]>
Commit | Line | Data |
---|---|---|
2e0fa11c RS |
1 | /* Remote target communications for serial-line targets in custom GDB protocol |
2 | Copyright 1988, 1991, 1992, 1993, 1994 Free Software Foundation, Inc. | |
3 | ||
4 | This file is part of GDB. | |
5 | ||
6 | This program is free software; you can redistribute it and/or modify | |
7 | it under the terms of the GNU General Public License as published by | |
8 | the Free Software Foundation; either version 2 of the License, or | |
9 | (at your option) any later version. | |
10 | ||
11 | This program is distributed in the hope that it will be useful, | |
12 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 | GNU General Public License for more details. | |
15 | ||
16 | You should have received a copy of the GNU General Public License | |
17 | along with this program; if not, write to the Free Software | |
6c9638b4 | 18 | Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ |
2e0fa11c RS |
19 | |
20 | /* Remote communication protocol. | |
21 | ||
22 | A debug packet whose contents are <data> | |
23 | is encapsulated for transmission in the form: | |
24 | ||
25 | $ <data> # CSUM1 CSUM2 | |
26 | ||
27 | <data> must be ASCII alphanumeric and cannot include characters | |
28 | '$' or '#'. If <data> starts with two characters followed by | |
29 | ':', then the existing stubs interpret this as a sequence number. | |
30 | ||
31 | CSUM1 and CSUM2 are ascii hex representation of an 8-bit | |
32 | checksum of <data>, the most significant nibble is sent first. | |
33 | the hex digits 0-9,a-f are used. | |
34 | ||
35 | Receiver responds with: | |
36 | ||
37 | + - if CSUM is correct and ready for next packet | |
38 | - - if CSUM is incorrect | |
39 | ||
40 | <data> is as follows: | |
41 | All values are encoded in ascii hex digits. | |
42 | ||
43 | Request Packet | |
44 | ||
45 | read registers g | |
46 | reply XX....X Each byte of register data | |
47 | is described by two hex digits. | |
48 | Registers are in the internal order | |
49 | for GDB, and the bytes in a register | |
50 | are in the same order the machine uses. | |
51 | or ENN for an error. | |
52 | ||
53 | write regs GXX..XX Each byte of register data | |
54 | is described by two hex digits. | |
55 | reply OK for success | |
56 | ENN for an error | |
57 | ||
58 | write reg Pn...=r... Write register n... with value r..., | |
59 | which contains two hex digits for each | |
60 | byte in the register (target byte | |
61 | order). | |
62 | reply OK for success | |
63 | ENN for an error | |
64 | (not supported by all stubs). | |
65 | ||
66 | read mem mAA..AA,LLLL AA..AA is address, LLLL is length. | |
67 | reply XX..XX XX..XX is mem contents | |
68 | Can be fewer bytes than requested | |
69 | if able to read only part of the data. | |
70 | or ENN NN is errno | |
71 | ||
72 | write mem MAA..AA,LLLL:XX..XX | |
73 | AA..AA is address, | |
74 | LLLL is number of bytes, | |
75 | XX..XX is data | |
76 | reply OK for success | |
77 | ENN for an error (this includes the case | |
78 | where only part of the data was | |
79 | written). | |
80 | ||
81 | cont cAA..AA AA..AA is address to resume | |
82 | If AA..AA is omitted, | |
83 | resume at same address. | |
84 | ||
85 | step sAA..AA AA..AA is address to resume | |
86 | If AA..AA is omitted, | |
87 | resume at same address. | |
88 | ||
89 | last signal ? Reply the current reason for stopping. | |
90 | This is the same reply as is generated | |
91 | for step or cont : SAA where AA is the | |
92 | signal number. | |
93 | ||
94 | There is no immediate reply to step or cont. | |
95 | The reply comes when the machine stops. | |
96 | It is SAA AA is the "signal number" | |
97 | ||
98 | or... TAAn...:r...;n:r...;n...:r...; | |
99 | AA = signal number | |
100 | n... = register number | |
101 | r... = register contents | |
102 | or... WAA The process exited, and AA is | |
103 | the exit status. This is only | |
104 | applicable for certains sorts of | |
105 | targets. | |
106 | kill request k | |
107 | ||
108 | toggle debug d toggle debug flag (see 386 & 68k stubs) | |
109 | reset r reset -- see sparc stub. | |
110 | reserved <other> On other requests, the stub should | |
111 | ignore the request and send an empty | |
112 | response ($#<checksum>). This way | |
113 | we can extend the protocol and GDB | |
114 | can tell whether the stub it is | |
115 | talking to uses the old or the new. | |
116 | search tAA:PP,MM Search backwards starting at address | |
117 | AA for a match with pattern PP and | |
118 | mask MM. PP and MM are 4 bytes. | |
119 | Not supported by all stubs. | |
120 | ||
121 | general query qXXXX Request info about XXXX. | |
122 | general set QXXXX=yyyy Set value of XXXX to yyyy. | |
123 | query sect offs qOffsets Get section offsets. Reply is | |
124 | Text=xxx;Data=yyy;Bss=zzz | |
125 | console output Otext Send text to stdout. Only comes from | |
126 | remote target. | |
127 | ||
128 | Responses can be run-length encoded to save space. A '*' means that | |
129 | the next character is an ASCII encoding giving a repeat count which | |
130 | stands for that many repititions of the character preceding the '*'. | |
131 | The encoding is n+29, yielding a printable character where n >=3 | |
132 | (which is where rle starts to win). Don't use an n > 126. | |
133 | ||
134 | So | |
135 | "0* " means the same as "0000". */ | |
136 | ||
137 | #include "defs.h" | |
2b576293 | 138 | #include "gdb_string.h" |
2e0fa11c RS |
139 | #include <fcntl.h> |
140 | #include "frame.h" | |
141 | #include "inferior.h" | |
142 | #include "bfd.h" | |
143 | #include "symfile.h" | |
144 | #include "target.h" | |
145 | #include "wait.h" | |
146 | #include "terminal.h" | |
147 | #include "gdbcmd.h" | |
148 | #include "objfiles.h" | |
149 | #include "gdb-stabs.h" | |
4682251b | 150 | #include "remote-utils.h" |
2e0fa11c RS |
151 | #include "dcache.h" |
152 | ||
153 | #ifdef USG | |
154 | #include <sys/types.h> | |
155 | #endif | |
156 | ||
157 | #include <signal.h> | |
158 | #include "serial.h" | |
159 | ||
160 | /* Prototypes for local functions */ | |
161 | ||
162 | static int | |
163 | remote_write_bytes PARAMS ((CORE_ADDR memaddr, unsigned char *myaddr, int len)); | |
164 | ||
165 | static int | |
166 | remote_read_bytes PARAMS ((CORE_ADDR memaddr, unsigned char *myaddr, int len)); | |
167 | ||
168 | static void | |
169 | remote_files_info PARAMS ((struct target_ops *ignore)); | |
170 | ||
171 | static int | |
172 | remote_xfer_memory PARAMS ((CORE_ADDR memaddr, char *myaddr, int len, | |
