usually, the programmer doing
+debugging shouldn't be spending time figuring out to mollify the
+debugger.
+
+ GDB will be called upon to deal with really large programs.
+Executable sizes of 50 to 100 megabytes occur regularly, and we've
+heard reports of programs approaching 1 gigabyte in size.
+
+ GDB should be able to run everywhere. No other debugger is
+available for even half as many configurations as GDB supports.
+
+\1f
+File: gdbint.info, Node: Overall Structure, Next: Algorithms, Prev: Requirements, Up: Top
+
+2 Overall Structure
+*******************
+
+GDB consists of three major subsystems: user interface, symbol handling
+(the "symbol side"), and target system handling (the "target side").
+
+ The user interface consists of several actual interfaces, plus
+supporting code.
+
+ The symbol side consists of object file readers, debugging info
+interpreters, symbol table management, source language expression
+parsing, type and value printing.
+
+ The target side consists of execution control, stack frame analysis,
+and physical target manipulation.
+
+ The target side/symbol side division is not formal, and there are a
+number of exceptions. For instance, core file support involves symbolic
+elements (the basic core file reader is in BFD) and target elements (it
+supplies the contents of memory and the values of registers). Instead,
+this division is useful for understanding how the minor subsystems
+should fit together.
+
+2.1 The Symbol Side
+===================
+
+The symbolic side of GDB can be thought of as "everything you can do in
+GDB without having a live program running". For instance, you can look
+at the types of variables, and evaluate many kinds of expressions.
+
+2.2 The Target Side
+===================
+
+The target side of GDB is the "bits and bytes manipulator". Although
+it may make reference to symbolic info here and there, most of the
+target side will run with only a stripped executable available--or even
+no executable at all, in remote debugging cases.
+
+ Operations such as disassembly, stack frame crawls, and register
+display, are able to work with no symbolic info at all. In some cases,
+such as disassembly, GDB will use symbolic info to present addresses
+relative to symbols rather than as raw numbers, but it will work either
+way.
+
+2.3 Configurations
+==================
+
+"Host" refers to attributes of the system where GDB runs. "Target"
+refers to the system where the program being debugged executes. In
+most cases they are the same machine, in which case a third type of
+"Native" attributes come into play.
+
+ Defines and include files needed to build on the host are host
+support. Examples are tty support, system defined types, host byte
+order, host float format.
+
+ Defines and information needed to handle the target format are target
+dependent. Examples are the stack frame format, instruction set,
+breakpoint instruction, registers, and how to set up and tear down the
+stack to call a function.
+
+ Information that is only needed when the host and target are the
+same, is native dependent. One example is Unix child process support;
+if the host and target are not the same, doing a fork to start the
+target process is a bad idea. The various macros needed for finding the
+registers in the `upage', running `ptrace', and such are all in the
+native-dependent files.
+
+ Another example of native-dependent code is support for features that
+are really part of the target environment, but which require `#include'
+files that are only available on the host system. Core file handling
+and `setjmp' handling are two common cases.
+
+ When you want to make GDB work "native" on a particular machine, you
+have to include all three kinds of information.
+
+2.4 Source Tree Structure
+=========================
+
+The GDB source directory has a mostly flat structure--there are only a
+few subdirectories. A file's name usually gives a hint as to what it
+does; for example, `stabsread.c' reads stabs, `dwarfread.c' reads
+DWARF, etc.
+
+ Files that are related to some common task have names that share
+common substrings. For example, `*-thread.c' files deal with debugging
+threads on various platforms; `*read.c' files deal with reading various
+kinds of symbol and object files; `inf*.c' files deal with direct
+control of the "inferior program" (GDB parlance for the program being
+debugged).
+
+ There are several dozens of files in the `*-tdep.c' family. `tdep'
+stands for "target-dependent code"--each of these files implements
+debug support for a specific target architecture (sparc, mips, etc).
+Usually, only one of these will be used in a specific GDB configuration
+(sometimes two, closely related).
+
+ Similarly, there are many `*-nat.c' files, each one for native
+debugging on a specific system (e.g., `sparc-linux-nat.c' is for native
+debugging of Sparc machines running the Linux kernel).
+
+ The few subdirectories of the source tree are:
+
+`cli'
+ Code that implements "CLI", the GDB Command-Line Interpreter.
+ *Note Command Interpreter: User Interface.
+
+`gdbserver'
+ Code for the GDB remote server.
+
+`gdbtk'
+ Code for Insight, the GDB TK-based GUI front-end.
+
+`mi'
+ The "GDB/MI", the GDB Machine Interface interpreter.
+
+`signals'
+ Target signal translation code.
+
+`tui'
+ Code for "TUI", the GDB Text-mode full-screen User Interface.
+ *Note TUI: User Interface.
+
+\1f
+File: gdbint.info, Node: Algorithms, Next: User Interface, Prev: Overall Structure, Up: Top
+
+3 Algorithms
+************
+
+GDB uses a number of debugging-specific algorithms. They are often not
+very complicated, but get lost in the thicket of special cases and
+real-world issues. This chapter describes the basic algorithms and
+mentions some of the specific target definitions that they use.
+
+3.1 Frames
+==========
+
+A frame is a construct that GDB uses to keep track of calling and
+called functions.
+
+ GDB's frame model, a fresh design, was implemented with the need to
+support DWARF's Call Frame Information in mind. In fact, the term
+"unwind" is taken directly from that specification. Developers wishing
+to learn more about unwinders, are encouraged to read the the DWARF
+specification.
+
+ GDB's model is that you find a frame's registers by "unwinding" them
+from the next younger frame. That is, `get_frame_register' which
+returns the value of a register in frame #1 (the next-to-youngest
+frame), is implemented by calling frame #0's `frame_register_unwind'
+(the youngest frame). But then the obvious question is: how do you
+access the registers of the youngest frame itself?
+
+ To answer this question, GDB has the "sentinel" frame, the "-1st"
+frame. Unwinding registers from the sentinel frame gives you the
+current values of the youngest real frame's registers. If F is a
+sentinel frame, then `get_frame_type (F) == SENTINEL_FRAME'.
+
+3.2 Prologue Analysis
+=====================
+
+To produce a backtrace and allow the user to manipulate older frames'
+variables and arguments, GDB needs to find the base addresses of older
+frames, and discover where those frames' registers have been saved.
+Since a frame's "callee-saves" registers get saved by younger frames if
+and when they're reused, a frame's registers may be scattered
+unpredictably across younger frames. This means that changing the
+value of a register-allocated variable in an older frame may actually
+entail writing to a save slot in some younger frame.
+
+ Modern versions of GCC emit Dwarf call frame information ("CFI"),
+which describes how to find frame base addresses and saved registers.
+But CFI is not always available, so as a fallback GDB uses a technique
+called "prologue analysis" to find frame sizes and saved registers. A
+prologue analyzer disassembles the function's machine code starting
+from its entry point, and looks for instructions that allocate frame
+space, save the stack pointer in a frame pointer register, save
+registers, and so on. Obviously, this can't be done accurately in
+general, but it's tractable to do well enough to be very helpful.
+Prologue analysis predates the GNU toolchain's support for CFI; at one
+time, prologue analysis was the only mechanism GDB used for stack
+unwinding at all, when the function calling conventions didn't specify
+a fixed frame layout.
+
+ In the olden days, function prologues were generated by hand-written,
+target-specific code in GCC, and treated as opaque and untouchable by
+optimizers. Looking at this code, it was usually straightforward to
+write a prologue analyzer for GDB that would accurately understand all
+the prologues GCC would generate. However, over time GCC became more
+aggressive about instruction scheduling, and began to understand more
+about the semantics of the prologue instructions themselves; in
+response, GDB's analyzers became more complex and fragile. Keeping the
+prologue analyzers working as GCC (and the instruction sets themselves)
+evolved became a substantial task.
+
+ To try to address this problem, the code in `prologue-value.h' and
+`prologue-value.c' provides a general framework for writing prologue
+analyzers that are simpler and more robust than ad-hoc analyzers. When
+we analyze a prologue using the prologue-value framework, we're really
+doing "abstract interpretation" or "pseudo-evaluation": running the
+function's code in simulation, but using conservative approximations of
+the values registers and memory would hold when the code actually runs.
+For example, if our function starts with the instruction:
+
+ addi r1, 42 # add 42 to r1
+ we don't know exactly what value will be in `r1' after executing
+this instruction, but we do know it'll be 42 greater than its original
+value.
+
+ If we then see an instruction like:
+
+ addi r1, 22 # add 22 to r1
+ we still don't know what `r1's' value is, but again, we can say it
+is now 64 greater than its original value.
+
+ If the next instruction were:
+
+ mov r2, r1 # set r2 to r1's value
+ then we can say that `r2's' value is now the original value of `r1'
+plus 64.
+
+ It's common for prologues to save registers on the stack, so we'll
+need to track the values of stack frame slots, as well as the
+registers. So after an instruction like this:
+
+ mov (fp+4), r2
+ then we'd know that the stack slot four bytes above the frame pointer
+holds the original value of `r1' plus 64.
+
+ And so on.
+
+ Of course, this can only go so far before it gets unreasonable. If
+we wanted to be able to say anything about the value of `r1' after the
+instruction:
+
+ xor r1, r3 # exclusive-or r1 and r3, place result in r1
+ then things would get pretty complex. But remember, we're just doing
+a conservative approximation; if exclusive-or instructions aren't
+relevant to prologues, we can just say `r1''s value is now "unknown".
+We can ignore things that are too complex, if that loss of information
+is acceptable for our application.
+
+ So when we say "conservative approximation" here, what we mean is an
+approximation that is either accurate, or marked "unknown", but never
+inaccurate.
+
+ Using this framework, a prologue analyzer is simply an interpreter
+for machine code, but one that uses conservative approximations for the
+contents of registers and memory instead of actual values. Starting
+from the function's entry point, you simulate instructions up to the
+current PC, or an instruction that you don't know how to simulate. Now
+you can examine the state of the registers and stack slots you've kept
+track of.
+
+ * To see how large your stack frame is, just check the value of the
+ stack pointer register; if it's the original value of the SP minus
+ a constant, then that constant is the stack frame's size. If the
+ SP's value has been marked as "unknown", then that means the
+ prologue has done something too complex for us to track, and we
+ don't know the frame size.
+
+ * To see where we've saved the previous frame's registers, we just
+ search the values we've tracked -- stack slots, usually, but
+ registers, too, if you want -- for something equal to the
+ register's original value. If the calling conventions suggest a
+ standard place to save a given register, then we can check there
+ first, but really, anything that will get us back the original
+ value will probably work.
+
+ This does take some work. But prologue analyzers aren't
+quick-and-simple pattern patching to recognize a few fixed prologue
+forms any more; they're big, hairy functions. Along with inferior
+function calls, prologue analysis accounts for a substantial portion of
+the time needed to stabilize a GDB port. So it's worthwhile to look
+for an approach that will be easier to understand and maintain. In the
+approach described above:
+
+ * It's easier to see that the analyzer is correct: you just see
+ whether the analyzer properly (albeit conservatively) simulates
+ the effect of each instruction.
+
+ * It's easier to extend the analyzer: you can add support for new
+ instructions, and know that you haven't broken anything that
+ wasn't already broken before.
+
+ * It's orthogonal: to gather new information, you don't need to
+ complicate the code for each instruction. As long as your domain
+ of conservative values is already detailed enough to tell you what
+ you need, then all the existing instruction simulations are
+ already gathering the right data for you.
+
+
+ The file `prologue-value.h' contains detailed comments explaining
+the framework and how to use it.
+
+3.3 Breakpoint Handling
+=======================
+
+In general, a breakpoint is a user-designated location in the program
+where the user wants to regain control if program execution ever reaches
+that location.
+
+ There are two main ways to implement breakpoints; either as
+"hardware" breakpoints or as "software" breakpoints.
+
+ Hardware breakpoints are sometimes available as a builtin debugging
+features with some chips. Typically these work by having dedicated
+register into which the breakpoint address may be stored. If the PC
+(shorthand for "program counter") ever matches a value in a breakpoint
+registers, the CPU raises an exception and reports it to GDB.
+
+ Another possibility is when an emulator is in use; many emulators
+include circuitry that watches the address lines coming out from the
+processor, and force it to stop if the address matches a breakpoint's
+address.
+
+ A third possibility is that the target already has the ability to do
+breakpoints somehow; for instance, a ROM monitor may do its own
+software breakpoints. So although these are not literally "hardware
+breakpoints", from GDB's point of view they work the same; GDB need not
+do anything more than set the breakpoint and wait for something to
+happen.
+
+ Since they depend on hardware resources, hardware breakpoints may be
+limited in number; when the user asks for more, GDB will start trying
+to set software breakpoints. (On some architectures, notably the
+32-bit x86 platforms, GDB cannot always know whether there's enough
+hardware resources to insert all the hardware breakpoints and
+watchpoints. On those platforms, GDB prints an error message only when
+the program being debugged is continued.)
+
+ Software breakpoints require GDB to do somewhat more work. The
+basic theory is that GDB will replace a program instruction with a
+trap, illegal divide, or some other instruction that will cause an
+exception, and then when it's encountered, GDB will take the exception
+and stop the program. When the user says to continue, GDB will restore
+the original instruction, single-step, re-insert the trap, and continue
+on.
+
+ Since it literally overwrites the program being tested, the program
+area must be writable, so this technique won't work on programs in ROM.
+It can also distort the behavior of programs that examine themselves,
+although such a situation would be highly unusual.
+
+ Also, the software breakpoint instruction should be the smallest
+size of instruction, so it doesn't overwrite an instruction that might
+be a jump target, and cause disaster when the program jumps into the
+middle of the breakpoint instruction. (Strictly speaking, the
+breakpoint must be no larger than the smallest interval between
+instructions that may be jump targets; perhaps there is an architecture
+where only even-numbered instructions may jumped to.) Note that it's
+possible for an instruction set not to have any instructions usable for
+a software breakpoint, although in practice only the ARC has failed to
+define such an instruction.
+
+ The basic definition of the software breakpoint is the macro
+`BREAKPOINT'.
+
+ Basic breakpoint object handling is in `breakpoint.c'. However,
+much of the interesting breakpoint action is in `infrun.c'.
+
+`target_remove_breakpoint (BP_TGT)'
+`target_insert_breakpoint (BP_TGT)'
+ Insert or remove a software breakpoint at address
+ `BP_TGT->placed_address'. Returns zero for success, non-zero for
+ failure. On input, BP_TGT contains the address of the breakpoint,
+ and is otherwise initialized to zero. The fields of the `struct
+ bp_target_info' pointed to by BP_TGT are updated to contain other
+ information about the breakpoint on output. The field
+ `placed_address' may be updated if the breakpoint was placed at a
+ related address; the field `shadow_contents' contains the real
+ contents of the bytes where the breakpoint has been inserted, if
+ reading memory would return the breakpoint instead of the
+ underlying memory; the field `shadow_len' is the length of memory
+ cached in `shadow_contents', if any; and the field `placed_size'
+ is optionally set and used by the target, if it could differ from
+ `shadow_len'.
+
+ For example, the remote target `Z0' packet does not require
+ shadowing memory, so `shadow_len' is left at zero. However, the
+ length reported by `BREAKPOINT_FROM_PC' is cached in
+ `placed_size', so that a matching `z0' packet can be used to
+ remove the breakpoint.
+
+`target_remove_hw_breakpoint (BP_TGT)'
+`target_insert_hw_breakpoint (BP_TGT)'
+ Insert or remove a hardware-assisted breakpoint at address
+ `BP_TGT->placed_address'. Returns zero for success, non-zero for
+ failure. See `target_insert_breakpoint' for a description of the
+ `struct bp_target_info' pointed to by BP_TGT; the
+ `shadow_contents' and `shadow_len' members are not used for
+ hardware breakpoints, but `placed_size' may be.
+
+3.4 Single Stepping
+===================
+
+3.5 Signal Handling
+===================
+
+3.6 Thread Handling
+===================
+
+3.7 Inferior Function Calls
+===========================
+
+3.8 Longjmp Support
+===================
+
+GDB has support for figuring out that the target is doing a `longjmp'
+and for stopping at the target of the jump, if we are stepping. This
+is done with a few specialized internal breakpoints, which are visible
+in the output of the `maint info breakpoint' command.
+
+ To make this work, you need to define a macro called
+`GET_LONGJMP_TARGET', which will examine the `jmp_buf' structure and
+extract the longjmp target address. Since `jmp_buf' is target
+specific, you will need to define it in the appropriate `tm-TARGET.h'
+file. Look in `tm-sun4os4.h' and `sparc-tdep.c' for examples of how to
+do this.
+
+3.9 Watchpoints
+===============
+
+Watchpoints are a special kind of breakpoints (*note breakpoints:
+Algorithms.) which break when data is accessed rather than when some
+instruction is executed. When you have data which changes without your
+knowing what code does that, watchpoints are the silver bullet to hunt
+down and kill such bugs.
+
+ Watchpoints can be either hardware-assisted or not; the latter type
+is known as "software watchpoints." GDB always uses hardware-assisted
+watchpoints if they are available, and falls back on software
+watchpoints otherwise. Typical situations where GDB will use software
+watchpoints are:
+
+ * The watched memory region is too large for the underlying hardware
+ watchpoint support. For example, each x86 debug register can
+ watch up to 4 bytes of memory, so trying to watch data structures
+ whose size is more than 16 bytes will cause GDB to use software
+ watchpoints.
+
+ * The value of the expression to be watched depends on data held in
+ registers (as opposed to memory).
+
+ * Too many different watchpoints requested. (On some architectures,
+ this situation is impossible to detect until the debugged program
+ is resumed.) Note that x86 debug registers are used both for
+ hardware breakpoints and for watchpoints, so setting too many
+ hardware breakpoints might cause watchpoint insertion to fail.
+
+ * No hardware-assisted watchpoints provided by the target
+ implementation.
+
+ Software watchpoints are very slow, since GDB needs to single-step
+the program being debugged and test the value of the watched
+expression(s) after each instruction. The rest of this section is
+mostly irrelevant for software watchpoints.
+
+ When the inferior stops, GDB tries to establish, among other
+possible reasons, whether it stopped due to a watchpoint being hit.
+For a data-write watchpoint, it does so by evaluating, for each
+watchpoint, the expression whose value is being watched, and testing
+whether the watched value has changed. For data-read and data-access
+watchpoints, GDB needs the target to supply a primitive that returns
+the address of the data that was accessed or read (see the description
+of `target_stopped_data_address' below): if this primitive returns a
+valid address, GDB infers that a watchpoint triggered if it watches an
+expression whose evaluation uses that address.
+
+ GDB uses several macros and primitives to support hardware
+watchpoints:
+
+`TARGET_HAS_HARDWARE_WATCHPOINTS'
+ If defined, the target supports hardware watchpoints.
+
+`TARGET_CAN_USE_HARDWARE_WATCHPOINT (TYPE, COUNT, OTHER)'
+ Return the number of hardware watchpoints of type TYPE that are
+ possible to be set. The value is positive if COUNT watchpoints of
+ this type can be set, zero if setting watchpoints of this type is
+ not supported, and negative if COUNT is more than the maximum
+ number of watchpoints of type TYPE that can be set. OTHER is
+ non-zero if other types of watchpoints are currently enabled (there
+ are architectures which cannot set watchpoints of different types
+ at the same time).
+
+`TARGET_REGION_OK_FOR_HW_WATCHPOINT (ADDR, LEN)'
+ Return non-zero if hardware watchpoints can be used to watch a
+ region whose address is ADDR and whose length in bytes is LEN.
+
+`target_insert_watchpoint (ADDR, LEN, TYPE)'
+`target_remove_watchpoint (ADDR, LEN, TYPE)'
+ Insert or remove a hardware watchpoint starting at ADDR, for LEN
+ bytes. TYPE is the watchpoint type, one of the possible values of
+ the enumerated data type `target_hw_bp_type', defined by
+ `breakpoint.h' as follows:
+
+ enum target_hw_bp_type
+ {
+ hw_write = 0, /* Common (write) HW watchpoint */
+ hw_read = 1, /* Read HW watchpoint */
+ hw_access = 2, /* Access (read or write) HW watchpoint */
+ hw_execute = 3 /* Execute HW breakpoint */
+ };
+
+ These two macros should return 0 for success, non-zero for failure.
+
+`target_stopped_data_address (ADDR_P)'
+ If the inferior has some watchpoint that triggered, place the
+ address associated with the watchpoint at the location pointed to
+ by ADDR_P and return non-zero. Otherwise, return zero. Note that
+ this primitive is used by GDB only on targets that support
+ data-read or data-access type watchpoints, so targets that have
+ support only for data-write watchpoints need not implement these
+ primitives.
+
+`HAVE_STEPPABLE_WATCHPOINT'
+ If defined to a non-zero value, it is not necessary to disable a
+ watchpoint to step over it.
+
+`HAVE_NONSTEPPABLE_WATCHPOINT'
+ If defined to a non-zero value, GDB should disable a watchpoint to
+ step the inferior over it.
+
+`HAVE_CONTINUABLE_WATCHPOINT'
+ If defined to a non-zero value, it is possible to continue the
+ inferior after a watchpoint has been hit.
+
+`CANNOT_STEP_HW_WATCHPOINTS'
+ If this is defined to a non-zero value, GDB will remove all
+ watchpoints before stepping the inferior.
+
+`STOPPED_BY_WATCHPOINT (WAIT_STATUS)'
+ Return non-zero if stopped by a watchpoint. WAIT_STATUS is of the
+ type `struct target_waitstatus', defined by `target.h'. Normally,
+ this macro is defined to invoke the function pointed to by the
+ `to_stopped_by_watchpoint' member of the structure (of the type
+ `target_ops', defined on `target.h') that describes the
+ target-specific operations; `to_stopped_by_watchpoint' ignores the
+ WAIT_STATUS argument.
+
+ GDB does not require the non-zero value returned by
+ `STOPPED_BY_WATCHPOINT' to be 100% correct, so if a target cannot
+ determine for sure whether the inferior stopped due to a
+ watchpoint, it could return non-zero "just in case".
+
+3.9.1 x86 Watchpoints
+---------------------
+
+The 32-bit Intel x86 (a.k.a. ia32) processors feature special debug
+registers designed to facilitate debugging. GDB provides a generic
+library of functions that x86-based ports can use to implement support
+for watchpoints and hardware-assisted breakpoints. This subsection
+documents the x86 watchpoint facilities in GDB.
+
+ To use the generic x86 watchpoint support, a port should do the
+following:
+
+ * Define the macro `I386_USE_GENERIC_WATCHPOINTS' somewhere in the
+ target-dependent headers.
+
+ * Include the `config/i386/nm-i386.h' header file _after_ defining
+ `I386_USE_GENERIC_WATCHPOINTS'.
+
+ * Add `i386-nat.o' to the value of the Make variable `NATDEPFILES'
+ (*note NATDEPFILES: Native Debugging.) or `TDEPFILES' (*note
+ TDEPFILES: Target Architecture Definition.).
+
+ * Provide implementations for the `I386_DR_LOW_*' macros described
+ below. Typically, each macro should call a target-specific
+ function which does the real work.
+
+ The x86 watchpoint support works by maintaining mirror images of the
+debug registers. Values are copied between the mirror images and the
+real debug registers via a set of macros which each target needs to
+provide:
+
+`I386_DR_LOW_SET_CONTROL (VAL)'
+ Set the Debug Control (DR7) register to the value VAL.
+
+`I386_DR_LOW_SET_ADDR (IDX, ADDR)'
+ Put the address ADDR into the debug register number IDX.
+
+`I386_DR_LOW_RESET_ADDR (IDX)'
+ Reset (i.e. zero out) the address stored in the debug register
+ number IDX.
+
+`I386_DR_LOW_GET_STATUS'
+ Return the value of the Debug Status (DR6) register. This value is
+ used immediately after it is returned by `I386_DR_LOW_GET_STATUS',
+ so as to support per-thread status register values.
+
+ For each one of the 4 debug registers (whose indices are from 0 to 3)
+that store addresses, a reference count is maintained by GDB, to allow
+sharing of debug registers by several watchpoints. This allows users
+to define several watchpoints that watch the same expression, but with
+different conditions and/or commands, without wasting debug registers
+which are in short supply. GDB maintains the reference counts
+internally, targets don't have to do anything to use this feature.
+
+ The x86 debug registers can each watch a region that is 1, 2, or 4
+bytes long. The ia32 architecture requires that each watched region be
+appropriately aligned: 2-byte region on 2-byte boundary, 4-byte region
+on 4-byte boundary. However, the x86 watchpoint support in GDB can
+watch unaligned regions and regions larger than 4 bytes (up to 16
+bytes) by allocating several debug registers to watch a single region.
+This allocation of several registers per a watched region is also done
+automatically without target code intervention.
+
+ The generic x86 watchpoint support provides the following API for the
+GDB's application code:
+
+`i386_region_ok_for_watchpoint (ADDR, LEN)'
+ The macro `TARGET_REGION_OK_FOR_HW_WATCHPOINT' is set to call this
+ function. It counts the number of debug registers required to
+ watch a given region, and returns a non-zero value if that number
+ is less than 4, the number of debug registers available to x86
+ processors.
+
+`i386_stopped_data_address (ADDR_P)'
+ The target function `target_stopped_data_address' is set to call
+ this function. This function examines the breakpoint condition
+ bits in the DR6 Debug Status register, as returned by the
+ `I386_DR_LOW_GET_STATUS' macro, and returns the address associated
+ with the first bit that is set in DR6.
+
+`i386_stopped_by_watchpoint (void)'
+ The macro `STOPPED_BY_WATCHPOINT' is set to call this function.
+ The argument passed to `STOPPED_BY_WATCHPOINT' is ignored. This
+ function examines the breakpoint condition bits in the DR6 Debug
+ Status register, as returned by the `I386_DR_LOW_GET_STATUS'
+ macro, and returns true if any bit is set. Otherwise, false is
+ returned.
+
+`i386_insert_watchpoint (ADDR, LEN, TYPE)'
+`i386_remove_watchpoint (ADDR, LEN, TYPE)'
+ Insert or remove a watchpoint. The macros
+ `target_insert_watchpoint' and `target_remove_watchpoint' are set
+ to call these functions. `i386_insert_watchpoint' first looks for
+ a debug register which is already set to watch the same region for
+ the same access types; if found, it just increments the reference
+ count of that debug register, thus implementing debug register
+ sharing between watchpoints. If no such register is found, the
+ function looks for a vacant debug register, sets its mirrored
+ value to ADDR, sets the mirrored value of DR7 Debug Control
+ register as appropriate for the LEN and TYPE parameters, and then
+ passes the new values of the debug register and DR7 to the
+ inferior by calling `I386_DR_LOW_SET_ADDR' and
+ `I386_DR_LOW_SET_CONTROL'. If more than one debug register is
+ required to cover the given region, the above process is repeated
+ for each debug register.
+
+ `i386_remove_watchpoint' does the opposite: it resets the address
+ in the mirrored value of the debug register and its read/write and
+ length bits in the mirrored value of DR7, then passes these new
+ values to the inferior via `I386_DR_LOW_RESET_ADDR' and
+ `I386_DR_LOW_SET_CONTROL'. If a register is shared by several
+ watchpoints, each time a `i386_remove_watchpoint' is called, it
+ decrements the reference count, and only calls
+ `I386_DR_LOW_RESET_ADDR' and `I386_DR_LOW_SET_CONTROL' when the
+ count goes to zero.
+
+`i386_insert_hw_breakpoint (BP_TGT)'
+`i386_remove_hw_breakpoint (BP_TGT)'
+ These functions insert and remove hardware-assisted breakpoints.
+ The macros `target_insert_hw_breakpoint' and
+ `target_remove_hw_breakpoint' are set to call these functions.
+ The argument is a `struct bp_target_info *', as described in the
+ documentation for `target_insert_breakpoint'. These functions
+ work like `i386_insert_watchpoint' and `i386_remove_watchpoint',
+ respectively, except that they set up the debug registers to watch
+ instruction execution, and each hardware-assisted breakpoint
+ always requires exactly one debug register.
+
+`i386_stopped_by_hwbp (void)'
+ This function returns non-zero if the inferior has some watchpoint
+ or hardware breakpoint that triggered. It works like
+ `i386_stopped_data_address', except that it doesn't record the
+ address whose watchpoint triggered.
+
+`i386_cleanup_dregs (void)'
+ This function clears all the reference counts, addresses, and
+ control bits in the mirror images of the debug registers. It
+ doesn't affect the actual debug registers in the inferior process.
+
+*Notes:*
+ 1. x86 processors support setting watchpoints on I/O reads or writes.
+ However, since no target supports this (as of March 2001), and
+ since `enum target_hw_bp_type' doesn't even have an enumeration
+ for I/O watchpoints, this feature is not yet available to GDB
+ running on x86.
+
+ 2. x86 processors can enable watchpoints locally, for the current task
+ only, or globally, for all the tasks. For each debug register,
+ there's a bit in the DR7 Debug Control register that determines
+ whether the associated address is watched locally or globally. The
+ current implementation of x86 watchpoint support in GDB always
+ sets watchpoints to be locally enabled, since global watchpoints
+ might interfere with the underlying OS and are probably
+ unavailable in many platforms.
+
+3.10 Checkpoints
+================
+
+In the abstract, a checkpoint is a point in the execution history of
+the program, which the user may wish to return to at some later time.
+
+ Internally, a checkpoint is a saved copy of the program state,
+including whatever information is required in order to restore the
+program to that state at a later time. This can be expected to include
+the state of registers and memory, and may include external state such
+as the state of open files and devices.
+
+ There are a number of ways in which checkpoints may be implemented
+in gdb, e.g. as corefiles, as forked processes, and as some opaque
+method implemented on the target side.
+
+ A corefile can be used to save an image of target memory and register
+state, which can in principle be restored later -- but corefiles do not
+typically include information about external entities such as open
+files. Currently this method is not implemented in gdb.
+
+ A forked process can save the state of user memory and registers, as
+well as some subset of external (kernel) state. This method is used to
+implement checkpoints on Linux, and in principle might be used on other
+systems.
+
+ Some targets, e.g. simulators, might have their own built-in method
+for saving checkpoints, and gdb might be able to take advantage of that
+capability without necessarily knowing any details of how it is done.
+
+3.11 Observing changes in GDB internals
+=======================================
+
+In order to function properly, several modules need to be notified when
+some changes occur in the GDB internals. Traditionally, these modules
+have relied on several paradigms, the most common ones being hooks and
+gdb-events. Unfortunately, none of these paradigms was versatile
+enough to become the standard notification mechanism in GDB. The fact
+that they only supported one "client" was also a strong limitation.
+
+ A new paradigm, based on the Observer pattern of the `Design
+Patterns' book, has therefore been implemented. The goal was to provide
+a new interface overcoming the issues with the notification mechanisms
+previously available. This new interface needed to be strongly typed,
+easy to extend, and versatile enough to be used as the standard
+interface when adding new notifications.
+
+ See *Note GDB Observers:: for a brief description of the observers
+currently implemented in GDB. The rationale for the current
+implementation is also briefly discussed.
+
+\1f
+File: gdbint.info, Node: User Interface, Next: libgdb, Prev: Algorithms, Up: Top
+
+4 User Interface
+****************
+
+GDB has several user interfaces. Although the command-line interface
+is the most common and most familiar, there are others.
+
+4.1 Command Interpreter
+=======================
+
+The command interpreter in GDB is fairly simple. It is designed to
+allow for the set of commands to be augmented dynamically, and also has
+a recursive subcommand capability, where the first argument to a
+command may itself direct a lookup on a different command list.
+
+ For instance, the `set' command just starts a lookup on the
+`setlist' command list, while `set thread' recurses to the
+`set_thread_cmd_list'.
+
+ To add commands in general, use `add_cmd'. `add_com' adds to the
+main command list, and should be used for those commands. The usual
+place to add commands is in the `_initialize_XYZ' routines at the ends
+of most source files.
+
+ To add paired `set' and `show' commands, use `add_setshow_cmd' or
+`add_setshow_cmd_full'. The former is a slightly simpler interface
+which is useful when you don't need to further modify the new command
+structures, while the latter returns the new command structures for
+manipulation.
+
+ Before removing commands from the command set it is a good idea to
+deprecate them for some time. Use `deprecate_cmd' on commands or
+aliases to set the deprecated flag. `deprecate_cmd' takes a `struct
+cmd_list_element' as it's first argument. You can use the return value
+from `add_com' or `add_cmd' to deprecate the command immediately after
+it is created.
+
+ The first time a command is used the user will be warned and offered
+a replacement (if one exists). Note that the replacement string passed
+to `deprecate_cmd' should be the full name of the command, i.e. the
+entire string the user should type at the command line.
+
+4.2 UI-Independent Output--the `ui_out' Functions
+=================================================
+
+The `ui_out' functions present an abstraction level for the GDB output
+code. They hide the specifics of different user interfaces supported
+by GDB, and thus free the programmer from the need to write several
+versions of the same code, one each for every UI, to produce output.
+
+4.2.1 Overview and Terminology
+------------------------------
+
+In general, execution of each GDB command produces some sort of output,
+and can even generate an input request.
+
+ Output can be generated for the following purposes:
+
+ * to display a _result_ of an operation;
+
+ * to convey _info_ or produce side-effects of a requested operation;
+
+ * to provide a _notification_ of an asynchronous event (including
+ progress indication of a prolonged asynchronous operation);
+
+ * to display _error messages_ (including warnings);
+
+ * to show _debug data_;
+
+ * to _query_ or prompt a user for input (a special case).
+
+This section mainly concentrates on how to build result output,
+although some of it also applies to other kinds of output.
+
+ Generation of output that displays the results of an operation
+involves one or more of the following:
+
+ * output of the actual data
+
+ * formatting the output as appropriate for console output, to make it
+ easily readable by humans
+
+ * machine oriented formatting-a more terse formatting to allow for
+ easy parsing by programs which read GDB's output
+
+ * annotation, whose purpose is to help legacy GUIs to identify
+ interesting parts in the output
+
+ The `ui_out' routines take care of the first three aspects.
+Annotations are provided by separate annotation routines. Note that use
+of annotations for an interface between a GUI and GDB is deprecated.
+
+ Output can be in the form of a single item, which we call a "field";
+a "list" consisting of identical fields; a "tuple" consisting of
+non-identical fields; or a "table", which is a tuple consisting of a
+header and a body. In a BNF-like form:
+
+`<table> ==>'
+ `<header> <body>'
+
+`<header> ==>'
+ `{ <column> }'
+
+`<column> ==>'
+ `<width> <alignment> <title>'
+
+`<body> ==>'
+ `{<row>}'
+
+4.2.2 General Conventions
+-------------------------
+
+Most `ui_out' routines are of type `void', the exceptions are
+`ui_out_stream_new' (which returns a pointer to the newly created
+object) and the `make_cleanup' routines.
+
+ The first parameter is always the `ui_out' vector object, a pointer
+to a `struct ui_out'.
+
+ The FORMAT parameter is like in `printf' family of functions. When
+it is present, there must also be a variable list of arguments
+sufficient used to satisfy the `%' specifiers in the supplied format.
+
+ When a character string argument is not used in a `ui_out' function
+call, a `NULL' pointer has to be supplied instead.
+
+4.2.3 Table, Tuple and List Functions
+-------------------------------------
+
+This section introduces `ui_out' routines for building lists, tuples
+and tables. The routines to output the actual data items (fields) are
+presented in the next section.
+
+ To recap: A "tuple" is a sequence of "fields", each field containing
+information about an object; a "list" is a sequence of fields where
+each field describes an identical object.
+
+ Use the "table" functions when your output consists of a list of
+rows (tuples) and the console output should include a heading. Use this
+even when you are listing just one object but you still want the header.
+
+ Tables can not be nested. Tuples and lists can be nested up to a
+maximum of five levels.
+
+ The overall structure of the table output code is something like
+this:
+
+ ui_out_table_begin
+ ui_out_table_header
+ ...
+ ui_out_table_body
+ ui_out_tuple_begin
+ ui_out_field_*
+ ...
+ ui_out_tuple_end
+ ...
+ ui_out_table_end
+
+ Here is the description of table-, tuple- and list-related `ui_out'
+functions:
+
+ -- Function: void ui_out_table_begin (struct ui_out *UIOUT, int
+ NBROFCOLS, int NR_ROWS, const char *TBLID)
+ The function `ui_out_table_begin' marks the beginning of the output
+ of a table. It should always be called before any other `ui_out'
+ function for a given table. NBROFCOLS is the number of columns in
+ the table. NR_ROWS is the number of rows in the table. TBLID is
+ an optional string identifying the table. The string pointed to
+ by TBLID is copied by the implementation of `ui_out_table_begin',
+ so the application can free the string if it was `malloc'ed.
+
+ The companion function `ui_out_table_end', described below, marks
+ the end of the table's output.
+
+ -- Function: void ui_out_table_header (struct ui_out *UIOUT, int
+ WIDTH, enum ui_align ALIGNMENT, const char *COLHDR)
+ `ui_out_table_header' provides the header information for a single
+ table column. You call this function several times, one each for
+ every column of the table, after `ui_out_table_begin', but before
+ `ui_out_table_body'.
+
+ The value of WIDTH gives the column width in characters. The
+ value of ALIGNMENT is one of `left', `center', and `right', and it
+ specifies how to align the header: left-justify, center, or
+ right-justify it. COLHDR points to a string that specifies the
+ column header; the implementation copies that string, so column
+ header strings in `malloc'ed storage can be freed after the call.
+
+ -- Function: void ui_out_table_body (struct ui_out *UIOUT)
+ This function delimits the table header from the table body.
+
+ -- Function: void ui_out_table_end (struct ui_out *UIOUT)
+ This function signals the end of a table's output. It should be
+ called after the table body has been produced by the list and
+ field output functions.
