]>
Commit | Line | Data |
---|---|---|
3e437fe6 RS |
1 | /* Remote debugging interface for Array Tech RAID controller.. |
2 | Copyright 90, 91, 92, 93, 94, 1995 Free Software Foundation, Inc. | |
3 | Contributed by Cygnus Support. Written by Rob Savoye for Cygnus. | |
4 | ||
5 | This module talks to a debug monitor called 'MONITOR', which | |
6 | We communicate with MONITOR via either a direct serial line, or a TCP | |
7 | (or possibly TELNET) stream to a terminal multiplexor, | |
8 | which in turn talks to the target board. | |
9 | ||
10 | This file is part of GDB. | |
11 | ||
12 | This program is free software; you can redistribute it and/or modify | |
13 | it under the terms of the GNU General Public License as published by | |
14 | the Free Software Foundation; either version 2 of the License, or | |
15 | (at your option) any later version. | |
16 | ||
17 | This program is distributed in the hope that it will be useful, | |
18 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
19 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
20 | GNU General Public License for more details. | |
21 | ||
22 | You should have received a copy of the GNU General Public License | |
23 | along with this program; if not, write to the Free Software | |
6c9638b4 | 24 | Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. |
3e437fe6 RS |
25 | */ |
26 | ||
27 | #include "defs.h" | |
28 | #include "gdbcore.h" | |
29 | #include "target.h" | |
30 | #include "wait.h" | |
73d3dbd4 | 31 | #ifdef ANSI_PROTOTYPES |
85c613aa C |
32 | #include <stdarg.h> |
33 | #else | |
3e437fe6 | 34 | #include <varargs.h> |
85c613aa | 35 | #endif |
ce4450fa | 36 | #include <ctype.h> |
3e437fe6 | 37 | #include <signal.h> |
3e437fe6 | 38 | #include <sys/types.h> |
b284227c | 39 | #include "gdb_string.h" |
3e437fe6 RS |
40 | #include "command.h" |
41 | #include "serial.h" | |
42 | #include "monitor.h" | |
43 | #include "remote-utils.h" | |
44 | ||
7bb5e831 RS |
45 | extern int baud_rate; |
46 | ||
b284227c | 47 | #define ARRAY_PROMPT ">> " |
3e437fe6 RS |
48 | |
49 | #define SWAP_TARGET_AND_HOST(buffer,len) \ | |
50 | do \ | |
51 | { \ | |
52 | if (TARGET_BYTE_ORDER != HOST_BYTE_ORDER) \ | |
53 | { \ | |
54 | char tmp; \ | |
55 | char *p = (char *)(buffer); \ | |
56 | char *q = ((char *)(buffer)) + len - 1; \ | |
57 | for (; p < q; p++, q--) \ | |
58 | { \ | |
59 | tmp = *q; \ | |
60 | *q = *p; \ | |
61 | *p = tmp; \ | |
62 | } \ | |
63 | } \ | |
64 | } \ | |
65 | while (0) | |
66 | ||
85c613aa | 67 | static void debuglogs PARAMS((int, char *, ...)); |
3e437fe6 RS |
68 | static void array_open(); |
69 | static void array_close(); | |
70 | static void array_detach(); | |
71 | static void array_attach(); | |
72 | static void array_resume(); | |
73 | static void array_fetch_register(); | |
74 | static void array_store_register(); | |
75 | static void array_fetch_registers(); | |
76 | static void array_store_registers(); | |
77 | static void array_prepare_to_store(); | |
78 | static void array_files_info(); | |
79 | static void array_kill(); | |
80 | static void array_create_inferior(); | |
81 | static void array_mourn_inferior(); | |
82 | static void make_gdb_packet(); | |
83 | static int array_xfer_memory(); | |
84 | static int array_wait(); | |
85 | static int array_insert_breakpoint(); | |
86 | static int array_remove_breakpoint(); | |
87 | static int tohex(); | |
88 | static int to_hex(); | |