173 | int should_write, struct target_ops *target)); | |
174 | ||
175 | static void | |
176 | remote_prepare_to_store PARAMS ((void)); | |
177 | ||
178 | static void | |
179 | remote_fetch_registers PARAMS ((int regno)); | |
180 | ||
181 | static void | |
182 | remote_resume PARAMS ((int pid, int step, enum target_signal siggnal)); | |
183 | ||
184 | static int | |
185 | remote_start_remote PARAMS ((char *dummy)); | |
186 | ||
187 | static void | |
188 | remote_open PARAMS ((char *name, int from_tty)); | |
189 | ||
190 | static void | |
191 | remote_close PARAMS ((int quitting)); | |
192 | ||
193 | static void | |
194 | remote_store_registers PARAMS ((int regno)); | |
195 | ||
196 | static void | |
197 | getpkt PARAMS ((char *buf, int forever)); | |
198 | ||
199 | static void | |
200 | putpkt PARAMS ((char *buf)); | |
201 | ||
202 | static void | |
203 | remote_send PARAMS ((char *buf)); | |
204 | ||
205 | static int | |
206 | readchar PARAMS ((int timeout)); | |
207 | ||
4682251b RS |
208 | static int |
209 | remote_wait PARAMS ((int pid, struct target_waitstatus *status)); | |
2e0fa11c RS |
210 | |
211 | static int | |
212 | tohex PARAMS ((int nib)); | |
213 | ||
214 | static int | |
215 | fromhex PARAMS ((int a)); | |
216 | ||
217 | static void | |
218 | remote_detach PARAMS ((char *args, int from_tty)); | |
219 | ||
220 | static void | |
221 | remote_interrupt PARAMS ((int signo)); | |
222 | ||
223 | static void | |
224 | remote_interrupt_twice PARAMS ((int signo)); | |
225 | ||
226 | static void | |
227 | interrupt_query PARAMS ((void)); | |
228 | ||
4682251b RS |
229 | static void |
230 | hppro_load PARAMS ((char *name, int from_tty)); | |
231 | ||
2e0fa11c RS |
232 | extern struct target_ops remote_ops; /* Forward decl */ |
233 | ||
234 | /* This was 5 seconds, which is a long time to sit and wait. | |
235 | Unless this is going though some terminal server or multiplexer or | |
236 | other form of hairy serial connection, I would think 2 seconds would | |
237 | be plenty. */ | |
238 | static int remote_timeout = 2; | |
239 | ||
2e0fa11c RS |
240 | /* Descriptor for I/O to remote machine. Initialize it to NULL so that |
241 | remote_open knows that we don't have a file open when the program | |
242 | starts. */ | |
4682251b | 243 | extern serial_t remote_desc; |
2e0fa11c RS |
244 | |
245 | /* Having this larger than 400 causes us to be incompatible with m68k-stub.c | |
246 | and i386-stub.c. Normally, no one would notice because it only matters | |
247 | for writing large chunks of memory (e.g. in downloads). Also, this needs | |
248 | to be more than 400 if required to hold the registers (see below, where | |
249 | we round it up based on REGISTER_BYTES). */ | |
250 | #define PBUFSIZ 400 | |
251 | ||
252 | /* Maximum number of bytes to read/write at once. The value here | |
253 | is chosen to fill up a packet (the headers account for the 32). */ | |
254 | #define MAXBUFBYTES ((PBUFSIZ-32)/2) | |
255 | ||
256 | /* Round up PBUFSIZ to hold all the registers, at least. */ | |
257 | /* The blank line after the #if seems to be required to work around a | |
258 | bug in HP's PA compiler. */ | |
259 | #if REGISTER_BYTES > MAXBUFBYTES | |
260 | ||
261 | #undef PBUFSIZ | |
262 | #define PBUFSIZ (REGISTER_BYTES * 2 + 32) | |
263 | #endif | |
264 | ||
265 | /* Should we try the 'P' request? If this is set to one when the stub | |
266 | doesn't support 'P', the only consequence is some unnecessary traffic. */ | |
267 | static int stub_supports_P = 1; | |
268 | ||
4682251b RS |
269 | /* sets the download protocol, choices are srec, generic, boot */ |
270 | char *loadtype; | |
271 | static char *loadtype_str; | |
272 | static void set_loadtype_command | |
273 | PARAMS ((char *, int, struct cmd_list_element *)); | |
274 | ||
275 | static void | |
276 | hppro_load (file, from_tty) | |
277 | char *file; | |
278 | int from_tty; | |
279 | { | |
280 | puts ("Loading... HA!"); | |
281 | } | |
282 | ||
2e0fa11c RS |
283 | \f |
284 | /* Clean up connection to a remote debugger. */ | |
285 | ||
286 | /* ARGSUSED */ | |
287 | static void | |
288 | remote_close (quitting) | |
289 | int quitting; | |
290 | { | |
4682251b RS |
291 | if (remote_desc) |
292 | SERIAL_CLOSE (remote_desc); | |
293 | remote_desc = NULL; | |
2e0fa11c RS |
294 | } |
295 | ||
296 | /* Query the remote side for the text, data and bss offsets. */ | |
297 | ||
298 | static void | |
299 | get_offsets () | |
300 | { | |
301 | unsigned char buf[PBUFSIZ]; | |
302 | int nvals; | |
303 | CORE_ADDR text_addr, data_addr, bss_addr; | |
304 | struct section_offsets *offs; | |
305 | ||
306 | putpkt ("qOffsets"); | |
307 | ||
308 | getpkt (buf, 0); | |
309 | ||
310 | if (buf[0] == '\000') | |
311 | return; /* Return silently. Stub doesn't support this | |
312 | command. */ | |
313 | if (buf[0] == 'E') | |
314 | { | |
315 | warning ("Remote failure reply: %s", buf); | |
316 | return; | |
317 | } | |
318 | ||
319 | nvals = sscanf (buf, "Text=%lx;Data=%lx;Bss=%lx", &text_addr, &data_addr, | |
320 | &bss_addr); | |
321 | if (nvals != 3) | |
322 | error ("Malformed response to offset query, %s", buf); | |
323 | ||
324 | if (symfile_objfile == NULL) | |
325 | return; | |
326 | ||
327 | offs = (struct section_offsets *) alloca (sizeof (struct section_offsets) | |
328 | + symfile_objfile->num_sections | |
329 | * sizeof (offs->offsets)); | |
330 | memcpy (offs, symfile_objfile->section_offsets, | |
331 | sizeof (struct section_offsets) | |
332 | + symfile_objfile->num_sections | |
333 | * sizeof (offs->offsets)); | |
334 | ||
335 | /* FIXME: This code assumes gdb-stabs.h is being used; it's broken | |
336 | for xcoff, dwarf, sdb-coff, etc. But there is no simple | |
337 | canonical representation for this stuff. (Just what does "text" | |
338 | as seen by the stub mean, anyway? I think it means all sections | |
339 | with SEC_CODE set, but we currently have no way to deal with that). */ | |
340 | ||
341 | ANOFFSET (offs, SECT_OFF_TEXT) = text_addr; | |
342 | ||
343 | /* This is a temporary kludge to force data and bss to use the same offsets | |
344 | because that's what nlmconv does now. The real solution requires changes | |
345 | to the stub and remote.c that I don't have time to do right now. */ | |
346 | ||
347 | ANOFFSET (offs, SECT_OFF_DATA) = data_addr; | |
348 | ANOFFSET (offs, SECT_OFF_BSS) = data_addr; | |
349 | ||
350 | objfile_relocate (symfile_objfile, offs); | |
351 | } | |
352 | ||
4682251b | 353 | #define INBUFSIZE 10 |
