1 This is gdb.info, produced by makeinfo version 4.8 from
2 ../.././gdb/doc/gdb.texinfo.
4 INFO-DIR-SECTION Software development
6 * Gdb: (gdb). The GNU debugger.
9 This file documents the GNU debugger GDB.
11 This is the Ninth Edition, of `Debugging with GDB: the GNU
12 Source-Level Debugger' for GDB Version 6.8.
14 Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996,
16 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006
17 Free Software Foundation, Inc.
19 Permission is granted to copy, distribute and/or modify this document
20 under the terms of the GNU Free Documentation License, Version 1.1 or
21 any later version published by the Free Software Foundation; with the
22 Invariant Sections being "Free Software" and "Free Software Needs Free
23 Documentation", with the Front-Cover Texts being "A GNU Manual," and
24 with the Back-Cover Texts as in (a) below.
26 (a) The FSF's Back-Cover Text is: "You are free to copy and modify
27 this GNU Manual. Buying copies from GNU Press supports the FSF in
28 developing GNU and promoting software freedom."
31 File: gdb.info, Node: Bytecode Descriptions, Next: Using Agent Expressions, Prev: General Bytecode Design, Up: Agent Expressions
33 E.2 Bytecode Descriptions
34 =========================
36 Each bytecode description has the following form:
38 `add' (0x02): A B => A+B
39 Pop the top two stack items, A and B, as integers; push their sum,
43 In this example, `add' is the name of the bytecode, and `(0x02)' is
44 the one-byte value used to encode the bytecode, in hexadecimal. The
45 phrase "A B => A+B" shows the stack before and after the bytecode
46 executes. Beforehand, the stack must contain at least two values, A
47 and B; since the top of the stack is to the right, B is on the top of
48 the stack, and A is underneath it. After execution, the bytecode will
49 have popped A and B from the stack, and replaced them with a single
50 value, A+B. There may be other values on the stack below those shown,
51 but the bytecode affects only those shown.
53 Here is another example:
55 `const8' (0x22) N: => N
56 Push the 8-bit integer constant N on the stack, without sign
60 In this example, the bytecode `const8' takes an operand N directly
61 from the bytecode stream; the operand follows the `const8' bytecode
62 itself. We write any such operands immediately after the name of the
63 bytecode, before the colon, and describe the exact encoding of the
64 operand in the bytecode stream in the body of the bytecode description.
66 For the `const8' bytecode, there are no stack items given before the
67 =>; this simply means that the bytecode consumes no values from the
68 stack. If a bytecode consumes no values, or produces no values, the
69 list on either side of the => may be empty.
71 If a value is written as A, B, or N, then the bytecode treats it as
72 an integer. If a value is written is ADDR, then the bytecode treats it
75 We do not fully describe the floating point operations here; although
76 this design can be extended in a clean way to handle floating point
77 values, they are not of immediate interest to the customer, so we avoid
78 describing them, to save time.
81 Prefix for floating-point bytecodes. Not implemented yet.
83 `add' (0x02): A B => A+B
84 Pop two integers from the stack, and push their sum, as an integer.
86 `sub' (0x03): A B => A-B
87 Pop two integers from the stack, subtract the top value from the
88 next-to-top value, and push the difference.
90 `mul' (0x04): A B => A*B
91 Pop two integers from the stack, multiply them, and push the
92 product on the stack. Note that, when one multiplies two N-bit
93 numbers yielding another N-bit number, it is irrelevant whether the
94 numbers are signed or not; the results are the same.
96 `div_signed' (0x05): A B => A/B
97 Pop two signed integers from the stack; divide the next-to-top
98 value by the top value, and push the quotient. If the divisor is
99 zero, terminate with an error.
101 `div_unsigned' (0x06): A B => A/B
102 Pop two unsigned integers from the stack; divide the next-to-top
103 value by the top value, and push the quotient. If the divisor is
104 zero, terminate with an error.
106 `rem_signed' (0x07): A B => A MODULO B
107 Pop two signed integers from the stack; divide the next-to-top
108 value by the top value, and push the remainder. If the divisor is
109 zero, terminate with an error.
111 `rem_unsigned' (0x08): A B => A MODULO B
112 Pop two unsigned integers from the stack; divide the next-to-top
113 value by the top value, and push the remainder. If the divisor is
114 zero, terminate with an error.
116 `lsh' (0x09): A B => A<<B
117 Pop two integers from the stack; let A be the next-to-top value,
118 and B be the top value. Shift A left by B bits, and push the
121 `rsh_signed' (0x0a): A B => `(signed)'A>>B
122 Pop two integers from the stack; let A be the next-to-top value,
123 and B be the top value. Shift A right by B bits, inserting copies
124 of the top bit at the high end, and push the result.
126 `rsh_unsigned' (0x0b): A B => A>>B
127 Pop two integers from the stack; let A be the next-to-top value,
128 and B be the top value. Shift A right by B bits, inserting zero
129 bits at the high end, and push the result.
131 `log_not' (0x0e): A => !A
132 Pop an integer from the stack; if it is zero, push the value one;
133 otherwise, push the value zero.
135 `bit_and' (0x0f): A B => A&B
136 Pop two integers from the stack, and push their bitwise `and'.
138 `bit_or' (0x10): A B => A|B
139 Pop two integers from the stack, and push their bitwise `or'.
141 `bit_xor' (0x11): A B => A^B
142 Pop two integers from the stack, and push their bitwise
145 `bit_not' (0x12): A => ~A
146 Pop an integer from the stack, and push its bitwise complement.
148 `equal' (0x13): A B => A=B
149 Pop two integers from the stack; if they are equal, push the value
150 one; otherwise, push the value zero.
152 `less_signed' (0x14): A B => A<B
153 Pop two signed integers from the stack; if the next-to-top value
154 is less than the top value, push the value one; otherwise, push
157 `less_unsigned' (0x15): A B => A<B
158 Pop two unsigned integers from the stack; if the next-to-top value
159 is less than the top value, push the value one; otherwise, push
162 `ext' (0x16) N: A => A, sign-extended from N bits
163 Pop an unsigned value from the stack; treating it as an N-bit
164 twos-complement value, extend it to full length. This means that
165 all bits to the left of bit N-1 (where the least significant bit
166 is bit 0) are set to the value of bit N-1. Note that N may be
167 larger than or equal to the width of the stack elements of the
168 bytecode engine; in this case, the bytecode should have no effect.
170 The number of source bits to preserve, N, is encoded as a single
171 byte unsigned integer following the `ext' bytecode.
173 `zero_ext' (0x2a) N: A => A, zero-extended from N bits
174 Pop an unsigned value from the stack; zero all but the bottom N
175 bits. This means that all bits to the left of bit N-1 (where the
176 least significant bit is bit 0) are set to the value of bit N-1.
178 The number of source bits to preserve, N, is encoded as a single
179 byte unsigned integer following the `zero_ext' bytecode.
181 `ref8' (0x17): ADDR => A
182 `ref16' (0x18): ADDR => A
183 `ref32' (0x19): ADDR => A
184 `ref64' (0x1a): ADDR => A
185 Pop an address ADDR from the stack. For bytecode `ref'N, fetch an
186 N-bit value from ADDR, using the natural target endianness. Push
187 the fetched value as an unsigned integer.
189 Note that ADDR may not be aligned in any particular way; the
190 `refN' bytecodes should operate correctly for any address.
192 If attempting to access memory at ADDR would cause a processor
193 exception of some sort, terminate with an error.
195 `ref_float' (0x1b): ADDR => D
196 `ref_double' (0x1c): ADDR => D
197 `ref_long_double' (0x1d): ADDR => D
198 `l_to_d' (0x1e): A => D
199 `d_to_l' (0x1f): D => A
202 `dup' (0x28): A => A A
203 Push another copy of the stack's top element.
205 `swap' (0x2b): A B => B A
206 Exchange the top two items on the stack.
209 Discard the top value on the stack.
211 `if_goto' (0x20) OFFSET: A =>
212 Pop an integer off the stack; if it is non-zero, branch to the
213 given offset in the bytecode string. Otherwise, continue to the
214 next instruction in the bytecode stream. In other words, if A is
215 non-zero, set the `pc' register to `start' + OFFSET. Thus, an
216 offset of zero denotes the beginning of the expression.
218 The OFFSET is stored as a sixteen-bit unsigned value, stored
219 immediately following the `if_goto' bytecode. It is always stored
220 most significant byte first, regardless of the target's normal
221 endianness. The offset is not guaranteed to fall at any particular
222 alignment within the bytecode stream; thus, on machines where
223 fetching a 16-bit on an unaligned address raises an exception, you
224 should fetch the offset one byte at a time.
226 `goto' (0x21) OFFSET: =>
227 Branch unconditionally to OFFSET; in other words, set the `pc'
228 register to `start' + OFFSET.
230 The offset is stored in the same way as for the `if_goto' bytecode.
232 `const8' (0x22) N: => N
233 `const16' (0x23) N: => N
234 `const32' (0x24) N: => N
235 `const64' (0x25) N: => N
236 Push the integer constant N on the stack, without sign extension.
237 To produce a small negative value, push a small twos-complement
238 value, and then sign-extend it using the `ext' bytecode.
240 The constant N is stored in the appropriate number of bytes
241 following the `const'B bytecode. The constant N is always stored
242 most significant byte first, regardless of the target's normal
243 endianness. The constant is not guaranteed to fall at any
244 particular alignment within the bytecode stream; thus, on machines
245 where fetching a 16-bit on an unaligned address raises an
246 exception, you should fetch N one byte at a time.
249 Push the value of register number N, without sign extension. The
250 registers are numbered following GDB's conventions.
252 The register number N is encoded as a 16-bit unsigned integer
253 immediately following the `reg' bytecode. It is always stored most
254 significant byte first, regardless of the target's normal
255 endianness. The register number is not guaranteed to fall at any
256 particular alignment within the bytecode stream; thus, on machines
257 where fetching a 16-bit on an unaligned address raises an
258 exception, you should fetch the register number one byte at a time.
260 `trace' (0x0c): ADDR SIZE =>
261 Record the contents of the SIZE bytes at ADDR in a trace buffer,
262 for later retrieval by GDB.
264 `trace_quick' (0x0d) SIZE: ADDR => ADDR
265 Record the contents of the SIZE bytes at ADDR in a trace buffer,
266 for later retrieval by GDB. SIZE is a single byte unsigned
267 integer following the `trace' opcode.
269 This bytecode is equivalent to the sequence `dup const8 SIZE
270 trace', but we provide it anyway to save space in bytecode strings.
272 `trace16' (0x30) SIZE: ADDR => ADDR
273 Identical to trace_quick, except that SIZE is a 16-bit big-endian
274 unsigned integer, not a single byte. This should probably have
275 been named `trace_quick16', for consistency.
278 Stop executing bytecode; the result should be the top element of
279 the stack. If the purpose of the expression was to compute an
280 lvalue or a range of memory, then the next-to-top of the stack is
281 the lvalue's address, and the top of the stack is the lvalue's
286 File: gdb.info, Node: Using Agent Expressions, Next: Varying Target Capabilities, Prev: Bytecode Descriptions, Up: Agent Expressions
288 E.3 Using Agent Expressions
289 ===========================
291 Here is a sketch of a full non-stop debugging cycle, showing how agent
292 expressions fit into the process.
294 * The user selects trace points in the program's code at which GDB
297 * The user specifies expressions to evaluate at each trace point.
298 These expressions may denote objects in memory, in which case
299 those objects' contents are recorded as the program runs, or
300 computed values, in which case the values themselves are recorded.
302 * GDB transmits the tracepoints and their associated expressions to
303 the GDB agent, running on the debugging target.
305 * The agent arranges to be notified when a trace point is hit. Note
306 that, on some systems, the target operating system is completely
307 responsible for collecting the data; see *Note Tracing on
310 * When execution on the target reaches a trace point, the agent
311 evaluates the expressions associated with that trace point, and
312 records the resulting values and memory ranges.
314 * Later, when the user selects a given trace event and inspects the
315 objects and expression values recorded, GDB talks to the agent to
316 retrieve recorded data as necessary to meet the user's requests.
317 If the user asks to see an object whose contents have not been
318 recorded, GDB reports an error.
322 File: gdb.info, Node: Varying Target Capabilities, Next: Tracing on Symmetrix, Prev: Using Agent Expressions, Up: Agent Expressions
324 E.4 Varying Target Capabilities
325 ===============================
327 Some targets don't support floating-point, and some would rather not
328 have to deal with `long long' operations. Also, different targets will
329 have different stack sizes, and different bytecode buffer lengths.
331 Thus, GDB needs a way to ask the target about itself. We haven't
332 worked out the details yet, but in general, GDB should be able to send
333 the target a packet asking it to describe itself. The reply should be a
334 packet whose length is explicit, so we can add new information to the
335 packet in future revisions of the agent, without confusing old versions
336 of GDB, and it should contain a version number. It should contain at
337 least the following information:
339 * whether floating point is supported
341 * whether `long long' is supported
343 * maximum acceptable size of bytecode stack
345 * maximum acceptable length of bytecode expressions
347 * which registers are actually available for collection
349 * whether the target supports disabled tracepoints
353 File: gdb.info, Node: Tracing on Symmetrix, Next: Rationale, Prev: Varying Target Capabilities, Up: Agent Expressions
355 E.5 Tracing on Symmetrix
356 ========================
358 This section documents the API used by the GDB agent to collect data on
361 Cygnus originally implemented these tracing features to help EMC
362 Corporation debug their Symmetrix high-availability disk drives. The
363 Symmetrix application code already includes substantial tracing
364 facilities; the GDB agent for the Symmetrix system uses those facilities
365 for its own data collection, via the API described here.
367 -- Function: DTC_RESPONSE adbg_find_memory_in_frame (FRAME_DEF *FRAME,
368 char *ADDRESS, char **BUFFER, unsigned int *SIZE)
369 Search the trace frame FRAME for memory saved from ADDRESS. If
370 the memory is available, provide the address of the buffer holding
371 it; otherwise, provide the address of the next saved area.
373 * If the memory at ADDRESS was saved in FRAME, set `*BUFFER' to
374 point to the buffer in which that memory was saved, set
375 `*SIZE' to the number of bytes from ADDRESS that are saved at
376 `*BUFFER', and return `OK_TARGET_RESPONSE'. (Clearly, in
377 this case, the function will always set `*SIZE' to a value
380 * If FRAME does not record any memory at ADDRESS, set `*SIZE'
381 to the distance from ADDRESS to the start of the saved region
382 with the lowest address higher than ADDRESS. If there is no
383 memory saved from any higher address, set `*SIZE' to zero.
384 Return `NOT_FOUND_TARGET_RESPONSE'.
386 These two possibilities allow the caller to either retrieve the
387 data, or walk the address space to the next saved area.
389 This function allows the GDB agent to map the regions of memory
390 saved in a particular frame, and retrieve their contents efficiently.
392 This function also provides a clean interface between the GDB agent
393 and the Symmetrix tracing structures, making it easier to adapt the GDB
394 agent to future versions of the Symmetrix system, and vice versa. This
395 function searches all data saved in FRAME, whether the data is there at
396 the request of a bytecode expression, or because it falls in one of the
397 format's memory ranges, or because it was saved from the top of the
398 stack. EMC can arbitrarily change and enhance the tracing mechanism,
399 but as long as this function works properly, all collected memory is
402 The function itself is straightforward to implement. A single pass
403 over the trace frame's stack area, memory ranges, and expression blocks
404 can yield the address of the buffer (if the requested address was
405 saved), and also note the address of the next higher range of memory,
406 to be returned when the search fails.
408 As an example, suppose the trace frame `f' has saved sixteen bytes
409 from address `0x8000' in a buffer at `0x1000', and thirty-two bytes
410 from address `0xc000' in a buffer at `0x1010'. Here are some sample
411 calls, and the effect each would have:
413 `adbg_find_memory_in_frame (f, (char*) 0x8000, &buffer, &size)'
414 This would set `buffer' to `0x1000', set `size' to sixteen, and
415 return `OK_TARGET_RESPONSE', since `f' saves sixteen bytes from
416 `0x8000' at `0x1000'.
418 `adbg_find_memory_in_frame (f, (char *) 0x8004, &buffer, &size)'
419 This would set `buffer' to `0x1004', set `size' to twelve, and
420 return `OK_TARGET_RESPONSE', since `f' saves the twelve bytes from
421 `0x8004' starting four bytes into the buffer at `0x1000'. This
422 shows that request addresses may fall in the middle of saved
423 areas; the function should return the address and size of the
424 remainder of the buffer.
426 `adbg_find_memory_in_frame (f, (char *) 0x8100, &buffer, &size)'
427 This would set `size' to `0x3f00' and return
428 `NOT_FOUND_TARGET_RESPONSE', since there is no memory saved in `f'
429 from the address `0x8100', and the next memory available is at
430 `0x8100 + 0x3f00', or `0xc000'. This shows that request addresses
431 may fall outside of all saved memory ranges; the function should
432 indicate the next saved area, if any.
434 `adbg_find_memory_in_frame (f, (char *) 0x7000, &buffer, &size)'
435 This would set `size' to `0x1000' and return
436 `NOT_FOUND_TARGET_RESPONSE', since the next saved memory is at
437 `0x7000 + 0x1000', or `0x8000'.
439 `adbg_find_memory_in_frame (f, (char *) 0xf000, &buffer, &size)'
440 This would set `size' to zero, and return
441 `NOT_FOUND_TARGET_RESPONSE'. This shows how the function tells the
442 caller that no further memory ranges have been saved.
445 As another example, here is a function which will print out the
446 addresses of all memory saved in the trace frame `frame' on the
447 Symmetrix INLINES console:
449 print_frame_addresses (FRAME_DEF *frame)
458 /* Either find out how much memory we have here, or discover
459 where the next saved region is. */
460 if (adbg_find_memory_in_frame (frame, addr, &buffer, &size)
461 == OK_TARGET_RESPONSE)
462 printp ("saved %x to %x\n", addr, addr + size);
469 Note that there is not necessarily any connection between the order
470 in which the data is saved in the trace frame, and the order in which
471 `adbg_find_memory_in_frame' will return those memory ranges. The code
472 above will always print the saved memory regions in order of increasing
473 address, while the underlying frame structure might store the data in a
476 [[This section should cover the rest of the Symmetrix functions the
477 stub relies upon, too.]]
480 File: gdb.info, Node: Rationale, Prev: Tracing on Symmetrix, Up: Agent Expressions
485 Some of the design decisions apparent above are arguable.
487 What about stack overflow/underflow?
488 GDB should be able to query the target to discover its stack size.
489 Given that information, GDB can determine at translation time
490 whether a given expression will overflow the stack. But this spec
491 isn't about what kinds of error-checking GDB ought to do.
493 Why are you doing everything in LONGEST?
494 Speed isn't important, but agent code size is; using LONGEST
495 brings in a bunch of support code to do things like division, etc.
496 So this is a serious concern.
498 First, note that you don't need different bytecodes for different
499 operand sizes. You can generate code without _knowing_ how big the
500 stack elements actually are on the target. If the target only
501 supports 32-bit ints, and you don't send any 64-bit bytecodes,
502 everything just works. The observation here is that the MIPS and
503 the Alpha have only fixed-size registers, and you can still get
504 C's semantics even though most instructions only operate on
505 full-sized words. You just need to make sure everything is
506 properly sign-extended at the right times. So there is no need
507 for 32- and 64-bit variants of the bytecodes. Just implement
508 everything using the largest size you support.
510 GDB should certainly check to see what sizes the target supports,
511 so the user can get an error earlier, rather than later. But this
512 information is not necessary for correctness.
514 Why don't you have `>' or `<=' operators?
515 I want to keep the interpreter small, and we don't need them. We
516 can combine the `less_' opcodes with `log_not', and swap the order
517 of the operands, yielding all four asymmetrical comparison
518 operators. For example, `(x <= y)' is `! (x > y)', which is `! (y
521 Why do you have `log_not'?
522 Why do you have `ext'?
523 Why do you have `zero_ext'?
524 These are all easily synthesized from other instructions, but I
525 expect them to be used frequently, and they're simple, so I
526 include them to keep bytecode strings short.
528 `log_not' is equivalent to `const8 0 equal'; it's used in half the
529 relational operators.
531 `ext N' is equivalent to `const8 S-N lsh const8 S-N rsh_signed',
532 where S is the size of the stack elements; it follows `refM' and
533 REG bytecodes when the value should be signed. See the next
536 `zero_ext N' is equivalent to `constM MASK log_and'; it's used
537 whenever we push the value of a register, because we can't assume
538 the upper bits of the register aren't garbage.
540 Why not have sign-extending variants of the `ref' operators?
541 Because that would double the number of `ref' operators, and we
542 need the `ext' bytecode anyway for accessing bitfields.
544 Why not have constant-address variants of the `ref' operators?
545 Because that would double the number of `ref' operators again, and
546 `const32 ADDRESS ref32' is only one byte longer.
548 Why do the `refN' operators have to support unaligned fetches?
549 GDB will generate bytecode that fetches multi-byte values at
550 unaligned addresses whenever the executable's debugging
551 information tells it to. Furthermore, GDB does not know the value
552 the pointer will have when GDB generates the bytecode, so it
553 cannot determine whether a particular fetch will be aligned or not.
555 In particular, structure bitfields may be several bytes long, but
556 follow no alignment rules; members of packed structures are not
557 necessarily aligned either.
559 In general, there are many cases where unaligned references occur
560 in correct C code, either at the programmer's explicit request, or
561 at the compiler's discretion. Thus, it is simpler to make the GDB
562 agent bytecodes work correctly in all circumstances than to make
563 GDB guess in each case whether the compiler did the usual thing.
565 Why are there no side-effecting operators?
566 Because our current client doesn't want them? That's a cheap
567 answer. I think the real answer is that I'm afraid of
568 implementing function calls. We should re-visit this issue after
569 the present contract is delivered.
571 Why aren't the `goto' ops PC-relative?
572 The interpreter has the base address around anyway for PC bounds
573 checking, and it seemed simpler.
