a259cc2ba7
- testsuite: Fix false MI "unknown output after running" regression. - testsuite: Update ia64-sigtramp.exp for recent GDB. - Implement bt-clone-stop.exp fix also for ia64. - testsuite: Upstream condbreak.exp results stability fix (Daniel Jacobowitz).
3286 lines
145 KiB
Diff
3286 lines
145 KiB
Diff
--- a/gdb/COPYING
|
||
+++ b/gdb/COPYING
|
||
@@ -1,286 +1,626 @@
|
||
- GNU GENERAL PUBLIC LICENSE
|
||
- Version 2, June 1991
|
||
+ GNU GENERAL PUBLIC LICENSE
|
||
+ Version 3, 29 June 2007
|
||
|
||
- Copyright (C) 1989, 1991 Free Software Foundation, Inc.
|
||
- 51 Franklin Street, Fifth Floor,
|
||
- Boston, MA 02110-1301, USA
|
||
+ Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||
Everyone is permitted to copy and distribute verbatim copies
|
||
of this license document, but changing it is not allowed.
|
||
|
||
- Preamble
|
||
+ Preamble
|
||
|
||
- The licenses for most software are designed to take away your
|
||
-freedom to share and change it. By contrast, the GNU General Public
|
||
-License is intended to guarantee your freedom to share and change free
|
||
-software--to make sure the software is free for all its users. This
|
||
-General Public License applies to most of the Free Software
|
||
-Foundation's software and to any other program whose authors commit to
|
||
-using it. (Some other Free Software Foundation software is covered by
|
||
-the GNU Library General Public License instead.) You can apply it to
|
||
+ The GNU General Public License is a free, copyleft license for
|
||
+software and other kinds of works.
|
||
+
|
||
+ The licenses for most software and other practical works are designed
|
||
+to take away your freedom to share and change the works. By contrast,
|
||
+the GNU General Public License is intended to guarantee your freedom to
|
||
+share and change all versions of a program--to make sure it remains free
|
||
+software for all its users. We, the Free Software Foundation, use the
|
||
+GNU General Public License for most of our software; it applies also to
|
||
+any other work released this way by its authors. You can apply it to
|
||
your programs, too.
|
||
|
||
When we speak of free software, we are referring to freedom, not
|
||
price. Our General Public Licenses are designed to make sure that you
|
||
have the freedom to distribute copies of free software (and charge for
|
||
-this service if you wish), that you receive source code or can get it
|
||
-if you want it, that you can change the software or use pieces of it
|
||
-in new free programs; and that you know you can do these things.
|
||
+them if you wish), that you receive source code or can get it if you
|
||
+want it, that you can change the software or use pieces of it in new
|
||
+free programs, and that you know you can do these things.
|
||
|
||
- To protect your rights, we need to make restrictions that forbid
|
||
-anyone to deny you these rights or to ask you to surrender the rights.
|
||
-These restrictions translate to certain responsibilities for you if you
|
||
-distribute copies of the software, or if you modify it.
|
||
+ To protect your rights, we need to prevent others from denying you
|
||
+these rights or asking you to surrender the rights. Therefore, you have
|
||
+certain responsibilities if you distribute copies of the software, or if
|
||
+you modify it: responsibilities to respect the freedom of others.
|
||
|
||
For example, if you distribute copies of such a program, whether
|
||
-gratis or for a fee, you must give the recipients all the rights that
|
||
-you have. You must make sure that they, too, receive or can get the
|
||
-source code. And you must show them these terms so they know their
|
||
-rights.
|
||
-
|
||
- We protect your rights with two steps: (1) copyright the software, and
|
||
-(2) offer you this license which gives you legal permission to copy,
|
||
-distribute and/or modify the software.
|
||
-
|
||
- Also, for each author's protection and ours, we want to make certain
|
||
-that everyone understands that there is no warranty for this free
|
||
-software. If the software is modified by someone else and passed on, we
|
||
-want its recipients to know that what they have is not the original, so
|
||
-that any problems introduced by others will not reflect on the original
|
||
-authors' reputations.
|
||
-
|
||
- Finally, any free program is threatened constantly by software
|
||
-patents. We wish to avoid the danger that redistributors of a free
|
||
-program will individually obtain patent licenses, in effect making the
|
||
-program proprietary. To prevent this, we have made it clear that any
|
||
-patent must be licensed for everyone's free use or not licensed at all.
|
||
+gratis or for a fee, you must pass on to the recipients the same
|
||
+freedoms that you received. You must make sure that they, too, receive
|
||
+or can get the source code. And you must show them these terms so they
|
||
+know their rights.
|
||
+
|
||
+ Developers that use the GNU GPL protect your rights with two steps:
|
||
+(1) assert copyright on the software, and (2) offer you this License
|
||
+giving you legal permission to copy, distribute and/or modify it.
|
||
+
|
||
+ For the developers' and authors' protection, the GPL clearly explains
|
||
+that there is no warranty for this free software. For both users' and
|
||
+authors' sake, the GPL requires that modified versions be marked as
|
||
+changed, so that their problems will not be attributed erroneously to
|
||
+authors of previous versions.
|
||
+
|
||
+ Some devices are designed to deny users access to install or run
|
||
+modified versions of the software inside them, although the manufacturer
|
||
+can do so. This is fundamentally incompatible with the aim of
|
||
+protecting users' freedom to change the software. The systematic
|
||
+pattern of such abuse occurs in the area of products for individuals to
|
||
+use, which is precisely where it is most unacceptable. Therefore, we
|
||
+have designed this version of the GPL to prohibit the practice for those
|
||
+products. If such problems arise substantially in other domains, we
|
||
+stand ready to extend this provision to those domains in future versions
|
||
+of the GPL, as needed to protect the freedom of users.
|
||
+
|
||
+ Finally, every program is threatened constantly by software patents.
|
||
+States should not allow patents to restrict development and use of
|
||
+software on general-purpose computers, but in those that do, we wish to
|
||
+avoid the special danger that patents applied to a free program could
|
||
+make it effectively proprietary. To prevent this, the GPL assures that
|
||
+patents cannot be used to render the program non-free.
|
||
|
||
The precise terms and conditions for copying, distribution and
|
||
modification follow.
|
||
-
|
||
- GNU GENERAL PUBLIC LICENSE
|
||
- TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
||
-
|
||
- 0. This License applies to any program or other work which contains
|
||
-a notice placed by the copyright holder saying it may be distributed
|
||
-under the terms of this General Public License. The "Program", below,
|
||
-refers to any such program or work, and a "work based on the Program"
|
||
-means either the Program or any derivative work under copyright law:
|
||
-that is to say, a work containing the Program or a portion of it,
|
||
-either verbatim or with modifications and/or translated into another
|
||
-language. (Hereinafter, translation is included without limitation in
|
||
-the term "modification".) Each licensee is addressed as "you".
|
||
-
|
||
-Activities other than copying, distribution and modification are not
|
||
-covered by this License; they are outside its scope. The act of
|
||
-running the Program is not restricted, and the output from the Program
|
||
-is covered only if its contents constitute a work based on the
|
||
-Program (independent of having been made by running the Program).
|
||
-Whether that is true depends on what the Program does.
|
||
-
|
||
- 1. You may copy and distribute verbatim copies of the Program's
|
||
-source code as you receive it, in any medium, provided that you
|
||
-conspicuously and appropriately publish on each copy an appropriate
|
||
-copyright notice and disclaimer of warranty; keep intact all the
|
||
-notices that refer to this License and to the absence of any warranty;
|
||
-and give any other recipients of the Program a copy of this License
|
||
-along with the Program.
|
||
-
|
||
-You may charge a fee for the physical act of transferring a copy, and
|
||
-you may at your option offer warranty protection in exchange for a fee.
|
||
-
|
||
- 2. You may modify your copy or copies of the Program or any portion
|
||
-of it, thus forming a work based on the Program, and copy and
|
||
-distribute such modifications or work under the terms of Section 1
|
||
-above, provided that you also meet all of these conditions:
|
||
-
|
||
- a) You must cause the modified files to carry prominent notices
|
||
- stating that you changed the files and the date of any change.
|
||
-
|
||
- b) You must cause any work that you distribute or publish, that in
|
||
- whole or in part contains or is derived from the Program or any
|
||
- part thereof, to be licensed as a whole at no charge to all third
|
||
- parties under the terms of this License.
|
||
-
|
||
- c) If the modified program normally reads commands interactively
|
||
- when run, you must cause it, when started running for such
|
||
- interactive use in the most ordinary way, to print or display an
|
||
- announcement including an appropriate copyright notice and a
|
||
- notice that there is no warranty (or else, saying that you provide
|
||
- a warranty) and that users may redistribute the program under
|
||
- these conditions, and telling the user how to view a copy of this
|
||
- License. (Exception: if the Program itself is interactive but
|
||
- does not normally print such an announcement, your work based on
|
||
- the Program is not required to print an announcement.)
|
||
-
|
||
-These requirements apply to the modified work as a whole. If
|
||
-identifiable sections of that work are not derived from the Program,
|
||
-and can be reasonably considered independent and separate works in
|
||
-themselves, then this License, and its terms, do not apply to those
|
||
-sections when you distribute them as separate works. But when you
|
||
-distribute the same sections as part of a whole which is a work based
|
||
-on the Program, the distribution of the whole must be on the terms of
|
||
-this License, whose permissions for other licensees extend to the
|
||
-entire whole, and thus to each and every part regardless of who wrote it.
|
||
-
|
||
-Thus, it is not the intent of this section to claim rights or contest
|
||
-your rights to work written entirely by you; rather, the intent is to
|
||
-exercise the right to control the distribution of derivative or
|
||
-collective works based on the Program.
|
||
-
|
||
-In addition, mere aggregation of another work not based on the Program
|
||
-with the Program (or with a work based on the Program) on a volume of
|
||
-a storage or distribution medium does not bring the other work under
|
||
-the scope of this License.
|
||
-
|
||
- 3. You may copy and distribute the Program (or a work based on it,
|
||
-under Section 2) in object code or executable form under the terms of
|
||
-Sections 1 and 2 above provided that you also do one of the following:
|
||
-
|
||
- a) Accompany it with the complete corresponding machine-readable
|
||
- source code, which must be distributed under the terms of Sections
|
||
- 1 and 2 above on a medium customarily used for software interchange; or,
|
||
-
|
||
- b) Accompany it with a written offer, valid for at least three
|
||
- years, to give any third party, for a charge no more than your
|
||
- cost of physically performing source distribution, a complete
|
||
- machine-readable copy of the corresponding source code, to be
|
||
- distributed under the terms of Sections 1 and 2 above on a medium
|
||
- customarily used for software interchange; or,
|
||
-
|
||
- c) Accompany it with the information you received as to the offer
|
||
- to distribute corresponding source code. (This alternative is
|
||
- allowed only for noncommercial distribution and only if you
|
||
- received the program in object code or executable form with such
|
||
- an offer, in accord with Subsection b above.)
|
||
-
|
||
-The source code for a work means the preferred form of the work for
|
||
-making modifications to it. For an executable work, complete source
|
||
-code means all the source code for all modules it contains, plus any
|
||
-associated interface definition files, plus the scripts used to
|
||
-control compilation and installation of the executable. However, as a
|
||
-special exception, the source code distributed need not include
|
||
-anything that is normally distributed (in either source or binary
|
||
-form) with the major components (compiler, kernel, and so on) of the
|
||
-operating system on which the executable runs, unless that component
|
||
-itself accompanies the executable.
|
||
-
|
||
-If distribution of executable or object code is made by offering
|
||
-access to copy from a designated place, then offering equivalent
|
||
-access to copy the source code from the same place counts as
|
||
-distribution of the source code, even though third parties are not
|
||
-compelled to copy the source along with the object code.
|
||
-
|
||
- 4. You may not copy, modify, sublicense, or distribute the Program
|
||
-except as expressly provided under this License. Any attempt
|
||
-otherwise to copy, modify, sublicense or distribute the Program is
|
||
-void, and will automatically terminate your rights under this License.
|
||
-However, parties who have received copies, or rights, from you under
|
||
-this License will not have their licenses terminated so long as such
|
||
-parties remain in full compliance.
|
||
-
|
||
- 5. You are not required to accept this License, since you have not
|
||
-signed it. However, nothing else grants you permission to modify or
|
||
-distribute the Program or its derivative works. These actions are
|
||
-prohibited by law if you do not accept this License. Therefore, by
|
||
-modifying or distributing the Program (or any work based on the
|
||
-Program), you indicate your acceptance of this License to do so, and
|
||
-all its terms and conditions for copying, distributing or modifying
|
||
-the Program or works based on it.
|
||
-
|
||
- 6. Each time you redistribute the Program (or any work based on the
|
||
-Program), the recipient automatically receives a license from the
|
||
-original licensor to copy, distribute or modify the Program subject to
|
||
-these terms and conditions. You may not impose any further
|
||
-restrictions on the recipients' exercise of the rights granted herein.
|
||
-You are not responsible for enforcing compliance by third parties to
|
||
+
|
||
+ TERMS AND CONDITIONS
|
||
+
|
||
+ 0. Definitions.
|
||
+
|
||
+ "This License" refers to version 3 of the GNU General Public License.
|
||
+
|
||
+ "Copyright" also means copyright-like laws that apply to other kinds of
|
||
+works, such as semiconductor masks.
|
||
+
|
||
+ "The Program" refers to any copyrightable work licensed under this
|
||
+License. Each licensee is addressed as "you". "Licensees" and
|
||
+"recipients" may be individuals or organizations.
|
||
+
|
||
+ To "modify" a work means to copy from or adapt all or part of the work
|
||
+in a fashion requiring copyright permission, other than the making of an
|
||
+exact copy. The resulting work is called a "modified version" of the
|
||
+earlier work or a work "based on" the earlier work.
|
||
+
|
||
+ A "covered work" means either the unmodified Program or a work based
|
||
+on the Program.
|
||
+
|
||
+ To "propagate" a work means to do anything with it that, without
|
||
+permission, would make you directly or secondarily liable for
|
||
+infringement under applicable copyright law, except executing it on a
|
||
+computer or modifying a private copy. Propagation includes copying,
|
||
+distribution (with or without modification), making available to the
|
||
+public, and in some countries other activities as well.
|
||
+
|
||
+ To "convey" a work means any kind of propagation that enables other
|
||
+parties to make or receive copies. Mere interaction with a user through
|
||
+a computer network, with no transfer of a copy, is not conveying.
|
||
+
|
||
+ An interactive user interface displays "Appropriate Legal Notices"
|
||
+to the extent that it includes a convenient and prominently visible
|
||
+feature that (1) displays an appropriate copyright notice, and (2)
|
||
+tells the user that there is no warranty for the work (except to the
|
||
+extent that warranties are provided), that licensees may convey the
|
||
+work under this License, and how to view a copy of this License. If
|
||
+the interface presents a list of user commands or options, such as a
|
||
+menu, a prominent item in the list meets this criterion.
|
||
+
|
||
+ 1. Source Code.
|
||
+
|
||
+ The "source code" for a work means the preferred form of the work
|
||
+for making modifications to it. "Object code" means any non-source
|
||
+form of a work.
|
||
+
|
||
+ A "Standard Interface" means an interface that either is an official
|
||
+standard defined by a recognized standards body, or, in the case of
|
||
+interfaces specified for a particular programming language, one that
|
||
+is widely used among developers working in that language.
|
||
+
|
||
+ The "System Libraries" of an executable work include anything, other
|
||
+than the work as a whole, that (a) is included in the normal form of
|
||
+packaging a Major Component, but which is not part of that Major
|
||
+Component, and (b) serves only to enable use of the work with that
|
||
+Major Component, or to implement a Standard Interface for which an
|
||
+implementation is available to the public in source code form. A
|
||
+"Major Component", in this context, means a major essential component
|
||
+(kernel, window system, and so on) of the specific operating system
|
||
+(if any) on which the executable work runs, or a compiler used to
|
||
+produce the work, or an object code interpreter used to run it.
|
||
+
|
||
+ The "Corresponding Source" for a work in object code form means all
|
||
+the source code needed to generate, install, and (for an executable
|
||
+work) run the object code and to modify the work, including scripts to
|
||
+control those activities. However, it does not include the work's
|
||
+System Libraries, or general-purpose tools or generally available free
|
||
+programs which are used unmodified in performing those activities but
|
||
+which are not part of the work. For example, Corresponding Source
|
||
+includes interface definition files associated with source files for
|
||
+the work, and the source code for shared libraries and dynamically
|
||
+linked subprograms that the work is specifically designed to require,
|
||
+such as by intimate data communication or control flow between those
|
||
+subprograms and other parts of the work.
|
||
+
|
||
+ The Corresponding Source need not include anything that users
|
||
+can regenerate automatically from other parts of the Corresponding
|
||
+Source.
|
||
+
|
||
+ The Corresponding Source for a work in source code form is that
|
||
+same work.
|
||
+
|
||
+ 2. Basic Permissions.
|
||
+
|
||
+ All rights granted under this License are granted for the term of
|
||
+copyright on the Program, and are irrevocable provided the stated
|
||
+conditions are met. This License explicitly affirms your unlimited
|
||
+permission to run the unmodified Program. The output from running a
|
||
+covered work is covered by this License only if the output, given its
|
||
+content, constitutes a covered work. This License acknowledges your
|
||
+rights of fair use or other equivalent, as provided by copyright law.
|
||
+
|
||
+ You may make, run and propagate covered works that you do not
|
||
+convey, without conditions so long as your license otherwise remains
|
||
+in force. You may convey covered works to others for the sole purpose
|
||
+of having them make modifications exclusively for you, or provide you
|
||
+with facilities for running those works, provided that you comply with
|
||
+the terms of this License in conveying all material for which you do
|
||
+not control copyright. Those thus making or running the covered works
|
||
+for you must do so exclusively on your behalf, under your direction
|
||
+and control, on terms that prohibit them from making any copies of
|
||
+your copyrighted material outside their relationship with you.
|
||
+
|
||
+ Conveying under any other circumstances is permitted solely under
|
||
+the conditions stated below. Sublicensing is not allowed; section 10
|
||
+makes it unnecessary.
|
||
+
|
||
+ 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||
+
|
||
+ No covered work shall be deemed part of an effective technological
|
||
+measure under any applicable law fulfilling obligations under article
|
||
+11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||
+similar laws prohibiting or restricting circumvention of such
|
||
+measures.
|
||
+
|
||
+ When you convey a covered work, you waive any legal power to forbid
|
||
+circumvention of technological measures to the extent such circumvention
|
||
+is effected by exercising rights under this License with respect to
|
||
+the covered work, and you disclaim any intention to limit operation or
|
||
+modification of the work as a means of enforcing, against the work's
|
||
+users, your or third parties' legal rights to forbid circumvention of
|
||
+technological measures.
|
||
+
|
||
+ 4. Conveying Verbatim Copies.
|
||
+
|
||
+ You may convey verbatim copies of the Program's source code as you
|
||
+receive it, in any medium, provided that you conspicuously and
|
||
+appropriately publish on each copy an appropriate copyright notice;
|
||
+keep intact all notices stating that this License and any
|
||
+non-permissive terms added in accord with section 7 apply to the code;
|
||
+keep intact all notices of the absence of any warranty; and give all
|
||
+recipients a copy of this License along with the Program.
|
||
+
|
||
+ You may charge any price or no price for each copy that you convey,
|
||
+and you may offer support or warranty protection for a fee.
|
||
+
|
||
+ 5. Conveying Modified Source Versions.
|
||
+
|
||
+ You may convey a work based on the Program, or the modifications to
|
||
+produce it from the Program, in the form of source code under the
|
||
+terms of section 4, provided that you also meet all of these conditions:
|
||
+
|
||
+ a) The work must carry prominent notices stating that you modified
|
||
+ it, and giving a relevant date.