2e0fa11c | 354 | |
4682251b RS |
355 | void |
356 | boot_board() | |
357 | { | |
358 | char c; | |
359 | char buf[INBUFSIZE]; | |
360 | char *ptr; | |
361 | ||
362 | /* See if we can connect to the boot ROM command line */ | |
363 | ptr = buf; | |
364 | while (1) { | |
365 | SERIAL_WRITE (remote_desc, "\r\n", 2); | |
366 | c = readchar (2); | |
367 | if ((sr_get_debug() > 2) && (isascii(c))) | |
368 | putchar (c); | |
369 | if (c == SERIAL_TIMEOUT) { | |
370 | if (sr_get_debug()) | |
371 | puts_filtered ("Timed out.\n"); | |
372 | break; | |
373 | } | |
374 | if (c == '&') { | |
375 | if (sr_get_debug() > 2) | |
376 | puts ("Got ACK from stub"); | |
377 | break; | |
378 | } | |
379 | if (c == '>') { | |
380 | if (sr_get_debug() > 2) | |
381 | puts ("Got prompt from ROM monitor"); | |
382 | break; | |
383 | } | |
384 | } | |
385 | ||
386 | } | |
387 | ||
388 | /* Stub for catch_errors. */ | |
2e0fa11c RS |
389 | static int |
390 | remote_start_remote (dummy) | |
391 | char *dummy; | |
392 | { | |
4682251b RS |
393 | int timeout; |
394 | ||
2e0fa11c RS |
395 | immediate_quit = 1; /* Allow user to interrupt it */ |
396 | ||
397 | /* Ack any packet which the remote side has already sent. */ | |
398 | ||
4682251b RS |
399 | if (sr_get_debug()) |
400 | puts ("Trying a '+' to ACK the target."); | |
401 | ||
402 | SERIAL_WRITE (remote_desc, "+", 1); | |
403 | ||
404 | #if 0 | |
405 | boot_board(); | |
2e0fa11c RS |
406 | |
407 | get_offsets (); /* Get text, data & bss offsets */ | |
4682251b | 408 | #endif |
2e0fa11c RS |
409 | |
410 | putpkt ("?"); /* initiate a query from remote machine */ | |
411 | immediate_quit = 0; | |
412 | ||
413 | start_remote (); /* Initialize gdb process mechanisms */ | |
414 | ||
415 | return 1; | |
416 | } | |
417 | ||
418 | /* Open a connection to a remote debugger. | |
419 | NAME is the filename used for communication. */ | |
420 | ||
421 | static DCACHE *remote_dcache; | |
422 | ||
423 | static void | |
424 | remote_open (name, from_tty) | |
425 | char *name; | |
426 | int from_tty; | |
427 | { | |
428 | if (name == 0) | |
429 | error ( | |
430 | "To open a remote debug connection, you need to specify what serial\n\ | |
431 | device is attached to the remote system (e.g. /dev/ttya)."); | |
432 | ||
433 | target_preopen (from_tty); | |
434 | ||
435 | unpush_target (&remote_ops); | |
436 | ||
437 | remote_dcache = dcache_init (remote_read_bytes, remote_write_bytes); | |
438 | ||
4682251b RS |
439 | remote_desc = SERIAL_OPEN (name); |
440 | if (!remote_desc) | |
2e0fa11c RS |
441 | perror_with_name (name); |
442 | ||
443 | if (baud_rate != -1) | |
444 | { | |
4682251b | 445 | if (SERIAL_SETBAUDRATE (remote_desc, baud_rate)) |
2e0fa11c | 446 | { |
4682251b | 447 | SERIAL_CLOSE (remote_desc); |
2e0fa11c RS |
448 | perror_with_name (name); |
449 | } | |
450 | } | |
451 | ||
4682251b | 452 | SERIAL_RAW (remote_desc); |
2e0fa11c RS |
453 | |
454 | /* If there is something sitting in the buffer we might take it as a | |
455 | response to a command, which would be bad. */ | |
4682251b | 456 | SERIAL_FLUSH_INPUT (remote_desc); |
2e0fa11c RS |
457 | |
458 | if (from_tty) | |
459 | { | |
460 | puts_filtered ("Remote debugging using "); | |
461 | puts_filtered (name); | |
462 | puts_filtered ("\n"); | |
463 | } | |
464 | push_target (&remote_ops); /* Switch to using remote target now */ | |
465 | ||
466 | /* Start out by trying the 'P' request to set registers. We set this each | |
467 | time that we open a new target so that if the user switches from one | |
468 | stub to another, we can (if the target is closed and reopened) cope. */ | |
469 | stub_supports_P = 1; | |
470 | ||
471 | /* Without this, some commands which require an active target (such as kill) | |
472 | won't work. This variable serves (at least) double duty as both the pid | |
473 | of the target process (if it has such), and as a flag indicating that a | |
474 | target is active. These functions should be split out into seperate | |
475 | variables, especially since GDB will someday have a notion of debugging | |
476 | several processes. */ | |
477 | ||
478 | inferior_pid = 42000; | |
479 | ||
480 | /* Start the remote connection; if error (0), discard this target. | |
481 | In particular, if the user quits, be sure to discard it | |
482 | (we'd be in an inconsistent state otherwise). */ | |
483 | if (!catch_errors (remote_start_remote, (char *)0, | |
484 | "Couldn't establish connection to remote target\n", RETURN_MASK_ALL)) | |
485 | pop_target(); | |
486 | } | |
487 | ||
488 | /* remote_detach() | |
489 | takes a program previously attached to and detaches it. | |
490 | We better not have left any breakpoints | |
491 | in the program or it'll die when it hits one. | |
492 | Close the open connection to the remote debugger. | |
493 | Use this when you want to detach and do something else | |
494 | with your gdb. */ | |
495 | ||
496 | static void | |
497 | remote_detach (args, from_tty) | |
498 | char *args; | |
499 | int from_tty; | |
500 | { | |
501 | if (args) | |
502 | error ("Argument given to \"detach\" when remotely debugging."); | |
503 | ||
504 | pop_target (); | |
505 | if (from_tty) | |
506 | puts_filtered ("Ending remote debugging.\n"); | |
507 | } | |
508 | ||
509 | /* Convert hex digit A to a number. */ | |
510 | ||
511 | static int | |
512 | fromhex (a) | |
513 | int a; | |
514 | { | |
515 | if (a >= '0' && a <= '9') | |
516 | return a - '0'; | |
517 | else if (a >= 'a' && a <= 'f') | |
518 | return a - 'a' + 10; | |
519 | else | |
520 | error ("Reply contains invalid hex digit"); | |
521 | } | |
522 | ||
523 | /* Convert number NIB to a hex digit. */ | |
524 | ||
525 | static int | |
526 | tohex (nib) | |
527 | int nib; | |
528 | { | |
529 | if (nib < 10) | |
530 | return '0'+nib; | |
531 | else | |
532 | return 'a'+nib-10; | |
533 | } | |
534 | \f | |
535 | /* Tell the remote machine to resume. */ | |
536 | ||
537 | static void | |
538 | remote_resume (pid, step, siggnal) | |
539 | int pid, step; | |
540 | enum target_signal siggnal; | |
541 | { | |
542 | char buf[PBUFSIZ]; | |
543 | ||
544 | if (siggnal) | |
545 | { | |
546 | target_terminal_ours_for_output (); | |
547 | printf_filtered | |
548 | ("Can't send signals to a remote system. %s not sent.\n", | |
4682251b | 549 | target_signal_to_name (siggnal)); target_terminal_inferior (); |
2e0fa11c RS |
550 | } |
551 | ||
552 | dcache_flush (remote_dcache); | |
553 | ||
554 | strcpy (buf, step ? "s": "c"); | |
555 | ||
556 | putpkt (buf); | |