575 Why is there only one offset size for the `goto' ops?
576 Offsets are currently sixteen bits. I'm not happy with this
579 Suppose we have multiple branch ops with different offset sizes.
580 As I generate code left-to-right, all my jumps are forward jumps
581 (there are no loops in expressions), so I never know the target
582 when I emit the jump opcode. Thus, I have to either always assume
583 the largest offset size, or do jump relaxation on the code after I
584 generate it, which seems like a big waste of time.
586 I can imagine a reasonable expression being longer than 256 bytes.
587 I can't imagine one being longer than 64k. Thus, we need 16-bit
588 offsets. This kind of reasoning is so bogus, but relaxation is
591 The other approach would be to generate code right-to-left. Then
592 I'd always know my offset size. That might be fun.
594 Where is the function call bytecode?
595 When we add side-effects, we should add this.
597 Why does the `reg' bytecode take a 16-bit register number?
598 Intel's IA-64 architecture has 128 general-purpose registers, and
599 128 floating-point registers, and I'm sure it has some random
602 Why do we need `trace' and `trace_quick'?
603 Because GDB needs to record all the memory contents and registers
604 an expression touches. If the user wants to evaluate an expression
605 `x->y->z', the agent must record the values of `x' and `x->y' as
606 well as the value of `x->y->z'.
608 Don't the `trace' bytecodes make the interpreter less general?
609 They do mean that the interpreter contains special-purpose code,
610 but that doesn't mean the interpreter can only be used for that
611 purpose. If an expression doesn't use the `trace' bytecodes, they
612 don't get in its way.
614 Why doesn't `trace_quick' consume its arguments the way everything else does?
615 In general, you do want your operators to consume their arguments;
616 it's consistent, and generally reduces the amount of stack
617 rearrangement necessary. However, `trace_quick' is a kludge to
618 save space; it only exists so we needn't write `dup const8 SIZE
619 trace' before every memory reference. Therefore, it's okay for it
620 not to consume its arguments; it's meant for a specific context in
621 which we know exactly what it should do with the stack. If we're
622 going to have a kludge, it should be an effective kludge.
624 Why does `trace16' exist?
625 That opcode was added by the customer that contracted Cygnus for
626 the data tracing work. I personally think it is unnecessary;
627 objects that large will be quite rare, so it is okay to use `dup
628 const16 SIZE trace' in those cases.
630 Whatever we decide to do with `trace16', we should at least leave
631 opcode 0x30 reserved, to remain compatible with the customer who
636 File: gdb.info, Node: Target Descriptions, Next: Copying, Prev: Agent Expressions, Up: Top
638 Appendix F Target Descriptions
639 ******************************
641 *Warning:* target descriptions are still under active development, and
642 the contents and format may change between GDB releases. The format is
643 expected to stabilize in the future.
645 One of the challenges of using GDB to debug embedded systems is that
646 there are so many minor variants of each processor architecture in use.
647 It is common practice for vendors to start with a standard processor
648 core -- ARM, PowerPC, or MIPS, for example -- and then make changes to
649 adapt it to a particular market niche. Some architectures have
650 hundreds of variants, available from dozens of vendors. This leads to
651 a number of problems:
653 * With so many different customized processors, it is difficult for
654 the GDB maintainers to keep up with the changes.
656 * Since individual variants may have short lifetimes or limited
657 audiences, it may not be worthwhile to carry information about
658 every variant in the GDB source tree.
660 * When GDB does support the architecture of the embedded system at
661 hand, the task of finding the correct architecture name to give the
662 `set architecture' command can be error-prone.
664 To address these problems, the GDB remote protocol allows a target
665 system to not only identify itself to GDB, but to actually describe its
666 own features. This lets GDB support processor variants it has never
667 seen before -- to the extent that the descriptions are accurate, and
668 that GDB understands them.
670 GDB must be linked with the Expat library to support XML target
671 descriptions. *Note Expat::.
675 * Retrieving Descriptions:: How descriptions are fetched from a target.
676 * Target Description Format:: The contents of a target description.
677 * Predefined Target Types:: Standard types available for target
679 * Standard Target Features:: Features GDB knows about.
682 File: gdb.info, Node: Retrieving Descriptions, Next: Target Description Format, Up: Target Descriptions
684 F.1 Retrieving Descriptions
685 ===========================
687 Target descriptions can be read from the target automatically, or
688 specified by the user manually. The default behavior is to read the
689 description from the target. GDB retrieves it via the remote protocol
690 using `qXfer' requests (*note qXfer: General Query Packets.). The
691 ANNEX in the `qXfer' packet will be `target.xml'. The contents of the
692 `target.xml' annex are an XML document, of the form described in *Note
693 Target Description Format::.
695 Alternatively, you can specify a file to read for the target
696 description. If a file is set, the target will not be queried. The
697 commands to specify a file are:
699 `set tdesc filename PATH'
700 Read the target description from PATH.
702 `unset tdesc filename'
703 Do not read the XML target description from a file. GDB will use
704 the description supplied by the current target.
706 `show tdesc filename'
707 Show the filename to read for a target description, if any.
710 File: gdb.info, Node: Target Description Format, Next: Predefined Target Types, Prev: Retrieving Descriptions, Up: Target Descriptions
712 F.2 Target Description Format
713 =============================
715 A target description annex is an XML (http://www.w3.org/XML/) document
716 which complies with the Document Type Definition provided in the GDB
717 sources in `gdb/features/gdb-target.dtd'. This means you can use
718 generally available tools like `xmllint' to check that your feature
719 descriptions are well-formed and valid. However, to help people
720 unfamiliar with XML write descriptions for their targets, we also
721 describe the grammar here.
723 Target descriptions can identify the architecture of the remote
724 target and (for some architectures) provide information about custom
725 register sets. GDB can use this information to autoconfigure for your
726 target, or to warn you if you connect to an unsupported target.
728 Here is a simple target description:
730 <target version="1.0">
731 <architecture>i386:x86-64</architecture>
734 This minimal description only says that the target uses the x86-64
737 A target description has the following overall form, with [ ] marking
738 optional elements and ... marking repeatable elements. The elements
739 are explained further below.
741 <?xml version="1.0"?>
742 <!DOCTYPE target SYSTEM "gdb-target.dtd">
743 <target version="1.0">
748 The description is generally insensitive to whitespace and line breaks,
749 under the usual common-sense rules. The XML version declaration and
750 document type declaration can generally be omitted (GDB does not
751 require them), but specifying them may be useful for XML validation
752 tools. The `version' attribute for `<target>' may also be omitted, but
753 we recommend including it; if future versions of GDB use an incompatible
754 revision of `gdb-target.dtd', they will detect and report the version
760 It can sometimes be valuable to split a target description up into
761 several different annexes, either for organizational purposes, or to
762 share files between different possible target descriptions. You can
763 divide a description into multiple files by replacing any element of
764 the target description with an inclusion directive of the form:
766 <xi:include href="DOCUMENT"/>
768 When GDB encounters an element of this form, it will retrieve the named
769 XML DOCUMENT, and replace the inclusion directive with the contents of
770 that document. If the current description was read using `qXfer', then
771 so will be the included document; DOCUMENT will be interpreted as the
772 name of an annex. If the current description was read from a file, GDB
773 will look for DOCUMENT as a file in the same directory where it found
774 the original description.
779 An `<architecture>' element has this form:
781 <architecture>ARCH</architecture>
783 ARCH is an architecture name from the same selection accepted by
784 `set architecture' (*note Specifying a Debugging Target: Targets.).
789 Each `<feature>' describes some logical portion of the target system.
790 Features are currently used to describe available CPU registers and the
791 types of their contents. A `<feature>' element has this form:
793 <feature name="NAME">
798 Each feature's name should be unique within the description. The name
799 of a feature does not matter unless GDB has some special knowledge of
800 the contents of that feature; if it does, the feature should have its
801 standard name. *Note Standard Target Features::.
806 Any register's value is a collection of bits which GDB must interpret.
807 The default interpretation is a two's complement integer, but other
808 types can be requested by name in the register description. Some
809 predefined types are provided by GDB (*note Predefined Target Types::),
810 and the description can define additional composite types.
812 Each type element must have an `id' attribute, which gives a unique
813 (within the containing `<feature>') name to the type. Types must be
814 defined before they are used.
816 Some targets offer vector registers, which can be treated as arrays
817 of scalar elements. These types are written as `<vector>' elements,
818 specifying the array element type, TYPE, and the number of elements,
821 <vector id="ID" type="TYPE" count="COUNT"/>
823 If a register's value is usefully viewed in multiple ways, define it
824 with a union type containing the useful representations. The `<union>'
825 element contains one or more `<field>' elements, each of which has a
829 <field name="NAME" type="TYPE"/>
836 Each register is represented as an element with this form:
841 [save-restore="SAVE-RESTORE"]
845 The components are as follows:
848 The register's name; it must be unique within the target
852 The register's size, in bits.
855 The register's number. If omitted, a register's number is one
856 greater than that of the previous register (either in the current
857 feature or in a preceeding feature); the first register in the
858 target description defaults to zero. This register number is used
859 to read or write the register; e.g. it is used in the remote `p'
860 and `P' packets, and registers appear in the `g' and `G' packets
861 in order of increasing register number.
864 Whether the register should be preserved across inferior function
865 calls; this must be either `yes' or `no'. The default is `yes',
866 which is appropriate for most registers except for some system
867 control registers; this is not related to the target's ABI.
870 The type of the register. TYPE may be a predefined type, a type
871 defined in the current feature, or one of the special types `int'
872 and `float'. `int' is an integer type of the correct size for
873 BITSIZE, and `float' is a floating point type (in the
874 architecture's normal floating point format) of the correct size
875 for BITSIZE. The default is `int'.
878 The register group to which this register belongs. GROUP must be
879 either `general', `float', or `vector'. If no GROUP is specified,
880 GDB will not display the register in `info registers'.
884 File: gdb.info, Node: Predefined Target Types, Next: Standard Target Features, Prev: Target Description Format, Up: Target Descriptions
886 F.3 Predefined Target Types
887 ===========================
889 Type definitions in the self-description can build up composite types
890 from basic building blocks, but can not define fundamental types.
891 Instead, standard identifiers are provided by GDB for the fundamental
892 types. The currently supported types are:
899 Signed integer types holding the specified number of bits.
906 Unsigned integer types holding the specified number of bits.
910 Pointers to unspecified code and data. The program counter and
911 any dedicated return address register may be marked as code
912 pointers; printing a code pointer converts it into a symbolic
913 address. The stack pointer and any dedicated address registers
914 may be marked as data pointers.
917 Single precision IEEE floating point.
920 Double precision IEEE floating point.
923 The 12-byte extended precision format used by ARM FPA registers.
927 File: gdb.info, Node: Standard Target Features, Prev: Predefined Target Types, Up: Target Descriptions
929 F.4 Standard Target Features
930 ============================
932 A target description must contain either no registers or all the
933 target's registers. If the description contains no registers, then GDB
934 will assume a default register layout, selected based on the
935 architecture. If the description contains any registers, the default
936 layout will not be used; the standard registers must be described in
937 the target description, in such a way that GDB can recognize them.
939 This is accomplished by giving specific names to feature elements
940 which contain standard registers. GDB will look for features with
941 those names and verify that they contain the expected registers; if any
942 known feature is missing required registers, or if any required feature
943 is missing, GDB will reject the target description. You can add
944 additional registers to any of the standard features -- GDB will
945 display them just as if they were added to an unrecognized feature.
947 This section lists the known features and their expected contents.
948 Sample XML documents for these features are included in the GDB source
949 tree, in the directory `gdb/features'.
951 Names recognized by GDB should include the name of the company or
952 organization which selected the name, and the overall architecture to
953 which the feature applies; so e.g. the feature containing ARM core
954 registers is named `org.gnu.gdb.arm.core'.
956 The names of registers are not case sensitive for the purpose of
957 recognizing standard features, but GDB will only display registers
958 using the capitalization used in the description.
968 File: gdb.info, Node: ARM Features, Next: MIPS Features, Up: Standard Target Features
973 The `org.gnu.gdb.arm.core' feature is required for ARM targets. It
974 should contain registers `r0' through `r13', `sp', `lr', `pc', and
977 The `org.gnu.gdb.arm.fpa' feature is optional. If present, it
978 should contain registers `f0' through `f7' and `fps'.
980 The `org.gnu.gdb.xscale.iwmmxt' feature is optional. If present, it
981 should contain at least registers `wR0' through `wR15' and `wCGR0'
982 through `wCGR3'. The `wCID', `wCon', `wCSSF', and `wCASF' registers
986 File: gdb.info, Node: MIPS Features, Next: M68K Features, Prev: ARM Features, Up: Standard Target Features
991 The `org.gnu.gdb.mips.cpu' feature is required for MIPS targets. It
992 should contain registers `r0' through `r31', `lo', `hi', and `pc'.
993 They may be 32-bit or 64-bit depending on the target.
995 The `org.gnu.gdb.mips.cp0' feature is also required. It should
996 contain at least the `status', `badvaddr', and `cause' registers. They
997 may be 32-bit or 64-bit depending on the target.
999 The `org.gnu.gdb.mips.fpu' feature is currently required, though it
1000 may be optional in a future version of GDB. It should contain
1001 registers `f0' through `f31', `fcsr', and `fir'. They may be 32-bit or
1002 64-bit depending on the target.
1004 The `org.gnu.gdb.mips.linux' feature is optional. It should contain
1005 a single register, `restart', which is used by the Linux kernel to
1006 control restartable syscalls.
1009 File: gdb.info, Node: M68K Features, Next: PowerPC Features, Prev: MIPS Features, Up: Standard Target Features
1014 ``org.gnu.gdb.m68k.core''
1015 ``org.gnu.gdb.coldfire.core''
1016 ``org.gnu.gdb.fido.core''
1017 One of those features must be always present. The feature that is
1018 present determines which flavor of m86k is used. The feature that
1019 is present should contain registers `d0' through `d7', `a0'
1020 through `a5', `fp', `sp', `ps' and `pc'.
1022 ``org.gnu.gdb.coldfire.fp''
1023 This feature is optional. If present, it should contain registers
1024 `fp0' through `fp7', `fpcontrol', `fpstatus' and `fpiaddr'.
1027 File: gdb.info, Node: PowerPC Features, Prev: M68K Features, Up: Standard Target Features
1029 F.4.4 PowerPC Features
1030 ----------------------
1032 The `org.gnu.gdb.power.core' feature is required for PowerPC targets.
1033 It should contain registers `r0' through `r31', `pc', `msr', `cr',
1034 `lr', `ctr', and `xer'. They may be 32-bit or 64-bit depending on the
1037 The `org.gnu.gdb.power.fpu' feature is optional. It should contain
1038 registers `f0' through `f31' and `fpscr'.
1040 The `org.gnu.gdb.power.altivec' feature is optional. It should
1041 contain registers `vr0' through `vr31', `vscr', and `vrsave'.
1043 The `org.gnu.gdb.power.spe' feature is optional. It should contain
1044 registers `ev0h' through `ev31h', `acc', and `spefscr'. SPE targets
1045 should provide 32-bit registers in `org.gnu.gdb.power.core' and provide
1046 the upper halves in `ev0h' through `ev31h'. GDB will combine these to
1047 present registers `ev0' through `ev31' to the user.
1050 File: gdb.info, Node: Copying, Next: GNU Free Documentation License, Prev: Target Descriptions, Up: Top
1052 Appendix G GNU GENERAL PUBLIC LICENSE
1053 *************************************
1055 Version 2, June 1991
1057 Copyright (C) 1989, 1991 Free Software Foundation, Inc.
1058 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
1060 Everyone is permitted to copy and distribute verbatim copies
1061 of this license document, but changing it is not allowed.
1066 The licenses for most software are designed to take away your freedom
1067 to share and change it. By contrast, the GNU General Public License is
1068 intended to guarantee your freedom to share and change free
1069 software--to make sure the software is free for all its users. This
1070 General Public License applies to most of the Free Software
1071 Foundation's software and to any other program whose authors commit to
1072 using it. (Some other Free Software Foundation software is covered by
1073 the GNU Library General Public License instead.) You can apply it to
1076 When we speak of free software, we are referring to freedom, not
1077 price. Our General Public Licenses are designed to make sure that you
1078 have the freedom to distribute copies of free software (and charge for
1079 this service if you wish), that you receive source code or can get it
1080 if you want it, that you can change the software or use pieces of it in
1081 new free programs; and that you know you can do these things.
1083 To protect your rights, we need to make restrictions that forbid
1084 anyone to deny you these rights or to ask you to surrender the rights.
1085 These restrictions translate to certain responsibilities for you if you
1086 distribute copies of the software, or if you modify it.
1088 For example, if you distribute copies of such a program, whether
1089 gratis or for a fee, you must give the recipients all the rights that
1090 you have. You must make sure that they, too, receive or can get the
1091 source code. And you must show them these terms so they know their
1094 We protect your rights with two steps: (1) copyright the software,
1095 and (2) offer you this license which gives you legal permission to copy,
1096 distribute and/or modify the software.
1098 Also, for each author's protection and ours, we want to make certain
1099 that everyone understands that there is no warranty for this free
1100 software. If the software is modified by someone else and passed on, we
1101 want its recipients to know that what they have is not the original, so
1102 that any problems introduced by others will not reflect on the original
1103 authors' reputations.
1105 Finally, any free program is threatened constantly by software
1106 patents. We wish to avoid the danger that redistributors of a free
1107 program will individually obtain patent licenses, in effect making the
1108 program proprietary. To prevent this, we have made it clear that any
1109 patent must be licensed for everyone's free use or not licensed at all.
1111 The precise terms and conditions for copying, distribution and
1112 modification follow.
1114 TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
1115 0. This License applies to any program or other work which contains a
1116 notice placed by the copyright holder saying it may be distributed
1117 under the terms of this General Public License. The "Program",
1118 below, refers to any such program or work, and a "work based on
1119 the Program" means either the Program or any derivative work under
1120 copyright law: that is to say, a work containing the Program or a
1121 portion of it, either verbatim or with modifications and/or
1122 translated into another language. (Hereinafter, translation is
1123 included without limitation in the term "modification".) Each
1124 licensee is addressed as "you".
1126 Activities other than copying, distribution and modification are
1127 not covered by this License; they are outside its scope. The act
1128 of running the Program is not restricted, and the output from the
1129 Program is covered only if its contents constitute a work based on
1130 the Program (independent of having been made by running the
1131 Program). Whether that is true depends on what the Program does.
1133 1. You may copy and distribute verbatim copies of the Program's
1134 source code as you receive it, in any medium, provided that you
1135 conspicuously and appropriately publish on each copy an appropriate
1136 copyright notice and disclaimer of warranty; keep intact all the
1137 notices that refer to this License and to the absence of any
1138 warranty; and give any other recipients of the Program a copy of
1139 this License along with the Program.
1141 You may charge a fee for the physical act of transferring a copy,
1142 and you may at your option offer warranty protection in exchange
1145 2. You may modify your copy or copies of the Program or any portion
1146 of it, thus forming a work based on the Program, and copy and
1147 distribute such modifications or work under the terms of Section 1
1148 above, provided that you also meet all of these conditions:
1150 a. You must cause the modified files to carry prominent notices
1151 stating that you changed the files and the date of any change.
1153 b. You must cause any work that you distribute or publish, that
1154 in whole or in part contains or is derived from the Program
1155 or any part thereof, to be licensed as a whole at no charge
1156 to all third parties under the terms of this License.
1158 c. If the modified program normally reads commands interactively
1159 when run, you must cause it, when started running for such
1160 interactive use in the most ordinary way, to print or display
1161 an announcement including an appropriate copyright notice and
1162 a notice that there is no warranty (or else, saying that you
1163 provide a warranty) and that users may redistribute the
1164 program under these conditions, and telling the user how to
1165 view a copy of this License. (Exception: if the Program
1166 itself is interactive but does not normally print such an
1167 announcement, your work based on the Program is not required
1168 to print an announcement.)
1170 These requirements apply to the modified work as a whole. If
1171 identifiable sections of that work are not derived from the
1172 Program, and can be reasonably considered independent and separate
1173 works in themselves, then this License, and its terms, do not
1174 apply to those sections when you distribute them as separate
1175 works. But when you distribute the same sections as part of a
1176 whole which is a work based on the Program, the distribution of
1177 the whole must be on the terms of this License, whose permissions
1178 for other licensees extend to the entire whole, and thus to each
1179 and every part regardless of who wrote it.
1181 Thus, it is not the intent of this section to claim rights or
1182 contest your rights to work written entirely by you; rather, the
1183 intent is to exercise the right to control the distribution of
1184 derivative or collective works based on the Program.
1186 In addition, mere aggregation of another work not based on the
1187 Program with the Program (or with a work based on the Program) on
1188 a volume of a storage or distribution medium does not bring the
1189 other work under the scope of this License.
1191 3. You may copy and distribute the Program (or a work based on it,
1192 under Section 2) in object code or executable form under the terms
1193 of Sections 1 and 2 above provided that you also do one of the
1196 a. Accompany it with the complete corresponding machine-readable
1197 source code, which must be distributed under the terms of
1198 Sections 1 and 2 above on a medium customarily used for
1199 software interchange; or,
1201 b. Accompany it with a written offer, valid for at least three
1202 years, to give any third party, for a charge no more than your
1203 cost of physically performing source distribution, a complete
1204 machine-readable copy of the corresponding source code, to be
1205 distributed under the terms of Sections 1 and 2 above on a
1206 medium customarily used for software interchange; or,
1208 c. Accompany it with the information you received as to the offer
1209 to distribute corresponding source code. (This alternative is
1210 allowed only for noncommercial distribution and only if you
1211 received the program in object code or executable form with
1212 such an offer, in accord with Subsection b above.)
1214 The source code for a work means the preferred form of the work for
1215 making modifications to it. For an executable work, complete
1216 source code means all the source code for all modules it contains,
1217 plus any associated interface definition files, plus the scripts
1218 used to control compilation and installation of the executable.