|
||
+
|
||
+ b) The work must carry prominent notices stating that it is
|
||
+ released under this License and any conditions added under section
|
||
+ 7. This requirement modifies the requirement in section 4 to
|
||
+ "keep intact all notices".
|
||
+
|
||
+ c) You must license the entire work, as a whole, under this
|
||
+ License to anyone who comes into possession of a copy. This
|
||
+ License will therefore apply, along with any applicable section 7
|
||
+ additional terms, to the whole of the work, and all its parts,
|
||
+ regardless of how they are packaged. This License gives no
|
||
+ permission to license the work in any other way, but it does not
|
||
+ invalidate such permission if you have separately received it.
|
||
+
|
||
+ d) If the work has interactive user interfaces, each must display
|
||
+ Appropriate Legal Notices; however, if the Program has interactive
|
||
+ interfaces that do not display Appropriate Legal Notices, your
|
||
+ work need not make them do so.
|
||
+
|
||
+ A compilation of a covered work with other separate and independent
|
||
+works, which are not by their nature extensions of the covered work,
|
||
+and which are not combined with it such as to form a larger program,
|
||
+in or on a volume of a storage or distribution medium, is called an
|
||
+"aggregate" if the compilation and its resulting copyright are not
|
||
+used to limit the access or legal rights of the compilation's users
|
||
+beyond what the individual works permit. Inclusion of a covered work
|
||
+in an aggregate does not cause this License to apply to the other
|
||
+parts of the aggregate.
|
||
+
|
||
+ 6. Conveying Non-Source Forms.
|
||
+
|
||
+ You may convey a covered work in object code form under the terms
|
||
+of sections 4 and 5, provided that you also convey the
|
||
+machine-readable Corresponding Source under the terms of this License,
|
||
+in one of these ways:
|
||
+
|
||
+ a) Convey the object code in, or embodied in, a physical product
|
||
+ (including a physical distribution medium), accompanied by the
|
||
+ Corresponding Source fixed on a durable physical medium
|
||
+ customarily used for software interchange.
|
||
+
|
||
+ b) Convey the object code in, or embodied in, a physical product
|
||
+ (including a physical distribution medium), accompanied by a
|
||
+ written offer, valid for at least three years and valid for as
|
||
+ long as you offer spare parts or customer support for that product
|
||
+ model, to give anyone who possesses the object code either (1) a
|
||
+ copy of the Corresponding Source for all the software in the
|
||
+ product that is covered by this License, on a durable physical
|
||
+ medium customarily used for software interchange, for a price no
|
||
+ more than your reasonable cost of physically performing this
|
||
+ conveying of source, or (2) access to copy the
|
||
+ Corresponding Source from a network server at no charge.
|
||
+
|
||
+ c) Convey individual copies of the object code with a copy of the
|
||
+ written offer to provide the Corresponding Source. This
|
||
+ alternative is allowed only occasionally and noncommercially, and
|
||
+ only if you received the object code with such an offer, in accord
|
||
+ with subsection 6b.
|
||
+
|
||
+ d) Convey the object code by offering access from a designated
|
||
+ place (gratis or for a charge), and offer equivalent access to the
|
||
+ Corresponding Source in the same way through the same place at no
|
||
+ further charge. You need not require recipients to copy the
|
||
+ Corresponding Source along with the object code. If the place to
|
||
+ copy the object code is a network server, the Corresponding Source
|
||
+ may be on a different server (operated by you or a third party)
|
||
+ that supports equivalent copying facilities, provided you maintain
|
||
+ clear directions next to the object code saying where to find the
|
||
+ Corresponding Source. Regardless of what server hosts the
|
||
+ Corresponding Source, you remain obligated to ensure that it is
|
||
+ available for as long as needed to satisfy these requirements.
|
||
+
|
||
+ e) Convey the object code using peer-to-peer transmission, provided
|
||
+ you inform other peers where the object code and Corresponding
|
||
+ Source of the work are being offered to the general public at no
|
||
+ charge under subsection 6d.
|
||
+
|
||
+ A separable portion of the object code, whose source code is excluded
|
||
+from the Corresponding Source as a System Library, need not be
|
||
+included in conveying the object code work.
|
||
+
|
||
+ A "User Product" is either (1) a "consumer product", which means any
|
||
+tangible personal property which is normally used for personal, family,
|
||
+or household purposes, or (2) anything designed or sold for incorporation
|
||
+into a dwelling. In determining whether a product is a consumer product,
|
||
+doubtful cases shall be resolved in favor of coverage. For a particular
|
||
+product received by a particular user, "normally used" refers to a
|
||
+typical or common use of that class of product, regardless of the status
|
||
+of the particular user or of the way in which the particular user
|
||
+actually uses, or expects or is expected to use, the product. A product
|
||
+is a consumer product regardless of whether the product has substantial
|
||
+commercial, industrial or non-consumer uses, unless such uses represent
|
||
+the only significant mode of use of the product.
|
||
+
|
||
+ "Installation Information" for a User Product means any methods,
|
||
+procedures, authorization keys, or other information required to install
|
||
+and execute modified versions of a covered work in that User Product from
|
||
+a modified version of its Corresponding Source. The information must
|
||
+suffice to ensure that the continued functioning of the modified object
|
||
+code is in no case prevented or interfered with solely because
|
||
+modification has been made.
|
||
+
|
||
+ If you convey an object code work under this section in, or with, or
|
||
+specifically for use in, a User Product, and the conveying occurs as
|
||
+part of a transaction in which the right of possession and use of the
|
||
+User Product is transferred to the recipient in perpetuity or for a
|
||
+fixed term (regardless of how the transaction is characterized), the
|
||
+Corresponding Source conveyed under this section must be accompanied
|
||
+by the Installation Information. But this requirement does not apply
|
||
+if neither you nor any third party retains the ability to install
|
||
+modified object code on the User Product (for example, the work has
|
||
+been installed in ROM).
|
||
+
|
||
+ The requirement to provide Installation Information does not include a
|
||
+requirement to continue to provide support service, warranty, or updates
|
||
+for a work that has been modified or installed by the recipient, or for
|
||
+the User Product in which it has been modified or installed. Access to a
|
||
+network may be denied when the modification itself materially and
|
||
+adversely affects the operation of the network or violates the rules and
|
||
+protocols for communication across the network.
|
||
+
|
||
+ Corresponding Source conveyed, and Installation Information provided,
|
||
+in accord with this section must be in a format that is publicly
|
||
+documented (and with an implementation available to the public in
|
||
+source code form), and must require no special password or key for
|
||
+unpacking, reading or copying.
|
||
+
|
||
+ 7. Additional Terms.
|
||
+
|
||
+ "Additional permissions" are terms that supplement the terms of this
|
||
+License by making exceptions from one or more of its conditions.
|
||
+Additional permissions that are applicable to the entire Program shall
|
||
+be treated as though they were included in this License, to the extent
|
||
+that they are valid under applicable law. If additional permissions
|
||
+apply only to part of the Program, that part may be used separately
|
||
+under those permissions, but the entire Program remains governed by
|
||
+this License without regard to the additional permissions.
|
||
+
|
||
+ When you convey a copy of a covered work, you may at your option
|
||
+remove any additional permissions from that copy, or from any part of
|
||
+it. (Additional permissions may be written to require their own
|
||
+removal in certain cases when you modify the work.) You may place
|
||
+additional permissions on material, added by you to a covered work,
|
||
+for which you have or can give appropriate copyright permission.
|
||
+
|
||
+ Notwithstanding any other provision of this License, for material you
|
||
+add to a covered work, you may (if authorized by the copyright holders of
|
||
+that material) supplement the terms of this License with terms:
|
||
+
|
||
+ a) Disclaiming warranty or limiting liability differently from the
|
||
+ terms of sections 15 and 16 of this License; or
|
||
+
|
||
+ b) Requiring preservation of specified reasonable legal notices or
|
||
+ author attributions in that material or in the Appropriate Legal
|
||
+ Notices displayed by works containing it; or
|
||
+
|
||
+ c) Prohibiting misrepresentation of the origin of that material, or
|
||
+ requiring that modified versions of such material be marked in
|
||
+ reasonable ways as different from the original version; or
|
||
+
|
||
+ d) Limiting the use for publicity purposes of names of licensors or
|
||
+ authors of the material; or
|
||
+
|
||
+ e) Declining to grant rights under trademark law for use of some
|
||
+ trade names, trademarks, or service marks; or
|
||
+
|
||
+ f) Requiring indemnification of licensors and authors of that
|
||
+ material by anyone who conveys the material (or modified versions of
|
||
+ it) with contractual assumptions of liability to the recipient, for
|
||
+ any liability that these contractual assumptions directly impose on
|
||
+ those licensors and authors.
|
||
+
|
||
+ All other non-permissive additional terms are considered "further
|
||
+restrictions" within the meaning of section 10. If the Program as you
|
||
+received it, or any part of it, contains a notice stating that it is
|
||
+governed by this License along with a term that is a further
|
||
+restriction, you may remove that term. If a license document contains
|
||
+a further restriction but permits relicensing or conveying under this
|
||
+License, you may add to a covered work material governed by the terms
|
||
+of that license document, provided that the further restriction does
|
||
+not survive such relicensing or conveying.
|
||
+
|
||
+ If you add terms to a covered work in accord with this section, you
|
||
+must place, in the relevant source files, a statement of the
|
||
+additional terms that apply to those files, or a notice indicating
|
||
+where to find the applicable terms.
|
||
+
|
||
+ Additional terms, permissive or non-permissive, may be stated in the
|
||
+form of a separately written license, or stated as exceptions;
|
||
+the above requirements apply either way.
|
||
+
|
||
+ 8. Termination.
|
||
+
|
||
+ You may not propagate or modify a covered work except as expressly
|
||
+provided under this License. Any attempt otherwise to propagate or
|
||
+modify it is void, and will automatically terminate your rights under
|
||
+this License (including any patent licenses granted under the third
|
||
+paragraph of section 11).
|
||
+
|
||
+ However, if you cease all violation of this License, then your
|
||
+license from a particular copyright holder is reinstated (a)
|
||
+provisionally, unless and until the copyright holder explicitly and
|
||
+finally terminates your license, and (b) permanently, if the copyright
|
||
+holder fails to notify you of the violation by some reasonable means
|
||
+prior to 60 days after the cessation.
|
||
+
|
||
+ Moreover, your license from a particular copyright holder is
|
||
+reinstated permanently if the copyright holder notifies you of the
|
||
+violation by some reasonable means, this is the first time you have
|
||
+received notice of violation of this License (for any work) from that
|
||
+copyright holder, and you cure the violation prior to 30 days after
|
||
+your receipt of the notice.
|
||
+
|
||
+ Termination of your rights under this section does not terminate the
|
||
+licenses of parties who have received copies or rights from you under
|
||
+this License. If your rights have been terminated and not permanently
|
||
+reinstated, you do not qualify to receive new licenses for the same
|
||
+material under section 10.
|
||
+
|
||
+ 9. Acceptance Not Required for Having Copies.
|
||
+
|
||
+ You are not required to accept this License in order to receive or
|
||
+run a copy of the Program. Ancillary propagation of a covered work
|
||
+occurring solely as a consequence of using peer-to-peer transmission
|
||
+to receive a copy likewise does not require acceptance. However,
|
||
+nothing other than this License grants you permission to propagate or
|
||
+modify any covered work. These actions infringe copyright if you do
|
||
+not accept this License. Therefore, by modifying or propagating a
|
||
+covered work, you indicate your acceptance of this License to do so.
|
||
+
|
||
+ 10. Automatic Licensing of Downstream Recipients.
|
||
+
|
||
+ Each time you convey a covered work, the recipient automatically
|
||
+receives a license from the original licensors, to run, modify and
|
||
+propagate that work, subject to this License. You are not responsible
|
||
+for enforcing compliance by third parties with this License.
|
||
+
|
||
+ An "entity transaction" is a transaction transferring control of an
|
||
+organization, or substantially all assets of one, or subdividing an
|
||
+organization, or merging organizations. If propagation of a covered
|
||
+work results from an entity transaction, each party to that
|
||
+transaction who receives a copy of the work also receives whatever
|
||
+licenses to the work the party's predecessor in interest had or could
|
||
+give under the previous paragraph, plus a right to possession of the
|
||
+Corresponding Source of the work from the predecessor in interest, if
|
||
+the predecessor has it or can get it with reasonable efforts.
|
||
+
|
||
+ You may not impose any further restrictions on the exercise of the
|
||
+rights granted or affirmed under this License. For example, you may
|
||
+not impose a license fee, royalty, or other charge for exercise of
|
||
+rights granted under this License, and you may not initiate litigation
|
||
+(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||
+any patent claim is infringed by making, using, selling, offering for
|
||
+sale, or importing the Program or any portion of it.
|
||
+
|
||
+ 11. Patents.
|
||
+
|
||
+ A "contributor" is a copyright holder who authorizes use under this
|
||
+License of the Program or a work on which the Program is based. The
|
||
+work thus licensed is called the contributor's "contributor version".
|
||
+
|
||
+ A contributor's "essential patent claims" are all patent claims
|
||
+owned or controlled by the contributor, whether already acquired or
|
||
+hereafter acquired, that would be infringed by some manner, permitted
|
||
+by this License, of making, using, or selling its contributor version,
|
||
+but do not include claims that would be infringed only as a
|
||
+consequence of further modification of the contributor version. For
|
||
+purposes of this definition, "control" includes the right to grant
|
||
+patent sublicenses in a manner consistent with the requirements of
|
||
this License.
|
||
|
||
- 7. If, as a consequence of a court judgment or allegation of patent
|
||
-infringement or for any other reason (not limited to patent issues),
|
||
-conditions are imposed on you (whether by court order, agreement or
|
||
+ Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||
+patent license under the contributor's essential patent claims, to
|
||
+make, use, sell, offer for sale, import and otherwise run, modify and
|
||
+propagate the contents of its contributor version.
|
||
+
|
||
+ In the following three paragraphs, a "patent license" is any express
|
||
+agreement or commitment, however denominated, not to enforce a patent
|
||
+(such as an express permission to practice a patent or covenant not to
|
||
+sue for patent infringement). To "grant" such a patent license to a
|
||
+party means to make such an agreement or commitment not to enforce a
|
||
+patent against the party.
|
||
+
|
||
+ If you convey a covered work, knowingly relying on a patent license,
|
||
+and the Corresponding Source of the work is not available for anyone
|
||
+to copy, free of charge and under the terms of this License, through a
|
||
+publicly available network server or other readily accessible means,
|
||
+then you must either (1) cause the Corresponding Source to be so
|
||
+available, or (2) arrange to deprive yourself of the benefit of the
|
||
+patent license for this particular work, or (3) arrange, in a manner
|
||
+consistent with the requirements of this License, to extend the patent
|
||
+license to downstream recipients. "Knowingly relying" means you have
|
||
+actual knowledge that, but for the patent license, your conveying the
|
||
+covered work in a country, or your recipient's use of the covered work
|
||
+in a country, would infringe one or more identifiable patents in that
|
||
+country that you have reason to believe are valid.
|
||
+
|
||
+ If, pursuant to or in connection with a single transaction or
|
||
+arrangement, you convey, or propagate by procuring conveyance of, a
|
||
+covered work, and grant a patent license to some of the parties
|
||
+receiving the covered work authorizing them to use, propagate, modify
|
||
+or convey a specific copy of the covered work, then the patent license
|
||
+you grant is automatically extended to all recipients of the covered
|
||
+work and works based on it.
|
||
+
|
||
+ A patent license is "discriminatory" if it does not include within
|
||
+the scope of its coverage, prohibits the exercise of, or is
|
||
+conditioned on the non-exercise of one or more of the rights that are
|
||
+specifically granted under this License. You may not convey a covered
|
||
+work if you are a party to an arrangement with a third party that is
|
||
+in the business of distributing software, under which you make payment
|
||
+to the third party based on the extent of your activity of conveying
|
||
+the work, and under which the third party grants, to any of the
|
||
+parties who would receive the covered work from you, a discriminatory
|
||
+patent license (a) in connection with copies of the covered work
|
||
+conveyed by you (or copies made from those copies), or (b) primarily
|
||
+for and in connection with specific products or compilations that
|
||
+contain the covered work, unless you entered into that arrangement,
|
||
+or that patent license was granted, prior to 28 March 2007.
|
||
+
|
||
+ Nothing in this License shall be construed as excluding or limiting
|
||
+any implied license or other defenses to infringement that may
|
||
+otherwise be available to you under applicable patent law.
|
||
+
|
||
+ 12. No Surrender of Others' Freedom.
|
||
+
|
||
+ If conditions are imposed on you (whether by court order, agreement or
|
||
otherwise) that contradict the conditions of this License, they do not
|
||
-excuse you from the conditions of this License. If you cannot
|
||
-distribute so as to satisfy simultaneously your obligations under this
|
||
-License and any other pertinent obligations, then as a consequence you
|
||
-may not distribute the Program at all. For example, if a patent
|
||
-license would not permit royalty-free redistribution of the Program by
|
||
-all those who receive copies directly or indirectly through you, then
|
||
-the only way you could satisfy both it and this License would be to
|
||
-refrain entirely from distribution of the Program.
|
||
-
|
||
-If any portion of this section is held invalid or unenforceable under
|
||
-any particular circumstance, the balance of the section is intended to
|
||
-apply and the section as a whole is intended to apply in other
|
||
-circumstances.
|
||
-
|
||
-It is not the purpose of this section to induce you to infringe any
|
||
-patents or other property right claims or to contest validity of any
|
||
-such claims; this section has the sole purpose of protecting the
|
||
-integrity of the free software distribution system, which is
|
||
-implemented by public license practices. Many people have made
|
||
-generous contributions to the wide range of software distributed
|
||
-through that system in reliance on consistent application of that
|
||
-system; it is up to the author/donor to decide if he or she is willing
|
||
-to distribute software through any other system and a licensee cannot
|
||
-impose that choice.
|
||
-
|
||
-This section is intended to make thoroughly clear what is believed to
|
||
-be a consequence of the rest of this License.
|
||
-
|
||
- 8. If the distribution and/or use of the Program is restricted in
|
||
-certain countries either by patents or by copyrighted interfaces, the
|
||
-original copyright holder who places the Program under this License
|
||
-may add an explicit geographical distribution limitation excluding
|
||
-those countries, so that distribution is permitted only in or among
|
||
-countries not thus excluded. In such case, this License incorporates
|
||
-the limitation as if written in the body of this License.
|
||
-
|
||
- 9. The Free Software Foundation may publish revised and/or new versions
|
||
-of the General Public License from time to time. Such new versions will
|
||
+excuse you from the conditions of this License. If you cannot convey a
|
||
+covered work so as to satisfy simultaneously your obligations under this
|
||
+License and any other pertinent obligations, then as a consequence you may
|
||
+not convey it at all. For example, if you agree to terms that obligate you
|
||
+to collect a royalty for further conveying from those to whom you convey
|
||
+the Program, the only way you could satisfy both those terms and this
|
||
+License would be to refrain entirely from conveying the Program.
|
||
+
|
||
+ 13. Use with the GNU Affero General Public License.
|
||
+
|
||
+ Notwithstanding any other provision of this License, you have
|
||
+permission to link or combine any covered work with a work licensed
|
||
+under version 3 of the GNU Affero General Public License into a single
|
||
+combined work, and to convey the resulting work. The terms of this
|
||
+License will continue to apply to the part which is the covered work,
|
||
+but the special requirements of the GNU Affero General Public License,
|
||
+section 13, concerning interaction through a network will apply to the
|
||
+combination as such.
|
||
+
|
||
+ 14. Revised Versions of this License.
|
||
+
|
||
+ The Free Software Foundation may publish revised and/or new versions of
|
||
+the GNU General Public License from time to time. Such new versions will
|
||
be similar in spirit to the present version, but may differ in detail to
|
||
address new problems or concerns.