557 | } | |
558 | \f | |
559 | /* Send ^C to target to halt it. Target will respond, and send us a | |
560 | packet. */ | |
561 | ||
562 | static void | |
563 | remote_interrupt (signo) | |
564 | int signo; | |
565 | { | |
566 | /* If this doesn't work, try more severe steps. */ | |
567 | signal (signo, remote_interrupt_twice); | |
568 | ||
569 | if (remote_debug) | |
570 | printf_unfiltered ("remote_interrupt called\n"); | |
571 | ||
4682251b | 572 | SERIAL_WRITE (remote_desc, "\003", 1); /* Send a ^C */ |
2e0fa11c RS |
573 | } |
574 | ||
575 | static void (*ofunc)(); | |
576 | ||
577 | /* The user typed ^C twice. */ | |
578 | static void | |
579 | remote_interrupt_twice (signo) | |
580 | int signo; | |
581 | { | |
582 | signal (signo, ofunc); | |
583 | ||
584 | interrupt_query (); | |
585 | ||
586 | signal (signo, remote_interrupt); | |
587 | } | |
588 | ||
589 | /* Ask the user what to do when an interrupt is received. */ | |
590 | ||
591 | static void | |
592 | interrupt_query () | |
593 | { | |
594 | target_terminal_ours (); | |
595 | ||
596 | if (query ("Interrupted while waiting for the program.\n\ | |
597 | Give up (and stop debugging it)? ")) | |
598 | { | |
599 | target_mourn_inferior (); | |
600 | return_to_top_level (RETURN_QUIT); | |
601 | } | |
602 | ||
603 | target_terminal_inferior (); | |
604 | } | |
605 | ||
606 | /* Wait until the remote machine stops, then return, | |
607 | storing status in STATUS just as `wait' would. | |
608 | Returns "pid" (though it's not clear what, if anything, that | |
609 | means in the case of this target). */ | |
610 | ||
611 | static int | |
612 | remote_wait (pid, status) | |
613 | int pid; | |
614 | struct target_waitstatus *status; | |
615 | { | |
616 | unsigned char buf[PBUFSIZ]; | |
617 | ||
618 | status->kind = TARGET_WAITKIND_EXITED; | |
619 | status->value.integer = 0; | |
620 | ||
621 | while (1) | |
622 | { | |
623 | unsigned char *p; | |
624 | ||
625 | ofunc = (void (*)()) signal (SIGINT, remote_interrupt); | |
626 | getpkt ((char *) buf, 1); | |
627 | signal (SIGINT, ofunc); | |
628 | ||
629 | switch (buf[0]) | |
630 | { | |
631 | case 'E': /* Error of some sort */ | |
632 | warning ("Remote failure reply: %s", buf); | |
633 | continue; | |
634 | case 'T': /* Status with PC, SP, FP, ... */ | |
635 | { | |
636 | int i; | |
637 | long regno; | |
638 | char regs[MAX_REGISTER_RAW_SIZE]; | |
639 | ||
640 | /* Expedited reply, containing Signal, {regno, reg} repeat */ | |
641 | /* format is: 'Tssn...:r...;n...:r...;n...:r...;#cc', where | |
642 | ss = signal number | |
643 | n... = register number | |
644 | r... = register contents | |
645 | */ | |
646 | ||
647 | p = &buf[3]; /* after Txx */ | |
648 | ||
649 | while (*p) | |
650 | { | |
651 | unsigned char *p1; | |
652 | ||
653 | regno = strtol (p, &p1, 16); /* Read the register number */ | |
654 | ||
655 | if (p1 == p) | |
656 | warning ("Remote sent badly formed register number: %s\nPacket: '%s'\n", | |
657 | p1, buf); | |
658 | ||
659 | p = p1; | |
660 | ||
661 | if (*p++ != ':') | |
662 | warning ("Malformed packet (missing colon): %s\nPacket: '%s'\n", | |
663 | p, buf); | |
664 | ||
665 | if (regno >= NUM_REGS) | |
666 | warning ("Remote sent bad register number %d: %s\nPacket: '%s'\n", | |
667 | regno, p, buf); | |
668 | ||
669 | for (i = 0; i < REGISTER_RAW_SIZE (regno); i++) | |
670 | { | |
671 | if (p[0] == 0 || p[1] == 0) | |
672 | warning ("Remote reply is too short: %s", buf); | |
673 | regs[i] = fromhex (p[0]) * 16 + fromhex (p[1]); | |
674 | p += 2; | |
675 | } | |
676 | ||
677 | if (*p++ != ';') | |
678 | warning ("Remote register badly formatted: %s", buf); | |
679 | ||
680 | supply_register (regno, regs); | |
681 | } | |
682 | } | |
683 | /* fall through */ | |
684 | case 'S': /* Old style status, just signal only */ | |
685 | status->kind = TARGET_WAITKIND_STOPPED; | |
686 | status->value.sig = (enum target_signal) | |
687 | (((fromhex (buf[1])) << 4) + (fromhex (buf[2]))); | |
688 | ||
689 | return inferior_pid; | |
690 | case 'W': /* Target exited */ | |
691 | { | |
692 | /* The remote process exited. */ | |
693 | status->kind = TARGET_WAITKIND_EXITED; | |
694 | status->value.integer = (fromhex (buf[1]) << 4) + fromhex (buf[2]); | |
695 | return inferior_pid; | |
696 | } | |
697 | case 'O': /* Console output */ | |
698 | fputs_filtered (buf + 1, gdb_stdout); | |
699 | continue; | |
700 | default: | |
701 | warning ("Invalid remote reply: %s", buf); | |
702 | continue; | |
703 | } | |
704 | } | |
705 | return inferior_pid; | |
706 | } | |
707 | ||
708 | /* Number of bytes of registers this stub implements. */ | |
709 | static int register_bytes_found; | |
710 | ||
711 | /* Read the remote registers into the block REGS. */ | |
712 | /* Currently we just read all the registers, so we don't use regno. */ | |
713 | /* ARGSUSED */ | |
714 | static void | |
715 | remote_fetch_registers (regno) | |
716 | int regno; | |
717 | { | |
718 | char buf[PBUFSIZ]; | |
719 | int i; | |
720 | char *p; | |
721 | char regs[REGISTER_BYTES]; | |
722 | ||
723 | sprintf (buf, "g"); | |
724 | remote_send (buf); | |
725 | ||
726 | /* Unimplemented registers read as all bits zero. */ | |
727 | memset (regs, 0, REGISTER_BYTES); | |
728 | ||
729 | /* We can get out of synch in various cases. If the first character | |
730 | in the buffer is not a hex character, assume that has happened | |
731 | and try to fetch another packet to read. */ | |
732 | while ((buf[0] < '0' || buf[0] > '9') | |
733 | && (buf[0] < 'a' || buf[0] > 'f')) | |
734 | { | |
735 | if (remote_debug) | |
736 | printf_unfiltered ("Bad register packet; fetching a new packet\n"); | |
737 | getpkt (buf, 0); | |
738 | } | |
739 | ||
740 | /* Reply describes registers byte by byte, each byte encoded as two | |
741 | hex characters. Suck them all up, then supply them to the | |
742 | register cacheing/storage mechanism. */ | |
743 | ||
744 | p = buf; | |
745 | for (i = 0; i < REGISTER_BYTES; i++) | |
746 | { | |
747 | if (p[0] == 0) | |
748 | break; | |
749 | if (p[1] == 0) | |
750 | { | |
751 | warning ("Remote reply is of odd length: %s", buf); | |
752 | /* Don't change register_bytes_found in this case, and don't | |
753 | print a second warning. */ | |
754 | goto supply_them; | |
755 | } | |
756 | regs[i] = fromhex (p[0]) * 16 + fromhex (p[1]); | |
757 | p += 2; | |
758 | } | |
759 | ||
760 | if (i != register_bytes_found) | |
761 | { | |
762 | register_bytes_found = i; | |
763 | #ifdef REGISTER_BYTES_OK | |