1219 However, as a special exception, the source code distributed need
1220 not include anything that is normally distributed (in either
1221 source or binary form) with the major components (compiler,
1222 kernel, and so on) of the operating system on which the executable
1223 runs, unless that component itself accompanies the executable.
1225 If distribution of executable or object code is made by offering
1226 access to copy from a designated place, then offering equivalent
1227 access to copy the source code from the same place counts as
1228 distribution of the source code, even though third parties are not
1229 compelled to copy the source along with the object code.
1231 4. You may not copy, modify, sublicense, or distribute the Program
1232 except as expressly provided under this License. Any attempt
1233 otherwise to copy, modify, sublicense or distribute the Program is
1234 void, and will automatically terminate your rights under this
1235 License. However, parties who have received copies, or rights,
1236 from you under this License will not have their licenses
1237 terminated so long as such parties remain in full compliance.
1239 5. You are not required to accept this License, since you have not
1240 signed it. However, nothing else grants you permission to modify
1241 or distribute the Program or its derivative works. These actions
1242 are prohibited by law if you do not accept this License.
1243 Therefore, by modifying or distributing the Program (or any work
1244 based on the Program), you indicate your acceptance of this
1245 License to do so, and all its terms and conditions for copying,
1246 distributing or modifying the Program or works based on it.
1248 6. Each time you redistribute the Program (or any work based on the
1249 Program), the recipient automatically receives a license from the
1250 original licensor to copy, distribute or modify the Program
1251 subject to these terms and conditions. You may not impose any
1252 further restrictions on the recipients' exercise of the rights
1253 granted herein. You are not responsible for enforcing compliance
1254 by third parties to this License.
1256 7. If, as a consequence of a court judgment or allegation of patent
1257 infringement or for any other reason (not limited to patent
1258 issues), conditions are imposed on you (whether by court order,
1259 agreement or otherwise) that contradict the conditions of this
1260 License, they do not excuse you from the conditions of this
1261 License. If you cannot distribute so as to satisfy simultaneously
1262 your obligations under this License and any other pertinent
1263 obligations, then as a consequence you may not distribute the
1264 Program at all. For example, if a patent license would not permit
1265 royalty-free redistribution of the Program by all those who
1266 receive copies directly or indirectly through you, then the only
1267 way you could satisfy both it and this License would be to refrain
1268 entirely from distribution of the Program.
1270 If any portion of this section is held invalid or unenforceable
1271 under any particular circumstance, the balance of the section is
1272 intended to apply and the section as a whole is intended to apply
1273 in other circumstances.
1275 It is not the purpose of this section to induce you to infringe any
1276 patents or other property right claims or to contest validity of
1277 any such claims; this section has the sole purpose of protecting
1278 the integrity of the free software distribution system, which is
1279 implemented by public license practices. Many people have made
1280 generous contributions to the wide range of software distributed
1281 through that system in reliance on consistent application of that
1282 system; it is up to the author/donor to decide if he or she is
1283 willing to distribute software through any other system and a
1284 licensee cannot impose that choice.
1286 This section is intended to make thoroughly clear what is believed
1287 to be a consequence of the rest of this License.
1289 8. If the distribution and/or use of the Program is restricted in
1290 certain countries either by patents or by copyrighted interfaces,
1291 the original copyright holder who places the Program under this
1292 License may add an explicit geographical distribution limitation
1293 excluding those countries, so that distribution is permitted only
1294 in or among countries not thus excluded. In such case, this
1295 License incorporates the limitation as if written in the body of
1298 9. The Free Software Foundation may publish revised and/or new
1299 versions of the General Public License from time to time. Such
1300 new versions will be similar in spirit to the present version, but
1301 may differ in detail to address new problems or concerns.
1303 Each version is given a distinguishing version number. If the
1304 Program specifies a version number of this License which applies
1305 to it and "any later version", you have the option of following
1306 the terms and conditions either of that version or of any later
1307 version published by the Free Software Foundation. If the Program
1308 does not specify a version number of this License, you may choose
1309 any version ever published by the Free Software Foundation.
1311 10. If you wish to incorporate parts of the Program into other free
1312 programs whose distribution conditions are different, write to the
1313 author to ask for permission. For software which is copyrighted
1314 by the Free Software Foundation, write to the Free Software
1315 Foundation; we sometimes make exceptions for this. Our decision
1316 will be guided by the two goals of preserving the free status of
1317 all derivatives of our free software and of promoting the sharing
1318 and reuse of software generally.
1321 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO
1322 WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE
1323 LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
1324 HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT
1325 WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
1326 NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
1327 FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
1328 QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
1329 PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
1330 SERVICING, REPAIR OR CORRECTION.
1332 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
1333 WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY
1334 MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE
1335 LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
1336 INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
1337 INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
1338 DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU
1339 OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY
1340 OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
1341 ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
1343 END OF TERMS AND CONDITIONS
1344 How to Apply These Terms to Your New Programs
1345 =============================================
1347 If you develop a new program, and you want it to be of the greatest
1348 possible use to the public, the best way to achieve this is to make it
1349 free software which everyone can redistribute and change under these
1352 To do so, attach the following notices to the program. It is safest
1353 to attach them to the start of each source file to most effectively
1354 convey the exclusion of warranty; and each file should have at least
1355 the "copyright" line and a pointer to where the full notice is found.
1357 ONE LINE TO GIVE THE PROGRAM'S NAME AND A BRIEF IDEA OF WHAT IT DOES.
1358 Copyright (C) YEAR NAME OF AUTHOR
1360 This program is free software; you can redistribute it and/or modify
1361 it under the terms of the GNU General Public License as published by
1362 the Free Software Foundation; either version 2 of the License, or
1363 (at your option) any later version.
1365 This program is distributed in the hope that it will be useful,
1366 but WITHOUT ANY WARRANTY; without even the implied warranty of
1367 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
1368 GNU General Public License for more details.
1370 You should have received a copy of the GNU General Public License
1371 along with this program; if not, write to the Free Software
1372 Foundation, Inc., 51 Franklin Street, Fifth Floor,
1373 Boston, MA 02110-1301, USA.
1375 Also add information on how to contact you by electronic and paper
1378 If the program is interactive, make it output a short notice like
1379 this when it starts in an interactive mode:
1381 Gnomovision version 69, Copyright (C) YEAR NAME OF AUTHOR
1382 Gnomovision comes with ABSOLUTELY NO WARRANTY; for details
1384 This is free software, and you are welcome to redistribute it
1385 under certain conditions; type `show c' for details.
1387 The hypothetical commands `show w' and `show c' should show the
1388 appropriate parts of the General Public License. Of course, the
1389 commands you use may be called something other than `show w' and `show
1390 c'; they could even be mouse-clicks or menu items--whatever suits your
1393 You should also get your employer (if you work as a programmer) or
1394 your school, if any, to sign a "copyright disclaimer" for the program,
1395 if necessary. Here is a sample; alter the names:
1397 Yoyodyne, Inc., hereby disclaims all copyright interest in the program
1398 `Gnomovision' (which makes passes at compilers) written by James Hacker.
1400 SIGNATURE OF TY COON, 1 April 1989
1401 Ty Coon, President of Vice
1403 This General Public License does not permit incorporating your
1404 program into proprietary programs. If your program is a subroutine
1405 library, you may consider it more useful to permit linking proprietary
1406 applications with the library. If this is what you want to do, use the
1407 GNU Library General Public License instead of this License.
1410 File: gdb.info, Node: GNU Free Documentation License, Next: Index, Prev: Copying, Up: Top
1412 Appendix H GNU Free Documentation License
1413 *****************************************
1415 Version 1.2, November 2002
1417 Copyright (C) 2000,2001,2002 Free Software Foundation, Inc.
1418 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
1420 Everyone is permitted to copy and distribute verbatim copies
1421 of this license document, but changing it is not allowed.
1425 The purpose of this License is to make a manual, textbook, or other
1426 functional and useful document "free" in the sense of freedom: to
1427 assure everyone the effective freedom to copy and redistribute it,
1428 with or without modifying it, either commercially or
1429 noncommercially. Secondarily, this License preserves for the
1430 author and publisher a way to get credit for their work, while not
1431 being considered responsible for modifications made by others.
1433 This License is a kind of "copyleft", which means that derivative
1434 works of the document must themselves be free in the same sense.
1435 It complements the GNU General Public License, which is a copyleft
1436 license designed for free software.
1438 We have designed this License in order to use it for manuals for
1439 free software, because free software needs free documentation: a
1440 free program should come with manuals providing the same freedoms
1441 that the software does. But this License is not limited to
1442 software manuals; it can be used for any textual work, regardless
1443 of subject matter or whether it is published as a printed book.
1444 We recommend this License principally for works whose purpose is
1445 instruction or reference.
1447 1. APPLICABILITY AND DEFINITIONS
1449 This License applies to any manual or other work, in any medium,
1450 that contains a notice placed by the copyright holder saying it
1451 can be distributed under the terms of this License. Such a notice
1452 grants a world-wide, royalty-free license, unlimited in duration,
1453 to use that work under the conditions stated herein. The
1454 "Document", below, refers to any such manual or work. Any member
1455 of the public is a licensee, and is addressed as "you". You
1456 accept the license if you copy, modify or distribute the work in a
1457 way requiring permission under copyright law.
1459 A "Modified Version" of the Document means any work containing the
1460 Document or a portion of it, either copied verbatim, or with
1461 modifications and/or translated into another language.
1463 A "Secondary Section" is a named appendix or a front-matter section
1464 of the Document that deals exclusively with the relationship of the
1465 publishers or authors of the Document to the Document's overall
1466 subject (or to related matters) and contains nothing that could
1467 fall directly within that overall subject. (Thus, if the Document
1468 is in part a textbook of mathematics, a Secondary Section may not
1469 explain any mathematics.) The relationship could be a matter of
1470 historical connection with the subject or with related matters, or
1471 of legal, commercial, philosophical, ethical or political position
1474 The "Invariant Sections" are certain Secondary Sections whose
1475 titles are designated, as being those of Invariant Sections, in
1476 the notice that says that the Document is released under this
1477 License. If a section does not fit the above definition of
1478 Secondary then it is not allowed to be designated as Invariant.
1479 The Document may contain zero Invariant Sections. If the Document
1480 does not identify any Invariant Sections then there are none.
1482 The "Cover Texts" are certain short passages of text that are
1483 listed, as Front-Cover Texts or Back-Cover Texts, in the notice
1484 that says that the Document is released under this License. A
1485 Front-Cover Text may be at most 5 words, and a Back-Cover Text may
1486 be at most 25 words.
1488 A "Transparent" copy of the Document means a machine-readable copy,
1489 represented in a format whose specification is available to the
1490 general public, that is suitable for revising the document
1491 straightforwardly with generic text editors or (for images
1492 composed of pixels) generic paint programs or (for drawings) some
1493 widely available drawing editor, and that is suitable for input to
1494 text formatters or for automatic translation to a variety of
1495 formats suitable for input to text formatters. A copy made in an
1496 otherwise Transparent file format whose markup, or absence of
1497 markup, has been arranged to thwart or discourage subsequent
1498 modification by readers is not Transparent. An image format is
1499 not Transparent if used for any substantial amount of text. A
1500 copy that is not "Transparent" is called "Opaque".
1502 Examples of suitable formats for Transparent copies include plain
1503 ASCII without markup, Texinfo input format, LaTeX input format,
1504 SGML or XML using a publicly available DTD, and
1505 standard-conforming simple HTML, PostScript or PDF designed for
1506 human modification. Examples of transparent image formats include
1507 PNG, XCF and JPG. Opaque formats include proprietary formats that
1508 can be read and edited only by proprietary word processors, SGML or
1509 XML for which the DTD and/or processing tools are not generally
1510 available, and the machine-generated HTML, PostScript or PDF
1511 produced by some word processors for output purposes only.
1513 The "Title Page" means, for a printed book, the title page itself,
1514 plus such following pages as are needed to hold, legibly, the
1515 material this License requires to appear in the title page. For
1516 works in formats which do not have any title page as such, "Title
1517 Page" means the text near the most prominent appearance of the
1518 work's title, preceding the beginning of the body of the text.
1520 A section "Entitled XYZ" means a named subunit of the Document
1521 whose title either is precisely XYZ or contains XYZ in parentheses
1522 following text that translates XYZ in another language. (Here XYZ
1523 stands for a specific section name mentioned below, such as
1524 "Acknowledgements", "Dedications", "Endorsements", or "History".)
1525 To "Preserve the Title" of such a section when you modify the
1526 Document means that it remains a section "Entitled XYZ" according
1529 The Document may include Warranty Disclaimers next to the notice
1530 which states that this License applies to the Document. These
1531 Warranty Disclaimers are considered to be included by reference in
1532 this License, but only as regards disclaiming warranties: any other
1533 implication that these Warranty Disclaimers may have is void and
1534 has no effect on the meaning of this License.
1538 You may copy and distribute the Document in any medium, either
1539 commercially or noncommercially, provided that this License, the
1540 copyright notices, and the license notice saying this License
1541 applies to the Document are reproduced in all copies, and that you
1542 add no other conditions whatsoever to those of this License. You
1543 may not use technical measures to obstruct or control the reading
1544 or further copying of the copies you make or distribute. However,
1545 you may accept compensation in exchange for copies. If you
1546 distribute a large enough number of copies you must also follow
1547 the conditions in section 3.
1549 You may also lend copies, under the same conditions stated above,
1550 and you may publicly display copies.
1552 3. COPYING IN QUANTITY
1554 If you publish printed copies (or copies in media that commonly
1555 have printed covers) of the Document, numbering more than 100, and
1556 the Document's license notice requires Cover Texts, you must
1557 enclose the copies in covers that carry, clearly and legibly, all
1558 these Cover Texts: Front-Cover Texts on the front cover, and
1559 Back-Cover Texts on the back cover. Both covers must also clearly
1560 and legibly identify you as the publisher of these copies. The
1561 front cover must present the full title with all words of the
1562 title equally prominent and visible. You may add other material
1563 on the covers in addition. Copying with changes limited to the
1564 covers, as long as they preserve the title of the Document and
1565 satisfy these conditions, can be treated as verbatim copying in
1568 If the required texts for either cover are too voluminous to fit
1569 legibly, you should put the first ones listed (as many as fit
1570 reasonably) on the actual cover, and continue the rest onto
1573 If you publish or distribute Opaque copies of the Document
1574 numbering more than 100, you must either include a
1575 machine-readable Transparent copy along with each Opaque copy, or
1576 state in or with each Opaque copy a computer-network location from
1577 which the general network-using public has access to download
1578 using public-standard network protocols a complete Transparent
1579 copy of the Document, free of added material. If you use the
1580 latter option, you must take reasonably prudent steps, when you
1581 begin distribution of Opaque copies in quantity, to ensure that
1582 this Transparent copy will remain thus accessible at the stated
1583 location until at least one year after the last time you
1584 distribute an Opaque copy (directly or through your agents or
1585 retailers) of that edition to the public.
1587 It is requested, but not required, that you contact the authors of
1588 the Document well before redistributing any large number of
1589 copies, to give them a chance to provide you with an updated
1590 version of the Document.
1594 You may copy and distribute a Modified Version of the Document
1595 under the conditions of sections 2 and 3 above, provided that you
1596 release the Modified Version under precisely this License, with
1597 the Modified Version filling the role of the Document, thus
1598 licensing distribution and modification of the Modified Version to
1599 whoever possesses a copy of it. In addition, you must do these
1600 things in the Modified Version:
1602 A. Use in the Title Page (and on the covers, if any) a title
1603 distinct from that of the Document, and from those of
1604 previous versions (which should, if there were any, be listed
1605 in the History section of the Document). You may use the
1606 same title as a previous version if the original publisher of
1607 that version gives permission.
1609 B. List on the Title Page, as authors, one or more persons or
1610 entities responsible for authorship of the modifications in
1611 the Modified Version, together with at least five of the
1612 principal authors of the Document (all of its principal
1613 authors, if it has fewer than five), unless they release you
1614 from this requirement.
1616 C. State on the Title page the name of the publisher of the
1617 Modified Version, as the publisher.
1619 D. Preserve all the copyright notices of the Document.
1621 E. Add an appropriate copyright notice for your modifications
1622 adjacent to the other copyright notices.
1624 F. Include, immediately after the copyright notices, a license
1625 notice giving the public permission to use the Modified
1626 Version under the terms of this License, in the form shown in
1629 G. Preserve in that license notice the full lists of Invariant
1630 Sections and required Cover Texts given in the Document's
1633 H. Include an unaltered copy of this License.
1635 I. Preserve the section Entitled "History", Preserve its Title,
1636 and add to it an item stating at least the title, year, new
1637 authors, and publisher of the Modified Version as given on
1638 the Title Page. If there is no section Entitled "History" in
1639 the Document, create one stating the title, year, authors,
1640 and publisher of the Document as given on its Title Page,
1641 then add an item describing the Modified Version as stated in
1642 the previous sentence.
1644 J. Preserve the network location, if any, given in the Document
1645 for public access to a Transparent copy of the Document, and
1646 likewise the network locations given in the Document for
1647 previous versions it was based on. These may be placed in
1648 the "History" section. You may omit a network location for a
1649 work that was published at least four years before the
1650 Document itself, or if the original publisher of the version
1651 it refers to gives permission.
1653 K. For any section Entitled "Acknowledgements" or "Dedications",
1654 Preserve the Title of the section, and preserve in the
1655 section all the substance and tone of each of the contributor
1656 acknowledgements and/or dedications given therein.
1658 L. Preserve all the Invariant Sections of the Document,
1659 unaltered in their text and in their titles. Section numbers
1660 or the equivalent are not considered part of the section
1663 M. Delete any section Entitled "Endorsements". Such a section
1664 may not be included in the Modified Version.
1666 N. Do not retitle any existing section to be Entitled
1667 "Endorsements" or to conflict in title with any Invariant
1670 O. Preserve any Warranty Disclaimers.
1672 If the Modified Version includes new front-matter sections or
1673 appendices that qualify as Secondary Sections and contain no
1674 material copied from the Document, you may at your option
1675 designate some or all of these sections as invariant. To do this,
1676 add their titles to the list of Invariant Sections in the Modified
1677 Version's license notice. These titles must be distinct from any
1678 other section titles.
1680 You may add a section Entitled "Endorsements", provided it contains
1681 nothing but endorsements of your Modified Version by various
1682 parties--for example, statements of peer review or that the text
1683 has been approved by an organization as the authoritative
1684 definition of a standard.
1686 You may add a passage of up to five words as a Front-Cover Text,
1687 and a passage of up to 25 words as a Back-Cover Text, to the end
1688 of the list of Cover Texts in the Modified Version. Only one
1689 passage of Front-Cover Text and one of Back-Cover Text may be
1690 added by (or through arrangements made by) any one entity. If the
1691 Document already includes a cover text for the same cover,
1692 previously added by you or by arrangement made by the same entity
1693 you are acting on behalf of, you may not add another; but you may
1694 replace the old one, on explicit permission from the previous
1695 publisher that added the old one.
1697 The author(s) and publisher(s) of the Document do not by this
1698 License give permission to use their names for publicity for or to
1699 assert or imply endorsement of any Modified Version.
1701 5. COMBINING DOCUMENTS
1703 You may combine the Document with other documents released under
1704 this License, under the terms defined in section 4 above for
1705 modified versions, provided that you include in the combination
1706 all of the Invariant Sections of all of the original documents,
1707 unmodified, and list them all as Invariant Sections of your
1708 combined work in its license notice, and that you preserve all
1709 their Warranty Disclaimers.
1711 The combined work need only contain one copy of this License, and
1712 multiple identical Invariant Sections may be replaced with a single
1713 copy. If there are multiple Invariant Sections with the same name
1714 but different contents, make the title of each such section unique
1715 by adding at the end of it, in parentheses, the name of the
1716 original author or publisher of that section if known, or else a
1717 unique number. Make the same adjustment to the section titles in
1718 the list of Invariant Sections in the license notice of the
1721 In the combination, you must combine any sections Entitled
1722 "History" in the various original documents, forming one section
1723 Entitled "History"; likewise combine any sections Entitled
1724 "Acknowledgements", and any sections Entitled "Dedications". You
1725 must delete all sections Entitled "Endorsements."
1727 6. COLLECTIONS OF DOCUMENTS
1729 You may make a collection consisting of the Document and other
1730 documents released under this License, and replace the individual
1731 copies of this License in the various documents with a single copy
1732 that is included in the collection, provided that you follow the
1733 rules of this License for verbatim copying of each of the
1734 documents in all other respects.
1736 You may extract a single document from such a collection, and
1737 distribute it individually under this License, provided you insert
1738 a copy of this License into the extracted document, and follow
1739 this License in all other respects regarding verbatim copying of
1742 7. AGGREGATION WITH INDEPENDENT WORKS
1744 A compilation of the Document or its derivatives with other
1745 separate and independent documents or works, in or on a volume of
1746 a storage or distribution medium, is called an "aggregate" if the
1747 copyright resulting from the compilation is not used to limit the
1748 legal rights of the compilation's users beyond what the individual
1749 works permit. When the Document is included in an aggregate, this
1750 License does not apply to the other works in the aggregate which
1751 are not themselves derivative works of the Document.
1753 If the Cover Text requirement of section 3 is applicable to these
1754 copies of the Document, then if the Document is less than one half
1755 of the entire aggregate, the Document's Cover Texts may be placed
1756 on covers that bracket the Document within the aggregate, or the
1757 electronic equivalent of covers if the Document is in electronic
1758 form. Otherwise they must appear on printed covers that bracket
1759 the whole aggregate.
1763 Translation is considered a kind of modification, so you may
1764 distribute translations of the Document under the terms of section
1765 4. Replacing Invariant Sections with translations requires special
1766 permission from their copyright holders, but you may include
1767 translations of some or all Invariant Sections in addition to the
1768 original versions of these Invariant Sections. You may include a
1769 translation of this License, and all the license notices in the
1770 Document, and any Warranty Disclaimers, provided that you also
1771 include the original English version of this License and the
1772 original versions of those notices and disclaimers. In case of a
1773 disagreement between the translation and the original version of
1774 this License or a notice or disclaimer, the original version will
1777 If a section in the Document is Entitled "Acknowledgements",
1778 "Dedications", or "History", the requirement (section 4) to
1779 Preserve its Title (section 1) will typically require changing the
1784 You may not copy, modify, sublicense, or distribute the Document
1785 except as expressly provided for under this License. Any other
1786 attempt to copy, modify, sublicense or distribute the Document is
1787 void, and will automatically terminate your rights under this
1788 License. However, parties who have received copies, or rights,
1789 from you under this License will not have their licenses
1790 terminated so long as such parties remain in full compliance.