|
||
|
||
-Each version is given a distinguishing version number. If the Program
|
||
-specifies a version number of this License which applies to it and "any
|
||
-later version", you have the option of following the terms and conditions
|
||
-either of that version or of any later version published by the Free
|
||
-Software Foundation. If the Program does not specify a version number of
|
||
-this License, you may choose any version ever published by the Free Software
|
||
-Foundation.
|
||
-
|
||
- 10. If you wish to incorporate parts of the Program into other free
|
||
-programs whose distribution conditions are different, write to the author
|
||
-to ask for permission. For software which is copyrighted by the Free
|
||
-Software Foundation, write to the Free Software Foundation; we sometimes
|
||
-make exceptions for this. Our decision will be guided by the two goals
|
||
-of preserving the free status of all derivatives of our free software and
|
||
-of promoting the sharing and reuse of software generally.
|
||
-
|
||
- NO WARRANTY
|
||
-
|
||
- 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
||
-FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
||
-OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
||
-PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
|
||
-OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||
-MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
||
-TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
|
||
-PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
|
||
-REPAIR OR CORRECTION.
|
||
-
|
||
- 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||
-WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
||
-REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
||
-INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
|
||
-OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
|
||
-TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
|
||
-YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
||
-PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
|
||
-POSSIBILITY OF SUCH DAMAGES.
|
||
-
|
||
- END OF TERMS AND CONDITIONS
|
||
-
|
||
- How to Apply These Terms to Your New Programs
|
||
+ Each version is given a distinguishing version number. If the
|
||
+Program specifies that a certain numbered version of the GNU General
|
||
+Public License "or any later version" applies to it, you have the
|
||
+option of following the terms and conditions either of that numbered
|
||
+version or of any later version published by the Free Software
|
||
+Foundation. If the Program does not specify a version number of the
|
||
+GNU General Public License, you may choose any version ever published
|
||
+by the Free Software Foundation.
|
||
+
|
||
+ If the Program specifies that a proxy can decide which future
|
||
+versions of the GNU General Public License can be used, that proxy's
|
||
+public statement of acceptance of a version permanently authorizes you
|
||
+to choose that version for the Program.
|
||
+
|
||
+ Later license versions may give you additional or different
|
||
+permissions. However, no additional obligations are imposed on any
|
||
+author or copyright holder as a result of your choosing to follow a
|
||
+later version.
|
||
+
|
||
+ 15. Disclaimer of Warranty.
|
||
+
|
||
+ THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||
+APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||
+HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||
+OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||
+THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||
+PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||
+IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||
+ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||
+
|
||
+ 16. Limitation of Liability.
|
||
+
|
||
+ IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||
+WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||
+THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||
+GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||
+USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||
+DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||
+PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||
+EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||
+SUCH DAMAGES.
|
||
+
|
||
+ 17. Interpretation of Sections 15 and 16.
|
||
+
|
||
+ If the disclaimer of warranty and limitation of liability provided
|
||
+above cannot be given local legal effect according to their terms,
|
||
+reviewing courts shall apply local law that most closely approximates
|
||
+an absolute waiver of all civil liability in connection with the
|
||
+Program, unless a warranty or assumption of liability accompanies a
|
||
+copy of the Program in return for a fee.
|
||
+
|
||
+ END OF TERMS AND CONDITIONS
|
||
+
|
||
+ How to Apply These Terms to Your New Programs
|
||
|
||
If you develop a new program, and you want it to be of the greatest
|
||
possible use to the public, the best way to achieve this is to make it
|
||
@@ -288,15 +628,15 @@ free software which everyone can redistribute and change under these terms.
|
||
|
||
To do so, attach the following notices to the program. It is safest
|
||
to attach them to the start of each source file to most effectively
|
||
-convey the exclusion of warranty; and each file should have at least
|
||
+state the exclusion of warranty; and each file should have at least
|
||
the "copyright" line and a pointer to where the full notice is found.
|
||
|
||
<one line to give the program's name and a brief idea of what it does.>
|
||
- Copyright (C) 19yy <name of author>
|
||
+ Copyright (C) <year> <name of author>
|
||
|
||
- This program is free software; you can redistribute it and/or modify
|
||
+ This program is free software: you can redistribute it and/or modify
|
||
it under the terms of the GNU General Public License as published by
|
||
- the Free Software Foundation; either version 2 of the License, or
|
||
+ the Free Software Foundation, either version 3 of the License, or
|
||
(at your option) any later version.
|
||
|
||
This program is distributed in the hope that it will be useful,
|
||
@@ -305,38 +645,30 @@ the "copyright" line and a pointer to where the full notice is found.
|
||
GNU General Public License for more details.
|
||
|
||
You should have received a copy of the GNU General Public License
|
||
- along with this program; if not, write to the Free Software
|
||
- Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||
- Boston, MA 02110-1301, USA
|
||
-
|
||
+ along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||
|
||
Also add information on how to contact you by electronic and paper mail.
|
||
|
||
-If the program is interactive, make it output a short notice like this
|
||
-when it starts in an interactive mode:
|
||
+ If the program does terminal interaction, make it output a short
|
||
+notice like this when it starts in an interactive mode:
|
||
|
||
- Gnomovision version 69, Copyright (C) 19yy name of author
|
||
- Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||
+ <program> Copyright (C) <year> <name of author>
|
||
+ This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||
This is free software, and you are welcome to redistribute it
|
||
under certain conditions; type `show c' for details.
|
||
|
||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||
-parts of the General Public License. Of course, the commands you use may
|
||
-be called something other than `show w' and `show c'; they could even be
|
||
-mouse-clicks or menu items--whatever suits your program.
|
||
-
|
||
-You should also get your employer (if you work as a programmer) or your
|
||
-school, if any, to sign a "copyright disclaimer" for the program, if
|
||
-necessary. Here is a sample; alter the names:
|
||
-
|
||
- Yoyodyne, Inc., hereby disclaims all copyright interest in the program
|
||
- `Gnomovision' (which makes passes at compilers) written by James Hacker.
|
||
-
|
||
- <signature of Ty Coon>, 1 April 1989
|
||
- Ty Coon, President of Vice
|
||
-
|
||
-This General Public License does not permit incorporating your program into
|
||
-proprietary programs. If your program is a subroutine library, you may
|
||
-consider it more useful to permit linking proprietary applications with the
|
||
-library. If this is what you want to do, use the GNU Library General
|
||
-Public License instead of this License.
|
||
+parts of the General Public License. Of course, your program's commands
|
||
+might be different; for a GUI interface, you would use an "about box".
|
||
+
|
||
+ You should also get your employer (if you work as a programmer) or school,
|
||
+if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||
+For more information on this, and how to apply and follow the GNU GPL, see
|
||
+<http://www.gnu.org/licenses/>.
|
||
+
|
||
+ The GNU General Public License does not permit incorporating your program
|
||
+into proprietary programs. If your program is a subroutine library, you
|
||
+may consider it more useful to permit linking proprietary applications with
|
||
+the library. If this is what you want to do, use the GNU Lesser General
|
||
+Public License instead of this License. But first, please read
|
||
+<http://www.gnu.org/philosophy/why-not-lgpl.html>.
|
||
--- a/gdb/ChangeLog
|
||
+++ b/gdb/ChangeLog
|
||
@@ -1,3 +1,78 @@
|
||
+2009-12-21 Joel Brobecker <brobecker@adacore.com>
|
||
+
|
||
+ * COPYING: Update to GPL version 3.
|
||
+
|
||
+2009-12-21 Doug Evans <dje@google.com>
|
||
+
|
||
+ * dcache.c (dcache_block): Replace member newer with next,prev.
|
||
+ (dcache_struct): Delete member newest.
|
||
+ (block_func): New typedef.
|
||
+ (append_block, remove_block, for_each_block): New functions.
|
||
+ (invalidate_block, free_block): New functions.
|
||
+ (dcache_invalidate): Update
|
||
+ (dcache_invalidate_line, dcache_alloc): Update to use new list
|
||
+ accessors.
|
||
+ (dcache_free): Ditto. Fix memory leak.
|
||
+
|
||
+2009-12-21 Joel Brobecker <brobecker@adacore.com>
|
||
+
|
||
+ * completer.c (complete_line_internal): Make sure the command
|
||
+ completer is not NULL before calling it.
|
||
+
|
||
+2009-12-20 Michael Snyder <msnyder@vmware.com>
|
||
+
|
||
+ * amd64-tdep.c (amd64_epilogue_frame_cache): Fix buf size.
|
||
+
|
||
+2009-11-23 Rainer Orth <ro@CeBiTec.Uni-Bielefeld.DE>
|
||
+
|
||
+ * dwarf2read.c [HAVE_MMAP] (MAP_FAILED): Define if missing.
|
||
+
|
||
+2009-11-13 Ramana Radhakrishnan <ramana.radhakrishnan@arm.com>
|
||
+
|
||
+ Backport from mainline.
|
||
+ 2009-07-28 Daniel Jacobowitz <dan@codesourcery.com>
|
||
+
|
||
+ * arm-tdep.c (arm_push_dummy_call): Set the low bit of LR for
|
||
+ a Thumb entry point.
|
||
+ (thumb_get_next_pc): Handle Thumb-2 and ARM v6 instructions.
|
||
+ Refuse to single step into IT blocks.
|
||
+
|
||
+ 2009-10-28 Daniel Jacobowitz <dan@codesourcery.com>
|
||
+
|
||
+ Reported by Antti Hatala <ahatala@nvidia.com>
|
||
+ * arm-tdep.c (thumb_get_next_pc): Limit check to IT instructions
|
||
+ correctly.
|
||
+
|
||
+2009-10-22 Paul Pluzhnikov <ppluzhnikov@google.com>
|
||
+
|
||
+ PR gdb/10819
|
||
+ * dwarf2-frame.c (find_cie): Don't call bsearch on empty cie_table.
|
||
+ * objfiles.c (find_pc_section): Likewise.
|
||
+ (update_section_map): Don't allocate empty table.
|
||
+
|
||
+2009-10-19 Don Lee <don.lee@sunplusct.com>
|
||
+
|
||
+ * score-tdep.c: Delete some simulator dependent codes.
|
||
+ * score-tdep.h: Delete some simulator dependent macro definitions.
|
||
+
|
||
+2008-10-16 Steven G. Kargl <kargl@gcc.gnu.org> (tiny patch)
|
||
+
|
||
+ * amd64fbsd-nat.c (amd64fbsd_supply_pcb): Conditionally compile in
|
||
+ support for pcb->pcb_{fs,ds,es,gs} on FreeBSD older than 8.0.
|
||
+
|
||
+2009-10-08 Paul Pluzhnikov <ppluzhnikov@google.com>
|
||
+
|
||
+ PR gdb/10457
|
||
+ * elfread.c (elf_symtab_read): Don't use alloca in a loop.
|
||
+
|
||
+2009-10-06 Joel Brobecker <brobecker@adacore.com>
|
||
+
|
||
+ * version.in: Set version to 7.0.0.20091006-cvs.
|
||
+
|
||
+2009-10-06 Joel Brobecker <brobecker@adacore.com>
|
||
+
|
||
+ GDB 7.0 released.
|
||
+
|
||
2009-10-06 Joel Brobecker <brobecker@adacore.com>
|
||
|
||
* NEWS: Change "Changes since GDB 6.8" into "Changes in GDB 7.0".
|
||
--- a/gdb/amd64-tdep.c
|
||
+++ b/gdb/amd64-tdep.c
|
||
@@ -1925,7 +1925,7 @@ amd64_epilogue_frame_cache (struct frame_info *this_frame, void **this_cache)
|
||
struct gdbarch *gdbarch = get_frame_arch (this_frame);
|
||
enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
|
||
struct amd64_frame_cache *cache;
|
||
- gdb_byte buf[4];
|
||
+ gdb_byte buf[8];
|
||
|
||
if (*this_cache)
|
||
return *this_cache;
|
||
--- a/gdb/amd64fbsd-nat.c
|
||
+++ b/gdb/amd64fbsd-nat.c
|
||
@@ -95,6 +95,7 @@ static int amd64fbsd32_r_reg_offset[I386_NUM_GREGS] =
|
||
|
||
#include <sys/types.h>
|
||
#include <machine/pcb.h>
|
||
+#include <osreldate.h>
|
||
|
||
#include "bsd-kvm.h"
|
||
|
||
@@ -123,10 +124,12 @@ amd64fbsd_supply_pcb (struct regcache *regcache, struct pcb *pcb)
|
||
regcache_raw_supply (regcache, 13, &pcb->pcb_r13);
|
||
regcache_raw_supply (regcache, 14, &pcb->pcb_r14);
|
||
regcache_raw_supply (regcache, 15, &pcb->pcb_r15);
|
||
+#if (__FreeBSD_version < 800075)
|
||
regcache_raw_supply (regcache, AMD64_DS_REGNUM, &pcb->pcb_ds);
|
||
regcache_raw_supply (regcache, AMD64_ES_REGNUM, &pcb->pcb_es);
|
||
regcache_raw_supply (regcache, AMD64_FS_REGNUM, &pcb->pcb_fs);
|
||
regcache_raw_supply (regcache, AMD64_GS_REGNUM, &pcb->pcb_gs);
|
||
+#endif
|
||
|
||
return 1;
|
||
}
|
||
--- a/gdb/arm-tdep.c
|
||
+++ b/gdb/arm-tdep.c
|
||
@@ -1627,7 +1627,8 @@ arm_push_dummy_call (struct gdbarch *gdbarch, struct value *function,
|
||
|
||
/* Set the return address. For the ARM, the return breakpoint is
|
||
always at BP_ADDR. */
|
||
- /* XXX Fix for Thumb. */
|
||
+ if (arm_pc_is_thumb (bp_addr))
|
||
+ bp_addr |= 1;
|
||
regcache_cooked_write_unsigned (regcache, ARM_LR_REGNUM, bp_addr);
|
||
|
||
/* Walk through the list of args and determine how large a temporary
|
||
@@ -2263,9 +2264,43 @@ thumb_get_next_pc (struct frame_info *frame, CORE_ADDR pc)
|
||
unsigned short inst1;
|
||
CORE_ADDR nextpc = pc + 2; /* default is next instruction */
|
||
unsigned long offset;
|
||
+ ULONGEST status, it;
|
||
|
||
inst1 = read_memory_unsigned_integer (pc, 2, byte_order_for_code);
|
||
|
||
+ /* Thumb-2 conditional execution support. There are eight bits in
|
||
+ the CPSR which describe conditional execution state. Once
|
||
+ reconstructed (they're in a funny order), the low five bits
|
||
+ describe the low bit of the condition for each instruction and
|
||
+ how many instructions remain. The high three bits describe the
|
||
+ base condition. One of the low four bits will be set if an IT
|
||
+ block is active. These bits read as zero on earlier
|
||
+ processors. */
|
||
+ status = get_frame_register_unsigned (frame, ARM_PS_REGNUM);
|
||
+ it = ((status >> 8) & 0xfc) | ((status >> 25) & 0x3);
|
||
+
|
||
+ /* On GNU/Linux, where this routine is used, we use an undefined
|
||
+ instruction as a breakpoint. Unlike BKPT, IT can disable execution
|
||
+ of the undefined instruction. So we might miss the breakpoint! */
|
||
+ if (((inst1 & 0xff00) == 0xbf00 && (inst1 & 0x000f) != 0) || (it & 0x0f))
|
||
+ error (_("Stepping through Thumb-2 IT blocks is not yet supported"));
|
||
+
|
||
+ if (it & 0x0f)
|
||
+ {
|
||
+ /* We are in a conditional block. Check the condition. */
|
||
+ int cond = it >> 4;
|
||
+
|
||
+ if (! condition_true (cond, status))
|
||
+ {
|
||
+ /* Advance to the next instruction. All the 32-bit
|
||
+ instructions share a common prefix. */
|
||
+ if ((inst1 & 0xe000) == 0xe000 && (inst1 & 0x1800) != 0)
|
||
+ return pc + 4;
|
||
+ else
|
||
+ return pc + 2;
|
||
+ }
|
||
+ }
|
||
+
|
||
if ((inst1 & 0xff00) == 0xbd00) /* pop {rlist, pc} */
|
||
{
|
||
CORE_ADDR sp;
|
||
@@ -2281,7 +2316,6 @@ thumb_get_next_pc (struct frame_info *frame, CORE_ADDR pc)
|
||
}
|
||
else if ((inst1 & 0xf000) == 0xd000) /* conditional branch */
|
||
{
|
||
- unsigned long status = get_frame_register_unsigned (frame, ARM_PS_REGNUM);
|
||
unsigned long cond = bits (inst1, 8, 11);
|
||
if (cond != 0x0f && condition_true (cond, status)) /* 0x0f = SWI */
|
||
nextpc = pc_val + (sbits (inst1, 0, 7) << 1);
|
||
@@ -2290,15 +2324,166 @@ thumb_get_next_pc (struct frame_info *frame, CORE_ADDR pc)
|
||
{
|
||
nextpc = pc_val + (sbits (inst1, 0, 10) << 1);
|
||
}
|
||
- else if ((inst1 & 0xf800) == 0xf000) /* long branch with link, and blx */
|
||
+ else if ((inst1 & 0xe000) == 0xe000) /* 32-bit instruction */
|
||
{
|
||
unsigned short inst2;
|
||
inst2 = read_memory_unsigned_integer (pc + 2, 2, byte_order_for_code);
|
||