89 | static int from_hex(); | |
90 | static int array_send_packet(); | |
91 | static int array_get_packet(); | |
92 | static unsigned long ascii2hexword(); | |
93 | static char *hexword2ascii(); | |
94 | ||
95 | extern char *version; | |
96 | ||
97 | #define LOG_FILE "monitor.log" | |
98 | #if defined (LOG_FILE) | |
99 | FILE *log_file; | |
100 | #endif | |
101 | ||
102 | static int timeout = 30; | |
103 | /* Having this larger than 400 causes us to be incompatible with m68k-stub.c | |
104 | and i386-stub.c. Normally, no one would notice because it only matters | |
105 | for writing large chunks of memory (e.g. in downloads). Also, this needs | |
106 | to be more than 400 if required to hold the registers (see below, where | |
107 | we round it up based on REGISTER_BYTES). */ | |
108 | #define PBUFSIZ 400 | |
109 | ||
110 | /* | |
111 | * Descriptor for I/O to remote machine. Initialize it to NULL so that | |
112 | * array_open knows that we don't have a file open when the program starts. | |
113 | */ | |
114 | serial_t array_desc = NULL; | |
115 | ||
116 | /* | |
117 | * this array of registers need to match the indexes used by GDB. The | |
118 | * whole reason this exists is cause the various ROM monitors use | |
119 | * different strings than GDB does, and doesn't support all the | |
120 | * registers either. So, typing "info reg sp" becomes a "r30". | |
121 | */ | |
122 | extern char *tmp_mips_processor_type; | |
123 | extern int mips_set_processor_type(); | |
124 | ||
c719b714 JM |
125 | static struct target_ops array_ops ; |
126 | static void init_array_ops(void) | |
127 | { | |
128 | array_ops.to_shortname = "array"; | |
129 | array_ops.to_longname = | |
130 | "Debug using the standard GDB remote protocol for the Array Tech target.", | |
131 | array_ops.to_doc = | |
132 | "Debug using the standard GDB remote protocol for the Array Tech target.\n\ | |
133 | Specify the serial device it is connected to (e.g. /dev/ttya)." ; | |
134 | array_ops.to_open = array_open; | |
135 | array_ops.to_close = array_close; | |
136 | array_ops.to_attach = NULL; | |
137 | array_ops.to_detach = array_detach; | |
138 | array_ops.to_resume = array_resume; | |
139 | array_ops.to_wait = array_wait; | |
140 | array_ops.to_fetch_registers = array_fetch_registers; | |
141 | array_ops.to_store_registers = array_store_registers; | |
142 | array_ops.to_prepare_to_store = array_prepare_to_store; | |
143 | array_ops.to_xfer_memory = array_xfer_memory; | |
144 | array_ops.to_files_info = array_files_info; | |
145 | array_ops.to_insert_breakpoint = array_insert_breakpoint; | |
146 | array_ops.to_remove_breakpoint = array_remove_breakpoint; | |
147 | array_ops.to_terminal_init = 0; | |
148 | array_ops.to_terminal_inferior = 0; | |
149 | array_ops.to_terminal_ours_for_output = 0; | |
150 | array_ops.to_terminal_ours = 0; | |
151 | array_ops.to_terminal_info = 0; | |
152 | array_ops.to_kill = array_kill; | |
153 | array_ops.to_load = 0; | |
154 | array_ops.to_lookup_symbol = 0; | |
155 | array_ops.to_create_inferior = array_create_inferior; | |
156 | array_ops.to_mourn_inferior = array_mourn_inferior; | |
157 | array_ops.to_can_run = 0; | |
158 | array_ops.to_notice_signals = 0; | |
159 | array_ops.to_thread_alive = 0; | |
160 | array_ops.to_stop = 0; | |
161 | array_ops.to_stratum = process_stratum; | |
162 | array_ops.DONT_USE = 0; | |
163 | array_ops.to_has_all_memory = 1; | |
164 | array_ops.to_has_memory = 1; | |
