[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
There may be occasions when you need to know something about the protocol--for example, if there is only one serial port to your target machine, you might want your program to do something special if it recognizes a packet meant for GDB.
In the examples below, `->' and `<-' are used to indicate transmitted and received data, respectively.
All GDB commands and responses (other than acknowledgments) are sent as a packet. A packet is introduced with the character `$', the actual packet-data, and the terminating character `#' followed by a two-digit checksum:
|
|
-> |
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
The following table provides a complete list of all currently defined commands and their corresponding response data. See section D.10 File-I/O Remote Protocol Extension, for details about the File I/O extension of the remote protocol.
Each packet's description has a template showing the packet's overall syntax, followed by an explanation of the packet's meaning. We include spaces in some of the templates for clarity; these are not part of the packet's syntax. No GDB packet uses spaces to separate its components. For example, a template like `foo bar baz' describes a packet beginning with the three ASCII bytes `foo', followed by a bar, followed directly by a baz. GDB does not transmit a space character between the `foo' and the bar, or between the bar and the baz.
Note that all packet forms beginning with an upper- or lower-case letter, other than those described here, are reserved for future use.
Here are the packet descriptions.
Enable extended mode. In extended mode, the remote server is made persistent. The `R' packet is used to restart the program being debugged.
Reply:
Indicate the reason the target halted. The reply is the same as for step and continue.
Reply: See section D.3 Stop Reply Packets, for the reply specifications.
Initialized argv[]
array passed into program. arglen
specifies the number of bytes in the hex encoded byte stream
arg. See gdbserver
for more details.
Reply:
(Don't use this packet; its behavior is not well-defined.) Change the serial line speed to baud.
JTC: When does the transport layer state change? When it's received, or after the ACK is transmitted. In either case, there are problems if the command or the acknowledgment packet is dropped.
Stan: If people really wanted to add something like this, and get it working for the first time, they ought to modify ser-unix.c to send some kind of out-of-band message to a specially-setup stub and have the switch happen "in between" packets, so that from remote protocol's point of view, nothing actually happened.
Set (mode is `S') or clear (mode is `C') a breakpoint at addr.
Don't use this packet. Use the `Z' and `z' packets instead (see insert breakpoint or watchpoint packet).
Continue. addr is address to resume. If addr is omitted, resume at current address.
Reply: See section D.3 Stop Reply Packets, for the reply specifications.
Continue with signal sig (hex signal number). If `;addr' is omitted, resume at same address.
Reply: See section D.3 Stop Reply Packets, for the reply specifications.
Toggle debug flag.
Don't use this packet; instead, define a general set packet (see section D.4 General Query Packets).
Detach GDB from the remote system. Sent to the remote target
before GDB disconnects via the detach
command.
Reply:
A reply from GDB to an `F' packet sent by the target. This is part of the File-I/O protocol extension. See section D.10 File-I/O Remote Protocol Extension, for the specification.
Read general registers.
Reply:
DEPRECATED_REGISTER_RAW_SIZE
and gdbarch_register_name
. The
specification of several standard `g' packets is specified below.
Write general registers. See read registers packet, for a description of the XX... data.
Reply:
Set thread for subsequent operations (`m', `M', `g', `G', et.al.). c depends on the operation to be performed: it should be `c' for step and continue operations, `g' for other operations. The thread designator t may be `-1', meaning all the threads, a thread number, or `0' which means pick any thread.
Reply:
Step the remote target by a single clock cycle. If `,nnn' is present, cycle step nnn cycles. If addr is present, cycle step starting at that address.
Signal, then cycle step. See step with signal packet. See cycle step packet.
Kill request.
FIXME: There is no description of how to operate when a specific thread context has been selected (i.e. does 'k' kill only that thread?).
Read length bytes of memory starting at address addr. Note that addr may not be aligned to any particular boundary.
The stub need not use any particular size or alignment when gathering data from memory for the response; even if addr is word-aligned and length is a multiple of the word size, the stub is free to use byte accesses, or not. For this reason, this packet may not be suitable for accessing memory-mapped I/O devices.
Reply:
Write length bytes of memory starting at address addr. XX... is the data; each byte is transmitted as a two-digit hexadecimal number.