- offset = (sbits (inst1, 0, 10) << 12) + (bits (inst2, 0, 10) << 1);
|
||
- nextpc = pc_val + offset;
|
||
- /* For BLX make sure to clear the low bits. */
|
||
- if (bits (inst2, 11, 12) == 1)
|
||
- nextpc = nextpc & 0xfffffffc;
|
||
+
|
||
+ /* Default to the next instruction. */
|
||
+ nextpc = pc + 4;
|
||
+
|
||
+ if ((inst1 & 0xf800) == 0xf000 && (inst2 & 0x8000) == 0x8000)
|
||
+ {
|
||
+ /* Branches and miscellaneous control instructions. */
|
||
+
|
||
+ if ((inst2 & 0x1000) != 0 || (inst2 & 0xd001) == 0xc000)
|
||
+ {
|
||
+ /* B, BL, BLX. */
|
||
+ int j1, j2, imm1, imm2;
|
||
+
|
||
+ imm1 = sbits (inst1, 0, 10);
|
||
+ imm2 = bits (inst2, 0, 10);
|
||
+ j1 = bit (inst2, 13);
|
||
+ j2 = bit (inst2, 11);
|
||
+
|
||
+ offset = ((imm1 << 12) + (imm2 << 1));
|
||
+ offset ^= ((!j2) << 22) | ((!j1) << 23);
|
||
+
|
||
+ nextpc = pc_val + offset;
|
||
+ /* For BLX make sure to clear the low bits. */
|
||
+ if (bit (inst2, 12) == 0)
|
||
+ nextpc = nextpc & 0xfffffffc;
|
||
+ }
|
||
+ else if (inst1 == 0xf3de && (inst2 & 0xff00) == 0x3f00)
|
||
+ {
|
||
+ /* SUBS PC, LR, #imm8. */
|
||
+ nextpc = get_frame_register_unsigned (frame, ARM_LR_REGNUM);
|
||
+ nextpc -= inst2 & 0x00ff;
|
||
+ }
|
||
+ else if ((inst2 & 0xd000) == 0xc000 && (inst1 & 0x0380) != 0x0380)
|
||
+ {
|
||
+ /* Conditional branch. */
|
||
+ if (condition_true (bits (inst1, 6, 9), status))
|
||
+ {
|
||
+ int sign, j1, j2, imm1, imm2;
|
||
+
|
||
+ sign = sbits (inst1, 10, 10);
|
||
+ imm1 = bits (inst1, 0, 5);
|
||
+ imm2 = bits (inst2, 0, 10);
|
||
+ j1 = bit (inst2, 13);
|
||
+ j2 = bit (inst2, 11);
|
||
+
|
||
+ offset = (sign << 20) + (j2 << 19) + (j1 << 18);
|
||
+ offset += (imm1 << 12) + (imm2 << 1);
|
||
+
|
||
+ nextpc = pc_val + offset;
|
||
+ }
|
||
+ }
|
||
+ }
|
||
+ else if ((inst1 & 0xfe50) == 0xe810)
|
||
+ {
|
||
+ /* Load multiple or RFE. */
|
||
+ int rn, offset, load_pc = 1;
|
||
+
|
||
+ rn = bits (inst1, 0, 3);
|
||
+ if (bit (inst1, 7) && !bit (inst1, 8))
|
||
+ {
|
||
+ /* LDMIA or POP */
|
||
+ if (!bit (inst2, 15))
|
||
+ load_pc = 0;
|
||
+ offset = bitcount (inst2) * 4 - 4;
|
||
+ }
|
||
+ else if (!bit (inst1, 7) && bit (inst1, 8))
|
||
+ {
|
||
+ /* LDMDB */
|
||
+ if (!bit (inst2, 15))
|
||
+ load_pc = 0;
|
||
+ offset = -4;
|
||
+ }
|
||
+ else if (bit (inst1, 7) && bit (inst1, 8))
|
||
+ {
|
||
+ /* RFEIA */
|
||
+ offset = 0;
|
||
+ }
|
||
+ else if (!bit (inst1, 7) && !bit (inst1, 8))
|
||
+ {
|
||
+ /* RFEDB */
|
||
+ offset = -8;
|
||
+ }
|
||
+ else
|
||
+ load_pc = 0;
|
||
+
|
||
+ if (load_pc)
|
||
+ {
|
||
+ CORE_ADDR addr = get_frame_register_unsigned (frame, rn);
|
||
+ nextpc = get_frame_memory_unsigned (frame, addr + offset, 4);
|
||
+ }
|
||
+ }
|
||
+ else if ((inst1 & 0xffef) == 0xea4f && (inst2 & 0xfff0) == 0x0f00)
|
||
+ {
|
||
+ /* MOV PC or MOVS PC. */
|
||
+ nextpc = get_frame_register_unsigned (frame, bits (inst2, 0, 3));
|
||
+ }
|
||
+ else if ((inst1 & 0xff70) == 0xf850 && (inst2 & 0xf000) == 0xf000)
|
||
+ {
|
||
+ /* LDR PC. */
|
||
+ CORE_ADDR base;
|
||
+ int rn, load_pc = 1;
|
||
+
|
||
+ rn = bits (inst1, 0, 3);
|
||
+ base = get_frame_register_unsigned (frame, rn);
|
||
+ if (rn == 15)
|
||
+ {
|
||
+ base = (base + 4) & ~(CORE_ADDR) 0x3;
|
||
+ if (bit (inst1, 7))
|
||
+ base += bits (inst2, 0, 11);
|
||
+ else
|
||
+ base -= bits (inst2, 0, 11);
|
||
+ }
|
||
+ else if (bit (inst1, 7))
|
||
+ base += bits (inst2, 0, 11);
|
||
+ else if (bit (inst2, 11))
|
||
+ {
|
||
+ if (bit (inst2, 10))
|
||
+ {
|
||
+ if (bit (inst2, 9))
|
||
+ base += bits (inst2, 0, 7);
|
||
+ else
|
||
+ base -= bits (inst2, 0, 7);
|
||
+ }
|
||
+ }
|
||
+ else if ((inst2 & 0x0fc0) == 0x0000)
|
||
+ {
|
||
+ int shift = bits (inst2, 4, 5), rm = bits (inst2, 0, 3);
|
||
+ base += get_frame_register_unsigned (frame, rm) << shift;
|
||
+ }
|
||
+ else
|
||
+ /* Reserved. */
|
||
+ load_pc = 0;
|
||
+
|
||
+ if (load_pc)
|
||
+ nextpc = get_frame_memory_unsigned (frame, base, 4);
|
||
+ }
|
||
+ else if ((inst1 & 0xfff0) == 0xe8d0 && (inst2 & 0xfff0) == 0xf000)
|
||
+ {
|
||
+ /* TBB. */
|
||
+ CORE_ADDR table, offset, length;
|
||
+
|
||
+ table = get_frame_register_unsigned (frame, bits (inst1, 0, 3));
|
||
+ offset = get_frame_register_unsigned (frame, bits (inst2, 0, 3));
|
||
+ length = 2 * get_frame_memory_unsigned (frame, table + offset, 1);
|
||
+ nextpc = pc_val + length;
|
||
+ }
|
||
+ else if ((inst1 & 0xfff0) == 0xe8d0 && (inst2 & 0xfff0) == 0xf000)
|
||
+ {
|
||
+ /* TBH. */
|
||
+ CORE_ADDR table, offset, length;
|
||
+
|
||
+ table = get_frame_register_unsigned (frame, bits (inst1, 0, 3));
|
||
+ offset = 2 * get_frame_register_unsigned (frame, bits (inst2, 0, 3));
|
||
+ length = 2 * get_frame_memory_unsigned (frame, table + offset, 2);
|
||
+ nextpc = pc_val + length;
|
||
+ }
|
||
}
|
||
else if ((inst1 & 0xff00) == 0x4700) /* bx REG, blx REG */
|
||
{
|
||
@@ -2311,6 +2496,17 @@ thumb_get_next_pc (struct frame_info *frame, CORE_ADDR pc)
|
||
if (nextpc == pc)
|
||
error (_("Infinite loop detected"));
|
||
}
|
||
+ else if ((inst1 & 0xf500) == 0xb100)
|
||
+ {
|
||
+ /* CBNZ or CBZ. */
|
||
+ int imm = (bit (inst1, 9) << 6) + (bits (inst1, 3, 7) << 1);
|
||
+ ULONGEST reg = get_frame_register_unsigned (frame, bits (inst1, 0, 2));
|
||
+
|
||
+ if (bit (inst1, 11) && reg != 0)
|
||
+ nextpc = pc_val + imm;
|
||
+ else if (!bit (inst1, 11) && reg == 0)
|
||
+ nextpc = pc_val + imm;
|
||
+ }
|
||
|
||
return nextpc;
|
||
}
|
||
--- a/gdb/completer.c
|
||
+++ b/gdb/completer.c
|
||
@@ -676,7 +676,7 @@ complete_line_internal (const char *text, char *line_buffer, int point,
|
||
p--)
|
||
;
|
||
}
|
||
- if (reason != handle_brkchars)
|
||
+ if (reason != handle_brkchars && c->completer != NULL)
|
||
list = (*c->completer) (c, p, word);
|
||
}
|
||
}
|
||
@@ -747,7 +747,7 @@ complete_line_internal (const char *text, char *line_buffer, int point,
|
||
p--)
|
||
;
|
||
}
|
||
- if (reason != handle_brkchars)
|
||
+ if (reason != handle_brkchars && c->completer != NULL)
|
||
list = (*c->completer) (c, p, word);
|
||
}
|
||
}
|
||
--- a/gdb/dcache.c
|
||
+++ b/gdb/dcache.c
|
||
@@ -88,7 +88,10 @@
|
||
|
||
struct dcache_block
|
||
{
|
||
- struct dcache_block *newer; /* for LRU and free list */
|
||
+ /* for least-recently-allocated and free lists */
|
||
+ struct dcache_block *prev;
|
||
+ struct dcache_block *next;
|
||
+
|
||
CORE_ADDR addr; /* address of data */
|
||
gdb_byte data[LINE_SIZE]; /* bytes at given address */
|
||
int refs; /* # hits */
|
||
@@ -97,9 +100,10 @@ struct dcache_block
|
||
struct dcache_struct
|
||
{
|
||
splay_tree tree;
|
||
- struct dcache_block *oldest;
|
||
- struct dcache_block *newest;
|
||
+ struct dcache_block *oldest; /* least-recently-allocated list */
|
||
|
||
+ /* The free list is maintained identically to OLDEST to simplify
|
||
+ the code: we only need one set of accessors. */
|
||
struct dcache_block *freelist;
|
||
|
||
/* The number of in-use lines in the cache. */
|
||
@@ -109,6 +113,8 @@ struct dcache_struct
|
||
ptid_t ptid;
|
||
};
|
||
|
||
+typedef void (block_func) (struct dcache_block *block, void *param);
|
||
+
|
||
static struct dcache_block *dcache_hit (DCACHE *dcache, CORE_ADDR addr);
|
||
|
||
static int dcache_write_line (DCACHE *dcache, struct dcache_block *db);
|
||
@@ -132,28 +138,93 @@ show_dcache_enabled_p (struct ui_file *file, int from_tty,
|
||
|
||
static DCACHE *last_cache; /* Used by info dcache */
|
||
|
||
-/* Free all the data cache blocks, thus discarding all cached data. */
|
||
+/* Append BLOCK to circular block list starting at BLIST.
|
||
+ The block is appended for the least-recently-allocated list's sake:
|
||
+ BLIST points to the oldest block. */
|
||
|
||
-void
|
||
-dcache_invalidate (DCACHE *dcache)
|
||
+static void
|
||
+append_block (struct dcache_block **blist, struct dcache_block *block)
|
||
{
|
||
- struct dcache_block *block, *next;
|
||
+ if (*blist)
|
||
+ {
|
||
+ block->next = *blist;
|
||
+ block->prev = (*blist)->prev;
|
||
+ block->prev->next = block;
|
||
+ (*blist)->prev = block;
|
||
+ /* We don't update *BLIST here to maintain the invariant that for the
|
||
+ least-recently-allocated list *BLIST points to the oldest block. */
|
||
+ }
|
||
+ else
|
||
+ {
|
||
+ block->next = block;
|
||
+ block->prev = block;
|
||
+ *blist = block;
|
||
+ }
|
||
+}
|
||
|
||
- block = dcache->oldest;
|
||
+/* Remove BLOCK from circular block list BLIST. */
|
||
|
||
- while (block)
|
||
+static void
|
||
+remove_block (struct dcache_block **blist, struct dcache_block *block)
|
||
+{
|
||
+ if (block->next == block)
|
||
+ {
|
||
+ *blist = NULL;
|
||
+ }
|
||
+ else
|
||
{
|
||
- splay_tree_remove (dcache->tree, (splay_tree_key) block->addr);
|
||
- next = block->newer;
|
||
+ block->next->prev = block->prev;
|
||
+ block->prev->next = block->next;
|
||
+ /* If we removed the block *BLIST points to, shift it to the next block
|
||
+ to maintain the invariant that for the least-recently-allocated list
|
||
+ *BLIST points to the oldest block. */
|
||
+ if (*blist == block)
|
||
+ *blist = block->next;
|
||
+ }
|
||
+}
|
||
|
||
- block->newer = dcache->freelist;
|
||
- dcache->freelist = block;
|
||
+/* Iterate over all elements in BLIST, calling FUNC.
|
||
+ PARAM is passed to FUNC.
|
||
+ FUNC may remove the block it's passed, but only that block. */
|
||
|
||
- block = next;
|
||
+static void
|
||
+for_each_block (struct dcache_block **blist, block_func *func, void *param)
|
||
+{
|
||
+ struct dcache_block *db;
|
||
+
|
||
+ if (*blist == NULL)
|
||
+ return;
|
||
+
|
||
+ db = *blist;
|
||
+ do
|
||
+ {
|
||
+ struct dcache_block *next = db->next;
|
||
+
|
||
+ func (db, param);
|
||
+ db = next;
|
||
}
|
||
+ while (*blist && db != *blist);
|
||
+}
|
||
+
|
||
+/* BLOCK_FUNC function for dcache_invalidate. */
|
||
+
|
||
+static void
|
||
+invalidate_block (struct dcache_block *block, void *param)
|
||
+{
|
||
+ DCACHE *dcache = (DCACHE *) param;
|
||
+
|
||
+ splay_tree_remove (dcache->tree, (splay_tree_key) block->addr);
|
||
+ append_block (&dcache->freelist, block);
|
||
+}
|
||
+
|
||
+/* Free all the data cache blocks, thus discarding all cached data. */
|
||
+
|
||
+void
|
||
+dcache_invalidate (DCACHE *dcache)
|
||
+{
|
||
+ for_each_block (&dcache->oldest, invalidate_block, dcache);
|
||
|
||
dcache->oldest = NULL;
|
||
- dcache->newest = NULL;
|
||
dcache->size = 0;
|
||
dcache->ptid = null_ptid;
|
||
}
|
||
@@ -168,8 +239,8 @@ dcache_invalidate_line (DCACHE *dcache, CORE_ADDR addr)
|
||
if (db)
|
||
{
|
||
splay_tree_remove (dcache->tree, (splay_tree_key) db->addr);
|
||
- db->newer = dcache->freelist;
|
||
- dcache->freelist = db;
|
||
+ remove_block (&dcache->oldest, db);
|
||
+ append_block (&dcache->freelist, db);
|
||
--dcache->size;
|
||
}
|
||
}
|
||
@@ -251,9 +322,9 @@ dcache_alloc (DCACHE *dcache, CORE_ADDR addr)
|
||
|
||
if (dcache->size >= DCACHE_SIZE)
|
||
{
|
||
- /* Evict the least recently used line. */
|
||
+ /* Evict the least recently allocated line. */
|
||
db = dcache->oldest;
|
||
- dcache->oldest = db->newer;
|
||
+ remove_block (&dcache->oldest, db);
|
||
|
||
splay_tree_remove (dcache->tree, (splay_tree_key) db->addr);
|
||
}
|
||
@@ -261,7 +332,7 @@ dcache_alloc (DCACHE *dcache, CORE_ADDR addr)
|
||
{
|
||
db = dcache->freelist;
|
||
if (db)
|
||
- dcache->freelist = db->newer;
|
||
+ remove_block (&dcache->freelist, db);
|
||
else
|
||
db = xmalloc (sizeof (struct dcache_block));
|
||
|
||
@@ -269,16 +340,10 @@ dcache_alloc (DCACHE *dcache, CORE_ADDR addr)
|
||
}
|
||
|
||
db->addr = MASK (addr);
|
||
- db->newer = NULL;
|
||
db->refs = 0;
|
||
|
||
- if (dcache->newest)
|
||
- dcache->newest->newer = db;
|
||
-
|
||
- dcache->newest = db;
|
||
-
|
||
- if (!dcache->oldest)
|
||
- dcache->oldest = db;
|
||
+ /* Put DB at the end of the list, it's the newest. */
|
||
+ append_block (&dcache->oldest, db);
|
||
|
||
splay_tree_insert (dcache->tree, (splay_tree_key) db->addr,
|
||
(splay_tree_value) db);
|
||
@@ -356,7 +421,6 @@ dcache_init (void)
|
||
NULL);
|
||
|
||
dcache->oldest = NULL;
|
||
- dcache->newest = NULL;
|
||
dcache->freelist = NULL;
|
||
dcache->size = 0;
|
||
dcache->ptid = null_ptid;
|
||
@@ -365,22 +429,25 @@ dcache_init (void)
|
||
return dcache;
|
||
}
|
||
|
||
+/* BLOCK_FUNC routine for dcache_free. */
|
||
+
|
||
+static void
|
||
+free_block (struct dcache_block *block, void *param)
|
||
+{
|
||
+ free (block);
|
||
+}
|
||
+
|
||
/* Free a data cache. */
|
||
|
||
void
|
||
dcache_free (DCACHE *dcache)
|
||
{
|
||
- struct dcache_block *db, *next;
|
||
-
|
||
if (last_cache == dcache)
|
||
last_cache = NULL;
|
||
|
||
splay_tree_delete (dcache->tree);
|
||
- for (db = dcache->freelist; db != NULL; db = next)
|
||
- {
|
||
- next = db->newer;
|
||
- xfree (db);
|
||
- }
|
||
+ for_each_block (&dcache->oldest, free_block, NULL);
|
||
+ for_each_block (&dcache->freelist, free_block, NULL);
|
||
xfree (dcache);
|
||
}
|
||
|
||
--- a/gdb/doc/ChangeLog
|
||
+++ b/gdb/doc/ChangeLog
|
||
@@ -1,3 +1,7 @@
|
||
+2009-12-20 Joel Brobecker <brobecker@adacore.com>
|
||
+
|
||
+ * gpl.texi: Update to version 3 of the GPL.
|
||
+
|
||
2009-10-04 Pedro Alves <pedro@codesourcery.com>
|
||
|
||
* gdb.texinfo (Remote Protocol): Don't mention vCont;T.
|
||
--- a/gdb/doc/gpl.texi
|
||
+++ b/gdb/doc/gpl.texi
|
||
@@ -6,404 +6,730 @@
|
||
gfdl(7), fsf-funding(7).
|
||
@c man end
|
||
@c man begin COPYRIGHT
|
||
-Copyright @copyright{} 1989, 1991 Free Software Foundation, Inc.
|
||
-51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
||
+Copyright @copyright{} 2007 Free Software Foundation, Inc. @url{http://fsf.org/}
|
||
|
||
-Everyone is permitted to copy and distribute verbatim copies
|
||
-of this license document, but changing it is not allowed.
|
||
+Everyone is permitted to copy and distribute verbatim copies of this
|
||
+license document, but changing it is not allowed.
|
||
@c man end
|
||
@end ignore
|
||
@node Copying
|
||
@c man begin DESCRIPTION
|
||
@appendix GNU GENERAL PUBLIC LICENSE
|
||
-@center Version 2, June 1991
|
||
+@c The GNU General Public License.
|
||
+@center Version 3, 29 June 2007
|
||
+
|
||
+@c This file is intended to be included within another document,
|
||
+@c hence no sectioning command or @node.
|
||
|
||
@display
|
||
-Copyright @copyright{} 1989, 1991 Free Software Foundation, Inc.
|
||
-51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
||
+Copyright @copyright{} 2007 Free Software Foundation, Inc. @url{http://fsf.org/}
|
||
|
||
-Everyone is permitted to copy and distribute verbatim copies
|
||
-of this license document, but changing it is not allowed.
|
||
+Everyone is permitted to copy and distribute verbatim copies of this
|
||
+license document, but changing it is not allowed.
|
||
@end display
|
||
|
||
-@unnumberedsec Preamble
|
||
+@heading Preamble
|
||
+
|
||
+The GNU General Public License is a free, copyleft license for
|
||
+software and other kinds of works.
|
||
|
||
- The licenses for most software are designed to take away your
|
||
-freedom to share and change it. By contrast, the GNU General Public
|
||
-License is intended to guarantee your freedom to share and change free
|
||
-software---to make sure the software is free for all its users. This
|
||
-General Public License applies to most of the Free Software
|
||
-Foundation's software and to any other program whose authors commit to
|
||
-using it. (Some other Free Software Foundation software is covered by
|
||
-the GNU Library General Public License instead.) You can apply it to
|
||
-your programs, too.
|
||
+The licenses for most software and other practical works are designed
|
||
+to take away your freedom to share and change the works. By contrast,
|
||
+the GNU General Public License is intended to guarantee your freedom
|
||
+to share and change all versions of a program---to make sure it remains
|
||
+free software for all its users. We, the Free Software Foundation,
|
||
+use the GNU General Public License for most of our software; it
|
||
+applies also to any other work released this way by its authors. You
|
||
+can apply it to your programs, too.
|
||
|
||
- When we speak of free software, we are referring to freedom, not
|
||
+When we speak of free software, we are referring to freedom, not
|
||
price. Our General Public Licenses are designed to make sure that you
|
||
have the freedom to distribute copies of free software (and charge for
|
||
-this service if you wish), that you receive source code or can get it
|
||
-if you want it, that you can change the software or use pieces of it
|
||
-in new free programs; and that you know you can do these things.
|
||
-
|
||
- To protect your rights, we need to make restrictions that forbid
|
||
-anyone to deny you these rights or to ask you to surrender the rights.