+
+ There should be exactly one call to `ui_out_table_end' for each
+ call to `ui_out_table_begin', otherwise the `ui_out' functions
+ will signal an internal error.
+
+ The output of the tuples that represent the table rows must follow
+the call to `ui_out_table_body' and precede the call to
+`ui_out_table_end'. You build a tuple by calling `ui_out_tuple_begin'
+and `ui_out_tuple_end', with suitable calls to functions which actually
+output fields between them.
+
+ -- Function: void ui_out_tuple_begin (struct ui_out *UIOUT, const char
+ *ID)
+ This function marks the beginning of a tuple output. ID points to
+ an optional string that identifies the tuple; it is copied by the
+ implementation, and so strings in `malloc'ed storage can be freed
+ after the call.
+
+ -- Function: void ui_out_tuple_end (struct ui_out *UIOUT)
+ This function signals an end of a tuple output. There should be
+ exactly one call to `ui_out_tuple_end' for each call to
+ `ui_out_tuple_begin', otherwise an internal GDB error will be
+ signaled.
+
+ -- Function: struct cleanup *make_cleanup_ui_out_tuple_begin_end
+ (struct ui_out *UIOUT, const char *ID)
+ This function first opens the tuple and then establishes a cleanup
+ (*note Cleanups: Coding.) to close the tuple. It provides a
+ convenient and correct implementation of the non-portable(1) code
+ sequence:
+ struct cleanup *old_cleanup;
+ ui_out_tuple_begin (uiout, "...");
+ old_cleanup = make_cleanup ((void(*)(void *)) ui_out_tuple_end,
+ uiout);
+
+ -- Function: void ui_out_list_begin (struct ui_out *UIOUT, const char
+ *ID)
+ This function marks the beginning of a list output. ID points to
+ an optional string that identifies the list; it is copied by the
+ implementation, and so strings in `malloc'ed storage can be freed
+ after the call.
+
+ -- Function: void ui_out_list_end (struct ui_out *UIOUT)
+ This function signals an end of a list output. There should be
+ exactly one call to `ui_out_list_end' for each call to
+ `ui_out_list_begin', otherwise an internal GDB error will be
+ signaled.
+
+ -- Function: struct cleanup *make_cleanup_ui_out_list_begin_end
+ (struct ui_out *UIOUT, const char *ID)
+ Similar to `make_cleanup_ui_out_tuple_begin_end', this function
+ opens a list and then establishes cleanup (*note Cleanups: Coding.)
+ that will close the list.list.
+
+4.2.4 Item Output Functions
+---------------------------
+
+The functions described below produce output for the actual data items,
+or fields, which contain information about the object.
+
+ Choose the appropriate function accordingly to your particular needs.
+
+ -- Function: void ui_out_field_fmt (struct ui_out *UIOUT, char
+ *FLDNAME, char *FORMAT, ...)
+ This is the most general output function. It produces the
+ representation of the data in the variable-length argument list
+ according to formatting specifications in FORMAT, a `printf'-like
+ format string. The optional argument FLDNAME supplies the name of
+ the field. The data items themselves are supplied as additional
+ arguments after FORMAT.
+
+ This generic function should be used only when it is not possible
+ to use one of the specialized versions (see below).
+
+ -- Function: void ui_out_field_int (struct ui_out *UIOUT, const char
+ *FLDNAME, int VALUE)
+ This function outputs a value of an `int' variable. It uses the
+ `"%d"' output conversion specification. FLDNAME specifies the
+ name of the field.
+
+ -- Function: void ui_out_field_fmt_int (struct ui_out *UIOUT, int
+ WIDTH, enum ui_align ALIGNMENT, const char *FLDNAME, int
+ VALUE)
+ This function outputs a value of an `int' variable. It differs
+ from `ui_out_field_int' in that the caller specifies the desired
+ WIDTH and ALIGNMENT of the output. FLDNAME specifies the name of
+ the field.
+
+ -- Function: void ui_out_field_core_addr (struct ui_out *UIOUT, const
+ char *FLDNAME, CORE_ADDR ADDRESS)
+ This function outputs an address.
+
+ -- Function: void ui_out_field_string (struct ui_out *UIOUT, const
+ char *FLDNAME, const char *STRING)
+ This function outputs a string using the `"%s"' conversion
+ specification.
+
+ Sometimes, there's a need to compose your output piece by piece using
+functions that operate on a stream, such as `value_print' or
+`fprintf_symbol_filtered'. These functions accept an argument of the
+type `struct ui_file *', a pointer to a `ui_file' object used to store
+the data stream used for the output. When you use one of these
+functions, you need a way to pass their results stored in a `ui_file'
+object to the `ui_out' functions. To this end, you first create a
+`ui_stream' object by calling `ui_out_stream_new', pass the `stream'
+member of that `ui_stream' object to `value_print' and similar
+functions, and finally call `ui_out_field_stream' to output the field
+you constructed. When the `ui_stream' object is no longer needed, you
+should destroy it and free its memory by calling `ui_out_stream_delete'.
+
+ -- Function: struct ui_stream *ui_out_stream_new (struct ui_out *UIOUT)
+ This function creates a new `ui_stream' object which uses the same
+ output methods as the `ui_out' object whose pointer is passed in
+ UIOUT. It returns a pointer to the newly created `ui_stream'
+ object.
+
+ -- Function: void ui_out_stream_delete (struct ui_stream *STREAMBUF)
+ This functions destroys a `ui_stream' object specified by
+ STREAMBUF.
+
+ -- Function: void ui_out_field_stream (struct ui_out *UIOUT, const
+ char *FIELDNAME, struct ui_stream *STREAMBUF)
+ This function consumes all the data accumulated in
+ `streambuf->stream' and outputs it like `ui_out_field_string'
+ does. After a call to `ui_out_field_stream', the accumulated data
+ no longer exists, but the stream is still valid and may be used
+ for producing more fields.
+
+ *Important:* If there is any chance that your code could bail out
+before completing output generation and reaching the point where
+`ui_out_stream_delete' is called, it is necessary to set up a cleanup,
+to avoid leaking memory and other resources. Here's a skeleton code to
+do that:
+
+ struct ui_stream *mybuf = ui_out_stream_new (uiout);
+ struct cleanup *old = make_cleanup (ui_out_stream_delete, mybuf);
+ ...
+ do_cleanups (old);
+
+ If the function already has the old cleanup chain set (for other
+kinds of cleanups), you just have to add your cleanup to it:
+
+ mybuf = ui_out_stream_new (uiout);
+ make_cleanup (ui_out_stream_delete, mybuf);
+
+ Note that with cleanups in place, you should not call
+`ui_out_stream_delete' directly, or you would attempt to free the same
+buffer twice.
+
+4.2.5 Utility Output Functions
+------------------------------
+
+ -- Function: void ui_out_field_skip (struct ui_out *UIOUT, const char
+ *FLDNAME)
+ This function skips a field in a table. Use it if you have to
+ leave an empty field without disrupting the table alignment. The
+ argument FLDNAME specifies a name for the (missing) filed.
+
+ -- Function: void ui_out_text (struct ui_out *UIOUT, const char
+ *STRING)
+ This function outputs the text in STRING in a way that makes it
+ easy to be read by humans. For example, the console
+ implementation of this method filters the text through a built-in
+ pager, to prevent it from scrolling off the visible portion of the
+ screen.
+
+ Use this function for printing relatively long chunks of text
+ around the actual field data: the text it produces is not aligned
+ according to the table's format. Use `ui_out_field_string' to
+ output a string field, and use `ui_out_message', described below,
+ to output short messages.
+
+ -- Function: void ui_out_spaces (struct ui_out *UIOUT, int NSPACES)
+ This function outputs NSPACES spaces. It is handy to align the
+ text produced by `ui_out_text' with the rest of the table or list.
+
+ -- Function: void ui_out_message (struct ui_out *UIOUT, int VERBOSITY,
+ const char *FORMAT, ...)
+ This function produces a formatted message, provided that the
+ current verbosity level is at least as large as given by
+ VERBOSITY. The current verbosity level is specified by the user
+ with the `set verbositylevel' command.(2)
+
+ -- Function: void ui_out_wrap_hint (struct ui_out *UIOUT, char *INDENT)
+ This function gives the console output filter (a paging filter) a
+ hint of where to break lines which are too long. Ignored for all
+ other output consumers. INDENT, if non-`NULL', is the string to
+ be printed to indent the wrapped text on the next line; it must
+ remain accessible until the next call to `ui_out_wrap_hint', or
+ until an explicit newline is produced by one of the other
+ functions. If INDENT is `NULL', the wrapped text will not be
+ indented.
+
+ -- Function: void ui_out_flush (struct ui_out *UIOUT)
+ This function flushes whatever output has been accumulated so far,
+ if the UI buffers output.
+
+4.2.6 Examples of Use of `ui_out' functions
+-------------------------------------------
+
+This section gives some practical examples of using the `ui_out'
+functions to generalize the old console-oriented code in GDB. The
+examples all come from functions defined on the `breakpoints.c' file.
+
+ This example, from the `breakpoint_1' function, shows how to produce
+a table.
+
+ The original code was:
+
+ if (!found_a_breakpoint++)
+ {
+ annotate_breakpoints_headers ();
+
+ annotate_field (0);
+ printf_filtered ("Num ");
+ annotate_field (1);
+ printf_filtered ("Type ");
+ annotate_field (2);
+ printf_filtered ("Disp ");
+ annotate_field (3);
+ printf_filtered ("Enb ");
+ if (addressprint)
+ {
+ annotate_field (4);
+ printf_filtered ("Address ");
+ }
+ annotate_field (5);
+ printf_filtered ("What\n");
+
+ annotate_breakpoints_table ();
+ }
+
+ Here's the new version:
+
+ nr_printable_breakpoints = ...;
+
+ if (addressprint)
+ ui_out_table_begin (ui, 6, nr_printable_breakpoints, "BreakpointTable");
+ else
+ ui_out_table_begin (ui, 5, nr_printable_breakpoints, "BreakpointTable");
+
+ if (nr_printable_breakpoints > 0)
+ annotate_breakpoints_headers ();
+ if (nr_printable_breakpoints > 0)
+ annotate_field (0);
+ ui_out_table_header (uiout, 3, ui_left, "number", "Num"); /* 1 */
+ if (nr_printable_breakpoints > 0)
+ annotate_field (1);
+ ui_out_table_header (uiout, 14, ui_left, "type", "Type"); /* 2 */
+ if (nr_printable_breakpoints > 0)
+ annotate_field (2);
+ ui_out_table_header (uiout, 4, ui_left, "disp", "Disp"); /* 3 */
+ if (nr_printable_breakpoints > 0)
+ annotate_field (3);
+ ui_out_table_header (uiout, 3, ui_left, "enabled", "Enb"); /* 4 */
+ if (addressprint)
+ {
+ if (nr_printable_breakpoints > 0)
+ annotate_field (4);
+ if (TARGET_ADDR_BIT <= 32)
+ ui_out_table_header (uiout, 10, ui_left, "addr", "Address");/* 5 */
+ else
+ ui_out_table_header (uiout, 18, ui_left, "addr", "Address");/* 5 */
+ }
+ if (nr_printable_breakpoints > 0)
+ annotate_field (5);
+ ui_out_table_header (uiout, 40, ui_noalign, "what", "What"); /* 6 */
+ ui_out_table_body (uiout);
+ if (nr_printable_breakpoints > 0)
+ annotate_breakpoints_table ();
+
+ This example, from the `print_one_breakpoint' function, shows how to
+produce the actual data for the table whose structure was defined in
+the above example. The original code was:
+
+ annotate_record ();
+ annotate_field (0);
+ printf_filtered ("%-3d ", b->number);
+ annotate_field (1);
+ if ((int)b->type > (sizeof(bptypes)/sizeof(bptypes[0]))
+ || ((int) b->type != bptypes[(int) b->type].type))
+ internal_error ("bptypes table does not describe type #%d.",
+ (int)b->type);
+ printf_filtered ("%-14s ", bptypes[(int)b->type].description);
+ annotate_field (2);
+ printf_filtered ("%-4s ", bpdisps[(int)b->disposition]);
+ annotate_field (3);
+ printf_filtered ("%-3c ", bpenables[(int)b->enable]);
+ ...
+
+ This is the new version:
+
+ annotate_record ();
+ ui_out_tuple_begin (uiout, "bkpt");
+ annotate_field (0);
+ ui_out_field_int (uiout, "number", b->number);
+ annotate_field (1);
+ if (((int) b->type > (sizeof (bptypes) / sizeof (bptypes[0])))
+ || ((int) b->type != bptypes[(int) b->type].type))
+ internal_error ("bptypes table does not describe type #%d.",
+ (int) b->type);
+ ui_out_field_string (uiout, "type", bptypes[(int)b->type].description);
+ annotate_field (2);
+ ui_out_field_string (uiout, "disp", bpdisps[(int)b->disposition]);
+ annotate_field (3);
+ ui_out_field_fmt (uiout, "enabled", "%c", bpenables[(int)b->enable]);
+ ...
+
+ This example, also from `print_one_breakpoint', shows how to produce
+a complicated output field using the `print_expression' functions which
+requires a stream to be passed. It also shows how to automate stream
+destruction with cleanups. The original code was:
+
+ annotate_field (5);
+ print_expression (b->exp, gdb_stdout);
+
+ The new version is:
+
+ struct ui_stream *stb = ui_out_stream_new (uiout);
+ struct cleanup *old_chain = make_cleanup_ui_out_stream_delete (stb);
+ ...
+ annotate_field (5);
+ print_expression (b->exp, stb->stream);
+ ui_out_field_stream (uiout, "what", local_stream);
+
+ This example, also from `print_one_breakpoint', shows how to use
+`ui_out_text' and `ui_out_field_string'. The original code was:
+
+ annotate_field (5);
+ if (b->dll_pathname == NULL)
+ printf_filtered ("<any library> ");
+ else
+ printf_filtered ("library \"%s\" ", b->dll_pathname);
+
+ It became:
+
+ annotate_field (5);
+ if (b->dll_pathname == NULL)
+ {
+ ui_out_field_string (uiout, "what", "<any library>");
+ ui_out_spaces (uiout, 1);
+ }
+ else
+ {
+ ui_out_text (uiout, "library \"");
+ ui_out_field_string (uiout, "what", b->dll_pathname);
+ ui_out_text (uiout, "\" ");
+ }
+
+ The following example from `print_one_breakpoint' shows how to use
+`ui_out_field_int' and `ui_out_spaces'. The original code was:
+
+ annotate_field (5);
+ if (b->forked_inferior_pid != 0)
+ printf_filtered ("process %d ", b->forked_inferior_pid);
+
+ It became:
+
+ annotate_field (5);
+ if (b->forked_inferior_pid != 0)
+ {
+ ui_out_text (uiout, "process ");
+ ui_out_field_int (uiout, "what", b->forked_inferior_pid);
+ ui_out_spaces (uiout, 1);
+ }
+
+ Here's an example of using `ui_out_field_string'. The original code
+was:
+
+ annotate_field (5);
+ if (b->exec_pathname != NULL)
+ printf_filtered ("program \"%s\" ", b->exec_pathname);
+
+ It became:
+
+ annotate_field (5);
+ if (b->exec_pathname != NULL)
+ {
+ ui_out_text (uiout, "program \"");
+ ui_out_field_string (uiout, "what", b->exec_pathname);
+ ui_out_text (uiout, "\" ");
+ }
+
+ Finally, here's an example of printing an address. The original
+code:
+
+ annotate_field (4);
+ printf_filtered ("%s ",
+ hex_string_custom ((unsigned long) b->address, 8));
+
+ It became:
+
+ annotate_field (4);
+ ui_out_field_core_addr (uiout, "Address", b->address);
+
+4.3 Console Printing
+====================
+
+4.4 TUI
+=======
+
+---------- Footnotes ----------
+
+ (1) The function cast is not portable ISO C.
+
+ (2) As of this writing (April 2001), setting verbosity level is not
+yet implemented, and is always returned as zero. So calling
+`ui_out_message' with a VERBOSITY argument more than zero will cause
+the message to never be printed.
+
+\1f
+File: gdbint.info, Node: libgdb, Next: Symbol Handling, Prev: User Interface, Up: Top
+
+5 libgdb
+********
+
+5.1 libgdb 1.0
+==============
+
+`libgdb' 1.0 was an abortive project of years ago. The theory was to
+provide an API to GDB's functionality.
+
+5.2 libgdb 2.0
+==============
+
+`libgdb' 2.0 is an ongoing effort to update GDB so that is better able
+to support graphical and other environments.
+
+ Since `libgdb' development is on-going, its architecture is still
+evolving. The following components have so far been identified:
+
+ * Observer - `gdb-events.h'.
+
+ * Builder - `ui-out.h'
+
+ * Event Loop - `event-loop.h'
+
+ * Library - `gdb.h'
+
+ The model that ties these components together is described below.
+
+5.3 The `libgdb' Model
+======================
+
+A client of `libgdb' interacts with the library in two ways.
+
+ * As an observer (using `gdb-events') receiving notifications from
+ `libgdb' of any internal state changes (break point changes, run
+ state, etc).
+
+ * As a client querying `libgdb' (using the `ui-out' builder) to
+ obtain various status values from GDB.
+
+ Since `libgdb' could have multiple clients (e.g., a GUI supporting
+the existing GDB CLI), those clients must co-operate when controlling
+`libgdb'. In particular, a client must ensure that `libgdb' is idle
+(i.e. no other client is using `libgdb') before responding to a
+`gdb-event' by making a query.
+
+5.4 CLI support
+===============
+
+At present GDB's CLI is very much entangled in with the core of
+`libgdb'. Consequently, a client wishing to include the CLI in their
+interface needs to carefully co-ordinate its own and the CLI's
+requirements.
+
+ It is suggested that the client set `libgdb' up to be bi-modal
+(alternate between CLI and client query modes). The notes below sketch
+out the theory:
+
+ * The client registers itself as an observer of `libgdb'.
+
+ * The client create and install `cli-out' builder using its own
+ versions of the `ui-file' `gdb_stderr', `gdb_stdtarg' and
+ `gdb_stdout' streams.
+
+ * The client creates a separate custom `ui-out' builder that is only
+ used while making direct queries to `libgdb'.
+
+ When the client receives input intended for the CLI, it simply
+passes it along. Since the `cli-out' builder is installed by default,
+all the CLI output in response to that command is routed (pronounced
+rooted) through to the client controlled `gdb_stdout' et. al. streams.
+At the same time, the client is kept abreast of internal changes by
+virtue of being a `libgdb' observer.
+
+ The only restriction on the client is that it must wait until
+`libgdb' becomes idle before initiating any queries (using the client's
+custom builder).
+
+5.5 `libgdb' components
+=======================
+
+Observer - `gdb-events.h'
+-------------------------
+
+`gdb-events' provides the client with a very raw mechanism that can be
+used to implement an observer. At present it only allows for one
+observer and that observer must, internally, handle the need to delay
+the processing of any event notifications until after `libgdb' has
+finished the current command.
+
+Builder - `ui-out.h'
+--------------------
+
+`ui-out' provides the infrastructure necessary for a client to create a
+builder. That builder is then passed down to `libgdb' when doing any
+queries.
+
+Event Loop - `event-loop.h'
+---------------------------
+
+`event-loop', currently non-re-entrant, provides a simple event loop.
+A client would need to either plug its self into this loop or,
+implement a new event-loop that GDB would use.
+
+ The event-loop will eventually be made re-entrant. This is so that
+GDB can better handle the problem of some commands blocking instead of
+returning.
+
+Library - `gdb.h'
+-----------------
+
+`libgdb' is the most obvious component of this system. It provides the
+query interface. Each function is parameterized by a `ui-out' builder.
+The result of the query is constructed using that builder before the
+query function returns.
+
+\1f
+File: gdbint.info, Node: Symbol Handling, Next: Language Support, Prev: libgdb, Up: Top
+
+6 Symbol Handling
+*****************
+
+Symbols are a key part of GDB's operation. Symbols include variables,
+functions, and types.
+
+6.1 Symbol Reading
+==================
+
+GDB reads symbols from "symbol files". The usual symbol file is the
+file containing the program which GDB is debugging. GDB can be
+directed to use a different file for symbols (with the `symbol-file'
+command), and it can also read more symbols via the `add-file' and
+`load' commands, or while reading symbols from shared libraries.
+
+ Symbol files are initially opened by code in `symfile.c' using the
+BFD library (*note Support Libraries::). BFD identifies the type of
+the file by examining its header. `find_sym_fns' then uses this
+identification to locate a set of symbol-reading functions.
+
+ Symbol-reading modules identify themselves to GDB by calling
+`add_symtab_fns' during their module initialization. The argument to
+`add_symtab_fns' is a `struct sym_fns' which contains the name (or name
+prefix) of the symbol format, the length of the prefix, and pointers to
+four functions. These functions are called at various times to process
+symbol files whose identification matches the specified prefix.
+
+ The functions supplied by each module are:
+
+`XYZ_symfile_init(struct sym_fns *sf)'
+ Called from `symbol_file_add' when we are about to read a new
+ symbol file. This function should clean up any internal state
+ (possibly resulting from half-read previous files, for example)
+ and prepare to read a new symbol file. Note that the symbol file
+ which we are reading might be a new "main" symbol file, or might
+ be a secondary symbol file whose symbols are being added to the
+ existing symbol table.
+
+ The argument to `XYZ_symfile_init' is a newly allocated `struct
+ sym_fns' whose `bfd' field contains the BFD for the new symbol
+ file being read. Its `private' field has been zeroed, and can be
+ modified as desired. Typically, a struct of private information
+ will be `malloc''d, and a pointer to it will be placed in the
+ `private' field.
+
+ There is no result from `XYZ_symfile_init', but it can call
+ `error' if it detects an unavoidable problem.
+
+`XYZ_new_init()'
+ Called from `symbol_file_add' when discarding existing symbols.
+ This function needs only handle the symbol-reading module's
+ internal state; the symbol table data structures visible to the
+ rest of GDB will be discarded by `symbol_file_add'. It has no
+ arguments and no result. It may be called after
+ `XYZ_symfile_init', if a new symbol table is being read, or may be
+ called alone if all symbols are simply being discarded.
+
+`XYZ_symfile_read(struct sym_fns *sf, CORE_ADDR addr, int mainline)'
+ Called from `symbol_file_add' to actually read the symbols from a
+ symbol-file into a set of psymtabs or symtabs.
+
+ `sf' points to the `struct sym_fns' originally passed to
+ `XYZ_sym_init' for possible initialization. `addr' is the offset
+ between the file's specified start address and its true address in
+ memory. `mainline' is 1 if this is the main symbol table being
+ read, and 0 if a secondary symbol file (e.g., shared library or
+ dynamically loaded file) is being read.
+
+ In addition, if a symbol-reading module creates psymtabs when
+XYZ_symfile_read is called, these psymtabs will contain a pointer to a
+function `XYZ_psymtab_to_symtab', which can be called from any point in
+the GDB symbol-handling code.
+
+`XYZ_psymtab_to_symtab (struct partial_symtab *pst)'
+ Called from `psymtab_to_symtab' (or the `PSYMTAB_TO_SYMTAB' macro)
+ if the psymtab has not already been read in and had its
+ `pst->symtab' pointer set. The argument is the psymtab to be
+ fleshed-out into a symtab. Upon return, `pst->readin' should have
+ been set to 1, and `pst->symtab' should contain a pointer to the
+ new corresponding symtab, or zero if there were no symbols in that
+ part of the symbol file.
+
+6.2 Partial Symbol Tables
+=========================
+
+GDB has three types of symbol tables:
+
+ * Full symbol tables ("symtabs"). These contain the main
+ information about symbols and addresses.
+
+ * Partial symbol tables ("psymtabs"). These contain enough
+ information to know when to read the corresponding part of the full
+ symbol table.
+
+ * Minimal symbol tables ("msymtabs"). These contain information
+ gleaned from non-debugging symbols.
+
+ This section describes partial symbol tables.
+
+ A psymtab is constructed by doing a very quick pass over an
+executable file's debugging information. Small amounts of information
+are extracted--enough to identify which parts of the symbol table will
+need to be re-read and fully digested later, when the user needs the
+information. The speed of this pass causes GDB to start up very
+quickly. Later, as the detailed rereading occurs, it occurs in small
+pieces, at various times, and the delay therefrom is mostly invisible to
+the user.
+
+ The symbols that show up in a file's psymtab should be, roughly,
+those visible to the debugger's user when the program is not running
+code from that file. These include external symbols and types, static
+symbols and types, and `enum' values declared at file scope.
+
+ The psymtab also contains the range of instruction addresses that the
+full symbol table would represent.
+
+ The idea is that there are only two ways for the user (or much of the
+code in the debugger) to reference a symbol:
+
+ * By its address (e.g., execution stops at some address which is
+ inside a function in this file). The address will be noticed to
+ be in the range of this psymtab, and the full symtab will be read
+ in. `find_pc_function', `find_pc_line', and other `find_pc_...'
+ functions handle this.
+
+ * By its name (e.g., the user asks to print a variable, or set a
+ breakpoint on a function). Global names and file-scope names will
+ be found in the psymtab, which will cause the symtab to be pulled
+ in. Local names will have to be qualified by a global name, or a
+ file-scope name, in which case we will have already read in the
+ symtab as we evaluated the qualifier. Or, a local symbol can be
+ referenced when we are "in" a local scope, in which case the first
+ case applies. `lookup_symbol' does most of the work here.
+
+ The only reason that psymtabs exist is to cause a symtab to be read
+in at the right moment. Any symbol that can be elided from a psymtab,
+while still causing that to happen, should not appear in it. Since
+psymtabs don't have the idea of scope, you can't put local symbols in
+them anyway. Psymtabs don't have the idea of the type of a symbol,
+either, so types need not appear, unless they will be referenced by
+name.
+
+ It is a bug for GDB to behave one way when only a psymtab has been
+read, and another way if the corresponding symtab has been read in.
+Such bugs are typically caused by a psymtab that does not contain all
+the visible symbols, or which has the wrong instruction address ranges.
+
+ The psymtab for a particular section of a symbol file (objfile)
+could be thrown away after the symtab has been read in. The symtab
+should always be searched before the psymtab, so the psymtab will never
+be used (in a bug-free environment). Currently, psymtabs are allocated
+on an obstack, and all the psymbols themselves are allocated in a pair
+of large arrays on an obstack, so there is little to be gained by
+trying to free them unless you want to do a lot more work.
+
+6.3 Types
+=========
+
+Fundamental Types (e.g., `FT_VOID', `FT_BOOLEAN').
+--------------------------------------------------
+
+These are the fundamental types that GDB uses internally. Fundamental
+types from the various debugging formats (stabs, ELF, etc) are mapped
+into one of these. They are basically a union of all fundamental types
+that GDB knows about for all the languages that GDB knows about.
+
+Type Codes (e.g., `TYPE_CODE_PTR', `TYPE_CODE_ARRAY').
+------------------------------------------------------
+
+Each time GDB builds an internal type, it marks it with one of these
+types. The type may be a fundamental type, such as `TYPE_CODE_INT', or
+a derived type, such as `TYPE_CODE_PTR' which is a pointer to another
+type. Typically, several `FT_*' types map to one `TYPE_CODE_*' type,
+and are distinguished by other members of the type struct, such as
+whether the type is signed or unsigned, and how many bits it uses.
+
+Builtin Types (e.g., `builtin_type_void', `builtin_type_char').
+---------------------------------------------------------------
+
+These are instances of type structs that roughly correspond to
+fundamental types and are created as global types for GDB to use for
+various ugly historical reasons. We eventually want to eliminate
+these. Note for example that `builtin_type_int' initialized in
+`gdbtypes.c' is basically the same as a `TYPE_CODE_INT' type that is
+initialized in `c-lang.c' for an `FT_INTEGER' fundamental type. The
+difference is that the `builtin_type' is not associated with any
+particular objfile, and only one instance exists, while `c-lang.c'
+builds as many `TYPE_CODE_INT' types as needed, with each one
+associated with some particular objfile.
+
+6.4 Object File Formats
+=======================
+
+6.4.1 a.out
+-----------
+
+The `a.out' format is the original file format for Unix. It consists
+of three sections: `text', `data', and `bss', which are for program
+code, initialized data, and uninitialized data, respectively.
+
+ The `a.out' format is so simple that it doesn't have any reserved
+place for debugging information. (Hey, the original Unix hackers used
+`adb', which is a machine-language debugger!) The only debugging
+format for `a.out' is stabs, which is encoded as a set of normal
+symbols with distinctive attributes.
+
+ The basic `a.out' reader is in `dbxread.c'.
+
+6.4.2 COFF
+----------
+
+The COFF format was introduced with System V Release 3 (SVR3) Unix.
+COFF files may have multiple sections, each prefixed by a header. The
+number of sections is limited.
+
+ The COFF specification includes support for debugging. Although this
+was a step forward, the debugging information was woefully limited. For
+instance, it was not possible to represent code that came from an
+included file.
+
+ The COFF reader is in `coffread.c'.
+
+6.4.3 ECOFF
+-----------
+
+ECOFF is an extended COFF originally introduced for Mips and Alpha
+workstations.
+
+ The basic ECOFF reader is in `mipsread.c'.
+
+6.4.4 XCOFF
+-----------
+
+The IBM RS/6000 running AIX uses an object file format called XCOFF.
+The COFF sections, symbols, and line numbers are used, but debugging
+symbols are `dbx'-style stabs whose strings are located in the `.debug'
+section (rather than the string table). For more information, see
+*Note Top: (stabs)Top.
+
+ The shared library scheme has a clean interface for figuring out what
+shared libraries are in use, but the catch is that everything which
+refers to addresses (symbol tables and breakpoints at least) needs to be
+relocated for both shared libraries and the main executable. At least
+using the standard mechanism this can only be done once the program has
+been run (or the core file has been read).
+
+6.4.5 PE
+--------
+
+Windows 95 and NT use the PE ("Portable Executable") format for their
+executables. PE is basically COFF with additional headers.
+
+ While BFD includes special PE support, GDB needs only the basic COFF
+reader.
+
+6.4.6 ELF
+---------
+
+The ELF format came with System V Release 4 (SVR4) Unix. ELF is similar
+to COFF in being organized into a number of sections, but it removes
+many of COFF's limitations.
+
+ The basic ELF reader is in `elfread.c'.
+
+6.4.7 SOM
+---------
+
+SOM is HP's object file and debug format (not to be confused with IBM's
+SOM, which is a cross-language ABI).
+
+ The SOM reader is in `hpread.c'.
+
+6.4.8 Other File Formats
+------------------------
+
+Other file formats that have been supported by GDB include Netware
+Loadable Modules (`nlmread.c').
+
+6.5 Debugging File Formats
+==========================
+
+This section describes characteristics of debugging information that
+are independent of the object file format.
+
+6.5.1 stabs
+-----------
+
+`stabs' started out as special symbols within the `a.out' format.
+Since then, it has been encapsulated into other file formats, such as
+COFF and ELF.
+
+ While `dbxread.c' does some of the basic stab processing, including
+for encapsulated versions, `stabsread.c' does the real work.
+
+6.5.2 COFF
+----------
+
+The basic COFF definition includes debugging information. The level of
+support is minimal and non-extensible, and is not often used.
+
+6.5.3 Mips debug (Third Eye)
+----------------------------
+
+ECOFF includes a definition of a special debug format.
+
+ The file `mdebugread.c' implements reading for this format.
+
+6.5.4 DWARF 1
+-------------
+
+DWARF 1 is a debugging format that was originally designed to be used
+with ELF in SVR4 systems.
+
+ The DWARF 1 reader is in `dwarfread.c'.
+
+6.5.5 DWARF 2
+-------------
+
+DWARF 2 is an improved but incompatible version of DWARF 1.
+
+ The DWARF 2 reader is in `dwarf2read.c'.
+
+6.5.6 SOM
+---------
+
+Like COFF, the SOM definition includes debugging information.
+
+6.6 Adding a New Symbol Reader to GDB
+=====================================
+
+If you are using an existing object file format (`a.out', COFF, ELF,
+etc), there is probably little to be done.
+
+ If you need to add a new object file format, you must first add it to
+BFD. This is beyond the scope of this document.
+
+ You must then arrange for the BFD code to provide access to the
+debugging symbols. Generally GDB will have to call swapping routines
+from BFD and a few other BFD internal routines to locate the debugging
+information. As much as possible, GDB should not depend on the BFD
+internal data structures.
+
+ For some targets (e.g., COFF), there is a special transfer vector
+used to call swapping routines, since the external data structures on
+various platforms have different sizes and layouts. Specialized
+routines that will only ever be implemented by one object file format
+may be called directly. This interface should be described in a file
+`bfd/libXYZ.h', which is included by GDB.
+
+6.7 Memory Management for Symbol Files
+======================================
+
+Most memory associated with a loaded symbol file is stored on its
+`objfile_obstack'. This includes symbols, types, namespace data, and
+other information produced by the symbol readers.
+
+ Because this data lives on the objfile's obstack, it is automatically
+released when the objfile is unloaded or reloaded. Therefore one
+objfile must not reference symbol or type data from another objfile;
+they could be unloaded at different times.
+
+ User convenience variables, et cetera, have associated types.
+Normally these types live in the associated objfile. However, when the
+objfile is unloaded, those types are deep copied to global memory, so
+that the values of the user variables and history items are not lost.
+
+\1f
+File: gdbint.info, Node: Language Support, Next: Host Definition, Prev: Symbol Handling, Up: Top
+
+7 Language Support
+******************
+
+GDB's language support is mainly driven by the symbol reader, although
+it is possible for the user to set the source language manually.
+
+ GDB chooses the source language by looking at the extension of the
+file recorded in the debug info; `.c' means C, `.f' means Fortran, etc.
+It may also use a special-purpose language identifier if the debug
+format supports it, like with DWARF.
+
+7.1 Adding a Source Language to GDB
+===================================
+
+To add other languages to GDB's expression parser, follow the following
+steps:
+
+_Create the expression parser._
+ This should reside in a file `LANG-exp.y'. Routines for building
+ parsed expressions into a `union exp_element' list are in
+ `parse.c'.
+
+ Since we can't depend upon everyone having Bison, and YACC produces
+ parsers that define a bunch of global names, the following lines
+ *must* be included at the top of the YACC parser, to prevent the
+ various parsers from defining the same global names:
+
+ #define yyparse LANG_parse
+ #define yylex LANG_lex
+ #define yyerror LANG_error
+ #define yylval LANG_lval
+ #define yychar LANG_char
+ #define yydebug LANG_debug
+ #define yypact LANG_pact
+ #define yyr1 LANG_r1
+ #define yyr2 LANG_r2
+ #define yydef LANG_def
+ #define yychk LANG_chk
+ #define yypgo LANG_pgo
+ #define yyact LANG_act
+ #define yyexca LANG_exca
+ #define yyerrflag LANG_errflag
+ #define yynerrs LANG_nerrs
+
+ At the bottom of your parser, define a `struct language_defn' and
+ initialize it with the right values for your language. Define an
+ `initialize_LANG' routine and have it call
+ `add_language(LANG_language_defn)' to tell the rest of GDB that
+ your language exists. You'll need some other supporting variables
+ and functions, which will be used via pointers from your
+ `LANG_language_defn'. See the declaration of `struct
+ language_defn' in `language.h', and the other `*-exp.y' files, for
+ more information.
+
+_Add any evaluation routines, if necessary_
+ If you need new opcodes (that represent the operations of the
+ language), add them to the enumerated type in `expression.h'. Add
+ support code for these operations in the `evaluate_subexp' function
+ defined in the file `eval.c'. Add cases for new opcodes in two
+ functions from `parse.c': `prefixify_subexp' and
+ `length_of_subexp'. These compute the number of `exp_element's
+ that a given operation takes up.
+
+_Update some existing code_
+ Add an enumerated identifier for your language to the enumerated
+ type `enum language' in `defs.h'.
+
+ Update the routines in `language.c' so your language is included.
+ These routines include type predicates and such, which (in some
+ cases) are language dependent. If your language does not appear
+ in the switch statement, an error is reported.
+
+ Also included in `language.c' is the code that updates the variable
+ `current_language', and the routines that translate the
+ `language_LANG' enumerated identifier into a printable string.
+
+ Update the function `_initialize_language' to include your
+ language. This function picks the default language upon startup,
+ so is dependent upon which languages that GDB is built for.
+
+ Update `allocate_symtab' in `symfile.c' and/or symbol-reading code
+ so that the language of each symtab (source file) is set properly.
+ This is used to determine the language to use at each stack frame
+ level. Currently, the language is set based upon the extension of
+ the source file. If the language can be better inferred from the
+ symbol information, please set the language of the symtab in the
+ symbol-reading code.
+
+ Add helper code to `print_subexp' (in `expprint.c') to handle any
+ new expression opcodes you have added to `expression.h'. Also,
+ add the printed representations of your operators to
+ `op_print_tab'.
+
+_Add a place of call_
+ Add a call to `LANG_parse()' and `LANG_error' in `parse_exp_1'
+ (defined in `parse.c').
+
+_Use macros to trim code_
+ The user has the option of building GDB for some or all of the
+ languages. If the user decides to build GDB for the language
+ LANG, then every file dependent on `language.h' will have the
+ macro `_LANG_LANG' defined in it. Use `#ifdef's to leave out
+ large routines that the user won't need if he or she is not using
+ your language.
+
+ Note that you do not need to do this in your YACC parser, since if
+ GDB is not build for LANG, then `LANG-exp.tab.o' (the compiled
+ form of your parser) is not linked into GDB at all.
+
+ See the file `configure.in' for how GDB is configured for
+ different languages.