Reply:
Read the value of register n; n is in hex. See read registers packet, for a description of how the returned register value is encoded.
Reply:
Write register n... with value r... . The register number n is in hexadecimal, and r... contains two hex digits for each byte in the register (target byte order).
Reply:
General query (`q') and set (`Q'). These packets are described fully in D.4 General Query Packets.
Reset the entire system.
Don't use this packet; use the `R' packet instead.
Restart the program being debugged. XX, while needed, is ignored. This packet is only available in extended mode (see extended mode).
The `R' packet has no reply.
Single step. addr is the address at which to resume. If addr is omitted, resume at same address.
Reply: See section D.3 Stop Reply Packets, for the reply specifications.
Step with signal. This is analogous to the `C' packet, but requests a single-step, rather than a normal resumption of execution.
Reply: See section D.3 Stop Reply Packets, for the reply specifications.
Search backwards starting at address addr for a match with pattern PP and mask MM. PP and MM are 4 bytes. addr must be at least 3 digits.
Find out if the thread XX is alive.
Reply:
Attach to a new process with the specified process ID. pid is a hexadecimal integer identifying the process. The attached process is stopped.
This packet is only available in extended mode (see extended mode).
Reply:
Resume the inferior, specifying different actions for each thread. If an action is specified with no tid, then it is applied to any threads that don't have a specific action specified; if no default action is specified then other threads should remain stopped. Specifying multiple default actions is an error; specifying no actions is also an error. Thread IDs are specified in hexadecimal. Currently supported actions are:
The optional addr argument normally associated with these packets is not supported in `vCont'.
Reply: See section D.3 Stop Reply Packets, for the reply specifications.
Request a list of actions supported by the `vCont' packet.
Reply:
Perform a file operation on the target system. For details, see D.7 Host I/O Packets.
Direct the stub to erase length bytes of flash starting at addr. The region may enclose any number of flash blocks, but its start and end must fall on block boundaries, as indicated by the flash block size appearing in the memory map (see section D.12 Memory Map Format). GDB groups flash memory programming operations together, and sends a `vFlashDone' request after each group; the stub is allowed to delay erase operation until the `vFlashDone' packet is received.
Reply:
Direct the stub to write data to flash address addr. The data is passed in binary form using the same encoding as for the `X' packet (see Binary Data). The memory ranges specified by `vFlashWrite' packets preceding a `vFlashDone' packet must not overlap, and must appear in order of increasing addresses (although `vFlashErase' packets for higher addresses may already have been received; the ordering is guaranteed only between `vFlashWrite' packets). If a packet writes to an address that was neither erased by a preceding `vFlashErase' packet nor by some other target-specific method, the results are unpredictable.
Reply:
Indicate to the stub that flash programming operation is finished. The stub is permitted to delay or batch the effects of a group of `vFlashErase' and `vFlashWrite' packets until a `vFlashDone' packet is received. The contents of the affected regions of flash memory are unpredictable until the `vFlashDone' request is completed.
Run the program filename, passing it each argument on its command line. The file and arguments are hex-encoded strings. If filename is an empty string, the stub may use a default program (e.g. the last program run). The program is created in the stopped state.
This packet is only available in extended mode (see extended mode).
Reply:
Write data to memory, where the data is transmitted in binary. addr is address, length is number of bytes, `XX ...' is binary data (see Binary Data).
Reply:
Insert (`Z') or remove (`z') a type breakpoint or watchpoint starting at address address and covering the next length bytes.
Each breakpoint and watchpoint packet type is documented separately.
Implementation notes: A remote target shall return an empty string for an unrecognized breakpoint or watchpoint packet type. A remote target shall support either both or neither of a given `Ztype ...' and `ztype ...' packet pair. To avoid potential problems with duplicate packets, the operations should be implemented in an idempotent way.
Insert (`Z0') or remove (`z0') a memory breakpoint at address addr of size length.
A memory breakpoint is implemented by replacing the instruction at addr with a software breakpoint or trap instruction. The length is used by targets that indicates the size of the breakpoint (in bytes) that should be inserted (e.g., the ARM and MIPS can insert either a 2 or 4 byte breakpoint).
Implementation note: It is possible for a target to copy or move code that contains memory breakpoints (e.g., when implementing overlays). The behavior of this packet, in the presence of such a target, is not defined.