|
||
-These restrictions translate to certain responsibilities for you if you
|
||
-distribute copies of the software, or if you modify it.
|
||
-
|
||
- For example, if you distribute copies of such a program, whether
|
||
-gratis or for a fee, you must give the recipients all the rights that
|
||
-you have. You must make sure that they, too, receive or can get the
|
||
-source code. And you must show them these terms so they know their
|
||
-rights.
|
||
-
|
||
- We protect your rights with two steps: (1) copyright the software, and
|
||
-(2) offer you this license which gives you legal permission to copy,
|
||
-distribute and/or modify the software.
|
||
-
|
||
- Also, for each author's protection and ours, we want to make certain
|
||
-that everyone understands that there is no warranty for this free
|
||
-software. If the software is modified by someone else and passed on, we
|
||
-want its recipients to know that what they have is not the original, so
|
||
-that any problems introduced by others will not reflect on the original
|
||
-authors' reputations.
|
||
-
|
||
- Finally, any free program is threatened constantly by software
|
||
-patents. We wish to avoid the danger that redistributors of a free
|
||
-program will individually obtain patent licenses, in effect making the
|
||
-program proprietary. To prevent this, we have made it clear that any
|
||
-patent must be licensed for everyone's free use or not licensed at all.
|
||
-
|
||
- The precise terms and conditions for copying, distribution and
|
||
+them if you wish), that you receive source code or can get it if you
|
||
+want it, that you can change the software or use pieces of it in new
|
||
+free programs, and that you know you can do these things.
|
||
+
|
||
+To protect your rights, we need to prevent others from denying you
|
||
+these rights or asking you to surrender the rights. Therefore, you
|
||
+have certain responsibilities if you distribute copies of the
|
||
+software, or if you modify it: responsibilities to respect the freedom
|
||
+of others.
|
||
+
|
||
+For example, if you distribute copies of such a program, whether
|
||
+gratis or for a fee, you must pass on to the recipients the same
|
||
+freedoms that you received. You must make sure that they, too,
|
||
+receive or can get the source code. And you must show them these
|
||
+terms so they know their rights.
|
||
+
|
||
+Developers that use the GNU GPL protect your rights with two steps:
|
||
+(1) assert copyright on the software, and (2) offer you this License
|
||
+giving you legal permission to copy, distribute and/or modify it.
|
||
+
|
||
+For the developers' and authors' protection, the GPL clearly explains
|
||
+that there is no warranty for this free software. For both users' and
|
||
+authors' sake, the GPL requires that modified versions be marked as
|
||
+changed, so that their problems will not be attributed erroneously to
|
||
+authors of previous versions.
|
||
+
|
||
+Some devices are designed to deny users access to install or run
|
||
+modified versions of the software inside them, although the
|
||
+manufacturer can do so. This is fundamentally incompatible with the
|
||
+aim of protecting users' freedom to change the software. The
|
||
+systematic pattern of such abuse occurs in the area of products for
|
||
+individuals to use, which is precisely where it is most unacceptable.
|
||
+Therefore, we have designed this version of the GPL to prohibit the
|
||
+practice for those products. If such problems arise substantially in
|
||
+other domains, we stand ready to extend this provision to those
|
||
+domains in future versions of the GPL, as needed to protect the
|
||
+freedom of users.
|
||
+
|
||
+Finally, every program is threatened constantly by software patents.
|
||
+States should not allow patents to restrict development and use of
|
||
+software on general-purpose computers, but in those that do, we wish
|
||
+to avoid the special danger that patents applied to a free program
|
||
+could make it effectively proprietary. To prevent this, the GPL
|
||
+assures that patents cannot be used to render the program non-free.
|
||
+
|
||
+The precise terms and conditions for copying, distribution and
|
||
modification follow.
|
||
|
||
-@iftex
|
||
-@unnumberedsec TERMS AND CONDITIONS FOR COPYING,@*DISTRIBUTION AND MODIFICATION
|
||
-@end iftex
|
||
-@ifnottex
|
||
-@center TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
||
-@end ifnottex
|
||
+@heading TERMS AND CONDITIONS
|
||
|
||
@enumerate 0
|
||
+@item Definitions.
|
||
+
|
||
+``This License'' refers to version 3 of the GNU General Public License.
|
||
+
|
||
+``Copyright'' also means copyright-like laws that apply to other kinds
|
||
+of works, such as semiconductor masks.
|
||
+
|
||
+``The Program'' refers to any copyrightable work licensed under this
|
||
+License. Each licensee is addressed as ``you''. ``Licensees'' and
|
||
+``recipients'' may be individuals or organizations.
|
||
+
|
||
+To ``modify'' a work means to copy from or adapt all or part of the work
|
||
+in a fashion requiring copyright permission, other than the making of
|
||
+an exact copy. The resulting work is called a ``modified version'' of
|
||
+the earlier work or a work ``based on'' the earlier work.
|
||
+
|
||
+A ``covered work'' means either the unmodified Program or a work based
|
||
+on the Program.
|
||
+
|
||
+To ``propagate'' a work means to do anything with it that, without
|
||
+permission, would make you directly or secondarily liable for
|
||
+infringement under applicable copyright law, except executing it on a
|
||
+computer or modifying a private copy. Propagation includes copying,
|
||
+distribution (with or without modification), making available to the
|
||
+public, and in some countries other activities as well.
|
||
+
|
||
+To ``convey'' a work means any kind of propagation that enables other
|
||
+parties to make or receive copies. Mere interaction with a user
|
||
+through a computer network, with no transfer of a copy, is not
|
||
+conveying.
|
||
+
|
||
+An interactive user interface displays ``Appropriate Legal Notices'' to
|
||
+the extent that it includes a convenient and prominently visible
|
||
+feature that (1) displays an appropriate copyright notice, and (2)
|
||
+tells the user that there is no warranty for the work (except to the
|
||
+extent that warranties are provided), that licensees may convey the
|
||
+work under this License, and how to view a copy of this License. If
|
||
+the interface presents a list of user commands or options, such as a
|
||
+menu, a prominent item in the list meets this criterion.
|
||
+
|
||
+@item Source Code.
|
||
+
|
||
+The ``source code'' for a work means the preferred form of the work for
|
||
+making modifications to it. ``Object code'' means any non-source form
|
||
+of a work.
|
||
+
|
||
+A ``Standard Interface'' means an interface that either is an official
|
||
+standard defined by a recognized standards body, or, in the case of
|
||
+interfaces specified for a particular programming language, one that
|
||
+is widely used among developers working in that language.
|
||
+
|
||
+The ``System Libraries'' of an executable work include anything, other
|
||
+than the work as a whole, that (a) is included in the normal form of
|
||
+packaging a Major Component, but which is not part of that Major
|
||
+Component, and (b) serves only to enable use of the work with that
|
||
+Major Component, or to implement a Standard Interface for which an
|
||
+implementation is available to the public in source code form. A
|
||
+``Major Component'', in this context, means a major essential component
|
||
+(kernel, window system, and so on) of the specific operating system
|
||
+(if any) on which the executable work runs, or a compiler used to
|
||
+produce the work, or an object code interpreter used to run it.
|
||
+
|
||
+The ``Corresponding Source'' for a work in object code form means all
|
||
+the source code needed to generate, install, and (for an executable
|
||
+work) run the object code and to modify the work, including scripts to
|
||
+control those activities. However, it does not include the work's
|
||
+System Libraries, or general-purpose tools or generally available free
|
||
+programs which are used unmodified in performing those activities but
|
||
+which are not part of the work. For example, Corresponding Source
|
||
+includes interface definition files associated with source files for
|
||
+the work, and the source code for shared libraries and dynamically
|
||
+linked subprograms that the work is specifically designed to require,
|
||
+such as by intimate data communication or control flow between those
|
||
+subprograms and other parts of the work.
|
||
+
|
||
+The Corresponding Source need not include anything that users can
|
||
+regenerate automatically from other parts of the Corresponding Source.
|
||
+
|
||
+The Corresponding Source for a work in source code form is that same
|
||
+work.
|
||
+
|
||
+@item Basic Permissions.
|
||
+
|
||
+All rights granted under this License are granted for the term of
|
||
+copyright on the Program, and are irrevocable provided the stated
|
||
+conditions are met. This License explicitly affirms your unlimited
|
||
+permission to run the unmodified Program. The output from running a
|
||
+covered work is covered by this License only if the output, given its
|
||
+content, constitutes a covered work. This License acknowledges your
|
||
+rights of fair use or other equivalent, as provided by copyright law.
|
||
+
|
||
+You may make, run and propagate covered works that you do not convey,
|
||
+without conditions so long as your license otherwise remains in force.
|
||
+You may convey covered works to others for the sole purpose of having
|
||
+them make modifications exclusively for you, or provide you with
|
||
+facilities for running those works, provided that you comply with the
|
||
+terms of this License in conveying all material for which you do not
|
||
+control copyright. Those thus making or running the covered works for
|
||
+you must do so exclusively on your behalf, under your direction and
|
||
+control, on terms that prohibit them from making any copies of your
|
||
+copyrighted material outside their relationship with you.
|
||
+
|
||
+Conveying under any other circumstances is permitted solely under the
|
||
+conditions stated below. Sublicensing is not allowed; section 10
|
||
+makes it unnecessary.
|
||
+
|
||
+@item Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||
+
|
||
+No covered work shall be deemed part of an effective technological
|
||
+measure under any applicable law fulfilling obligations under article
|
||
+11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||
+similar laws prohibiting or restricting circumvention of such
|
||
+measures.
|
||
+
|
||
+When you convey a covered work, you waive any legal power to forbid
|
||
+circumvention of technological measures to the extent such
|
||
+circumvention is effected by exercising rights under this License with
|
||
+respect to the covered work, and you disclaim any intention to limit
|
||
+operation or modification of the work as a means of enforcing, against
|
||
+the work's users, your or third parties' legal rights to forbid
|
||
+circumvention of technological measures.
|
||
+
|
||
+@item Conveying Verbatim Copies.
|
||
+
|
||
+You may convey verbatim copies of the Program's source code as you
|
||
+receive it, in any medium, provided that you conspicuously and
|
||
+appropriately publish on each copy an appropriate copyright notice;
|
||
+keep intact all notices stating that this License and any
|
||
+non-permissive terms added in accord with section 7 apply to the code;
|
||
+keep intact all notices of the absence of any warranty; and give all
|
||
+recipients a copy of this License along with the Program.
|
||
+
|
||
+You may charge any price or no price for each copy that you convey,
|
||
+and you may offer support or warranty protection for a fee.
|
||
+
|
||
+@item Conveying Modified Source Versions.
|
||
+
|
||
+You may convey a work based on the Program, or the modifications to
|
||
+produce it from the Program, in the form of source code under the
|
||
+terms of section 4, provided that you also meet all of these
|
||
+conditions:
|
||
+
|
||
+@enumerate a
|
||
@item
|
||
-This License applies to any program or other work which contains
|
||
-a notice placed by the copyright holder saying it may be distributed
|
||
-under the terms of this General Public License. The ``Program'', below,
|
||
-refers to any such program or work, and a ``work based on the Program''
|
||
-means either the Program or any derivative work under copyright law:
|
||
-that is to say, a work containing the Program or a portion of it,
|
||
-either verbatim or with modifications and/or translated into another
|
||
-language. (Hereinafter, translation is included without limitation in
|
||
-the term ``modification''.) Each licensee is addressed as ``you''.
|
||
-
|
||
-Activities other than copying, distribution and modification are not
|
||
-covered by this License; they are outside its scope. The act of
|
||
-running the Program is not restricted, and the output from the Program
|
||
-is covered only if its contents constitute a work based on the
|
||
-Program (independent of having been made by running the Program).
|
||
-Whether that is true depends on what the Program does.
|
||
+The work must carry prominent notices stating that you modified it,
|
||
+and giving a relevant date.
|
||
|
||
@item
|
||
-You may copy and distribute verbatim copies of the Program's
|
||
-source code as you receive it, in any medium, provided that you
|
||
-conspicuously and appropriately publish on each copy an appropriate
|
||
-copyright notice and disclaimer of warranty; keep intact all the
|
||
-notices that refer to this License and to the absence of any warranty;
|
||
-and give any other recipients of the Program a copy of this License
|
||
-along with the Program.
|
||
+The work must carry prominent notices stating that it is released
|
||
+under this License and any conditions added under section 7. This
|
||
+requirement modifies the requirement in section 4 to ``keep intact all
|
||
+notices''.
|
||
|
||
-You may charge a fee for the physical act of transferring a copy, and
|
||
-you may at your option offer warranty protection in exchange for a fee.
|
||
+@item
|
||
+You must license the entire work, as a whole, under this License to
|
||
+anyone who comes into possession of a copy. This License will
|
||
+therefore apply, along with any applicable section 7 additional terms,
|
||
+to the whole of the work, and all its parts, regardless of how they
|
||
+are packaged. This License gives no permission to license the work in
|
||
+any other way, but it does not invalidate such permission if you have
|
||
+separately received it.
|
||
|
||
@item
|
||
-You may modify your copy or copies of the Program or any portion
|
||
-of it, thus forming a work based on the Program, and copy and
|
||
-distribute such modifications or work under the terms of Section 1
|
||
-above, provided that you also meet all of these conditions:
|
||
+If the work has interactive user interfaces, each must display
|
||
+Appropriate Legal Notices; however, if the Program has interactive
|
||
+interfaces that do not display Appropriate Legal Notices, your work
|
||
+need not make them do so.
|
||
+@end enumerate
|
||
+
|
||
+A compilation of a covered work with other separate and independent
|
||
+works, which are not by their nature extensions of the covered work,
|
||
+and which are not combined with it such as to form a larger program,
|
||
+in or on a volume of a storage or distribution medium, is called an
|
||
+``aggregate'' if the compilation and its resulting copyright are not
|
||
+used to limit the access or legal rights of the compilation's users
|
||
+beyond what the individual works permit. Inclusion of a covered work
|
||
+in an aggregate does not cause this License to apply to the other
|
||
+parts of the aggregate.
|
||
+
|
||
+@item Conveying Non-Source Forms.
|
||
+
|
||
+You may convey a covered work in object code form under the terms of
|
||
+sections 4 and 5, provided that you also convey the machine-readable
|
||
+Corresponding Source under the terms of this License, in one of these
|
||
+ways:
|
||
|
||
@enumerate a
|
||
@item
|
||
-You must cause the modified files to carry prominent notices
|
||
-stating that you changed the files and the date of any change.
|
||
+Convey the object code in, or embodied in, a physical product
|
||
+(including a physical distribution medium), accompanied by the
|
||
+Corresponding Source fixed on a durable physical medium customarily
|
||
+used for software interchange.
|
||
|
||
@item
|
||
-You must cause any work that you distribute or publish, that in
|
||
-whole or in part contains or is derived from the Program or any
|
||
-part thereof, to be licensed as a whole at no charge to all third
|
||
-parties under the terms of this License.
|
||
+Convey the object code in, or embodied in, a physical product
|
||
+(including a physical distribution medium), accompanied by a written
|
||
+offer, valid for at least three years and valid for as long as you
|
||
+offer spare parts or customer support for that product model, to give
|
||
+anyone who possesses the object code either (1) a copy of the
|
||
+Corresponding Source for all the software in the product that is
|
||
+covered by this License, on a durable physical medium customarily used
|
||
+for software interchange, for a price no more than your reasonable
|
||
+cost of physically performing this conveying of source, or (2) access
|
||
+to copy the Corresponding Source from a network server at no charge.
|
||
|
||
@item
|
||
-If the modified program normally reads commands interactively
|
||
-when run, you must cause it, when started running for such
|
||
-interactive use in the most ordinary way, to print or display an
|
||
-announcement including an appropriate copyright notice and a
|
||
-notice that there is no warranty (or else, saying that you provide
|
||
-a warranty) and that users may redistribute the program under
|
||
-these conditions, and telling the user how to view a copy of this
|
||
-License. (Exception: if the Program itself is interactive but
|
||
-does not normally print such an announcement, your work based on
|
||
-the Program is not required to print an announcement.)
|
||
-@end enumerate
|
||
+Convey individual copies of the object code with a copy of the written
|
||
+offer to provide the Corresponding Source. This alternative is
|
||
+allowed only occasionally and noncommercially, and only if you
|
||
+received the object code with such an offer, in accord with subsection
|
||
+6b.
|
||
|
||
-These requirements apply to the modified work as a whole. If
|
||
-identifiable sections of that work are not derived from the Program,
|
||
-and can be reasonably considered independent and separate works in
|
||
-themselves, then this License, and its terms, do not apply to those
|
||
-sections when you distribute them as separate works. But when you
|
||
-distribute the same sections as part of a whole which is a work based
|
||
-on the Program, the distribution of the whole must be on the terms of
|
||
-this License, whose permissions for other licensees extend to the
|
||
-entire whole, and thus to each and every part regardless of who wrote it.
|
||
-
|
||
-Thus, it is not the intent of this section to claim rights or contest
|
||
-your rights to work written entirely by you; rather, the intent is to
|
||
-exercise the right to control the distribution of derivative or
|
||
-collective works based on the Program.
|
||
-
|
||
-In addition, mere aggregation of another work not based on the Program
|
||
-with the Program (or with a work based on the Program) on a volume of
|
||
-a storage or distribution medium does not bring the other work under
|
||
-the scope of this License.
|
||
+@item
|
||
+Convey the object code by offering access from a designated place
|
||
+(gratis or for a charge), and offer equivalent access to the
|
||
+Corresponding Source in the same way through the same place at no
|
||
+further charge. You need not require recipients to copy the
|
||
+Corresponding Source along with the object code. If the place to copy
|
||
+the object code is a network server, the Corresponding Source may be
|
||
+on a different server (operated by you or a third party) that supports
|
||
+equivalent copying facilities, provided you maintain clear directions
|
||
+next to the object code saying where to find the Corresponding Source.
|
||
+Regardless of what server hosts the Corresponding Source, you remain
|
||
+obligated to ensure that it is available for as long as needed to
|
||
+satisfy these requirements.
|
||
|
||
@item
|
||
-You may copy and distribute the Program (or a work based on it,
|
||
-under Section 2) in object code or executable form under the terms of
|
||
-Sections 1 and 2 above provided that you also do one of the following:
|
||
+Convey the object code using peer-to-peer transmission, provided you
|
||
+inform other peers where the object code and Corresponding Source of
|
||
+the work are being offered to the general public at no charge under
|
||
+subsection 6d.
|
||
+
|
||
+@end enumerate
|
||
+
|
||
+A separable portion of the object code, whose source code is excluded
|
||
+from the Corresponding Source as a System Library, need not be
|
||
+included in conveying the object code work.
|
||
+
|
||
+A ``User Product'' is either (1) a ``consumer product'', which means any
|
||
+tangible personal property which is normally used for personal,
|
||
+family, or household purposes, or (2) anything designed or sold for
|
||
+incorporation into a dwelling. In determining whether a product is a
|
||
+consumer product, doubtful cases shall be resolved in favor of
|
||
+coverage. For a particular product received by a particular user,
|
||
+``normally used'' refers to a typical or common use of that class of
|
||
+product, regardless of the status of the particular user or of the way
|
||
+in which the particular user actually uses, or expects or is expected
|
||
+to use, the product. A product is a consumer product regardless of
|
||
+whether the product has substantial commercial, industrial or
|
||
+non-consumer uses, unless such uses represent the only significant
|
||
+mode of use of the product.
|
||
+
|
||
+``Installation Information'' for a User Product means any methods,
|
||
+procedures, authorization keys, or other information required to
|
||
+install and execute modified versions of a covered work in that User
|
||
+Product from a modified version of its Corresponding Source. The
|
||
+information must suffice to ensure that the continued functioning of
|
||
+the modified object code is in no case prevented or interfered with
|
||
+solely because modification has been made.
