328
Appendix D. gdb Remote Serial Protocol
V
-- reserved
Reserved for future use.
w
-- reserved
Reserved for future use.
W
-- reserved
Reserved for future use.
x
-- reserved
Reserved for future use.
Xaddr,length:XX...
-- write mem (binary)
addr
is address,
length
is number of bytes,
XX...
is binary data. The characters
$
,
#
, and
0x7d
are escaped using
0x7d
.
Reply:
OK
for success
E
NN
for an error
y
-- reserved
Reserved for future use.
Y
reserved
Reserved for future use.
ztype,addr,length
-- remove breakpoint or watchpoint
(draft)
Ztype,addr,length
-- insert breakpoint or watchpoint
(draft)
Insert (
Z
) or remove (
z
) a
type
breakpoint or watchpoint starting at address
address
and
covering the next
length
bytes.
Each breakpoint and watchpoint packet
type
is documented separately.
Implementation notes: A remote target shall return an empty string for an unrecognized break-
point or watchpoint packet
type
. A remote target shall support either both or neither of a given
Ztype
. . . and
ztype
. . . packet pair. To avoid potential problems with duplicate packets, the
operations should be implemented in an idempotent way.
z0,addr,length
-- remove memory breakpoint
(draft)
Z0,addr,length
-- insert memory breakpoint
(draft)
Insert (
Z0
) or remove (
z0
) a memory breakpoint at address
addr
of size
length
.
A memory breakpoint is implemented by replacing the instruction at
addr
with a software break-
point or trap instruction. The
length
is used by targets that indicates the size of the breakpoint
(in bytes) that should be inserted (e.g., the arm and mips can insert either a 2 or 4 byte break-
point).
Summary of Contents for ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Page 1: ...Red Hat Enterprise Linux 4 Debugging with gdb ...
Page 12: ...2 Chapter 1 Debugging with gdb ...
Page 28: ...18 Chapter 4 Getting In and Out of gdb ...
Page 34: ...24 Chapter 5 gdb Commands ...
Page 44: ...34 Chapter 6 Running Programs Under gdb ...
Page 68: ...58 Chapter 8 Examining the Stack ...
Page 98: ...88 Chapter 10 Examining Data ...
Page 112: ...102 Chapter 12 Tracepoints ...
Page 118: ...108 Chapter 13 Debugging Programs That Use Overlays ...
Page 138: ...128 Chapter 14 Using gdb with Different Languages ...
Page 144: ...134 Chapter 15 Examining the Symbol Table ...
Page 170: ...160 Chapter 19 Debugging remote programs ...
Page 198: ...188 Chapter 21 Controlling gdb ...
Page 204: ...194 Chapter 22 Canned Sequences of Commands ...
Page 206: ...196 Chapter 23 Command Interpreters ...
Page 216: ...206 Chapter 25 Using gdb under gnu Emacs ...
Page 296: ...286 Chapter 27 gdb Annotations ...
Page 300: ...290 Chapter 28 Reporting Bugs in gdb ...
Page 322: ...312 Chapter 30 Using History Interactively ...
Page 362: ...352 Appendix D gdb Remote Serial Protocol ...
Page 380: ...370 Appendix F GNU GENERAL PUBLIC LICENSE ...
Page 386: ...376 Appendix G GNU Free Documentation License ...
Page 410: ......