+
+_Edit `Makefile.in'_
+ Add dependencies in `Makefile.in'. Make sure you update the macro
+ variables such as `HFILES' and `OBJS', otherwise your code may not
+ get linked in, or, worse yet, it may not get `tar'red into the
+ distribution!
+
+\1f
+File: gdbint.info, Node: Host Definition, Next: Target Architecture Definition, Prev: Language Support, Up: Top
+
+8 Host Definition
+*****************
+
+With the advent of Autoconf, it's rarely necessary to have host
+definition machinery anymore. The following information is provided,
+mainly, as an historical reference.
+
+8.1 Adding a New Host
+=====================
+
+GDB's host configuration support normally happens via Autoconf. New
+host-specific definitions should not be needed. Older hosts GDB still
+use the host-specific definitions and files listed below, but these
+mostly exist for historical reasons, and will eventually disappear.
+
+`gdb/config/ARCH/XYZ.mh'
+ This file once contained both host and native configuration
+ information (*note Native Debugging::) for the machine XYZ. The
+ host configuration information is now handed by Autoconf.
+
+ Host configuration information included a definition of
+ `XM_FILE=xm-XYZ.h' and possibly definitions for `CC',
+ `SYSV_DEFINE', `XM_CFLAGS', `XM_ADD_FILES', `XM_CLIBS',
+ `XM_CDEPS', etc.; see `Makefile.in'.
+
+ New host only configurations do not need this file.
+
+`gdb/config/ARCH/xm-XYZ.h'
+ This file once contained definitions and includes required when
+ hosting gdb on machine XYZ. Those definitions and includes are now
+ handled by Autoconf.
+
+ New host and native configurations do not need this file.
+
+ _Maintainer's note: Some hosts continue to use the `xm-xyz.h' file
+ to define the macros HOST_FLOAT_FORMAT, HOST_DOUBLE_FORMAT and
+ HOST_LONG_DOUBLE_FORMAT. That code also needs to be replaced with
+ either an Autoconf or run-time test._
+
+
+Generic Host Support Files
+--------------------------
+
+There are some "generic" versions of routines that can be used by
+various systems. These can be customized in various ways by macros
+defined in your `xm-XYZ.h' file. If these routines work for the XYZ
+host, you can just include the generic file's name (with `.o', not
+`.c') in `XDEPFILES'.
+
+ Otherwise, if your machine needs custom support routines, you will
+need to write routines that perform the same functions as the generic
+file. Put them into `XYZ-xdep.c', and put `XYZ-xdep.o' into
+`XDEPFILES'.
+
+`ser-unix.c'
+ This contains serial line support for Unix systems. This is always
+ included, via the makefile variable `SER_HARDWIRE'; override this
+ variable in the `.mh' file to avoid it.
+
+`ser-go32.c'
+ This contains serial line support for 32-bit programs running
+ under DOS, using the DJGPP (a.k.a. GO32) execution environment.
+
+`ser-tcp.c'
+ This contains generic TCP support using sockets.
+
+8.2 Host Conditionals
+=====================
+
+When GDB is configured and compiled, various macros are defined or left
+undefined, to control compilation based on the attributes of the host
+system. These macros and their meanings (or if the meaning is not
+documented here, then one of the source files where they are used is
+indicated) are:
+
+`GDBINIT_FILENAME'
+ The default name of GDB's initialization file (normally
+ `.gdbinit').
+
+`NO_STD_REGS'
+ This macro is deprecated.
+
+`SIGWINCH_HANDLER'
+ If your host defines `SIGWINCH', you can define this to be the name
+ of a function to be called if `SIGWINCH' is received.
+
+`SIGWINCH_HANDLER_BODY'
+ Define this to expand into code that will define the function
+ named by the expansion of `SIGWINCH_HANDLER'.
+
+`ALIGN_STACK_ON_STARTUP'
+ Define this if your system is of a sort that will crash in
+ `tgetent' if the stack happens not to be longword-aligned when
+ `main' is called. This is a rare situation, but is known to occur
+ on several different types of systems.
+
+`CRLF_SOURCE_FILES'
+ Define this if host files use `\r\n' rather than `\n' as a line
+ terminator. This will cause source file listings to omit `\r'
+ characters when printing and it will allow `\r\n' line endings of
+ files which are "sourced" by gdb. It must be possible to open
+ files in binary mode using `O_BINARY' or, for fopen, `"rb"'.
+
+`DEFAULT_PROMPT'
+ The default value of the prompt string (normally `"(gdb) "').
+
+`DEV_TTY'
+ The name of the generic TTY device, defaults to `"/dev/tty"'.
+
+`FOPEN_RB'
+ Define this if binary files are opened the same way as text files.
+
+`HAVE_MMAP'
+ In some cases, use the system call `mmap' for reading symbol
+ tables. For some machines this allows for sharing and quick
+ updates.
+
+`HAVE_TERMIO'
+ Define this if the host system has `termio.h'.
+
+`INT_MAX'
+`INT_MIN'
+`LONG_MAX'
+`UINT_MAX'
+`ULONG_MAX'
+ Values for host-side constants.
+
+`ISATTY'
+ Substitute for isatty, if not available.
+
+`LONGEST'
+ This is the longest integer type available on the host. If not
+ defined, it will default to `long long' or `long', depending on
+ `CC_HAS_LONG_LONG'.
+
+`CC_HAS_LONG_LONG'
+ Define this if the host C compiler supports `long long'. This is
+ set by the `configure' script.
+
+`PRINTF_HAS_LONG_LONG'
+ Define this if the host can handle printing of long long integers
+ via the printf format conversion specifier `ll'. This is set by
+ the `configure' script.
+
+`HAVE_LONG_DOUBLE'
+ Define this if the host C compiler supports `long double'. This is
+ set by the `configure' script.
+
+`PRINTF_HAS_LONG_DOUBLE'
+ Define this if the host can handle printing of long double
+ float-point numbers via the printf format conversion specifier
+ `Lg'. This is set by the `configure' script.
+
+`SCANF_HAS_LONG_DOUBLE'
+ Define this if the host can handle the parsing of long double
+ float-point numbers via the scanf format conversion specifier
+ `Lg'. This is set by the `configure' script.
+
+`LSEEK_NOT_LINEAR'
+ Define this if `lseek (n)' does not necessarily move to byte number
+ `n' in the file. This is only used when reading source files. It
+ is normally faster to define `CRLF_SOURCE_FILES' when possible.
+
+`L_SET'
+ This macro is used as the argument to `lseek' (or, most commonly,
+ `bfd_seek'). FIXME, should be replaced by SEEK_SET instead, which
+ is the POSIX equivalent.
+
+`NORETURN'
+ If defined, this should be one or more tokens, such as `volatile',
+ that can be used in both the declaration and definition of
+ functions to indicate that they never return. The default is
+ already set correctly if compiling with GCC. This will almost
+ never need to be defined.
+
+`ATTR_NORETURN'
+ If defined, this should be one or more tokens, such as
+ `__attribute__ ((noreturn))', that can be used in the declarations
+ of functions to indicate that they never return. The default is
+ already set correctly if compiling with GCC. This will almost
+ never need to be defined.
+
+`SEEK_CUR'
+`SEEK_SET'
+ Define these to appropriate value for the system `lseek', if not
+ already defined.
+
+`STOP_SIGNAL'
+ This is the signal for stopping GDB. Defaults to `SIGTSTP'.
+ (Only redefined for the Convex.)
+
+`USG'
+ Means that System V (prior to SVR4) include files are in use.
+ (FIXME: This symbol is abused in `infrun.c', `regex.c', and
+ `utils.c' for other things, at the moment.)
+
+`lint'
+ Define this to help placate `lint' in some situations.
+
+`volatile'
+ Define this to override the defaults of `__volatile__' or `/**/'.
+
+\1f
+File: gdbint.info, Node: Target Architecture Definition, Next: Target Vector Definition, Prev: Host Definition, Up: Top
+
+9 Target Architecture Definition
+********************************
+
+GDB's target architecture defines what sort of machine-language
+programs GDB can work with, and how it works with them.
+
+ The target architecture object is implemented as the C structure
+`struct gdbarch *'. The structure, and its methods, are generated
+using the Bourne shell script `gdbarch.sh'.
+
+9.1 Operating System ABI Variant Handling
+=========================================
+
+GDB provides a mechanism for handling variations in OS ABIs. An OS ABI
+variant may have influence over any number of variables in the target
+architecture definition. There are two major components in the OS ABI
+mechanism: sniffers and handlers.
+
+ A "sniffer" examines a file matching a BFD architecture/flavour pair
+(the architecture may be wildcarded) in an attempt to determine the OS
+ABI of that file. Sniffers with a wildcarded architecture are
+considered to be "generic", while sniffers for a specific architecture
+are considered to be "specific". A match from a specific sniffer
+overrides a match from a generic sniffer. Multiple sniffers for an
+architecture/flavour may exist, in order to differentiate between two
+different operating systems which use the same basic file format. The
+OS ABI framework provides a generic sniffer for ELF-format files which
+examines the `EI_OSABI' field of the ELF header, as well as note
+sections known to be used by several operating systems.
+
+ A "handler" is used to fine-tune the `gdbarch' structure for the
+selected OS ABI. There may be only one handler for a given OS ABI for
+each BFD architecture.
+
+ The following OS ABI variants are defined in `osabi.h':
+
+`GDB_OSABI_UNKNOWN'
+ The ABI of the inferior is unknown. The default `gdbarch'
+ settings for the architecture will be used.
+
+`GDB_OSABI_SVR4'
+ UNIX System V Release 4
+
+`GDB_OSABI_HURD'
+ GNU using the Hurd kernel
+
+`GDB_OSABI_SOLARIS'
+ Sun Solaris
+
+`GDB_OSABI_OSF1'
+ OSF/1, including Digital UNIX and Compaq Tru64 UNIX
+
+`GDB_OSABI_LINUX'
+ GNU using the Linux kernel
+
+`GDB_OSABI_FREEBSD_AOUT'
+ FreeBSD using the a.out executable format
+
+`GDB_OSABI_FREEBSD_ELF'
+ FreeBSD using the ELF executable format
+
+`GDB_OSABI_NETBSD_AOUT'
+ NetBSD using the a.out executable format
+
+`GDB_OSABI_NETBSD_ELF'
+ NetBSD using the ELF executable format
+
+`GDB_OSABI_WINCE'
+ Windows CE
+
+`GDB_OSABI_GO32'
+ DJGPP
+
+`GDB_OSABI_NETWARE'
+ Novell NetWare
+
+`GDB_OSABI_ARM_EABI_V1'
+ ARM Embedded ABI version 1
+
+`GDB_OSABI_ARM_EABI_V2'
+ ARM Embedded ABI version 2
+
+`GDB_OSABI_ARM_APCS'
+ Generic ARM Procedure Call Standard
+
+
+ Here are the functions that make up the OS ABI framework:
+
+ -- Function: const char *gdbarch_osabi_name (enum gdb_osabi OSABI)
+ Return the name of the OS ABI corresponding to OSABI.
+
+ -- Function: void gdbarch_register_osabi (enum bfd_architecture ARCH,
+ unsigned long MACHINE, enum gdb_osabi OSABI, void
+ (*INIT_OSABI)(struct gdbarch_info INFO, struct gdbarch
+ *GDBARCH))
+ Register the OS ABI handler specified by INIT_OSABI for the
+ architecture, machine type and OS ABI specified by ARCH, MACHINE
+ and OSABI. In most cases, a value of zero for the machine type,
+ which implies the architecture's default machine type, will
+ suffice.
+
+ -- Function: void gdbarch_register_osabi_sniffer (enum
+ bfd_architecture ARCH, enum bfd_flavour FLAVOUR, enum
+ gdb_osabi (*SNIFFER)(bfd *ABFD))
+ Register the OS ABI file sniffer specified by SNIFFER for the BFD
+ architecture/flavour pair specified by ARCH and FLAVOUR. If ARCH
+ is `bfd_arch_unknown', the sniffer is considered to be generic,
+ and is allowed to examine FLAVOUR-flavoured files for any
+ architecture.
+
+ -- Function: enum gdb_osabi gdbarch_lookup_osabi (bfd *ABFD)
+ Examine the file described by ABFD to determine its OS ABI. The
+ value `GDB_OSABI_UNKNOWN' is returned if the OS ABI cannot be
+ determined.
+
+ -- Function: void gdbarch_init_osabi (struct gdbarch info INFO, struct
+ gdbarch *GDBARCH, enum gdb_osabi OSABI)
+ Invoke the OS ABI handler corresponding to OSABI to fine-tune the
+ `gdbarch' structure specified by GDBARCH. If a handler
+ corresponding to OSABI has not been registered for GDBARCH's
+ architecture, a warning will be issued and the debugging session
+ will continue with the defaults already established for GDBARCH.
+
+9.2 Initializing a New Architecture
+===================================
+
+Each `gdbarch' is associated with a single BFD architecture, via a
+`bfd_arch_ARCH' constant. The `gdbarch' is registered by a call to
+`register_gdbarch_init', usually from the file's `_initialize_FILENAME'
+routine, which will be automatically called during GDB startup. The
+arguments are a BFD architecture constant and an initialization
+function.
+
+ The initialization function has this type:
+
+ static struct gdbarch *
+ ARCH_gdbarch_init (struct gdbarch_info INFO,
+ struct gdbarch_list *ARCHES)
+
+ The INFO argument contains parameters used to select the correct
+architecture, and ARCHES is a list of architectures which have already
+been created with the same `bfd_arch_ARCH' value.
+
+ The initialization function should first make sure that INFO is
+acceptable, and return `NULL' if it is not. Then, it should search
+through ARCHES for an exact match to INFO, and return one if found.
+Lastly, if no exact match was found, it should create a new
+architecture based on INFO and return it.
+
+ Only information in INFO should be used to choose the new
+architecture. Historically, INFO could be sparse, and defaults would
+be collected from the first element on ARCHES. However, GDB now fills
+in INFO more thoroughly, so new `gdbarch' initialization functions
+should not take defaults from ARCHES.
+
+9.3 Registers and Memory
+========================
+
+GDB's model of the target machine is rather simple. GDB assumes the
+machine includes a bank of registers and a block of memory. Each
+register may have a different size.
+
+ GDB does not have a magical way to match up with the compiler's idea
+of which registers are which; however, it is critical that they do
+match up accurately. The only way to make this work is to get accurate
+information about the order that the compiler uses, and to reflect that
+in the `REGISTER_NAME' and related macros.
+
+ GDB can handle big-endian, little-endian, and bi-endian
+architectures.
+
+9.4 Pointers Are Not Always Addresses
+=====================================
+
+On almost all 32-bit architectures, the representation of a pointer is
+indistinguishable from the representation of some fixed-length number
+whose value is the byte address of the object pointed to. On such
+machines, the words "pointer" and "address" can be used interchangeably.
+However, architectures with smaller word sizes are often cramped for
+address space, so they may choose a pointer representation that breaks
+this identity, and allows a larger code address space.
+
+ For example, the Renesas D10V is a 16-bit VLIW processor whose
+instructions are 32 bits long(1). If the D10V used ordinary byte
+addresses to refer to code locations, then the processor would only be
+able to address 64kb of instructions. However, since instructions must
+be aligned on four-byte boundaries, the low two bits of any valid
+instruction's byte address are always zero--byte addresses waste two
+bits. So instead of byte addresses, the D10V uses word addresses--byte
+addresses shifted right two bits--to refer to code. Thus, the D10V can
+use 16-bit words to address 256kb of code space.
+
+ However, this means that code pointers and data pointers have
+different forms on the D10V. The 16-bit word `0xC020' refers to byte
+address `0xC020' when used as a data address, but refers to byte address
+`0x30080' when used as a code address.
+
+ (The D10V also uses separate code and data address spaces, which also
+affects the correspondence between pointers and addresses, but we're
+going to ignore that here; this example is already too long.)
+
+ To cope with architectures like this--the D10V is not the only
+one!--GDB tries to distinguish between "addresses", which are byte
+numbers, and "pointers", which are the target's representation of an
+address of a particular type of data. In the example above, `0xC020'
+is the pointer, which refers to one of the addresses `0xC020' or
+`0x30080', depending on the type imposed upon it. GDB provides
+functions for turning a pointer into an address and vice versa, in the
+appropriate way for the current architecture.
+
+ Unfortunately, since addresses and pointers are identical on almost
+all processors, this distinction tends to bit-rot pretty quickly. Thus,
+each time you port GDB to an architecture which does distinguish
+between pointers and addresses, you'll probably need to clean up some
+architecture-independent code.
+
+ Here are functions which convert between pointers and addresses:
+
+ -- Function: CORE_ADDR extract_typed_address (void *BUF, struct type
+ *TYPE)
+ Treat the bytes at BUF as a pointer or reference of type TYPE, and
+ return the address it represents, in a manner appropriate for the
+ current architecture. This yields an address GDB can use to read
+ target memory, disassemble, etc. Note that BUF refers to a buffer
+ in GDB's memory, not the inferior's.
+
+ For example, if the current architecture is the Intel x86, this
+ function extracts a little-endian integer of the appropriate
+ length from BUF and returns it. However, if the current
+ architecture is the D10V, this function will return a 16-bit
+ integer extracted from BUF, multiplied by four if TYPE is a
+ pointer to a function.
+
+ If TYPE is not a pointer or reference type, then this function
+ will signal an internal error.
+
+ -- Function: CORE_ADDR store_typed_address (void *BUF, struct type
+ *TYPE, CORE_ADDR ADDR)
+ Store the address ADDR in BUF, in the proper format for a pointer
+ of type TYPE in the current architecture. Note that BUF refers to
+ a buffer in GDB's memory, not the inferior's.
+
+ For example, if the current architecture is the Intel x86, this
+ function stores ADDR unmodified as a little-endian integer of the
+ appropriate length in BUF. However, if the current architecture
+ is the D10V, this function divides ADDR by four if TYPE is a
+ pointer to a function, and then stores it in BUF.
+
+ If TYPE is not a pointer or reference type, then this function
+ will signal an internal error.
+
+ -- Function: CORE_ADDR value_as_address (struct value *VAL)
+ Assuming that VAL is a pointer, return the address it represents,
+ as appropriate for the current architecture.
+
+ This function actually works on integral values, as well as
+ pointers. For pointers, it performs architecture-specific
+ conversions as described above for `extract_typed_address'.
+
+ -- Function: CORE_ADDR value_from_pointer (struct type *TYPE,
+ CORE_ADDR ADDR)
+ Create and return a value representing a pointer of type TYPE to
+ the address ADDR, as appropriate for the current architecture.
+ This function performs architecture-specific conversions as
+ described above for `store_typed_address'.
+
+ Here are some macros which architectures can define to indicate the
+relationship between pointers and addresses. These have default
+definitions, appropriate for architectures on which all pointers are
+simple unsigned byte addresses.
+
+ -- Target Macro: CORE_ADDR POINTER_TO_ADDRESS (struct type *TYPE, char
+ *BUF)
+ Assume that BUF holds a pointer of type TYPE, in the appropriate
+ format for the current architecture. Return the byte address the
+ pointer refers to.
+
+ This function may safely assume that TYPE is either a pointer or a
+ C++ reference type.
+
+ -- Target Macro: void ADDRESS_TO_POINTER (struct type *TYPE, char
+ *BUF, CORE_ADDR ADDR)
+ Store in BUF a pointer of type TYPE representing the address ADDR,
+ in the appropriate format for the current architecture.
+
+ This function may safely assume that TYPE is either a pointer or a
+ C++ reference type.
+
+9.5 Address Classes
+===================
+
+Sometimes information about different kinds of addresses is available
+via the debug information. For example, some programming environments
+define addresses of several different sizes. If the debug information
+distinguishes these kinds of address classes through either the size
+info (e.g, `DW_AT_byte_size' in DWARF 2) or through an explicit address
+class attribute (e.g, `DW_AT_address_class' in DWARF 2), the following
+macros should be defined in order to disambiguate these types within
+GDB as well as provide the added information to a GDB user when
+printing type expressions.
+
+ -- Target Macro: int ADDRESS_CLASS_TYPE_FLAGS (int BYTE_SIZE, int
+ DWARF2_ADDR_CLASS)
+ Returns the type flags needed to construct a pointer type whose
+ size is BYTE_SIZE and whose address class is DWARF2_ADDR_CLASS.
+ This function is normally called from within a symbol reader. See
+ `dwarf2read.c'.
+
+ -- Target Macro: char *ADDRESS_CLASS_TYPE_FLAGS_TO_NAME (int
+ TYPE_FLAGS)
+ Given the type flags representing an address class qualifier,
+ return its name.
+
+ -- Target Macro: int ADDRESS_CLASS_NAME_to_TYPE_FLAGS (int NAME, int
+ *vartype_flags_ptr)
+ Given an address qualifier name, set the `int' refererenced by
+ TYPE_FLAGS_PTR to the type flags for that address class qualifier.
+
+ Since the need for address classes is rather rare, none of the
+address class macros defined by default. Predicate macros are provided
+to detect when they are defined.
+
+ Consider a hypothetical architecture in which addresses are normally
+32-bits wide, but 16-bit addresses are also supported. Furthermore,
+suppose that the DWARF 2 information for this architecture simply uses
+a `DW_AT_byte_size' value of 2 to indicate the use of one of these
+"short" pointers. The following functions could be defined to
+implement the address class macros:
+
+ somearch_address_class_type_flags (int byte_size,
+ int dwarf2_addr_class)
+ {
+ if (byte_size == 2)
+ return TYPE_FLAG_ADDRESS_CLASS_1;
+ else
+ return 0;
+ }
+
+ static char *
+ somearch_address_class_type_flags_to_name (int type_flags)
+ {
+ if (type_flags & TYPE_FLAG_ADDRESS_CLASS_1)
+ return "short";
+ else
+ return NULL;
+ }
+
+ int
+ somearch_address_class_name_to_type_flags (char *name,
+ int *type_flags_ptr)
+ {
+ if (strcmp (name, "short") == 0)
+ {
+ *type_flags_ptr = TYPE_FLAG_ADDRESS_CLASS_1;
+ return 1;
+ }
+ else
+ return 0;
+ }
+
+ The qualifier `@short' is used in GDB's type expressions to indicate
+the presence of one of these "short" pointers. E.g, if the debug
+information indicates that `short_ptr_var' is one of these short
+pointers, GDB might show the following behavior:
+
+ (gdb) ptype short_ptr_var
+ type = int * @short
+
+9.6 Raw and Virtual Register Representations
+============================================
+
+_Maintainer note: This section is pretty much obsolete. The
+functionality described here has largely been replaced by
+pseudo-registers and the mechanisms described in *Note Using Different
+Register and Memory Data Representations: Target Architecture
+Definition. See also Bug Tracking Database
+(http://www.gnu.org/software/gdb/bugs/) and ARI Index
+(http://sources.redhat.com/gdb/current/ari/) for more up-to-date
+information._
+
+ Some architectures use one representation for a value when it lives
+in a register, but use a different representation when it lives in
+memory. In GDB's terminology, the "raw" representation is the one used
+in the target registers, and the "virtual" representation is the one
+used in memory, and within GDB `struct value' objects.
+
+ _Maintainer note: Notice that the same mechanism is being used to
+both convert a register to a `struct value' and alternative register
+forms._
+
+ For almost all data types on almost all architectures, the virtual
+and raw representations are identical, and no special handling is
+needed. However, they do occasionally differ. For example:
+
+ * The x86 architecture supports an 80-bit `long double' type.
+ However, when we store those values in memory, they occupy twelve
+ bytes: the floating-point number occupies the first ten, and the
+ final two bytes are unused. This keeps the values aligned on
+ four-byte boundaries, allowing more efficient access. Thus, the
+ x86 80-bit floating-point type is the raw representation, and the
+ twelve-byte loosely-packed arrangement is the virtual
+ representation.
+
+ * Some 64-bit MIPS targets present 32-bit registers to GDB as 64-bit
+ registers, with garbage in their upper bits. GDB ignores the top
+ 32 bits. Thus, the 64-bit form, with garbage in the upper 32
+ bits, is the raw representation, and the trimmed 32-bit
+ representation is the virtual representation.
+
+ In general, the raw representation is determined by the
+architecture, or GDB's interface to the architecture, while the virtual
+representation can be chosen for GDB's convenience. GDB's register
+file, `registers', holds the register contents in raw format, and the
+GDB remote protocol transmits register values in raw format.
+
+ Your architecture may define the following macros to request
+conversions between the raw and virtual format:
+
+ -- Target Macro: int REGISTER_CONVERTIBLE (int REG)
+ Return non-zero if register number REG's value needs different raw
+ and virtual formats.
+
+ You should not use `REGISTER_CONVERT_TO_VIRTUAL' for a register
+ unless this macro returns a non-zero value for that register.
+
+ -- Target Macro: int DEPRECATED_REGISTER_RAW_SIZE (int REG)
+ The size of register number REG's raw value. This is the number
+ of bytes the register will occupy in `registers', or in a GDB
+ remote protocol packet.
+
+ -- Target Macro: int DEPRECATED_REGISTER_VIRTUAL_SIZE (int REG)
+ The size of register number REG's value, in its virtual format.
+ This is the size a `struct value''s buffer will have, holding that
+ register's value.
+
+ -- Target Macro: struct type *DEPRECATED_REGISTER_VIRTUAL_TYPE (int
+ REG)
+ This is the type of the virtual representation of register number
+ REG. Note that there is no need for a macro giving a type for the
+ register's raw form; once the register's value has been obtained,
+ GDB always uses the virtual form.
+
+ -- Target Macro: void REGISTER_CONVERT_TO_VIRTUAL (int REG, struct
+ type *TYPE, char *FROM, char *TO)
+ Convert the value of register number REG to TYPE, which should
+ always be `DEPRECATED_REGISTER_VIRTUAL_TYPE (REG)'. The buffer at
+ FROM holds the register's value in raw format; the macro should
+ convert the value to virtual format, and place it at TO.
+
+ Note that `REGISTER_CONVERT_TO_VIRTUAL' and
+ `REGISTER_CONVERT_TO_RAW' take their REG and TYPE arguments in
+ different orders.
+
+ You should only use `REGISTER_CONVERT_TO_VIRTUAL' with registers
+ for which the `REGISTER_CONVERTIBLE' macro returns a non-zero
+ value.
+
+ -- Target Macro: void REGISTER_CONVERT_TO_RAW (struct type *TYPE, int
+ REG, char *FROM, char *TO)
+ Convert the value of register number REG to TYPE, which should
+ always be `DEPRECATED_REGISTER_VIRTUAL_TYPE (REG)'. The buffer at
+ FROM holds the register's value in raw format; the macro should
+ convert the value to virtual format, and place it at TO.
+
+ Note that REGISTER_CONVERT_TO_VIRTUAL and REGISTER_CONVERT_TO_RAW
+ take their REG and TYPE arguments in different orders.
+
+9.7 Using Different Register and Memory Data Representations
+============================================================
+
+_Maintainer's note: The way GDB manipulates registers is undergoing
+significant change. Many of the macros and functions refered to in this
+section are likely to be subject to further revision. See A.R. Index
+(http://sources.redhat.com/gdb/current/ari/) and Bug Tracking Database
+(http://www.gnu.org/software/gdb/bugs) for further information.
+cagney/2002-05-06._
+
+ Some architectures can represent a data object in a register using a
+form that is different to the objects more normal memory representation.
+For example:
+
+ * The Alpha architecture can represent 32 bit integer values in
+ floating-point registers.
+
+ * The x86 architecture supports 80-bit floating-point registers. The
+ `long double' data type occupies 96 bits in memory but only 80 bits
+ when stored in a register.
+
+
+ In general, the register representation of a data type is determined
+by the architecture, or GDB's interface to the architecture, while the
+memory representation is determined by the Application Binary Interface.
+
+ For almost all data types on almost all architectures, the two
+representations are identical, and no special handling is needed.
+However, they do occasionally differ. Your architecture may define the
+following macros to request conversions between the register and memory
+representations of a data type:
+
+ -- Target Macro: int CONVERT_REGISTER_P (int REG)
+ Return non-zero if the representation of a data value stored in
+ this register may be different to the representation of that same
+ data value when stored in memory.
+
+ When non-zero, the macros `REGISTER_TO_VALUE' and
+ `VALUE_TO_REGISTER' are used to perform any necessary conversion.
+
+ -- Target Macro: void REGISTER_TO_VALUE (int REG, struct type *TYPE,
+ char *FROM, char *TO)
+ Convert the value of register number REG to a data object of type
+ TYPE. The buffer at FROM holds the register's value in raw
+ format; the converted value should be placed in the buffer at TO.
+
+ Note that `REGISTER_TO_VALUE' and `VALUE_TO_REGISTER' take their
+ REG and TYPE arguments in different orders.
+
+ You should only use `REGISTER_TO_VALUE' with registers for which
+ the `CONVERT_REGISTER_P' macro returns a non-zero value.
+
+ -- Target Macro: void VALUE_TO_REGISTER (struct type *TYPE, int REG,
+ char *FROM, char *TO)
+ Convert a data value of type TYPE to register number REG' raw
+ format.
+
+ Note that `REGISTER_TO_VALUE' and `VALUE_TO_REGISTER' take their
+ REG and TYPE arguments in different orders.
+
+ You should only use `VALUE_TO_REGISTER' with registers for which
+ the `CONVERT_REGISTER_P' macro returns a non-zero value.
+
+ -- Target Macro: void REGISTER_CONVERT_TO_TYPE (int REGNUM, struct
+ type *TYPE, char *BUF)
+ See `mips-tdep.c'. It does not do what you want.
+
+9.8 Frame Interpretation
+========================
+
+9.9 Inferior Call Setup
+=======================
+
+9.10 Compiler Characteristics
+=============================
+
+9.11 Target Conditionals
+========================
+
+This section describes the macros that you can use to define the target
+machine.
+
+`ADDR_BITS_REMOVE (addr)'
+ If a raw machine instruction address includes any bits that are not
+ really part of the address, then define this macro to expand into
+ an expression that zeroes those bits in ADDR. This is only used
+ for addresses of instructions, and even then not in all contexts.
+
+ For example, the two low-order bits of the PC on the
+ Hewlett-Packard PA 2.0 architecture contain the privilege level of
+ the corresponding instruction. Since instructions must always be
+ aligned on four-byte boundaries, the processor masks out these
+ bits to generate the actual address of the instruction.
+ ADDR_BITS_REMOVE should filter out these bits with an expression
+ such as `((addr) & ~3)'.
+
+`ADDRESS_CLASS_NAME_TO_TYPE_FLAGS (NAME, TYPE_FLAGS_PTR)'
+ If NAME is a valid address class qualifier name, set the `int'
+ referenced by TYPE_FLAGS_PTR to the mask representing the qualifier
+ and return 1. If NAME is not a valid address class qualifier name,
+ return 0.
+
+ The value for TYPE_FLAGS_PTR should be one of
+ `TYPE_FLAG_ADDRESS_CLASS_1', `TYPE_FLAG_ADDRESS_CLASS_2', or
+ possibly some combination of these values or'd together. *Note
+ Address Classes: Target Architecture Definition.
+
+`ADDRESS_CLASS_NAME_TO_TYPE_FLAGS_P ()'
+ Predicate which indicates whether
+ `ADDRESS_CLASS_NAME_TO_TYPE_FLAGS' has been defined.
+
+`ADDRESS_CLASS_TYPE_FLAGS (BYTE_SIZE, DWARF2_ADDR_CLASS)'
+ Given a pointers byte size (as described by the debug information)
+ and the possible `DW_AT_address_class' value, return the type flags
+ used by GDB to represent this address class. The value returned
+ should be one of `TYPE_FLAG_ADDRESS_CLASS_1',
+ `TYPE_FLAG_ADDRESS_CLASS_2', or possibly some combination of these
+ values or'd together. *Note Address Classes: Target Architecture
+ Definition.
+
+`ADDRESS_CLASS_TYPE_FLAGS_P ()'
+ Predicate which indicates whether `ADDRESS_CLASS_TYPE_FLAGS' has
+ been defined.
+
+`ADDRESS_CLASS_TYPE_FLAGS_TO_NAME (TYPE_FLAGS)'
+ Return the name of the address class qualifier associated with the
+ type flags given by TYPE_FLAGS.
+
+`ADDRESS_CLASS_TYPE_FLAGS_TO_NAME_P ()'
+ Predicate which indicates whether
+ `ADDRESS_CLASS_TYPE_FLAGS_TO_NAME' has been defined. *Note
+ Address Classes: Target Architecture Definition.
+
+`ADDRESS_TO_POINTER (TYPE, BUF, ADDR)'
+ Store in BUF a pointer of type TYPE representing the address ADDR,
+ in the appropriate format for the current architecture. This
+ macro may safely assume that TYPE is either a pointer or a C++
+ reference type. *Note Pointers Are Not Always Addresses: Target
+ Architecture Definition.
+
+`BELIEVE_PCC_PROMOTION'
+ Define if the compiler promotes a `short' or `char' parameter to
+ an `int', but still reports the parameter as its original type,
+ rather than the promoted type.
+
+`BITS_BIG_ENDIAN'
+ Define this if the numbering of bits in the targets does *not*
+ match the endianness of the target byte order. A value of 1 means
+ that the bits are numbered in a big-endian bit order, 0 means
+ little-endian.
+
+`BREAKPOINT'
+ This is the character array initializer for the bit pattern to put
+ into memory where a breakpoint is set. Although it's common to
+ use a trap instruction for a breakpoint, it's not required; for
+ instance, the bit pattern could be an invalid instruction. The
+ breakpoint must be no longer than the shortest instruction of the
+ architecture.
+
+ `BREAKPOINT' has been deprecated in favor of `BREAKPOINT_FROM_PC'.
+
+`BIG_BREAKPOINT'
+`LITTLE_BREAKPOINT'
+ Similar to BREAKPOINT, but used for bi-endian targets.
+
+ `BIG_BREAKPOINT' and `LITTLE_BREAKPOINT' have been deprecated in
+ favor of `BREAKPOINT_FROM_PC'.
+
+`DEPRECATED_REMOTE_BREAKPOINT'
+`DEPRECATED_LITTLE_REMOTE_BREAKPOINT'
+`DEPRECATED_BIG_REMOTE_BREAKPOINT'
+ Specify the breakpoint instruction sequence for a remote target.
+ `DEPRECATED_REMOTE_BREAKPOINT', `DEPRECATED_BIG_REMOTE_BREAKPOINT'
+ and `DEPRECATED_LITTLE_REMOTE_BREAKPOINT' have been deprecated in
+ favor of `BREAKPOINT_FROM_PC' (*note BREAKPOINT_FROM_PC::).
+
+`BREAKPOINT_FROM_PC (PCPTR, LENPTR)'
+ Use the program counter to determine the contents and size of a
+ breakpoint instruction. It returns a pointer to a string of bytes
+ that encode a breakpoint instruction, stores the length of the
+ string to `*LENPTR', and adjusts the program counter (if
+ necessary) to point to the actual memory location where the
+ breakpoint should be inserted.
+
+ Although it is common to use a trap instruction for a breakpoint,
+ it's not required; for instance, the bit pattern could be an
+ invalid instruction. The breakpoint must be no longer than the
+ shortest instruction of the architecture.
+
+ Replaces all the other BREAKPOINT macros.
+
+`MEMORY_INSERT_BREAKPOINT (BP_TGT)'
+`MEMORY_REMOVE_BREAKPOINT (BP_TGT)'
+ Insert or remove memory based breakpoints. Reasonable defaults
+ (`default_memory_insert_breakpoint' and
+ `default_memory_remove_breakpoint' respectively) have been
+ provided so that it is not necessary to define these for most
+ architectures. Architectures which may want to define
+ `MEMORY_INSERT_BREAKPOINT' and `MEMORY_REMOVE_BREAKPOINT' will
+ likely have instructions that are oddly sized or are not stored in
+ a conventional manner.
+
+ It may also be desirable (from an efficiency standpoint) to define
+ custom breakpoint insertion and removal routines if
+ `BREAKPOINT_FROM_PC' needs to read the target's memory for some
+ reason.
+
+`ADJUST_BREAKPOINT_ADDRESS (ADDRESS)'
+ Given an address at which a breakpoint is desired, return a
+ breakpoint address adjusted to account for architectural
+ constraints on breakpoint placement. This method is not needed by
+ most targets.
+
+ The FR-V target (see `frv-tdep.c') requires this method. The FR-V
+ is a VLIW architecture in which a number of RISC-like instructions
+ are grouped (packed) together into an aggregate instruction or
+ instruction bundle. When the processor executes one of these
+ bundles, the component instructions are executed in parallel.
+
+ In the course of optimization, the compiler may group instructions
+ from distinct source statements into the same bundle. The line
+ number information associated with one of the latter statements
+ will likely refer to some instruction other than the first one in
+ the bundle. So, if the user attempts to place a breakpoint on one
+ of these latter statements, GDB must be careful to _not_ place the
+ break instruction on any instruction other than the first one in
+ the bundle. (Remember though that the instructions within a
+ bundle execute in parallel, so the _first_ instruction is the
+ instruction at the lowest address and has nothing to do with
+ execution order.)
+
+ The FR-V's `ADJUST_BREAKPOINT_ADDRESS' method will adjust a
+ breakpoint's address by scanning backwards for the beginning of
+ the bundle, returning the address of the bundle.
+
+ Since the adjustment of a breakpoint may significantly alter a
+ user's expectation, GDB prints a warning when an adjusted
+ breakpoint is initially set and each time that that breakpoint is
+ hit.
+
+`CALL_DUMMY_LOCATION'
+ See the file `inferior.h'.
+
+ This method has been replaced by `push_dummy_code' (*note
+ push_dummy_code::).
+
+`CANNOT_FETCH_REGISTER (REGNO)'
+ A C expression that should be nonzero if REGNO cannot be fetched
+ from an inferior process. This is only relevant if
+ `FETCH_INFERIOR_REGISTERS' is not defined.