764 | if (!REGISTER_BYTES_OK (i)) | |
765 | warning ("Remote reply is too short: %s", buf); | |
766 | #endif | |
767 | } | |
768 | ||
769 | supply_them: | |
770 | for (i = 0; i < NUM_REGS; i++) | |
771 | supply_register (i, ®s[REGISTER_BYTE(i)]); | |
772 | } | |
773 | ||
774 | /* Prepare to store registers. Since we may send them all (using a | |
775 | 'G' request), we have to read out the ones we don't want to change | |
776 | first. */ | |
777 | ||
778 | static void | |
779 | remote_prepare_to_store () | |
780 | { | |
781 | /* Make sure the entire registers array is valid. */ | |
782 | read_register_bytes (0, (char *)NULL, REGISTER_BYTES); | |
783 | } | |
784 | ||
785 | /* Store register REGNO, or all registers if REGNO == -1, from the contents | |
786 | of REGISTERS. FIXME: ignores errors. */ | |
787 | ||
788 | static void | |
789 | remote_store_registers (regno) | |
790 | int regno; | |
791 | { | |
792 | char buf[PBUFSIZ]; | |
793 | int i; | |
794 | char *p; | |
795 | ||
796 | if (regno >= 0 && stub_supports_P) | |
797 | { | |
798 | /* Try storing a single register. */ | |
799 | char *regp; | |
800 | ||
801 | sprintf (buf, "P%x=", regno); | |
802 | p = buf + strlen (buf); | |
803 | regp = ®isters[REGISTER_BYTE (regno)]; | |
804 | for (i = 0; i < REGISTER_RAW_SIZE (regno); ++i) | |
805 | { | |
806 | *p++ = tohex ((regp[i] >> 4) & 0xf); | |
807 | *p++ = tohex (regp[i] & 0xf); | |
808 | } | |
809 | *p = '\0'; | |
810 | remote_send (buf); | |
811 | if (buf[0] != '\0') | |
812 | { | |
813 | /* The stub understands the 'P' request. We are done. */ | |
814 | return; | |
815 | } | |
816 | ||
817 | /* The stub does not support the 'P' request. Use 'G' instead, | |
818 | and don't try using 'P' in the future (it will just waste our | |
819 | time). */ | |
820 | stub_supports_P = 0; | |
821 | } | |
822 | ||
823 | buf[0] = 'G'; | |
824 | ||
825 | /* Command describes registers byte by byte, | |
826 | each byte encoded as two hex characters. */ | |
827 | ||
828 | p = buf + 1; | |
829 | /* remote_prepare_to_store insures that register_bytes_found gets set. */ | |
830 | for (i = 0; i < register_bytes_found; i++) | |
831 | { | |
832 | *p++ = tohex ((registers[i] >> 4) & 0xf); | |
833 | *p++ = tohex (registers[i] & 0xf); | |
834 | } | |
835 | *p = '\0'; | |
836 | ||
837 | remote_send (buf); | |
838 | } | |
839 | ||
840 | #if 0 | |
841 | ||
842 | /* Use of the data cache is disabled because it loses for looking at | |
843 | and changing hardware I/O ports and the like. Accepting `volatile' | |
ba6ef5e5 JK |
844 | would perhaps be one way to fix it. Another idea would be to use the |
845 | executable file for the text segment (for all SEC_CODE sections? | |
846 | For all SEC_READONLY sections?). This has problems if you want to | |
847 | actually see what the memory contains (e.g. self-modifying code, | |
848 | clobbered memory, user downloaded the wrong thing). */ | |
2e0fa11c RS |
849 | |
850 | /* Read a word from remote address ADDR and return it. | |
851 | This goes through the data cache. */ | |
852 | ||
853 | static int | |
854 | remote_fetch_word (addr) | |
855 | CORE_ADDR addr; | |
856 | { | |
2e0fa11c RS |
857 | return dcache_fetch (remote_dcache, addr); |
858 | } | |
859 | ||
860 | /* Write a word WORD into remote address ADDR. | |
861 | This goes through the data cache. */ | |
862 | ||
863 | static void | |
864 | remote_store_word (addr, word) | |
865 | CORE_ADDR addr; | |
866 | int word; | |
867 | { | |
868 | dcache_poke (remote_dcache, addr, word); | |
869 | } | |
870 | #endif /* 0 */ | |
871 | \f | |
872 | /* Write memory data directly to the remote machine. | |
873 | This does not inform the data cache; the data cache uses this. | |
874 | MEMADDR is the address in the remote memory space. | |
875 | MYADDR is the address of the buffer in our space. | |
876 | LEN is the number of bytes. | |
877 | ||
878 | Returns number of bytes transferred, or 0 for error. */ | |
879 | ||
880 | static int | |
881 | remote_write_bytes (memaddr, myaddr, len) | |
882 | CORE_ADDR memaddr; | |
883 | unsigned char *myaddr; | |
884 | int len; | |
885 | { | |
886 | char buf[PBUFSIZ]; | |
887 | int i; | |
888 | char *p; | |
889 | ||
890 | /* FIXME-32x64: Need a version of print_address_numeric which puts the | |
891 | result in a buffer like sprintf. */ | |
892 | sprintf (buf, "M%lx,%x:", (unsigned long) memaddr, len); | |
893 | ||
894 | /* We send target system values byte by byte, in increasing byte addresses, | |
895 | each byte encoded as two hex characters. */ | |
896 | ||
897 | p = buf + strlen (buf); | |
898 | for (i = 0; i < len; i++) | |
899 | { | |
900 | *p++ = tohex ((myaddr[i] >> 4) & 0xf); | |
901 | *p++ = tohex (myaddr[i] & 0xf); | |
902 | } | |
903 | *p = '\0'; | |
904 | ||
905 | putpkt (buf); | |
906 | getpkt (buf, 0); | |
907 | ||
908 | if (buf[0] == 'E') | |
909 | { | |
910 | /* There is no correspondance between what the remote protocol uses | |
911 | for errors and errno codes. We would like a cleaner way of | |
912 | representing errors (big enough to include errno codes, bfd_error | |
913 | codes, and others). But for now just return EIO. */ | |
914 | errno = EIO; | |
915 | return 0; | |
916 | } | |
917 | return len; | |
918 | } | |
919 | ||
920 | /* Read memory data directly from the remote machine. | |
921 | This does not use the data cache; the data cache uses this. | |
922 | MEMADDR is the address in the remote memory space. | |
923 | MYADDR is the address of the buffer in our space. | |
924 | LEN is the number of bytes. | |
925 | ||
926 | Returns number of bytes transferred, or 0 for error. */ | |
927 | ||
928 | static int | |
929 | remote_read_bytes (memaddr, myaddr, len) | |
930 | CORE_ADDR memaddr; | |
931 | unsigned char *myaddr; | |
932 | int len; | |
933 | { | |
934 | char buf[PBUFSIZ]; | |
935 | int i; | |
936 | char *p; | |
937 | ||
938 | if (len > PBUFSIZ / 2 - 1) | |
939 | abort (); | |
940 | ||
941 | /* FIXME-32x64: Need a version of print_address_numeric which puts the | |
942 | result in a buffer like sprintf. */ | |
943 | sprintf (buf, "m%lx,%x", (unsigned long) memaddr, len); | |
944 | putpkt (buf); | |
945 | getpkt (buf, 0); | |
946 | ||
947 | if (buf[0] == 'E') | |
948 | { | |
949 | /* There is no correspondance between what the remote protocol uses | |
950 | for errors and errno codes. We would like a cleaner way of | |
951 | representing errors (big enough to include errno codes, bfd_error | |
952 | codes, and others). But for now just return EIO. */ | |
953 | errno = EIO; | |