165 | array_ops.to_has_stack = 1; | |
166 | array_ops.to_has_registers = 1; | |
167 | array_ops.to_has_execution = 1; | |
168 | array_ops.to_sections = 0; | |
169 | array_ops.to_sections_end = 0; | |
170 | array_ops.to_magic = OPS_MAGIC; | |
3e437fe6 RS |
171 | }; |
172 | ||
173 | /* | |
174 | * printf_monitor -- send data to monitor. Works just like printf. | |
175 | */ | |
176 | static void | |
73d3dbd4 | 177 | #ifdef ANSI_PROTOTYPES |
85c613aa C |
178 | printf_monitor(char *pattern, ...) |
179 | #else | |
3e437fe6 RS |
180 | printf_monitor(va_alist) |
181 | va_dcl | |
85c613aa | 182 | #endif |
3e437fe6 RS |
183 | { |
184 | va_list args; | |
3e437fe6 RS |
185 | char buf[PBUFSIZ]; |
186 | int i; | |
187 | ||
73d3dbd4 | 188 | #ifdef ANSI_PROTOTYPES |
85c613aa C |
189 | va_start(args, pattern); |
190 | #else | |
191 | char *pattern; | |
3e437fe6 | 192 | va_start(args); |
3e437fe6 | 193 | pattern = va_arg(args, char *); |
85c613aa | 194 | #endif |
3e437fe6 RS |
195 | |
196 | vsprintf(buf, pattern, args); | |
197 | ||
198 | debuglogs (1, "printf_monitor(), Sending: \"%s\".", buf); | |
199 | ||
200 | if (strlen(buf) > PBUFSIZ) | |
201 | error ("printf_monitor(): string too long"); | |
202 | if (SERIAL_WRITE(array_desc, buf, strlen(buf))) | |
203 | fprintf(stderr, "SERIAL_WRITE failed: %s\n", safe_strerror(errno)); | |
204 | } | |
205 | /* | |
206 | * write_monitor -- send raw data to monitor. | |
207 | */ | |
208 | static void | |
209 | write_monitor(data, len) | |
210 | char data[]; | |
211 | int len; | |
212 | { | |
213 | if (SERIAL_WRITE(array_desc, data, len)) | |
214 | fprintf(stderr, "SERIAL_WRITE failed: %s\n", safe_strerror(errno)); | |
215 | ||
216 | *(data + len+1) = '\0'; | |
217 | debuglogs (1, "write_monitor(), Sending: \"%s\".", data); | |
218 | ||
219 | } | |
220 | ||
221 | /* | |
222 | * debuglogs -- deal with debugging info to multiple sources. This takes | |
223 | * two real args, the first one is the level to be compared against | |
224 | * the sr_get_debug() value, the second arg is a printf buffer and args | |
225 | * to be formatted and printed. A CR is added after each string is printed. | |
226 | */ | |
227 | static void | |
73d3dbd4 | 228 | #ifdef ANSI_PROTOTYPES |
85c613aa C |
229 | debuglogs(int level, char *pattern, ...) |
230 | #else | |
3e437fe6 RS |
231 | debuglogs(va_alist) |
232 | va_dcl | |
85c613aa | 233 | #endif |
3e437fe6 RS |
234 | { |
235 | va_list args; | |
85c613aa | 236 | char *p; |
3e437fe6 RS |
237 | unsigned char buf[PBUFSIZ]; |
238 | char newbuf[PBUFSIZ]; | |
85c613aa | 239 | int i; |
3e437fe6 | 240 | |
73d3dbd4 | 241 | #ifdef ANSI_PROTOTYPES |
85c613aa C |
242 | va_start(args, pattern); |
243 | #else | |
244 | char *pattern; | |
245 | int level; | |
3e437fe6 | 246 | va_start(args); |
3e437fe6 | 247 | level = va_arg(args, int); /* get the debug level */ |
85c613aa C |
248 | pattern = va_arg(args, char *); /* get the printf style pattern */ |
249 | #endif | |
250 | ||
3e437fe6 RS |
251 | if ((level <0) || (level > 100)) { |
252 | error ("Bad argument passed to debuglogs(), needs debug level"); | |
253 | return; | |
254 | } | |
255 | ||
3e437fe6 RS |
256 | vsprintf(buf, pattern, args); /* format the string */ |
257 | ||
258 | /* convert some characters so it'll look right in the log */ | |
259 | p = newbuf; | |
260 | for (i = 0 ; buf[i] != '\0'; i++) { | |
261 | if (i > PBUFSIZ) | |
262 | error ("Debug message too long"); | |