1792 10. FUTURE REVISIONS OF THIS LICENSE
1794 The Free Software Foundation may publish new, revised versions of
1795 the GNU Free Documentation License from time to time. Such new
1796 versions will be similar in spirit to the present version, but may
1797 differ in detail to address new problems or concerns. See
1798 `http://www.gnu.org/copyleft/'.
1800 Each version of the License is given a distinguishing version
1801 number. If the Document specifies that a particular numbered
1802 version of this License "or any later version" applies to it, you
1803 have the option of following the terms and conditions either of
1804 that specified version or of any later version that has been
1805 published (not as a draft) by the Free Software Foundation. If
1806 the Document does not specify a version number of this License,
1807 you may choose any version ever published (not as a draft) by the
1808 Free Software Foundation.
1810 H.1 ADDENDUM: How to use this License for your documents
1811 ========================================================
1813 To use this License in a document you have written, include a copy of
1814 the License in the document and put the following copyright and license
1815 notices just after the title page:
1817 Copyright (C) YEAR YOUR NAME.
1818 Permission is granted to copy, distribute and/or modify this document
1819 under the terms of the GNU Free Documentation License, Version 1.2
1820 or any later version published by the Free Software Foundation;
1821 with no Invariant Sections, no Front-Cover Texts, and no Back-Cover
1822 Texts. A copy of the license is included in the section entitled ``GNU
1823 Free Documentation License''.
1825 If you have Invariant Sections, Front-Cover Texts and Back-Cover
1826 Texts, replace the "with...Texts." line with this:
1828 with the Invariant Sections being LIST THEIR TITLES, with
1829 the Front-Cover Texts being LIST, and with the Back-Cover Texts
1832 If you have Invariant Sections without Cover Texts, or some other
1833 combination of the three, merge those two alternatives to suit the
1836 If your document contains nontrivial examples of program code, we
1837 recommend releasing these examples in parallel under your choice of
1838 free software license, such as the GNU General Public License, to
1839 permit their use in free software.
1842 File: gdb.info, Node: Index, Prev: GNU Free Documentation License, Up: Top
1850 * ! packet: Packets. (line 26)
1851 * "No symbol "foo" in current context": Variables. (line 74)
1852 * # (a comment): Command Syntax. (line 38)
1853 * # in Modula-2: GDB/M2. (line 18)
1854 * $: Value History. (line 13)
1855 * $$: Value History. (line 13)
1856 * $_ and info breakpoints: Set Breaks. (line 112)
1857 * $_ and info line: Machine Code. (line 29)
1858 * $_, $__, and value history: Memory. (line 91)
1859 * $_, convenience variable: Convenience Vars. (line 64)
1860 * $__, convenience variable: Convenience Vars. (line 73)
1861 * $_exitcode, convenience variable: Convenience Vars. (line 79)
1862 * $bpnum, convenience variable: Set Breaks. (line 6)
1863 * $cdir, convenience variable: Source Path. (line 99)
1864 * $cwd, convenience variable: Source Path. (line 99)
1865 * $tpnum: Create and Delete Tracepoints.
1867 * $trace_file: Tracepoint Variables.
1869 * $trace_frame: Tracepoint Variables.
1871 * $trace_func: Tracepoint Variables.
1873 * $trace_line: Tracepoint Variables.
1875 * $tracepoint: Tracepoint Variables.
1877 * --annotate: Mode Options. (line 101)
1878 * --args: Mode Options. (line 114)
1879 * --batch: Mode Options. (line 23)
1880 * --batch-silent: Mode Options. (line 39)
1881 * --baud: Mode Options. (line 120)
1882 * --cd: Mode Options. (line 80)
1883 * --command: File Options. (line 51)
1884 * --core: File Options. (line 43)
1885 * --directory: File Options. (line 66)
1886 * --epoch: Mode Options. (line 96)
1887 * --eval-command: File Options. (line 56)
1888 * --exec: File Options. (line 35)
1889 * --fullname: Mode Options. (line 85)
1890 * --interpreter: Mode Options. (line 141)
1891 * --nowindows: Mode Options. (line 70)
1892 * --nx: Mode Options. (line 11)
1893 * --pid: File Options. (line 47)
1894 * --quiet: Mode Options. (line 19)
1895 * --readnow: File Options. (line 70)
1896 * --return-child-result: Mode Options. (line 51)
1897 * --se: File Options. (line 39)
1898 * --silent: Mode Options. (line 19)
1899 * --statistics: Mode Options. (line 158)
1900 * --symbols: File Options. (line 31)
1901 * --tty: Mode Options. (line 129)
1902 * --tui: Mode Options. (line 132)
1903 * --version: Mode Options. (line 162)
1904 * --windows: Mode Options. (line 76)
1905 * --with-sysroot: Files. (line 381)
1906 * --write: Mode Options. (line 153)
1907 * -b: Mode Options. (line 120)
1908 * -break-after: GDB/MI Breakpoint Commands.
1910 * -break-condition: GDB/MI Breakpoint Commands.
1912 * -break-delete: GDB/MI Breakpoint Commands.
1914 * -break-disable: GDB/MI Breakpoint Commands.
1916 * -break-enable: GDB/MI Breakpoint Commands.
1918 * -break-info: GDB/MI Breakpoint Commands.
1920 * -break-insert: GDB/MI Breakpoint Commands.
1922 * -break-list: GDB/MI Breakpoint Commands.
1924 * -break-watch: GDB/MI Breakpoint Commands.
1926 * -c: File Options. (line 43)
1927 * -d: File Options. (line 66)
1928 * -data-disassemble: GDB/MI Data Manipulation.
1930 * -data-evaluate-expression: GDB/MI Data Manipulation.
1932 * -data-list-changed-registers: GDB/MI Data Manipulation.
1934 * -data-list-register-names: GDB/MI Data Manipulation.
1936 * -data-list-register-values: GDB/MI Data Manipulation.
1938 * -data-read-memory: GDB/MI Data Manipulation.
1940 * -e: File Options. (line 35)
1941 * -enable-timings: GDB/MI Miscellaneous Commands.
1943 * -environment-cd: GDB/MI Program Context.
1945 * -environment-directory: GDB/MI Program Context.
1947 * -environment-path: GDB/MI Program Context.
1949 * -environment-pwd: GDB/MI Program Context.
1951 * -ex: File Options. (line 56)
1952 * -exec-abort: GDB/MI Miscellaneous Commands.
1954 * -exec-arguments: GDB/MI Program Context.
1956 * -exec-continue: GDB/MI Program Execution.
1958 * -exec-finish: GDB/MI Program Execution.
1960 * -exec-interrupt: GDB/MI Program Execution.
1962 * -exec-next: GDB/MI Program Execution.
1964 * -exec-next-instruction: GDB/MI Program Execution.
1966 * -exec-return: GDB/MI Program Execution.
1968 * -exec-run: GDB/MI Program Execution.
1970 * -exec-show-arguments: GDB/MI Program Context.
1972 * -exec-step: GDB/MI Program Execution.
1974 * -exec-step-instruction: GDB/MI Program Execution.
1976 * -exec-until: GDB/MI Program Execution.
1978 * -f: Mode Options. (line 85)
1979 * -file-exec-and-symbols: GDB/MI File Commands.
1981 * -file-exec-file: GDB/MI File Commands.
1983 * -file-list-exec-sections: GDB/MI File Commands.
1985 * -file-list-exec-source-file: GDB/MI File Commands.
1987 * -file-list-exec-source-files: GDB/MI File Commands.
1989 * -file-list-shared-libraries: GDB/MI File Commands.
1991 * -file-list-symbol-files: GDB/MI File Commands.
1993 * -file-symbol-file: GDB/MI File Commands.
1995 * -gdb-exit: GDB/MI Miscellaneous Commands.
1997 * -gdb-set: GDB/MI Miscellaneous Commands.
1999 * -gdb-show: GDB/MI Miscellaneous Commands.
2001 * -gdb-version: GDB/MI Miscellaneous Commands.
2003 * -inferior-tty-set: GDB/MI Miscellaneous Commands.
2005 * -inferior-tty-show: GDB/MI Miscellaneous Commands.
2007 * -interpreter-exec: GDB/MI Miscellaneous Commands.
2009 * -l: Mode Options. (line 124)
2010 * -list-features: GDB/MI Miscellaneous Commands.
2012 * -n: Mode Options. (line 11)
2013 * -nw: Mode Options. (line 70)
2014 * -p: File Options. (line 47)
2015 * -q: Mode Options. (line 19)
2016 * -r: File Options. (line 70)
2017 * -s: File Options. (line 31)
2018 * -stack-info-depth: GDB/MI Stack Manipulation.
2020 * -stack-info-frame: GDB/MI Stack Manipulation.
2022 * -stack-list-arguments: GDB/MI Stack Manipulation.
2024 * -stack-list-frames: GDB/MI Stack Manipulation.
2026 * -stack-list-locals: GDB/MI Stack Manipulation.
2028 * -stack-select-frame: GDB/MI Stack Manipulation.
2030 * -symbol-info-address: GDB/MI Symbol Query. (line 9)
2031 * -symbol-info-file: GDB/MI Symbol Query. (line 29)
2032 * -symbol-info-function: GDB/MI Symbol Query. (line 49)
2033 * -symbol-info-line: GDB/MI Symbol Query. (line 69)
2034 * -symbol-info-symbol: GDB/MI Symbol Query. (line 90)
2035 * -symbol-list-functions: GDB/MI Symbol Query. (line 110)
2036 * -symbol-list-lines: GDB/MI Symbol Query. (line 130)
2037 * -symbol-list-types: GDB/MI Symbol Query. (line 155)
2038 * -symbol-list-variables: GDB/MI Symbol Query. (line 176)
2039 * -symbol-locate: GDB/MI Symbol Query. (line 196)
2040 * -symbol-type: GDB/MI Symbol Query. (line 214)
2041 * -t: Mode Options. (line 129)
2042 * -target-attach: GDB/MI Target Manipulation.
2044 * -target-compare-sections: GDB/MI Target Manipulation.
2046 * -target-detach: GDB/MI Target Manipulation.
2048 * -target-disconnect: GDB/MI Target Manipulation.
2050 * -target-download: GDB/MI Target Manipulation.
2052 * -target-exec-status: GDB/MI Target Manipulation.
2054 * -target-file-delete: GDB/MI File Transfer Commands.
2056 * -target-file-get: GDB/MI File Transfer Commands.
2058 * -target-file-put: GDB/MI File Transfer Commands.
2060 * -target-list-available-targets: GDB/MI Target Manipulation.
2062 * -target-list-current-targets: GDB/MI Target Manipulation.
2064 * -target-list-parameters: GDB/MI Target Manipulation.
2066 * -target-select: GDB/MI Target Manipulation.
2068 * -thread-info: GDB/MI Thread Commands.
2070 * -thread-list-all-threads: GDB/MI Thread Commands.
2072 * -thread-list-ids: GDB/MI Thread Commands.
2074 * -thread-select: GDB/MI Thread Commands.
2076 * -var-assign: GDB/MI Variable Objects.
2078 * -var-create: GDB/MI Variable Objects.
2080 * -var-delete: GDB/MI Variable Objects.
2082 * -var-evaluate-expression: GDB/MI Variable Objects.
2084 * -var-info-expression: GDB/MI Variable Objects.
2086 * -var-info-num-children: GDB/MI Variable Objects.
2088 * -var-info-path-expression: GDB/MI Variable Objects.
2090 * -var-info-type: GDB/MI Variable Objects.
2092 * -var-list-children: GDB/MI Variable Objects.
2094 * -var-set-format: GDB/MI Variable Objects.
2096 * -var-set-frozen: GDB/MI Variable Objects.
2098 * -var-show-attributes: GDB/MI Variable Objects.
2100 * -var-show-format: GDB/MI Variable Objects.
2102 * -var-update: GDB/MI Variable Objects.
2104 * -w: Mode Options. (line 76)
2105 * -x: File Options. (line 51)
2106 * ., Modula-2 scope operator: M2 Scope. (line 6)
2107 * .build-id directory: Separate Debug Files.
2109 * .debug subdirectories: Separate Debug Files.
2111 * .gdbinit: Startup. (line 37)
2112 * .gnu_debuglink sections: Separate Debug Files.
2114 * .note.gnu.build-id sections: Separate Debug Files.
2116 * .o files, reading symbols from: Files. (line 132)
2117 * /proc: SVR4 Process Information.
2119 * <architecture>: Target Description Format.
2121 * <feature>: Target Description Format.
2123 * <reg>: Target Description Format.
2125 * <union>: Target Description Format.
2127 * <vector>: Target Description Format.
2129 * ? packet: Packets. (line 35)
2130 * @, referencing memory as an array: Arrays. (line 6)
2131 * ^connected: GDB/MI Result Records.
2133 * ^done: GDB/MI Result Records.
2135 * ^error: GDB/MI Result Records.
2137 * ^exit: GDB/MI Result Records.
2139 * ^running: GDB/MI Result Records.
2141 * _NSPrintForDebugger, and printing Objective-C objects: The Print Command with Objective-C.
2143 * A packet: Packets. (line 41)
2144 * abbreviation: Command Syntax. (line 13)
2145 * abort (C-g): Miscellaneous Commands.
2147 * accept-line (Newline or Return): Commands For History.
2149 * acknowledgment, for GDB remote: Overview. (line 33)
2150 * actions: Tracepoint Actions. (line 6)
2151 * active targets: Active Targets. (line 6)
2152 * Ada: Ada. (line 6)
2153 * Ada exception catching: Set Catchpoints. (line 19)
2154 * Ada mode, general: Ada Mode Intro. (line 6)
2155 * Ada, deviations from: Additions to Ada. (line 6)
2156 * Ada, omissions from: Omissions from Ada. (line 6)
2157 * Ada, problems: Ada Glitches. (line 6)
2158 * adbg_find_memory_in_frame: Tracing on Symmetrix.
2160 * add new commands for external monitor: Connecting. (line 104)
2161 * add-shared-symbol-files: Files. (line 172)
2162 * add-symbol-file: Files. (line 113)
2163 * add-symbol-file-from-memory: Files. (line 162)
2164 * address of a symbol: Symbols. (line 44)
2165 * address size for remote targets: Remote Configuration.
2167 * ADP (Angel Debugger Protocol) logging: ARM. (line 70)
2168 * advance LOCATION: Continuing and Stepping.
2170 * aggregates (Ada): Omissions from Ada. (line 44)
2171 * AIX threads: Debugging Output. (line 28)
2172 * alignment of remote memory accesses: Packets. (line 172)
2173 * Alpha stack: MIPS. (line 6)
2174 * AMD 29K register stack: A29K. (line 6)
2175 * annotations: Annotations Overview.
2177 * annotations for errors, warnings and interrupts: Errors. (line 6)
2178 * annotations for invalidation messages: Invalidation. (line 6)
2179 * annotations for prompts: Prompting. (line 6)
2180 * annotations for running programs: Annotations for Running.
2182 * annotations for source display: Source Annotations. (line 6)
2183 * append: Dump/Restore Files. (line 35)
2184 * append data to a file: Dump/Restore Files. (line 6)
2185 * apply command to several threads: Threads. (line 146)
2186 * apropos: Help. (line 62)
2187 * architecture debugging info: Debugging Output. (line 18)
2188 * argument count in user-defined commands: Define. (line 25)
2189 * arguments (to your program): Arguments. (line 6)
2190 * arguments, to gdbserver: Server. (line 34)
2191 * arguments, to user-defined commands: Define. (line 6)
2192 * ARM 32-bit mode: ARM. (line 25)
2193 * ARM RDI: ARM. (line 6)
2194 * array aggregates (Ada): Omissions from Ada. (line 44)
2195 * arrays: Arrays. (line 6)
2196 * arrays in expressions: Expressions. (line 14)
2197 * artificial array: Arrays. (line 6)
2198 * ASCII character set: Character Sets. (line 65)
2199 * assembly instructions: Machine Code. (line 35)
2200 * assf: Files. (line 172)
2201 * assignment: Assignment. (line 6)
2202 * async output in GDB/MI: GDB/MI Output Syntax.
2204 * AT&T disassembly flavor: Machine Code. (line 67)
2205 * attach: Attach. (line 6)
2206 * attach to a program by name: Server. (line 79)
2207 * automatic display: Auto Display. (line 6)
2208 * automatic hardware breakpoints: Set Breaks. (line 269)
2209 * automatic overlay debugging: Automatic Overlay Debugging.
2211 * automatic thread selection: Threads. (line 169)
2212 * auxiliary vector: OS Information. (line 21)
2213 * AVR: AVR. (line 6)
2214 * awatch: Set Watchpoints. (line 51)
2215 * b (break): Set Breaks. (line 6)
2216 * B packet: Packets. (line 68)
2217 * b packet: Packets. (line 53)
2218 * backtrace: Backtrace. (line 11)
2219 * backtrace beyond main function: Backtrace. (line 87)
2220 * backtrace limit: Backtrace. (line 123)
2221 * backward-char (C-b): Commands For Moving. (line 15)
2222 * backward-delete-char (Rubout): Commands For Text. (line 11)
2223 * backward-kill-line (C-x Rubout): Commands For Killing.
2225 * backward-kill-word (M-<DEL>): Commands For Killing.
2227 * backward-word (M-b): Commands For Moving. (line 22)
2228 * baud rate for remote targets: Remote Configuration.
2230 * bcache statistics: Maintenance Commands.
2232 * beginning-of-history (M-<): Commands For History.
2234 * beginning-of-line (C-a): Commands For Moving. (line 6)
2235 * bell-style: Readline Init File Syntax.
2237 * bind-tty-special-chars: Readline Init File Syntax.
2239 * bits in remote address: Remote Configuration.
2241 * bookmark: Checkpoint/Restart. (line 6)
2242 * break: Set Breaks. (line 6)
2243 * break ... thread THREADNO: Thread Stops. (line 10)
2244 * break in overloaded functions: Debugging C Plus Plus.
2246 * break on fork/exec: Set Catchpoints. (line 33)
2247 * break on load/unload of shared library: Set Catchpoints. (line 46)
2248 * BREAK signal instead of Ctrl-C: Remote Configuration.
2250 * break, and Objective-C: Method Names in Commands.
2252 * breakpoint address adjusted: Breakpoint-related Warnings.
2254 * breakpoint annotation: Annotations for Running.
2256 * breakpoint commands: Break Commands. (line 6)
2257 * breakpoint commands for GDB/MI: GDB/MI Breakpoint Commands.
2259 * breakpoint conditions: Conditions. (line 6)
2260 * breakpoint numbers: Breakpoints. (line 41)
2261 * breakpoint on events: Breakpoints. (line 33)
2262 * breakpoint on memory address: Breakpoints. (line 20)
2263 * breakpoint on variable modification: Breakpoints. (line 20)
2264 * breakpoint ranges: Breakpoints. (line 48)
2265 * breakpoint subroutine, remote: Stub Contents. (line 31)
2266 * breakpointing Ada elaboration code: Stopping Before Main Program.
2268 * breakpoints: Breakpoints. (line 6)
2269 * breakpoints and threads: Thread Stops. (line 10)
2270 * breakpoints in functions matching a regexp: Set Breaks. (line 87)
2271 * breakpoints in overlays: Overlay Commands. (line 93)
2272 * breakpoints-invalid annotation: Invalidation. (line 13)
2273 * bt (backtrace): Backtrace. (line 11)
2274 * bug criteria: Bug Criteria. (line 6)
2275 * bug reports: Bug Reporting. (line 6)
2276 * bugs in GDB: GDB Bugs. (line 6)
2277 * build ID sections: Separate Debug Files.
2279 * build ID, and separate debugging files: Separate Debug Files.
2281 * building GDB, requirements for: Requirements. (line 6)
2282 * built-in simulator target: Target Commands. (line 73)
2283 * c (continue): Continuing and Stepping.
2285 * c (SingleKey TUI key): TUI Single Key Mode. (line 10)
2286 * C and C++: C. (line 6)
2287 * C and C++ checks: C Checks. (line 6)
2288 * C and C++ constants: C Constants. (line 6)
2289 * C and C++ defaults: C Defaults. (line 6)
2290 * C and C++ operators: C Operators. (line 6)
2291 * C packet: Packets. (line 80)
2292 * c packet: Packets. (line 74)
2294 * C++ compilers: C Plus Plus Expressions.
2296 * C++ exception handling: Debugging C Plus Plus.
2298 * C++ overload debugging info: Debugging Output. (line 80)
2299 * C++ scope resolution: Variables. (line 54)
2300 * C++ symbol decoding style: Print Settings. (line 294)
2301 * C++ symbol display: Debugging C Plus Plus.
2303 * C-L: TUI Keys. (line 65)
2304 * C-x 1: TUI Keys. (line 19)
2305 * C-x 2: TUI Keys. (line 26)
2306 * C-x A: TUI Keys. (line 12)
2307 * C-x a: TUI Keys. (line 11)
2308 * C-x C-a: TUI Keys. (line 10)
2309 * C-x o: TUI Keys. (line 34)
2310 * C-x s: TUI Keys. (line 41)
2311 * caching data of remote targets: Caching Remote Data. (line 6)
2312 * call: Calling. (line 10)
2313 * call dummy stack unwinding: Calling. (line 26)
2314 * call overloaded functions: C Plus Plus Expressions.