954 | return 0; | |
955 | } | |
956 | ||
957 | /* Reply describes memory byte by byte, | |
958 | each byte encoded as two hex characters. */ | |
959 | ||
960 | p = buf; | |
961 | for (i = 0; i < len; i++) | |
962 | { | |
963 | if (p[0] == 0 || p[1] == 0) | |
964 | /* Reply is short. This means that we were able to read only part | |
965 | of what we wanted to. */ | |
966 | break; | |
967 | myaddr[i] = fromhex (p[0]) * 16 + fromhex (p[1]); | |
968 | p += 2; | |
969 | } | |
970 | return i; | |
971 | } | |
972 | \f | |
973 | /* Read or write LEN bytes from inferior memory at MEMADDR, transferring | |
974 | to or from debugger address MYADDR. Write to inferior if SHOULD_WRITE is | |
975 | nonzero. Returns length of data written or read; 0 for error. */ | |
976 | ||
977 | /* ARGSUSED */ | |
978 | static int | |
979 | remote_xfer_memory(memaddr, myaddr, len, should_write, target) | |
980 | CORE_ADDR memaddr; | |
981 | char *myaddr; | |
982 | int len; | |
983 | int should_write; | |
984 | struct target_ops *target; /* ignored */ | |
985 | { | |
986 | int xfersize; | |
987 | int bytes_xferred; | |
988 | int total_xferred = 0; | |
989 | ||
990 | while (len > 0) | |
991 | { | |
992 | if (len > MAXBUFBYTES) | |
993 | xfersize = MAXBUFBYTES; | |
994 | else | |
995 | xfersize = len; | |
996 | ||
997 | if (should_write) | |
998 | bytes_xferred = remote_write_bytes (memaddr, | |
999 | (unsigned char *)myaddr, xfersize); | |
1000 | else | |
1001 | bytes_xferred = remote_read_bytes (memaddr, | |
1002 | (unsigned char *)myaddr, xfersize); | |
1003 | ||
1004 | /* If we get an error, we are done xferring. */ | |
1005 | if (bytes_xferred == 0) | |
1006 | break; | |
1007 | ||
1008 | memaddr += bytes_xferred; | |
1009 | myaddr += bytes_xferred; | |
1010 | len -= bytes_xferred; | |
1011 | total_xferred += bytes_xferred; | |
1012 | } | |
1013 | return total_xferred; | |
1014 | } | |
1015 | ||
1016 | #if 0 | |
1017 | /* Enable after 4.12. */ | |
1018 | ||
1019 | void | |
1020 | remote_search (len, data, mask, startaddr, increment, lorange, hirange | |
1021 | addr_found, data_found) | |
1022 | int len; | |
1023 | char *data; | |
1024 | char *mask; | |
1025 | CORE_ADDR startaddr; | |
1026 | int increment; | |
1027 | CORE_ADDR lorange; | |
1028 | CORE_ADDR hirange; | |
1029 | CORE_ADDR *addr_found; | |
1030 | char *data_found; | |
1031 | { | |
1032 | if (increment == -4 && len == 4) | |
1033 | { | |
1034 | long mask_long, data_long; | |
1035 | long data_found_long; | |
1036 | CORE_ADDR addr_we_found; | |
1037 | char buf[PBUFSIZ]; | |
1038 | long returned_long[2]; | |
1039 | char *p; | |
1040 | ||
1041 | mask_long = extract_unsigned_integer (mask, len); | |
1042 | data_long = extract_unsigned_integer (data, len); | |
1043 | sprintf (buf, "t%x:%x,%x", startaddr, data_long, mask_long); | |
1044 | putpkt (buf); | |
1045 | getpkt (buf, 0); | |
1046 | if (buf[0] == '\0') | |
1047 | { | |
1048 | /* The stub doesn't support the 't' request. We might want to | |
1049 | remember this fact, but on the other hand the stub could be | |
1050 | switched on us. Maybe we should remember it only until | |
1051 | the next "target remote". */ | |
1052 | generic_search (len, data, mask, startaddr, increment, lorange, | |
1053 | hirange, addr_found, data_found); | |
1054 | return; | |
1055 | } | |
1056 | ||
1057 | if (buf[0] == 'E') | |
1058 | /* There is no correspondance between what the remote protocol uses | |
1059 | for errors and errno codes. We would like a cleaner way of | |
1060 | representing errors (big enough to include errno codes, bfd_error | |
1061 | codes, and others). But for now just use EIO. */ | |
1062 | memory_error (EIO, startaddr); | |
1063 | p = buf; | |
1064 | addr_we_found = 0; | |
1065 | while (*p != '\0' && *p != ',') | |
1066 | addr_we_found = (addr_we_found << 4) + fromhex (*p++); | |
1067 | if (*p == '\0') | |
1068 | error ("Protocol error: short return for search"); | |
1069 | ||
1070 | data_found_long = 0; | |
1071 | while (*p != '\0' && *p != ',') | |
1072 | data_found_long = (data_found_long << 4) + fromhex (*p++); | |
1073 | /* Ignore anything after this comma, for future extensions. */ | |
1074 | ||
1075 | if (addr_we_found < lorange || addr_we_found >= hirange) | |
1076 | { | |
1077 | *addr_found = 0; | |
1078 | return; | |
1079 | } | |
1080 | ||
1081 | *addr_found = addr_we_found; | |
1082 | *data_found = store_unsigned_integer (data_we_found, len); | |
1083 | return; | |
1084 | } | |
1085 | generic_search (len, data, mask, startaddr, increment, lorange, | |
1086 | hirange, addr_found, data_found); | |
1087 | } | |
1088 | #endif /* 0 */ | |
1089 | \f | |
1090 | static void | |
1091 | remote_files_info (ignore) | |
1092 | struct target_ops *ignore; | |
1093 | { | |
1094 | puts_filtered ("Debugging a target over a serial line.\n"); | |
1095 | } | |
1096 | \f | |
1097 | /* Stuff for dealing with the packets which are part of this protocol. | |
1098 | See comment at top of file for details. */ | |
1099 | ||
1100 | /* Read a single character from the remote end, masking it down to 7 bits. */ | |
1101 | ||
1102 | static int | |
1103 | readchar (timeout) | |
1104 | int timeout; | |
1105 | { | |
1106 | int ch; | |
1107 | ||
4682251b | 1108 | ch = SERIAL_READCHAR (remote_desc, timeout); |
2e0fa11c RS |
1109 | |
1110 | switch (ch) | |
1111 | { | |
1112 | case SERIAL_EOF: | |
1113 | error ("Remote connection closed"); | |
1114 | case SERIAL_ERROR: | |
1115 | perror_with_name ("Remote communication error"); | |
1116 | case SERIAL_TIMEOUT: | |
1117 | return ch; | |
1118 | default: | |
1119 | return ch & 0x7f; | |
1120 | } | |
1121 | } | |
1122 | ||
1123 | /* Send the command in BUF to the remote machine, | |
1124 | and read the reply into BUF. | |
1125 | Report an error if we get an error reply. */ | |
1126 | ||
1127 | static void | |
1128 | remote_send (buf) | |
1129 | char *buf; | |
1130 | { | |
1131 | ||
1132 | putpkt (buf); | |
1133 | getpkt (buf, 0); | |
1134 | ||
1135 | if (buf[0] == 'E') | |
1136 | error ("Remote failure reply: %s", buf); | |
1137 | } | |
1138 | ||
1139 | /* Send a packet to the remote machine, with error checking. | |
1140 | The data of the packet is in BUF. */ | |
2e0fa11c RS |
1141 | static void |
1142 | putpkt (buf) | |
1143 | char *buf; | |
1144 | { | |
1145 | int i; | |
1146 | unsigned char csum = 0; | |
1147 | char buf2[PBUFSIZ]; | |
1148 | int cnt = strlen (buf); | |
1149 | int ch; | |
1150 | char *p; | |
1151 | ||
1152 | /* Copy the packet into buffer BUF2, encapsulating it | |