263 | switch (buf[i]) { | |
264 | case '\n': /* newlines */ | |
265 | *p++ = '\\'; | |
266 | *p++ = 'n'; | |
267 | continue; | |
268 | case '\r': /* carriage returns */ | |
269 | *p++ = '\\'; | |
270 | *p++ = 'r'; | |
271 | continue; | |
272 | case '\033': /* escape */ | |
273 | *p++ = '\\'; | |
274 | *p++ = 'e'; | |
275 | continue; | |
276 | case '\t': /* tab */ | |
277 | *p++ = '\\'; | |
278 | *p++ = 't'; | |
279 | continue; | |
280 | case '\b': /* backspace */ | |
281 | *p++ = '\\'; | |
282 | *p++ = 'b'; | |
283 | continue; | |
284 | default: /* no change */ | |
285 | *p++ = buf[i]; | |
286 | } | |
287 | ||
288 | if (buf[i] < 26) { /* modify control characters */ | |
289 | *p++ = '^'; | |
290 | *p++ = buf[i] + 'A'; | |
291 | continue; | |
292 | } | |
293 | if (buf[i] >= 128) { /* modify control characters */ | |
294 | *p++ = '!'; | |
295 | *p++ = buf[i] + 'A'; | |
296 | continue; | |
297 | } | |
298 | } | |
299 | *p = '\0'; /* terminate the string */ | |
300 | ||
301 | if (sr_get_debug() > level) | |
302 | printf_unfiltered ("%s\n", newbuf); | |
303 | ||
304 | #ifdef LOG_FILE /* write to the monitor log */ | |
305 | if (log_file != 0x0) { | |
306 | fputs (newbuf, log_file); | |
307 | fputc ('\n', log_file); | |
308 | fflush (log_file); | |
309 | } | |
310 | #endif | |
311 | } | |
312 | ||
313 | /* readchar -- read a character from the remote system, doing all the fancy | |
314 | * timeout stuff. | |
315 | */ | |
316 | static int | |
317 | readchar(timeout) | |
318 | int timeout; | |
319 | { | |
320 | int c; | |
321 | ||
322 | c = SERIAL_READCHAR(array_desc, abs(timeout)); | |
323 | ||
324 | if (sr_get_debug() > 5) { | |
325 | putchar(c & 0x7f); | |
326 | debuglogs (5, "readchar: timeout = %d\n", timeout); | |
327 | } | |
328 | ||
329 | #ifdef LOG_FILE | |
330 | if (isascii (c)) | |
331 | putc(c & 0x7f, log_file); | |
332 | #endif | |
333 | ||
334 | if (c >= 0) | |
335 | return c & 0x7f; | |
336 | ||
337 | if (c == SERIAL_TIMEOUT) { | |
338 | if (timeout <= 0) | |
339 | return c; /* Polls shouldn't generate timeout errors */ | |
340 | error("Timeout reading from remote system."); | |
341 | #ifdef LOG_FILE | |
342 | fputs ("ERROR: Timeout reading from remote system", log_file); | |
343 | #endif | |
344 | } | |
345 | perror_with_name("readchar"); | |
346 | } | |
347 | ||
348 | /* | |
349 | * expect -- scan input from the remote system, until STRING is found. | |
350 | * If DISCARD is non-zero, then discard non-matching input, else print | |
351 | * it out. Let the user break out immediately. | |
352 | */ | |
353 | static void | |
354 | expect (string, discard) | |
355 | char *string; | |
356 | int discard; | |
357 | { | |
358 | char *p = string; | |
359 | int c; | |
360 | ||
361 | ||
362 | debuglogs (1, "Expecting \"%s\".", string); | |
363 | ||
364 | immediate_quit = 1; | |
365 | while (1) { | |
366 | c = readchar(timeout); | |
367 | if (!isascii (c)) | |
368 | continue; | |
369 | if (c == *p++) { | |
370 | if (*p == '\0') { | |
371 | immediate_quit = 0; | |
372 | debuglogs (4, "Matched"); | |
373 | return; | |
374 | } | |
375 | } else { | |
376 | if (!discard) { | |
377 | fputc_unfiltered (c, gdb_stdout); | |
378 | } | |
379 | p = string; | |
380 | } | |
381 | } | |
382 | } | |
383 | ||
384 | /* Keep discarding input until we see the MONITOR array_cmds->prompt. | |
385 | ||
386 | The convention for dealing with the expect_prompt is that you | |