Reply:
Insert (`Z1') or remove (`z1') a hardware breakpoint at address addr of size length.
A hardware breakpoint is implemented using a mechanism that is not dependant on being able to modify the target's memory.
Implementation note: A hardware breakpoint is not affected by code movement.
Reply:
Insert (`Z2') or remove (`z2') a write watchpoint.
Reply:
Insert (`Z3') or remove (`z3') a read watchpoint.
Reply:
Insert (`Z4') or remove (`z4') an access watchpoint.
Reply:
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
The `C', `c', `S', `s' and `?' packets can receive any of the below as a reply. In the case of the `C', `c', `S' and `s' packets, that reply is only returned when the target halts. In the below the exact meaning of signal number is defined by the header `include/gdb/signals.h' in the GDB source code.
As in the description of request packets, we include spaces in the reply templates for clarity; these are not part of the reply packet's syntax. No GDB stop reply packet uses spaces to separate its components.
The program received signal number AA (a two-digit hexadecimal number). This is equivalent to an `S' response, except that the `n:r' pairs can carry values of important registers and other information directly in the stop reply packet, reducing round-trip latency. Single-step and breakpoint traps are reported this way. Each `n:r' pair is interpreted as follows:
The currently defined stop reasons are:
`parameter ...' is a list of parameters as defined for this very system call.
The target replies with this packet when it expects GDB to call a host system call on behalf of the target. GDB replies with an appropriate `F' packet and keeps up waiting for the next reply packet from the target. The latest `C', `c', `S' or `s' action is expected to be continued. See section D.10 File-I/O Remote Protocol Extension, for more details.
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
Packets starting with `q' are general query packets; packets starting with `Q' are general set packets. General query and set packets are a semi-unified form for retrieving and sending information to and from the stub.
The initial letter of a query or set packet is followed by a name indicating what sort of thing the packet applies to. For example, GDB may use a `qSymbol' packet to exchange symbol definitions with the stub. These packet names follow some conventions:
The name of a query or set packet should be separated from any parameters by a `:'; the parameters themselves should be separated by `,' or `;'. Stubs must be careful to match the full packet name, and check for a separator or the end of the packet, in case two packet names share a common prefix. New packets should not begin with `qC', `qP', or `qL'
(9).
Like the descriptions of the other packets, each description here has a template showing the packet's overall syntax, followed by an explanation of the packet's meaning. We include spaces in some of the templates for clarity; these are not part of the packet's syntax. No GDB packet uses spaces to separate its components.
Here are the currently defined query and set packets:
Return the current thread id.
Reply:
Compute the CRC checksum of a block of memory. Reply:
Obtain a list of all active thread ids from the target (OS). Since there may be too many active threads to fit into one reply packet, this query works iteratively: it may require more than one query/reply sequence to obtain the entire list of threads. The first query of the sequence will be the `qfThreadInfo' query; subsequent queries in the sequence will be the `qsThreadInfo' query.
NOTE: This packet replaces the `qL' query (see below).
Reply:
In response to each query, the target will reply with a list of one or more thread ids, in big-endian unsigned hex, separated by commas. GDB will respond to each reply with a request for more thread ids (using the `qs' form of the query), until the target responds with `l' (lower-case el, for last).
Fetch the address associated with thread local storage specified by thread-id, offset, and lm.
thread-id is the (big endian, hex encoded) thread id associated with the thread for which to fetch the TLS address.
offset is the (big endian, hex encoded) offset associated with the thread local variable. (This offset is obtained from the debug information associated with the variable.)
lm is the (big endian, hex encoded) OS/ABI-specific encoding of the the load module associated with the thread local storage. For example, a GNU/Linux system will pass the link map address of the shared object associated with the thread local storage under consideration. Other operating environments may choose to represent the load module differently, so the precise meaning of this parameter will vary.
Reply:
Don't use this packet; use the `qfThreadInfo' query instead (see above).
Reply:
remote.c:parse_threadlist_response()
.
Get section offsets that the target used when relocating the downloaded image.
Reply:
Text
section by xxx from its original address.
Relocate the Data
section by yyy from its original address.