2316 * call stack: Stack. (line 9)
2317 * call stack traces: Backtrace. (line 6)
2318 * call-last-kbd-macro (C-x e): Keyboard Macros. (line 13)
2319 * calling functions: Calling. (line 6)
2320 * calling make: Shell Commands. (line 19)
2321 * capitalize-word (M-c): Commands For Text. (line 49)
2322 * case sensitivity in symbol names: Symbols. (line 27)
2323 * case-insensitive symbol names: Symbols. (line 27)
2324 * casts, in expressions: Expressions. (line 27)
2325 * casts, to view memory: Expressions. (line 42)
2326 * catch: Set Catchpoints. (line 10)
2327 * catch Ada exceptions: Set Catchpoints. (line 19)
2328 * catch exceptions, list active handlers: Frame Info. (line 60)
2329 * catchpoints: Breakpoints. (line 33)
2330 * catchpoints, setting: Set Catchpoints. (line 6)
2331 * cd: Working Directory. (line 16)
2332 * cdir: Source Path. (line 99)
2333 * Cell Broadband Engine: SPU. (line 6)
2334 * change working directory: Working Directory. (line 16)
2335 * character sets: Character Sets. (line 6)
2336 * character-search (C-]): Miscellaneous Commands.
2338 * character-search-backward (M-C-]): Miscellaneous Commands.
2340 * charset: Character Sets. (line 6)
2341 * checkpoint: Checkpoint/Restart. (line 6)
2342 * checkpoints and process id: Checkpoint/Restart. (line 80)
2343 * checks, range: Type Checking. (line 65)
2344 * checks, type: Checks. (line 31)
2345 * checksum, for GDB remote: Overview. (line 20)
2346 * choosing target byte order: Byte Order. (line 6)
2347 * clear: Delete Breaks. (line 21)
2348 * clear, and Objective-C: Method Names in Commands.
2350 * clear-screen (C-l): Commands For Moving. (line 26)
2351 * clearing breakpoints, watchpoints, catchpoints: Delete Breaks.
2353 * close, file-i/o system call: close. (line 6)
2354 * closest symbol and offset for an address: Symbols. (line 54)
2355 * code address and its source line: Machine Code. (line 24)
2356 * collect (tracepoints): Tracepoint Actions. (line 45)
2357 * collected data discarded: Starting and Stopping Trace Experiments.
2359 * colon, doubled as scope operator: M2 Scope. (line 6)
2360 * colon-colon, context for variables/functions: Variables. (line 44)
2361 * colon-colon, in Modula-2: M2 Scope. (line 6)
2362 * command editing: Readline Bare Essentials.
2364 * command files: Command Files. (line 6)
2365 * command history: Command History. (line 6)
2366 * command hooks: Hooks. (line 6)
2367 * command interpreters: Interpreters. (line 6)
2368 * command line editing: Editing. (line 6)
2369 * command scripts, debugging: Messages/Warnings. (line 65)
2370 * command tracing: Messages/Warnings. (line 60)
2371 * commands: Break Commands. (line 11)
2372 * commands annotation: Prompting. (line 27)
2373 * commands for C++: Debugging C Plus Plus.
2375 * comment: Command Syntax. (line 38)
2376 * comment-begin: Readline Init File Syntax.
2378 * COMMON blocks, Fortran: Special Fortran Commands.
2380 * common targets: Target Commands. (line 46)
2381 * compare-sections: Memory. (line 111)
2382 * compatibility, GDB/MI and CLI: GDB/MI Compatibility with CLI.
2384 * compilation directory: Source Path. (line 99)
2385 * compiling, on Sparclet: Sparclet. (line 16)
2386 * complete: Help. (line 76)
2387 * complete (<TAB>): Commands For Completion.
2389 * completion: Completion. (line 6)
2390 * completion of quoted strings: Completion. (line 57)
2391 * completion-query-items: Readline Init File Syntax.
2393 * condition: Conditions. (line 45)
2394 * conditional breakpoints: Conditions. (line 6)
2395 * configuring GDB: Running Configure. (line 6)
2396 * confirmation: Messages/Warnings. (line 50)
2397 * console i/o as part of file-i/o: Console I/O. (line 6)
2398 * console interpreter: Interpreters. (line 21)
2399 * console output in GDB/MI: GDB/MI Output Syntax.
2401 * constants, in file-i/o protocol: Constants. (line 6)
2402 * continue: Continuing and Stepping.
2404 * continuing: Continuing and Stepping.
2406 * continuing threads: Thread Stops. (line 70)
2407 * control C, and remote debugging: Bootstrapping. (line 25)
2408 * controlling terminal: Input/Output. (line 23)
2409 * convenience variables: Convenience Vars. (line 6)
2410 * convenience variables for tracepoints: Tracepoint Variables.
2412 * convenience variables, initializing: Convenience Vars. (line 41)
2413 * convert-meta: Readline Init File Syntax.
2415 * copy-backward-word (): Commands For Killing.
2417 * copy-forward-word (): Commands For Killing.
2419 * copy-region-as-kill (): Commands For Killing.
2421 * core dump file: Files. (line 6)
2422 * core dump file target: Target Commands. (line 54)
2423 * core-file: Files. (line 97)
2424 * crash of debugger: Bug Criteria. (line 9)
2425 * CRC of memory block, remote request: General Query Packets.
2427 * CRIS: CRIS. (line 6)
2428 * CRIS mode: CRIS. (line 26)
2429 * CRIS version: CRIS. (line 10)
2430 * ctrl-c message, in file-i/o protocol: The Ctrl-C Message. (line 6)
2431 * Ctrl-o (operate-and-get-next): Command Syntax. (line 42)
2432 * current directory: Source Path. (line 99)
2433 * current stack frame: Frames. (line 45)
2434 * current thread: Threads. (line 41)
2435 * current thread, remote request: General Query Packets.
2437 * cwd: Source Path. (line 99)
2438 * Cygwin DLL, debugging: Cygwin Native. (line 30)
2439 * Cygwin-specific commands: Cygwin Native. (line 6)
2440 * d (delete): Delete Breaks. (line 41)
2441 * d (SingleKey TUI key): TUI Single Key Mode. (line 13)
2442 * D packet: Packets. (line 92)
2443 * d packet: Packets. (line 86)
2444 * data breakpoints: Breakpoints. (line 20)
2445 * data manipulation, in GDB/MI: GDB/MI Data Manipulation.
2447 * dead names, GNU Hurd: Hurd Native. (line 85)
2448 * debug formats and C++: C Plus Plus Expressions.
2450 * debug link sections: Separate Debug Files.
2452 * debug remote protocol: Debugging Output. (line 86)
2453 * debug_chaos: M32R/D. (line 50)
2454 * debugger crash: Bug Criteria. (line 9)
2455 * debugging C++ programs: C Plus Plus Expressions.
2457 * debugging information directory, global: Separate Debug Files.
2459 * debugging information in separate files: Separate Debug Files.
2461 * debugging multiple processes: Processes. (line 52)
2462 * debugging multithreaded programs (on HP-UX): Threads. (line 85)
2463 * debugging optimized code: Compilation. (line 26)
2464 * debugging stub, example: Remote Stub. (line 6)
2465 * debugging target: Targets. (line 6)
2466 * debugging the Cygwin DLL: Cygwin Native. (line 30)
2467 * decimal floating point format: Decimal Floating Point.
2469 * default system root: Files. (line 381)
2470 * define: Define. (line 37)
2471 * defining macros interactively: Macros. (line 54)
2472 * definition, showing a macro's: Macros. (line 50)
2473 * delete: Delete Breaks. (line 41)
2474 * delete breakpoints: Delete Breaks. (line 41)
2475 * delete checkpoint CHECKPOINT-ID: Checkpoint/Restart. (line 56)
2476 * delete display: Auto Display. (line 45)
2477 * delete fork FORK-ID: Processes. (line 105)
2478 * delete mem: Memory Region Attributes.
2480 * delete tracepoint: Create and Delete Tracepoints.
2482 * delete-char (C-d): Commands For Text. (line 6)
2483 * delete-char-or-list (): Commands For Completion.
2485 * delete-horizontal-space (): Commands For Killing.
2487 * deleting breakpoints, watchpoints, catchpoints: Delete Breaks.
2489 * deliver a signal to a program: Signaling. (line 6)
2490 * demangling C++ names: Print Settings. (line 275)
2491 * deprecated commands: Maintenance Commands.
2493 * derived type of an object, printing: Print Settings. (line 327)
2494 * descriptor tables display: DJGPP Native. (line 24)
2495 * detach: Attach. (line 36)
2496 * detach (remote): Connecting. (line 90)
2497 * detach fork FORK-ID: Processes. (line 100)
2498 * detach from task, GNU Hurd: Hurd Native. (line 60)
2499 * detach from thread, GNU Hurd: Hurd Native. (line 110)
2500 * digit-argument (M-0, M-1, ... M--): Numeric Arguments. (line 6)
2501 * dir: Source Path. (line 39)
2502 * direct memory access (DMA) on MS-DOS: DJGPP Native. (line 75)
2503 * directories for source files: Source Path. (line 6)
2504 * directory: Source Path. (line 39)
2505 * directory, compilation: Source Path. (line 99)
2506 * directory, current: Source Path. (line 99)
2507 * dis (disable): Disabling. (line 38)
2508 * disable: Disabling. (line 38)
2509 * disable display: Auto Display. (line 52)
2510 * disable mem: Memory Region Attributes.
2512 * disable tracepoint: Enable and Disable Tracepoints.
2514 * disable-completion: Readline Init File Syntax.
2516 * disassemble: Machine Code. (line 35)
2517 * disconnect: Connecting. (line 97)
2518 * display: Auto Display. (line 23)
2519 * display command history: Command History. (line 78)
2520 * display derived types: Print Settings. (line 327)
2521 * display disabled out of scope: Auto Display. (line 74)
2522 * display GDB copyright: Help. (line 136)
2523 * display of expressions: Auto Display. (line 6)
2524 * display remote monitor communications: Target Commands. (line 108)
2525 * display remote packets: Debugging Output. (line 86)
2526 * DJGPP debugging: DJGPP Native. (line 6)
2527 * dll-symbols: Cygwin Native. (line 26)
2528 * DLLs with no debugging symbols: Non-debug DLL Symbols.
2530 * do (down): Selection. (line 40)
2531 * do not print frame argument values: Print Settings. (line 135)
2532 * do-uppercase-version (M-a, M-b, M-X, ...): Miscellaneous Commands.
2534 * document: Define. (line 46)
2535 * documentation: Formatting Documentation.
2537 * don't repeat command: Define. (line 58)
2538 * dont-repeat: Define. (line 58)
2539 * DOS serial data link, remote debugging: DJGPP Native. (line 121)
2540 * DOS serial port status: DJGPP Native. (line 142)
2541 * Down: TUI Keys. (line 56)
2542 * down: Selection. (line 40)
2543 * down-silently: Selection. (line 64)
2544 * downcase-word (M-l): Commands For Text. (line 45)
2545 * download server address (M32R): M32R/D. (line 27)
2546 * download to Sparclet: Sparclet Download. (line 6)
2547 * download to VxWorks: VxWorks Download. (line 6)
2548 * DPMI: DJGPP Native. (line 6)
2549 * dump: Dump/Restore Files. (line 13)
2550 * dump all data collected at tracepoint: tdump. (line 6)
2551 * dump core from inferior: Core File Generation.
2553 * dump data to a file: Dump/Restore Files. (line 6)
2554 * dump-functions (): Miscellaneous Commands.
2556 * dump-macros (): Miscellaneous Commands.
2558 * dump-variables (): Miscellaneous Commands.
2560 * dump/restore files: Dump/Restore Files. (line 6)
2561 * DWARF 2 compilation units cache: Maintenance Commands.
2563 * DWARF-2 CFI and CRIS: CRIS. (line 18)
2564 * dynamic linking: Files. (line 113)
2565 * e (edit): Edit. (line 6)
2566 * EBCDIC character set: Character Sets. (line 74)
2567 * echo: Output. (line 12)
2568 * edit: Edit. (line 6)
2569 * editing: Editing. (line 15)
2570 * editing command lines: Readline Bare Essentials.
2572 * editing source files: Edit. (line 6)
2573 * editing-mode: Readline Init File Syntax.
2575 * eight-bit characters in strings: Print Settings. (line 220)
2576 * elaboration phase: Starting. (line 82)
2577 * else: Command Files. (line 56)
2578 * Emacs: Emacs. (line 6)
2579 * empty response, for unsupported packets: Overview. (line 90)
2580 * enable: Disabling. (line 45)
2581 * enable display: Auto Display. (line 57)
2582 * enable mem: Memory Region Attributes.
2584 * enable tracepoint: Enable and Disable Tracepoints.
2586 * enable-keypad: Readline Init File Syntax.
2588 * enable/disable a breakpoint: Disabling. (line 6)
2589 * end (breakpoint commands): Break Commands. (line 11)
2590 * end (if/else/while commands): Command Files. (line 85)
2591 * end (user-defined commands): Define. (line 46)
2592 * end-kbd-macro (C-x )): Keyboard Macros. (line 9)
2593 * end-of-history (M->): Commands For History.
2595 * end-of-line (C-e): Commands For Moving. (line 9)
2596 * entering numbers: Numbers. (line 6)
2597 * environment (of your program): Environment. (line 6)
2598 * errno values, in file-i/o protocol: Errno Values. (line 6)
2599 * error annotation: Errors. (line 10)
2600 * error on valid input: Bug Criteria. (line 12)
2601 * error-begin annotation: Errors. (line 22)
2602 * event debugging info: Debugging Output. (line 35)
2603 * event designators: Event Designators. (line 6)
2604 * event handling: Set Catchpoints. (line 6)
2605 * examine process image: SVR4 Process Information.
2607 * examining data: Data. (line 6)
2608 * examining memory: Memory. (line 9)
2609 * exception handlers: Set Catchpoints. (line 6)
2610 * exception handlers, how to list: Frame Info. (line 60)
2611 * exceptionHandler: Bootstrapping. (line 38)
2612 * exchange-point-and-mark (C-x C-x): Miscellaneous Commands.
2614 * exec-file: Files. (line 39)
2615 * executable file: Files. (line 16)
2616 * executable file target: Target Commands. (line 50)
2617 * executable file, for remote target: Remote Configuration.
2619 * execute commands from a file: Command Files. (line 14)
2620 * execute remote command, remote request: General Query Packets.
2622 * exited annotation: Annotations for Running.
2624 * exiting GDB: Quitting GDB. (line 6)
2625 * expand macro once: Macros. (line 41)
2626 * expand-tilde: Readline Init File Syntax.
2628 * expanding preprocessor macros: Macros. (line 32)
2629 * expression debugging info: Debugging Output. (line 42)
2630 * expressions: Expressions. (line 6)
2631 * expressions in Ada: Ada. (line 11)
2632 * expressions in C or C++: C. (line 6)
2633 * expressions in C++: C Plus Plus Expressions.
2635 * expressions in Modula-2: Modula-2. (line 12)
2636 * extend GDB for remote targets: Connecting. (line 104)
2637 * f (frame): Selection. (line 11)
2638 * f (SingleKey TUI key): TUI Single Key Mode. (line 16)
2639 * F packet: Packets. (line 103)
2640 * F reply packet: The F Reply Packet. (line 6)
2641 * F request packet: The F Request Packet.
2643 * fatal signal: Bug Criteria. (line 9)
2644 * fatal signals: Signals. (line 15)
2645 * FDL, GNU Free Documentation License: GNU Free Documentation License.
2647 * features of the remote protocol: General Query Packets.
2649 * fg (resume foreground execution): Continuing and Stepping.
2651 * file: Files. (line 16)
2652 * file transfer: File Transfer. (line 6)
2653 * file transfer, remote protocol: Host I/O Packets. (line 6)
2654 * file-i/o examples: File-I/O Examples. (line 6)
2655 * file-i/o overview: File-I/O Overview. (line 6)
2656 * File-I/O remote protocol extension: File-I/O Remote Protocol Extension.
2658 * file-i/o reply packet: The F Reply Packet. (line 6)
2659 * file-i/o request packet: The F Request Packet.
2661 * find downloadable SREC files (M32R): M32R/D. (line 15)
2662 * find trace snapshot: tfind. (line 6)
2663 * finish: Continuing and Stepping.
2665 * flinching: Messages/Warnings. (line 50)
2666 * float promotion: ABI. (line 29)
2667 * floating point: Floating Point Hardware.
2669 * floating point registers: Registers. (line 15)
2670 * floating point, MIPS remote: MIPS Embedded. (line 60)
2671 * flush_i_cache: Bootstrapping. (line 60)
2672 * flushregs: Maintenance Commands.
2674 * focus: TUI Commands. (line 34)
2675 * focus of debugging: Threads. (line 41)
2676 * foo: Symbol Errors. (line 50)
2677 * fork FORK-ID: Processes. (line 85)
2678 * fork, debugging programs which call: Processes. (line 6)
2679 * format options: Print Settings. (line 6)
2680 * formatted output: Output Formats. (line 6)
2681 * Fortran: Summary. (line 35)
2682 * Fortran Defaults: Fortran Defaults. (line 6)
2683 * Fortran operators and expressions: Fortran Operators. (line 6)
2684 * Fortran-specific support in GDB: Fortran. (line 6)
2685 * forward-backward-delete-char (): Commands For Text. (line 15)
2686 * forward-char (C-f): Commands For Moving. (line 12)
2687 * forward-search: Search. (line 9)
2688 * forward-search-history (C-s): Commands For History.
2690 * forward-word (M-f): Commands For Moving. (line 18)
2691 * FR-V shared-library debugging: Debugging Output. (line 104)
2692 * frame debugging info: Debugging Output. (line 50)
2693 * frame number: Frames. (line 28)
2694 * frame pointer: Frames. (line 21)
2695 * frame pointer register: Registers. (line 26)
2696 * frame, command: Frames. (line 45)
2697 * frame, definition: Frames. (line 6)
2698 * frame, selecting: Selection. (line 11)
2699 * frameless execution: Frames. (line 34)
2700 * frames-invalid annotation: Invalidation. (line 9)
2701 * free memory information (MS-DOS): DJGPP Native. (line 19)
2702 * fstat, file-i/o system call: stat/fstat. (line 6)
2703 * Fujitsu: Remote Stub. (line 69)
2704 * full symbol tables, listing GDB's internal: Symbols. (line 270)
2705 * function call arguments, optimized out: Backtrace. (line 65)
2706 * function entry/exit, wrong values of variables: Variables. (line 58)
2707 * functions without line info, and stepping: Continuing and Stepping.
2709 * G packet: Packets. (line 124)
2710 * g packet: Packets. (line 108)
2711 * g++, GNU C++ compiler: C. (line 10)
2712 * garbled pointers: DJGPP Native. (line 42)
2713 * GCC and C++: C Plus Plus Expressions.
2715 * gcore: Core File Generation.
2717 * GDB bugs, reporting: Bug Reporting. (line 6)
2718 * GDB reference card: Formatting Documentation.
2720 * GDB startup: Startup. (line 6)
2721 * GDB version number: Help. (line 126)
2722 * gdb.ini: Startup. (line 37)
2723 * GDB/MI development: GDB/MI Development and Front Ends.
2725 * GDB/MI, breakpoint commands: GDB/MI Breakpoint Commands.
2727 * GDB/MI, compatibility with CLI: GDB/MI Compatibility with CLI.
2729 * GDB/MI, data manipulation: GDB/MI Data Manipulation.
2731 * GDB/MI, input syntax: GDB/MI Input Syntax. (line 6)
2732 * GDB/MI, its purpose: GDB/MI. (line 9)
2733 * GDB/MI, out-of-band records: GDB/MI Out-of-band Records.
2735 * GDB/MI, output syntax: GDB/MI Output Syntax.
2737 * GDB/MI, result records: GDB/MI Result Records.
2739 * GDB/MI, simple examples: GDB/MI Simple Examples.
2741 * GDB/MI, stream records: GDB/MI Stream Records.
2743 * gdbarch debugging info: Debugging Output. (line 18)
2744 * GDBHISTFILE, environment variable: Command History. (line 26)
2745 * gdbserver: Server. (line 6)
2746 * gdbserver, multiple processes: Server. (line 91)
2747 * GDT: DJGPP Native. (line 24)
2748 * generate-core-file: Core File Generation.
2750 * get thread-local storage address, remote request: General Query Packets.
2752 * getDebugChar: Bootstrapping. (line 14)
2753 * gettimeofday, file-i/o system call: gettimeofday. (line 6)
2754 * global debugging information directory: Separate Debug Files.
2756 * GNU C++: C. (line 10)
2757 * GNU Emacs: Emacs. (line 6)
2758 * GNU Hurd debugging: Hurd Native. (line 6)
2759 * GNU/Linux LWP debug messages: Debugging Output. (line 66)
2760 * gnu_debuglink_crc32: Separate Debug Files.
2762 * h (help): Help. (line 9)
2763 * H packet: Packets. (line 135)
2764 * handle: Signals. (line 45)
2765 * handle_exception: Stub Contents. (line 15)
2766 * handling signals: Signals. (line 27)
2767 * hardware breakpoints: Set Breaks. (line 57)
2768 * hardware watchpoints: Set Watchpoints. (line 22)
2769 * hash mark while downloading: Target Commands. (line 99)
2770 * hbreak: Set Breaks. (line 57)
2771 * help: Help. (line 6)
2772 * help target: Target Commands. (line 19)
2773 * help user-defined: Define. (line 63)
2774 * heuristic-fence-post (Alpha, MIPS): MIPS. (line 14)
2775 * history events: Event Designators. (line 7)
2776 * history expansion: History Interaction. (line 6)
2777 * history expansion, turn on/off: Command History. (line 53)
2778 * history file: Command History. (line 26)
2779 * history number: Value History. (line 13)
2780 * history of values printed by GDB: Value History. (line 6)
2781 * history size: Command History. (line 45)
2782 * history substitution: Command History. (line 26)
2783 * history-preserve-point: Readline Init File Syntax.
2785 * history-search-backward (): Commands For History.
2787 * history-search-forward (): Commands For History.