+
+`CANNOT_STORE_REGISTER (REGNO)'
+ A C expression that should be nonzero if REGNO should not be
+ written to the target. This is often the case for program
+ counters, status words, and other special registers. If this is
+ not defined, GDB will assume that all registers may be written.
+
+`int CONVERT_REGISTER_P(REGNUM)'
+ Return non-zero if register REGNUM can represent data values in a
+ non-standard form. *Note Using Different Register and Memory Data
+ Representations: Target Architecture Definition.
+
+`DECR_PC_AFTER_BREAK'
+ Define this to be the amount by which to decrement the PC after the
+ program encounters a breakpoint. This is often the number of
+ bytes in `BREAKPOINT', though not always. For most targets this
+ value will be 0.
+
+`DISABLE_UNSETTABLE_BREAK (ADDR)'
+ If defined, this should evaluate to 1 if ADDR is in a shared
+ library in which breakpoints cannot be set and so should be
+ disabled.
+
+`PRINT_FLOAT_INFO()'
+ If defined, then the `info float' command will print information
+ about the processor's floating point unit.
+
+`print_registers_info (GDBARCH, FRAME, REGNUM, ALL)'
+ If defined, pretty print the value of the register REGNUM for the
+ specified FRAME. If the value of REGNUM is -1, pretty print
+ either all registers (ALL is non zero) or a select subset of
+ registers (ALL is zero).
+
+ The default method prints one register per line, and if ALL is
+ zero omits floating-point registers.
+
+`PRINT_VECTOR_INFO()'
+ If defined, then the `info vector' command will call this function
+ to print information about the processor's vector unit.
+
+ By default, the `info vector' command will print all vector
+ registers (the register's type having the vector attribute).
+
+`DWARF_REG_TO_REGNUM'
+ Convert DWARF register number into GDB regnum. If not defined, no
+ conversion will be performed.
+
+`DWARF2_REG_TO_REGNUM'
+ Convert DWARF2 register number into GDB regnum. If not defined,
+ no conversion will be performed.
+
+`ECOFF_REG_TO_REGNUM'
+ Convert ECOFF register number into GDB regnum. If not defined, no
+ conversion will be performed.
+
+`END_OF_TEXT_DEFAULT'
+ This is an expression that should designate the end of the text
+ section.
+
+`EXTRACT_RETURN_VALUE(TYPE, REGBUF, VALBUF)'
+ Define this to extract a function's return value of type TYPE from
+ the raw register state REGBUF and copy that, in virtual format,
+ into VALBUF.
+
+ This method has been deprecated in favour of `gdbarch_return_value'
+ (*note gdbarch_return_value::).
+
+`DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS(REGBUF)'
+ When defined, extract from the array REGBUF (containing the raw
+ register state) the `CORE_ADDR' at which a function should return
+ its structure value.
+
+ *Note gdbarch_return_value::.
+
+`DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS_P()'
+ Predicate for `DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS'.
+
+`DEPRECATED_FP_REGNUM'
+ If the virtual frame pointer is kept in a register, then define
+ this macro to be the number (greater than or equal to zero) of
+ that register.
+
+ This should only need to be defined if `DEPRECATED_TARGET_READ_FP'
+ is not defined.
+
+`DEPRECATED_FRAMELESS_FUNCTION_INVOCATION(FI)'
+ Define this to an expression that returns 1 if the function
+ invocation represented by FI does not have a stack frame
+ associated with it. Otherwise return 0.
+
+`frame_align (ADDRESS)'
+ Define this to adjust ADDRESS so that it meets the alignment
+ requirements for the start of a new stack frame. A stack frame's
+ alignment requirements are typically stronger than a target
+ processors stack alignment requirements (*note
+ DEPRECATED_STACK_ALIGN::).
+
+ This function is used to ensure that, when creating a dummy frame,
+ both the initial stack pointer and (if needed) the address of the
+ return value are correctly aligned.
+
+ Unlike `DEPRECATED_STACK_ALIGN', this function always adjusts the
+ address in the direction of stack growth.
+
+ By default, no frame based stack alignment is performed.
+
+`int frame_red_zone_size'
+ The number of bytes, beyond the innermost-stack-address, reserved
+ by the ABI. A function is permitted to use this scratch area
+ (instead of allocating extra stack space).
+
+ When performing an inferior function call, to ensure that it does
+ not modify this area, GDB adjusts the innermost-stack-address by
+ FRAME_RED_ZONE_SIZE bytes before pushing parameters onto the stack.
+
+ By default, zero bytes are allocated. The value must be aligned
+ (*note frame_align::).
+
+ The AMD64 (nee x86-64) ABI documentation refers to the _red zone_
+ when describing this scratch area.
+
+`DEPRECATED_FRAME_CHAIN(FRAME)'
+ Given FRAME, return a pointer to the calling frame.
+
+`DEPRECATED_FRAME_CHAIN_VALID(CHAIN, THISFRAME)'
+ Define this to be an expression that returns zero if the given
+ frame is an outermost frame, with no caller, and nonzero
+ otherwise. Most normal situations can be handled without defining
+ this macro, including `NULL' chain pointers, dummy frames, and
+ frames whose PC values are inside the startup file (e.g.
+ `crt0.o'), inside `main', or inside `_start'.
+
+`DEPRECATED_FRAME_INIT_SAVED_REGS(FRAME)'
+ See `frame.h'. Determines the address of all registers in the
+ current stack frame storing each in `frame->saved_regs'. Space for
+ `frame->saved_regs' shall be allocated by
+ `DEPRECATED_FRAME_INIT_SAVED_REGS' using `frame_saved_regs_zalloc'.
+
+ `FRAME_FIND_SAVED_REGS' is deprecated.
+
+`FRAME_NUM_ARGS (FI)'
+ For the frame described by FI return the number of arguments that
+ are being passed. If the number of arguments is not known, return
+ `-1'.
+
+`DEPRECATED_FRAME_SAVED_PC(FRAME)'
+ Given FRAME, return the pc saved there. This is the return
+ address.
+
+ This method is deprecated. *Note unwind_pc::.
+
+`CORE_ADDR unwind_pc (struct frame_info *THIS_FRAME)'
+ Return the instruction address, in THIS_FRAME's caller, at which
+ execution will resume after THIS_FRAME returns. This is commonly
+ refered to as the return address.
+
+ The implementation, which must be frame agnostic (work with any
+ frame), is typically no more than:
+
+ ULONGEST pc;
+ frame_unwind_unsigned_register (this_frame, D10V_PC_REGNUM, &pc);
+ return d10v_make_iaddr (pc);
+
+ *Note DEPRECATED_FRAME_SAVED_PC::, which this method replaces.
+
+`CORE_ADDR unwind_sp (struct frame_info *THIS_FRAME)'
+ Return the frame's inner most stack address. This is commonly
+ refered to as the frame's "stack pointer".
+
+ The implementation, which must be frame agnostic (work with any
+ frame), is typically no more than:
+
+ ULONGEST sp;
+ frame_unwind_unsigned_register (this_frame, D10V_SP_REGNUM, &sp);
+ return d10v_make_daddr (sp);
+
+ *Note TARGET_READ_SP::, which this method replaces.
+
+`FUNCTION_EPILOGUE_SIZE'
+ For some COFF targets, the `x_sym.x_misc.x_fsize' field of the
+ function end symbol is 0. For such targets, you must define
+ `FUNCTION_EPILOGUE_SIZE' to expand into the standard size of a
+ function's epilogue.
+
+`DEPRECATED_FUNCTION_START_OFFSET'
+ An integer, giving the offset in bytes from a function's address
+ (as used in the values of symbols, function pointers, etc.), and
+ the function's first genuine instruction.
+
+ This is zero on almost all machines: the function's address is
+ usually the address of its first instruction. However, on the
+ VAX, for example, each function starts with two bytes containing a
+ bitmask indicating which registers to save upon entry to the
+ function. The VAX `call' instructions check this value, and save
+ the appropriate registers automatically. Thus, since the offset
+ from the function's address to its first instruction is two bytes,
+ `DEPRECATED_FUNCTION_START_OFFSET' would be 2 on the VAX.
+
+`GCC_COMPILED_FLAG_SYMBOL'
+`GCC2_COMPILED_FLAG_SYMBOL'
+ If defined, these are the names of the symbols that GDB will look
+ for to detect that GCC compiled the file. The default symbols are
+ `gcc_compiled.' and `gcc2_compiled.', respectively. (Currently
+ only defined for the Delta 68.)
+
+`GDB_MULTI_ARCH'
+ If defined and non-zero, enables support for multiple architectures
+ within GDB.
+
+ This support can be enabled at two levels. At level one, only
+ definitions for previously undefined macros are provided; at level
+ two, a multi-arch definition of all architecture dependent macros
+ will be defined.
+
+`GDB_TARGET_IS_HPPA'
+ This determines whether horrible kludge code in `dbxread.c' and
+ `partial-stab.h' is used to mangle multiple-symbol-table files from
+ HPPA's. This should all be ripped out, and a scheme like
+ `elfread.c' used instead.
+
+`GET_LONGJMP_TARGET'
+ For most machines, this is a target-dependent parameter. On the
+ DECstation and the Iris, this is a native-dependent parameter,
+ since the header file `setjmp.h' is needed to define it.
+
+ This macro determines the target PC address that `longjmp' will
+ jump to, assuming that we have just stopped at a `longjmp'
+ breakpoint. It takes a `CORE_ADDR *' as argument, and stores the
+ target PC value through this pointer. It examines the current
+ state of the machine as needed.
+
+`DEPRECATED_GET_SAVED_REGISTER'
+ Define this if you need to supply your own definition for the
+ function `DEPRECATED_GET_SAVED_REGISTER'.
+
+`DEPRECATED_IBM6000_TARGET'
+ Shows that we are configured for an IBM RS/6000 system. This
+ conditional should be eliminated (FIXME) and replaced by
+ feature-specific macros. It was introduced in a haste and we are
+ repenting at leisure.
+
+`I386_USE_GENERIC_WATCHPOINTS'
+ An x86-based target can define this to use the generic x86
+ watchpoint support; see *Note I386_USE_GENERIC_WATCHPOINTS:
+ Algorithms.
+
+`SYMBOLS_CAN_START_WITH_DOLLAR'
+ Some systems have routines whose names start with `$'. Giving this
+ macro a non-zero value tells GDB's expression parser to check for
+ such routines when parsing tokens that begin with `$'.
+
+ On HP-UX, certain system routines (millicode) have names beginning
+ with `$' or `$$'. For example, `$$dyncall' is a millicode routine
+ that handles inter-space procedure calls on PA-RISC.
+
+`DEPRECATED_INIT_EXTRA_FRAME_INFO (FROMLEAF, FRAME)'
+ If additional information about the frame is required this should
+ be stored in `frame->extra_info'. Space for `frame->extra_info'
+ is allocated using `frame_extra_info_zalloc'.
+
+`DEPRECATED_INIT_FRAME_PC (FROMLEAF, PREV)'
+ This is a C statement that sets the pc of the frame pointed to by
+ PREV. [By default...]
+
+`INNER_THAN (LHS, RHS)'
+ Returns non-zero if stack address LHS is inner than (nearer to the
+ stack top) stack address RHS. Define this as `lhs < rhs' if the
+ target's stack grows downward in memory, or `lhs > rsh' if the
+ stack grows upward.
+
+`gdbarch_in_function_epilogue_p (GDBARCH, PC)'
+ Returns non-zero if the given PC is in the epilogue of a function.
+ The epilogue of a function is defined as the part of a function
+ where the stack frame of the function already has been destroyed
+ up to the final `return from function call' instruction.
+
+`DEPRECATED_SIGTRAMP_START (PC)'
+`DEPRECATED_SIGTRAMP_END (PC)'
+ Define these to be the start and end address of the `sigtramp' for
+ the given PC. On machines where the address is just a compile time
+ constant, the macro expansion will typically just ignore the
+ supplied PC.
+
+`IN_SOLIB_CALL_TRAMPOLINE (PC, NAME)'
+ Define this to evaluate to nonzero if the program is stopped in the
+ trampoline that connects to a shared library.
+
+`IN_SOLIB_RETURN_TRAMPOLINE (PC, NAME)'
+ Define this to evaluate to nonzero if the program is stopped in the
+ trampoline that returns from a shared library.
+
+`IN_SOLIB_DYNSYM_RESOLVE_CODE (PC)'
+ Define this to evaluate to nonzero if the program is stopped in the
+ dynamic linker.
+
+`SKIP_SOLIB_RESOLVER (PC)'
+ Define this to evaluate to the (nonzero) address at which execution
+ should continue to get past the dynamic linker's symbol resolution
+ function. A zero value indicates that it is not important or
+ necessary to set a breakpoint to get through the dynamic linker
+ and that single stepping will suffice.
+
+`INTEGER_TO_ADDRESS (TYPE, BUF)'
+ Define this when the architecture needs to handle non-pointer to
+ address conversions specially. Converts that value to an address
+ according to the current architectures conventions.
+
+ _Pragmatics: When the user copies a well defined expression from
+ their source code and passes it, as a parameter, to GDB's `print'
+ command, they should get the same value as would have been
+ computed by the target program. Any deviation from this rule can
+ cause major confusion and annoyance, and needs to be justified
+ carefully. In other words, GDB doesn't really have the freedom to
+ do these conversions in clever and useful ways. It has, however,
+ been pointed out that users aren't complaining about how GDB casts
+ integers to pointers; they are complaining that they can't take an
+ address from a disassembly listing and give it to `x/i'. Adding
+ an architecture method like `INTEGER_TO_ADDRESS' certainly makes
+ it possible for GDB to "get it right" in all circumstances._
+
+ *Note Pointers Are Not Always Addresses: Target Architecture
+ Definition.
+
+`NO_HIF_SUPPORT'
+ (Specific to the a29k.)
+
+`POINTER_TO_ADDRESS (TYPE, BUF)'
+ Assume that BUF holds a pointer of type TYPE, in the appropriate
+ format for the current architecture. Return the byte address the
+ pointer refers to. *Note Pointers Are Not Always Addresses:
+ Target Architecture Definition.
+
+`REGISTER_CONVERTIBLE (REG)'
+ Return non-zero if REG uses different raw and virtual formats.
+ *Note Raw and Virtual Register Representations: Target
+ Architecture Definition.
+
+`REGISTER_TO_VALUE(REGNUM, TYPE, FROM, TO)'
+ Convert the raw contents of register REGNUM into a value of type
+ TYPE. *Note Using Different Register and Memory Data
+ Representations: Target Architecture Definition.
+
+`DEPRECATED_REGISTER_RAW_SIZE (REG)'
+ Return the raw size of REG; defaults to the size of the register's
+ virtual type. *Note Raw and Virtual Register Representations:
+ Target Architecture Definition.
+
+`register_reggroup_p (GDBARCH, REGNUM, REGGROUP)'
+ Return non-zero if register REGNUM is a member of the register
+ group REGGROUP.
+
+ By default, registers are grouped as follows:
+
+ `float_reggroup'
+ Any register with a valid name and a floating-point type.
+
+ `vector_reggroup'
+ Any register with a valid name and a vector type.
+
+ `general_reggroup'
+ Any register with a valid name and a type other than vector or
+ floating-point. `float_reggroup'.
+
+ `save_reggroup'
+ `restore_reggroup'
+ `all_reggroup'
+ Any register with a valid name.
+
+`DEPRECATED_REGISTER_VIRTUAL_SIZE (REG)'
+ Return the virtual size of REG; defaults to the size of the
+ register's virtual type. Return the virtual size of REG. *Note
+ Raw and Virtual Register Representations: Target Architecture
+ Definition.
+
+`DEPRECATED_REGISTER_VIRTUAL_TYPE (REG)'
+ Return the virtual type of REG. *Note Raw and Virtual Register
+ Representations: Target Architecture Definition.
+
+`struct type *register_type (GDBARCH, REG)'
+ If defined, return the type of register REG. This function
+ superseeds `DEPRECATED_REGISTER_VIRTUAL_TYPE'. *Note Raw and
+ Virtual Register Representations: Target Architecture Definition.
+
+`REGISTER_CONVERT_TO_VIRTUAL(REG, TYPE, FROM, TO)'
+ Convert the value of register REG from its raw form to its virtual
+ form. *Note Raw and Virtual Register Representations: Target
+ Architecture Definition.
+
+`REGISTER_CONVERT_TO_RAW(TYPE, REG, FROM, TO)'
+ Convert the value of register REG from its virtual form to its raw
+ form. *Note Raw and Virtual Register Representations: Target
+ Architecture Definition.
+
+`const struct regset *regset_from_core_section (struct gdbarch * GDBARCH, const char * SECT_NAME, size_t SECT_SIZE)'
+ Return the appropriate register set for a core file section with
+ name SECT_NAME and size SECT_SIZE.
+
+`SOFTWARE_SINGLE_STEP_P()'
+ Define this as 1 if the target does not have a hardware single-step
+ mechanism. The macro `SOFTWARE_SINGLE_STEP' must also be defined.
+
+`SOFTWARE_SINGLE_STEP(SIGNAL, INSERT_BREAPOINTS_P)'
+ A function that inserts or removes (depending on
+ INSERT_BREAPOINTS_P) breakpoints at each possible destinations of
+ the next instruction. See `sparc-tdep.c' and `rs6000-tdep.c' for
+ examples.
+
+`SOFUN_ADDRESS_MAYBE_MISSING'
+ Somebody clever observed that, the more actual addresses you have
+ in the debug information, the more time the linker has to spend
+ relocating them. So whenever there's some other way the debugger
+ could find the address it needs, you should omit it from the debug
+ info, to make linking faster.
+
+ `SOFUN_ADDRESS_MAYBE_MISSING' indicates that a particular set of
+ hacks of this sort are in use, affecting `N_SO' and `N_FUN'
+ entries in stabs-format debugging information. `N_SO' stabs mark
+ the beginning and ending addresses of compilation units in the text
+ segment. `N_FUN' stabs mark the starts and ends of functions.
+
+ `SOFUN_ADDRESS_MAYBE_MISSING' means two things:
+
+ * `N_FUN' stabs have an address of zero. Instead, you should
+ find the addresses where the function starts by taking the
+ function name from the stab, and then looking that up in the
+ minsyms (the linker/assembler symbol table). In other words,
+ the stab has the name, and the linker/assembler symbol table
+ is the only place that carries the address.
+
+ * `N_SO' stabs have an address of zero, too. You just look at
+ the `N_FUN' stabs that appear before and after the `N_SO'
+ stab, and guess the starting and ending addresses of the
+ compilation unit from them.
+
+`PC_LOAD_SEGMENT'
+ If defined, print information about the load segment for the
+ program counter. (Defined only for the RS/6000.)
+
+`PC_REGNUM'
+ If the program counter is kept in a register, then define this
+ macro to be the number (greater than or equal to zero) of that
+ register.
+
+ This should only need to be defined if `TARGET_READ_PC' and
+ `TARGET_WRITE_PC' are not defined.
+
+`PARM_BOUNDARY'
+ If non-zero, round arguments to a boundary of this many bits before
+ pushing them on the stack.
+
+`stabs_argument_has_addr (GDBARCH, TYPE)'
+ Define this to return nonzero if a function argument of type TYPE
+ is passed by reference instead of value.
+
+ This method replaces `DEPRECATED_REG_STRUCT_HAS_ADDR' (*note
+ DEPRECATED_REG_STRUCT_HAS_ADDR::).
+
+`PROCESS_LINENUMBER_HOOK'
+ A hook defined for XCOFF reading.
+
+`PROLOGUE_FIRSTLINE_OVERLAP'
+ (Only used in unsupported Convex configuration.)
+
+`PS_REGNUM'
+ If defined, this is the number of the processor status register.
+ (This definition is only used in generic code when parsing "$ps".)
+
+`DEPRECATED_POP_FRAME'
+ If defined, used by `frame_pop' to remove a stack frame. This
+ method has been superseeded by generic code.
+
+`push_dummy_call (GDBARCH, FUNCTION, REGCACHE, PC_ADDR, NARGS, ARGS, SP, STRUCT_RETURN, STRUCT_ADDR)'
+ Define this to push the dummy frame's call to the inferior
+ function onto the stack. In addition to pushing NARGS, the code
+ should push STRUCT_ADDR (when STRUCT_RETURN), and the return
+ address (BP_ADDR).
+
+ FUNCTION is a pointer to a `struct value'; on architectures that
+ use function descriptors, this contains the function descriptor
+ value.
+
+ Returns the updated top-of-stack pointer.
+
+ This method replaces `DEPRECATED_PUSH_ARGUMENTS'.
+
+`CORE_ADDR push_dummy_code (GDBARCH, SP, FUNADDR, USING_GCC, ARGS, NARGS, VALUE_TYPE, REAL_PC, BP_ADDR)'
+ Given a stack based call dummy, push the instruction sequence
+ (including space for a breakpoint) to which the called function
+ should return.
+
+ Set BP_ADDR to the address at which the breakpoint instruction
+ should be inserted, REAL_PC to the resume address when starting
+ the call sequence, and return the updated inner-most stack address.
+
+ By default, the stack is grown sufficient to hold a frame-aligned
+ (*note frame_align::) breakpoint, BP_ADDR is set to the address
+ reserved for that breakpoint, and REAL_PC set to FUNADDR.
+
+ This method replaces `CALL_DUMMY_LOCATION',
+ `DEPRECATED_REGISTER_SIZE'.
+
+`REGISTER_NAME(I)'
+ Return the name of register I as a string. May return `NULL' or
+ `NUL' to indicate that register I is not valid.
+
+`DEPRECATED_REG_STRUCT_HAS_ADDR (GCC_P, TYPE)'
+ Define this to return 1 if the given type will be passed by
+ pointer rather than directly.
+
+ This method has been replaced by `stabs_argument_has_addr' (*note
+ stabs_argument_has_addr::).
+
+`SAVE_DUMMY_FRAME_TOS (SP)'
+ Used in `call_function_by_hand' to notify the target dependent
+ code of the top-of-stack value that will be passed to the the
+ inferior code. This is the value of the `SP' after both the dummy
+ frame and space for parameters/results have been allocated on the
+ stack. *Note unwind_dummy_id::.
+
+`SDB_REG_TO_REGNUM'
+ Define this to convert sdb register numbers into GDB regnums. If
+ not defined, no conversion will be done.
+
+`enum return_value_convention gdbarch_return_value (struct gdbarch *GDBARCH, struct type *VALTYPE, struct regcache *REGCACHE, void *READBUF, const void *WRITEBUF)'
+ Given a function with a return-value of type RETTYPE, return which
+ return-value convention that function would use.
+
+ GDB currently recognizes two function return-value conventions:
+ `RETURN_VALUE_REGISTER_CONVENTION' where the return value is found
+ in registers; and `RETURN_VALUE_STRUCT_CONVENTION' where the return
+ value is found in memory and the address of that memory location is
+ passed in as the function's first parameter.
+
+ If the register convention is being used, and WRITEBUF is
+ non-`NULL', also copy the return-value in WRITEBUF into REGCACHE.
+
+ If the register convention is being used, and READBUF is
+ non-`NULL', also copy the return value from REGCACHE into READBUF
+ (REGCACHE contains a copy of the registers from the just returned
+ function).
+
+ *Note DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS::, for a description
+ of how return-values that use the struct convention are handled.
+
+ _Maintainer note: This method replaces separate predicate, extract,
+ store methods. By having only one method, the logic needed to
+ determine the return-value convention need only be implemented in
+ one place. If GDB were written in an OO language, this method
+ would instead return an object that knew how to perform the
+ register return-value extract and store._
+
+ _Maintainer note: This method does not take a GCC_P parameter, and
+ such a parameter should not be added. If an architecture that
+ requires per-compiler or per-function information be identified,
+ then the replacement of RETTYPE with `struct value' FUNCTION
+ should be persued._
+
+ _Maintainer note: The REGCACHE parameter limits this methods to
+ the inner most frame. While replacing REGCACHE with a `struct
+ frame_info' FRAME parameter would remove that limitation there has
+ yet to be a demonstrated need for such a change._
+
+`SKIP_PERMANENT_BREAKPOINT'
+ Advance the inferior's PC past a permanent breakpoint. GDB
+ normally steps over a breakpoint by removing it, stepping one
+ instruction, and re-inserting the breakpoint. However, permanent
+ breakpoints are hardwired into the inferior, and can't be removed,
+ so this strategy doesn't work. Calling
+ `SKIP_PERMANENT_BREAKPOINT' adjusts the processor's state so that
+ execution will resume just after the breakpoint. This macro does
+ the right thing even when the breakpoint is in the delay slot of a
+ branch or jump.
+
+`SKIP_PROLOGUE (PC)'
+ A C expression that returns the address of the "real" code beyond
+ the function entry prologue found at PC.
+
+`SKIP_TRAMPOLINE_CODE (PC)'
+ If the target machine has trampoline code that sits between
+ callers and the functions being called, then define this macro to
+ return a new PC that is at the start of the real function.
+
+`SP_REGNUM'
+ If the stack-pointer is kept in a register, then define this macro
+ to be the number (greater than or equal to zero) of that register,
+ or -1 if there is no such register.
+
+`STAB_REG_TO_REGNUM'
+ Define this to convert stab register numbers (as gotten from `r'
+ declarations) into GDB regnums. If not defined, no conversion
+ will be done.
+
+`DEPRECATED_STACK_ALIGN (ADDR)'
+ Define this to increase ADDR so that it meets the alignment
+ requirements for the processor's stack.
+
+ Unlike *Note frame_align::, this function always adjusts ADDR
+ upwards.
+
+ By default, no stack alignment is performed.
+
+`STEP_SKIPS_DELAY (ADDR)'
+ Define this to return true if the address is of an instruction
+ with a delay slot. If a breakpoint has been placed in the
+ instruction's delay slot, GDB will single-step over that
+ instruction before resuming normally. Currently only defined for
+ the Mips.
+
+`STORE_RETURN_VALUE (TYPE, REGCACHE, VALBUF)'
+ A C expression that writes the function return value, found in
+ VALBUF, into the REGCACHE. TYPE is the type of the value that is
+ to be returned.
+
+ This method has been deprecated in favour of `gdbarch_return_value'
+ (*note gdbarch_return_value::).
+
+`SYMBOL_RELOADING_DEFAULT'
+ The default value of the "symbol-reloading" variable. (Never
+ defined in current sources.)
+
+`TARGET_CHAR_BIT'
+ Number of bits in a char; defaults to 8.
+
+`TARGET_CHAR_SIGNED'
+ Non-zero if `char' is normally signed on this architecture; zero if
+ it should be unsigned.
+
+ The ISO C standard requires the compiler to treat `char' as
+ equivalent to either `signed char' or `unsigned char'; any
+ character in the standard execution set is supposed to be positive.
+ Most compilers treat `char' as signed, but `char' is unsigned on
+ the IBM S/390, RS6000, and PowerPC targets.
+
+`TARGET_COMPLEX_BIT'
+ Number of bits in a complex number; defaults to `2 *
+ TARGET_FLOAT_BIT'.
+
+ At present this macro is not used.
+
+`TARGET_DOUBLE_BIT'
+ Number of bits in a double float; defaults to `8 *
+ TARGET_CHAR_BIT'.
+
+`TARGET_DOUBLE_COMPLEX_BIT'
+ Number of bits in a double complex; defaults to `2 *
+ TARGET_DOUBLE_BIT'.
+
+ At present this macro is not used.
+
+`TARGET_FLOAT_BIT'
+ Number of bits in a float; defaults to `4 * TARGET_CHAR_BIT'.
+
+`TARGET_INT_BIT'
+ Number of bits in an integer; defaults to `4 * TARGET_CHAR_BIT'.
+
+`TARGET_LONG_BIT'
+ Number of bits in a long integer; defaults to `4 *
+ TARGET_CHAR_BIT'.
+
+`TARGET_LONG_DOUBLE_BIT'
+ Number of bits in a long double float; defaults to `2 *
+ TARGET_DOUBLE_BIT'.
+
+`TARGET_LONG_LONG_BIT'
+ Number of bits in a long long integer; defaults to `2 *
+ TARGET_LONG_BIT'.
+
+`TARGET_PTR_BIT'
+ Number of bits in a pointer; defaults to `TARGET_INT_BIT'.
+
+`TARGET_SHORT_BIT'
+ Number of bits in a short integer; defaults to `2 *
+ TARGET_CHAR_BIT'.
+
+`TARGET_READ_PC'
+`TARGET_WRITE_PC (VAL, PID)'
+`TARGET_READ_SP'
+`TARGET_READ_FP'
+ These change the behavior of `read_pc', `write_pc', and `read_sp'.
+ For most targets, these may be left undefined. GDB will call the
+ read and write register functions with the relevant `_REGNUM'
+ argument.
+
+ These macros are useful when a target keeps one of these registers
+ in a hard to get at place; for example, part in a segment register
+ and part in an ordinary register.
+
+ *Note unwind_sp::, which replaces `TARGET_READ_SP'.
+
+`TARGET_VIRTUAL_FRAME_POINTER(PC, REGP, OFFSETP)'
+ Returns a `(register, offset)' pair representing the virtual frame
+ pointer in use at the code address PC. If virtual frame pointers
+ are not used, a default definition simply returns
+ `DEPRECATED_FP_REGNUM', with an offset of zero.
+
+`TARGET_HAS_HARDWARE_WATCHPOINTS'
+ If non-zero, the target has support for hardware-assisted
+ watchpoints. *Note watchpoints: Algorithms, for more details and
+ other related macros.
+
+`TARGET_PRINT_INSN (ADDR, INFO)'
+ This is the function used by GDB to print an assembly instruction.
+ It prints the instruction at address ADDR in debugged memory and
+ returns the length of the instruction, in bytes. If a target
+ doesn't define its own printing routine, it defaults to an
+ accessor function for the global pointer
+ `deprecated_tm_print_insn'. This usually points to a function in
+ the `opcodes' library (*note Opcodes: Support Libraries.). INFO
+ is a structure (of type `disassemble_info') defined in
+ `include/dis-asm.h' used to pass information to the instruction
+ decoding routine.
+
+`struct frame_id unwind_dummy_id (struct frame_info *FRAME)'
+ Given FRAME return a `struct frame_id' that uniquely identifies an
+ inferior function call's dummy frame. The value returned must
+ match the dummy frame stack value previously saved using
+ `SAVE_DUMMY_FRAME_TOS'. *Note SAVE_DUMMY_FRAME_TOS::.
+
+`DEPRECATED_USE_STRUCT_CONVENTION (GCC_P, TYPE)'
+ If defined, this must be an expression that is nonzero if a value
+ of the given TYPE being returned from a function must have space
+ allocated for it on the stack. GCC_P is true if the function
+ being considered is known to have been compiled by GCC; this is
+ helpful for systems where GCC is known to use different calling
+ convention than other compilers.
+
+ This method has been deprecated in favour of `gdbarch_return_value'
+ (*note gdbarch_return_value::).
+
+`VALUE_TO_REGISTER(TYPE, REGNUM, FROM, TO)'
+ Convert a value of type TYPE into the raw contents of register
+ REGNUM's. *Note Using Different Register and Memory Data
+ Representations: Target Architecture Definition.
+
+`VARIABLES_INSIDE_BLOCK (DESC, GCC_P)'
+ For dbx-style debugging information, if the compiler puts variable
+ declarations inside LBRAC/RBRAC blocks, this should be defined to
+ be nonzero. DESC is the value of `n_desc' from the `N_RBRAC'
+ symbol, and GCC_P is true if GDB has noticed the presence of
+ either the `GCC_COMPILED_SYMBOL' or the `GCC2_COMPILED_SYMBOL'.
+ By default, this is 0.
+
+`OS9K_VARIABLES_INSIDE_BLOCK (DESC, GCC_P)'
+ Similarly, for OS/9000. Defaults to 1.
+
+ Motorola M68K target conditionals.
+
+`BPT_VECTOR'
+ Define this to be the 4-bit location of the breakpoint trap
+ vector. If not defined, it will default to `0xf'.
+
+`REMOTE_BPT_VECTOR'
+ Defaults to `1'.
+
+`NAME_OF_MALLOC'
+ A string containing the name of the function to call in order to
+ allocate some memory in the inferior. The default value is
+ "malloc".
+
+
+9.12 Adding a New Target
+========================
+
+The following files add a target to GDB:
+
+`gdb/config/ARCH/TTT.mt'
+ Contains a Makefile fragment specific to this target. Specifies
+ what object files are needed for target TTT, by defining
+ `TDEPFILES=...' and `TDEPLIBS=...'. Also specifies the header
+ file which describes TTT, by defining `TM_FILE= tm-TTT.h'.
+
+ You can also define `TM_CFLAGS', `TM_CLIBS', `TM_CDEPS', but these
+ are now deprecated, replaced by autoconf, and may go away in
+ future versions of GDB.
+
+`gdb/TTT-tdep.c'
+ Contains any miscellaneous code required for this target machine.
+ On some machines it doesn't exist at all. Sometimes the macros in
+ `tm-TTT.h' become very complicated, so they are implemented as
+ functions here instead, and the macro is simply defined to call the
+ function. This is vastly preferable, since it is easier to
+ understand and debug.
+
+`gdb/ARCH-tdep.c'
+`gdb/ARCH-tdep.h'
+ This often exists to describe the basic layout of the target
+ machine's processor chip (registers, stack, etc.). If used, it is
+ included by `TTT-tdep.h'. It can be shared among many targets
+ that use the same processor.
+
+`gdb/config/ARCH/tm-TTT.h'
+ (`tm.h' is a link to this file, created by `configure'). Contains
+ macro definitions about the target machine's registers, stack frame
+ format and instructions.
+
+ New targets do not need this file and should not create it.
+
+`gdb/config/ARCH/tm-ARCH.h'
+ This often exists to describe the basic layout of the target
+ machine's processor chip (registers, stack, etc.). If used, it is
+ included by `tm-TTT.h'. It can be shared among many targets that
+ use the same processor.
+
+ New targets do not need this file and should not create it.
+
+
+ If you are adding a new operating system for an existing CPU chip,
+add a `config/tm-OS.h' file that describes the operating system
+facilities that are unusual (extra symbol table info; the breakpoint
+instruction needed; etc.). Then write a `ARCH/tm-OS.h' that just
+`#include's `tm-ARCH.h' and `config/tm-OS.h'.
+
+9.13 Converting an existing Target Architecture to Multi-arch
+=============================================================
+
+This section describes the current accepted best practice for converting
+an existing target architecture to the multi-arch framework.
+
+ The process consists of generating, testing, posting and committing a
+sequence of patches. Each patch must contain a single change, for
+instance:
+
+ * Directly convert a group of functions into macros (the conversion
+ does not change the behavior of any of the functions).
+
+ * Replace a non-multi-arch with a multi-arch mechanism (e.g.,
+ `FRAME_INFO').
+
+ * Enable multi-arch level one.
+
+ * Delete one or more files.
+
+
+There isn't a size limit on a patch, however, a developer is strongly
+encouraged to keep the patch size down.
+
+ Since each patch is well defined, and since each change has been
+tested and shows no regressions, the patches are considered _fairly_
+obvious. Such patches, when submitted by developers listed in the
+`MAINTAINERS' file, do not need approval. Occasional steps in the
+process may be more complicated and less clear. The developer is
+expected to use their judgment and is encouraged to seek advice as
+needed.
+
+9.13.1 Preparation
+------------------
+
+The first step is to establish control. Build (with `-Werror' enabled)
+and test the target so that there is a baseline against which the
+debugger can be compared.
+
+ At no stage can the test results regress or GDB stop compiling with
+`-Werror'.
+
+9.13.2 Add the multi-arch initialization code
+---------------------------------------------
+
+The objective of this step is to establish the basic multi-arch
+framework. It involves
+
+ * The addition of a `ARCH_gdbarch_init' function(2) that creates the
+ architecture:
+ static struct gdbarch *
+ d10v_gdbarch_init (info, arches)
+ struct gdbarch_info info;
+ struct gdbarch_list *arches;
+ {
+ struct gdbarch *gdbarch;
+ /* there is only one d10v architecture */
+ if (arches != NULL)
+ return arches->gdbarch;
+ gdbarch = gdbarch_alloc (&info, NULL);
+ return gdbarch;
+ }
+ __
+
+ * A per-architecture dump function to print any architecture specific
+ information:
+ static void
+ mips_dump_tdep (struct gdbarch *current_gdbarch,
+ struct ui_file *file)
+ {
+ ... code to print architecture specific info ...
+ }
+
+ * A change to `_initialize_ARCH_tdep' to register this new
+ architecture:
+ void
+ _initialize_mips_tdep (void)
+ {
+ gdbarch_register (bfd_arch_mips, mips_gdbarch_init,
+ mips_dump_tdep);
+
+ * Add the macro `GDB_MULTI_ARCH', defined as 0 (zero), to the file
+ `config/ARCH/tm-ARCH.h'.
+
+
+9.13.3 Update multi-arch incompatible mechanisms
+------------------------------------------------
+
+Some mechanisms do not work with multi-arch. They include:
+
+`FRAME_FIND_SAVED_REGS'
+ Replaced with `DEPRECATED_FRAME_INIT_SAVED_REGS'
+
+At this stage you could also consider converting the macros into
+functions.
+
+9.13.4 Prepare for multi-arch level to one
+------------------------------------------
+
+Temporally set `GDB_MULTI_ARCH' to `GDB_MULTI_ARCH_PARTIAL' and then
+build and start GDB (the change should not be committed). GDB may not
+build, and once built, it may die with an internal error listing the
+architecture methods that must be provided.
+
+ Fix any build problems (patch(es)).
+
+ Convert all the architecture methods listed, which are only macros,
+into functions (patch(es)).