If the object file format provides segment information (e.g. ELF
`PT_LOAD' program headers), GDB will relocate entire
segments by the supplied offsets.
Note: while a Bss
offset may be included in the response,
GDB ignores this and instead applies the Data
offset
to the Bss
section.
Returns information on threadid. Where: mode is a hex encoded 32 bit mode; threadid is a hex encoded 64 bit thread ID.
Don't use this packet; use the `qThreadExtraInfo' query instead (see below).
Reply: see remote.c:remote_unpack_thread_info_response()
.
Each listed signal should be passed directly to the inferior process. Signals are numbered identically to continue packets and stop replies (see section D.3 Stop Reply Packets). Each signal list item should be strictly greater than the previous item. These signals do not need to stop the inferior, or be reported to GDB. All other signals should be reported to GDB. Multiple `QPassSignals' packets do not combine; any earlier `QPassSignals' list is completely replaced by the new list. This packet improves performance when using `handle signal nostop noprint pass'.
Reply:
Use of this packet is controlled by the set remote pass-signals
command (see section set remote pass-signals).
This packet is not probed by default; the remote stub must request it,
by supplying an appropriate `qSupported' response (see qSupported).
command (hex encoded) is passed to the local interpreter for execution. Invalid commands should be reported using the output string. Before the final result packet, the target may also respond with a number of intermediate `Ooutput' console output packets. Implementors should note that providing access to a stubs's interpreter may have security implications.
Reply:
(Note that the qRcmd
packet's name is separated from the
command by a `,', not a `:', contrary to the naming
conventions above. Please don't use this packet as a model for new
packets.)
Tell the remote stub about features supported by GDB, and query the stub for features it supports. This packet allows GDB and the remote stub to take advantage of each others' features. `qSupported' also consolidates multiple feature probes at startup, to improve GDB performance--a single larger packet performs better than multiple smaller probe packets on high-latency links. Some features may enable behavior which must not be on by default, e.g. because it would confuse older clients or stubs. Other features may describe packets which could be automatically probed for, but are not. These features must be reported before GDB will use them. This "default unsupported" behavior is not appropriate for all packets, but it helps to keep the initial connection time under control with new versions of GDB which support increasing numbers of packets.
Reply:
The allowed forms for each feature (either a gdbfeature in the `qSupported' packet, or a stubfeature in the response) are:
Whenever the stub receives a `qSupported' request, the supplied set of GDB features should override any previous request. This allows GDB to put the stub in a known state, even if the stub had previously been communicating with a different version of GDB.
No values of gdbfeature (for the packet sent by GDB) are defined yet. Stubs should ignore any unknown values for gdbfeature. Any GDB which sends a `qSupported' packet supports receiving packets of unlimited length (earlier versions of GDB may reject overly long responses). Values for gdbfeature may be defined in the future to let the stub take advantage of new features in GDB, e.g. incompatible improvements in the remote protocol--support for unlimited length responses would be a gdbfeature example, if it were not implied by the `qSupported' query. The stub's reply should be independent of the gdbfeature entries sent by GDB; first GDB describes all the features it supports, and then the stub replies with all the features it supports.
Similarly, GDB will silently ignore unrecognized stub feature responses, as long as each response uses one of the standard forms.
Some features are flags. A stub which supports a flag feature should respond with a `+' form response. Other features require values, and the stub should respond with an `=' form response.
Each feature has a default value, which GDB will use if `qSupported' is not available or if the feature is not mentioned in the `qSupported' response. The default values are fixed; a stub is free to omit any feature responses that match the defaults.
Not all features can be probed, but for those which can, the probing mechanism is useful: in some cases, a stub's internal architecture may not allow the protocol layer to know some information about the underlying target in advance. This is especially common in stubs which may be configured for multiple targets.
These are the currently defined stub features and their properties:
Feature Name | Value Required | Default | Probe Allowed | ||||||||||
`PacketSize' | Yes | `-' | No | ||||||||||
`qXfer:auxv:read' | No | `-' | Yes | ||||||||||
`qXfer:features:read' | No | `-' | Yes | ||||||||||
`qXfer:libraries:read' | No | `-' | Yes | ||||||||||
`qXfer:memory-map:read' | No | `-' | Yes | ||||||||||
`qXfer:spu:read' | No | `-' | Yes | ||||||||||
`qXfer:spu:write' | No | `-' | Yes | ||||||||||
`QPassSignals' | No | `-' | Yes |
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
The following g
/G
packets have previously been defined.