|
||
+
|
||
+If you convey an object code work under this section in, or with, or
|
||
+specifically for use in, a User Product, and the conveying occurs as
|
||
+part of a transaction in which the right of possession and use of the
|
||
+User Product is transferred to the recipient in perpetuity or for a
|
||
+fixed term (regardless of how the transaction is characterized), the
|
||
+Corresponding Source conveyed under this section must be accompanied
|
||
+by the Installation Information. But this requirement does not apply
|
||
+if neither you nor any third party retains the ability to install
|
||
+modified object code on the User Product (for example, the work has
|
||
+been installed in ROM).
|
||
+
|
||
+The requirement to provide Installation Information does not include a
|
||
+requirement to continue to provide support service, warranty, or
|
||
+updates for a work that has been modified or installed by the
|
||
+recipient, or for the User Product in which it has been modified or
|
||
+installed. Access to a network may be denied when the modification
|
||
+itself materially and adversely affects the operation of the network
|
||
+or violates the rules and protocols for communication across the
|
||
+network.
|
||
+
|
||
+Corresponding Source conveyed, and Installation Information provided,
|
||
+in accord with this section must be in a format that is publicly
|
||
+documented (and with an implementation available to the public in
|
||
+source code form), and must require no special password or key for
|
||
+unpacking, reading or copying.
|
||
+
|
||
+@item Additional Terms.
|
||
+
|
||
+``Additional permissions'' are terms that supplement the terms of this
|
||
+License by making exceptions from one or more of its conditions.
|
||
+Additional permissions that are applicable to the entire Program shall
|
||
+be treated as though they were included in this License, to the extent
|
||
+that they are valid under applicable law. If additional permissions
|
||
+apply only to part of the Program, that part may be used separately
|
||
+under those permissions, but the entire Program remains governed by
|
||
+this License without regard to the additional permissions.
|
||
+
|
||
+When you convey a copy of a covered work, you may at your option
|
||
+remove any additional permissions from that copy, or from any part of
|
||
+it. (Additional permissions may be written to require their own
|
||
+removal in certain cases when you modify the work.) You may place
|
||
+additional permissions on material, added by you to a covered work,
|
||
+for which you have or can give appropriate copyright permission.
|
||
+
|
||
+Notwithstanding any other provision of this License, for material you
|
||
+add to a covered work, you may (if authorized by the copyright holders
|
||
+of that material) supplement the terms of this License with terms:
|
||
|
||
@enumerate a
|
||
@item
|
||
-Accompany it with the complete corresponding machine-readable
|
||
-source code, which must be distributed under the terms of Sections
|
||
-1 and 2 above on a medium customarily used for software interchange; or,
|
||
+Disclaiming warranty or limiting liability differently from the terms
|
||
+of sections 15 and 16 of this License; or
|
||
|
||
@item
|
||
-Accompany it with a written offer, valid for at least three
|
||
-years, to give any third party, for a charge no more than your
|
||
-cost of physically performing source distribution, a complete
|
||
-machine-readable copy of the corresponding source code, to be
|
||
-distributed under the terms of Sections 1 and 2 above on a medium
|
||
-customarily used for software interchange; or,
|
||
+Requiring preservation of specified reasonable legal notices or author
|
||
+attributions in that material or in the Appropriate Legal Notices
|
||
+displayed by works containing it; or
|
||
|
||
@item
|
||
-Accompany it with the information you received as to the offer
|
||
-to distribute corresponding source code. (This alternative is
|
||
-allowed only for noncommercial distribution and only if you
|
||
-received the program in object code or executable form with such
|
||
-an offer, in accord with Subsection b above.)
|
||
-@end enumerate
|
||
-
|
||
-The source code for a work means the preferred form of the work for
|
||
-making modifications to it. For an executable work, complete source
|
||
-code means all the source code for all modules it contains, plus any
|
||
-associated interface definition files, plus the scripts used to
|
||
-control compilation and installation of the executable. However, as a
|
||
-special exception, the source code distributed need not include
|
||
-anything that is normally distributed (in either source or binary
|
||
-form) with the major components (compiler, kernel, and so on) of the
|
||
-operating system on which the executable runs, unless that component
|
||
-itself accompanies the executable.
|
||
-
|
||
-If distribution of executable or object code is made by offering
|
||
-access to copy from a designated place, then offering equivalent
|
||
-access to copy the source code from the same place counts as
|
||
-distribution of the source code, even though third parties are not
|
||
-compelled to copy the source along with the object code.
|
||
+Prohibiting misrepresentation of the origin of that material, or
|
||
+requiring that modified versions of such material be marked in
|
||
+reasonable ways as different from the original version; or
|
||
|
||
@item
|
||
-You may not copy, modify, sublicense, or distribute the Program
|
||
-except as expressly provided under this License. Any attempt
|
||
-otherwise to copy, modify, sublicense or distribute the Program is
|
||
-void, and will automatically terminate your rights under this License.
|
||
-However, parties who have received copies, or rights, from you under
|
||
-this License will not have their licenses terminated so long as such
|
||
-parties remain in full compliance.
|
||
+Limiting the use for publicity purposes of names of licensors or
|
||
+authors of the material; or
|
||
|
||
@item
|
||
-You are not required to accept this License, since you have not
|
||
-signed it. However, nothing else grants you permission to modify or
|
||
-distribute the Program or its derivative works. These actions are
|
||
-prohibited by law if you do not accept this License. Therefore, by
|
||
-modifying or distributing the Program (or any work based on the
|
||
-Program), you indicate your acceptance of this License to do so, and
|
||
-all its terms and conditions for copying, distributing or modifying
|
||
-the Program or works based on it.
|
||
+Declining to grant rights under trademark law for use of some trade
|
||
+names, trademarks, or service marks; or
|
||
|
||
@item
|
||
-Each time you redistribute the Program (or any work based on the
|
||
-Program), the recipient automatically receives a license from the
|
||
-original licensor to copy, distribute or modify the Program subject to
|
||
-these terms and conditions. You may not impose any further
|
||
-restrictions on the recipients' exercise of the rights granted herein.
|
||
-You are not responsible for enforcing compliance by third parties to
|
||
+Requiring indemnification of licensors and authors of that material by
|
||
+anyone who conveys the material (or modified versions of it) with
|
||
+contractual assumptions of liability to the recipient, for any
|
||
+liability that these contractual assumptions directly impose on those
|
||
+licensors and authors.
|
||
+@end enumerate
|
||
+
|
||
+All other non-permissive additional terms are considered ``further
|
||
+restrictions'' within the meaning of section 10. If the Program as you
|
||
+received it, or any part of it, contains a notice stating that it is
|
||
+governed by this License along with a term that is a further
|
||
+restriction, you may remove that term. If a license document contains
|
||
+a further restriction but permits relicensing or conveying under this
|
||
+License, you may add to a covered work material governed by the terms
|
||
+of that license document, provided that the further restriction does
|
||
+not survive such relicensing or conveying.
|
||
+
|
||
+If you add terms to a covered work in accord with this section, you
|
||
+must place, in the relevant source files, a statement of the
|
||
+additional terms that apply to those files, or a notice indicating
|
||
+where to find the applicable terms.
|
||
+
|
||
+Additional terms, permissive or non-permissive, may be stated in the
|
||
+form of a separately written license, or stated as exceptions; the
|
||
+above requirements apply either way.
|
||
+
|
||
+@item Termination.
|
||
+
|
||
+You may not propagate or modify a covered work except as expressly
|
||
+provided under this License. Any attempt otherwise to propagate or
|
||
+modify it is void, and will automatically terminate your rights under
|
||
+this License (including any patent licenses granted under the third
|
||
+paragraph of section 11).
|
||
+
|
||
+However, if you cease all violation of this License, then your license
|
||
+from a particular copyright holder is reinstated (a) provisionally,
|
||
+unless and until the copyright holder explicitly and finally
|
||
+terminates your license, and (b) permanently, if the copyright holder
|
||
+fails to notify you of the violation by some reasonable means prior to
|
||
+60 days after the cessation.
|
||
+
|
||
+Moreover, your license from a particular copyright holder is
|
||
+reinstated permanently if the copyright holder notifies you of the
|
||
+violation by some reasonable means, this is the first time you have
|
||
+received notice of violation of this License (for any work) from that
|
||
+copyright holder, and you cure the violation prior to 30 days after
|
||
+your receipt of the notice.
|
||
+
|
||
+Termination of your rights under this section does not terminate the
|
||
+licenses of parties who have received copies or rights from you under
|
||
+this License. If your rights have been terminated and not permanently
|
||
+reinstated, you do not qualify to receive new licenses for the same
|
||
+material under section 10.
|
||
+
|
||
+@item Acceptance Not Required for Having Copies.
|
||
+
|
||
+You are not required to accept this License in order to receive or run
|
||
+a copy of the Program. Ancillary propagation of a covered work
|
||
+occurring solely as a consequence of using peer-to-peer transmission
|
||
+to receive a copy likewise does not require acceptance. However,
|
||
+nothing other than this License grants you permission to propagate or
|
||
+modify any covered work. These actions infringe copyright if you do
|
||
+not accept this License. Therefore, by modifying or propagating a
|
||
+covered work, you indicate your acceptance of this License to do so.
|
||
+
|
||
+@item Automatic Licensing of Downstream Recipients.
|
||
+
|
||
+Each time you convey a covered work, the recipient automatically
|
||
+receives a license from the original licensors, to run, modify and
|
||
+propagate that work, subject to this License. You are not responsible
|
||
+for enforcing compliance by third parties with this License.
|
||
+
|
||
+An ``entity transaction'' is a transaction transferring control of an
|
||
+organization, or substantially all assets of one, or subdividing an
|
||
+organization, or merging organizations. If propagation of a covered
|
||
+work results from an entity transaction, each party to that
|
||
+transaction who receives a copy of the work also receives whatever
|
||
+licenses to the work the party's predecessor in interest had or could
|
||
+give under the previous paragraph, plus a right to possession of the
|
||
+Corresponding Source of the work from the predecessor in interest, if
|
||
+the predecessor has it or can get it with reasonable efforts.
|
||
+
|
||
+You may not impose any further restrictions on the exercise of the
|
||
+rights granted or affirmed under this License. For example, you may
|
||
+not impose a license fee, royalty, or other charge for exercise of
|
||
+rights granted under this License, and you may not initiate litigation
|
||
+(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||
+any patent claim is infringed by making, using, selling, offering for
|
||
+sale, or importing the Program or any portion of it.
|
||
+
|
||
+@item Patents.
|
||
+
|
||
+A ``contributor'' is a copyright holder who authorizes use under this
|
||
+License of the Program or a work on which the Program is based. The
|
||
+work thus licensed is called the contributor's ``contributor version''.
|
||
+
|
||
+A contributor's ``essential patent claims'' are all patent claims owned
|
||
+or controlled by the contributor, whether already acquired or
|
||
+hereafter acquired, that would be infringed by some manner, permitted
|
||
+by this License, of making, using, or selling its contributor version,
|
||
+but do not include claims that would be infringed only as a
|
||
+consequence of further modification of the contributor version. For
|
||
+purposes of this definition, ``control'' includes the right to grant
|
||
+patent sublicenses in a manner consistent with the requirements of
|
||
this License.
|
||
|
||
-@item
|
||
-If, as a consequence of a court judgment or allegation of patent
|
||
-infringement or for any other reason (not limited to patent issues),
|
||
-conditions are imposed on you (whether by court order, agreement or
|
||
+Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||
+patent license under the contributor's essential patent claims, to
|
||
+make, use, sell, offer for sale, import and otherwise run, modify and
|
||
+propagate the contents of its contributor version.
|
||
+
|
||
+In the following three paragraphs, a ``patent license'' is any express
|
||
+agreement or commitment, however denominated, not to enforce a patent
|
||
+(such as an express permission to practice a patent or covenant not to
|
||
+sue for patent infringement). To ``grant'' such a patent license to a
|
||
+party means to make such an agreement or commitment not to enforce a
|
||
+patent against the party.
|
||
+
|
||
+If you convey a covered work, knowingly relying on a patent license,
|
||
+and the Corresponding Source of the work is not available for anyone
|
||
+to copy, free of charge and under the terms of this License, through a
|
||
+publicly available network server or other readily accessible means,
|
||
+then you must either (1) cause the Corresponding Source to be so
|
||
+available, or (2) arrange to deprive yourself of the benefit of the
|
||
+patent license for this particular work, or (3) arrange, in a manner
|
||
+consistent with the requirements of this License, to extend the patent
|
||
+license to downstream recipients. ``Knowingly relying'' means you have
|
||
+actual knowledge that, but for the patent license, your conveying the
|
||
+covered work in a country, or your recipient's use of the covered work
|
||
+in a country, would infringe one or more identifiable patents in that
|
||
+country that you have reason to believe are valid.
|
||
+
|
||
+If, pursuant to or in connection with a single transaction or
|
||
+arrangement, you convey, or propagate by procuring conveyance of, a
|
||
+covered work, and grant a patent license to some of the parties
|
||
+receiving the covered work authorizing them to use, propagate, modify
|
||
+or convey a specific copy of the covered work, then the patent license
|
||
+you grant is automatically extended to all recipients of the covered
|
||
+work and works based on it.
|
||
+
|
||
+A patent license is ``discriminatory'' if it does not include within the
|
||
+scope of its coverage, prohibits the exercise of, or is conditioned on
|
||
+the non-exercise of one or more of the rights that are specifically
|
||
+granted under this License. You may not convey a covered work if you
|
||
+are a party to an arrangement with a third party that is in the
|
||
+business of distributing software, under which you make payment to the
|
||
+third party based on the extent of your activity of conveying the
|
||
+work, and under which the third party grants, to any of the parties
|
||
+who would receive the covered work from you, a discriminatory patent
|
||
+license (a) in connection with copies of the covered work conveyed by
|
||
+you (or copies made from those copies), or (b) primarily for and in
|
||
+connection with specific products or compilations that contain the
|
||
+covered work, unless you entered into that arrangement, or that patent
|
||
+license was granted, prior to 28 March 2007.
|
||
+
|
||
+Nothing in this License shall be construed as excluding or limiting
|
||
+any implied license or other defenses to infringement that may
|
||
+otherwise be available to you under applicable patent law.
|
||
+
|
||
+@item No Surrender of Others' Freedom.
|
||
+
|
||
+If conditions are imposed on you (whether by court order, agreement or
|
||
otherwise) that contradict the conditions of this License, they do not
|
||
-excuse you from the conditions of this License. If you cannot
|
||
-distribute so as to satisfy simultaneously your obligations under this
|
||
-License and any other pertinent obligations, then as a consequence you
|
||
-may not distribute the Program at all. For example, if a patent
|
||
-license would not permit royalty-free redistribution of the Program by
|
||
-all those who receive copies directly or indirectly through you, then
|
||
-the only way you could satisfy both it and this License would be to
|
||
-refrain entirely from distribution of the Program.
|
||
-
|
||
-If any portion of this section is held invalid or unenforceable under
|
||
-any particular circumstance, the balance of the section is intended to
|
||
-apply and the section as a whole is intended to apply in other
|
||
-circumstances.
|
||
-
|
||
-It is not the purpose of this section to induce you to infringe any
|
||
-patents or other property right claims or to contest validity of any
|
||
-such claims; this section has the sole purpose of protecting the
|
||
-integrity of the free software distribution system, which is
|
||
-implemented by public license practices. Many people have made
|
||
-generous contributions to the wide range of software distributed
|
||
-through that system in reliance on consistent application of that
|
||
-system; it is up to the author/donor to decide if he or she is willing
|
||
-to distribute software through any other system and a licensee cannot
|
||
-impose that choice.
|
||
-
|
||
-This section is intended to make thoroughly clear what is believed to
|
||
-be a consequence of the rest of this License.
|
||
+excuse you from the conditions of this License. If you cannot convey
|
||
+a covered work so as to satisfy simultaneously your obligations under
|
||
+this License and any other pertinent obligations, then as a
|
||
+consequence you may not convey it at all. For example, if you agree
|
||
+to terms that obligate you to collect a royalty for further conveying
|
||
+from those to whom you convey the Program, the only way you could
|
||
+satisfy both those terms and this License would be to refrain entirely
|
||
+from conveying the Program.
|
||
+
|
||
+@item Use with the GNU Affero General Public License.
|
||
+
|
||
+Notwithstanding any other provision of this License, you have
|
||
+permission to link or combine any covered work with a work licensed
|
||
+under version 3 of the GNU Affero General Public License into a single
|
||
+combined work, and to convey the resulting work. The terms of this
|
||
+License will continue to apply to the part which is the covered work,
|
||
+but the special requirements of the GNU Affero General Public License,
|
||
+section 13, concerning interaction through a network will apply to the
|
||
+combination as such.
|
||
+
|
||
+@item Revised Versions of this License.
|
||
|
||
-@item
|
||
-If the distribution and/or use of the Program is restricted in
|
||
-certain countries either by patents or by copyrighted interfaces, the
|
||
-original copyright holder who places the Program under this License
|
||
-may add an explicit geographical distribution limitation excluding
|
||
-those countries, so that distribution is permitted only in or among
|
||
-countries not thus excluded. In such case, this License incorporates
|
||
-the limitation as if written in the body of this License.
|
||
-
|
||
-@item
|
||
The Free Software Foundation may publish revised and/or new versions
|
||
-of the General Public License from time to time. Such new versions will
|
||
-be similar in spirit to the present version, but may differ in detail to
|
||
-address new problems or concerns.
|
||
+of the GNU General Public License from time to time. Such new
|
||
+versions will be similar in spirit to the present version, but may
|
||
+differ in detail to address new problems or concerns.
|
||
|
||
Each version is given a distinguishing version number. If the Program
|
||
-specifies a version number of this License which applies to it and ``any
|
||
-later version'', you have the option of following the terms and conditions
|
||
-either of that version or of any later version published by the Free
|
||
-Software Foundation. If the Program does not specify a version number of
|
||
-this License, you may choose any version ever published by the Free Software
|
||
-Foundation.
|
||
-
|
||
-@item
|
||
-If you wish to incorporate parts of the Program into other free
|
||
-programs whose distribution conditions are different, write to the author
|
||
-to ask for permission. For software which is copyrighted by the Free
|
||
-Software Foundation, write to the Free Software Foundation; we sometimes
|
||
-make exceptions for this. Our decision will be guided by the two goals
|
||
-of preserving the free status of all derivatives of our free software and
|
||
-of promoting the sharing and reuse of software generally.
|
||
-
|
||
-@iftex
|
||
-@heading NO WARRANTY
|
||
-@end iftex
|
||
-@ifnottex
|
||
-@center NO WARRANTY
|
||
-@end ifnottex
|
||
-
|
||
-@item
|
||
-BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
||
-FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
||
-OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
||
-PROVIDE THE PROGRAM ``AS IS'' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
|
||
-OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||
-MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
||
-TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
|
||
-PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
|
||
-REPAIR OR CORRECTION.
|
||
+specifies that a certain numbered version of the GNU General Public
|
||
+License ``or any later version'' applies to it, you have the option of
|
||
+following the terms and conditions either of that numbered version or
|
||
+of any later version published by the Free Software Foundation. If
|
||
+the Program does not specify a version number of the GNU General
|
||
+Public License, you may choose any version ever published by the Free
|
||
+Software Foundation.
|
||
+
|
||
+If the Program specifies that a proxy can decide which future versions
|
||
+of the GNU General Public License can be used, that proxy's public
|
||
+statement of acceptance of a version permanently authorizes you to
|
||
+choose that version for the Program.
|
||
+
|
||
+Later license versions may give you additional or different
|
||
+permissions. However, no additional obligations are imposed on any
|
||
+author or copyright holder as a result of your choosing to follow a
|
||
+later version.
|
||
+
|
||
+@item Disclaimer of Warranty.