+
+ Update `ARCH_gdbarch_init' to set all the missing architecture
+methods and wrap the corresponding macros in `#if !GDB_MULTI_ARCH'
+(patch(es)).
+
+9.13.5 Set multi-arch level one
+-------------------------------
+
+Change the value of `GDB_MULTI_ARCH' to GDB_MULTI_ARCH_PARTIAL (a
+single patch).
+
+ Any problems with throwing "the switch" should have been fixed
+already.
+
+9.13.6 Convert remaining macros
+-------------------------------
+
+Suggest converting macros into functions (and setting the corresponding
+architecture method) in small batches.
+
+9.13.7 Set multi-arch level to two
+----------------------------------
+
+This should go smoothly.
+
+9.13.8 Delete the TM file
+-------------------------
+
+The `tm-ARCH.h' can be deleted. `ARCH.mt' and `configure.in' updated.
+
+ ---------- Footnotes ----------
+
+ (1) Some D10V instructions are actually pairs of 16-bit
+sub-instructions. However, since you can't jump into the middle of
+such a pair, code addresses can only refer to full 32 bit instructions,
+which is what matters in this explanation.
+
+ (2) The above is from the original example and uses K&R C. GDB has
+since converted to ISO C but lets ignore that.
+
+\1f
+File: gdbint.info, Node: Target Vector Definition, Next: Native Debugging, Prev: Target Architecture Definition, Up: Top
+
+10 Target Vector Definition
+***************************
+
+The target vector defines the interface between GDB's abstract handling
+of target systems, and the nitty-gritty code that actually exercises
+control over a process or a serial port. GDB includes some 30-40
+different target vectors; however, each configuration of GDB includes
+only a few of them.
+
+* Menu:
+
+* Managing Execution State::
+* Existing Targets::
+
+\1f
+File: gdbint.info, Node: Managing Execution State, Next: Existing Targets, Up: Target Vector Definition
+
+10.1 Managing Execution State
+=============================
+
+A target vector can be completely inactive (not pushed on the target
+stack), active but not running (pushed, but not connected to a fully
+manifested inferior), or completely active (pushed, with an accessible
+inferior). Most targets are only completely inactive or completely
+active, but some support persistant connections to a target even when
+the target has exited or not yet started.
+
+ For example, connecting to the simulator using `target sim' does not
+create a running program. Neither registers nor memory are accessible
+until `run'. Similarly, after `kill', the program can not continue
+executing. But in both cases GDB remains connected to the simulator,
+and target-specific commands are directed to the simulator.
+
+ A target which only supports complete activation should push itself
+onto the stack in its `to_open' routine (by calling `push_target'), and
+unpush itself from the stack in its `to_mourn_inferior' routine (by
+calling `unpush_target').
+
+ A target which supports both partial and complete activation should
+still call `push_target' in `to_open', but not call `unpush_target' in
+`to_mourn_inferior'. Instead, it should call either
+`target_mark_running' or `target_mark_exited' in its `to_open',
+depending on whether the target is fully active after connection. It
+should also call `target_mark_running' any time the inferior becomes
+fully active (e.g. in `to_create_inferior' and `to_attach'), and
+`target_mark_exited' when the inferior becomes inactive (in
+`to_mourn_inferior'). The target should also make sure to call
+`target_mourn_inferior' from its `to_kill', to return the target to
+inactive state.
+
+\1f
+File: gdbint.info, Node: Existing Targets, Prev: Managing Execution State, Up: Target Vector Definition
+
+10.2 Existing Targets
+=====================
+
+10.2.1 File Targets
+-------------------
+
+Both executables and core files have target vectors.
+
+10.2.2 Standard Protocol and Remote Stubs
+-----------------------------------------
+
+GDB's file `remote.c' talks a serial protocol to code that runs in the
+target system. GDB provides several sample "stubs" that can be
+integrated into target programs or operating systems for this purpose;
+they are named `*-stub.c'.
+
+ The GDB user's manual describes how to put such a stub into your
+target code. What follows is a discussion of integrating the SPARC
+stub into a complicated operating system (rather than a simple
+program), by Stu Grossman, the author of this stub.
+
+ The trap handling code in the stub assumes the following upon entry
+to `trap_low':
+
+ 1. %l1 and %l2 contain pc and npc respectively at the time of the
+ trap;
+
+ 2. traps are disabled;
+
+ 3. you are in the correct trap window.
+
+ As long as your trap handler can guarantee those conditions, then
+there is no reason why you shouldn't be able to "share" traps with the
+stub. The stub has no requirement that it be jumped to directly from
+the hardware trap vector. That is why it calls `exceptionHandler()',
+which is provided by the external environment. For instance, this could
+set up the hardware traps to actually execute code which calls the stub
+first, and then transfers to its own trap handler.
+
+ For the most point, there probably won't be much of an issue with
+"sharing" traps, as the traps we use are usually not used by the kernel,
+and often indicate unrecoverable error conditions. Anyway, this is all
+controlled by a table, and is trivial to modify. The most important
+trap for us is for `ta 1'. Without that, we can't single step or do
+breakpoints. Everything else is unnecessary for the proper operation
+of the debugger/stub.
+
+ From reading the stub, it's probably not obvious how breakpoints
+work. They are simply done by deposit/examine operations from GDB.
+
+10.2.3 ROM Monitor Interface
+----------------------------
+
+10.2.4 Custom Protocols
+-----------------------
+
+10.2.5 Transport Layer
+----------------------
+
+10.2.6 Builtin Simulator
+------------------------
+
+\1f
+File: gdbint.info, Node: Native Debugging, Next: Support Libraries, Prev: Target Vector Definition, Up: Top
+
+11 Native Debugging
+*******************
+
+Several files control GDB's configuration for native support:
+
+`gdb/config/ARCH/XYZ.mh'
+ Specifies Makefile fragments needed by a _native_ configuration on
+ machine XYZ. In particular, this lists the required
+ native-dependent object files, by defining `NATDEPFILES=...'.
+ Also specifies the header file which describes native support on
+ XYZ, by defining `NAT_FILE= nm-XYZ.h'. You can also define
+ `NAT_CFLAGS', `NAT_ADD_FILES', `NAT_CLIBS', `NAT_CDEPS', etc.; see
+ `Makefile.in'.
+
+ _Maintainer's note: The `.mh' suffix is because this file
+ originally contained `Makefile' fragments for hosting GDB on
+ machine XYZ. While the file is no longer used for this purpose,
+ the `.mh' suffix remains. Perhaps someone will eventually rename
+ these fragments so that they have a `.mn' suffix._
+
+`gdb/config/ARCH/nm-XYZ.h'
+ (`nm.h' is a link to this file, created by `configure'). Contains
+ C macro definitions describing the native system environment, such
+ as child process control and core file support.
+
+`gdb/XYZ-nat.c'
+ Contains any miscellaneous C code required for this native support
+ of this machine. On some machines it doesn't exist at all.
+
+ There are some "generic" versions of routines that can be used by
+various systems. These can be customized in various ways by macros
+defined in your `nm-XYZ.h' file. If these routines work for the XYZ
+host, you can just include the generic file's name (with `.o', not
+`.c') in `NATDEPFILES'.
+
+ Otherwise, if your machine needs custom support routines, you will
+need to write routines that perform the same functions as the generic
+file. Put them into `XYZ-nat.c', and put `XYZ-nat.o' into
+`NATDEPFILES'.
+
+`inftarg.c'
+ This contains the _target_ops vector_ that supports Unix child
+ processes on systems which use ptrace and wait to control the
+ child.
+
+`procfs.c'
+ This contains the _target_ops vector_ that supports Unix child
+ processes on systems which use /proc to control the child.
+
+`fork-child.c'
+ This does the low-level grunge that uses Unix system calls to do a
+ "fork and exec" to start up a child process.
+
+`infptrace.c'
+ This is the low level interface to inferior processes for systems
+ using the Unix `ptrace' call in a vanilla way.
+
+11.1 Native core file Support
+=============================
+
+`core-aout.c::fetch_core_registers()'
+ Support for reading registers out of a core file. This routine
+ calls `register_addr()', see below. Now that BFD is used to read
+ core files, virtually all machines should use `core-aout.c', and
+ should just provide `fetch_core_registers' in `XYZ-nat.c' (or
+ `REGISTER_U_ADDR' in `nm-XYZ.h').
+
+`core-aout.c::register_addr()'
+ If your `nm-XYZ.h' file defines the macro `REGISTER_U_ADDR(addr,
+ blockend, regno)', it should be defined to set `addr' to the
+ offset within the `user' struct of GDB register number `regno'.
+ `blockend' is the offset within the "upage" of `u.u_ar0'. If
+ `REGISTER_U_ADDR' is defined, `core-aout.c' will define the
+ `register_addr()' function and use the macro in it. If you do not
+ define `REGISTER_U_ADDR', but you are using the standard
+ `fetch_core_registers()', you will need to define your own version
+ of `register_addr()', put it into your `XYZ-nat.c' file, and be
+ sure `XYZ-nat.o' is in the `NATDEPFILES' list. If you have your
+ own `fetch_core_registers()', you may not need a separate
+ `register_addr()'. Many custom `fetch_core_registers()'
+ implementations simply locate the registers themselves.
+
+ When making GDB run native on a new operating system, to make it
+possible to debug core files, you will need to either write specific
+code for parsing your OS's core files, or customize `bfd/trad-core.c'.
+First, use whatever `#include' files your machine uses to define the
+struct of registers that is accessible (possibly in the u-area) in a
+core file (rather than `machine/reg.h'), and an include file that
+defines whatever header exists on a core file (e.g., the u-area or a
+`struct core'). Then modify `trad_unix_core_file_p' to use these
+values to set up the section information for the data segment, stack
+segment, any other segments in the core file (perhaps shared library
+contents or control information), "registers" segment, and if there are
+two discontiguous sets of registers (e.g., integer and float), the
+"reg2" segment. This section information basically delimits areas in
+the core file in a standard way, which the section-reading routines in
+BFD know how to seek around in.
+
+ Then back in GDB, you need a matching routine called
+`fetch_core_registers'. If you can use the generic one, it's in
+`core-aout.c'; if not, it's in your `XYZ-nat.c' file. It will be
+passed a char pointer to the entire "registers" segment, its length,
+and a zero; or a char pointer to the entire "regs2" segment, its
+length, and a 2. The routine should suck out the supplied register
+values and install them into GDB's "registers" array.
+
+ If your system uses `/proc' to control processes, and uses ELF
+format core files, then you may be able to use the same routines for
+reading the registers out of processes and out of core files.
+
+11.2 ptrace
+===========
+
+11.3 /proc
+==========
+
+11.4 win32
+==========
+
+11.5 shared libraries
+=====================
+
+11.6 Native Conditionals
+========================
+
+When GDB is configured and compiled, various macros are defined or left
+undefined, to control compilation when the host and target systems are
+the same. These macros should be defined (or left undefined) in
+`nm-SYSTEM.h'.
+
+`CHILD_PREPARE_TO_STORE'
+ If the machine stores all registers at once in the child process,
+ then define this to ensure that all values are correct. This
+ usually entails a read from the child.
+
+ [Note that this is incorrectly defined in `xm-SYSTEM.h' files
+ currently.]
+
+`FETCH_INFERIOR_REGISTERS'
+ Define this if the native-dependent code will provide its own
+ routines `fetch_inferior_registers' and `store_inferior_registers'
+ in `HOST-nat.c'. If this symbol is _not_ defined, and
+ `infptrace.c' is included in this configuration, the default
+ routines in `infptrace.c' are used for these functions.
+
+`FP0_REGNUM'
+ This macro is normally defined to be the number of the first
+ floating point register, if the machine has such registers. As
+ such, it would appear only in target-specific code. However,
+ `/proc' support uses this to decide whether floats are in use on
+ this target.
+
+`GET_LONGJMP_TARGET'
+ For most machines, this is a target-dependent parameter. On the
+ DECstation and the Iris, this is a native-dependent parameter,
+ since `setjmp.h' is needed to define it.
+
+ This macro determines the target PC address that `longjmp' will
+ jump to, assuming that we have just stopped at a longjmp
+ breakpoint. It takes a `CORE_ADDR *' as argument, and stores the
+ target PC value through this pointer. It examines the current
+ state of the machine as needed.
+
+`I386_USE_GENERIC_WATCHPOINTS'
+ An x86-based machine can define this to use the generic x86
+ watchpoint support; see *Note I386_USE_GENERIC_WATCHPOINTS:
+ Algorithms.
+
+`KERNEL_U_ADDR'
+ Define this to the address of the `u' structure (the "user
+ struct", also known as the "u-page") in kernel virtual memory.
+ GDB needs to know this so that it can subtract this address from
+ absolute addresses in the upage, that are obtained via ptrace or
+ from core files. On systems that don't need this value, set it to
+ zero.
+
+`KERNEL_U_ADDR_HPUX'
+ Define this to cause GDB to determine the address of `u' at
+ runtime, by using HP-style `nlist' on the kernel's image in the
+ root directory.
+
+`ONE_PROCESS_WRITETEXT'
+ Define this to be able to, when a breakpoint insertion fails, warn
+ the user that another process may be running with the same
+ executable.
+
+`PROC_NAME_FMT'
+ Defines the format for the name of a `/proc' device. Should be
+ defined in `nm.h' _only_ in order to override the default
+ definition in `procfs.c'.
+
+`PTRACE_ARG3_TYPE'
+ The type of the third argument to the `ptrace' system call, if it
+ exists and is different from `int'.
+
+`REGISTER_U_ADDR'
+ Defines the offset of the registers in the "u area".
+
+`SHELL_COMMAND_CONCAT'
+ If defined, is a string to prefix on the shell command used to
+ start the inferior.
+
+`SHELL_FILE'
+ If defined, this is the name of the shell to use to run the
+ inferior. Defaults to `"/bin/sh"'.
+
+`SOLIB_ADD (FILENAME, FROM_TTY, TARG, READSYMS)'
+ Define this to expand into an expression that will cause the
+ symbols in FILENAME to be added to GDB's symbol table. If READSYMS
+ is zero symbols are not read but any necessary low level
+ processing for FILENAME is still done.
+
+`SOLIB_CREATE_INFERIOR_HOOK'
+ Define this to expand into any shared-library-relocation code that
+ you want to be run just after the child process has been forked.
+
+`START_INFERIOR_TRAPS_EXPECTED'
+ When starting an inferior, GDB normally expects to trap twice;
+ once when the shell execs, and once when the program itself execs.
+ If the actual number of traps is something other than 2, then
+ define this macro to expand into the number expected.
+
+`USE_PROC_FS'
+ This determines whether small routines in `*-tdep.c', which
+ translate register values between GDB's internal representation
+ and the `/proc' representation, are compiled.
+
+`U_REGS_OFFSET'
+ This is the offset of the registers in the upage. It need only be
+ defined if the generic ptrace register access routines in
+ `infptrace.c' are being used (that is, `infptrace.c' is configured
+ in, and `FETCH_INFERIOR_REGISTERS' is not defined). If the
+ default value from `infptrace.c' is good enough, leave it
+ undefined.
+
+ The default value means that u.u_ar0 _points to_ the location of
+ the registers. I'm guessing that `#define U_REGS_OFFSET 0' means
+ that `u.u_ar0' _is_ the location of the registers.
+
+`CLEAR_SOLIB'
+ See `objfiles.c'.
+
+`DEBUG_PTRACE'
+ Define this to debug `ptrace' calls.
+
+\1f
+File: gdbint.info, Node: Support Libraries, Next: Coding, Prev: Native Debugging, Up: Top
+
+12 Support Libraries
+********************
+
+12.1 BFD
+========
+
+BFD provides support for GDB in several ways:
+
+_identifying executable and core files_
+ BFD will identify a variety of file types, including a.out, coff,
+ and several variants thereof, as well as several kinds of core
+ files.
+
+_access to sections of files_
+ BFD parses the file headers to determine the names, virtual
+ addresses, sizes, and file locations of all the various named
+ sections in files (such as the text section or the data section).
+ GDB simply calls BFD to read or write section X at byte offset Y
+ for length Z.
+
+_specialized core file support_
+ BFD provides routines to determine the failing command name stored
+ in a core file, the signal with which the program failed, and
+ whether a core file matches (i.e. could be a core dump of) a
+ particular executable file.
+
+_locating the symbol information_
+ GDB uses an internal interface of BFD to determine where to find
+ the symbol information in an executable file or symbol-file. GDB
+ itself handles the reading of symbols, since BFD does not
+ "understand" debug symbols, but GDB uses BFD's cached information
+ to find the symbols, string table, etc.
+
+12.2 opcodes
+============
+
+The opcodes library provides GDB's disassembler. (It's a separate
+library because it's also used in binutils, for `objdump').
+
+12.3 readline
+=============
+
+12.4 mmalloc
+============
+
+12.5 libiberty
+==============
+
+The `libiberty' library provides a set of functions and features that
+integrate and improve on functionality found in modern operating
+systems. Broadly speaking, such features can be divided into three
+groups: supplemental functions (functions that may be missing in some
+environments and operating systems), replacement functions (providing a
+uniform and easier to use interface for commonly used standard
+functions), and extensions (which provide additional functionality
+beyond standard functions).
+
+ GDB uses various features provided by the `libiberty' library, for
+instance the C++ demangler, the IEEE floating format support functions,
+the input options parser `getopt', the `obstack' extension, and other
+functions.
+
+12.5.1 `obstacks' in GDB
+------------------------
+
+The obstack mechanism provides a convenient way to allocate and free
+chunks of memory. Each obstack is a pool of memory that is managed
+like a stack. Objects (of any nature, size and alignment) are
+allocated and freed in a LIFO fashion on an obstack (see `libiberty''s
+documenatation for a more detailed explanation of `obstacks').
+
+ The most noticeable use of the `obstacks' in GDB is in object files.
+There is an obstack associated with each internal representation of an
+object file. Lots of things get allocated on these `obstacks':
+dictionary entries, blocks, blockvectors, symbols, minimal symbols,
+types, vectors of fundamental types, class fields of types, object
+files section lists, object files section offets lists, line tables,
+symbol tables, partial symbol tables, string tables, symbol table
+private data, macros tables, debug information sections and entries,
+import and export lists (som), unwind information (hppa), dwarf2
+location expressions data. Plus various strings such as directory
+names strings, debug format strings, names of types.
+
+ An essential and convenient property of all data on `obstacks' is
+that memory for it gets allocated (with `obstack_alloc') at various
+times during a debugging sesssion, but it is released all at once using
+the `obstack_free' function. The `obstack_free' function takes a
+pointer to where in the stack it must start the deletion from (much
+like the cleanup chains have a pointer to where to start the cleanups).
+Because of the stack like structure of the `obstacks', this allows to
+free only a top portion of the obstack. There are a few instances in
+GDB where such thing happens. Calls to `obstack_free' are done after
+some local data is allocated to the obstack. Only the local data is
+deleted from the obstack. Of course this assumes that nothing between
+the `obstack_alloc' and the `obstack_free' allocates anything else on
+the same obstack. For this reason it is best and safest to use
+temporary `obstacks'.
+
+ Releasing the whole obstack is also not safe per se. It is safe only
+under the condition that we know the `obstacks' memory is no longer
+needed. In GDB we get rid of the `obstacks' only when we get rid of
+the whole objfile(s), for instance upon reading a new symbol file.
+
+12.6 gnu-regex
+==============
+
+Regex conditionals.
+
+`C_ALLOCA'
+
+`NFAILURES'
+
+`RE_NREGS'
+
+`SIGN_EXTEND_CHAR'
+
+`SWITCH_ENUM_BUG'
+
+`SYNTAX_TABLE'
+
+`Sword'
+
+`sparc'
+
+12.7 Array Containers
+=====================
+
+Often it is necessary to manipulate a dynamic array of a set of
+objects. C forces some bookkeeping on this, which can get cumbersome
+and repetative. The `vec.h' file contains macros for defining and
+using a typesafe vector type. The functions defined will be inlined
+when compiling, and so the abstraction cost should be zero. Domain
+checks are added to detect programming errors.
+
+ An example use would be an array of symbols or section information.
+The array can be grown as symbols are read in (or preallocated), and
+the accessor macros provided keep care of all the necessary
+bookkeeping. Because the arrays are type safe, there is no danger of
+accidentally mixing up the contents. Think of these as C++ templates,
+but implemented in C.
+
+ Because of the different behavior of structure objects, scalar
+objects and of pointers, there are three flavors of vector, one for
+each of these variants. Both the structure object and pointer variants
+pass pointers to objects around -- in the former case the pointers are
+stored into the vector and in the latter case the pointers are
+dereferenced and the objects copied into the vector. The scalar object
+variant is suitable for `int'-like objects, and the vector elements are
+returned by value.
+
+ There are both `index' and `iterate' accessors. The iterator
+returns a boolean iteration condition and updates the iteration
+variable passed by reference. Because the iterator will be inlined,
+the address-of can be optimized away.
+
+ The vectors are implemented using the trailing array idiom, thus they
+are not resizeable without changing the address of the vector object
+itself. This means you cannot have variables or fields of vector type
+-- always use a pointer to a vector. The one exception is the final
+field of a structure, which could be a vector type. You will have to
+use the `embedded_size' & `embedded_init' calls to create such objects,
+and they will probably not be resizeable (so don't use the "safe"
+allocation variants). The trailing array idiom is used (rather than a
+pointer to an array of data), because, if we allow `NULL' to also
+represent an empty vector, empty vectors occupy minimal space in the
+structure containing them.
+
+ Each operation that increases the number of active elements is
+available in "quick" and "safe" variants. The former presumes that
+there is sufficient allocated space for the operation to succeed (it
+dies if there is not). The latter will reallocate the vector, if
+needed. Reallocation causes an exponential increase in vector size.
+If you know you will be adding N elements, it would be more efficient
+to use the reserve operation before adding the elements with the
+"quick" operation. This will ensure there are at least as many
+elements as you ask for, it will exponentially increase if there are
+too few spare slots. If you want reserve a specific number of slots,
+but do not want the exponential increase (for instance, you know this
+is the last allocation), use a negative number for reservation. You
+can also create a vector of a specific size from the get go.
+
+ You should prefer the push and pop operations, as they append and
+remove from the end of the vector. If you need to remove several items
+in one go, use the truncate operation. The insert and remove
+operations allow you to change elements in the middle of the vector.
+There are two remove operations, one which preserves the element
+ordering `ordered_remove', and one which does not `unordered_remove'.
+The latter function copies the end element into the removed slot,
+rather than invoke a memmove operation. The `lower_bound' function
+will determine where to place an item in the array using insert that
+will maintain sorted order.
+
+ If you need to directly manipulate a vector, then the `address'
+accessor will return the address of the start of the vector. Also the
+`space' predicate will tell you whether there is spare capacity in the
+vector. You will not normally need to use these two functions.
+
+ Vector types are defined using a `DEF_VEC_{O,P,I}(TYPENAME)' macro.
+Variables of vector type are declared using a `VEC(TYPENAME)' macro.
+The characters `O', `P' and `I' indicate whether TYPENAME is an object
+(`O'), pointer (`P') or integral (`I') type. Be careful to pick the
+correct one, as you'll get an awkward and inefficient API if you use
+the wrong one. There is a check, which results in a compile-time
+warning, for the `P' and `I' versions, but there is no check for the
+`O' versions, as that is not possible in plain C.
+
+ An example of their use would be,
+
+ DEF_VEC_P(tree); // non-managed tree vector.
+
+ struct my_struct {
+ VEC(tree) *v; // A (pointer to) a vector of tree pointers.
+ };
+
+ struct my_struct *s;
+
+ if (VEC_length(tree, s->v)) { we have some contents }
+ VEC_safe_push(tree, s->v, decl); // append some decl onto the end
+ for (ix = 0; VEC_iterate(tree, s->v, ix, elt); ix++)
+ { do something with elt }
+
+ The `vec.h' file provides details on how to invoke the various
+accessors provided. They are enumerated here:
+
+`VEC_length'
+ Return the number of items in the array,
+
+`VEC_empty'
+ Return true if the array has no elements.
+
+`VEC_last'
+`VEC_index'
+ Return the last or arbitrary item in the array.
+
+`VEC_iterate'
+ Access an array element and indicate whether the array has been
+ traversed.
+
+`VEC_alloc'
+`VEC_free'
+ Create and destroy an array.
+
+`VEC_embedded_size'
+`VEC_embedded_init'
+ Helpers for embedding an array as the final element of another
+ struct.
+
+`VEC_copy'
+ Duplicate an array.
+
+`VEC_space'
+ Return the amount of free space in an array.
+
+`VEC_reserve'
+ Ensure a certain amount of free space.
+
+`VEC_quick_push'
+`VEC_safe_push'
+ Append to an array, either assuming the space is available, or
+ making sure that it is.
+
+`VEC_pop'
+ Remove the last item from an array.
+
+`VEC_truncate'
+ Remove several items from the end of an array.
+
+`VEC_safe_grow'
+ Add several items to the end of an array.
+
+`VEC_replace'
+ Overwrite an item in the array.
+
+`VEC_quick_insert'
+`VEC_safe_insert'
+ Insert an item into the middle of the array. Either the space must
+ already exist, or the space is created.
+
+`VEC_ordered_remove'
+`VEC_unordered_remove'
+ Remove an item from the array, preserving order or not.
+
+`VEC_block_remove'
+ Remove a set of items from the array.
+
+`VEC_address'
+ Provide the address of the first element.
+
+`VEC_lower_bound'
+ Binary search the array.
+
+
+12.8 include
+============
+
+\1f
+File: gdbint.info, Node: Coding, Next: Porting GDB, Prev: Support Libraries, Up: Top
+
+13 Coding
+*********
+
+This chapter covers topics that are lower-level than the major
+algorithms of GDB.
+
+13.1 Cleanups
+=============
+
+Cleanups are a structured way to deal with things that need to be done
+later.
+
+ When your code does something (e.g., `xmalloc' some memory, or
+`open' a file) that needs to be undone later (e.g., `xfree' the memory
+or `close' the file), it can make a cleanup. The cleanup will be done
+at some future point: when the command is finished and control returns
+to the top level; when an error occurs and the stack is unwound; or
+when your code decides it's time to explicitly perform cleanups.
+Alternatively you can elect to discard the cleanups you created.
+
+ Syntax:
+
+`struct cleanup *OLD_CHAIN;'
+ Declare a variable which will hold a cleanup chain handle.
+
+`OLD_CHAIN = make_cleanup (FUNCTION, ARG);'
+ Make a cleanup which will cause FUNCTION to be called with ARG (a
+ `char *') later. The result, OLD_CHAIN, is a handle that can
+ later be passed to `do_cleanups' or `discard_cleanups'. Unless
+ you are going to call `do_cleanups' or `discard_cleanups', you can
+ ignore the result from `make_cleanup'.
+
+`do_cleanups (OLD_CHAIN);'
+ Do all cleanups added to the chain since the corresponding
+ `make_cleanup' call was made.
+
+`discard_cleanups (OLD_CHAIN);'
+ Same as `do_cleanups' except that it just removes the cleanups from
+ the chain and does not call the specified functions.
+
+ Cleanups are implemented as a chain. The handle returned by
+`make_cleanups' includes the cleanup passed to the call and any later
+cleanups appended to the chain (but not yet discarded or performed).
+E.g.:
+
+ make_cleanup (a, 0);
+ {
+ struct cleanup *old = make_cleanup (b, 0);
+ make_cleanup (c, 0)
+ ...
+ do_cleanups (old);
+ }
+
+will call `c()' and `b()' but will not call `a()'. The cleanup that
+calls `a()' will remain in the cleanup chain, and will be done later
+unless otherwise discarded.
+
+ Your function should explicitly do or discard the cleanups it
+creates. Failing to do this leads to non-deterministic behavior since
+the caller will arbitrarily do or discard your functions cleanups.
+This need leads to two common cleanup styles.
+
+ The first style is try/finally. Before it exits, your code-block
+calls `do_cleanups' with the old cleanup chain and thus ensures that
+your code-block's cleanups are always performed. For instance, the
+following code-segment avoids a memory leak problem (even when `error'
+is called and a forced stack unwind occurs) by ensuring that the
+`xfree' will always be called:
+
+ struct cleanup *old = make_cleanup (null_cleanup, 0);
+ data = xmalloc (sizeof blah);
+ make_cleanup (xfree, data);
+ ... blah blah ...
+ do_cleanups (old);
+
+ The second style is try/except. Before it exits, your code-block
+calls `discard_cleanups' with the old cleanup chain and thus ensures
+that any created cleanups are not performed. For instance, the
+following code segment, ensures that the file will be closed but only
+if there is an error:
+
+ FILE *file = fopen ("afile", "r");
+ struct cleanup *old = make_cleanup (close_file, file);
+ ... blah blah ...
+ discard_cleanups (old);
+ return file;
+
+ Some functions, e.g., `fputs_filtered()' or `error()', specify that
+they "should not be called when cleanups are not in place". This means
+that any actions you need to reverse in the case of an error or
+interruption must be on the cleanup chain before you call these
+functions, since they might never return to your code (they `longjmp'
+instead).
+
+13.2 Per-architecture module data
+=================================
+
+The multi-arch framework includes a mechanism for adding module
+specific per-architecture data-pointers to the `struct gdbarch'
+architecture object.
+
+ A module registers one or more per-architecture data-pointers using:
+
+ -- Function: struct gdbarch_data *gdbarch_data_register_pre_init
+ (gdbarch_data_pre_init_ftype *PRE_INIT)
+ PRE_INIT is used to, on-demand, allocate an initial value for a
+ per-architecture data-pointer using the architecture's obstack
+ (passed in as a parameter). Since PRE_INIT can be called during
+ architecture creation, it is not parameterized with the
+ architecture. and must not call modules that use per-architecture
+ data.
+
+ -- Function: struct gdbarch_data *gdbarch_data_register_post_init
+ (gdbarch_data_post_init_ftype *POST_INIT)
+ POST_INIT is used to obtain an initial value for a
+ per-architecture data-pointer _after_. Since POST_INIT is always
+ called after architecture creation, it both receives the fully
+ initialized architecture and is free to call modules that use
+ per-architecture data (care needs to be taken to ensure that those
+ other modules do not try to call back to this module as that will
+ create in cycles in the initialization call graph).
+
+ These functions return a `struct gdbarch_data' that is used to
+identify the per-architecture data-pointer added for that module.
+
+ The per-architecture data-pointer is accessed using the function:
+
+ -- Function: void *gdbarch_data (struct gdbarch *GDBARCH, struct
+ gdbarch_data *DATA_HANDLE)
+ Given the architecture ARCH and module data handle DATA_HANDLE
+ (returned by `gdbarch_data_register_pre_init' or
+ `gdbarch_data_register_post_init'), this function returns the
+ current value of the per-architecture data-pointer. If the data
+ pointer is `NULL', it is first initialized by calling the
+ corresponding PRE_INIT or POST_INIT method.
+
+ The examples below assume the following definitions:
+
+ struct nozel { int total; };
+ static struct gdbarch_data *nozel_handle;
+
+ A module can extend the architecture vector, adding additional
+per-architecture data, using the PRE_INIT method. The module's
+per-architecture data is then initialized during architecture creation.
+
+ In the below, the module's per-architecture _nozel_ is added. An
+architecture can specify its nozel by calling `set_gdbarch_nozel' from
+`gdbarch_init'.
+
+ static void *
+ nozel_pre_init (struct obstack *obstack)
+ {
+ struct nozel *data = OBSTACK_ZALLOC (obstack, struct nozel);
+ return data;
+ }
+
+ extern void
+ set_gdbarch_nozel (struct gdbarch *gdbarch, int total)
+ {
+ struct nozel *data = gdbarch_data (gdbarch, nozel_handle);
+ data->total = nozel;
+ }
+
+ A module can on-demand create architecture dependant data structures
+using `post_init'.
+
+ In the below, the nozel's total is computed on-demand by
+`nozel_post_init' using information obtained from the architecture.
+
+ static void *
+ nozel_post_init (struct gdbarch *gdbarch)
+ {
+ struct nozel *data = GDBARCH_OBSTACK_ZALLOC (gdbarch, struct nozel);
+ nozel->total = gdbarch... (gdbarch);
+ return data;
+ }
+
+ extern int
+ nozel_total (struct gdbarch *gdbarch)
+ {
+ struct nozel *data = gdbarch_data (gdbarch, nozel_handle);
+ return data->total;
+ }
+
+13.3 Wrapping Output Lines
+==========================
+
+Output that goes through `printf_filtered' or `fputs_filtered' or
+`fputs_demangled' needs only to have calls to `wrap_here' added in
+places that would be good breaking points. The utility routines will
+take care of actually wrapping if the line width is exceeded.
+
+ The argument to `wrap_here' is an indentation string which is
+printed _only_ if the line breaks there. This argument is saved away
+and used later. It must remain valid until the next call to
+`wrap_here' or until a newline has been printed through the
+`*_filtered' functions. Don't pass in a local variable and then return!
+
+ It is usually best to call `wrap_here' after printing a comma or
+space. If you call it before printing a space, make sure that your
+indentation properly accounts for the leading space that will print if
+the line wraps there.
+
+ Any function or set of functions that produce filtered output must
+finish by printing a newline, to flush the wrap buffer, before switching
+to unfiltered (`printf') output. Symbol reading routines that print
+warnings are a good example.
+
+13.4 GDB Coding Standards
+=========================
+
+GDB follows the GNU coding standards, as described in
+`etc/standards.texi'. This file is also available for anonymous FTP
+from GNU archive sites. GDB takes a strict interpretation of the
+standard; in general, when the GNU standard recommends a practice but
+does not require it, GDB requires it.
+
+ GDB follows an additional set of coding standards specific to GDB,
+as described in the following sections.
+
+13.4.1 ISO C
+------------
+
+GDB assumes an ISO/IEC 9899:1990 (a.k.a. ISO C90) compliant compiler.
+
+ GDB does not assume an ISO C or POSIX compliant C library.
+
+13.4.2 Memory Management
+------------------------
+
+GDB does not use the functions `malloc', `realloc', `calloc', `free'
+and `asprintf'.
+
+ GDB uses the functions `xmalloc', `xrealloc' and `xcalloc' when
+allocating memory. Unlike `malloc' et.al. these functions do not
+return when the memory pool is empty. Instead, they unwind the stack
+using cleanups. These functions return `NULL' when requested to
+allocate a chunk of memory of size zero.
+
+ _Pragmatics: By using these functions, the need to check every
+memory allocation is removed. These functions provide portable
+behavior._
+
+ GDB does not use the function `free'.
+
+ GDB uses the function `xfree' to return memory to the memory pool.
+Consistent with ISO-C, this function ignores a request to free a `NULL'
+pointer.
+
+ _Pragmatics: On some systems `free' fails when passed a `NULL'
+pointer._
+
+ GDB can use the non-portable function `alloca' for the allocation of
+small temporary values (such as strings).
+
+ _Pragmatics: This function is very non-portable. Some systems
+restrict the memory being allocated to no more than a few kilobytes._
+
+ GDB uses the string function `xstrdup' and the print function
+`xstrprintf'.
+
+ _Pragmatics: `asprintf' and `strdup' can fail. Print functions such
+as `sprintf' are very prone to buffer overflow errors._
+
+13.4.3 Compiler Warnings
+------------------------
+
+With few exceptions, developers should include the configuration option
+`--enable-gdb-build-warnings=,-Werror' when building GDB. The
+exceptions are listed in the file `gdb/MAINTAINERS'.
+
+ This option causes GDB (when built using GCC) to be compiled with a
+carefully selected list of compiler warning flags. Any warnings from
+those flags being treated as errors.
+
+ The current list of warning flags includes:
+
+`-Wimplicit'
+ Since GDB coding standard requires all functions to be declared
+ using a prototype, the flag has the side effect of ensuring that
+ prototyped functions are always visible with out resorting to
+ `-Wstrict-prototypes'.
+
+`-Wreturn-type'
+ Such code often appears to work except on instruction set
+ architectures that use register windows.
+
+`-Wcomment'
+
+`-Wtrigraphs'
+
+`-Wformat'
+`-Wformat-nonliteral'
+ Since GDB uses the `format printf' attribute on all `printf' like
+ functions these check not just `printf' calls but also calls to
+ functions such as `fprintf_unfiltered'.
+
+`-Wparentheses'
+ This warning includes uses of the assignment operator within an
+ `if' statement.
+
+`-Wpointer-arith'
+
+`-Wuninitialized'
+
+`-Wunused-label'
+ This warning has the additional benefit of detecting the absence
+ of the `case' reserved word in a switch statement:
+ enum { FD_SCHEDULED, NOTHING_SCHEDULED } sched;
+ ...
+ switch (sched)
+ {
+ case FD_SCHEDULED:
+ ...;
+ break;
+ NOTHING_SCHEDULED:
+ ...;
+ break;
+ }
+
+`-Wunused-function'
+
+`-Wno-pointer-sign'
+ In version 4.0, GCC began warning about pointer argument passing or
+ assignment even when the source and destination differed only in
+ signedness. However, most GDB code doesn't distinguish carefully
+ between `char' and `unsigned char'. In early 2006 the GDB
+ developers decided correcting these warnings wasn't worth the time
+ it would take.
+
+
+ _Pragmatics: Due to the way that GDB is implemented most functions
+have unused parameters. Consequently the warning `-Wunused-parameter'
+is precluded from the list. The macro `ATTRIBUTE_UNUSED' is not used
+as it leads to false negatives -- it is not an error to have
+`ATTRIBUTE_UNUSED' on a parameter that is being used. The options
+`-Wall' and `-Wunused' are also precluded because they both include
+`-Wunused-parameter'._
+
+ _Pragmatics: GDB has not simply accepted the warnings enabled by
+`-Wall -Werror -W...'. Instead it is selecting warnings when and where
+their benefits can be demonstrated._
+
+13.4.4 Formatting
+-----------------
+
+The standard GNU recommendations for formatting must be followed
+strictly.