In the below, some thirty-two bit registers are transferred as
sixty-four bits. Those registers should be zero/sign extended (which?)
to fill the space allocated. Register bytes are transferred in target
byte order. The two nibbles within a register byte are transferred
most-significant - least-significant.
All registers are transferred as thirty-two bit quantities in the order: 32 general-purpose; sr; lo; hi; bad; cause; pc; 32 floating-point registers; fsr; fir; fp.
All registers are transferred as sixty-four bit quantities (including
thirty-two bit registers such as sr
). The ordering is the same
as MIPS32
.
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
Here we describe the packets GDB uses to implement tracepoints (see section 10. Tracepoints).
Replies:
In the series of action packets for a given tracepoint, at most one can have an `S' before its first action. If such a packet is sent, it and the following packets define "while-stepping" actions. Any prior packets define ordinary actions -- that is, those taken when the tracepoint is first hit. If no action packet has an `S', then all the packets in the series specify ordinary tracepoint actions.
The `action ...' portion of the packet is a series of actions, concatenated without separators. Each action has one of the following forms:
Any number of actions may be packed together in a single `QTDP' packet, as long as the packet does not exceed the maximum packet length (400 bytes, for many stubs). There may be only one `R' action per tracepoint, and it must precede any `M' or `X' actions. Any registers referred to by `M' and `X' actions must be collected by a preceding `R' action. (The "while-stepping" actions are treated as if they were attached to a separate tracepoint, as far as these restrictions are concerned.)
Replies:
A successful reply from the stub indicates that the stub has found the requested frame. The response is a series of parts, concatenated without separators, describing the frame we selected. Each part has one of the following forms:
GDB uses this to mark read-only regions of memory, like those containing program code. Since these areas never change, they should still have the same contents they did when the tracepoint was hit, so there's no reason for the stub to refuse to provide their contents.
Replies:
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
The Host I/O packets allow GDB to perform I/O operations on the far side of a remote link. For example, Host I/O is used to upload and download files to a remote target with its own filesystem. Host I/O uses the same constant values and data structure layout as the target-initiated File-I/O protocol. However, the Host I/O packets are structured differently. The target-initiated protocol relies on target memory to store parameters and buffers. Host I/O requests are initiated by GDB, and the target's memory is not involved. See section D.10 File-I/O Remote Protocol Extension, for more details on the target-initiated protocol.
The Host I/O request packets all encode a single operation along with its arguments. They have this format:
The valid responses to Host I/O packets are:
These are the supported Host I/O operations:
The data read should be returned as a binary attachment on success. If zero bytes were read, the response should include an empty binary attachment (i.e. a trailing semicolon). The return value is the number of target bytes read; the binary attachment may be longer if some characters were escaped.
write
system calls, there is no
separate count argument; the length of data in the
packet is used. `vFile:write' returns the number of bytes written,
which may be shorter than the length of data, or -1 if an
error occurred.
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
When a program on the remote target is running, GDB may
attempt to interrupt it by sending a `Ctrl-C' or a BREAK
,
control of which is specified via GDB's `remotebreak'
setting (see set remotebreak).
The precise meaning of BREAK
is defined by the transport
mechanism and may, in fact, be undefined. GDB does
not currently define a BREAK
mechanism for any of the network
interfaces.
`Ctrl-C', on the other hand, is defined and implemented for all
transport mechanisms. It is represented by sending the single byte
0x03
without any of the usual packet overhead described in
the Overview section (see section D.1 Overview). When a 0x03
byte is
transmitted as part of a packet, it is considered to be packet data
and does not represent an interrupt. E.g., an `X' packet
(see X packet), used for binary downloads, may include an unescaped
0x03
as part of its packet.
Stubs are not required to recognize these interrupt mechanisms and the precise meaning associated with receipt of the interrupt is implementation defined. If the stub is successful at interrupting the running program, it is expected that it will send one of the Stop Reply Packets (see section D.3 Stop Reply Packets) to GDB as a result of successfully stopping the program. Interrupts received while the program is stopped will be discarded.
