system calls. */
if (amd64_syscall_p (insn_details, &insn_len)
/* GDB can get control back after the insn after the syscall.
- Presumably this is a kernel bug. Fixup ensures its a nop, we
+ Presumably this is a kernel bug. Fixup ensures it's a nop, we
add one to the length for it. */
&& (pc < to || pc > (to + insn_len + 1)))
displaced_debug_printf ("syscall changed %%rip; not relocating");
@item
What ends the procedure scope? Is it the proc block's @code{N_RBRAC} or the
-next @code{N_FUN}? (I believe its the first.)
+next @code{N_FUN}? (I believe it's the first.)
@end itemize
@node Stab Sections
extern CORE_ADDR gdbarch_decr_pc_after_break (struct gdbarch *gdbarch);
extern void set_gdbarch_decr_pc_after_break (struct gdbarch *gdbarch, CORE_ADDR decr_pc_after_break);
-/* A function can be addressed by either it's "pointer" (possibly a
+/* A function can be addressed by either its "pointer" (possibly a
descriptor address) or "entry point" (first executable instruction).
The method "convert_from_func_ptr_addr" converting the former to the
latter. gdbarch_deprecated_function_start_offset is being used to implement
Value(
comment="""
-A function can be addressed by either it's "pointer" (possibly a
+A function can be addressed by either its "pointer" (possibly a
descriptor address) or "entry point" (first executable instruction).
The method "convert_from_func_ptr_addr" converting the former to the
latter. gdbarch_deprecated_function_start_offset is being used to implement
&& pc != to + (insn - insn_start) + insn_len
/* GDB can get control back after the insn after the syscall.
Presumably this is a kernel bug.
- i386_displaced_step_copy_insn ensures its a nop,
+ i386_displaced_step_copy_insn ensures it's a nop,
we add one to the length for it. */
&& pc != to + (insn - insn_start) + insn_len + 1)
displaced_debug_printf ("syscall changed %%eip; not relocating");
NULL, 32, &tmp_fields, 0);
/* NULL here would mean the last instruction was not understood by cgen.
- This should not usually happen, but if does its not a delay slot. */
+ This should not usually happen, but if it does it's not a delay slot. */
if (insn == NULL)
return 0;
/* DAWR interface allows to watch up to 512 byte wide ranges. */
region_size = 512;
/* DAWR interface allows to watch up to 512 byte wide ranges which
- can't cross a 512 byte boundary on machines that doesn't have a
+ can't cross a 512 byte boundary on machines that don't have a
second DAWR (P9 or less). */
if (!(hwdebug_info.features & PPC_DEBUG_FEATURE_DATA_BP_ARCH_31))
region_align = 512;
pc = ppc64_standard_linkage1_target (frame, insns);
else
{
- /* Scan backward one more instructions if doesn't match. */
+ /* Scan backward one more instruction if it doesn't match. */
pc -= 4;
continue;
}
}
/* When gdb starts up the inferior, it nurses it along (through the
- shell) until it is ready to execute it's first instruction. At this
+ shell) until it is ready to execute its first instruction. At this
point, this function gets called via solib_create_inferior_hook.
For the DSBT shared library, the main executable needs to be relocated.
set to 1. When the dynamic linker sees this flag set, it will set
a breakpoint at a location known only to itself, after saving the
original contents of that place and the breakpoint address itself,
- in it's own internal structures. When we resume the inferior, it
+ in its own internal structures. When we resume the inferior, it
will eventually take a SIGTRAP when it runs into the breakpoint.
We handle this (in a different place) by restoring the contents of
the breakpointed location (which is only known after it stops),
*
* Because gdb will sometimes write to the stack area to execute function
* calls, this program cannot rely on using the supervisor stack so it
- * uses it's own stack area reserved in the int array remcomStack.
+ * uses its own stack area reserved in the int array remcomStack.
*
*************
*
*
* Because gdb will sometimes write to the stack area to execute function
* calls, this program cannot rely on using the supervisor stack so it
- * uses it's own stack area reserved in the int array remcomStack.
+ * uses its own stack area reserved in the int array remcomStack.
*
*************
*
*
* Because gdb will sometimes write to the stack area to execute function
* calls, this program cannot rely on using the supervisor stack so it
- * uses it's own stack area reserved in the int array remcomStack.
+ * uses its own stack area reserved in the int array remcomStack.
*
*************
*
int coremaker_bss; /* In BSS section */
/* Place a chunk of memory before coremaker_ro to improve the chances
- that coremaker_ro will end up on it's own page. See:
+ that coremaker_ro will end up on its own page. See:
https://sourceware.org/pipermail/gdb-patches/2020-May/168168.html
https://sourceware.org/pipermail/gdb-patches/2020-May/168170.html */
}
if {$force_fail} {
- # Disable the shell so that its the first exec that fails,
+ # Disable the shell so that it's the first exec that fails,
# instead of the shell starting and then failing with some
# unspecified output.
mi_gdb_test "-gdb-set startup-with-shell off" ".*"
# FLAGS is a list of flags, each flag is a string.
#
# If "separate-inferior-tty" is specified, the inferior works with
-# it's own PTY.
+# its own PTY.
#
# If "separate-mi-tty" is specified, the gdb starts in CLI mode, with
# MI running on a secondary UI, on its own tty.