387 | o give your command | |
388 | o *then* wait for the expect_prompt. | |
389 | ||
390 | Thus the last thing that a procedure does with the serial line | |
391 | will be an expect_prompt(). Exception: array_resume does not | |
392 | wait for the expect_prompt, because the terminal is being handed over | |
393 | to the inferior. However, the next thing which happens after that | |
394 | is a array_wait which does wait for the expect_prompt. | |
395 | Note that this includes abnormal exit, e.g. error(). This is | |
396 | necessary to prevent getting into states from which we can't | |
397 | recover. */ | |
398 | static void | |
399 | expect_prompt(discard) | |
400 | int discard; | |
401 | { | |
b284227c | 402 | expect (ARRAY_PROMPT, discard); |
3e437fe6 RS |
403 | } |
404 | ||
405 | /* | |
406 | * junk -- ignore junk characters. Returns a 1 if junk, 0 otherwise | |
407 | */ | |
408 | static int | |
409 | junk(ch) | |
410 | char ch; | |
411 | { | |
412 | switch (ch) { | |
413 | case '\0': | |
414 | case ' ': | |
415 | case '-': | |
416 | case '\t': | |
417 | case '\r': | |
418 | case '\n': | |
419 | if (sr_get_debug() > 5) | |
420 | debuglogs (5, "Ignoring \'%c\'.", ch); | |
421 | return 1; | |
422 | default: | |
423 | if (sr_get_debug() > 5) | |
424 | debuglogs (5, "Accepting \'%c\'.", ch); | |
425 | return 0; | |
426 | } | |
427 | } | |
428 | ||
429 | /* | |
430 | * get_hex_digit -- Get a hex digit from the remote system & return its value. | |
431 | * If ignore is nonzero, ignore spaces, newline & tabs. | |
432 | */ | |
433 | static int | |
434 | get_hex_digit(ignore) | |
435 | int ignore; | |
436 | { | |
437 | static int ch; | |
438 | while (1) { | |
439 | ch = readchar(timeout); | |
440 | if (junk(ch)) | |
441 | continue; | |
442 | if (sr_get_debug() > 4) { | |
443 | debuglogs (4, "get_hex_digit() got a 0x%x(%c)", ch, ch); | |
444 | } else { | |
445 | #ifdef LOG_FILE /* write to the monitor log */ | |
446 | if (log_file != 0x0) { | |
447 | fputs ("get_hex_digit() got a 0x", log_file); | |
448 | fputc (ch, log_file); | |
449 | fputc ('\n', log_file); | |
450 | fflush (log_file); | |
451 | } | |
452 | #endif | |
453 | } | |
454 | ||
455 | if (ch >= '0' && ch <= '9') | |
456 | return ch - '0'; | |
457 | else if (ch >= 'A' && ch <= 'F') | |
458 | return ch - 'A' + 10; | |
459 | else if (ch >= 'a' && ch <= 'f') | |
460 | return ch - 'a' + 10; | |
461 | else if (ch == ' ' && ignore) | |
462 | ; | |
463 | else { | |
464 | expect_prompt(1); | |
465 | debuglogs (4, "Invalid hex digit from remote system. (0x%x)", ch); | |
466 | error("Invalid hex digit from remote system. (0x%x)", ch); | |
467 | } | |
468 | } | |
469 | } | |
470 | ||
471 | /* get_hex_byte -- Get a byte from monitor and put it in *BYT. | |
472 | * Accept any number leading spaces. | |
473 | */ | |
474 | static void | |
475 | get_hex_byte (byt) | |
476 | char *byt; | |
477 | { | |
478 | int val; | |
479 | ||
480 | val = get_hex_digit (1) << 4; | |
481 | debuglogs (4, "get_hex_byte() -- Read first nibble 0x%x", val); | |
482 | ||
483 | val |= get_hex_digit (0); | |
484 | debuglogs (4, "get_hex_byte() -- Read second nibble 0x%x", val); | |
485 | *byt = val; | |
486 | ||
487 | debuglogs (4, "get_hex_byte() -- Read a 0x%x", val); | |
488 | } | |
489 | ||
490 | /* | |
491 | * get_hex_word -- Get N 32-bit words from remote, each preceded by a space, | |
492 | * and put them in registers starting at REGNO. | |