+
+ A function declaration should not have its name in column zero. A
+function definition should have its name in column zero.
+
+ /* Declaration */
+ static void foo (void);
+ /* Definition */
+ void
+ foo (void)
+ {
+ }
+
+ _Pragmatics: This simplifies scripting. Function definitions can be
+found using `^function-name'._
+
+ There must be a space between a function or macro name and the
+opening parenthesis of its argument list (except for macro definitions,
+as required by C). There must not be a space after an open
+paren/bracket or before a close paren/bracket.
+
+ While additional whitespace is generally helpful for reading, do not
+use more than one blank line to separate blocks, and avoid adding
+whitespace after the end of a program line (as of 1/99, some 600 lines
+had whitespace after the semicolon). Excess whitespace causes
+difficulties for `diff' and `patch' utilities.
+
+ Pointers are declared using the traditional K&R C style:
+
+ void *foo;
+
+and not:
+
+ void * foo;
+ void* foo;
+
+13.4.5 Comments
+---------------
+
+The standard GNU requirements on comments must be followed strictly.
+
+ Block comments must appear in the following form, with no `/*'- or
+`*/'-only lines, and no leading `*':
+
+ /* Wait for control to return from inferior to debugger. If inferior
+ gets a signal, we may decide to start it up again instead of
+ returning. That is why there is a loop in this function. When
+ this function actually returns it means the inferior should be left
+ stopped and GDB should read more commands. */
+
+ (Note that this format is encouraged by Emacs; tabbing for a
+multi-line comment works correctly, and `M-q' fills the block
+consistently.)
+
+ Put a blank line between the block comments preceding function or
+variable definitions, and the definition itself.
+
+ In general, put function-body comments on lines by themselves, rather
+than trying to fit them into the 20 characters left at the end of a
+line, since either the comment or the code will inevitably get longer
+than will fit, and then somebody will have to move it anyhow.
+
+13.4.6 C Usage
+--------------
+
+Code must not depend on the sizes of C data types, the format of the
+host's floating point numbers, the alignment of anything, or the order
+of evaluation of expressions.
+
+ Use functions freely. There are only a handful of compute-bound
+areas in GDB that might be affected by the overhead of a function call,
+mainly in symbol reading. Most of GDB's performance is limited by the
+target interface (whether serial line or system call).
+
+ However, use functions with moderation. A thousand one-line
+functions are just as hard to understand as a single thousand-line
+function.
+
+ _Macros are bad, M'kay._ (But if you have to use a macro, make sure
+that the macro arguments are protected with parentheses.)
+
+ Declarations like `struct foo *' should be used in preference to
+declarations like `typedef struct foo { ... } *foo_ptr'.
+
+13.4.7 Function Prototypes
+--------------------------
+
+Prototypes must be used when both _declaring_ and _defining_ a
+function. Prototypes for GDB functions must include both the argument
+type and name, with the name matching that used in the actual function
+definition.
+
+ All external functions should have a declaration in a header file
+that callers include, except for `_initialize_*' functions, which must
+be external so that `init.c' construction works, but shouldn't be
+visible to random source files.
+
+ Where a source file needs a forward declaration of a static function,
+that declaration must appear in a block near the top of the source file.
+
+13.4.8 Internal Error Recovery
+------------------------------
+
+During its execution, GDB can encounter two types of errors. User
+errors and internal errors. User errors include not only a user
+entering an incorrect command but also problems arising from corrupt
+object files and system errors when interacting with the target.
+Internal errors include situations where GDB has detected, at run time,
+a corrupt or erroneous situation.
+
+ When reporting an internal error, GDB uses `internal_error' and
+`gdb_assert'.
+
+ GDB must not call `abort' or `assert'.
+
+ _Pragmatics: There is no `internal_warning' function. Either the
+code detected a user error, recovered from it and issued a `warning' or
+the code failed to correctly recover from the user error and issued an
+`internal_error'._
+
+13.4.9 File Names
+-----------------
+
+Any file used when building the core of GDB must be in lower case. Any
+file used when building the core of GDB must be 8.3 unique. These
+requirements apply to both source and generated files.
+
+ _Pragmatics: The core of GDB must be buildable on many platforms
+including DJGPP and MacOS/HFS. Every time an unfriendly file is
+introduced to the build process both `Makefile.in' and `configure.in'
+need to be modified accordingly. Compare the convoluted conversion
+process needed to transform `COPYING' into `copying.c' with the
+conversion needed to transform `version.in' into `version.c'._
+
+ Any file non 8.3 compliant file (that is not used when building the
+core of GDB) must be added to `gdb/config/djgpp/fnchange.lst'.
+
+ _Pragmatics: This is clearly a compromise._
+
+ When GDB has a local version of a system header file (ex `string.h')
+the file name based on the POSIX header prefixed with `gdb_'
+(`gdb_string.h'). These headers should be relatively independent: they
+should use only macros defined by `configure', the compiler, or the
+host; they should include only system headers; they should refer only
+to system types. They may be shared between multiple programs, e.g.
+GDB and GDBSERVER.
+
+ For other files `-' is used as the separator.
+
+13.4.10 Include Files
+---------------------
+
+A `.c' file should include `defs.h' first.
+
+ A `.c' file should directly include the `.h' file of every
+declaration and/or definition it directly refers to. It cannot rely on
+indirect inclusion.
+
+ A `.h' file should directly include the `.h' file of every
+declaration and/or definition it directly refers to. It cannot rely on
+indirect inclusion. Exception: The file `defs.h' does not need to be
+directly included.
+
+ An external declaration should only appear in one include file.
+
+ An external declaration should never appear in a `.c' file.
+Exception: a declaration for the `_initialize' function that pacifies
+`-Wmissing-declaration'.
+
+ A `typedef' definition should only appear in one include file.
+
+ An opaque `struct' declaration can appear in multiple `.h' files.
+Where possible, a `.h' file should use an opaque `struct' declaration
+instead of an include.
+
+ All `.h' files should be wrapped in:
+
+ #ifndef INCLUDE_FILE_NAME_H
+ #define INCLUDE_FILE_NAME_H
+ header body
+ #endif
+
+13.4.11 Clean Design and Portable Implementation
+------------------------------------------------
+
+In addition to getting the syntax right, there's the little question of
+semantics. Some things are done in certain ways in GDB because long
+experience has shown that the more obvious ways caused various kinds of
+trouble.
+
+ You can't assume the byte order of anything that comes from a target
+(including VALUEs, object files, and instructions). Such things must
+be byte-swapped using `SWAP_TARGET_AND_HOST' in GDB, or one of the swap
+routines defined in `bfd.h', such as `bfd_get_32'.
+
+ You can't assume that you know what interface is being used to talk
+to the target system. All references to the target must go through the
+current `target_ops' vector.
+
+ You can't assume that the host and target machines are the same
+machine (except in the "native" support modules). In particular, you
+can't assume that the target machine's header files will be available
+on the host machine. Target code must bring along its own header files
+- written from scratch or explicitly donated by their owner, to avoid
+copyright problems.
+
+ Insertion of new `#ifdef''s will be frowned upon. It's much better
+to write the code portably than to conditionalize it for various
+systems.
+
+ New `#ifdef''s which test for specific compilers or manufacturers or
+operating systems are unacceptable. All `#ifdef''s should test for
+features. The information about which configurations contain which
+features should be segregated into the configuration files. Experience
+has proven far too often that a feature unique to one particular system
+often creeps into other systems; and that a conditional based on some
+predefined macro for your current system will become worthless over
+time, as new versions of your system come out that behave differently
+with regard to this feature.
+
+ Adding code that handles specific architectures, operating systems,
+target interfaces, or hosts, is not acceptable in generic code.
+
+ One particularly notorious area where system dependencies tend to
+creep in is handling of file names. The mainline GDB code assumes
+Posix semantics of file names: absolute file names begin with a forward
+slash `/', slashes are used to separate leading directories,
+case-sensitive file names. These assumptions are not necessarily true
+on non-Posix systems such as MS-Windows. To avoid system-dependent
+code where you need to take apart or construct a file name, use the
+following portable macros:
+
+`HAVE_DOS_BASED_FILE_SYSTEM'
+ This preprocessing symbol is defined to a non-zero value on hosts
+ whose filesystems belong to the MS-DOS/MS-Windows family. Use this
+ symbol to write conditional code which should only be compiled for
+ such hosts.
+
+`IS_DIR_SEPARATOR (C)'
+ Evaluates to a non-zero value if C is a directory separator
+ character. On Unix and GNU/Linux systems, only a slash `/' is
+ such a character, but on Windows, both `/' and `\' will pass.
+
+`IS_ABSOLUTE_PATH (FILE)'
+ Evaluates to a non-zero value if FILE is an absolute file name.
+ For Unix and GNU/Linux hosts, a name which begins with a slash `/'
+ is absolute. On DOS and Windows, `d:/foo' and `x:\bar' are also
+ absolute file names.
+
+`FILENAME_CMP (F1, F2)'
+ Calls a function which compares file names F1 and F2 as
+ appropriate for the underlying host filesystem. For Posix systems,
+ this simply calls `strcmp'; on case-insensitive filesystems it
+ will call `strcasecmp' instead.
+
+`DIRNAME_SEPARATOR'
+ Evaluates to a character which separates directories in
+ `PATH'-style lists, typically held in environment variables. This
+ character is `:' on Unix, `;' on DOS and Windows.
+
+`SLASH_STRING'
+ This evaluates to a constant string you should use to produce an
+ absolute filename from leading directories and the file's basename.
+ `SLASH_STRING' is `"/"' on most systems, but might be `"\\"' for
+ some Windows-based ports.
+
+ In addition to using these macros, be sure to use portable library
+functions whenever possible. For example, to extract a directory or a
+basename part from a file name, use the `dirname' and `basename'
+library functions (available in `libiberty' for platforms which don't
+provide them), instead of searching for a slash with `strrchr'.
+
+ Another way to generalize GDB along a particular interface is with an
+attribute struct. For example, GDB has been generalized to handle
+multiple kinds of remote interfaces--not by `#ifdef's everywhere, but
+by defining the `target_ops' structure and having a current target (as
+well as a stack of targets below it, for memory references). Whenever
+something needs to be done that depends on which remote interface we are
+using, a flag in the current target_ops structure is tested (e.g.,
+`target_has_stack'), or a function is called through a pointer in the
+current target_ops structure. In this way, when a new remote interface
+is added, only one module needs to be touched--the one that actually
+implements the new remote interface. Other examples of
+attribute-structs are BFD access to multiple kinds of object file
+formats, or GDB's access to multiple source languages.
+
+ Please avoid duplicating code. For example, in GDB 3.x all the code
+interfacing between `ptrace' and the rest of GDB was duplicated in
+`*-dep.c', and so changing something was very painful. In GDB 4.x,
+these have all been consolidated into `infptrace.c'. `infptrace.c' can
+deal with variations between systems the same way any system-independent
+file would (hooks, `#if defined', etc.), and machines which are
+radically different don't need to use `infptrace.c' at all.
+
+ All debugging code must be controllable using the `set debug MODULE'
+command. Do not use `printf' to print trace messages. Use
+`fprintf_unfiltered(gdb_stdlog, ...'. Do not use `#ifdef DEBUG'.
+
+\1f
+File: gdbint.info, Node: Porting GDB, Next: Versions and Branches, Prev: Coding, Up: Top
+
+14 Porting GDB
+**************
+
+Most of the work in making GDB compile on a new machine is in
+specifying the configuration of the machine. This is done in a
+dizzying variety of header files and configuration scripts, which we
+hope to make more sensible soon. Let's say your new host is called an
+XYZ (e.g., `sun4'), and its full three-part configuration name is
+`ARCH-XVEND-XOS' (e.g., `sparc-sun-sunos4'). In particular:
+
+ * In the top level directory, edit `config.sub' and add ARCH, XVEND,
+ and XOS to the lists of supported architectures, vendors, and
+ operating systems near the bottom of the file. Also, add XYZ as
+ an alias that maps to `ARCH-XVEND-XOS'. You can test your changes
+ by running
+
+ ./config.sub XYZ
+
+ and
+
+ ./config.sub `ARCH-XVEND-XOS'
+
+ which should both respond with `ARCH-XVEND-XOS' and no error
+ messages.
+
+ You need to port BFD, if that hasn't been done already. Porting
+ BFD is beyond the scope of this manual.
+
+ * To configure GDB itself, edit `gdb/configure.host' to recognize
+ your system and set `gdb_host' to XYZ, and (unless your desired
+ target is already available) also edit `gdb/configure.tgt',
+ setting `gdb_target' to something appropriate (for instance, XYZ).
+
+ _Maintainer's note: Work in progress. The file
+ `gdb/configure.host' originally needed to be modified when either a
+ new native target or a new host machine was being added to GDB.
+ Recent changes have removed this requirement. The file now only
+ needs to be modified when adding a new native configuration. This
+ will likely changed again in the future._
+
+ * Finally, you'll need to specify and define GDB's host-, native-,
+ and target-dependent `.h' and `.c' files used for your
+ configuration.
+
+\1f
+File: gdbint.info, Node: Versions and Branches, Next: Start of New Year Procedure, Prev: Porting GDB, Up: Top
+
+15 Versions and Branches
+************************
+
+15.1 Versions
+=============
+
+GDB's version is determined by the file `gdb/version.in' and takes one
+of the following forms:
+
+MAJOR.MINOR
+MAJOR.MINOR.PATCHLEVEL
+ an official release (e.g., 6.2 or 6.2.1)
+
+MAJOR.MINOR.PATCHLEVEL.YYYYMMDD
+ a snapshot taken at YYYY-MM-DD-gmt (e.g., 6.1.50.20020302,
+ 6.1.90.20020304, or 6.1.0.20020308)
+
+MAJOR.MINOR.PATCHLEVEL.YYYYMMDD-cvs
+ a CVS check out drawn on YYYY-MM-DD (e.g., 6.1.50.20020302-cvs,
+ 6.1.90.20020304-cvs, or 6.1.0.20020308-cvs)
+
+MAJOR.MINOR.PATCHLEVEL.YYYYMMDD (VENDOR)
+ a vendor specific release of GDB, that while based on
+ MAJOR.MINOR.PATCHLEVEL.YYYYMMDD, may include additional changes
+
+ GDB's mainline uses the MAJOR and MINOR version numbers from the
+most recent release branch, with a PATCHLEVEL of 50. At the time each
+new release branch is created, the mainline's MAJOR and MINOR version
+numbers are updated.
+
+ GDB's release branch is similar. When the branch is cut, the
+PATCHLEVEL is changed from 50 to 90. As draft releases are drawn from
+the branch, the PATCHLEVEL is incremented. Once the first release
+(MAJOR.MINOR) has been made, the PATCHLEVEL is set to 0 and updates
+have an incremented PATCHLEVEL.
+
+ For snapshots, and CVS check outs, it is also possible to identify
+the CVS origin:
+
+MAJOR.MINOR.50.YYYYMMDD
+ drawn from the HEAD of mainline CVS (e.g., 6.1.50.20020302)
+
+MAJOR.MINOR.90.YYYYMMDD
+MAJOR.MINOR.91.YYYYMMDD ...
+ drawn from a release branch prior to the release (e.g.,
+ 6.1.90.20020304)
+
+MAJOR.MINOR.0.YYYYMMDD
+MAJOR.MINOR.1.YYYYMMDD ...
+ drawn from a release branch after the release (e.g.,
+ 6.2.0.20020308)
+
+ If the previous GDB version is 6.1 and the current version is 6.2,
+then, substituting 6 for MAJOR and 1 or 2 for MINOR, here's an
+illustration of a typical sequence:
+
+ <HEAD>
+ |
+ 6.1.50.20020302-cvs
+ |
+ +--------------------------.
+ | <gdb_6_2-branch>
+ | |
+ 6.2.50.20020303-cvs 6.1.90 (draft #1)
+ | |
+ 6.2.50.20020304-cvs 6.1.90.20020304-cvs
+ | |
+ 6.2.50.20020305-cvs 6.1.91 (draft #2)
+ | |
+ 6.2.50.20020306-cvs 6.1.91.20020306-cvs
+ | |
+ 6.2.50.20020307-cvs 6.2 (release)
+ | |
+ 6.2.50.20020308-cvs 6.2.0.20020308-cvs
+ | |
+ 6.2.50.20020309-cvs 6.2.1 (update)
+ | |
+ 6.2.50.20020310-cvs <branch closed>
+ |
+ 6.2.50.20020311-cvs
+ |
+ +--------------------------.
+ | <gdb_6_3-branch>
+ | |
+ 6.3.50.20020312-cvs 6.2.90 (draft #1)
+ | |
+
+15.2 Release Branches
+=====================
+
+GDB draws a release series (6.2, 6.2.1, ...) from a single release
+branch, and identifies that branch using the CVS branch tags:
+
+ gdb_MAJOR_MINOR-YYYYMMDD-branchpoint
+ gdb_MAJOR_MINOR-branch
+ gdb_MAJOR_MINOR-YYYYMMDD-release
+
+ _Pragmatics: To help identify the date at which a branch or release
+is made, both the branchpoint and release tags include the date that
+they are cut (YYYYMMDD) in the tag. The branch tag, denoting the head
+of the branch, does not need this._
+
+15.3 Vendor Branches
+====================
+
+To avoid version conflicts, vendors are expected to modify the file
+`gdb/version.in' to include a vendor unique alphabetic identifier (an
+official GDB release never uses alphabetic characters in its version
+identifer). E.g., `6.2widgit2', or `6.2 (Widgit Inc Patch 2)'.
+
+15.4 Experimental Branches
+==========================
+
+15.4.1 Guidelines
+-----------------
+
+GDB permits the creation of branches, cut from the CVS repository, for
+experimental development. Branches make it possible for developers to
+share preliminary work, and maintainers to examine significant new
+developments.
+
+ The following are a set of guidelines for creating such branches:
+
+_a branch has an owner_
+ The owner can set further policy for a branch, but may not change
+ the ground rules. In particular, they can set a policy for
+ commits (be it adding more reviewers or deciding who can commit).
+
+_all commits are posted_
+ All changes committed to a branch shall also be posted to the GDB
+ patches mailing list <gdb-patches@sources.redhat.com>. While
+ commentary on such changes are encouraged, people should remember
+ that the changes only apply to a branch.
+
+_all commits are covered by an assignment_
+ This ensures that all changes belong to the Free Software
+ Foundation, and avoids the possibility that the branch may become
+ contaminated.
+
+_a branch is focused_
+ A focused branch has a single objective or goal, and does not
+ contain unnecessary or irrelevant changes. Cleanups, where
+ identified, being be pushed into the mainline as soon as possible.
+
+_a branch tracks mainline_
+ This keeps the level of divergence under control. It also keeps
+ the pressure on developers to push cleanups and other stuff into
+ the mainline.
+
+_a branch shall contain the entire GDB module_
+ The GDB module `gdb' should be specified when creating a branch
+ (branches of individual files should be avoided). *Note Tags::.
+
+_a branch shall be branded using `version.in'_
+ The file `gdb/version.in' shall be modified so that it identifies
+ the branch OWNER and branch NAME, e.g.,
+ `6.2.50.20030303_owner_name' or `6.2 (Owner Name)'.
+
+
+15.4.2 Tags
+-----------
+
+To simplify the identification of GDB branches, the following branch
+tagging convention is strongly recommended:
+
+`OWNER_NAME-YYYYMMDD-branchpoint'
+`OWNER_NAME-YYYYMMDD-branch'
+ The branch point and corresponding branch tag. YYYYMMDD is the
+ date that the branch was created. A branch is created using the
+ sequence:
+ cvs rtag OWNER_NAME-YYYYMMDD-branchpoint gdb
+ cvs rtag -b -r OWNER_NAME-YYYYMMDD-branchpoint \
+ OWNER_NAME-YYYYMMDD-branch gdb
+
+`OWNER_NAME-YYYYMMDD-mergepoint'
+ The tagged point, on the mainline, that was used when merging the
+ branch on YYYYMMDD. To merge in all changes since the branch was
+ cut, use a command sequence like:
+ cvs rtag OWNER_NAME-YYYYMMDD-mergepoint gdb
+ cvs update \
+ -jOWNER_NAME-YYYYMMDD-branchpoint
+ -jOWNER_NAME-YYYYMMDD-mergepoint
+ Similar sequences can be used to just merge in changes since the
+ last merge.
+
+
+For further information on CVS, see Concurrent Versions System
+(http://www.gnu.org/software/cvs/).
+
+\1f
+File: gdbint.info, Node: Start of New Year Procedure, Next: Releasing GDB, Prev: Versions and Branches, Up: Top
+
+16 Start of New Year Procedure
+******************************
+
+At the start of each new year, the following actions should be
+performed:
+
+ * Rotate the ChangeLog file
+
+ The current `ChangeLog' file should be renamed into
+ `ChangeLog-YYYY' where YYYY is the year that has just passed. A
+ new `ChangeLog' file should be created, and its contents should
+ contain a reference to the previous ChangeLog. The following
+ should also be preserved at the end of the new ChangeLog, in order
+ to provide the appropriate settings when editing this file with
+ Emacs:
+ Local Variables:
+ mode: change-log
+ left-margin: 8
+ fill-column: 74
+ version-control: never
+ End:
+
+ * Update the copyright year in the startup message
+
+ Update the copyright year in file `top.c', function
+ `print_gdb_version'.
+
+\1f
+File: gdbint.info, Node: Releasing GDB, Next: Testsuite, Prev: Start of New Year Procedure, Up: Top
+
+17 Releasing GDB
+****************
+
+17.1 Branch Commit Policy
+=========================
+
+The branch commit policy is pretty slack. GDB releases 5.0, 5.1 and
+5.2 all used the below:
+
+ * The `gdb/MAINTAINERS' file still holds.
+
+ * Don't fix something on the branch unless/until it is also fixed in
+ the trunk. If this isn't possible, mentioning it in the
+ `gdb/PROBLEMS' file is better than committing a hack.
+
+ * When considering a patch for the branch, suggested criteria
+ include: Does it fix a build? Does it fix the sequence `break
+ main; run' when debugging a static binary?
+
+ * The further a change is from the core of GDB, the less likely the
+ change will worry anyone (e.g., target specific code).
+
+ * Only post a proposal to change the core of GDB after you've sent
+ individual bribes to all the people listed in the `MAINTAINERS'
+ file ;-)
+
+ _Pragmatics: Provided updates are restricted to non-core
+functionality there is little chance that a broken change will be fatal.
+This means that changes such as adding a new architectures or (within
+reason) support for a new host are considered acceptable._
+
+17.2 Obsoleting code
+====================
+
+Before anything else, poke the other developers (and around the source
+code) to see if there is anything that can be removed from GDB (an old
+target, an unused file).
+
+ Obsolete code is identified by adding an `OBSOLETE' prefix to every
+line. Doing this means that it is easy to identify something that has
+been obsoleted when greping through the sources.
+
+ The process is done in stages -- this is mainly to ensure that the
+wider GDB community has a reasonable opportunity to respond. Remember,
+everything on the Internet takes a week.
+
+ 1. Post the proposal on the GDB mailing list <gdb@sources.redhat.com>
+ Creating a bug report to track the task's state, is also highly
+ recommended.
+
+ 2. Wait a week or so.
+
+ 3. Post the proposal on the GDB Announcement mailing list
+ <gdb-announce@sources.redhat.com>.
+
+ 4. Wait a week or so.
+
+ 5. Go through and edit all relevant files and lines so that they are
+ prefixed with the word `OBSOLETE'.
+
+ 6. Wait until the next GDB version, containing this obsolete code,
+ has been released.
+
+ 7. Remove the obsolete code.
+
+_Maintainer note: While removing old code is regrettable it is
+hopefully better for GDB's long term development. Firstly it helps the
+developers by removing code that is either no longer relevant or simply
+wrong. Secondly since it removes any history associated with the file
+(effectively clearing the slate) the developer has a much freer hand
+when it comes to fixing broken files._
+
+17.3 Before the Branch
+======================
+
+The most important objective at this stage is to find and fix simple
+changes that become a pain to track once the branch is created. For
+instance, configuration problems that stop GDB from even building. If
+you can't get the problem fixed, document it in the `gdb/PROBLEMS' file.
+
+Prompt for `gdb/NEWS'
+---------------------
+
+People always forget. Send a post reminding them but also if you know
+something interesting happened add it yourself. The `schedule' script
+will mention this in its e-mail.
+
+Review `gdb/README'
+-------------------
+
+Grab one of the nightly snapshots and then walk through the
+`gdb/README' looking for anything that can be improved. The `schedule'
+script will mention this in its e-mail.
+
+Refresh any imported files.
+---------------------------
+
+A number of files are taken from external repositories. They include:
+
+ * `texinfo/texinfo.tex'
+
+ * `config.guess' et. al. (see the top-level `MAINTAINERS' file)
+
+ * `etc/standards.texi', `etc/make-stds.texi'
+
+Check the ARI
+-------------
+
+A.R.I. is an `awk' script (Awk Regression Index ;-) that checks for a
+number of errors and coding conventions. The checks include things
+like using `malloc' instead of `xmalloc' and file naming problems.
+There shouldn't be any regressions.
+
+17.3.1 Review the bug data base
+-------------------------------
+
+Close anything obviously fixed.
+
+17.3.2 Check all cross targets build
+------------------------------------
+
+The targets are listed in `gdb/MAINTAINERS'.
+
+17.4 Cut the Branch
+===================
+
+Create the branch
+-----------------
+
+ $ u=5.1
+ $ v=5.2
+ $ V=`echo $v | sed 's/\./_/g'`
+ $ D=`date -u +%Y-%m-%d`
+ $ echo $u $V $D
+ 5.1 5_2 2002-03-03
+ $ echo cvs -f -d :ext:sources.redhat.com:/cvs/src rtag \
+ -D $D-gmt gdb_$V-$D-branchpoint insight
+ cvs -f -d :ext:sources.redhat.com:/cvs/src rtag
+ -D 2002-03-03-gmt gdb_5_2-2002-03-03-branchpoint insight
+ $ ^echo ^^
+ ...
+ $ echo cvs -f -d :ext:sources.redhat.com:/cvs/src rtag \
+ -b -r gdb_$V-$D-branchpoint gdb_$V-branch insight
+ cvs -f -d :ext:sources.redhat.com:/cvs/src rtag \
+ -b -r gdb_5_2-2002-03-03-branchpoint gdb_5_2-branch insight
+ $ ^echo ^^
+ ...
+ $
+
+ * By using `-D YYYY-MM-DD-gmt', the branch is forced to an exact
+ date/time.
+
+ * The trunk is first tagged so that the branch point can easily be
+ found.
+
+ * Insight, which includes GDB, is tagged at the same time.
+
+ * `version.in' gets bumped to avoid version number conflicts.
+
+ * The reading of `.cvsrc' is disabled using `-f'.
+
+Update `version.in'
+-------------------
+
+ $ u=5.1
+ $ v=5.2
+ $ V=`echo $v | sed 's/\./_/g'`
+ $ echo $u $v$V
+ 5.1 5_2
+ $ cd /tmp
+ $ echo cvs -f -d :ext:sources.redhat.com:/cvs/src co \
+ -r gdb_$V-branch src/gdb/version.in
+ cvs -f -d :ext:sources.redhat.com:/cvs/src co
+ -r gdb_5_2-branch src/gdb/version.in
+ $ ^echo ^^
+ U src/gdb/version.in
+ $ cd src/gdb
+ $ echo $u.90-0000-00-00-cvs > version.in
+ $ cat version.in
+ 5.1.90-0000-00-00-cvs
+ $ cvs -f commit version.in
+
+ * `0000-00-00' is used as a date to pump prime the version.in update
+ mechanism.
+
+ * `.90' and the previous branch version are used as fairly arbitrary
+ initial branch version number.
+
+Update the web and news pages
+-----------------------------
+
+Something?
+
+Tweak cron to track the new branch
+----------------------------------
+
+The file `gdbadmin/cron/crontab' contains gdbadmin's cron table. This
+file needs to be updated so that:
+
+ * A daily timestamp is added to the file `version.in'.
+
+ * The new branch is included in the snapshot process.
+
+See the file `gdbadmin/cron/README' for how to install the updated cron
+table.
+
+ The file `gdbadmin/ss/README' should also be reviewed to reflect any
+changes. That file is copied to both the branch/ and current/ snapshot
+directories.
+
+Update the NEWS and README files
+--------------------------------
+
+The `NEWS' file needs to be updated so that on the branch it refers to
+_changes in the current release_ while on the trunk it also refers to
+_changes since the current release_.
+
+ The `README' file needs to be updated so that it refers to the
+current release.
+
+Post the branch info
+--------------------
+
+Send an announcement to the mailing lists:
+
+ * GDB Announcement mailing list <gdb-announce@sources.redhat.com>
+
+ * GDB Discsussion mailing list <gdb@sources.redhat.com> and GDB
+ Discsussion mailing list <gdb-testers@sources.redhat.com>
+
+ _Pragmatics: The branch creation is sent to the announce list to
+ensure that people people not subscribed to the higher volume discussion
+list are alerted._
+
+ The announcement should include:
+
+ * The branch tag.
+
+ * How to check out the branch using CVS.
+
+ * The date/number of weeks until the release.
+
+ * The branch commit policy still holds.
+
+17.5 Stabilize the branch
+=========================
+
+Something goes here.
+
+17.6 Create a Release
+=====================
+
+The process of creating and then making available a release is broken
+down into a number of stages. The first part addresses the technical
+process of creating a releasable tar ball. The later stages address the
+process of releasing that tar ball.
+
+ When making a release candidate just the first section is needed.
+
+17.6.1 Create a release candidate
+---------------------------------
+
+The objective at this stage is to create a set of tar balls that can be
+made available as a formal release (or as a less formal release
+candidate).
+
+Freeze the branch
+.................
+
+Send out an e-mail notifying everyone that the branch is frozen to
+<gdb-patches@sources.redhat.com>.
+
+Establish a few defaults.
+.........................
+
+ $ b=gdb_5_2-branch
+ $ v=5.2
+ $ t=/sourceware/snapshot-tmp/gdbadmin-tmp
+ $ echo $t/$b/$v
+ /sourceware/snapshot-tmp/gdbadmin-tmp/gdb_5_2-branch/5.2
+ $ mkdir -p $t/$b/$v
+ $ cd $t/$b/$v
+ $ pwd
+ /sourceware/snapshot-tmp/gdbadmin-tmp/gdb_5_2-branch/5.2
+ $ which autoconf
+ /home/gdbadmin/bin/autoconf
+ $
+
+Notes:
+
+ * Check the `autoconf' version carefully. You want to be using the
+ version taken from the `binutils' snapshot directory, which can be
+ found at `ftp://sources.redhat.com/pub/binutils/'. It is very
+ unlikely that a system installed version of `autoconf' (e.g.,
+ `/usr/bin/autoconf') is correct.
+
+Check out the relevant modules:
+...............................
+
+ $ for m in gdb insight
+ do
+ ( mkdir -p $m && cd $m && cvs -q -f -d /cvs/src co -P -r $b $m )
+ done
+ $
+
+Note:
+
+ * The reading of `.cvsrc' is disabled (`-f') so that there isn't any
+ confusion between what is written here and what your local `cvs'
+ really does.
+
+Update relevant files.
+......................
+
+`gdb/NEWS'
+ Major releases get their comments added as part of the mainline.
+ Minor releases should probably mention any significant bugs that
+ were fixed.
+
+ Don't forget to include the `ChangeLog' entry.
+
+ $ emacs gdb/src/gdb/NEWS
+ ...
+ c-x 4 a
+ ...
+ c-x c-s c-x c-c
+ $ cp gdb/src/gdb/NEWS insight/src/gdb/NEWS
+ $ cp gdb/src/gdb/ChangeLog insight/src/gdb/ChangeLog
+
+`gdb/README'
+ You'll need to update:
+
+ * The version.
+
+ * The update date.
+
+ * Who did it.
+
+ $ emacs gdb/src/gdb/README
+ ...
+ c-x 4 a
+ ...
+ c-x c-s c-x c-c
+ $ cp gdb/src/gdb/README insight/src/gdb/README
+ $ cp gdb/src/gdb/ChangeLog insight/src/gdb/ChangeLog
+
+ _Maintainer note: Hopefully the `README' file was reviewed before
+ the initial branch was cut so just a simple substitute is needed
+ to get it updated._
+
+ _Maintainer note: Other projects generate `README' and `INSTALL'
+ from the core documentation. This might be worth pursuing._
+
+`gdb/version.in'
+ $ echo $v > gdb/src/gdb/version.in
+ $ cat gdb/src/gdb/version.in
+ 5.2
+ $ emacs gdb/src/gdb/version.in
+ ...
+ c-x 4 a
+ ... Bump to version ...
+ c-x c-s c-x c-c
+ $ cp gdb/src/gdb/version.in insight/src/gdb/version.in
+ $ cp gdb/src/gdb/ChangeLog insight/src/gdb/ChangeLog
+
+
+Do the dirty work
+.................
+
+This is identical to the process used to create the daily snapshot.
+
+ $ for m in gdb insight
+ do
+ ( cd $m/src && gmake -f src-release $m.tar )
+ done
+
+ If the top level source directory does not have `src-release' (GDB
+version 5.3.1 or earlier), try these commands instead:
+
+ $ for m in gdb insight
+ do
+ ( cd $m/src && gmake -f Makefile.in $m.tar )
+ done
+
+Check the source files
+......................
+
+You're looking for files that have mysteriously disappeared.
+`distclean' has the habit of deleting files it shouldn't. Watch out
+for the `version.in' update `cronjob'.
+
+ $ ( cd gdb/src && cvs -f -q -n update )
+ M djunpack.bat
+ ? gdb-5.1.91.tar
+ ? proto-toplev
+ ... lots of generated files ...
+ M gdb/ChangeLog
+ M gdb/NEWS
+ M gdb/README
+ M gdb/version.in
+ ... lots of generated files ...
+ $
+
+_Don't worry about the `gdb.info-??' or `gdb/p-exp.tab.c'. They were
+generated (and yes `gdb.info-1' was also generated only something
+strange with CVS means that they didn't get supressed). Fixing it
+would be nice though._
+
+Create compressed versions of the release
+.........................................
+
+ $ cp */src/*.tar .
+ $ cp */src/*.bz2 .
+ $ ls -F
+ gdb/ gdb-5.2.tar insight/ insight-5.2.tar
+ $ for m in gdb insight
+ do
+ bzip2 -v -9 -c $m-$v.tar > $m-$v.tar.bz2
+ gzip -v -9 -c $m-$v.tar > $m-$v.tar.gz
+ done
+ $
+
+Note:
+
+ * A pipe such as `bunzip2 < xxx.bz2 | gzip -9 > xxx.gz' is not since,
+ in that mode, `gzip' does not know the name of the file and, hence,
+ can not include it in the compressed file. This is also why the
+ release process runs `tar' and `bzip2' as separate passes.
+
+17.6.2 Sanity check the tar ball
+--------------------------------
+
+Pick a popular machine (Solaris/PPC?) and try the build on that.
+
+ $ bunzip2 < gdb-5.2.tar.bz2 | tar xpf -
+ $ cd gdb-5.2
+ $ ./configure
+ $ make
+ ...
+ $ ./gdb/gdb ./gdb/gdb
+ GNU gdb 5.2
+ ...
+ (gdb) b main
+ Breakpoint 1 at 0x80732bc: file main.c, line 734.
+ (gdb) run
+ Starting program: /tmp/gdb-5.2/gdb/gdb
+
+ Breakpoint 1, main (argc=1, argv=0xbffff8b4) at main.c:734
+ 734 catch_errors (captured_main, &args, "", RETURN_MASK_ALL);
+ (gdb) print args
+ $1 = {argc = 136426532, argv = 0x821b7f0}
+ (gdb)
+
+17.6.3 Make a release candidate available
+-----------------------------------------
+
+If this is a release candidate then the only remaining steps are:
+
+ 1. Commit `version.in' and `ChangeLog'
+
+ 2. Tweak `version.in' (and `ChangeLog' to read L.M.N-0000-00-00-cvs
+ so that the version update process can restart.
+
+ 3. Make the release candidate available in
+ `ftp://sources.redhat.com/pub/gdb/snapshots/branch'
+
+ 4. Notify the relevant mailing lists ( <gdb@sources.redhat.com> and
+ <gdb-testers@sources.redhat.com> that the candidate is available.
+
+17.6.4 Make a formal release available
+--------------------------------------
+
+(And you thought all that was required was to post an e-mail.)
+
+Install on sware
+................
+
+Copy the new files to both the release and the old release directory:
+
+ $ cp *.bz2 *.gz ~ftp/pub/gdb/old-releases/
+ $ cp *.bz2 *.gz ~ftp/pub/gdb/releases
+
+Clean up the releases directory so that only the most recent releases
+are available (e.g. keep 5.2 and 5.2.1 but remove 5.1):
+
+ $ cd ~ftp/pub/gdb/releases
+ $ rm ...
+
+Update the file `README' and `.message' in the releases directory:
+
+ $ vi README
+ ...
+ $ rm -f .message
+ $ ln README .message
+
+Update the web pages.
+.....................
+
+`htdocs/download/ANNOUNCEMENT'
+ This file, which is posted as the official announcement, includes:
+ * General announcement.
+
+ * News. If making an M.N.1 release, retain the news from
+ earlier M.N release.
+
+ * Errata.
+
+`htdocs/index.html'
+`htdocs/news/index.html'
+`htdocs/download/index.html'
+ These files include:
+ * Announcement of the most recent release.