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
Example sequence of a target being re-started. Notice how the restart does not get any direct output:
-> |
-> |
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
The File I/O remote protocol extension (short: File-I/O) allows the target to use the host's file system and console I/O to perform various system calls. System calls on the target system are translated into a remote protocol packet to the host system, which then performs the needed actions and returns a response packet to the target system. This simulates file system operations even on targets that lack file systems.
The protocol is defined to be independent of both the host and target systems. It uses its own internal representation of datatypes and values. Both GDB and the target's GDB stub are responsible for translating the system-dependent value representations into the internal protocol representations when data is transmitted.
The communication is synchronous. A system call is possible only when GDB is waiting for a response from the `C', `c', `S' or `s' packets. While GDB handles the request for a system call, the target is stopped to allow deterministic access to the target's memory. Therefore File-I/O is not interruptible by target signals. On the other hand, it is possible to interrupt File-I/O by a user interrupt (`Ctrl-C') within GDB.
The target's request to perform a host system call does not finish the latest `C', `c', `S' or `s' action. That means, after finishing the system call, the target returns to continuing the previous activity (continue, step). No additional continue or step request from GDB is required.
(gdb) continue <- target requests 'system call X' target is stopped, GDB executes system call -> GDB returns result ... target continues, GDB returns to wait for the target <- target hits breakpoint and sends a Txx packet |
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
The File-I/O protocol uses the F
packet as the request as well
as reply packet. Since a File-I/O system call can only occur when
GDB is waiting for a response from the continuing or stepping target,
the File-I/O request is a reply that GDB has to expect as a result
of a previous `C', `c', `S' or `s' packet.
This F
packet contains all information needed to allow GDB
to call the appropriate host system call:
At this point, GDB has to perform the following actions.
m
packet request. This additional communication has to be
expected by the target implementation and is handled as any other m
packet.
M
or X
packet. This packet has to be expected
by the target implementation and is handled as any other M
or X
packet.
Eventually GDB replies with another F
packet which contains all
necessary information for the target to continue. This at least contains
errno
, if has been changed by the system call.
After having done the needed type and value coercion, the target continues the latest continue or step action.
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
F
Request Packet
The F
request packet has the following format:
call-id is the identifier to indicate the host system call to be called. This is just the name of the function.
parameter... are the parameters to the system call. Parameters are hexadecimal integer values, either the actual values in case of scalar datatypes, pointers to target buffer space in case of compound datatypes and unspecified memory areas, or pointer/length pairs in case of string parameters. These are appended to the call-id as a comma-delimited list. All values are transmitted in ASCII string representation, pointer/length pairs separated by a slash.
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
F
Reply Packet
The F
reply packet has the following format:
retcode is the return code of the system call as hexadecimal value.
errno is the errno
set by the call, in protocol-specific
representation.
This parameter can be omitted if the call was successful.
Ctrl-C flag is only sent if the user requested a break. In this case, errno must be sent as well, even if the call was successful. The Ctrl-C flag itself consists of the character `C':
F0,0,C |
F-1,4,C |
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
If the `Ctrl-C' flag is set in the GDB
reply packet (see section D.10.4 The F
Reply Packet),
the target should behave as if it had
gotten a break message. The meaning for the target is "system call
interrupted by SIGINT
". Consequentially, the target should actually stop
(as with a break message) and return to GDB with a T02
packet.
It's important for the target to know in which state the system call was interrupted. There are two possible cases:
These two states can be distinguished by the target by the value of the
returned errno
. If it's the protocol representation of EINTR
, the system
call hasn't been performed. This is equivalent to the EINTR
handling
on POSIX systems. In any other case, the target may presume that the
system call has been finished -- successfully or not -- and should behave
as if the break message arrived right after the system call.
GDB must behave reliably. If the system call has not been called
yet, GDB may send the F
reply immediately, setting EINTR
as
errno
in the packet. If the system call on the host has been finished
before the user requests a break, the full action must be finished by
GDB. This requires sending M
or X
packets as necessary.
The F
packet may only be sent when either nothing has happened
or the full action has been completed.
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
By default and if not explicitly closed by the target system, the file
descriptors 0, 1 and 2 are connected to the GDB console. Output
on the GDB console is handled as any other file output operation
(write(1, ...)
or write(2, ...)
