Chapter 29. Command Line Editing
305
backward-kill-word (M-[DEL])
Kill the word behind point. Word boundaries are the same as
backward-word
.
unix-word-rubout (C-w)
Kill the word behind point, using white space as a word boundary. The killed text is saved on the
kill-ring.
delete-horizontal-space ()
Delete all spaces and tabs around point. By default, this is unbound.
kill-region ()
Kill the text in the current region. By default, this command is unbound.
copy-region-as-kill ()
Copy the text in the region to the kill buffer, so it can be yanked right away. By default, this
command is unbound.
copy-backward-word ()
Copy the word before point to the kill buffer. The word boundaries are the same as
backward-word
. By default, this command is unbound.
copy-forward-word ()
Copy the word following point to the kill buffer. The word boundaries are the same as
forward-word
. By default, this command is unbound.
yank (C-y)
Yank the top of the kill ring into the buffer at point.
yank-pop (M-y)
Rotate the kill-ring, and yank the new top. You can only do this if the prior command is
yank
or
yank-pop
.
29.4.5. Specifying Numeric Arguments
digit-argument (
M-0
,
M-1
, ...
M-
)
Add this digit to the argument already accumulating, or start a new argument.
M-
starts a negative
argument.
universal-argument ()
This is another way to specify an argument. If this command is followed by one or more dig-
its, optionally with a leading minus sign, those digits define the argument. If the command is
followed by digits, executing
universal-argument
again ends the numeric argument, but is
otherwise ignored. As a special case, if this command is immediately followed by a character that
is neither a digit or minus sign, the argument count for the next command is multiplied by four.
The argument count is initially one, so executing this function the first time makes the argument
count four, a second time makes the argument count sixteen, and so on. By default, this is not
bound to a key.
Содержание ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Страница 1: ...Red Hat Enterprise Linux 4 Debugging with gdb ...
Страница 12: ...2 Chapter 1 Debugging with gdb ...
Страница 28: ...18 Chapter 4 Getting In and Out of gdb ...
Страница 34: ...24 Chapter 5 gdb Commands ...
Страница 44: ...34 Chapter 6 Running Programs Under gdb ...
Страница 68: ...58 Chapter 8 Examining the Stack ...
Страница 98: ...88 Chapter 10 Examining Data ...
Страница 112: ...102 Chapter 12 Tracepoints ...
Страница 118: ...108 Chapter 13 Debugging Programs That Use Overlays ...
Страница 138: ...128 Chapter 14 Using gdb with Different Languages ...
Страница 144: ...134 Chapter 15 Examining the Symbol Table ...
Страница 170: ...160 Chapter 19 Debugging remote programs ...
Страница 198: ...188 Chapter 21 Controlling gdb ...
Страница 204: ...194 Chapter 22 Canned Sequences of Commands ...
Страница 206: ...196 Chapter 23 Command Interpreters ...
Страница 216: ...206 Chapter 25 Using gdb under gnu Emacs ...
Страница 296: ...286 Chapter 27 gdb Annotations ...
Страница 300: ...290 Chapter 28 Reporting Bugs in gdb ...
Страница 322: ...312 Chapter 30 Using History Interactively ...
Страница 362: ...352 Appendix D gdb Remote Serial Protocol ...
Страница 380: ...370 Appendix F GNU GENERAL PUBLIC LICENSE ...
Страница 386: ...376 Appendix G GNU Free Documentation License ...
Страница 410: ......