2789 * HISTSIZE, environment variable: Command History. (line 45)
2790 * hook: Hooks. (line 6)
2791 * hookpost: Hooks. (line 11)
2792 * hooks, for commands: Hooks. (line 6)
2793 * hooks, post-command: Hooks. (line 11)
2794 * hooks, pre-command: Hooks. (line 6)
2795 * horizontal-scroll-mode: Readline Init File Syntax.
2797 * host character set: Character Sets. (line 6)
2798 * Host I/O, remote protocol: Host I/O Packets. (line 6)
2799 * how many arguments (user-defined commands): Define. (line 25)
2800 * HPPA support: HPPA. (line 6)
2801 * htrace: OpenRISC 1000. (line 69)
2802 * hwatch: OpenRISC 1000. (line 59)
2803 * i (info): Help. (line 99)
2804 * I packet: Packets. (line 154)
2805 * i packet: Packets. (line 149)
2806 * i/o: Input/Output. (line 6)
2807 * I/O registers (Atmel AVR): AVR. (line 10)
2808 * i386: Remote Stub. (line 57)
2809 * i386-stub.c: Remote Stub. (line 57)
2810 * IBM1047 character set: Character Sets. (line 74)
2811 * IDT: DJGPP Native. (line 24)
2812 * if: Command Files. (line 56)
2813 * ignore: Conditions. (line 77)
2814 * ignore count (of breakpoint): Conditions. (line 66)
2815 * INCLUDE_RDB: VxWorks. (line 33)
2816 * incomplete type: Symbols. (line 99)
2817 * indentation in structure display: Print Settings. (line 196)
2818 * inferior debugging info: Debugging Output. (line 57)
2819 * inferior functions, calling: Calling. (line 6)
2820 * inferior tty: Input/Output. (line 44)
2821 * infinite recursion in user-defined commands: Define. (line 73)
2822 * info: Help. (line 99)
2823 * info address: Symbols. (line 44)
2824 * info all-registers: Registers. (line 15)
2825 * info args: Frame Info. (line 51)
2826 * info auxv: OS Information. (line 33)
2827 * info breakpoints: Set Breaks. (line 112)
2828 * info catch: Frame Info. (line 60)
2829 * info checkpoints: Checkpoint/Restart. (line 31)
2830 * info classes: Symbols. (line 197)
2831 * info common: Special Fortran Commands.
2833 * info copying: Help. (line 136)
2834 * info dcache: Caching Remote Data. (line 22)
2835 * info display: Auto Display. (line 66)
2836 * info dll: Cygwin Native. (line 23)
2837 * info dos: DJGPP Native. (line 15)
2838 * info extensions: Show. (line 34)
2839 * info f (info frame): Frame Info. (line 17)
2840 * info files: Files. (line 191)
2841 * info float: Floating Point Hardware.
2843 * info for known object files: Maintenance Commands.
2845 * info forks: Processes. (line 80)
2846 * info frame: Frame Info. (line 17)
2847 * info frame, show the source language: Show. (line 15)
2848 * info functions: Symbols. (line 176)
2849 * info handle: Signals. (line 33)
2850 * info io_registers, AVR: AVR. (line 10)
2851 * info line: Machine Code. (line 13)
2852 * info line, and Objective-C: Method Names in Commands.
2854 * info locals: Frame Info. (line 55)
2855 * info macro: Macros. (line 50)
2856 * info mem: Memory Region Attributes.
2858 * info meminfo: SVR4 Process Information.
2860 * info or1k spr: OpenRISC 1000. (line 20)
2861 * info pidlist: SVR4 Process Information.
2863 * info proc: SVR4 Process Information.
2865 * info program: Stopping. (line 18)
2866 * info registers: Registers. (line 11)
2867 * info scope: Symbols. (line 130)
2868 * info selectors: Symbols. (line 203)
2869 * info serial: DJGPP Native. (line 142)
2870 * info set: Help. (line 119)
2871 * info share: Files. (line 326)
2872 * info sharedlibrary: Files. (line 326)
2873 * info signals: Signals. (line 33)
2874 * info source: Symbols. (line 151)
2875 * info source, show the source language: Show. (line 21)
2876 * info sources: Symbols. (line 170)
2877 * info spu: SPU. (line 10)
2878 * info stack: Backtrace. (line 34)
2879 * info symbol: Symbols. (line 54)
2880 * info target: Files. (line 191)
2881 * info terminal: Input/Output. (line 12)
2882 * info threads: Threads. (line 62)
2883 * info threads (HP-UX): Threads. (line 99)
2884 * info tp: Listing Tracepoints. (line 6)
2885 * info tracepoints: Listing Tracepoints. (line 6)
2886 * info types: Symbols. (line 116)
2887 * info udot: OS Information. (line 16)
2888 * info variables: Symbols. (line 188)
2889 * info vector: Vector Unit. (line 9)
2890 * info w32: Cygwin Native. (line 12)
2891 * info warranty: Help. (line 140)
2892 * info watchpoints [N]: Set Watchpoints. (line 55)
2893 * info win: TUI Commands. (line 12)
2894 * information about tracepoints: Listing Tracepoints. (line 6)
2895 * inheritance: Debugging C Plus Plus.
2897 * init file: Startup. (line 11)
2898 * init file name: Startup. (line 37)
2899 * init-if-undefined: Convenience Vars. (line 41)
2900 * initial frame: Frames. (line 12)
2901 * initialization file, readline: Readline Init File. (line 6)
2902 * innermost frame: Frames. (line 12)
2903 * input syntax for GDB/MI: GDB/MI Input Syntax. (line 6)
2904 * input-meta: Readline Init File Syntax.
2906 * insert-comment (M-#): Miscellaneous Commands.
2908 * insert-completions (M-*): Commands For Completion.
2910 * inspect: Data. (line 6)
2911 * installation: Installing GDB. (line 6)
2912 * instructions, assembly: Machine Code. (line 35)
2913 * integral datatypes, in file-i/o protocol: Integral Datatypes.
2915 * Intel: Remote Stub. (line 57)
2916 * Intel disassembly flavor: Machine Code. (line 67)
2917 * interaction, readline: Readline Interaction.
2919 * internal commands: Maintenance Commands.
2921 * internal GDB breakpoints: Set Breaks. (line 289)
2922 * interpreter-exec: Interpreters. (line 43)
2923 * interrupt: Quitting GDB. (line 13)
2924 * interrupt remote programs: Remote Configuration.
2926 * interrupting remote programs: Connecting. (line 77)
2927 * interrupting remote targets: Bootstrapping. (line 25)
2928 * interrupts (remote protocol): Interrupts. (line 6)
2929 * invalid input: Bug Criteria. (line 16)
2930 * invoke another interpreter: Interpreters. (line 37)
2931 * isatty, file-i/o system call: isatty. (line 6)
2932 * isearch-terminators: Readline Init File Syntax.
2934 * ISO 8859-1 character set: Character Sets. (line 68)
2935 * ISO Latin 1 character set: Character Sets. (line 68)
2936 * jump: Jumping. (line 10)
2937 * jump, and Objective-C: Method Names in Commands.
2939 * k packet: Packets. (line 158)
2940 * kernel crash dump: BSD libkvm Interface.
2942 * kernel memory image: BSD libkvm Interface.
2944 * keymap: Readline Init File Syntax.
2946 * kill: Kill Process. (line 6)
2947 * kill ring: Readline Killing Commands.
2949 * kill-line (C-k): Commands For Killing.
2951 * kill-region (): Commands For Killing.
2953 * kill-whole-line (): Commands For Killing.
2955 * kill-word (M-d): Commands For Killing.
2957 * killing text: Readline Killing Commands.
2959 * kvm: BSD libkvm Interface.
2961 * l (list): List. (line 6)
2962 * languages: Languages. (line 6)
2963 * last tracepoint number: Create and Delete Tracepoints.
2965 * latest breakpoint: Set Breaks. (line 6)
2966 * layout: TUI Commands. (line 15)
2967 * LDT: DJGPP Native. (line 24)
2968 * leaving GDB: Quitting GDB. (line 6)
2969 * Left: TUI Keys. (line 59)
2970 * libkvm: BSD libkvm Interface.
2972 * library list format, remote protocol: Library List Format. (line 6)
2973 * limit hardware breakpoints and watchpoints: Remote Configuration.
2975 * limit on number of printed array elements: Print Settings. (line 123)
2976 * limits, in file-i/o protocol: Limits. (line 6)
2977 * linespec: Specify Location. (line 6)
2978 * Linux lightweight processes: Debugging Output. (line 66)
2979 * list: List. (line 6)
2980 * list active threads, remote request: General Query Packets.
2982 * list of supported file-i/o calls: List of Supported Calls.
2984 * list output in GDB/MI: GDB/MI Output Syntax.
2986 * list, and Objective-C: Method Names in Commands.
2988 * list, how many lines to display: List. (line 30)
2989 * listing GDB's internal symbol tables: Symbols. (line 270)
2990 * listing machine instructions: Machine Code. (line 35)
2991 * listing mapped overlays: Overlay Commands. (line 60)
2992 * load address, overlay's: How Overlays Work. (line 6)
2993 * load FILENAME: Target Commands. (line 115)
2994 * load shared library: Files. (line 323)
2995 * load symbols from memory: Files. (line 162)
2996 * local variables: Symbols. (line 130)
2997 * locate address: Output Formats. (line 35)
2998 * lock scheduler: Thread Stops. (line 90)
2999 * log output in GDB/MI: GDB/MI Output Syntax.
3001 * logging file name: Logging Output. (line 13)
3002 * logging GDB output: Logging Output. (line 6)
3003 * loop_break: Command Files. (line 75)
3004 * loop_continue: Command Files. (line 79)
3005 * lseek flags, in file-i/o protocol: Lseek Flags. (line 6)
3006 * lseek, file-i/o system call: lseek. (line 6)
3007 * M packet: Packets. (line 185)
3008 * m packet: Packets. (line 165)
3009 * M32-EVA target board address: M32R/D. (line 21)
3010 * M32R/Chaos debugging: M32R/D. (line 50)
3011 * m680x0: Remote Stub. (line 60)
3012 * m68k-stub.c: Remote Stub. (line 60)
3013 * machine instructions: Machine Code. (line 35)
3014 * macro define: Macros. (line 54)
3015 * macro definition, showing: Macros. (line 50)
3016 * macro exp1: Macros. (line 39)
3017 * macro expand: Macros. (line 32)
3018 * macro expansion, showing the results of preprocessor: Macros.
3020 * macro list: Macros. (line 76)
3021 * macro undef: Macros. (line 69)
3022 * macros, example of debugging with: Macros. (line 80)
3023 * macros, user-defined: Macros. (line 54)
3024 * mailing lists: GDB/MI Development and Front Ends.
3026 * maint agent: Maintenance Commands.
3028 * maint check-symtabs: Maintenance Commands.
3030 * maint cplus first_component: Maintenance Commands.
3032 * maint cplus namespace: Maintenance Commands.
3034 * maint demangle: Maintenance Commands.
3036 * maint deprecate: Maintenance Commands.
3038 * maint dump-me: Maintenance Commands.
3040 * maint info breakpoints: Maintenance Commands.
3042 * maint info psymtabs: Symbols. (line 270)
3043 * maint info sections: Files. (line 200)
3044 * maint info sol-threads: Threads. (line 129)
3045 * maint info symtabs: Symbols. (line 270)
3046 * maint internal-error: Maintenance Commands.
3048 * maint internal-warning: Maintenance Commands.
3050 * maint packet: Maintenance Commands.
3052 * maint print architecture: Maintenance Commands.
3054 * maint print c-tdesc: Maintenance Commands.
3056 * maint print cooked-registers: Maintenance Commands.
3058 * maint print dummy-frames: Maintenance Commands.
3060 * maint print objfiles: Maintenance Commands.
3062 * maint print psymbols: Symbols. (line 251)
3063 * maint print raw-registers: Maintenance Commands.
3065 * maint print reggroups: Maintenance Commands.
3067 * maint print register-groups: Maintenance Commands.
3069 * maint print registers: Maintenance Commands.
3071 * maint print statistics: Maintenance Commands.
3073 * maint print symbols: Symbols. (line 251)
3074 * maint print target-stack: Maintenance Commands.
3076 * maint print type: Maintenance Commands.
3078 * maint print unwind, HPPA: HPPA. (line 17)
3079 * maint set dwarf2 max-cache-age: Maintenance Commands.
3081 * maint set profile: Maintenance Commands.
3083 * maint show dwarf2 max-cache-age: Maintenance Commands.
3085 * maint show profile: Maintenance Commands.
3087 * maint show-debug-regs: Maintenance Commands.
3089 * maint space: Maintenance Commands.
3091 * maint time: Maintenance Commands.
3093 * maint translate-address: Maintenance Commands.
3095 * maint undeprecate: Maintenance Commands.
3097 * maintenance commands: Maintenance Commands.
3099 * make: Shell Commands. (line 19)
3100 * manual overlay debugging: Overlay Commands. (line 23)
3101 * map an overlay: Overlay Commands. (line 30)
3102 * mapinfo list, QNX Neutrino: SVR4 Process Information.
3104 * mapped address: How Overlays Work. (line 6)
3105 * mapped overlays: How Overlays Work. (line 6)
3106 * mark-modified-lines: Readline Init File Syntax.
3108 * mark-symlinked-directories: Readline Init File Syntax.
3110 * match-hidden-files: Readline Init File Syntax.
3112 * maximum value for offset of closest symbol: Print Settings. (line 70)
3113 * mem: Memory Region Attributes.
3115 * member functions: C Plus Plus Expressions.
3117 * memory address space mappings: SVR4 Process Information.
3119 * memory map format: Memory Map Format. (line 6)
3120 * memory region attributes: Memory Region Attributes.
3122 * memory tracing: Breakpoints. (line 20)
3123 * memory transfer, in file-i/o protocol: Memory Transfer. (line 6)
3124 * memory used by commands: Maintenance Commands.
3126 * memory used for symbol tables: Files. (line 311)
3127 * memory, alignment and size of remote accesses: Packets. (line 172)
3128 * memory, viewing as typed object: Expressions. (line 42)
3129 * memset: Bootstrapping. (line 70)
3130 * menu-complete (): Commands For Completion.
3132 * meta-flag: Readline Init File Syntax.
3134 * mi interpreter: Interpreters. (line 26)
3135 * mi1 interpreter: Interpreters. (line 34)
3136 * mi2 interpreter: Interpreters. (line 31)
3137 * minimal language: Unsupported Languages.
3139 * Minimal symbols and DLLs: Non-debug DLL Symbols.
3141 * MIPS addresses, masking: MIPS. (line 61)
3142 * MIPS boards: MIPS Embedded. (line 6)
3143 * MIPS remote floating point: MIPS Embedded. (line 60)
3144 * MIPS stack: MIPS. (line 6)
3145 * MMX registers (x86): Registers. (line 71)
3146 * mode_t values, in file-i/o protocol: mode_t Values. (line 6)
3147 * Modula-2: Summary. (line 27)
3148 * Modula-2 built-ins: Built-In Func/Proc. (line 6)
3149 * Modula-2 checks: M2 Checks. (line 6)
3150 * Modula-2 constants: Built-In Func/Proc. (line 112)
3151 * Modula-2 defaults: M2 Defaults. (line 6)
3152 * Modula-2 operators: M2 Operators. (line 6)
3153 * Modula-2 types: M2 Types. (line 6)
3154 * Modula-2, deviations from: Deviations. (line 6)
3155 * Modula-2, GDB support: Modula-2. (line 6)
3156 * monitor: Connecting. (line 104)
3157 * monitor commands, for gdbserver: Server. (line 149)
3158 * Motorola 680x0: Remote Stub. (line 60)
3159 * MS Windows debugging: Cygwin Native. (line 6)
3160 * MS-DOS system info: DJGPP Native. (line 19)
3161 * MS-DOS-specific commands: DJGPP Native. (line 6)
3162 * multiple processes: Processes. (line 6)
3163 * multiple processes with gdbserver: Server. (line 91)
3164 * multiple targets: Active Targets. (line 6)
3165 * multiple threads: Threads. (line 6)
3166 * multiple threads, backtrace: Backtrace. (line 37)
3167 * n (next): Continuing and Stepping.
3169 * n (SingleKey TUI key): TUI Single Key Mode. (line 19)
3170 * names of symbols: Symbols. (line 14)
3171 * namespace in C++: C Plus Plus Expressions.
3173 * native Cygwin debugging: Cygwin Native. (line 6)
3174 * native DJGPP debugging: DJGPP Native. (line 6)
3175 * negative breakpoint numbers: Set Breaks. (line 289)
3176 * NetROM ROM emulator target: Target Commands. (line 88)
3177 * New SYSTAG message: Threads. (line 47)
3178 * New SYSTAG message, on HP-UX: Threads. (line 89)
3179 * next: Continuing and Stepping.
3181 * next-history (C-n): Commands For History.
3183 * nexti: Continuing and Stepping.
3185 * ni (nexti): Continuing and Stepping.
3187 * non-incremental-forward-search-history (M-n): Commands For History.
3189 * non-incremental-reverse-search-history (M-p): Commands For History.
3191 * non-member C++ functions, set breakpoint in: Set Breaks. (line 103)
3192 * noninvasive task options: Hurd Native. (line 73)
3193 * nosharedlibrary: Files. (line 339)
3194 * notation, readline: Readline Bare Essentials.
3196 * notational conventions, for GDB/MI: GDB/MI. (line 25)
3197 * notify output in GDB/MI: GDB/MI Output Syntax.
3199 * NULL elements in arrays: Print Settings. (line 187)
3200 * number of array elements to print: Print Settings. (line 123)
3201 * number representation: Numbers. (line 6)
3202 * numbers for breakpoints: Breakpoints. (line 41)
3203 * object files, relocatable, reading symbols from: Files. (line 132)
3204 * Objective-C: Objective-C. (line 6)
3205 * Objective-C, classes and selectors: Symbols. (line 197)
3206 * Objective-C, print objects: The Print Command with Objective-C.
3208 * observer debugging info: Debugging Output. (line 73)
3209 * octal escapes in strings: Print Settings. (line 220)
3210 * online documentation: Help. (line 6)
3211 * opaque data types: Symbols. (line 233)
3212 * open flags, in file-i/o protocol: Open Flags. (line 6)
3213 * open, file-i/o system call: open. (line 6)
3214 * OpenRISC 1000: OpenRISC 1000. (line 6)
3215 * OpenRISC 1000 htrace: OpenRISC 1000. (line 58)
3216 * optimized code, debugging: Compilation. (line 26)
3217 * optimized code, wrong values of variables: Variables. (line 58)
3218 * optional debugging messages: Debugging Output. (line 6)
3219 * optional warnings: Messages/Warnings. (line 6)
3220 * or1k boards: OpenRISC 1000. (line 6)
3221 * or1ksim: OpenRISC 1000. (line 16)
3222 * OS ABI: ABI. (line 11)
3223 * OS information: OS Information. (line 6)
3224 * out-of-band records in GDB/MI: GDB/MI Out-of-band Records.
3226 * outermost frame: Frames. (line 12)
3227 * output: Output. (line 35)
3228 * output formats: Output Formats. (line 6)
3229 * output syntax of GDB/MI: GDB/MI Output Syntax.
3231 * output-meta: Readline Init File Syntax.
3233 * overlay: Overlay Commands. (line 17)
3234 * overlay area: How Overlays Work. (line 6)
3235 * overlay example program: Overlay Sample Program.
3237 * overlays: Overlays. (line 6)
3238 * overlays, setting breakpoints in: Overlay Commands. (line 93)
3239 * overload-choice annotation: Prompting. (line 32)
3240 * overloaded functions, calling: C Plus Plus Expressions.
3242 * overloaded functions, overload resolution: Debugging C Plus Plus.
3244 * overloading: Breakpoint Menus. (line 6)
3245 * overloading in C++: Debugging C Plus Plus.
3247 * overwrite-mode (): Commands For Text. (line 53)
3248 * P packet: Packets. (line 213)
3249 * p packet: Packets. (line 198)
3250 * packet size, remote protocol: General Query Packets.
3252 * packets, reporting on stdout: Debugging Output. (line 86)
3253 * packets, tracepoint: Tracepoint Packets. (line 6)
3254 * page tables display (MS-DOS): DJGPP Native. (line 56)
3255 * page-completions: Readline Init File Syntax.
3257 * partial symbol dump: Symbols. (line 251)
3258 * partial symbol tables, listing GDB's internal: Symbols. (line 270)
3259 * Pascal: Summary. (line 30)
3260 * Pascal objects, static members display: Print Settings. (line 351)
3261 * Pascal support in GDB, limitations: Pascal. (line 6)
3262 * pass signals to inferior, remote request: General Query Packets.
3264 * passcount: Tracepoint Passcounts.
3266 * patching binaries: Patching. (line 6)
3267 * patching object files: Files. (line 26)
3268 * path: Environment. (line 14)
3269 * pause current task (GNU Hurd): Hurd Native. (line 49)
3270 * pause current thread (GNU Hurd): Hurd Native. (line 91)
3271 * pauses in output: Screen Size. (line 6)
3272 * pending breakpoints: Set Breaks. (line 217)
3273 * PgDn: TUI Keys. (line 50)
3274 * PgUp: TUI Keys. (line 47)
3275 * physical address from linear address: DJGPP Native. (line 81)
3276 * pipe, target remote to: Connecting. (line 60)
3277 * pipes: Starting. (line 54)
3278 * pmon, MIPS remote: MIPS Embedded. (line 132)
3279 * po (print-object): The Print Command with Objective-C.
3281 * pointer values, in file-i/o protocol: Pointer Values. (line 6)
3282 * pointer, finding referent: Print Settings. (line 79)
3283 * port rights, GNU Hurd: Hurd Native. (line 85)
3284 * port sets, GNU Hurd: Hurd Native. (line 85)
3285 * possible-completions (M-?): Commands For Completion.