). Console input is handled
by GDB so that after the target read request from file descriptor
0 all following typing is buffered until either one of the following
conditions is met:
read
system call is treated as finished.
If the user has typed more characters than fit in the buffer given to
the read
call, the trailing characters are buffered in GDB until
either another read(0, ...)
is requested by the target, or debugging
is stopped at the user's request.
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
open close read write lseek rename unlink stat/fstat gettimeofday isatty system
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
int open(const char *pathname, int flags); int open(const char *pathname, int flags, mode_t mode); |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
int close(int fd); |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
int read(int fd, void *buf, unsigned int count); |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
int write(int fd, const void *buf, unsigned int count); |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
long lseek (int fd, long offset, int flag); |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
int rename(const char *oldpath, const char *newpath); |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
int unlink(const char *pathname); |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
int stat(const char *pathname, struct stat *buf); int fstat(int fd, struct stat *buf); |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
int gettimeofday(struct timeval *tv, void *tz); |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
int isatty(int fd); |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
int system(const char *command); |
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
Integral Datatypes Pointer Values Memory Transfer struct stat struct timeval
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
The integral datatypes used in the system calls are int
,
unsigned int
, long
, unsigned long
,
mode_t
, and time_t
.
int
, unsigned int
, mode_t
and time_t
are
implemented as 32 bit values in this protocol.
long
and unsigned long
are implemented as 64 bit types.
See section Limits, for corresponding MIN and MAX values (similar to those in `limits.h') to allow range checking on host and target.
time_t
datatypes are defined as seconds since the Epoch.
All integral datatypes transferred as part of a memory read or write of a
structured datatype e.g. a struct stat
have to be given in big endian
byte order.
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
Pointers to target data are transmitted as they are. An exception is made for pointers to buffers for which the length isn't transmitted as part of the function call, namely strings. Strings are transmitted as a pointer/length pair, both as hex values, e.g.
|
|
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
Structured data which is transferred using a memory read or write (for
example, a struct stat
) is expected to be in a protocol-specific format
with all scalar multibyte datatypes being big endian. Translation to
this representation needs to be done both by the target before the F
packet is sent, and by GDB before
it transfers memory to the target. Transferred pointers to structured
data should point to the already-coerced data at any time.
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
The buffer of type struct stat
used by the target and GDB
is defined as follows:
struct stat { unsigned int st_dev; /* device */ unsigned int st_ino; /* inode */ mode_t st_mode; /* protection */ unsigned int st_nlink; /* number of hard links */ unsigned int st_uid; /* user ID of owner */ unsigned int st_gid; /* group ID of owner */ unsigned int st_rdev; /* device type (if inode device) */ unsigned long st_size; /* total size, in bytes */ unsigned long st_blksize; /* blocksize for filesystem I/O */ unsigned long st_blocks; /* number of blocks allocated */ time_t st_atime; /* time of last access */ time_t st_mtime; /* time of last modification */ time_t st_ctime; /* time of last change */ }; |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
The buffer of type struct timeval
used by the File-I/O protocol
is defined as follows:
struct timeval { time_t tv_sec; /* second */ long tv_usec; /* microsecond */ }; |
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
The following values are used for the constants inside of the protocol. GDB and target are responsible for translating these values before and after the call as needed.
Open Flags mode_t Values Errno Values Lseek Flags Limits
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
All values are given in hexadecimal representation.
O_RDONLY 0x0 O_WRONLY 0x1 O_RDWR 0x2 O_APPEND 0x8 O_CREAT 0x200 O_TRUNC 0x400 O_EXCL 0x800 |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
All values are given in octal representation.
S_IFREG 0100000 S_IFDIR 040000 S_IRUSR 0400 S_IWUSR 0200 S_IXUSR 0100 S_IRGRP 040 S_IWGRP 020 S_IXGRP 010 S_IROTH 04 S_IWOTH 02 S_IXOTH 01 |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
All values are given in decimal representation.