|
||
+
|
||
+THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||
+APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||
+HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM ``AS IS'' WITHOUT
|
||
+WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT
|
||
+LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
||
+A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
|
||
+PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
|
||
+DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
|
||
+CORRECTION.
|
||
+
|
||
+@item Limitation of Liability.
|
||
|
||
-@item
|
||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||
-WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
||
-REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
||
-INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
|
||
-OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
|
||
-TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
|
||
-YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
||
-PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
|
||
-POSSIBILITY OF SUCH DAMAGES.
|
||
+WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR
|
||
+CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
||
+INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES
|
||
+ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT
|
||
+NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR
|
||
+LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM
|
||
+TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER
|
||
+PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
|
||
+
|
||
+@item Interpretation of Sections 15 and 16.
|
||
+
|
||
+If the disclaimer of warranty and limitation of liability provided
|
||
+above cannot be given local legal effect according to their terms,
|
||
+reviewing courts shall apply local law that most closely approximates
|
||
+an absolute waiver of all civil liability in connection with the
|
||
+Program, unless a warranty or assumption of liability accompanies a
|
||
+copy of the Program in return for a fee.
|
||
+
|
||
@end enumerate
|
||
|
||
-@iftex
|
||
@heading END OF TERMS AND CONDITIONS
|
||
-@end iftex
|
||
-@ifnottex
|
||
-@center END OF TERMS AND CONDITIONS
|
||
-@end ifnottex
|
||
|
||
-@page
|
||
-@unnumberedsec How to Apply These Terms to Your New Programs
|
||
+@heading How to Apply These Terms to Your New Programs
|
||
|
||
- If you develop a new program, and you want it to be of the greatest
|
||
+If you develop a new program, and you want it to be of the greatest
|
||
possible use to the public, the best way to achieve this is to make it
|
||
-free software which everyone can redistribute and change under these terms.
|
||
+free software which everyone can redistribute and change under these
|
||
+terms.
|
||
|
||
- To do so, attach the following notices to the program. It is safest
|
||
+To do so, attach the following notices to the program. It is safest
|
||
to attach them to the start of each source file to most effectively
|
||
-convey the exclusion of warranty; and each file should have at least
|
||
+state the exclusion of warranty; and each file should have at least
|
||
the ``copyright'' line and a pointer to where the full notice is found.
|
||
|
||
@smallexample
|
||
@var{one line to give the program's name and a brief idea of what it does.}
|
||
-Copyright (C) @var{year} @var{name of author}
|
||
+Copyright (C) @var{year} @var{name of author}
|
||
|
||
-This program is free software; you can redistribute it and/or modify
|
||
+This program is free software: you can redistribute it and/or modify
|
||
it under the terms of the GNU General Public License as published by
|
||
-the Free Software Foundation; either version 2 of the License, or
|
||
-(at your option) any later version.
|
||
+the Free Software Foundation, either version 3 of the License, or (at
|
||
+your option) any later version.
|
||
|
||
-This program is distributed in the hope that it will be useful,
|
||
-but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
-MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
-GNU General Public License for more details.
|
||
+This program is distributed in the hope that it will be useful, but
|
||
+WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||
+General Public License for more details.
|
||
|
||
You should have received a copy of the GNU General Public License
|
||
-along with this program; if not, write to the Free Software
|
||
-Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||
-Boston, MA 02110-1301, USA.
|
||
+along with this program. If not, see @url{http://www.gnu.org/licenses/}.
|
||
@end smallexample
|
||
|
||
Also add information on how to contact you by electronic and paper mail.
|
||
|
||
-If the program is interactive, make it output a short notice like this
|
||
-when it starts in an interactive mode:
|
||
+If the program does terminal interaction, make it output a short
|
||
+notice like this when it starts in an interactive mode:
|
||
|
||
@smallexample
|
||
-Gnomovision version 69, Copyright (C) @var{year} @var{name of author}
|
||
-Gnomovision comes with ABSOLUTELY NO WARRANTY; for details
|
||
-type `show w'.
|
||
+@var{program} Copyright (C) @var{year} @var{name of author}
|
||
+This program comes with ABSOLUTELY NO WARRANTY; for details type @samp{show w}.
|
||
This is free software, and you are welcome to redistribute it
|
||
-under certain conditions; type `show c' for details.
|
||
+under certain conditions; type @samp{show c} for details.
|
||
@end smallexample
|
||
|
||
The hypothetical commands @samp{show w} and @samp{show c} should show
|
||
-the appropriate parts of the General Public License. Of course, the
|
||
-commands you use may be called something other than @samp{show w} and
|
||
-@samp{show c}; they could even be mouse-clicks or menu items---whatever
|
||
-suits your program.
|
||
-
|
||
-You should also get your employer (if you work as a programmer) or your
|
||
-school, if any, to sign a ``copyright disclaimer'' for the program, if
|
||
-necessary. Here is a sample; alter the names:
|
||
-
|
||
-@smallexample
|
||
-Yoyodyne, Inc., hereby disclaims all copyright interest in the program
|
||
-`Gnomovision' (which makes passes at compilers) written by James Hacker.
|
||
-
|
||
-@var{signature of Ty Coon}, 1 April 1989
|
||
-Ty Coon, President of Vice
|
||
-@end smallexample
|
||
-
|
||
-This General Public License does not permit incorporating your program into
|
||
-proprietary programs. If your program is a subroutine library, you may
|
||
-consider it more useful to permit linking proprietary applications with the
|
||
-library. If this is what you want to do, use the GNU Library General
|
||
-Public License instead of this License.
|
||
+the appropriate parts of the General Public License. Of course, your
|
||
+program's commands might be different; for a GUI interface, you would
|
||
+use an ``about box''.
|
||
+
|
||
+You should also get your employer (if you work as a programmer) or school,
|
||
+if any, to sign a ``copyright disclaimer'' for the program, if necessary.
|
||
+For more information on this, and how to apply and follow the GNU GPL, see
|
||
+@url{http://www.gnu.org/licenses/}.
|
||
+
|
||
+The GNU General Public License does not permit incorporating your
|
||
+program into proprietary programs. If your program is a subroutine
|
||
+library, you may consider it more useful to permit linking proprietary
|
||
+applications with the library. If this is what you want to do, use
|
||
+the GNU Lesser General Public License instead of this License. But
|
||
+first, please read @url{http://www.gnu.org/philosophy/why-not-lgpl.html}.
|
||
@c man end
|
||
--- a/gdb/dwarf2-frame.c
|
||
+++ b/gdb/dwarf2-frame.c
|
||
@@ -1525,6 +1525,14 @@ find_cie (struct dwarf2_cie_table *cie_table, ULONGEST cie_pointer)
|
||
{
|
||
struct dwarf2_cie **p_cie;
|
||
|
||
+ /* The C standard (ISO/IEC 9899:TC2) requires the BASE argument to
|
||
+ bsearch be non-NULL. */
|
||
+ if (cie_table->entries == NULL)
|
||
+ {
|
||
+ gdb_assert (cie_table->num_entries == 0);
|
||
+ return NULL;
|
||
+ }
|
||
+
|
||
p_cie = bsearch (&cie_pointer, cie_table->entries, cie_table->num_entries,
|
||
sizeof (cie_table->entries[0]), bsearch_cie_cmp);
|
||
if (p_cie != NULL)
|
||
--- a/gdb/dwarf2read.c
|
||
+++ b/gdb/dwarf2read.c
|
||
@@ -58,6 +58,9 @@
|
||
#endif
|
||
#ifdef HAVE_MMAP
|
||
#include <sys/mman.h>
|
||
+#ifndef MAP_FAILED
|
||
+#define MAP_FAILED ((void *) -1)
|
||
+#endif
|
||
#endif
|
||
|
||
#if 0
|
||
--- a/gdb/elfread.c
|
||
+++ b/gdb/elfread.c
|
||
@@ -535,7 +535,7 @@ elf_symtab_read (struct objfile *objfile, int type,
|
||
|
||
if (len > 4 && strcmp (sym->name + len - 4, "@plt") == 0)
|
||
{
|
||
- char *base_name = alloca (len - 4 + 1);
|
||
+ char *base_name = xmalloc (len - 4 + 1);
|
||
struct minimal_symbol *mtramp;
|
||
|
||
memcpy (base_name, sym->name, len - 4);
|
||
@@ -543,6 +543,7 @@ elf_symtab_read (struct objfile *objfile, int type,
|
||
mtramp = record_minimal_symbol (base_name, symaddr,
|
||
mst_solib_trampoline,
|
||
sym->section, objfile);
|
||
+ xfree (base_name);
|
||
if (mtramp)
|
||
{
|
||
MSYMBOL_SIZE (mtramp) = MSYMBOL_SIZE (msym);
|
||
--- a/gdb/objfiles.c
|
||
+++ b/gdb/objfiles.c
|
||
@@ -1045,6 +1045,14 @@ update_section_map (struct obj_section ***pmap, int *pmap_size)
|
||
if (insert_section_p (objfile->obfd, s->the_bfd_section))
|
||
alloc_size += 1;
|
||
|
||
+ /* This happens on detach/attach (e.g. in gdb.base/attach.exp). */
|
||
+ if (alloc_size == 0)
|
||
+ {
|
||
+ *pmap = NULL;
|
||
+ *pmap_size = 0;
|
||
+ return;
|
||
+ }
|
||
+
|
||
map = xmalloc (alloc_size * sizeof (*map));
|
||
|
||
i = 0;
|
||
@@ -1105,6 +1113,14 @@ find_pc_section (CORE_ADDR pc)
|
||
objfiles_changed_p = 0;
|
||
}
|
||
|
||
+ /* The C standard (ISO/IEC 9899:TC2) requires the BASE argument to
|
||
+ bsearch be non-NULL. */
|
||
+ if (sections == NULL)
|
||
+ {
|
||
+ gdb_assert (num_sections == 0);
|
||
+ return NULL;
|
||
+ }
|
||
+
|
||
sp = (struct obj_section **) bsearch (&pc, sections, num_sections,
|
||
sizeof (*sections), bsearch_cmp);
|
||
if (sp != NULL)
|
||
--- a/gdb/score-tdep.c
|
||
+++ b/gdb/score-tdep.c
|
||
@@ -56,58 +56,6 @@ struct score_frame_cache
|
||
|
||
static int target_mach = bfd_mach_score7;
|
||
|
||
-#if WITH_SIM
|
||
-int
|
||
-score_target_can_use_watch (int type, int cnt, int othertype)
|
||
-{
|
||
- if (strcmp (current_target.to_shortname, "sim") == 0)
|
||
- return soc_gh_can_use_watch (type, cnt);
|
||
- return (*current_target.to_can_use_hw_breakpoint) (type, cnt, othertype);
|
||
-}
|
||
-
|
||
-int
|
||
-score_stopped_by_watch (void)
|
||
-{
|
||
- if (strcmp (current_target.to_shortname, "sim") == 0)
|
||
- return soc_gh_stopped_by_watch ();
|
||
- return (*current_target.to_stopped_by_watchpoint) ();
|
||
-}
|
||
-
|
||
-int
|
||
-score_target_insert_watchpoint (CORE_ADDR addr, int len, int type)
|
||
-{
|
||
- if (strcmp (current_target.to_shortname, "sim") == 0)
|
||
- return soc_gh_add_watch (addr, len, type);
|
||
- return (*current_target.to_insert_watchpoint) (addr, len, type);
|
||
-}
|
||
-
|
||
-int
|
||
-score_target_remove_watchpoint (CORE_ADDR addr, int len, int type)
|
||
-{
|
||
- if (strcmp (current_target.to_shortname, "sim") == 0)
|
||
- return soc_gh_del_watch (addr, len, type);
|
||
- return (*current_target.to_remove_watchpoint) (addr, len, type);
|
||
-}
|
||
-
|
||
-int
|
||
-score_target_insert_hw_breakpoint (struct gdbarch *gdbarch,
|
||
- struct bp_target_info * bp_tgt)
|
||
-{
|
||
- if (strcmp (current_target.to_shortname, "sim") == 0)
|
||
- return soc_gh_add_hardbp (bp_tgt->placed_address);
|
||
- return (*current_target.to_insert_hw_breakpoint) (gdbarch, bp_tgt);
|
||
-}
|
||
-
|
||
-int
|
||
-score_target_remove_hw_breakpoint (struct gdbarch *gdbarch,
|
||
- struct bp_target_info * bp_tgt)
|
||
-{
|
||
- if (strcmp (current_target.to_shortname, "sim") == 0)
|
||
- return soc_gh_del_hardbp (bp_tgt->placed_address);
|
||
- return (*current_target.to_remove_hw_breakpoint) (gdbarch, bp_tgt);
|
||
-}
|
||
-#endif
|
||
-
|
||
static struct type *
|
||
score_register_type (struct gdbarch *gdbarch, int regnum)
|
||
{
|
||
--- a/gdb/score-tdep.h
|
||
+++ b/gdb/score-tdep.h
|
||
@@ -85,68 +85,4 @@ struct pt_regs {
|
||
|
||
typedef struct pt_regs elf_gregset_t;
|
||
|
||
-#ifdef WITH_SIM
|
||
-
|
||
-#include <breakpoint.h>
|
||
-
|
||
-int soc_gh_can_use_watch(int type, int cnt);
|
||
-int soc_gh_add_watch(unsigned int addr, int len, int type);
|
||
-int soc_gh_del_watch(unsigned int addr, int len, int type);
|
||
-int soc_gh_stopped_by_watch(void);
|
||
-int soc_gh_add_hardbp(unsigned int addr);
|
||
-int soc_gh_del_hardbp(unsigned int addr);
|
||
-
|
||
-int score_target_can_use_watch(int type, int cnt, int ot);
|
||
-int score_stopped_by_watch(void);
|
||
-int score_target_insert_watchpoint (CORE_ADDR addr, int len, int type);
|
||
-int score_target_remove_watchpoint (CORE_ADDR addr, int len, int type);
|
||
-int score_target_insert_hw_breakpoint (struct gdbarch *gdbarch, struct bp_target_info * bp_tgt);
|
||
-int score_target_remove_hw_breakpoint (struct gdbarch *gdbarch, struct bp_target_info * bp_tgt);
|
||
-
|
||
-#define TARGET_HAS_HARDWARE_WATCHPOINTS
|
||
-
|
||
-#ifdef TARGET_CAN_USE_HARDWARE_WATCHPOINT
|
||
-#undef TARGET_CAN_USE_HARDWARE_WATCHPOINT
|
||
-
|
||
-#define TARGET_CAN_USE_HARDWARE_WATCHPOINT(type, cnt, ot) \
|
||
- score_target_can_use_watch(type, cnt, ot)
|
||
-#endif
|
||
-
|
||
-#ifdef STOPPED_BY_WATCHPOINT
|
||
-#undef STOPPED_BY_WATCHPOINT
|
||
-
|
||
-#define STOPPED_BY_WATCHPOINT(w) \
|
||
- score_stopped_by_watch()
|
||
-#endif
|
||
-
|
||
-#ifdef target_insert_watchpoint
|
||
-#undef target_insert_watchpoint
|
||
-
|
||
-#define target_insert_watchpoint(addr, len, type) \
|
||
- score_target_insert_watchpoint (addr, len, type)
|
||
-#endif
|
||
-
|
||
-#ifdef target_remove_watchpoint
|
||
-#undef target_remove_watchpoint
|
||
-
|
||
-#define target_remove_watchpoint(addr, len, type) \
|
||
- score_target_remove_watchpoint (addr, len, type)
|
||
-#endif
|
||
-
|
||
-#ifdef target_insert_hw_breakpoint
|
||
-#undef target_insert_hw_breakpoint
|
||
-
|
||
-#define target_insert_hw_breakpoint(gdbarch, bp_tgt) \
|
||
- score_target_insert_hw_breakpoint (gdbarch, bp_tgt)
|
||
-#endif
|
||
-
|
||
-#ifdef target_remove_hw_breakpoint
|
||
-#undef target_remove_hw_breakpoint
|
||
-
|
||
-#define target_remove_hw_breakpoint(gdbarch, bp_tgt) \
|
||
- score_target_remove_hw_breakpoint (gdbarch, bp_tgt)
|
||
-#endif
|
||
-
|
||
-#endif /* WITH_SIM */
|
||
-
|
||
#endif /* SCORE_TDEP_H */
|
||
--- a/gdb/testsuite/ChangeLog
|
||
+++ b/gdb/testsuite/ChangeLog
|
||
@@ -1,3 +1,24 @@
|
||
+2009-12-21 Jan Kratochvil <jan.kratochvil@redhat.com>
|
||
+
|
||
+ * gdb.base/foll-fork.exp (unpatch child, breakpoint at exit call):
|
||
+ Force $srcfile file.
|
||
+ * gdb.base/foll-fork.c (callee): Comment out the printf call.
|
||
+
|
||
+2009-12-21 Jan Kratochvil <jan.kratochvil@redhat.com>
|
||
+
|
||
+ Fix spurious false FAILs.
|
||
+ * gdb.base/structs.c (chartest): New.
|
||
+ (main): Fill-in chartest.
|
||
+ * gdb.base/structs.exp (anychar_re, first): New.
|
||
+ (start_structs_test): Import global anychar_re and first.
|
||
+ New gdb_test call "set print elements 300; ${testfile}"
|
||
+ (start_structs_test <$first>): New block.
|
||
+ (any): Import global anychar_re. New variable ac. Use ${ac}.
|
||
+
|
||
+2009-12-21 Jan Kratochvil <jan.kratochvil@redhat.com>
|
||
+
|
||
+ * gdb.base/bigcore.exp (extract_heap): Set $lim limit to 200.
|
||
+
|
||
2009-09-29 Jan Kratochvil <jan.kratochvil@redhat.com>
|
||
|
||
* gdb.base/breakpoint-shadow.exp: Move the ia64 part into ...
|
||
--- a/gdb/testsuite/gdb.base/bigcore.exp
|
||
+++ b/gdb/testsuite/gdb.base/bigcore.exp
|
||
@@ -96,7 +96,7 @@ proc extract_heap { dir } {
|
||
}
|
||
-re " = \\(struct list \\*\\) (0x\[0-9a-f\]*).*$gdb_prompt $" {
|
||
set heap [concat $heap $expect_out(1,string)]
|
||
- if { $lim >= 50 } {
|
||
+ if { $lim >= 200 } {
|
||
pass "$test (stop at $lim)"
|
||
} else {
|
||
incr lim
|
||
--- a/gdb/testsuite/gdb.base/foll-fork.c
|
||
+++ b/gdb/testsuite/gdb.base/foll-fork.c
|
||
@@ -9,7 +9,8 @@ void callee (i)
|
||
int i;
|
||
#endif
|
||
{
|
||
- printf("callee: %d\n", i);
|
||
+ /* Any output corrupts GDB CLI expect strings.
|
||
+ printf("callee: %d\n", i); */
|
||
}
|
||
|
||
#ifdef PROTOTYPES
|
||
--- a/gdb/testsuite/gdb.base/foll-fork.exp
|
||
+++ b/gdb/testsuite/gdb.base/foll-fork.exp
|
||
@@ -240,7 +240,8 @@ proc catch_fork_unpatch_child {} {
|
||
# Delete all breakpoints and catchpoints.
|
||
delete_breakpoints
|
||
|
||
- gdb_test "break $bp_exit" \
|
||
+ # Force $srcfile as the current GDB source can be in glibc sourcetree.