3287 * post-commands annotation: Prompting. (line 27)
3288 * post-overload-choice annotation: Prompting. (line 32)
3289 * post-prompt annotation: Prompting. (line 24)
3290 * post-prompt-for-continue annotation: Prompting. (line 40)
3291 * post-query annotation: Prompting. (line 36)
3292 * PowerPC architecture: PowerPC. (line 6)
3293 * pre-commands annotation: Prompting. (line 27)
3294 * pre-overload-choice annotation: Prompting. (line 32)
3295 * pre-prompt annotation: Prompting. (line 24)
3296 * pre-prompt-for-continue annotation: Prompting. (line 40)
3297 * pre-query annotation: Prompting. (line 36)
3298 * prefix for shared library file names: Files. (line 369)
3299 * prefix-meta (<ESC>): Miscellaneous Commands.
3301 * premature return from system calls: Thread Stops. (line 37)
3302 * preprocessor macro expansion, showing the results of: Macros.
3304 * pretty print arrays: Print Settings. (line 98)
3305 * pretty print C++ virtual function tables: Print Settings. (line 362)
3306 * previous-history (C-p): Commands For History.
3308 * print: Data. (line 6)
3309 * print all frame argument values: Print Settings. (line 135)
3310 * print an Objective-C object description: The Print Command with Objective-C.
3312 * print array indexes: Print Settings. (line 108)
3313 * print frame argument values for scalars only: Print Settings.
3315 * print messages on thread start and exit: Threads. (line 155)
3316 * print settings: Print Settings. (line 6)
3317 * print structures in indented form: Print Settings. (line 196)
3318 * print-object: The Print Command with Objective-C.
3320 * print/don't print memory addresses: Print Settings. (line 13)
3321 * printf: Output. (line 46)
3322 * printing byte arrays: Output Formats. (line 60)
3323 * printing data: Data. (line 6)
3324 * printing frame argument values: Print Settings. (line 135)
3325 * printing strings: Output Formats. (line 60)
3326 * proc-trace-entry: SVR4 Process Information.
3328 * proc-trace-exit: SVR4 Process Information.
3330 * proc-untrace-entry: SVR4 Process Information.
3332 * proc-untrace-exit: SVR4 Process Information.
3334 * process detailed status information: SVR4 Process Information.
3336 * process ID: SVR4 Process Information.
3338 * process info via /proc: SVR4 Process Information.
3340 * process list, QNX Neutrino: SVR4 Process Information.
3342 * process PROCESS-ID: Processes. (line 90)
3343 * process status register: Registers. (line 26)
3344 * processes, multiple: Processes. (line 6)
3345 * procfs API calls: SVR4 Process Information.
3347 * profiling GDB: Maintenance Commands.
3349 * program counter register: Registers. (line 26)
3350 * program entry point: Backtrace. (line 87)
3351 * prompt: Prompt. (line 6)
3352 * prompt annotation: Prompting. (line 24)
3353 * prompt-for-continue annotation: Prompting. (line 40)
3354 * protocol basics, file-i/o: Protocol Basics. (line 6)
3355 * protocol, GDB remote serial: Overview. (line 14)
3356 * protocol-specific representation of datatypes, in file-i/o protocol: Protocol-specific Representation of Datatypes.
3358 * ptrace system call: OS Information. (line 9)
3359 * ptype: Symbols. (line 77)
3360 * putDebugChar: Bootstrapping. (line 20)
3361 * pwd: Working Directory. (line 19)
3362 * q (quit): Quitting GDB. (line 6)
3363 * q (SingleKey TUI key): TUI Single Key Mode. (line 22)
3364 * Q packet: Packets. (line 226)
3365 * q packet: Packets. (line 226)
3366 * qC packet: General Query Packets.
3368 * qCRC packet: General Query Packets.
3370 * qfThreadInfo packet: General Query Packets.
3372 * qGetTLSAddr packet: General Query Packets.
3374 * QNX Neutrino: Neutrino. (line 6)
3375 * qOffsets packet: General Query Packets.
3377 * qP packet: General Query Packets.
3379 * QPassSignals packet: General Query Packets.
3381 * qRcmd packet: General Query Packets.
3383 * qsThreadInfo packet: General Query Packets.
3385 * qSupported packet: General Query Packets.
3387 * qSymbol packet: General Query Packets.
3389 * qThreadExtraInfo packet: General Query Packets.
3391 * query annotation: Prompting. (line 36)
3392 * quit [EXPRESSION]: Quitting GDB. (line 6)
3393 * quit annotation: Errors. (line 6)
3394 * quoted-insert (C-q or C-v): Commands For Text. (line 20)
3395 * quotes in commands: Completion. (line 57)
3396 * quoting Ada internal identifiers: Additions to Ada. (line 76)
3397 * quoting names: Symbols. (line 14)
3398 * qXfer packet: General Query Packets.
3400 * r (run): Starting. (line 6)
3401 * r (SingleKey TUI key): TUI Single Key Mode. (line 25)
3402 * R packet: Packets. (line 235)
3403 * r packet: Packets. (line 230)
3404 * raise exceptions: Set Catchpoints. (line 80)
3405 * range checking: Type Checking. (line 65)
3406 * ranges of breakpoints: Breakpoints. (line 48)
3407 * rbreak: Set Breaks. (line 87)
3408 * RDI heartbeat: ARM. (line 93)
3409 * rdilogenable: ARM. (line 76)
3410 * rdilogfile: ARM. (line 70)
3411 * re-read-init-file (C-x C-r): Miscellaneous Commands.
3413 * read special object, remote request: General Query Packets.
3415 * read, file-i/o system call: read. (line 6)
3416 * read-only sections: Files. (line 258)
3417 * reading symbols from relocatable object files: Files. (line 132)
3418 * reading symbols immediately: Files. (line 90)
3419 * readline: Editing. (line 6)
3420 * readnow: Files. (line 90)
3421 * receive rights, GNU Hurd: Hurd Native. (line 85)
3422 * recent tracepoint number: Create and Delete Tracepoints.
3424 * record aggregates (Ada): Omissions from Ada. (line 44)
3425 * record serial communications on file: Remote Configuration.
3427 * recording a session script: Bug Reporting. (line 104)
3428 * redirection: Input/Output. (line 6)
3429 * redraw-current-line (): Commands For Moving. (line 30)
3430 * reference card: Formatting Documentation.
3432 * reference declarations: C Plus Plus Expressions.
3434 * refresh: TUI Commands. (line 52)
3435 * register stack, AMD29K: A29K. (line 6)
3436 * registers: Registers. (line 6)
3437 * regs, Super-H: Super-H. (line 9)
3438 * regular expression: Set Breaks. (line 87)
3439 * reloading symbols: Symbols. (line 209)
3440 * reloading the overlay table: Overlay Commands. (line 52)
3441 * relocatable object files, reading symbols from: Files. (line 132)
3442 * remote connection without stubs: Server. (line 6)
3443 * remote debugging: Remote Debugging. (line 6)
3444 * remote delete: File Transfer. (line 23)
3445 * remote get: File Transfer. (line 19)
3446 * remote memory comparison: Memory. (line 105)
3447 * remote monitor prompt: MIPS Embedded. (line 107)
3448 * remote packets, enabling and disabling: Remote Configuration.
3450 * remote programs, interrupting: Connecting. (line 77)
3451 * remote protocol debugging: Debugging Output. (line 86)
3452 * remote protocol, binary data: Overview. (line 55)
3453 * remote protocol, field separator: Overview. (line 47)
3454 * remote put: File Transfer. (line 15)
3455 * remote query requests: General Query Packets.
3457 * remote serial debugging summary: Debug Session. (line 6)
3458 * remote serial debugging, overview: Remote Stub. (line 14)
3459 * remote serial protocol: Overview. (line 14)
3460 * remote serial stub: Stub Contents. (line 6)
3461 * remote serial stub list: Remote Stub. (line 54)
3462 * remote serial stub, initialization: Stub Contents. (line 10)
3463 * remote serial stub, main routine: Stub Contents. (line 15)
3464 * remote stub, example: Remote Stub. (line 6)
3465 * remote stub, support routines: Bootstrapping. (line 6)
3466 * remote target: Target Commands. (line 58)
3467 * remote target, file transfer: File Transfer. (line 6)
3468 * remote target, limit break- and watchpoints: Remote Configuration.
3470 * remote timeout: Remote Configuration.
3472 * remotetimeout: Sparclet. (line 12)
3473 * remove actions from a tracepoint: Tracepoint Actions. (line 17)
3474 * rename, file-i/o system call: rename. (line 6)
3475 * Renesas: Remote Stub. (line 63)
3476 * repeated array elements: Print Settings. (line 174)
3477 * repeating command sequences: Command Syntax. (line 42)
3478 * repeating commands: Command Syntax. (line 21)
3479 * reporting bugs in GDB: GDB Bugs. (line 6)
3480 * reprint the last value: Data. (line 21)
3481 * reset SDI connection, M32R: M32R/D. (line 44)
3482 * response time, MIPS debugging: MIPS. (line 10)
3483 * restart: Checkpoint/Restart. (line 6)
3484 * restart CHECKPOINT-ID: Checkpoint/Restart. (line 44)
3485 * restore: Dump/Restore Files. (line 41)
3486 * restore data from a file: Dump/Restore Files. (line 6)
3487 * result records in GDB/MI: GDB/MI Result Records.
3489 * resuming execution: Continuing and Stepping.
3491 * RET (repeat last command): Command Syntax. (line 21)
3492 * retransmit-timeout, MIPS protocol: MIPS Embedded. (line 83)
3493 * return: Returning. (line 6)
3494 * returning from a function: Returning. (line 6)
3495 * reverse-search: Search. (line 16)
3496 * reverse-search-history (C-r): Commands For History.
3498 * revert-line (M-r): Miscellaneous Commands.
3500 * rewind program state: Checkpoint/Restart. (line 6)
3501 * Right: TUI Keys. (line 62)
3502 * ROM at zero address, RDI: ARM. (line 83)
3503 * run: Starting. (line 6)
3504 * run to main procedure: Starting. (line 71)
3505 * run until specified location: Continuing and Stepping.
3507 * running: Starting. (line 6)
3508 * running and debugging Sparclet programs: Sparclet Execution.
3510 * running VxWorks tasks: VxWorks Attach. (line 6)
3511 * running, on Sparclet: Sparclet. (line 28)
3512 * rwatch: Set Watchpoints. (line 47)
3513 * s (SingleKey TUI key): TUI Single Key Mode. (line 28)
3514 * s (step): Continuing and Stepping.
3516 * S packet: Packets. (line 248)
3517 * s packet: Packets. (line 242)
3518 * save command history: Command History. (line 36)
3519 * save GDB output to a file: Logging Output. (line 6)
3520 * save tracepoints for future sessions: save-tracepoints. (line 6)
3521 * save-tracepoints: save-tracepoints. (line 6)
3522 * scheduler locking mode: Thread Stops. (line 90)
3523 * scope: M2 Scope. (line 6)
3524 * scripting commands: Command Files. (line 6)
3525 * sdireset: M32R/D. (line 44)
3526 * sdistatus: M32R/D. (line 47)
3527 * SDS protocol: PowerPC Embedded. (line 34)
3528 * sds, a command: PowerPC Embedded. (line 45)
3529 * search: Search. (line 9)
3530 * searching source files: Search. (line 6)
3531 * section: Files. (line 182)
3532 * section offsets, remote request: General Query Packets.
3534 * segment descriptor tables: DJGPP Native. (line 24)
3535 * select trace snapshot: tfind. (line 6)
3536 * select-frame: Frames. (line 51)
3537 * selected frame: Stack. (line 19)
3538 * selecting frame silently: Frames. (line 51)
3539 * self-insert (a, b, A, 1, !, ...): Commands For Text. (line 27)
3540 * send command to remote monitor: Connecting. (line 104)
3541 * send command to simulator: Embedded Processors. (line 9)
3542 * send PMON command: MIPS Embedded. (line 132)
3543 * send rights, GNU Hurd: Hurd Native. (line 85)
3544 * sending files to remote systems: File Transfer. (line 6)
3545 * separate debugging information files: Separate Debug Files.
3547 * sequence-id, for GDB remote: Overview. (line 29)
3548 * serial connections, debugging: Debugging Output. (line 86)
3549 * serial line, target remote: Connecting. (line 18)
3550 * serial protocol, GDB remote: Overview. (line 14)
3551 * server prefix: Server Prefix. (line 6)
3552 * server, command prefix: Command History. (line 20)
3553 * set: Help. (line 107)
3554 * set ABI for MIPS: MIPS. (line 32)
3555 * set annotate: Annotations Overview.
3557 * set architecture: Targets. (line 21)
3558 * set args: Arguments. (line 21)
3559 * set arm: ARM. (line 18)
3560 * set auto-solib-add: Files. (line 303)
3561 * set backtrace: Backtrace. (line 98)
3562 * set board-address: M32R/D. (line 21)
3563 * set breakpoint auto-hw: Set Breaks. (line 279)
3564 * set breakpoint pending: Set Breaks. (line 248)
3565 * set breakpoints in many functions: Set Breaks. (line 87)
3566 * set breakpoints on all functions: Set Breaks. (line 107)
3567 * set can-use-hw-watchpoints: Set Watchpoints. (line 74)
3568 * set case-sensitive: Symbols. (line 27)
3569 * set charset: Character Sets. (line 47)
3570 * set check range: Range Checking. (line 34)
3571 * set check type: Type Checking. (line 42)
3572 * set coerce-float-to-double: ABI. (line 41)
3573 * set com1base: DJGPP Native. (line 125)
3574 * set com1irq: DJGPP Native. (line 125)
3575 * set com2base: DJGPP Native. (line 125)
3576 * set com2irq: DJGPP Native. (line 125)
3577 * set com3base: DJGPP Native. (line 125)
3578 * set com3irq: DJGPP Native. (line 125)
3579 * set com4base: DJGPP Native. (line 125)
3580 * set com4irq: DJGPP Native. (line 125)
3581 * set complaints: Messages/Warnings. (line 29)
3582 * set confirm: Messages/Warnings. (line 50)
3583 * set cp-abi: ABI. (line 53)
3584 * set cygwin-exceptions: Cygwin Native. (line 30)
3585 * set debug: Debugging Output. (line 18)
3586 * set debug hppa: HPPA. (line 10)
3587 * set debug mips: MIPS. (line 81)
3588 * set debug monitor: Target Commands. (line 108)
3589 * set debug nto-debug: Neutrino. (line 9)
3590 * set debug-file-directory: Separate Debug Files.
3592 * set debugevents: Cygwin Native. (line 59)
3593 * set debugexceptions: Cygwin Native. (line 70)
3594 * set debugexec: Cygwin Native. (line 66)
3595 * set debugmemory: Cygwin Native. (line 74)
3596 * set demangle-style: Print Settings. (line 294)
3597 * set detach-on-fork: Processes. (line 55)
3598 * set disassembly-flavor: Machine Code. (line 67)
3599 * set download-path: M32R/D. (line 15)
3600 * set editing: Editing. (line 15)
3601 * set endian: Byte Order. (line 13)
3602 * set environment: Environment. (line 39)
3603 * set exceptions, Hurd command: Hurd Native. (line 40)
3604 * set exec-done-display: Debugging Output. (line 11)
3605 * set extension-language: Show. (line 30)
3606 * set follow-fork-mode: Processes. (line 35)
3607 * set gnutarget: Target Commands. (line 28)
3608 * set hash, for remote monitors: Target Commands. (line 99)
3609 * set height: Screen Size. (line 21)
3610 * set history expansion: Command History. (line 65)
3611 * set history filename: Command History. (line 26)
3612 * set history save: Command History. (line 36)
3613 * set history size: Command History. (line 45)
3614 * set host-charset: Character Sets. (line 34)
3615 * set inferior controlling terminal: Input/Output. (line 44)
3616 * set inferior-tty: Input/Output. (line 49)
3617 * set input-radix: Numbers. (line 14)
3618 * set language: Manually. (line 9)
3619 * set listsize: List. (line 33)
3620 * set logging: Logging Output. (line 9)
3621 * set max-user-call-depth: Define. (line 73)
3622 * set mem inaccessible-by-default: Memory Region Attributes.
3624 * set mips abi: MIPS. (line 32)
3625 * set mips mask-address: MIPS. (line 61)
3626 * set mipsfpu: MIPS Embedded. (line 60)
3627 * set monitor-prompt, MIPS remote: MIPS Embedded. (line 107)
3628 * set monitor-warnings, MIPS remote: MIPS Embedded. (line 123)
3629 * set new-console: Cygwin Native. (line 42)
3630 * set new-group: Cygwin Native. (line 51)
3631 * set opaque-type-resolution: Symbols. (line 233)
3632 * set osabi: ABI. (line 11)
3633 * set output-radix: Numbers. (line 31)
3634 * set overload-resolution: Debugging C Plus Plus.
3636 * set pagination: Screen Size. (line 38)
3637 * set powerpc: PowerPC Embedded. (line 8)
3638 * set print: Print Settings. (line 11)
3639 * set print thread-events: Threads. (line 155)
3640 * set processor: Targets. (line 31)
3641 * set procfs-file: SVR4 Process Information.
3643 * set procfs-trace: SVR4 Process Information.
3645 * set prompt: Prompt. (line 16)
3646 * set radix: Numbers. (line 44)
3647 * set rdiheartbeat: ARM. (line 93)
3648 * set rdiromatzero: ARM. (line 83)
3649 * set remote: Remote Configuration.
3651 * set remote system-call-allowed: system. (line 38)
3652 * set remote-mips64-transfers-32bit-regs: MIPS. (line 71)
3653 * set remotecache: Caching Remote Data. (line 14)
3654 * set remoteflow: Remote Configuration.
3656 * set retransmit-timeout: MIPS Embedded. (line 83)
3657 * set rstack_high_address: A29K. (line 6)
3658 * set sdstimeout: PowerPC Embedded. (line 38)
3659 * set server-address: M32R/D. (line 27)
3660 * set shell: Cygwin Native. (line 78)
3661 * set signal-thread: Hurd Native. (line 21)
3662 * set signals, Hurd command: Hurd Native. (line 11)
3663 * set sigs, Hurd command: Hurd Native. (line 11)
3664 * set sigthread: Hurd Native. (line 21)
3665 * set solib-absolute-prefix: Files. (line 369)
3666 * set solib-search-path: Files. (line 390)
3667 * set step-mode: Continuing and Stepping.
3669 * set stop-on-solib-events: Files. (line 349)
3670 * set stopped, Hurd command: Hurd Native. (line 32)
3671 * set struct-convention: i386. (line 7)
3672 * set substitute-path: Source Path. (line 114)
3673 * set symbol-reloading: Symbols. (line 216)
3674 * set syn-garbage-limit, MIPS remote: MIPS Embedded. (line 98)
3675 * set sysroot: Files. (line 369)
3676 * set target-charset: Character Sets. (line 28)
3677 * set task, Hurd commands: Hurd Native. (line 49)
3678 * set tdesc filename: Retrieving Descriptions.
3680 * set thread, Hurd command: Hurd Native. (line 91)
3681 * set timeout: MIPS Embedded. (line 83)
3682 * set trace-commands: Messages/Warnings. (line 65)
3683 * set tracepoint: Create and Delete Tracepoints.
3685 * set trust-readonly-sections: Files. (line 258)
3686 * set tui active-border-mode: TUI Configuration. (line 24)
3687 * set tui border-kind: TUI Configuration. (line 9)
3688 * set tui border-mode: TUI Configuration. (line 23)
3689 * set unwindonsignal: Calling. (line 26)
3690 * set variable: Assignment. (line 16)
3691 * set verbose: Messages/Warnings. (line 15)
3692 * set watchdog: Maintenance Commands.
3694 * set width: Screen Size. (line 21)
3695 * set write: Patching. (line 15)
3696 * set-mark (C-@): Miscellaneous Commands.
3698 * set_debug_traps: Stub Contents. (line 10)
3699 * setting variables: Assignment. (line 6)
3700 * setting watchpoints: Set Watchpoints. (line 6)
3701 * SH: Remote Stub. (line 63)
3702 * sh-stub.c: Remote Stub. (line 63)
3703 * share: Files. (line 330)
3704 * shared libraries: Files. (line 281)
3705 * shared library events, remote reply: Stop Reply Packets. (line 52)
3706 * sharedlibrary: Files. (line 330)
3707 * shell: Shell Commands. (line 10)
3708 * shell escape: Shell Commands. (line 10)
3709 * show: Help. (line 112)
3710 * show all user variables: Convenience Vars. (line 37)
3711 * show annotate: Annotations Overview.
3713 * show architecture: Targets. (line 21)
3714 * show args: Arguments. (line 28)
3715 * show arm: ARM. (line 22)
3716 * show auto-solib-add: Files. (line 320)
3717 * show backtrace: Backtrace. (line 105)
3718 * show board-address: M32R/D. (line 24)
3719 * show breakpoint auto-hw: Set Breaks. (line 279)
3720 * show breakpoint pending: Set Breaks. (line 248)
3721 * show can-use-hw-watchpoints: Set Watchpoints. (line 77)
3722 * show case-sensitive: Symbols. (line 40)
3723 * show charset: Character Sets. (line 53)
3724 * show check range: Range Checking. (line 34)
3725 * show check type: Type Checking. (line 42)
3726 * show coerce-float-to-double: ABI. (line 50)
3727 * show com1base: DJGPP Native. (line 137)
3728 * show com1irq: DJGPP Native. (line 137)
3729 * show com2base: DJGPP Native. (line 137)
3730 * show com2irq: DJGPP Native. (line 137)
3731 * show com3base: DJGPP Native. (line 137)
3732 * show com3irq: DJGPP Native. (line 137)
3733 * show com4base: DJGPP Native. (line 137)
3734 * show com4irq: DJGPP Native. (line 137)
3735 * show commands: Command History. (line 78)
3736 * show complaints: Messages/Warnings. (line 35)
3737 * show confirm: Messages/Warnings. (line 56)
3738 * show convenience: Convenience Vars. (line 37)
3739 * show copying: Help. (line 136)
3740 * show cp-abi: ABI. (line 53)
3741 * show cygwin-exceptions: Cygwin Native. (line 38)
3742 * show debug: Debugging Output. (line 22)
3743 * show debug mips: MIPS. (line 85)
3744 * show debug monitor: Target Commands. (line 112)
3745 * show debug nto-debug: Neutrino. (line 13)
3746 * show debug-file-directory: Separate Debug Files.