EPERM 1 ENOENT 2 EINTR 4 EBADF 9 EACCES 13 EFAULT 14 EBUSY 16 EEXIST 17 ENODEV 19 ENOTDIR 20 EISDIR 21 EINVAL 22 ENFILE 23 EMFILE 24 EFBIG 27 ENOSPC 28 ESPIPE 29 EROFS 30 ENAMETOOLONG 91 EUNKNOWN 9999 |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
SEEK_SET 0 SEEK_CUR 1 SEEK_END 2 |
[ <] | [ >] | [ << ] | [ Up] | [ >> ] | [Top] | [Contents] | [Index] | [ ?] |
All values are given in decimal representation.
INT_MIN -2147483648 INT_MAX 2147483647 UINT_MAX 4294967295 LONG_MIN -9223372036854775808 LONG_MAX 9223372036854775807 ULONG_MAX 18446744073709551615 |
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
Example sequence of a write call, file descriptor 3, buffer is at target address 0x1234, 6 bytes should be written:
<- |
<- |
<- |
<- |
<- |
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
On some platforms, a dynamic loader (e.g. `ld.so') runs in the same process as your application to manage libraries. In this case, GDB can use the loader's symbol table and normal memory operations to maintain a list of shared libraries. On other platforms, the operating system manages loaded libraries. GDB can not retrieve the list of currently loaded libraries through memory operations, so it uses the `qXfer:libraries:read' packet (see qXfer library list read) instead. The remote stub queries the target's operating system and reports which libraries are loaded.
The `qXfer:libraries:read' packet returns an XML document which lists loaded libraries and their offsets. Each library has an associated name and one or more segment base addresses, which report where the library was loaded in memory. The segment bases are start addresses, not relocation offsets; they do not depend on the library's link-time base addresses.
GDB must be linked with the Expat library to support XML library lists. See Expat.
A simple memory map, with one loaded library relocated by a single offset, looks like this:
<library-list> <library name="/lib/libc.so.6"> <segment address="0x10000000"/> </library> </library-list> |
<!-- library-list: Root element with versioning --> <!ELEMENT library-list (library)*> <!ATTLIST library-list version CDATA #FIXED "1.0"> <!ELEMENT library (segment)*> <!ATTLIST library name CDATA #REQUIRED> <!ELEMENT segment EMPTY> <!ATTLIST segment address CDATA #REQUIRED> |
[ <] | [ >] | [ <<] | [ Up] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
To be able to write into flash memory, GDB needs to obtain a memory map from the target. This section describes the format of the memory map.
The memory map is obtained using the `qXfer:memory-map:read' (see qXfer memory map read) packet and is an XML document that lists memory regions.
GDB must be linked with the Expat library to support XML memory maps. See Expat.
The top-level structure of the document is shown below:
<?xml version="1.0"?> <!DOCTYPE memory-map PUBLIC "+//IDN gnu.org//DTD GDB Memory Map V1.0//EN" "http://sourceware.org/gdb/gdb-memory-map.dtd"> <memory-map> region... </memory-map> |
<memory type="ram" start="addr" length="length"/> |
<memory type="rom" start="addr" length="length"/> |
<memory type="flash" start="addr" length="length"> <property name="blocksize">blocksize</property> </memory> |
<!-- ................................................... --> <!-- Memory Map XML DTD ................................ --> <!-- File: memory-map.dtd .............................. --> <!-- .................................... .............. --> <!-- memory-map.dtd --> <!-- memory-map: Root element with versioning --> <!ELEMENT memory-map (memory | property)> <!ATTLIST memory-map version CDATA #FIXED "1.0.0"> <!ELEMENT memory (property)> <!-- memory: Specifies a memory region, and its type, or device. --> <!ATTLIST memory type CDATA #REQUIRED start CDATA #REQUIRED length CDATA #REQUIRED device CDATA #IMPLIED> <!-- property: Generic attribute tag --> <!ELEMENT property (#PCDATA | property)*> <!ATTLIST property name CDATA #REQUIRED> |
[ <<] | [ >>] | [Top] | [Contents] | [Index] | [ ?] |
Please send FSF & GNU inquiries & questions to gnu@gnu.org. There are also other ways to contact the FSF.
These pages are maintained by the GDB developers.
Copyright Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111, USA.
Verbatim copying and distribution of this entire article is permitted in any medium, provided this notice is preserved.
This document was generated by GDB Administrator on March, 27 2008 using texi2html