+
+ * News entry (remember to update both the top level and the
+ news directory).
+ These pages also need to be regenerate using `index.sh'.
+
+`download/onlinedocs/'
+ You need to find the magic command that is used to generate the
+ online docs from the `.tar.bz2'. The best way is to look in the
+ output from one of the nightly `cron' jobs and then just edit
+ accordingly. Something like:
+
+ $ ~/ss/update-web-docs \
+ ~ftp/pub/gdb/releases/gdb-5.2.tar.bz2 \
+ $PWD/www \
+ /www/sourceware/htdocs/gdb/download/onlinedocs \
+ gdb
+
+`download/ari/'
+ Just like the online documentation. Something like:
+
+ $ /bin/sh ~/ss/update-web-ari \
+ ~ftp/pub/gdb/releases/gdb-5.2.tar.bz2 \
+ $PWD/www \
+ /www/sourceware/htdocs/gdb/download/ari \
+ gdb
+
+
+Shadow the pages onto gnu
+.........................
+
+Something goes here.
+
+Install the GDB tar ball on GNU
+...............................
+
+At the time of writing, the GNU machine was `gnudist.gnu.org' in
+`~ftp/gnu/gdb'.
+
+Make the `ANNOUNCEMENT'
+.......................
+
+Post the `ANNOUNCEMENT' file you created above to:
+
+ * GDB Announcement mailing list <gdb-announce@sources.redhat.com>
+
+ * General GNU Announcement list <info-gnu@gnu.org> (but delay it a
+ day or so to let things get out)
+
+ * GDB Bug Report mailing list <bug-gdb@gnu.org>
+
+17.6.5 Cleanup
+--------------
+
+The release is out but you're still not finished.
+
+Commit outstanding changes
+..........................
+
+In particular you'll need to commit any changes to:
+
+ * `gdb/ChangeLog'
+
+ * `gdb/version.in'
+
+ * `gdb/NEWS'
+
+ * `gdb/README'
+
+Tag the release
+...............
+
+Something like:
+
+ $ d=`date -u +%Y-%m-%d`
+ $ echo $d
+ 2002-01-24
+ $ ( cd insight/src/gdb && cvs -f -q update )
+ $ ( cd insight/src && cvs -f -q tag gdb_5_2-$d-release )
+
+ Insight is used since that contains more of the release than GDB.
+
+Mention the release on the trunk
+................................
+
+Just put something in the `ChangeLog' so that the trunk also indicates
+when the release was made.
+
+Restart `gdb/version.in'
+........................
+
+If `gdb/version.in' does not contain an ISO date such as `2002-01-24'
+then the daily `cronjob' won't update it. Having committed all the
+release changes it can be set to `5.2.0_0000-00-00-cvs' which will
+restart things (yes the `_' is important - it affects the snapshot
+process).
+
+ Don't forget the `ChangeLog'.
+
+Merge into trunk
+................
+
+The files committed to the branch may also need changes merged into the
+trunk.
+
+Revise the release schedule
+...........................
+
+Post a revised release schedule to GDB Discussion List
+<gdb@sources.redhat.com> with an updated announcement. The schedule
+can be generated by running:
+
+ $ ~/ss/schedule `date +%s` schedule
+
+The first parameter is approximate date/time in seconds (from the epoch)
+of the most recent release.
+
+ Also update the schedule `cronjob'.
+
+17.7 Post release
+=================
+
+Remove any `OBSOLETE' code.
+
+\1f
+File: gdbint.info, Node: Testsuite, Next: Hints, Prev: Releasing GDB, Up: Top
+
+18 Testsuite
+************
+
+The testsuite is an important component of the GDB package. While it
+is always worthwhile to encourage user testing, in practice this is
+rarely sufficient; users typically use only a small subset of the
+available commands, and it has proven all too common for a change to
+cause a significant regression that went unnoticed for some time.
+
+ The GDB testsuite uses the DejaGNU testing framework. The tests
+themselves are calls to various `Tcl' procs; the framework runs all the
+procs and summarizes the passes and fails.
+
+18.1 Using the Testsuite
+========================
+
+To run the testsuite, simply go to the GDB object directory (or to the
+testsuite's objdir) and type `make check'. This just sets up some
+environment variables and invokes DejaGNU's `runtest' script. While
+the testsuite is running, you'll get mentions of which test file is in
+use, and a mention of any unexpected passes or fails. When the
+testsuite is finished, you'll get a summary that looks like this:
+
+ === gdb Summary ===
+
+ # of expected passes 6016
+ # of unexpected failures 58
+ # of unexpected successes 5
+ # of expected failures 183
+ # of unresolved testcases 3
+ # of untested testcases 5
+
+ To run a specific test script, type:
+ make check RUNTESTFLAGS='TESTS'
+ where TESTS is a list of test script file names, separated by spaces.
+
+ The ideal test run consists of expected passes only; however, reality
+conspires to keep us from this ideal. Unexpected failures indicate
+real problems, whether in GDB or in the testsuite. Expected failures
+are still failures, but ones which have been decided are too hard to
+deal with at the time; for instance, a test case might work everywhere
+except on AIX, and there is no prospect of the AIX case being fixed in
+the near future. Expected failures should not be added lightly, since
+you may be masking serious bugs in GDB. Unexpected successes are
+expected fails that are passing for some reason, while unresolved and
+untested cases often indicate some minor catastrophe, such as the
+compiler being unable to deal with a test program.
+
+ When making any significant change to GDB, you should run the
+testsuite before and after the change, to confirm that there are no
+regressions. Note that truly complete testing would require that you
+run the testsuite with all supported configurations and a variety of
+compilers; however this is more than really necessary. In many cases
+testing with a single configuration is sufficient. Other useful
+options are to test one big-endian (Sparc) and one little-endian (x86)
+host, a cross config with a builtin simulator (powerpc-eabi, mips-elf),
+or a 64-bit host (Alpha).
+
+ If you add new functionality to GDB, please consider adding tests
+for it as well; this way future GDB hackers can detect and fix their
+changes that break the functionality you added. Similarly, if you fix
+a bug that was not previously reported as a test failure, please add a
+test case for it. Some cases are extremely difficult to test, such as
+code that handles host OS failures or bugs in particular versions of
+compilers, and it's OK not to try to write tests for all of those.
+
+ DejaGNU supports separate build, host, and target machines. However,
+some GDB test scripts do not work if the build machine and the host
+machine are not the same. In such an environment, these scripts will
+give a result of "UNRESOLVED", like this:
+
+ UNRESOLVED: gdb.base/example.exp: This test script does not work on a remote host.
+
+18.2 Testsuite Organization
+===========================
+
+The testsuite is entirely contained in `gdb/testsuite'. While the
+testsuite includes some makefiles and configury, these are very minimal,
+and used for little besides cleaning up, since the tests themselves
+handle the compilation of the programs that GDB will run. The file
+`testsuite/lib/gdb.exp' contains common utility procs useful for all
+GDB tests, while the directory `testsuite/config' contains
+configuration-specific files, typically used for special-purpose
+definitions of procs like `gdb_load' and `gdb_start'.
+
+ The tests themselves are to be found in `testsuite/gdb.*' and
+subdirectories of those. The names of the test files must always end
+with `.exp'. DejaGNU collects the test files by wildcarding in the
+test directories, so both subdirectories and individual files get
+chosen and run in alphabetical order.
+
+ The following table lists the main types of subdirectories and what
+they are for. Since DejaGNU finds test files no matter where they are
+located, and since each test file sets up its own compilation and
+execution environment, this organization is simply for convenience and
+intelligibility.
+
+`gdb.base'
+ This is the base testsuite. The tests in it should apply to all
+ configurations of GDB (but generic native-only tests may live
+ here). The test programs should be in the subset of C that is
+ valid K&R, ANSI/ISO, and C++ (`#ifdef's are allowed if necessary,
+ for instance for prototypes).
+
+`gdb.LANG'
+ Language-specific tests for any language LANG besides C. Examples
+ are `gdb.cp' and `gdb.java'.
+
+`gdb.PLATFORM'
+ Non-portable tests. The tests are specific to a specific
+ configuration (host or target), such as HP-UX or eCos. Example is
+ `gdb.hp', for HP-UX.
+
+`gdb.COMPILER'
+ Tests specific to a particular compiler. As of this writing (June
+ 1999), there aren't currently any groups of tests in this category
+ that couldn't just as sensibly be made platform-specific, but one
+ could imagine a `gdb.gcc', for tests of GDB's handling of GCC
+ extensions.
+
+`gdb.SUBSYSTEM'
+ Tests that exercise a specific GDB subsystem in more depth. For
+ instance, `gdb.disasm' exercises various disassemblers, while
+ `gdb.stabs' tests pathways through the stabs symbol reader.
+
+18.3 Writing Tests
+==================
+
+In many areas, the GDB tests are already quite comprehensive; you
+should be able to copy existing tests to handle new cases.
+
+ You should try to use `gdb_test' whenever possible, since it
+includes cases to handle all the unexpected errors that might happen.
+However, it doesn't cost anything to add new test procedures; for
+instance, `gdb.base/exprs.exp' defines a `test_expr' that calls
+`gdb_test' multiple times.
+
+ Only use `send_gdb' and `gdb_expect' when absolutely necessary, such
+as when GDB has several valid responses to a command.
+
+ The source language programs do _not_ need to be in a consistent
+style. Since GDB is used to debug programs written in many different
+styles, it's worth having a mix of styles in the testsuite; for
+instance, some GDB bugs involving the display of source lines would
+never manifest themselves if the programs used GNU coding style
+uniformly.
+
+\1f
+File: gdbint.info, Node: Hints, Next: GDB Observers, Prev: Testsuite, Up: Top
+
+19 Hints
+********
+
+Check the `README' file, it often has useful information that does not
+appear anywhere else in the directory.
+
+* Menu:
+
+* Getting Started:: Getting started working on GDB
+* Debugging GDB:: Debugging GDB with itself
+
+\1f
+File: gdbint.info, Node: Getting Started, Up: Hints
+
+19.1 Getting Started
+====================
+
+GDB is a large and complicated program, and if you first starting to
+work on it, it can be hard to know where to start. Fortunately, if you
+know how to go about it, there are ways to figure out what is going on.
+
+ This manual, the GDB Internals manual, has information which applies
+generally to many parts of GDB.
+
+ Information about particular functions or data structures are
+located in comments with those functions or data structures. If you
+run across a function or a global variable which does not have a
+comment correctly explaining what is does, this can be thought of as a
+bug in GDB; feel free to submit a bug report, with a suggested comment
+if you can figure out what the comment should say. If you find a
+comment which is actually wrong, be especially sure to report that.
+
+ Comments explaining the function of macros defined in host, target,
+or native dependent files can be in several places. Sometimes they are
+repeated every place the macro is defined. Sometimes they are where the
+macro is used. Sometimes there is a header file which supplies a
+default definition of the macro, and the comment is there. This manual
+also documents all the available macros.
+
+ Start with the header files. Once you have some idea of how GDB's
+internal symbol tables are stored (see `symtab.h', `gdbtypes.h'), you
+will find it much easier to understand the code which uses and creates
+those symbol tables.
+
+ You may wish to process the information you are getting somehow, to
+enhance your understanding of it. Summarize it, translate it to another
+language, add some (perhaps trivial or non-useful) feature to GDB, use
+the code to predict what a test case would do and write the test case
+and verify your prediction, etc. If you are reading code and your eyes
+are starting to glaze over, this is a sign you need to use a more active
+approach.
+
+ Once you have a part of GDB to start with, you can find more
+specifically the part you are looking for by stepping through each
+function with the `next' command. Do not use `step' or you will
+quickly get distracted; when the function you are stepping through
+calls another function try only to get a big-picture understanding
+(perhaps using the comment at the beginning of the function being
+called) of what it does. This way you can identify which of the
+functions being called by the function you are stepping through is the
+one which you are interested in. You may need to examine the data
+structures generated at each stage, with reference to the comments in
+the header files explaining what the data structures are supposed to
+look like.
+
+ Of course, this same technique can be used if you are just reading
+the code, rather than actually stepping through it. The same general
+principle applies--when the code you are looking at calls something
+else, just try to understand generally what the code being called does,
+rather than worrying about all its details.
+
+ A good place to start when tracking down some particular area is with
+a command which invokes that feature. Suppose you want to know how
+single-stepping works. As a GDB user, you know that the `step' command
+invokes single-stepping. The command is invoked via command tables
+(see `command.h'); by convention the function which actually performs
+the command is formed by taking the name of the command and adding
+`_command', or in the case of an `info' subcommand, `_info'. For
+example, the `step' command invokes the `step_command' function and the
+`info display' command invokes `display_info'. When this convention is
+not followed, you might have to use `grep' or `M-x tags-search' in
+emacs, or run GDB on itself and set a breakpoint in `execute_command'.
+
+ If all of the above fail, it may be appropriate to ask for
+information on `bug-gdb'. But _never_ post a generic question like "I
+was wondering if anyone could give me some tips about understanding
+GDB"--if we had some magic secret we would put it in this manual.
+Suggestions for improving the manual are always welcome, of course.
+
+\1f
+File: gdbint.info, Node: Debugging GDB, Up: Hints
+
+19.2 Debugging GDB with itself
+==============================
+
+If GDB is limping on your machine, this is the preferred way to get it
+fully functional. Be warned that in some ancient Unix systems, like
+Ultrix 4.2, a program can't be running in one process while it is being
+debugged in another. Rather than typing the command `./gdb ./gdb',
+which works on Suns and such, you can copy `gdb' to `gdb2' and then
+type `./gdb ./gdb2'.
+
+ When you run GDB in the GDB source directory, it will read a
+`.gdbinit' file that sets up some simple things to make debugging gdb
+easier. The `info' command, when executed without a subcommand in a
+GDB being debugged by gdb, will pop you back up to the top level gdb.
+See `.gdbinit' for details.
+
+ If you use emacs, you will probably want to do a `make TAGS' after
+you configure your distribution; this will put the machine dependent
+routines for your local machine where they will be accessed first by
+`M-.'
+
+ Also, make sure that you've either compiled GDB with your local cc,
+or have run `fixincludes' if you are compiling with gcc.
+
+19.3 Submitting Patches
+=======================
+
+Thanks for thinking of offering your changes back to the community of
+GDB users. In general we like to get well designed enhancements.
+Thanks also for checking in advance about the best way to transfer the
+changes.
+
+ The GDB maintainers will only install "cleanly designed" patches.
+This manual summarizes what we believe to be clean design for GDB.
+
+ If the maintainers don't have time to put the patch in when it
+arrives, or if there is any question about a patch, it goes into a
+large queue with everyone else's patches and bug reports.
+
+ The legal issue is that to incorporate substantial changes requires a
+copyright assignment from you and/or your employer, granting ownership
+of the changes to the Free Software Foundation. You can get the
+standard documents for doing this by sending mail to `gnu@gnu.org' and
+asking for it. We recommend that people write in "All programs owned
+by the Free Software Foundation" as "NAME OF PROGRAM", so that changes
+in many programs (not just GDB, but GAS, Emacs, GCC, etc) can be
+contributed with only one piece of legalese pushed through the
+bureaucracy and filed with the FSF. We can't start merging changes
+until this paperwork is received by the FSF (their rules, which we
+follow since we maintain it for them).
+
+ Technically, the easiest way to receive changes is to receive each
+feature as a small context diff or unidiff, suitable for `patch'. Each
+message sent to me should include the changes to C code and header
+files for a single feature, plus `ChangeLog' entries for each directory
+where files were modified, and diffs for any changes needed to the
+manuals (`gdb/doc/gdb.texinfo' or `gdb/doc/gdbint.texinfo'). If there
+are a lot of changes for a single feature, they can be split down into
+multiple messages.
+
+ In this way, if we read and like the feature, we can add it to the
+sources with a single patch command, do some testing, and check it in.
+If you leave out the `ChangeLog', we have to write one. If you leave
+out the doc, we have to puzzle out what needs documenting. Etc., etc.
+
+ The reason to send each change in a separate message is that we will
+not install some of the changes. They'll be returned to you with
+questions or comments. If we're doing our job correctly, the message
+back to you will say what you have to fix in order to make the change
+acceptable. The reason to have separate messages for separate features
+is so that the acceptable changes can be installed while one or more
+changes are being reworked. If multiple features are sent in a single
+message, we tend to not put in the effort to sort out the acceptable
+changes from the unacceptable, so none of the features get installed
+until all are acceptable.
+
+ If this sounds painful or authoritarian, well, it is. But we get a
+lot of bug reports and a lot of patches, and many of them don't get
+installed because we don't have the time to finish the job that the bug
+reporter or the contributor could have done. Patches that arrive
+complete, working, and well designed, tend to get installed on the day
+they arrive. The others go into a queue and get installed as time
+permits, which, since the maintainers have many demands to meet, may not
+be for quite some time.
+
+ Please send patches directly to the GDB maintainers
+<gdb-patches@sources.redhat.com>.
+
+19.4 Obsolete Conditionals
+==========================
+
+Fragments of old code in GDB sometimes reference or set the following
+configuration macros. They should not be used by new code, and old uses
+should be removed as those parts of the debugger are otherwise touched.
+
+`STACK_END_ADDR'
+ This macro used to define where the end of the stack appeared, for
+ use in interpreting core file formats that don't record this
+ address in the core file itself. This information is now
+ configured in BFD, and GDB gets the info portably from there. The
+ values in GDB's configuration files should be moved into BFD
+ configuration files (if needed there), and deleted from all of
+ GDB's config files.
+
+ Any `FOO-xdep.c' file that references STACK_END_ADDR is so old
+ that it has never been converted to use BFD. Now that's old!
+
+
+\1f
+File: gdbint.info, Node: GDB Observers, Next: GNU Free Documentation License, Prev: Hints, Up: Top
+
+Appendix A GDB Currently available observers
+********************************************
+
+A.1 Implementation rationale
+============================
+
+An "observer" is an entity which is interested in being notified when
+GDB reaches certain states, or certain events occur in GDB. The entity
+being observed is called the "subject". To receive notifications, the
+observer attaches a callback to the subject. One subject can have
+several observers.
+
+ `observer.c' implements an internal generic low-level event
+notification mechanism. This generic event notification mechanism is
+then re-used to implement the exported high-level notification
+management routines for all possible notifications.
+
+ The current implementation of the generic observer provides support
+for contextual data. This contextual data is given to the subject when
+attaching the callback. In return, the subject will provide this
+contextual data back to the observer as a parameter of the callback.
+
+ Note that the current support for the contextual data is only
+partial, as it lacks a mechanism that would deallocate this data when
+the callback is detached. This is not a problem so far, as this
+contextual data is only used internally to hold a function pointer.
+Later on, if a certain observer needs to provide support for user-level
+contextual data, then the generic notification mechanism will need to be
+enhanced to allow the observer to provide a routine to deallocate the
+data when attaching the callback.
+
+ The observer implementation is also currently not reentrant. In
+particular, it is therefore not possible to call the attach or detach
+routines during a notification.
+
+A.2 Debugging
+=============
+
+Observer notifications can be traced using the command `set debug
+observer 1' (*note Optional messages about internal happenings:
+(gdb)Debugging Output.).
+
+A.3 `normal_stop' Notifications
+===============================
+
+GDB notifies all `normal_stop' observers when the inferior execution
+has just stopped, the associated messages and annotations have been
+printed, and the control is about to be returned to the user.
+
+ Note that the `normal_stop' notification is not emitted when the
+execution stops due to a breakpoint, and this breakpoint has a
+condition that is not met. If the breakpoint has any associated
+commands list, the commands are executed after the notification is
+emitted.
+
+ The following interfaces are available to manage observers:
+
+ -- Function: extern struct observer *observer_attach_EVENT
+ (observer_EVENT_ftype *F)
+ Using the function F, create an observer that is notified when
+ ever EVENT occures, return the observer.
+
+ -- Function: extern void observer_detach_EVENT (struct observer
+ *OBSERVER);
+ Remove OBSERVER from the list of observers to be notified when
+ EVENT occurs.
+
+ -- Function: extern void observer_notify_EVENT (void);
+ Send a notification to all EVENT observers.
+
+ The following observable events are defined:
+
+ -- Function: void normal_stop (struct bpstats *BS)
+ The inferior has stopped for real.
+
+ -- Function: void target_changed (struct target_ops *TARGET)
+ The target's register contents have changed.
+
+ -- Function: void executable_changed (void *UNUSED_ARGS)
+ The executable being debugged by GDB has changed: The user decided
+ to debug a different program, or the program he was debugging has
+ been modified since being loaded by the debugger (by being
+ recompiled, for instance).
+
+ -- Function: void inferior_created (struct target_ops *OBJFILE, int
+ FROM_TTY)
+ GDB has just connected to an inferior. For `run', GDB calls this
+ observer while the inferior is still stopped at the entry-point
+ instruction. For `attach' and `core', GDB calls this observer
+ immediately after connecting to the inferior, and before any
+ information on the inferior has been printed.
+
+ -- Function: void solib_loaded (struct so_list *SOLIB)
+ The shared library specified by SOLIB has been loaded. Note that
+ when GDB calls this observer, the library's symbols probably
+ haven't been loaded yet.
+
+ -- Function: void solib_unloaded (struct so_list *SOLIB)
+ The shared library specified by SOLIB has been unloaded.
+
+\1f
+File: gdbint.info, Node: GNU Free Documentation License, Next: Index, Prev: GDB Observers, Up: Top
+
+Appendix B GNU Free Documentation License
+*****************************************
+
+ Version 1.2, November 2002
+
+ Copyright (C) 2000,2001,2002 Free Software Foundation, Inc.
+ 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+
+ Everyone is permitted to copy and distribute verbatim copies
+ of this license document, but changing it is not allowed.
+
+ 0. PREAMBLE
+
+ The purpose of this License is to make a manual, textbook, or other
+ functional and useful document "free" in the sense of freedom: to
+ assure everyone the effective freedom to copy and redistribute it,
+ with or without modifying it, either commercially or
+ noncommercially. Secondarily, this License preserves for the
+ author and publisher a way to get credit for their work, while not
+ being considered responsible for modifications made by others.
+
+ This License is a kind of "copyleft", which means that derivative
+ works of the document must themselves be free in the same sense.
+ It complements the GNU General Public License, which is a copyleft
+ license designed for free software.
+
+ We have designed this License in order to use it for manuals for
+ free software, because free software needs free documentation: a
+ free program should come with manuals providing the same freedoms
+ that the software does. But this License is not limited to
+ software manuals; it can be used for any textual work, regardless
+ of subject matter or whether it is published as a printed book.
+ We recommend this License principally for works whose purpose is
+ instruction or reference.
+
+ 1. APPLICABILITY AND DEFINITIONS
+
+ This License applies to any manual or other work, in any medium,
+ that contains a notice placed by the copyright holder saying it
+ can be distributed under the terms of this License. Such a notice
+ grants a world-wide, royalty-free license, unlimited in duration,
+ to use that work under the conditions stated herein. The
+ "Document", below, refers to any such manual or work. Any member
+ of the public is a licensee, and is addressed as "you". You
+ accept the license if you copy, modify or distribute the work in a
+ way requiring permission under copyright law.
+
+ A "Modified Version" of the Document means any work containing the
+ Document or a portion of it, either copied verbatim, or with
+ modifications and/or translated into another language.
+
+ A "Secondary Section" is a named appendix or a front-matter section
+ of the Document that deals exclusively with the relationship of the
+ publishers or authors of the Document to the Document's overall
+ subject (or to related matters) and contains nothing that could
+ fall directly within that overall subject. (Thus, if the Document
+ is in part a textbook of mathematics, a Secondary Section may not
+ explain any mathematics.) The relationship could be a matter of
+ historical connection with the subject or with related matters, or
+ of legal, commercial, philosophical, ethical or political position
+ regarding them.
+
+ The "Invariant Sections" are certain Secondary Sections whose
+ titles are designated, as being those of Invariant Sections, in
+ the notice that says that the Document is released under this
+ License. If a section does not fit the above definition of
+ Secondary then it is not allowed to be designated as Invariant.
+ The Document may contain zero Invariant Sections. If the Document
+ does not identify any Invariant Sections then there are none.
+
+ The "Cover Texts" are certain short passages of text that are
+ listed, as Front-Cover Texts or Back-Cover Texts, in the notice
+ that says that the Document is released under this License. A
+ Front-Cover Text may be at most 5 words, and a Back-Cover Text may
+ be at most 25 words.
+
+ A "Transparent" copy of the Document means a machine-readable copy,
+ represented in a format whose specification is available to the
+ general public, that is suitable for revising the document
+ straightforwardly with generic text editors or (for images
+ composed of pixels) generic paint programs or (for drawings) some
+ widely available drawing editor, and that is suitable for input to
+ text formatters or for automatic translation to a variety of
+ formats suitable for input to text formatters. A copy made in an
+ otherwise Transparent file format whose markup, or absence of
+ markup, has been arranged to thwart or discourage subsequent
+ modification by readers is not Transparent. An image format is
+ not Transparent if used for any substantial amount of text. A
+ copy that is not "Transparent" is called "Opaque".
+
+ Examples of suitable formats for Transparent copies include plain
+ ASCII without markup, Texinfo input format, LaTeX input format,
+ SGML or XML using a publicly available DTD, and
+ standard-conforming simple HTML, PostScript or PDF designed for
+ human modification. Examples of transparent image formats include
+ PNG, XCF and JPG. Opaque formats include proprietary formats that
+ can be read and edited only by proprietary word processors, SGML or
+ XML for which the DTD and/or processing tools are not generally
+ available, and the machine-generated HTML, PostScript or PDF
+ produced by some word processors for output purposes only.
+
+ The "Title Page" means, for a printed book, the title page itself,
+ plus such following pages as are needed to hold, legibly, the
+ material this License requires to appear in the title page. For
+ works in formats which do not have any title page as such, "Title
+ Page" means the text near the most prominent appearance of the
+ work's title, preceding the beginning of the body of the text.
+
+ A section "Entitled XYZ" means a named subunit of the Document
+ whose title either is precisely XYZ or contains XYZ in parentheses
+ following text that translates XYZ in another language. (Here XYZ
+ stands for a specific section name mentioned below, such as
+ "Acknowledgements", "Dedications", "Endorsements", or "History".)
+ To "Preserve the Title" of such a section when you modify the
+ Document means that it remains a section "Entitled XYZ" according
+ to this definition.
+
+ The Document may include Warranty Disclaimers next to the notice
+ which states that this License applies to the Document. These
+ Warranty Disclaimers are considered to be included by reference in
+ this License, but only as regards disclaiming warranties: any other
+ implication that these Warranty Disclaimers may have is void and
+ has no effect on the meaning of this License.
+
+ 2. VERBATIM COPYING
+
+ You may copy and distribute the Document in any medium, either
+ commercially or noncommercially, provided that this License, the
+ copyright notices, and the license notice saying this License
+ applies to the Document are reproduced in all copies, and that you
+ add no other conditions whatsoever to those of this License. You
+ may not use technical measures to obstruct or control the reading
+ or further copying of the copies you make or distribute. However,
+ you may accept compensation in exchange for copies. If you
+ distribute a large enough number of copies you must also follow
+ the conditions in section 3.
+
+ You may also lend copies, under the same conditions stated above,
+ and you may publicly display copies.
+
+ 3. COPYING IN QUANTITY
+
+ If you publish printed copies (or copies in media that commonly
+ have printed covers) of the Document, numbering more than 100, and
+ the Document's license notice requires Cover Texts, you must
+ enclose the copies in covers that carry, clearly and legibly, all
+ these Cover Texts: Front-Cover Texts on the front cover, and
+ Back-Cover Texts on the back cover. Both covers must also clearly
+ and legibly identify you as the publisher of these copies. The
+ front cover must present the full title with all words of the
+ title equally prominent and visible. You may add other material
+ on the covers in addition. Copying with changes limited to the
+ covers, as long as they preserve the title of the Document and
+ satisfy these conditions, can be treated as verbatim copying in
+ other respects.
+
+ If the required texts for either cover are too voluminous to fit
+ legibly, you should put the first ones listed (as many as fit
+ reasonably) on the actual cover, and continue the rest onto
+ adjacent pages.
+
+ If you publish or distribute Opaque copies of the Document
+ numbering more than 100, you must either include a
+ machine-readable Transparent copy along with each Opaque copy, or
+ state in or with each Opaque copy a computer-network location from
+ which the general network-using public has access to download
+ using public-standard network protocols a complete Transparent
+ copy of the Document, free of added material. If you use the
+ latter option, you must take reasonably prudent steps, when you
+ begin distribution of Opaque copies in quantity, to ensure that
+ this Transparent copy will remain thus accessible at the stated
+ location until at least one year after the last time you
+ distribute an Opaque copy (directly or through your agents or
+ retailers) of that edition to the public.
+
+ It is requested, but not required, that you contact the authors of
+ the Document well before redistributing any large number of
+ copies, to give them a chance to provide you with an updated
+ version of the Document.
+
+ 4. MODIFICATIONS
+
+ You may copy and distribute a Modified Version of the Document
+ under the conditions of sections 2 and 3 above, provided that you
+ release the Modified Version under precisely this License, with
+ the Modified Version filling the role of the Document, thus
+ licensing distribution and modification of the Modified Version to
+ whoever possesses a copy of it. In addition, you must do these
+ things in the Modified Version:
+
+ A. Use in the Title Page (and on the covers, if any) a title
+ distinct from that of the Document, and from those of
+ previous versions (which should, if there were any, be listed
+ in the History section of the Document). You may use the
+ same title as a previous version if the original publisher of
+ that version gives permission.
+
+ B. List on the Title Page, as authors, one or more persons or
+ entities responsible for authorship of the modifications in
+ the Modified Version, together with at least five of the
+ principal authors of the Document (all of its principal
+ authors, if it has fewer than five), unless they release you
+ from this requirement.
+
+ C. State on the Title page the name of the publisher of the
+ Modified Version, as the publisher.
+
+ D. Preserve all the copyright notices of the Document.
+
+ E. Add an appropriate copyright notice for your modifications
+ adjacent to the other copyright notices.
+
+ F. Include, immediately after the copyright notices, a license
+ notice giving the public permission to use the Modified
+ Version under the terms of this License, in the form shown in
+ the Addendum below.
+
+ G. Preserve in that license notice the full lists of Invariant
+ Sections and required Cover Texts given in the Document's
+ license notice.
+
+ H. Include an unaltered copy of this License.
+
+ I. Preserve the section Entitled "History", Preserve its Title,
+ and add to it an item stating at least the title, year, new
+ authors, and publisher of the Modified Version as given on
+ the Title Page. If there is no section Entitled "History" in
+ the Document, create one stating the title, year, authors,
+ and publisher of the Document as given on its Title Page,
+ then add an item describing the Modified Version as stated in
+ the previous sentence.
+
+ J. Preserve the network location, if any, given in the Document
+ for public access to a Transparent copy of the Document, and
+ likewise the network locations given in the Document for
+ previous versions it was based on. These may be placed in
+ the "History" section. You may omit a network location for a
+ work that was published at least four years before the
+ Document itself, or if the original publisher of the version
+ it refers to gives permission.
+
+ K. For any section Entitled "Acknowledgements" or "Dedications",
+ Preserve the Title of the section, and preserve in the
+ section all the substance and tone of each of the contributor
+ acknowledgements and/or dedications given therein.
+
+ L. Preserve all the Invariant Sections of the Document,
+ unaltered in their text and in their titles. Section numbers
+ or the equivalent are not considered part of the section
+ titles.
+
+ M. Delete any section Entitled "Endorsements". Such a section
+ may not be included in the Modified Version.
+
+ N. Do not retitle any existing section to be Entitled
+ "Endorsements" or to conflict in title with any Invariant
+ Section.
+
+ O. Preserve any Warranty Disclaimers.
+
+ If the Modified Version includes new front-matter sections or
+ appendices that qualify as Secondary Sections and contain no
+ material copied from the Document, you may at your option
+ designate some or all of these sections as invariant. To do this,
+ add their titles to the list of Invariant Sections in the Modified
+ Version's license notice. These titles must be distinct from any
+ other section titles.
+
+ You may add a section Entitled "Endorsements", provided it contains
+ nothing but endorsements of your Modified Version by various
+ parties--for example, statements of peer review or that the text
+ has been approved by an organization as the authoritative
+ definition of a standard.
+
+ You may add a passage of up to five words as a Front-Cover Text,
+ and a passage of up to 25 words as a Back-Cover Text, to the end
+ of the list of Cover Texts in the Modified Version. Only one
+ passage of Front-Cover Text and one of Back-Cover Text may be
+ added by (or through arrangements made by) any one entity. If the
+ Document already includes a cover text for the same cover,
+ previously added by you or by arrangement made by the same entity
+ you are acting on behalf of, you may not add another; but you may
+ replace the old one, on explicit permission from the previous
+ publisher that added the old one.
+
+ The author(s) and publisher(s) of the Document do not by this
+ License give permission to use their names for publicity for or to
+ assert or imply endorsement of any Modified Version.
+
+ 5. COMBINING DOCUMENTS
+
+ You may combine the Document with other documents released under
+ this License, under the terms defined in section 4 above for
+ modified versions, provided that you include in the combination
+ all of the Invariant Sections of all of the original documents,
+ unmodified, and list them all as Invariant Sections of your
+ combined work in its license notice, and that you preserve all
+ their Warranty Disclaimers.
+
+ The combined work need only contain one copy of this License, and
+ multiple identical Invariant Sections may be replaced with a single
+ copy. If there are multiple Invariant Sections with the same name
+ but different contents, make the title of each such section unique
+ by adding at the end of it, in parentheses, the name of the
+ original author or publisher of that section if known, or else a
+ unique number. Make the same adjustment to the section titles in
+ the list of Invariant Sections in the license notice of the
+ combined work.
+
+ In the combination, you must combine any sections Entitled
+ "History" in the various original documents, forming one section
+ Entitled "History"; likewise combine any sections Entitled
+ "Acknowledgements", and any sections Entitled "Dedications". You
+ must delete all sections Entitled "Endorsements."
+
+ 6. COLLECTIONS OF DOCUMENTS
+
+ You may make a collection consisting of the Document and other
+ documents released under this License, and replace the individual
+ copies of this License in the various documents with a single copy
+ that is included in the collection, provided that you follow the
+ rules of this License for verbatim copying of each of the
+ documents in all other respects.
+
+ You may extract a single document from such a collection, and
+ distribute it individually under this License, provided you insert
+ a copy of this License into the extracted document, and follow
+ this License in all other respects regarding verbatim copying of
+ that document.
+
+ 7. AGGREGATION WITH INDEPENDENT WORKS
+
+ A compilation of the Document or its derivatives with other
+ separate and independent documents or works, in or on a volume of
+ a storage or distribution medium, is called an "aggregate" if the
+ copyright resulting from the compilation is not used to limit the
+ legal rights of the compilation's users beyond what the individual
+ works permit. When the Document is included in an aggregate, this
+ License does not apply to the other works in the aggregate which
+ are not themselves derivative works of the Document.
+
+ If the Cover Text requirement of section 3 is applicable to these
+ copies of the Document, then if the Document is less than one half
+ of the entire aggregate, the Document's Cover Texts may be placed
+ on covers that bracket the Document within the aggregate, or the
+ electronic equivalent of covers if the Document is in electronic
+ form. Otherwise they must appear on printed covers that bracket
+ the whole aggregate.
+
+ 8. TRANSLATION
+
+ Translation is considered a kind of modification, so you may
+ distribute translations of the Document under the terms of section
+ 4. Replacing Invariant Sections with translations requires special
+ permission from their copyright holders, but you may include
+ translations of some or all Invariant Sections in addition to the
+ original versions of these Invariant Sections. You may include a
+ translation of this License, and all the license notices in the
+ Document, and any Warranty Disclaimers, provided that you also
+ include the original English version of this License and the
+ original versions of those notices and disclaimers. In case of a
+ disagreement between the translation and the original version of
+ this License or a notice or disclaimer, the original version will
+ prevail.
+
+ If a section in the Document is Entitled "Acknowledgements",
+ "Dedications", or "History", the requirement (section 4) to
+ Preserve its Title (section 1) will typically require changing the
+ actual title.
+
+ 9. TERMINATION
+
+ You may not copy, modify, sublicense, or distribute the Document
+ except as expressly provided for under this License. Any other
+ attempt to copy, modify, sublicense or distribute the Document is
+ void, and will automatically terminate your rights under this
+ License. However, parties who have received copies, or rights,
+ from you under this License will not have their licenses
+ terminated so long as such parties remain in full compliance.
+
+ 10. FUTURE REVISIONS OF THIS LICENSE
+
+ The Free Software Foundation may publish new, revised versions of
+ the GNU Free Documentation License from time to time. Such new
+ versions will be similar in spirit to the present version, but may
+ differ in detail to address new problems or concerns. See
+ `http://www.gnu.org/copyleft/'.
+
+ Each version of the License is given a distinguishing version
+ number. If the Document specifies that a particular numbered
+ version of this License "or any later version" applies to it, you
+ have the option of following the terms and conditions either of
+ that specified version or of any later version that has been
+ published (not as a draft) by the Free Software Foundation. If
+ the Document does not specify a version number of this License,
+ you may choose any version ever published (not as a draft) by the
+ Free Software Foundation.
+
+B.1 ADDENDUM: How to use this License for your documents
+========================================================
+
+To use this License in a document you have written, include a copy of
+the License in the document and put the following copyright and license
+notices just after the title page:
+
+ Copyright (C) YEAR YOUR NAME.
+ Permission is granted to copy, distribute and/or modify this document
+ under the terms of the GNU Free Documentation License, Version 1.2
+ or any later version published by the Free Software Foundation;
+ with no Invariant Sections, no Front-Cover Texts, and no Back-Cover
+ Texts. A copy of the license is included in the section entitled ``GNU
+ Free Documentation License''.