|
||
+ gdb_test "break $srcfile:$bp_exit" \
|
||
"Breakpoint .*file .*$srcfile, line .*" \
|
||
"unpatch child, breakpoint at exit call"
|
||
|
||
--- a/gdb/testsuite/gdb.base/structs.c
|
||
+++ b/gdb/testsuite/gdb.base/structs.c
|
||
@@ -396,6 +396,8 @@ zed ()
|
||
L18.r = 'Z';
|
||
}
|
||
|
||
+static struct { char c; } chartest[256];
|
||
+
|
||
int main()
|
||
{
|
||
#ifdef usestubs
|
||
@@ -404,6 +406,10 @@ int main()
|
||
#endif
|
||
int i;
|
||
|
||
+ for (i = 0; i < 256; i++)
|
||
+ chartest[i].c = i;
|
||
+ chartest[0].c = 0; /* chartest-done */
|
||
+
|
||
Fun1(foo1);
|
||
Fun2(foo2);
|
||
Fun3(foo3);
|
||
--- a/gdb/testsuite/gdb.base/structs.exp
|
||
+++ b/gdb/testsuite/gdb.base/structs.exp
|
||
@@ -36,6 +36,9 @@ set testfile "structs"
|
||
set srcfile ${testfile}.c
|
||
set binfile ${objdir}/${subdir}/${testfile}
|
||
|
||
+# Regex matching any value of `char' type like: a = 65 'A'
|
||
+set anychar_re {-?[0-9]{1,3} '(.|\\([0-7]{3}|[a-z]|\\|'))'}
|
||
+
|
||
# Create and source the file that provides information about the
|
||
# compiler used to compile the test case.
|
||
|
||
@@ -48,6 +51,7 @@ if [get_compiler_info ${binfile}] {
|
||
# the last TYPES field). Run the compmiled program up to "main".
|
||
# Also updates the global "testfile" to reflect the most recent build.
|
||
|
||
+set first 1
|
||
proc start_structs_test { types } {
|
||
global testfile
|
||
global srcfile
|
||
@@ -56,6 +60,8 @@ proc start_structs_test { types } {
|
||
global subdir
|
||
global srcdir
|
||
global gdb_prompt
|
||
+ global anychar_re
|
||
+ global first
|
||
|
||
# Create the additional flags
|
||
set flags "debug"
|
||
@@ -91,6 +97,8 @@ proc start_structs_test { types } {
|
||
"set print address off; ${testfile}"
|
||
gdb_test "set width 0" "" \
|
||
"set width 0; ${testfile}"
|
||
+ gdb_test "set print elements 300" "" \
|
||
+ "set print elements 300; ${testfile}"
|
||
|
||
# Advance to main
|
||
if { ![runto_main] } then {
|
||
@@ -100,6 +108,16 @@ proc start_structs_test { types } {
|
||
# Get the debug format
|
||
get_debug_format
|
||
|
||
+ # Limit the slow $anychar_re{256} matching for better performance.
|
||
+ if $first {
|
||
+ set first 0
|
||
+
|
||
+ # Verify $anychar_re can match all the values of `char' type.
|
||
+ gdb_breakpoint [gdb_get_line_number "chartest-done"]
|
||
+ gdb_continue_to_breakpoint "chartest-done" ".*chartest-done.*"
|
||
+ gdb_test "p chartest" "= {({c = ${anychar_re}}, ){255}{c = ${anychar_re}}}"
|
||
+ }
|
||
+
|
||
# check that at the struct containing all the relevant types is correct
|
||
set foo_t "type = struct struct[llength ${types}] \{"
|
||
for {set n 0} {$n<[llength ${types}]} {incr n} {
|
||
@@ -161,26 +179,28 @@ proc zed { n } {
|
||
}
|
||
|
||
proc any { n } {
|
||
- return [lindex {
|
||
- "{}"
|
||
- "{a = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*, f = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*, f = \[^,\}\]*, g = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*, f = \[^,\}\]*, g = \[^,\}\]*, h = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*, f = \[^,\}\]*, g = \[^,\}\]*, h = \[^,\}\]*, i = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*, f = \[^,\}\]*, g = \[^,\}\]*, h = \[^,\}\]*, i = \[^,\}\]*, j = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*, f = \[^,\}\]*, g = \[^,\}\]*, h = \[^,\}\]*, i = \[^,\}\]*, j = \[^,\}\]*, k = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*, f = \[^,\}\]*, g = \[^,\}\]*, h = \[^,\}\]*, i = \[^,\}\]*, j = \[^,\}\]*, k = \[^,\}\]*, l = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*, f = \[^,\}\]*, g = \[^,\}\]*, h = \[^,\}\]*, i = \[^,\}\]*, j = \[^,\}\]*, k = \[^,\}\]*, l = \[^,\}\]*, m = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*, f = \[^,\}\]*, g = \[^,\}\]*, h = \[^,\}\]*, i = \[^,\}\]*, j = \[^,\}\]*, k = \[^,\}\]*, l = \[^,\}\]*, m = \[^,\}\]*, n = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*, f = \[^,\}\]*, g = \[^,\}\]*, h = \[^,\}\]*, i = \[^,\}\]*, j = \[^,\}\]*, k = \[^,\}\]*, l = \[^,\}\]*, m = \[^,\}\]*, n = \[^,\}\]*, o = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*, f = \[^,\}\]*, g = \[^,\}\]*, h = \[^,\}\]*, i = \[^,\}\]*, j = \[^,\}\]*, k = \[^,\}\]*, l = \[^,\}\]*, m = \[^,\}\]*, n = \[^,\}\]*, o = \[^,\}\]*, p = \[^,\}\]*}"
|
||
- "{a = \[^,\}\]*, b = \[^,\}\]*, c = \[^,\}\]*, d = \[^,\}\]*, e = \[^,\}\]*, f = \[^,\}\]*, g = \[^,\}\]*, h = \[^,\}\]*, i = \[^,\}\]*, j = \[^,\}\]*, k = \[^,\}\]*, l = \[^,\}\]*, m = \[^,\}\]*, n = \[^,\}\]*, o = \[^,\}\]*, p = \[^,\}\]*, q = \[^,\}\]*}"
|
||
- } $n]
|
||
+ global anychar_re
|
||
+ set ac $anychar_re
|
||
+ return [lindex [list \
|
||
+ "{}" \
|
||
+ "{a = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}, f = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}, f = ${ac}, g = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}, f = ${ac}, g = ${ac}, h = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}, f = ${ac}, g = ${ac}, h = ${ac}, i = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}, f = ${ac}, g = ${ac}, h = ${ac}, i = ${ac}, j = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}, f = ${ac}, g = ${ac}, h = ${ac}, i = ${ac}, j = ${ac}, k = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}, f = ${ac}, g = ${ac}, h = ${ac}, i = ${ac}, j = ${ac}, k = ${ac}, l = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}, f = ${ac}, g = ${ac}, h = ${ac}, i = ${ac}, j = ${ac}, k = ${ac}, l = ${ac}, m = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}, f = ${ac}, g = ${ac}, h = ${ac}, i = ${ac}, j = ${ac}, k = ${ac}, l = ${ac}, m = ${ac}, n = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}, f = ${ac}, g = ${ac}, h = ${ac}, i = ${ac}, j = ${ac}, k = ${ac}, l = ${ac}, m = ${ac}, n = ${ac}, o = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}, f = ${ac}, g = ${ac}, h = ${ac}, i = ${ac}, j = ${ac}, k = ${ac}, l = ${ac}, m = ${ac}, n = ${ac}, o = ${ac}, p = ${ac}}" \
|
||
+ "{a = ${ac}, b = ${ac}, c = ${ac}, d = ${ac}, e = ${ac}, f = ${ac}, g = ${ac}, h = ${ac}, i = ${ac}, j = ${ac}, k = ${ac}, l = ${ac}, m = ${ac}, n = ${ac}, o = ${ac}, p = ${ac}, q = ${ac}}" \
|
||
+ ] $n]
|
||
}
|
||
|
||
# Given N (0..25), return the corresponding alphabetic letter in lower
|
||
### a/gdb/version.in
|
||
### b/gdb/version.in
|
||
## -1 +1 @@
|
||
-7.0
|
||
+7.0.0.20091221-cvs
|
||
|
||
|
||
|
||
http://sourceware.org/ml/gdb-patches/2009-11/msg00388.html
|
||
http://sourceware.org/ml/gdb-cvs/2009-11/msg00156.html
|
||
Subject: [patch] Fix crash on reading stabs
|
||
|
||
Hi,
|
||
|
||
there is a crash on reading stabs fpc binary:
|
||
https://bugzilla.redhat.com/show_bug.cgi?id=537837
|
||
|
||
Program received signal SIGSEGV, Segmentation fault.
|
||
0x000000000069db3d in read_dbx_symtab (objfile=0x1daf5f0) at dbxread.c:1369
|
||
1369 if ((namestring[0] == '-' && namestring[1] == 'l')
|
||
|
||
(gdb) p/x nlist.n_strx
|
||
$7 = 0xfffffff8
|
||
(gdb) p sizeof(nlist.n_strx)
|
||
$10 = 8
|
||
|
||
Below the patch context is:
|
||
namestring = (nlist->n_strx + file_string_table_offset
|
||
+ DBX_STRINGTAB (objfile));
|
||
|
||
so IMO the `(unsigned)' cast is excessive as it does not match the expression
|
||
below. Such cast is there since the GDB "Initial revision" (1999).
|
||
|
||
`n_strx' type:
|
||
struct internal_nlist
|
||
{
|
||
unsigned long n_strx; /* Index into string table of name. */
|
||
...
|
||
};
|
||
|
||
Regression tested on {x86_64,x86_64-m32,i686}-fedora12-linux-gnu which does not
|
||
mean anything with the default DWARF debug info. It was hanging for stabs so
|
||
tried just a large part of gdb.base/*.exp on x86_64-m32 - `unix/-gstabs+/-m32'.
|
||
|
||
If it isn't obviously approved please feel free to drop it as one should not
|
||
use STABS in the first place.
|
||
|
||
|
||
Regards,
|
||
Jan
|
||
|
||
|
||
gdb/
|
||
2009-11-17 Jan Kratochvil <jan.kratochvil@redhat.com>
|
||
|
||
* dbxread.c (set_namestring): Remove cast to unsigned. Check N_STRX
|
||
overflow.
|
||
|
||
--- a/gdb/dbxread.c
|
||
+++ b/gdb/dbxread.c
|
||
@@ -965,8 +965,9 @@ set_namestring (struct objfile *objfile, const struct internal_nlist *nlist)
|
||
{
|
||
char *namestring;
|
||
|
||
- if (((unsigned) nlist->n_strx + file_string_table_offset)
|
||
- >= DBX_STRINGTAB_SIZE (objfile))
|
||
+ if (nlist->n_strx + file_string_table_offset
|
||
+ >= DBX_STRINGTAB_SIZE (objfile)
|
||
+ || nlist->n_strx + file_string_table_offset < nlist->n_strx)
|
||
{
|
||
complaint (&symfile_complaints, _("bad string table offset in symbol %d"),
|
||
symnum);
|
||
|
||
|
||
|
||
Re: [RFA] Fix "show convenience" test
|
||
http://sourceware.org/ml/gdb-patches/2009-09/msg00565.html
|
||
http://sourceware.org/ml/gdb-cvs/2009-09/msg00099.html
|
||
|
||
### src/gdb/testsuite/ChangeLog 2009/09/15 18:51:25 1.1960
|
||
### src/gdb/testsuite/ChangeLog 2009/09/17 17:49:46 1.1961
|
||
## -1,3 +1,7 @@
|
||
+2009-09-17 Paul Pluzhnikov <ppluzhnikov@google.com>
|
||
+
|
||
+ * gdb.base/default.exp: Fix "show convenience".
|
||
+
|
||
2009-09-15 Tom Tromey <tromey@redhat.com>
|
||
|
||
* lib/mi-support.exp (mi_create_varobj): Update.
|
||
--- src/gdb/testsuite/gdb.base/default.exp 2009/08/13 14:58:27 1.31
|
||
+++ src/gdb/testsuite/gdb.base/default.exp 2009/09/17 17:49:46 1.32
|
||
@@ -598,7 +598,7 @@
|
||
#test show confirm
|
||
gdb_test "show confirm" "Whether to confirm potentially dangerous operations is o\[a-z\]*." "show confirm"
|
||
#test show convenience
|
||
-gdb_test "show convenience" "No debugger convenience variables now defined.(\[^\r\n\]*\[\r\n\])+Convenience variables have names starting with \".\";(\[^\r\n\]*\[\r\n\])+use \"set\" as in \"set .foo = 5\" to define them." "show convenience"
|
||
+gdb_test "show convenience" "\\\$_siginfo = void" "show convenience"
|
||
#test show directories
|
||
gdb_test "show directories" "Source directories searched: .cdir\[:;\].cwd" "show directories"
|
||
#test show editing
|
||
### src/gdb/doc/ChangeLog 2009/09/15 18:51:24 1.953
|
||
### src/gdb/doc/ChangeLog 2009/09/17 17:49:46 1.954
|
||
## -1,3 +1,8 @@
|
||
+2009-09-17 Paul Pluzhnikov <ppluzhnikov@google.com>
|
||
+
|
||
+ * gdb.texinfo (convenince variables): Mention
|
||
+ $_siginfo could be empty.
|
||
+
|
||
2009-09-15 Tom Tromey <tromey@redhat.com>
|
||
|
||
* gdb.texinfo (GDB/MI Variable Objects): Document
|
||
--- src/gdb/doc/gdb.texinfo 2009/09/15 18:51:25 1.624
|
||
+++ src/gdb/doc/gdb.texinfo 2009/09/17 17:49:46 1.625
|
||
@@ -7819,8 +7819,10 @@
|
||
|
||
@item $_siginfo
|
||
@vindex $_siginfo@r{, convenience variable}
|
||
-The variable @code{$_siginfo} is bound to extra signal information
|
||
-inspection (@pxref{extra signal information}).
|
||
+The variable @code{$_siginfo} contains extra signal information
|
||
+(@pxref{extra signal information}). Note that @code{$_siginfo}
|
||
+could be empty, if the application has not yet received any signals.
|
||
+For example, it will be empty before you execute the @code{run} command.
|
||
@end table
|
||
|
||
On HP-UX systems, if you refer to a function or variable name that
|
||
|
||
|
||
|
||
http://sourceware.org/ml/gdb-cvs/2009-12/msg00128.html
|
||
|
||
### src/gdb/testsuite/ChangeLog 2009/12/23 23:18:08 1.2054
|
||
### src/gdb/testsuite/ChangeLog 2009/12/24 21:57:06 1.2055
|
||
## -1,3 +1,10 @@
|
||
+2009-12-24 Jan Kratochvil <jan.kratochvil@redhat.com>
|
||
+
|
||
+ Fix compatibility with G++-4.5.
|
||
+ * gdb.cp/expand-sals.cc (main): Remove the "exit-line" comment.
|
||
+ * gdb.cp/expand-sals.exp: Remove breakpoint on "exit-line".
|
||
+ (uncaught return): Remove.
|
||
+
|
||
2009-12-23 Jan Kratochvil <jan.kratochvil@redhat.com>
|
||
Phil Muldoon <pmuldoon@redhat.com>
|
||
|
||
--- src/gdb/testsuite/gdb.cp/expand-sals.cc 2009/05/11 15:05:56 1.1
|
||
+++ src/gdb/testsuite/gdb.cp/expand-sals.cc 2009/12/24 21:57:06 1.2
|
||
@@ -49,5 +49,5 @@
|
||
A a;
|
||
B b;
|
||
|
||
- return 0; /* exit-line */
|
||
+ return 0;
|
||
}
|
||
--- src/gdb/testsuite/gdb.cp/expand-sals.exp 2009/05/11 15:05:56 1.1
|
||
+++ src/gdb/testsuite/gdb.cp/expand-sals.exp 2009/12/24 21:57:06 1.2
|
||
@@ -23,8 +23,6 @@
|
||
return -1
|
||
}
|
||
|
||
-gdb_breakpoint [gdb_get_line_number "exit-line"]
|
||
-
|
||
gdb_breakpoint [gdb_get_line_number "func-line"]
|
||
gdb_continue_to_breakpoint "func" ".*func-line.*"
|
||
|
||
@@ -52,7 +50,3 @@
|
||
"bt from A"
|
||
|
||
gdb_continue_to_breakpoint "next caller func" ".*func-line.*"
|
||
-
|
||
-# Verify GDB really could not catch any other breakpoint location.
|
||
-
|
||
-gdb_continue_to_breakpoint "uncaught return" ".*exit-line.*"
|
||
|
||
|
||
|
||
http://sourceware.org/ml/gdb-cvs/2009-11/msg00213.html
|
||
|
||
[ cut ]
|
||
|
||
--- src/gdb/testsuite/gdb.base/condbreak.exp 2009/01/03 05:58:03 1.13
|
||
+++ src/gdb/testsuite/gdb.base/condbreak.exp 2009/11/25 20:43:29 1.14
|
||
@@ -207,10 +207,10 @@
|
||
setup_xfail hppa2.0w-*-* 11512CLLbs
|
||
send_gdb "continue\n"
|
||
gdb_expect {
|
||
- -re "Continuing\\..*Breakpoint \[0-9\]+, marker2 \\(a=43\\) at .*$srcfile1:($bp_location8|$bp_location9).*($bp_location8|$bp_location9)\[\t \]+.*" {
|
||
+ -re "Continuing\\..*Breakpoint \[0-9\]+, marker2 \\(a=43\\) at .*$srcfile1:($bp_location8|$bp_location9).*($bp_location8|$bp_location9)\[\t \]+.*$gdb_prompt $" {
|
||
pass "run until breakpoint at marker2"
|
||
}
|
||
- -re "Continuing\\..*Breakpoint \[0-9\]+, $hex in marker2 \\(a=43\\) at .*$srcfile1:($bp_location8|$bp_location9).*($bp_location8|$bp_location9)\[\t \]+.*" {
|
||
+ -re "Continuing\\..*Breakpoint \[0-9\]+, $hex in marker2 \\(a=43\\) at .*$srcfile1:($bp_location8|$bp_location9).*($bp_location8|$bp_location9)\[\t \]+.*$gdb_prompt $" {
|
||
xfail "run until breakpoint at marker2"
|
||
}
|
||
-re "$gdb_prompt $" {
|
||
|
||
|
||
|
||
Fix for gfortran-4.1:
|
||
-PASS: gdb.mi/mi-var-child-f.exp: mi runto MAIN__
|
||
+FAIL: gdb.mi/mi-var-child-f.exp: mi runto MAIN__ (unknown output after running)
|
||
|
||
RFC: Move language-changed message to verbose
|
||
http://sourceware.org/ml/gdb-patches/2009-11/msg00031.html
|
||
http://sourceware.org/ml/gdb-cvs/2009-11/msg00034.html
|
||
|
||
### src/gdb/ChangeLog 2009/11/05 19:53:03 1.11030
|
||
### src/gdb/ChangeLog 2009/11/05 20:43:52 1.11031
|
||
## -1,3 +1,8 @@
|
||
+2009-11-05 Daniel Jacobowitz <dan@codesourcery.com>
|
||
+
|
||
+ * top.c (execute_command): Select a frame before checking the current
|
||
+ language. Only output a message if verbose.
|
||
+
|
||
2009-11-05 Tom Tromey <tromey@redhat.com>
|
||
|
||
* symtab.h (SYMBOL_SET_LINKAGE_NAME): Update comment.
|
||
--- src/gdb/top.c 2009/10/19 09:51:42 1.172
|
||
+++ src/gdb/top.c 2009/11/05 20:43:52 1.173
|
||
@@ -457,10 +457,13 @@
|
||
|
||
}
|
||
|
||
- /* Tell the user if the language has changed (except first time). */
|
||
+ /* Tell the user if the language has changed (except first time).
|
||
+ First make sure that a new frame has been selected, in case this
|
||
+ command or the hooks changed the program state. */
|
||
+ deprecated_safe_get_selected_frame ();
|
||
if (current_language != expected_language)
|
||
{
|
||
- if (language_mode == language_mode_auto)
|
||
+ if (language_mode == language_mode_auto && info_verbose)
|
||
{
|
||
language_info (1); /* Print what changed. */
|
||
}
|