20.3.14. Zilog Z8000 ................................................................................................ 179
20.4. Architectures................................................................................................................ 180
20.4.1. A29K............................................................................................................. 180
20.4.2. Alpha............................................................................................................. 180
20.4.3. MIPS ............................................................................................................. 180
21. Controlling gdb ......................................................................................................................... 181
21.1. Prompt.......................................................................................................................... 181
21.2. Command editing......................................................................................................... 181
21.3. Command history......................................................................................................... 181
21.4. Screen size ................................................................................................................... 183
21.5. Numbers....................................................................................................................... 183
21.6. Configuring the current ABI ........................................................................................ 184
21.7. Optional warnings and messages................................................................................. 185
21.8. Optional messages about internal happenings ............................................................. 186
22. Canned Sequences of Commands............................................................................................ 189
22.1. User-defined commands............................................................................................... 189
22.2. User-defined command hooks...................................................................................... 190
22.3. Command files ............................................................................................................. 191
22.4. Commands for controlled output ................................................................................. 192
23. Command Interpreters............................................................................................................. 195
24. gdb Text User Interface ............................................................................................................ 197
24.1. TUI overview ............................................................................................................... 197
24.2. TUI Key Bindings........................................................................................................ 198
24.3. TUI Single Key Mode.................................................................................................. 200
24.4. TUI specific commands ............................................................................................... 200
24.5. TUI configuration variables ......................................................................................... 201
25. Using gdb under gnu Emacs .................................................................................................... 203
26. The gdb/mi Interface ................................................................................................................ 207
26.1. Function and Purpose................................................................................................... 207
26.2. Notation and Terminology ........................................................................................... 207
26.3. Acknowledgments........................................................................................................ 207
26.4. gdb/mi Command Syntax ............................................................................................ 207
26.4.1. gdb/mi Input Syntax...................................................................................... 207
26.4.2. gdb/mi Output Syntax................................................................................... 208
26.4.3. Simple Examples of gdb/mi Interaction ....................................................... 210
26.5. gdb/mi Compatibility with CLI ................................................................................... 211
26.6. gdb/mi Output Records................................................................................................ 211
26.6.1. gdb/mi Result Records.................................................................................. 211
26.6.2. gdb/mi Stream Records................................................................................. 212
26.6.3. gdb/mi Out-of-band Records ........................................................................ 212
26.7. gdb/mi Command Description Format ........................................................................ 212
26.7.1. Motivation..................................................................................................... 212
26.7.2. Introduction................................................................................................... 213
26.7.3. Commands .................................................................................................... 213
26.8. gdb/mi Breakpoint table commands ............................................................................ 213
26.8.1. The
-break-after
Command..................................................................... 213
26.8.2. The
-break-condition
Command ............................................................ 214
26.8.3. The
-break-delete
Command................................................................... 215
26.8.4. The
-break-disable
Command ................................................................ 216
26.8.5. The
-break-enable
Command................................................................... 216
26.8.6. The
-break-info
Command....................................................................... 217
26.8.7. The
-break-insert
Command................................................................... 217
26.8.8. The
-break-list
Command....................................................................... 219
Summary of Contents for ENTERPRISE LINUX 3 - SECURITY GUIDE
Page 1: ...Red Hat Enterprise Linux 3 Debugging with gdb ...
Page 12: ...2 Chapter 1 Debugging with gdb ...
Page 28: ...18 Chapter 4 Getting In and Out of gdb ...
Page 34: ...24 Chapter 5 gdb Commands ...
Page 44: ...34 Chapter 6 Running Programs Under gdb ...
Page 68: ...58 Chapter 8 Examining the Stack ...
Page 98: ...88 Chapter 10 Examining Data ...
Page 112: ...102 Chapter 12 Tracepoints ...
Page 118: ...108 Chapter 13 Debugging Programs That Use Overlays ...
Page 138: ...128 Chapter 14 Using gdb with Different Languages ...
Page 144: ...134 Chapter 15 Examining the Symbol Table ...
Page 170: ...160 Chapter 19 Debugging remote programs ...
Page 198: ...188 Chapter 21 Controlling gdb ...
Page 204: ...194 Chapter 22 Canned Sequences of Commands ...
Page 206: ...196 Chapter 23 Command Interpreters ...
Page 216: ...206 Chapter 25 Using gdb under gnu Emacs ...
Page 296: ...286 Chapter 27 gdb Annotations ...
Page 300: ...290 Chapter 28 Reporting Bugs in gdb ...
Page 322: ...312 Chapter 30 Using History Interactively ...
Page 362: ...352 Appendix D gdb Remote Serial Protocol ...
Page 380: ...370 Appendix F GNU GENERAL PUBLIC LICENSE ...
Page 386: ...376 Appendix G GNU Free Documentation License ...
Page 410: ......