1153 | and giving it a checksum. */ | |
1154 | ||
1155 | if (cnt > sizeof(buf2) - 5) /* Prosanity check */ | |
1156 | abort(); | |
1157 | ||
1158 | p = buf2; | |
1159 | *p++ = '$'; | |
1160 | ||
1161 | for (i = 0; i < cnt; i++) | |
1162 | { | |
1163 | csum += buf[i]; | |
1164 | *p++ = buf[i]; | |
1165 | } | |
1166 | *p++ = '#'; | |
1167 | *p++ = tohex ((csum >> 4) & 0xf); | |
1168 | *p++ = tohex (csum & 0xf); | |
1169 | ||
1170 | /* Send it over and over until we get a positive ack. */ | |
1171 | ||
1172 | while (1) | |
1173 | { | |
1174 | int started_error_output = 0; | |
1175 | ||
1176 | if (remote_debug) | |
1177 | { | |
1178 | *p = '\0'; | |
1179 | printf_unfiltered ("Sending packet: %s...", buf2); | |
1180 | gdb_flush(gdb_stdout); | |
1181 | } | |
4682251b | 1182 | if (SERIAL_WRITE (remote_desc, buf2, p - buf2)) |
2e0fa11c RS |
1183 | perror_with_name ("putpkt: write failed"); |
1184 | ||
1185 | /* read until either a timeout occurs (-2) or '+' is read */ | |
1186 | while (1) | |
1187 | { | |
1188 | ch = readchar (remote_timeout); | |
1189 | ||
1190 | if (remote_debug) | |
1191 | { | |
1192 | switch (ch) | |
1193 | { | |
1194 | case '+': | |
1195 | case SERIAL_TIMEOUT: | |
1196 | case '$': | |
1197 | if (started_error_output) | |
1198 | { | |
7baea946 | 1199 | putchar_unfiltered ('\n'); |
2e0fa11c RS |
1200 | started_error_output = 0; |
1201 | } | |
1202 | } | |
1203 | } | |
1204 | ||
1205 | switch (ch) | |
1206 | { | |
1207 | case '+': | |
1208 | if (remote_debug) | |
4682251b | 1209 | printf_unfiltered("Got Ack\n"); |
2e0fa11c RS |
1210 | return; |
1211 | case SERIAL_TIMEOUT: | |
1212 | break; /* Retransmit buffer */ | |
1213 | case '$': | |
1214 | { | |
1215 | unsigned char junkbuf[PBUFSIZ]; | |
1216 | ||
1217 | /* It's probably an old response, and we're out of sync. Just | |
1218 | gobble up the packet and ignore it. */ | |
1219 | getpkt (junkbuf, 0); | |
1220 | continue; /* Now, go look for + */ | |
1221 | } | |
1222 | default: | |
1223 | if (remote_debug) | |
1224 | { | |
1225 | if (!started_error_output) | |
1226 | { | |
1227 | started_error_output = 1; | |
1228 | printf_unfiltered ("putpkt: Junk: "); | |
1229 | } | |
7baea946 | 1230 | putchar_unfiltered (ch & 0177); |
2e0fa11c RS |
1231 | } |
1232 | continue; | |
1233 | } | |
1234 | break; /* Here to retransmit */ | |
1235 | } | |
1236 | ||
1237 | #if 0 | |
1238 | /* This is wrong. If doing a long backtrace, the user should be | |
1239 | able to get out next time we call QUIT, without anything as violent | |
1240 | as interrupt_query. If we want to provide a way out of here | |
1241 | without getting to the next QUIT, it should be based on hitting | |
1242 | ^C twice as in remote_wait. */ | |
1243 | if (quit_flag) | |
1244 | { | |
1245 | quit_flag = 0; | |
1246 | interrupt_query (); | |
1247 | } | |
1248 | #endif | |
1249 | } | |
1250 | } | |
1251 | ||
1252 | /* Come here after finding the start of the frame. Collect the rest into BUF, | |
1253 | verifying the checksum, length, and handling run-length compression. | |
1254 | Returns 0 on any error, 1 on success. */ | |
1255 | ||
1256 | static int | |
1257 | read_frame (buf) | |
1258 | char *buf; | |
1259 | { | |
1260 | unsigned char csum; | |
1261 | char *bp; | |
1262 | int c; | |
1263 | ||
1264 | csum = 0; | |
1265 | bp = buf; | |
1266 | ||
1267 | while (1) | |
1268 | { | |
1269 | c = readchar (remote_timeout); | |
1270 | ||
1271 | switch (c) | |
1272 | { | |
1273 | case SERIAL_TIMEOUT: | |
1274 | if (remote_debug) | |
1275 | puts_filtered ("Timeout in mid-packet, retrying\n"); | |
1276 | return 0; | |
1277 | case '$': | |
1278 | if (remote_debug) | |
1279 | puts_filtered ("Saw new packet start in middle of old one\n"); | |
1280 | return 0; /* Start a new packet, count retries */ | |
1281 | case '#': | |
1282 | { | |
1283 | unsigned char pktcsum; | |
1284 | ||
1285 | *bp = '\000'; | |
1286 | ||
1287 | pktcsum = fromhex (readchar (remote_timeout)) << 4; | |
1288 | pktcsum |= fromhex (readchar (remote_timeout)); | |
1289 | ||
1290 | if (csum == pktcsum) | |
1291 | return 1; | |
1292 | ||
1293 | printf_filtered ("Bad checksum, sentsum=0x%x, csum=0x%x, buf=", | |
1294 | pktcsum, csum); | |
1295 | puts_filtered (buf); | |
1296 | puts_filtered ("\n"); | |
1297 | ||
1298 | return 0; | |
1299 | } | |
1300 | case '*': /* Run length encoding */ | |
1301 | csum += c; | |
1302 | c = readchar (remote_timeout); | |
1303 | csum += c; | |
1304 | c = c - ' ' + 3; /* Compute repeat count */ | |
1305 | ||
1306 | if (bp + c - 1 < buf + PBUFSIZ - 1) | |
1307 | { | |
1308 | memset (bp, *(bp - 1), c); | |
1309 | bp += c; | |
1310 | continue; | |
1311 | } | |
1312 | ||
1313 | *bp = '\0'; | |
1314 | printf_filtered ("Repeat count %d too large for buffer: ", c); | |
1315 | puts_filtered (buf); | |
1316 | puts_filtered ("\n"); | |
1317 | return 0; | |
1318 | ||
1319 | default: | |
1320 | if (bp < buf + PBUFSIZ - 1) | |
1321 | { | |
1322 | *bp++ = c; | |
1323 | csum += c; | |
1324 | continue; | |
1325 | } | |
1326 | ||
1327 | *bp = '\0'; | |
1328 | puts_filtered ("Remote packet too long: "); | |
1329 | puts_filtered (buf); | |
1330 | puts_filtered ("\n"); | |
1331 | ||
1332 | return 0; | |
1333 | } | |
1334 | } | |
1335 | } | |
1336 | ||
1337 | /* Read a packet from the remote machine, with error checking, | |
1338 | and store it in BUF. BUF is expected to be of size PBUFSIZ. | |
1339 | If FOREVER, wait forever rather than timing out; this is used | |
1340 | while the target is executing user code. */ | |
1341 | ||
1342 | static void | |
1343 | getpkt (buf, forever) | |
1344 | char *buf; | |
1345 | int forever; | |
1346 | { | |
1347 | char *bp; | |
1348 | int c; | |
1349 | int tries; | |
1350 | int timeout; | |
1351 | int val; | |
1352 | ||
1353 | if (forever) | |
1354 | timeout = -1; | |
1355 | else | |
1356 | timeout = remote_timeout; | |
1357 | ||
1358 | #define MAX_TRIES 10 | |
1359 | ||
1360 | for (tries = 1; tries <= MAX_TRIES; tries++) | |
1361 | { | |
1362 | /* This can loop forever if the remote side sends us characters | |
1363 | continuously, but if it pauses, we'll get a zero from readchar | |
1364 | because of timeout. Then we'll count that as a retry. */ | |
1365 | ||
1366 | /* Note that we will only wait forever prior to the start of a packet. | |
1367 | After that, we expect characters to arrive at a brisk pace. They | |
1368 | should show up within remote_timeout intervals. */ | |
1369 | ||
1370 | do | |
1371 | { | |
1372 | c = readchar (timeout); | |
1373 | ||
1374 | if (c == SERIAL_TIMEOUT) | |
