348
Appendix D. gdb Remote Serial Protocol
which is a pointer to data of length 18 bytes at position 0x1aaf. The length is defined as the full string
length in bytes, including the trailing null byte. Example:
“hello, world” at address 0x123456
is transmitted as
123456/d
D.7.11.3. struct stat
The buffer of type struct stat used by the target and gdb is defined as follows:
struct stat {
unsigned int
st_dev;
/* device */
unsigned int
st_ino;
/* inode */
mode_t
st_mode;
/* protection */
unsigned int
st_nlink;
/* number of hard links */
unsigned int
st_uid;
/* user ID of owner */
unsigned int
st_gid;
/* group ID of owner */
unsigned int
st_rdev;
/* device type (if inode device) */
unsigned long st_size;
/* total size, in bytes */
unsigned long st_blksize;
/* blocksize for filesystem I/O */
unsigned long st_blocks;
/* number of blocks allocated */
time_t
st_atime;
/* time of last access */
time_t
st_mtime;
/* time of last modification */
time_t
st_ctime;
/* time of last change */
};
The integral datatypes are conforming to the definitions given in the approriate section ((refer to
Section D.7.11.1
Integral datatypes
, for details) so this structure is of size 64 bytes.
The values of several fields have a restricted meaning and/or range of values.
st_dev:
0
file
1
console
st_ino:
No valid meaning for the target.
Transmitted unchanged.
st_mode:
Valid mode bits are described in Appendix C.
Any other
bits have currently no meaning for the target.
st_uid:
No valid meaning for the target.
Transmitted unchanged.
st_gid:
No valid meaning for the target.
Transmitted unchanged.
st_rdev:
No valid meaning for the target.
Transmitted unchanged.
st_atime, st_mtime, st_ctime:
These values have a host and file system dependent
accuracy.
Especially on Windows hosts the file systems
don’t support exact timing values.
Summary of Contents for ENTERPRISE LINUX 3 - SECURITY GUIDE
Page 1: ...Red Hat Enterprise Linux 3 Debugging with gdb ...
Page 12: ...2 Chapter 1 Debugging with gdb ...
Page 28: ...18 Chapter 4 Getting In and Out of gdb ...
Page 34: ...24 Chapter 5 gdb Commands ...
Page 44: ...34 Chapter 6 Running Programs Under gdb ...
Page 68: ...58 Chapter 8 Examining the Stack ...
Page 98: ...88 Chapter 10 Examining Data ...
Page 112: ...102 Chapter 12 Tracepoints ...
Page 118: ...108 Chapter 13 Debugging Programs That Use Overlays ...
Page 138: ...128 Chapter 14 Using gdb with Different Languages ...
Page 144: ...134 Chapter 15 Examining the Symbol Table ...
Page 170: ...160 Chapter 19 Debugging remote programs ...
Page 198: ...188 Chapter 21 Controlling gdb ...
Page 204: ...194 Chapter 22 Canned Sequences of Commands ...
Page 206: ...196 Chapter 23 Command Interpreters ...
Page 216: ...206 Chapter 25 Using gdb under gnu Emacs ...
Page 296: ...286 Chapter 27 gdb Annotations ...
Page 300: ...290 Chapter 28 Reporting Bugs in gdb ...
Page 322: ...312 Chapter 30 Using History Interactively ...
Page 362: ...352 Appendix D gdb Remote Serial Protocol ...
Page 380: ...370 Appendix F GNU GENERAL PUBLIC LICENSE ...
Page 386: ...376 Appendix G GNU Free Documentation License ...
Page 410: ......