3748 * show detach-on-fork: Processes. (line 71)
3749 * show directories: Source Path. (line 111)
3750 * show disassembly-flavor: Machine Code. (line 76)
3751 * show download-path: M32R/D. (line 18)
3752 * show editing: Editing. (line 22)
3753 * show environment: Environment. (line 33)
3754 * show exceptions, Hurd command: Hurd Native. (line 46)
3755 * show exec-done-display: Debugging Output. (line 14)
3756 * show follow-fork-mode: Processes. (line 49)
3757 * show gnutarget: Target Commands. (line 40)
3758 * show hash, for remote monitors: Target Commands. (line 105)
3759 * show height: Screen Size. (line 21)
3760 * show history: Command History. (line 70)
3761 * show host-charset: Character Sets. (line 56)
3762 * show inferior-tty: Input/Output. (line 52)
3763 * show input-radix: Numbers. (line 36)
3764 * show language: Show. (line 10)
3765 * show last commands: Command History. (line 78)
3766 * show listsize: List. (line 37)
3767 * show logging: Logging Output. (line 26)
3768 * show max-user-call-depth: Define. (line 73)
3769 * show mem inaccessible-by-default: Memory Region Attributes.
3771 * show mips abi: MIPS. (line 54)
3772 * show mips mask-address: MIPS. (line 67)
3773 * show mipsfpu: MIPS Embedded. (line 60)
3774 * show monitor-prompt, MIPS remote: MIPS Embedded. (line 119)
3775 * show monitor-warnings, MIPS remote: MIPS Embedded. (line 129)
3776 * show new-console: Cygwin Native. (line 47)
3777 * show new-group: Cygwin Native. (line 56)
3778 * show opaque-type-resolution: Symbols. (line 248)
3779 * show osabi: ABI. (line 11)
3780 * show output-radix: Numbers. (line 39)
3781 * show overload-resolution: Debugging C Plus Plus.
3783 * show pagination: Screen Size. (line 42)
3784 * show paths: Environment. (line 29)
3785 * show print: Print Settings. (line 39)
3786 * show print thread-events: Threads. (line 165)
3787 * show processor: Targets. (line 31)
3788 * show procfs-file: SVR4 Process Information.
3790 * show procfs-trace: SVR4 Process Information.
3792 * show prompt: Prompt. (line 19)
3793 * show radix: Numbers. (line 44)
3794 * show rdiheartbeat: ARM. (line 98)
3795 * show rdiromatzero: ARM. (line 90)
3796 * show remote: Remote Configuration.
3798 * show remote system-call-allowed: system. (line 42)
3799 * show remote-mips64-transfers-32bit-regs: MIPS. (line 77)
3800 * show remotecache: Caching Remote Data. (line 19)
3801 * show remoteflow: Remote Configuration.
3803 * show retransmit-timeout: MIPS Embedded. (line 83)
3804 * show rstack_high_address: A29K. (line 17)
3805 * show sdstimeout: PowerPC Embedded. (line 42)
3806 * show server-address: M32R/D. (line 31)
3807 * show shell: Cygwin Native. (line 82)
3808 * show signal-thread: Hurd Native. (line 28)
3809 * show signals, Hurd command: Hurd Native. (line 17)
3810 * show sigs, Hurd command: Hurd Native. (line 17)
3811 * show sigthread: Hurd Native. (line 28)
3812 * show solib-search-path: Files. (line 401)
3813 * show stop-on-solib-events: Files. (line 355)
3814 * show stopped, Hurd command: Hurd Native. (line 37)
3815 * show struct-convention: i386. (line 15)
3816 * show substitute-path: Source Path. (line 151)
3817 * show symbol-reloading: Symbols. (line 230)
3818 * show syn-garbage-limit, MIPS remote: MIPS Embedded. (line 103)
3819 * show sysroot: Files. (line 387)
3820 * show target-charset: Character Sets. (line 59)
3821 * show task, Hurd commands: Hurd Native. (line 57)
3822 * show tdesc filename: Retrieving Descriptions.
3824 * show thread, Hurd command: Hurd Native. (line 101)
3825 * show timeout: MIPS Embedded. (line 83)
3826 * show unwindonsignal: Calling. (line 33)
3827 * show user: Define. (line 67)
3828 * show values: Value History. (line 47)
3829 * show verbose: Messages/Warnings. (line 21)
3830 * show version: Help. (line 126)
3831 * show warranty: Help. (line 140)
3832 * show width: Screen Size. (line 21)
3833 * show write: Patching. (line 26)
3834 * show-all-if-ambiguous: Readline Init File Syntax.
3836 * show-all-if-unmodified: Readline Init File Syntax.
3838 * si (stepi): Continuing and Stepping.
3840 * signal: Signaling. (line 6)
3841 * signal annotation: Annotations for Running.
3843 * signal-name annotation: Annotations for Running.
3845 * signal-name-end annotation: Annotations for Running.
3847 * signal-string annotation: Annotations for Running.
3849 * signal-string-end annotation: Annotations for Running.
3851 * signalled annotation: Annotations for Running.
3853 * signals: Signals. (line 6)
3854 * SIGQUIT signal, dump core of GDB: Maintenance Commands.
3856 * silent: Break Commands. (line 38)
3857 * sim: Z8000. (line 15)
3858 * sim, a command: Embedded Processors. (line 13)
3859 * simulator, Z8000: Z8000. (line 6)
3860 * size of remote memory accesses: Packets. (line 172)
3861 * size of screen: Screen Size. (line 6)
3862 * snapshot of a process: Checkpoint/Restart. (line 6)
3863 * software watchpoints: Set Watchpoints. (line 22)
3864 * source: Command Files. (line 14)
3865 * source annotation: Source Annotations. (line 6)
3866 * source file and line of a symbol: Print Settings. (line 51)
3867 * source line and its code address: Machine Code. (line 6)
3868 * source path: Source Path. (line 6)
3869 * Sparc: Remote Stub. (line 66)
3870 * sparc-stub.c: Remote Stub. (line 66)
3871 * sparcl-stub.c: Remote Stub. (line 69)
3872 * Sparclet: Sparclet. (line 6)
3873 * SparcLite: Remote Stub. (line 69)
3874 * Special Fortran commands: Special Fortran Commands.
3876 * specifying location: Specify Location. (line 6)
3877 * spr: OpenRISC 1000. (line 33)
3878 * SPU: SPU. (line 6)
3879 * SSE registers (x86): Registers. (line 71)
3880 * stack frame: Frames. (line 6)
3881 * stack on Alpha: MIPS. (line 6)
3882 * stack on MIPS: MIPS. (line 6)
3883 * stack pointer register: Registers. (line 26)
3884 * stacking targets: Active Targets. (line 6)
3885 * standard registers: Registers. (line 26)
3886 * start: Starting. (line 70)
3887 * start a new trace experiment: Starting and Stopping Trace Experiments.
3889 * start-kbd-macro (C-x (): Keyboard Macros. (line 6)
3890 * starting: Starting. (line 6)
3891 * starting annotation: Annotations for Running.
3893 * startup code, and backtrace: Backtrace. (line 87)
3894 * stat, file-i/o system call: stat/fstat. (line 6)
3895 * static members of C++ objects: Print Settings. (line 340)
3896 * static members of Pascal objects: Print Settings. (line 351)
3897 * status of trace data collection: Starting and Stopping Trace Experiments.
3899 * status output in GDB/MI: GDB/MI Output Syntax.
3901 * step: Continuing and Stepping.
3903 * stepi: Continuing and Stepping.
3905 * stepping: Continuing and Stepping.
3907 * stepping into functions with no line info: Continuing and Stepping.
3909 * stop a running trace experiment: Starting and Stopping Trace Experiments.
3911 * stop on C++ exceptions: Set Catchpoints. (line 13)
3912 * stop reply packets: Stop Reply Packets. (line 6)
3913 * stop, a pseudo-command: Hooks. (line 21)
3914 * stopped threads: Thread Stops. (line 32)
3915 * stopping annotation: Annotations for Running.
3917 * stream records in GDB/MI: GDB/MI Stream Records.
3919 * struct return convention: i386. (line 7)
3920 * struct stat, in file-i/o protocol: struct stat. (line 6)
3921 * struct timeval, in file-i/o protocol: struct timeval. (line 6)
3922 * struct user contents: OS Information. (line 9)
3923 * struct/union returned in registers: i386. (line 7)
3924 * stub example, remote debugging: Remote Stub. (line 6)
3925 * stupid questions: Messages/Warnings. (line 50)
3926 * Super-H: Super-H. (line 6)
3927 * supported packets, remote query: General Query Packets.
3929 * switching threads: Threads. (line 6)
3930 * switching threads automatically: Threads. (line 169)
3931 * symbol decoding style, C++: Print Settings. (line 294)
3932 * symbol dump: Symbols. (line 251)
3933 * symbol from address: Symbols. (line 54)
3934 * symbol lookup, remote request: General Query Packets.
3936 * symbol names: Symbols. (line 14)
3937 * symbol overloading: Breakpoint Menus. (line 6)
3938 * symbol table: Files. (line 6)
3939 * symbol tables, listing GDB's internal: Symbols. (line 270)
3940 * symbol, source file and line: Print Settings. (line 51)
3941 * symbol-file: Files. (line 45)
3942 * symbols, reading from relocatable object files: Files. (line 132)
3943 * symbols, reading immediately: Files. (line 90)
3944 * synchronize with remote MIPS target: MIPS Embedded. (line 98)
3945 * syscall DSO: Files. (line 162)
3946 * sysinfo: DJGPP Native. (line 19)
3947 * system calls and thread breakpoints: Thread Stops. (line 37)
3948 * system root, alternate: Files. (line 369)
3949 * system, file-i/o system call: system. (line 6)
3950 * T packet: Packets. (line 260)
3951 * t packet: Packets. (line 255)
3952 * T packet reply: Stop Reply Packets. (line 22)
3953 * tabset: TUI Commands. (line 78)
3954 * target: Target Commands. (line 49)
3955 * target architecture: Targets. (line 17)
3956 * target array: MIPS Embedded. (line 49)
3957 * target byte order: Byte Order. (line 6)
3958 * target character set: Character Sets. (line 6)
3959 * target dbug: M68K. (line 9)
3960 * target ddb PORT: MIPS Embedded. (line 41)
3961 * target debugging info: Debugging Output. (line 111)
3962 * target descriptions: Target Descriptions. (line 6)
3963 * target descriptions, ARM features: ARM Features. (line 6)
3964 * target descriptions, inclusion: Target Description Format.
3966 * target descriptions, M68K features: M68K Features. (line 6)
3967 * target descriptions, MIPS features: MIPS Features. (line 6)
3968 * target descriptions, PowerPC features: PowerPC Features. (line 6)
3969 * target descriptions, predefined types: Predefined Target Types.
3971 * target descriptions, standard features: Standard Target Features.
3973 * target descriptions, XML format: Target Description Format.
3975 * target dink32: PowerPC Embedded. (line 23)
3976 * target jtag: OpenRISC 1000. (line 9)
3977 * target lsi PORT: MIPS Embedded. (line 44)
3978 * target m32r: M32R/D. (line 6)
3979 * target m32rsdi: M32R/D. (line 9)
3980 * target mips PORT: MIPS Embedded. (line 14)
3981 * target op50n: PA. (line 6)
3982 * target output in GDB/MI: GDB/MI Output Syntax.
3984 * target pmon PORT: MIPS Embedded. (line 38)
3985 * target ppcbug: PowerPC Embedded. (line 26)
3986 * target ppcbug1: PowerPC Embedded. (line 27)
3987 * target r3900: MIPS Embedded. (line 46)
3988 * target rdi: ARM. (line 6)
3989 * target rdp: ARM. (line 11)
3990 * target remote: Connecting. (line 11)
3991 * target sds: PowerPC Embedded. (line 31)
3992 * target sim, with Z8000: Z8000. (line 15)
3993 * target sparclite: Sparclite. (line 6)
3994 * target stack description: Maintenance Commands.
3996 * target vxworks: VxWorks. (line 6)
3997 * target w89k: PA. (line 9)
3998 * task attributes (GNU Hurd): Hurd Native. (line 49)
3999 * task exception port, GNU Hurd: Hurd Native. (line 68)
4000 * task suspend count: Hurd Native. (line 60)
4001 * tbreak: Set Breaks. (line 50)
4002 * TCP port, target remote: Connecting. (line 29)
4003 * tdump: tdump. (line 6)
4004 * terminal: Input/Output. (line 6)
4005 * Text User Interface: TUI. (line 6)
4006 * tfind: tfind. (line 6)
4007 * thbreak: Set Breaks. (line 77)
4008 * this, inside C++ member functions: C Plus Plus Expressions.
4010 * thread apply: Threads. (line 146)
4011 * thread attributes info, remote request: General Query Packets.
4013 * thread breakpoints: Thread Stops. (line 10)
4014 * thread breakpoints and system calls: Thread Stops. (line 37)
4015 * thread default settings, GNU Hurd: Hurd Native. (line 131)
4016 * thread identifier (GDB): Threads. (line 59)
4017 * thread identifier (GDB), on HP-UX: Threads. (line 85)
4018 * thread identifier (system): Threads. (line 47)
4019 * thread identifier (system), on HP-UX: Threads. (line 89)
4020 * thread info (Solaris): Threads. (line 129)
4021 * thread information, remote request: General Query Packets.
4023 * thread number: Threads. (line 59)
4024 * thread properties, GNU Hurd: Hurd Native. (line 91)
4025 * thread suspend count, GNU Hurd: Hurd Native. (line 110)
4026 * thread THREADNO: Threads. (line 131)
4027 * threads and watchpoints: Set Watchpoints. (line 149)
4028 * threads of execution: Threads. (line 6)
4029 * threads, automatic switching: Threads. (line 169)
4030 * threads, continuing: Thread Stops. (line 70)
4031 * threads, stopped: Thread Stops. (line 32)
4032 * time of command execution: Maintenance Commands.
4034 * timeout for commands: Maintenance Commands.
4036 * timeout for serial communications: Remote Configuration.
4038 * timeout, MIPS protocol: MIPS Embedded. (line 83)
4039 * tload, M32R: M32R/D. (line 39)
4040 * trace: Create and Delete Tracepoints.
4042 * trace experiment, status of: Starting and Stopping Trace Experiments.
4044 * traceback: Backtrace. (line 6)
4045 * tracepoint actions: Tracepoint Actions. (line 6)
4046 * tracepoint data, display: tdump. (line 6)
4047 * tracepoint deletion: Create and Delete Tracepoints.
4049 * tracepoint number: Create and Delete Tracepoints.
4051 * tracepoint packets: Tracepoint Packets. (line 6)
4052 * tracepoint pass count: Tracepoint Passcounts.
4054 * tracepoint variables: Tracepoint Variables.
4056 * tracepoints: Tracepoints. (line 6)
4057 * trailing underscore, in Fortran symbols: Fortran. (line 9)
4058 * translating between character sets: Character Sets. (line 6)
4059 * transpose-chars (C-t): Commands For Text. (line 30)
4060 * transpose-words (M-t): Commands For Text. (line 36)
4061 * tstart: Starting and Stopping Trace Experiments.
4063 * tstatus: Starting and Stopping Trace Experiments.
4065 * tstop: Starting and Stopping Trace Experiments.
4067 * tty: Input/Output. (line 23)
4068 * TUI: TUI. (line 6)
4069 * TUI commands: TUI Commands. (line 6)
4070 * TUI configuration variables: TUI Configuration. (line 6)
4071 * TUI key bindings: TUI Keys. (line 6)
4072 * tui reg: TUI Commands. (line 55)
4073 * TUI single key mode: TUI Single Key Mode. (line 6)
4074 * type casting memory: Expressions. (line 42)
4075 * type chain of a data type: Maintenance Commands.
4077 * type checking: Checks. (line 31)
4078 * type conversions in C++: C Plus Plus Expressions.
4080 * u (SingleKey TUI key): TUI Single Key Mode. (line 31)
4081 * u (until): Continuing and Stepping.
4083 * UDP port, target remote: Connecting. (line 49)
4084 * undisplay: Auto Display. (line 45)
4085 * undo (C-_ or C-x C-u): Miscellaneous Commands.
4087 * unions in structures, printing: Print Settings. (line 234)
4088 * universal-argument (): Numeric Arguments. (line 10)
4089 * unix-filename-rubout (): Commands For Killing.
4091 * unix-line-discard (C-u): Commands For Killing.
4093 * unix-word-rubout (C-w): Commands For Killing.
4095 * unknown address, locating: Output Formats. (line 35)
4096 * unlink, file-i/o system call: unlink. (line 6)
4097 * unlinked object files: Files. (line 26)
4098 * unload symbols from shared libraries: Files. (line 339)
4099 * unmap an overlay: Overlay Commands. (line 39)
4100 * unmapped overlays: How Overlays Work. (line 6)
4101 * unset environment: Environment. (line 55)
4102 * unset substitute-path: Source Path. (line 143)
4103 * unset tdesc filename: Retrieving Descriptions.
4105 * unsupported languages: Unsupported Languages.
4107 * until: Continuing and Stepping.
4109 * unwind stack in called functions: Calling. (line 26)
4110 * Up: TUI Keys. (line 53)
4111 * up: Selection. (line 35)
4112 * up-silently: Selection. (line 64)
4113 * upcase-word (M-u): Commands For Text. (line 41)
4114 * update: TUI Commands. (line 70)
4115 * upload, M32R: M32R/D. (line 34)
4116 * use only software watchpoints: Set Watchpoints. (line 66)
4117 * use_dbt_break: M32R/D. (line 64)
4118 * use_debug_dma: M32R/D. (line 53)
4119 * use_ib_break: M32R/D. (line 61)
4120 * use_mon_code: M32R/D. (line 57)
4121 * user-defined command: Define. (line 6)
4122 * user-defined macros: Macros. (line 54)
4123 * user-defined variables: Convenience Vars. (line 6)
4124 * v (SingleKey TUI key): TUI Single Key Mode. (line 34)
4125 * value history: Value History. (line 6)
4126 * value optimized out, in backtrace: Backtrace. (line 65)
4127 * variable name conflict: Variables. (line 36)
4128 * variable object debugging info: Debugging Output. (line 122)
4129 * variable objects in GDB/MI: GDB/MI Variable Objects.
4131 * variable values, wrong: Variables. (line 58)
4132 * variables, readline: Readline Init File Syntax.
4134 * variables, setting: Assignment. (line 16)
4135 * vAttach packet: Packets. (line 274)
4136 * vCont packet: Packets. (line 289)
4137 * vCont? packet: Packets. (line 315)
4138 * vector unit: Vector Unit. (line 6)
4139 * vector, auxiliary: OS Information. (line 21)
4140 * verbose operation: Messages/Warnings. (line 6)
4141 * verify remote memory image: Memory. (line 105)
4142 * vFile packet: Packets. (line 326)
4143 * vFlashDone packet: Packets. (line 369)
4144 * vFlashErase packet: Packets. (line 330)
4145 * vFlashWrite packet: Packets. (line 347)
4146 * virtual functions (C++) display: Print Settings. (line 362)
4147 * visible-stats: Readline Init File Syntax.
4149 * vRun packet: Packets. (line 377)
4150 * VTBL display: Print Settings. (line 362)
4151 * VxWorks: VxWorks. (line 6)
4152 * vxworks-timeout: VxWorks. (line 23)
4153 * w (SingleKey TUI key): TUI Single Key Mode. (line 37)
4154 * watch: Set Watchpoints. (line 33)
4155 * watchdog timer: Maintenance Commands.
4157 * watchpoint annotation: Annotations for Running.
4159 * watchpoints: Breakpoints. (line 20)
4160 * watchpoints and threads: Set Watchpoints. (line 149)
4161 * weak alias functions: Calling. (line 36)
4162 * whatis: Symbols. (line 66)
4163 * where: Backtrace. (line 34)
4164 * where to look for shared libraries: Files. (line 364)
4165 * while: Command Files. (line 67)
4166 * while-stepping (tracepoints): Tracepoint Actions. (line 67)
4167 * wild pointer, interpreting: Print Settings. (line 79)
4168 * winheight: TUI Commands. (line 74)
4169 * word completion: Completion. (line 6)
4170 * working directory: Source Path. (line 99)
4171 * working directory (of your program): Working Directory. (line 6)
4172 * working language: Languages. (line 13)
4173 * write data into object, remote request: General Query Packets.
4175 * write, file-i/o system call: write. (line 6)
4176 * writing into corefiles: Patching. (line 6)
4177 * writing into executables: Patching. (line 6)
4178 * wrong values: Variables. (line 58)
4179 * x (examine memory): Memory. (line 9)
4180 * x command, default address: Machine Code. (line 29)
4181 * X packet: Packets. (line 394)
4182 * x(examine), and info line: Machine Code. (line 29)
4183 * x86 hardware debug registers: Maintenance Commands.
4185 * XInclude: Target Description Format.
4187 * XML parser debugging: Debugging Output. (line 130)
4188 * yank (C-y): Commands For Killing.
4190 * yank-last-arg (M-. or M-_): Commands For History.
4192 * yank-nth-arg (M-C-y): Commands For History.
4194 * yank-pop (M-y): Commands For Killing.
4196 * yanking text: Readline Killing Commands.
4198 * z packet: Packets. (line 407)
4199 * Z packets: Packets. (line 407)
4200 * Z0 packet: Packets. (line 422)
4201 * z0 packet: Packets. (line 422)
4202 * Z1 packet: Packets. (line 448)
4203 * z1 packet: Packets. (line 448)
4204 * Z2 packet: Packets. (line 469)
4205 * z2 packet: Packets. (line 469)
4206 * Z3 packet: Packets. (line 483)
4207 * z3 packet: Packets. (line 483)
4208 * Z4 packet: Packets. (line 497)
4209 * z4 packet: Packets. (line 497)
4210 * Z8000: Z8000. (line 6)
4211 * Zilog Z8000 simulator: Z8000. (line 6)
4212 * {TYPE}: Expressions. (line 42)