1375 | { | |
1376 | if (remote_debug) | |
1377 | puts_filtered ("Timed out.\n"); | |
1378 | goto retry; | |
1379 | } | |
1380 | } | |
1381 | while (c != '$'); | |
1382 | ||
1383 | /* We've found the start of a packet, now collect the data. */ | |
1384 | ||
1385 | val = read_frame (buf); | |
1386 | ||
1387 | if (val == 1) | |
1388 | { | |
1389 | if (remote_debug) | |
1390 | fprintf_unfiltered (gdb_stderr, "Packet received: %s\n", buf); | |
4682251b | 1391 | SERIAL_WRITE (remote_desc, "+", 1); |
2e0fa11c RS |
1392 | return; |
1393 | } | |
1394 | ||
1395 | /* Try the whole thing again. */ | |
1396 | retry: | |
4682251b | 1397 | SERIAL_WRITE (remote_desc, "-", 1); |
2e0fa11c RS |
1398 | } |
1399 | ||
1400 | /* We have tried hard enough, and just can't receive the packet. Give up. */ | |
1401 | ||
1402 | printf_unfiltered ("Ignoring packet error, continuing...\n"); | |
4682251b | 1403 | SERIAL_WRITE (remote_desc, "+", 1); |
2e0fa11c RS |
1404 | } |
1405 | \f | |
1406 | static void | |
1407 | remote_kill () | |
1408 | { | |
1409 | putpkt ("k"); | |
1410 | /* Don't wait for it to die. I'm not really sure it matters whether | |
1411 | we do or not. For the existing stubs, kill is a noop. */ | |
1412 | target_mourn_inferior (); | |
1413 | } | |
1414 | ||
1415 | static void | |
1416 | remote_mourn () | |
1417 | { | |
1418 | unpush_target (&remote_ops); | |
1419 | generic_mourn_inferior (); | |
1420 | } | |
1421 | \f | |
1422 | #ifdef REMOTE_BREAKPOINT | |
1423 | ||
1424 | /* On some machines, e.g. 68k, we may use a different breakpoint instruction | |
1425 | than other targets. */ | |
1426 | static unsigned char break_insn[] = REMOTE_BREAKPOINT; | |
1427 | ||
2e0fa11c RS |
1428 | #else /* No REMOTE_BREAKPOINT. */ |
1429 | ||
1430 | /* Same old breakpoint instruction. This code does nothing different | |
1431 | than mem-break.c. */ | |
1432 | static unsigned char break_insn[] = BREAKPOINT; | |
1433 | ||
1434 | #endif /* No REMOTE_BREAKPOINT. */ | |
1435 | ||
1436 | /* Insert a breakpoint on targets that don't have any better breakpoint | |
1437 | support. We read the contents of the target location and stash it, | |
1438 | then overwrite it with a breakpoint instruction. ADDR is the target | |
1439 | location in the target machine. CONTENTS_CACHE is a pointer to | |
1440 | memory allocated for saving the target contents. It is guaranteed | |
1441 | by the caller to be long enough to save sizeof BREAKPOINT bytes (this | |
1442 | is accomplished via BREAKPOINT_MAX). */ | |
1443 | ||
1444 | static int | |
1445 | remote_insert_breakpoint (addr, contents_cache) | |
1446 | CORE_ADDR addr; | |
1447 | char *contents_cache; | |
1448 | { | |
1449 | int val; | |
1450 | ||
1451 | val = target_read_memory (addr, contents_cache, sizeof break_insn); | |
1452 | ||
1453 | if (val == 0) | |
1454 | val = target_write_memory (addr, (char *)break_insn, sizeof break_insn); | |
1455 | ||
1456 | return val; | |
1457 | } | |
1458 | ||
1459 | static int | |
1460 | remote_remove_breakpoint (addr, contents_cache) | |
1461 | CORE_ADDR addr; | |
1462 | char *contents_cache; | |
1463 | { | |
1464 | return target_write_memory (addr, contents_cache, sizeof break_insn); | |
1465 | } | |
1466 | \f | |
1467 | /* Define the target subroutine names */ | |
1468 | ||
7765123d RS |
1469 | struct target_ops remote_hppro_ops = { |
1470 | "hppro", /* to_shortname */ | |
4682251b | 1471 | "Remote serial target for HP-PRO targets", /* to_longname */ |
2e0fa11c | 1472 | "Use a remote computer via a serial line, using a gdb-specific protocol.\n\ |
4682251b RS |
1473 | This is for targets that supports the HP-PRO standard.\n\ |
1474 | Specify the serial device it is connected to (e.g. /dev/ttya) or telnet port.", /* to_doc */ | |
2e0fa11c RS |
1475 | remote_open, /* to_open */ |
1476 | remote_close, /* to_close */ | |
1477 | NULL, /* to_attach */ | |
1478 | remote_detach, /* to_detach */ | |
1479 | remote_resume, /* to_resume */ | |
1480 | remote_wait, /* to_wait */ | |
1481 | remote_fetch_registers, /* to_fetch_registers */ | |
1482 | remote_store_registers, /* to_store_registers */ | |
1483 | remote_prepare_to_store, /* to_prepare_to_store */ | |
1484 | remote_xfer_memory, /* to_xfer_memory */ | |
1485 | remote_files_info, /* to_files_info */ | |
1486 | ||
1487 | remote_insert_breakpoint, /* to_insert_breakpoint */ | |
1488 | remote_remove_breakpoint, /* to_remove_breakpoint */ | |
1489 | ||
1490 | NULL, /* to_terminal_init */ | |
1491 | NULL, /* to_terminal_inferior */ | |
1492 | NULL, /* to_terminal_ours_for_output */ | |
1493 | NULL, /* to_terminal_ours */ | |
1494 | NULL, /* to_terminal_info */ | |
1495 | remote_kill, /* to_kill */ | |
4682251b | 1496 | hppro_load, /* to_load */ |
2e0fa11c RS |
1497 | NULL, /* to_lookup_symbol */ |
1498 | NULL, /* to_create_inferior */ | |
1499 | remote_mourn, /* to_mourn_inferior */ | |
1500 | 0, /* to_can_run */ | |
1501 | 0, /* to_notice_signals */ | |
43fc25c8 | 1502 | 0, /* to_thread_alive */ |
78b459a7 | 1503 | 0, /* to_stop */ |
2e0fa11c RS |
1504 | process_stratum, /* to_stratum */ |
1505 | NULL, /* to_next */ | |
1506 | 1, /* to_has_all_memory */ | |
1507 | 1, /* to_has_memory */ | |
1508 | 1, /* to_has_stack */ | |
1509 | 1, /* to_has_registers */ | |
1510 | 1, /* to_has_execution */ | |
1511 | NULL, /* sections */ | |
1512 | NULL, /* sections_end */ | |
1513 | OPS_MAGIC /* to_magic */ | |
1514 | }; | |
1515 | ||
1516 | void | |
7765123d RS |
1517 | _initialize_remote_hppro () |
1518 | { | |
1519 | struct cmd_list_element *c; | |
1520 | add_target (&remote_hppro_ops); | |
1521 | ||
1522 | /* this sets the type of download protocol */ | |
1523 | c = add_set_cmd ("loadtype", no_class, var_string, (char *)&loadtype_str, | |
1524 | "Set the type of the remote load protocol.\n", &setlist); | |
1525 | c->function.sfunc = set_loadtype_command; | |
1526 | add_show_from_set (c, &showlist); | |
4682251b RS |
1527 | loadtype_str = savestring ("generic", 8); |
1528 | ||
1529 | /* this adds a command to boot the board */ | |
1530 | add_com ("boot", class_support, boot_board, | |
1531 | "Boot the damn target board.\n"); | |
7765123d RS |
1532 | } |
1533 | ||
1534 | static void | |
4682251b RS |
1535 | set_loadtype_command (ignore, from_tty, c) |
1536 | char *ignore; | |
7765123d RS |
1537 | int from_tty; |
1538 | struct cmd_list_element *c; | |
2e0fa11c | 1539 | { |
4682251b | 1540 | loadtype_str = savestring (*(char **) c->var, strlen (*(char **) c->var)); |
2e0fa11c | 1541 | } |
7765123d | 1542 |