+
+ If you have Invariant Sections, Front-Cover Texts and Back-Cover
+Texts, replace the "with...Texts." line with this:
+
+ with the Invariant Sections being LIST THEIR TITLES, with
+ the Front-Cover Texts being LIST, and with the Back-Cover Texts
+ being LIST.
+
+ If you have Invariant Sections without Cover Texts, or some other
+combination of the three, merge those two alternatives to suit the
+situation.
+
+ If your document contains nontrivial examples of program code, we
+recommend releasing these examples in parallel under your choice of
+free software license, such as the GNU General Public License, to
+permit their use in free software.
+
+\1f
+File: gdbint.info, Node: Index, Prev: GNU Free Documentation License, Up: Top
+
+Index
+*****
+
+\0\b[index\0\b]
+* Menu:
+
+* *ADDRESS_CLASS_TYPE_FLAGS_TO_NAME: Target Architecture Definition.
+ (line 313)
+* *gdbarch_data: Coding. (line 132)
+* _initialize_language: Language Support. (line 79)
+* a.out format: Symbol Handling. (line 199)
+* abstract interpretation of function prologues: Algorithms. (line 72)
+* add_cmd: User Interface. (line 21)
+* add_com: User Interface. (line 21)
+* add_setshow_cmd: User Interface. (line 26)
+* add_setshow_cmd_full: User Interface. (line 26)
+* add_symtab_fns: Symbol Handling. (line 23)
+* adding a new host: Host Definition. (line 13)
+* adding a symbol-reading module: Symbol Handling. (line 23)
+* adding a target: Target Architecture Definition.
+ (line 1483)
+* adding debugging info reader: Symbol Handling. (line 333)
+* adding source language: Language Support. (line 17)
+* ADDR_BITS_REMOVE: Target Architecture Definition.
+ (line 553)
+* address classes: Target Architecture Definition.
+ (line 294)
+* address representation: Target Architecture Definition.
+ (line 177)
+* address spaces, separate data and code: Target Architecture Definition.
+ (line 177)
+* ADDRESS_CLASS_NAME_TO_TYPE_FLAGS: Target Architecture Definition.
+ (line 567)
+* ADDRESS_CLASS_NAME_to_TYPE_FLAGS: Target Architecture Definition.
+ (line 318)
+* ADDRESS_CLASS_NAME_TO_TYPE_FLAGS_P: Target Architecture Definition.
+ (line 578)
+* ADDRESS_CLASS_TYPE_FLAGS: Target Architecture Definition.
+ (line 306)
+* ADDRESS_CLASS_TYPE_FLAGS (BYTE_SIZE, DWARF2_ADDR_CLASS): Target Architecture Definition.
+ (line 582)
+* ADDRESS_CLASS_TYPE_FLAGS_P: Target Architecture Definition.
+ (line 591)
+* ADDRESS_CLASS_TYPE_FLAGS_TO_NAME: Target Architecture Definition.
+ (line 595)
+* ADDRESS_CLASS_TYPE_FLAGS_TO_NAME_P: Target Architecture Definition.
+ (line 599)
+* ADDRESS_TO_POINTER: Target Architecture Definition.
+ (line 285)
+* ADJUST_BREAKPOINT_ADDRESS: Target Architecture Definition.
+ (line 678)
+* algorithms: Algorithms. (line 6)
+* ALIGN_STACK_ON_STARTUP: Host Definition. (line 93)
+* allocate_symtab: Language Support. (line 83)
+* Array Containers: Support Libraries. (line 130)
+* assumptions about targets: Coding. (line 540)
+* ATTR_NORETURN: Host Definition. (line 178)
+* BELIEVE_PCC_PROMOTION: Target Architecture Definition.
+ (line 611)
+* BFD library: Support Libraries. (line 9)
+* BIG_BREAKPOINT: Target Architecture Definition.
+ (line 633)
+* BITS_BIG_ENDIAN: Target Architecture Definition.
+ (line 616)
+* BPT_VECTOR: Target Architecture Definition.
+ (line 1467)
+* BREAKPOINT <1>: Target Architecture Definition.
+ (line 622)
+* BREAKPOINT: Algorithms. (line 232)
+* breakpoint address adjusted: Target Architecture Definition.
+ (line 678)
+* BREAKPOINT_FROM_PC: Target Architecture Definition.
+ (line 647)
+* breakpoints: Algorithms. (line 175)
+* bug-gdb mailing list: Getting Started. (line 72)
+* C data types: Coding. (line 415)
+* call frame information: Algorithms. (line 38)
+* call stack frame: Algorithms. (line 14)
+* CALL_DUMMY_LOCATION: Target Architecture Definition.
+ (line 711)
+* CANNOT_FETCH_REGISTER: Target Architecture Definition.
+ (line 717)
+* CANNOT_STEP_HW_WATCHPOINTS: Algorithms. (line 404)
+* CANNOT_STORE_REGISTER: Target Architecture Definition.
+ (line 722)
+* CC_HAS_LONG_LONG: Host Definition. (line 138)
+* CFI (call frame information): Algorithms. (line 38)
+* char: Target Architecture Definition.
+ (line 92)
+* checkpoints: Algorithms. (line 580)
+* CHILD_PREPARE_TO_STORE: Native Debugging. (line 134)
+* cleanup: User Interface. (line 223)
+* cleanups: Coding. (line 12)
+* CLEAR_SOLIB: Native Debugging. (line 243)
+* CLI: User Interface. (line 12)
+* code pointers, word-addressed: Target Architecture Definition.
+ (line 177)
+* coding standards: Coding. (line 214)
+* COFF debugging info: Symbol Handling. (line 300)
+* COFF format: Symbol Handling. (line 214)
+* command implementation: Getting Started. (line 60)
+* command interpreter: User Interface. (line 12)
+* comment formatting: Coding. (line 389)
+* compiler warnings: Coding. (line 270)
+* CONVERT_REGISTER_P: Target Architecture Definition.
+ (line 503)
+* converting between pointers and addresses: Target Architecture Definition.
+ (line 177)
+* converting integers to addresses: Target Architecture Definition.
+ (line 1023)
+* converting targets to multi-arch: Target Architecture Definition.
+ (line 1535)
+* CRLF_SOURCE_FILES: Host Definition. (line 99)
+* current_language: Language Support. (line 75)
+* D10V addresses: Target Architecture Definition.
+ (line 177)
+* data output: User Interface. (line 254)
+* data-pointer, per-architecture/per-module: Coding. (line 100)
+* DEBUG_PTRACE: Native Debugging. (line 246)
+* debugging GDB: Debugging GDB. (line 6)
+* DECR_PC_AFTER_BREAK: Target Architecture Definition.
+ (line 733)
+* DEFAULT_PROMPT: Host Definition. (line 106)
+* deprecate_cmd: User Interface. (line 32)
+* DEPRECATED_BIG_REMOTE_BREAKPOINT: Target Architecture Definition.
+ (line 641)
+* DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS: Target Architecture Definition.
+ (line 788)
+* DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS_P: Target Architecture Definition.
+ (line 795)
+* DEPRECATED_FP_REGNUM: Target Architecture Definition.
+ (line 798)
+* DEPRECATED_FRAME_CHAIN: Target Architecture Definition.
+ (line 842)
+* DEPRECATED_FRAME_CHAIN_VALID: Target Architecture Definition.
+ (line 845)
+* DEPRECATED_FRAME_INIT_SAVED_REGS: Target Architecture Definition.
+ (line 853)
+* DEPRECATED_FRAME_SAVED_PC: Target Architecture Definition.
+ (line 866)
+* DEPRECATED_FRAMELESS_FUNCTION_INVOCATION: Target Architecture Definition.
+ (line 806)
+* DEPRECATED_FUNCTION_START_OFFSET: Target Architecture Definition.
+ (line 905)
+* DEPRECATED_GET_SAVED_REGISTER: Target Architecture Definition.
+ (line 952)
+* DEPRECATED_IBM6000_TARGET: Target Architecture Definition.
+ (line 956)
+* DEPRECATED_INIT_EXTRA_FRAME_INFO: Target Architecture Definition.
+ (line 976)
+* DEPRECATED_INIT_FRAME_PC: Target Architecture Definition.
+ (line 981)
+* DEPRECATED_LITTLE_REMOTE_BREAKPOINT: Target Architecture Definition.
+ (line 641)
+* DEPRECATED_POP_FRAME: Target Architecture Definition.
+ (line 1188)
+* DEPRECATED_PUSH_ARGUMENTS.: Target Architecture Definition.
+ (line 1192)
+* DEPRECATED_REG_STRUCT_HAS_ADDR: Target Architecture Definition.
+ (line 1171)
+* DEPRECATED_REGISTER_RAW_SIZE: Target Architecture Definition.
+ (line 429)
+* DEPRECATED_REGISTER_VIRTUAL_SIZE: Target Architecture Definition.
+ (line 434)
+* DEPRECATED_REMOTE_BREAKPOINT: Target Architecture Definition.
+ (line 641)
+* DEPRECATED_SIGTRAMP_END: Target Architecture Definition.
+ (line 998)
+* DEPRECATED_SIGTRAMP_START: Target Architecture Definition.
+ (line 997)
+* DEPRECATED_STACK_ALIGN: Target Architecture Definition.
+ (line 1313)
+* DEPRECATED_USE_STRUCT_CONVENTION: Target Architecture Definition.
+ (line 1439)
+* deprecating commands: User Interface. (line 32)
+* design: Coding. (line 535)
+* DEV_TTY: Host Definition. (line 109)
+* DIRNAME_SEPARATOR: Coding. (line 605)
+* DISABLE_UNSETTABLE_BREAK: Target Architecture Definition.
+ (line 739)
+* discard_cleanups: Coding. (line 39)
+* do_cleanups: Coding. (line 35)
+* DOS text files: Host Definition. (line 100)
+* DW_AT_address_class: Target Architecture Definition.
+ (line 294)
+* DW_AT_byte_size: Target Architecture Definition.
+ (line 294)
+* DWARF 1 debugging info: Symbol Handling. (line 313)
+* DWARF 2 debugging info: Symbol Handling. (line 321)
+* DWARF2_REG_TO_REGNUM: Target Architecture Definition.
+ (line 768)
+* DWARF_REG_TO_REGNUM: Target Architecture Definition.
+ (line 764)
+* ECOFF debugging info: Symbol Handling. (line 306)
+* ECOFF format: Symbol Handling. (line 228)
+* ECOFF_REG_TO_REGNUM: Target Architecture Definition.
+ (line 772)
+* ELF format: Symbol Handling. (line 261)
+* END_OF_TEXT_DEFAULT: Target Architecture Definition.
+ (line 776)
+* evaluate_subexp: Language Support. (line 58)
+* executable_changed: GDB Observers. (line 82)
+* execution state: Managing Execution State.
+ (line 6)
+* experimental branches: Versions and Branches.
+ (line 116)
+* expression evaluation routines: Language Support. (line 58)
+* expression parser: Language Support. (line 21)
+* EXTRACT_RETURN_VALUE: Target Architecture Definition.
+ (line 780)
+* extract_typed_address: Target Architecture Definition.
+ (line 223)
+* FDL, GNU Free Documentation License: GNU Free Documentation License.
+ (line 6)
+* fetch_core_registers: Native Debugging. (line 63)
+* FETCH_INFERIOR_REGISTERS: Native Debugging. (line 142)
+* field output functions: User Interface. (line 254)
+* file names, portability: Coding. (line 573)
+* FILENAME_CMP: Coding. (line 599)
+* find_pc_function: Symbol Handling. (line 122)
+* find_pc_line: Symbol Handling. (line 122)
+* find_sym_fns: Symbol Handling. (line 18)
+* finding a symbol: Symbol Handling. (line 119)
+* fine-tuning gdbarch structure: Target Architecture Definition.
+ (line 33)
+* FOPEN_RB: Host Definition. (line 112)
+* FP0_REGNUM: Native Debugging. (line 149)
+* frame: Algorithms. (line 14)
+* frame, unwind: Algorithms. (line 17)
+* frame_align: Target Architecture Definition.
+ (line 811)
+* FRAME_NUM_ARGS: Target Architecture Definition.
+ (line 861)
+* frame_pop: Target Architecture Definition.
+ (line 1188)
+* frame_register_unwind: Algorithms. (line 23)
+* full symbol table: Symbol Handling. (line 90)
+* function prototypes: Coding. (line 437)
+* function usage: Coding. (line 419)
+* FUNCTION_EPILOGUE_SIZE: Target Architecture Definition.
+ (line 899)
+* fundamental types: Symbol Handling. (line 164)
+* GCC2_COMPILED_FLAG_SYMBOL: Target Architecture Definition.
+ (line 920)
+* GCC_COMPILED_FLAG_SYMBOL: Target Architecture Definition.
+ (line 920)
+* GDB source tree structure: Overall Structure. (line 82)
+* GDB_MULTI_ARCH: Target Architecture Definition.
+ (line 926)
+* gdb_osabi: Target Architecture Definition.
+ (line 114)
+* GDB_OSABI_ARM_APCS: Target Architecture Definition.
+ (line 85)
+* GDB_OSABI_ARM_EABI_V1: Target Architecture Definition.
+ (line 79)
+* GDB_OSABI_ARM_EABI_V2: Target Architecture Definition.
+ (line 82)
+* GDB_OSABI_FREEBSD_AOUT: Target Architecture Definition.
+ (line 58)
+* GDB_OSABI_FREEBSD_ELF: Target Architecture Definition.
+ (line 61)
+* GDB_OSABI_GO32: Target Architecture Definition.
+ (line 73)
+* GDB_OSABI_HURD: Target Architecture Definition.
+ (line 46)
+* GDB_OSABI_LINUX: Target Architecture Definition.
+ (line 55)
+* GDB_OSABI_NETBSD_AOUT: Target Architecture Definition.
+ (line 64)
+* GDB_OSABI_NETBSD_ELF: Target Architecture Definition.
+ (line 67)
+* GDB_OSABI_NETWARE: Target Architecture Definition.
+ (line 76)
+* GDB_OSABI_OSF1: Target Architecture Definition.
+ (line 52)
+* GDB_OSABI_SOLARIS: Target Architecture Definition.
+ (line 49)
+* GDB_OSABI_SVR4: Target Architecture Definition.
+ (line 43)
+* GDB_OSABI_UNKNOWN: Target Architecture Definition.
+ (line 39)
+* GDB_OSABI_WINCE: Target Architecture Definition.
+ (line 70)
+* GDB_TARGET_IS_HPPA: Target Architecture Definition.
+ (line 935)
+* gdbarch_data: Coding. (line 108)
+* gdbarch_in_function_epilogue_p: Target Architecture Definition.
+ (line 991)
+* gdbarch_init_osabi: Target Architecture Definition.
+ (line 120)
+* gdbarch_register_osabi: Target Architecture Definition.
+ (line 98)
+* gdbarch_register_osabi_sniffer: Target Architecture Definition.
+ (line 107)
+* gdbarch_return_value: Target Architecture Definition.
+ (line 1244)
+* GDBINIT_FILENAME: Host Definition. (line 78)
+* generic host support: Host Definition. (line 46)
+* get_frame_register: Algorithms. (line 23)
+* get_frame_type: Algorithms. (line 30)
+* GET_LONGJMP_TARGET <1>: Native Debugging. (line 156)
+* GET_LONGJMP_TARGET <2>: Target Architecture Definition.
+ (line 941)
+* GET_LONGJMP_TARGET: Algorithms. (line 290)
+* hardware breakpoints: Algorithms. (line 182)
+* hardware watchpoints: Algorithms. (line 306)
+* HAVE_CONTINUABLE_WATCHPOINT: Algorithms. (line 400)
+* HAVE_DOS_BASED_FILE_SYSTEM: Coding. (line 582)
+* HAVE_LONG_DOUBLE: Host Definition. (line 147)
+* HAVE_MMAP: Host Definition. (line 115)
+* HAVE_NONSTEPPABLE_WATCHPOINT: Algorithms. (line 396)
+* HAVE_STEPPABLE_WATCHPOINT: Algorithms. (line 392)
+* HAVE_TERMIO: Host Definition. (line 120)
+* host: Overall Structure. (line 50)
+* host, adding: Host Definition. (line 13)
+* i386_cleanup_dregs: Algorithms. (line 556)
+* I386_DR_LOW_GET_STATUS: Algorithms. (line 463)
+* I386_DR_LOW_RESET_ADDR: Algorithms. (line 459)
+* I386_DR_LOW_SET_ADDR: Algorithms. (line 456)
+* I386_DR_LOW_SET_CONTROL: Algorithms. (line 453)
+* i386_insert_hw_breakpoint: Algorithms. (line 538)
+* i386_insert_watchpoint: Algorithms. (line 510)
+* i386_region_ok_for_watchpoint: Algorithms. (line 488)
+* i386_remove_hw_breakpoint: Algorithms. (line 538)
+* i386_remove_watchpoint: Algorithms. (line 510)
+* i386_stopped_by_hwbp: Algorithms. (line 550)
+* i386_stopped_by_watchpoint: Algorithms. (line 502)
+* i386_stopped_data_address: Algorithms. (line 495)
+* I386_USE_GENERIC_WATCHPOINTS: Algorithms. (line 434)
+* IN_SOLIB_CALL_TRAMPOLINE: Target Architecture Definition.
+ (line 1004)
+* IN_SOLIB_DYNSYM_RESOLVE_CODE: Target Architecture Definition.
+ (line 1012)
+* IN_SOLIB_RETURN_TRAMPOLINE: Target Architecture Definition.
+ (line 1008)
+* inferior_created: GDB Observers. (line 89)
+* INNER_THAN: Target Architecture Definition.
+ (line 985)
+* insert or remove hardware breakpoint: Algorithms. (line 261)
+* insert or remove hardware watchpoint: Algorithms. (line 366)
+* insert or remove software breakpoint: Algorithms. (line 238)
+* INT_MAX: Host Definition. (line 123)
+* INT_MIN: Host Definition. (line 124)
+* INTEGER_TO_ADDRESS: Target Architecture Definition.
+ (line 1023)
+* IS_ABSOLUTE_PATH: Coding. (line 593)
+* IS_DIR_SEPARATOR: Coding. (line 588)
+* ISATTY: Host Definition. (line 130)
+* item output functions: User Interface. (line 254)
+* KERNEL_U_ADDR: Native Debugging. (line 172)
+* KERNEL_U_ADDR_HPUX: Native Debugging. (line 180)
+* L_SET: Host Definition. (line 166)
+* language parser: Language Support. (line 25)
+* language support: Language Support. (line 6)
+* legal papers for code contributions: Debugging GDB. (line 42)
+* length_of_subexp: Language Support. (line 58)
+* libgdb: libgdb. (line 9)
+* libiberty library: Support Libraries. (line 51)
+* line wrap in output: Coding. (line 190)
+* lint: Host Definition. (line 199)
+* list output functions: User Interface. (line 131)
+* LITTLE_BREAKPOINT: Target Architecture Definition.
+ (line 633)
+* long long data type: Host Definition. (line 139)
+* LONG_MAX: Host Definition. (line 125)
+* LONGEST: Host Definition. (line 133)
+* longjmp debugging: Algorithms. (line 285)
+* lookup_symbol: Symbol Handling. (line 128)
+* LSEEK_NOT_LINEAR: Host Definition. (line 161)
+* make_cleanup: Coding. (line 28)
+* making a new release of gdb: Releasing GDB. (line 6)
+* memory representation: Target Architecture Definition.
+ (line 473)
+* MEMORY_INSERT_BREAKPOINT: Target Architecture Definition.
+ (line 663)
+* MEMORY_REMOVE_BREAKPOINT: Target Architecture Definition.
+ (line 663)
+* minimal symbol table: Symbol Handling. (line 97)
+* minsymtabs: Symbol Handling. (line 97)
+* mmap: Host Definition. (line 116)
+* multi-arch data: Coding. (line 100)
+* NAME_OF_MALLOC: Target Architecture Definition.
+ (line 1474)
+* NATDEPFILES: Native Debugging. (line 8)
+* native conditionals: Native Debugging. (line 128)
+* native core files: Native Debugging. (line 63)
+* native debugging: Native Debugging. (line 6)
+* nesting level in ui_out functions: User Interface. (line 143)
+* Netware Loadable Module format: Symbol Handling. (line 278)
+* new year procedure: Start of New Year Procedure.
+ (line 6)
+* NO_HIF_SUPPORT: Target Architecture Definition.
+ (line 1044)
+* NO_STD_REGS: Host Definition. (line 82)
+* NORETURN: Host Definition. (line 171)
+* normal_stop: GDB Observers. (line 76)
+* normal_stop observer: GDB Observers. (line 48)
+* notification about inferior execution stop: GDB Observers. (line 48)
+* notifications about changes in internals: Algorithms. (line 610)
+* object file formats: Symbol Handling. (line 196)
+* observer pattern interface: Algorithms. (line 610)
+* observers implementation rationale: GDB Observers. (line 9)
+* obsolete code: Debugging GDB. (line 94)
+* obstacks: Support Libraries. (line 68)
+* ONE_PROCESS_WRITETEXT: Native Debugging. (line 185)
+* op_print_tab: Language Support. (line 91)
+* opcodes library: Support Libraries. (line 39)
+* OS ABI variants: Target Architecture Definition.
+ (line 16)
+* OS9K_VARIABLES_INSIDE_BLOCK: Target Architecture Definition.
+ (line 1463)
+* PARM_BOUNDARY: Target Architecture Definition.
+ (line 1167)
+* parse_exp_1: Language Support. (line 97)
+* partial symbol table: Symbol Handling. (line 100)
+* PC_LOAD_SEGMENT: Target Architecture Definition.
+ (line 1155)
+* PC_REGNUM: Target Architecture Definition.
+ (line 1159)
+* PE-COFF format: Symbol Handling. (line 252)
+* per-architecture module data: Coding. (line 100)
+* pointer representation: Target Architecture Definition.
+ (line 177)
+* POINTER_TO_ADDRESS: Target Architecture Definition.
+ (line 276)
+* portability: Coding. (line 556)
+* portable file name handling: Coding. (line 573)
+* porting to new machines: Porting GDB. (line 6)
+* prefixify_subexp: Language Support. (line 58)
+* PRINT_FLOAT_INFO: Target Architecture Definition.
+ (line 744)
+* print_registers_info: Target Architecture Definition.
+ (line 748)
+* print_subexp: Language Support. (line 91)
+* PRINT_VECTOR_INFO: Target Architecture Definition.
+ (line 757)
+* PRINTF_HAS_LONG_DOUBLE: Host Definition. (line 151)
+* PRINTF_HAS_LONG_LONG: Host Definition. (line 142)
+* PROC_NAME_FMT: Native Debugging. (line 190)
+* PROCESS_LINENUMBER_HOOK: Target Architecture Definition.
+ (line 1178)
+* program counter: Algorithms. (line 182)
+* prologue analysis: Algorithms. (line 38)
+* prologue-value.c: Algorithms. (line 72)
+* PROLOGUE_FIRSTLINE_OVERLAP: Target Architecture Definition.
+ (line 1181)
+* prompt: Host Definition. (line 107)
+* PS_REGNUM: Target Architecture Definition.
+ (line 1184)
+* pseudo-evaluation of function prologues: Algorithms. (line 72)
+* psymtabs: Symbol Handling. (line 93)
+* PTRACE_ARG3_TYPE: Native Debugging. (line 195)
+* push_dummy_call: Target Architecture Definition.
+ (line 1192)
+* push_dummy_code: Target Architecture Definition.
+ (line 1206)
+* raw register representation: Target Architecture Definition.
+ (line 374)
+* read_fp: Target Architecture Definition.
+ (line 1398)
+* read_pc: Target Architecture Definition.
+ (line 1398)
+* read_sp: Target Architecture Definition.
+ (line 1398)
+* reading of symbols: Symbol Handling. (line 12)
+* red zone: Target Architecture Definition.
+ (line 839)
+* register data formats, converting: Target Architecture Definition.
+ (line 473)
+* register groups: Target Architecture Definition.
+ (line 1068)
+* register representation: Target Architecture Definition.
+ (line 473)
+* REGISTER_CONVERT_TO_RAW: Target Architecture Definition.
+ (line 462)
+* REGISTER_CONVERT_TO_TYPE: Target Architecture Definition.
+ (line 535)
+* REGISTER_CONVERT_TO_VIRTUAL: Target Architecture Definition.
+ (line 447)
+* REGISTER_CONVERTIBLE: Target Architecture Definition.
+ (line 422)
+* REGISTER_NAME: Target Architecture Definition.
+ (line 1222)
+* register_reggroup_p: Target Architecture Definition.
+ (line 1068)
+* REGISTER_TO_VALUE: Target Architecture Definition.
+ (line 512)
+* register_type: Target Architecture Definition.
+ (line 1099)
+* REGISTER_U_ADDR: Native Debugging. (line 199)
+* REGISTER_VIRTUAL_TYPE: Target Architecture Definition.
+ (line 1095)
+* regset_from_core_section: Target Architecture Definition.
+ (line 1114)
+* regular expressions library: Support Libraries. (line 109)
+* Release Branches: Versions and Branches.
+ (line 93)
+* remote debugging support: Host Definition. (line 57)
+* REMOTE_BPT_VECTOR: Target Architecture Definition.
+ (line 1471)
+* representations, raw and virtual registers: Target Architecture Definition.
+ (line 374)
+* representations, register and memory: Target Architecture Definition.
+ (line 473)
+* requirements for GDB: Requirements. (line 6)
+* restart: Algorithms. (line 580)
+* running the test suite: Testsuite. (line 19)
+* SAVE_DUMMY_FRAME_TOS: Target Architecture Definition.
+ (line 1233)
+* SCANF_HAS_LONG_DOUBLE: Host Definition. (line 156)
+* SDB_REG_TO_REGNUM: Target Architecture Definition.
+ (line 1240)
+* secondary symbol file: Symbol Handling. (line 33)
+* SEEK_CUR: Host Definition. (line 185)
+* SEEK_SET: Host Definition. (line 186)
+* sentinel frame: Algorithms. (line 30)
+* SENTINEL_FRAME: Algorithms. (line 30)
+* separate data and code address spaces: Target Architecture Definition.
+ (line 177)
+* serial line support: Host Definition. (line 57)
+* SHELL_COMMAND_CONCAT: Native Debugging. (line 202)
+* SHELL_FILE: Native Debugging. (line 206)
+* SIGWINCH_HANDLER: Host Definition. (line 85)
+* SIGWINCH_HANDLER_BODY: Host Definition. (line 89)
+* SKIP_PERMANENT_BREAKPOINT: Target Architecture Definition.
+ (line 1283)
+* SKIP_PROLOGUE: Target Architecture Definition.
+ (line 1294)
+* SKIP_SOLIB_RESOLVER: Target Architecture Definition.
+ (line 1016)
+* SKIP_TRAMPOLINE_CODE: Target Architecture Definition.
+ (line 1298)
+* SLASH_STRING: Coding. (line 610)
+* software breakpoints: Algorithms. (line 208)
+* software watchpoints: Algorithms. (line 306)
+* SOFTWARE_SINGLE_STEP: Target Architecture Definition.
+ (line 1122)
+* SOFTWARE_SINGLE_STEP_P: Target Architecture Definition.
+ (line 1118)
+* SOFUN_ADDRESS_MAYBE_MISSING: Target Architecture Definition.
+ (line 1128)
+* SOLIB_ADD: Native Debugging. (line 210)
+* SOLIB_CREATE_INFERIOR_HOOK: Native Debugging. (line 216)
+* solib_loaded: GDB Observers. (line 96)
+* solib_unloaded: GDB Observers. (line 101)
+* SOM debugging info: Symbol Handling. (line 328)
+* SOM format: Symbol Handling. (line 270)
+* source code formatting: Coding. (line 349)
+* SP_REGNUM: Target Architecture Definition.
+ (line 1303)
+* spaces, separate data and code address: Target Architecture Definition.
+ (line 177)
+* STAB_REG_TO_REGNUM: Target Architecture Definition.
+ (line 1308)
+* stabs debugging info: Symbol Handling. (line 290)
+* stabs_argument_has_addr: Target Architecture Definition.
+ (line 1171)
+* stack alignment: Host Definition. (line 94)
+* START_INFERIOR_TRAPS_EXPECTED: Native Debugging. (line 220)
+* STEP_SKIPS_DELAY: Target Architecture Definition.
+ (line 1322)
+* STOP_SIGNAL: Host Definition. (line 190)
+* STOPPED_BY_WATCHPOINT: Algorithms. (line 408)
+* STORE_RETURN_VALUE: Target Architecture Definition.
+ (line 1329)
+* store_typed_address: Target Architecture Definition.
+ (line 241)
+* struct: GDB Observers. (line 62)
+* struct value, converting register contents to: Target Architecture Definition.
+ (line 473)
+* submitting patches: Debugging GDB. (line 30)
+* sym_fns structure: Symbol Handling. (line 23)
+* symbol files: Symbol Handling. (line 12)
+* symbol lookup: Symbol Handling. (line 119)
+* symbol reading: Symbol Handling. (line 12)
+* SYMBOL_RELOADING_DEFAULT: Target Architecture Definition.
+ (line 1337)
+* SYMBOLS_CAN_START_WITH_DOLLAR: Target Architecture Definition.
+ (line 967)
+* symtabs: Symbol Handling. (line 90)
+* system dependencies: Coding. (line 560)
+* table output functions: User Interface. (line 131)
+* target: Overall Structure. (line 50)
+* target architecture definition: Target Architecture Definition.
+ (line 6)
+* target vector: Target Vector Definition.
+ (line 6)
+* TARGET_CAN_USE_HARDWARE_WATCHPOINT: Algorithms. (line 352)
+* target_changed: GDB Observers. (line 79)
+* TARGET_CHAR_BIT: Target Architecture Definition.
+ (line 1341)
+* TARGET_CHAR_SIGNED: Target Architecture Definition.
+ (line 1344)
+* TARGET_COMPLEX_BIT: Target Architecture Definition.
+ (line 1354)
+* TARGET_DOUBLE_BIT: Target Architecture Definition.
+ (line 1360)
+* TARGET_DOUBLE_COMPLEX_BIT: Target Architecture Definition.
+ (line 1364)
+* TARGET_FLOAT_BIT: Target Architecture Definition.
+ (line 1370)
+* TARGET_HAS_HARDWARE_WATCHPOINTS: Algorithms. (line 349)
+* target_insert_breakpoint: Algorithms. (line 238)
+* target_insert_hw_breakpoint: Algorithms. (line 261)
+* target_insert_watchpoint: Algorithms. (line 366)
+* TARGET_INT_BIT: Target Architecture Definition.
+ (line 1373)
+* TARGET_LONG_BIT: Target Architecture Definition.
+ (line 1376)
+* TARGET_LONG_DOUBLE_BIT: Target Architecture Definition.
+ (line 1380)
+* TARGET_LONG_LONG_BIT: Target Architecture Definition.
+ (line 1384)
+* TARGET_PRINT_INSN: Target Architecture Definition.
+ (line 1421)
+* TARGET_PTR_BIT: Target Architecture Definition.
+ (line 1388)
+* TARGET_READ_FP: Target Architecture Definition.
+ (line 1398)
+* TARGET_READ_PC: Target Architecture Definition.
+ (line 1395)
+* TARGET_READ_SP: Target Architecture Definition.
+ (line 1397)
+* TARGET_REGION_OK_FOR_HW_WATCHPOINT: Algorithms. (line 362)
+* target_remove_breakpoint: Algorithms. (line 238)
+* target_remove_hw_breakpoint: Algorithms. (line 261)
+* target_remove_watchpoint: Algorithms. (line 366)
+* TARGET_SHORT_BIT: Target Architecture Definition.
+ (line 1391)
+* target_stopped_data_address: Algorithms. (line 383)
+* TARGET_VIRTUAL_FRAME_POINTER: Target Architecture Definition.
+ (line 1410)
+* TARGET_WRITE_PC: Target Architecture Definition.
+ (line 1396)
+* targets: Existing Targets. (line 6)
+* TCP remote support: Host Definition. (line 66)
+* TDEPFILES: Target Architecture Definition.
+ (line 1485)
+* terminal device: Host Definition. (line 110)
+* test suite: Testsuite. (line 6)
+* test suite organization: Testsuite. (line 79)
+* trimming language-dependent code: Language Support. (line 101)
+* tuple output functions: User Interface. (line 131)
+* type: Target Architecture Definition.
+ (line 440)
+* type codes: Symbol Handling. (line 172)
+* types: Coding. (line 431)
+* U_REGS_OFFSET: Native Debugging. (line 231)
+* ui_out functions: User Interface. (line 47)
+* ui_out functions, usage examples: User Interface. (line 397)
+* ui_out_field_core_addr: User Interface. (line 287)
+* ui_out_field_fmt: User Interface. (line 261)
+* ui_out_field_fmt_int: User Interface. (line 280)
+* ui_out_field_int: User Interface. (line 273)
+* ui_out_field_skip: User Interface. (line 351)
+* ui_out_field_stream: User Interface. (line 319)
+* ui_out_field_string: User Interface. (line 291)
+* ui_out_flush: User Interface. (line 391)
+* ui_out_list_begin: User Interface. (line 234)
+* ui_out_list_end: User Interface. (line 240)
+* ui_out_message: User Interface. (line 375)
+* ui_out_spaces: User Interface. (line 370)
+* ui_out_stream_delete: User Interface. (line 314)
+* ui_out_table_begin: User Interface. (line 165)
+* ui_out_table_body: User Interface. (line 191)
+* ui_out_table_end: User Interface. (line 194)
+* ui_out_table_header: User Interface. (line 178)
+* ui_out_text: User Interface. (line 357)
+* ui_out_tuple_begin: User Interface. (line 210)
+* ui_out_tuple_end: User Interface. (line 216)
+* ui_out_wrap_hint: User Interface. (line 381)
+* ui_stream: User Interface. (line 308)
+* UINT_MAX: Host Definition. (line 126)
+* ULONG_MAX: Host Definition. (line 127)
+* unwind_dummy_id: Target Architecture Definition.
+ (line 1433)
+* unwind_pc: Target Architecture Definition.
+ (line 872)
+* unwind_sp: Target Architecture Definition.
+ (line 886)
+* USE_PROC_FS: Native Debugging. (line 226)
+* USG: Host Definition. (line 194)
+* using ui_out functions: User Interface. (line 397)
+* value_as_address: Target Architecture Definition.
+ (line 255)
+* value_from_pointer: Target Architecture Definition.
+ (line 264)
+* VALUE_TO_REGISTER: Target Architecture Definition.
+ (line 524)
+* VARIABLES_INSIDE_BLOCK: Target Architecture Definition.
+ (line 1455)
+* VEC: Support Libraries. (line 130)
+* vendor branches: Versions and Branches.
+ (line 108)
+* virtual register representation: Target Architecture Definition.
+ (line 374)
+* void: GDB Observers. (line 67)
+* volatile: Host Definition. (line 202)
+* watchpoints: Algorithms. (line 300)
+* watchpoints, on x86: Algorithms. (line 425)
+* word-addressed machines: Target Architecture Definition.
+ (line 177)
+* wrap_here: Coding. (line 190)
+* write_pc: Target Architecture Definition.
+ (line 1398)
+* writing tests: Testsuite. (line 131)
+* x86 debug registers: Algorithms. (line 425)
+* XCOFF format: Symbol Handling. (line 236)
+
+
+\1f
+Tag Table:
+Node: Top\7f944
+Node: Requirements\7f1783
+Node: Overall Structure\7f3271
+Node: Algorithms\7f8204
+Node: User Interface\7f37912
+Ref: User Interface-Footnote-1\7f61689
+Ref: User Interface-Footnote-2\7f61738
+Node: libgdb\7f61973
+Node: Symbol Handling\7f65933
+Node: Language Support\7f81033
+Node: Host Definition\7f86434
+Node: Target Architecture Definition\7f93791
+Ref: BREAKPOINT_FROM_PC\7f121413
+Ref: DEPRECATED_EXTRACT_STRUCT_VALUE_ADDRESS\7f127581
+Ref: frame_align\7f128413
+Ref: DEPRECATED_FRAME_SAVED_PC\7f130792
+Ref: unwind_pc\7f130978
+Ref: unwind_sp\7f131531
+Ref: stabs_argument_has_addr\7f143994
+Ref: push_dummy_call\7f144768
+Ref: push_dummy_code\7f145354
+Ref: DEPRECATED_REG_STRUCT_HAS_ADDR\7f146199
+Ref: SAVE_DUMMY_FRAME_TOS\7f146433
+Ref: gdbarch_return_value\7f147052
+Ref: DEPRECATED_STACK_ALIGN\7f150337
+Ref: TARGET_WRITE_PC\7f152964
+Ref: TARGET_READ_SP\7f152998
+Ref: unwind_dummy_id\7f154671
+Ref: Target Architecture Definition-Footnote-1\7f163224
+Ref: Target Architecture Definition-Footnote-2\7f163467
+Node: Target Vector Definition\7f163586
+Node: Managing Execution State\7f164129
+Node: Existing Targets\7f165942
+Node: Native Debugging\7f168263
+Node: Support Libraries\7f178702
+Node: Coding\7f190108
+Node: Porting GDB\7f215827
+Node: Versions and Branches\7f217736
+Ref: Tags\7f223695
+Ref: experimental branch tags\7f224026
+Node: Start of New Year Procedure\7f224758
+Node: Releasing GDB\7f225756
+Node: Testsuite\7f244100
+Node: Hints\7f251053
+Node: Getting Started\7f251375
+Node: Debugging GDB\7f255518
+Node: GDB Observers\7f260880
+Node: GNU Free Documentation License\7f265245
+Node: Index\7f287689
+\1f
+End Tag Table