493 | */ | |
494 | static int | |
495 | get_hex_word () | |
496 | { | |
497 | long val, newval; | |
498 | int i; | |
499 | ||
500 | val = 0; | |
501 | ||
502 | #if 0 | |
503 | if (HOST_BYTE_ORDER == BIG_ENDIAN) { | |
504 | #endif | |
505 | for (i = 0; i < 8; i++) | |
506 | val = (val << 4) + get_hex_digit (i == 0); | |
507 | #if 0 | |
508 | } else { | |
509 | for (i = 7; i >= 0; i--) | |
510 | val = (val << 4) + get_hex_digit (i == 0); | |
511 | } | |
512 | #endif | |
513 | ||
514 | debuglogs (4, "get_hex_word() got a 0x%x for a %s host.", val, (HOST_BYTE_ORDER == BIG_ENDIAN) ? "big endian" : "little endian"); | |
515 | ||
516 | return val; | |
517 | } | |
518 | ||
519 | /* This is called not only when we first attach, but also when the | |
520 | user types "run" after having attached. */ | |
521 | static void | |
522 | array_create_inferior (execfile, args, env) | |
523 | char *execfile; | |
524 | char *args; | |
525 | char **env; | |
526 | { | |
527 | int entry_pt; | |
528 | ||
529 | if (args && *args) | |
530 | error("Can't pass arguments to remote MONITOR process"); | |
531 | ||
532 | if (execfile == 0 || exec_bfd == 0) | |
b8464c15 | 533 | error("No executable file specified"); |
3e437fe6 RS |
534 | |
535 | entry_pt = (int) bfd_get_start_address (exec_bfd); | |
536 | ||
537 | /* The "process" (board) is already stopped awaiting our commands, and | |
538 | the program is already downloaded. We just set its PC and go. */ | |
539 | ||
540 | clear_proceed_status (); | |
541 | ||
542 | /* Tell wait_for_inferior that we've started a new process. */ | |
543 | init_wait_for_inferior (); | |
544 | ||
545 | /* Set up the "saved terminal modes" of the inferior | |
546 | based on what modes we are starting it with. */ | |
547 | target_terminal_init (); | |
548 | ||
549 | /* Install inferior's terminal modes. */ | |
550 | target_terminal_inferior (); | |
551 | ||
552 | /* insert_step_breakpoint (); FIXME, do we need this? */ | |
553 | ||
554 | /* Let 'er rip... */ | |
555 | proceed ((CORE_ADDR)entry_pt, TARGET_SIGNAL_DEFAULT, 0); | |
556 | } | |
557 | ||
558 | /* | |
559 | * array_open -- open a connection to a remote debugger. | |
560 | * NAME is the filename used for communication. | |
561 | */ | |
7bb5e831 | 562 | static int baudrate = 9600; |
3e437fe6 RS |
563 | static char dev_name[100]; |
564 | ||
565 | static void | |
566 | array_open(args, name, from_tty) | |
567 | char *args; | |
568 | char *name; | |
569 | int from_tty; | |
570 | { | |
571 | char packet[PBUFSIZ]; | |
572 | ||
573 | if (args == NULL) | |
574 | error ("Use `target %s DEVICE-NAME' to use a serial port, or \n\ | |
575 | `target %s HOST-NAME:PORT-NUMBER' to use a network connection.", name, name); | |
576 | ||
577 | /* if (is_open) */ | |
578 | array_close(0); | |
579 | ||
b284227c RS |
580 | target_preopen (from_tty); |
581 | unpush_target (&array_ops); | |
582 | ||
3e437fe6 RS |
583 | tmp_mips_processor_type = "lsi33k"; /* change the default from r3051 */ |
584 | mips_set_processor_type_command ("lsi33k", 0); | |
585 | ||
586 | strcpy(dev_name, args); | |
587 | array_desc = SERIAL_OPEN(dev_name); | |
588 | ||
589 | if (array_desc == NULL) | |
590 | perror_with_name(dev_name); | |
591 | ||
592 | if (baud_rate != -1) { | |
593 | if (SERIAL_SETBAUDRATE (array_desc, baud_rate)) { | |
594 | SERIAL_CLOSE (array_desc); | |
595 | perror_with_name (name); | |
596 | } | |
597 | } | |
598 | ||
599 | SERIAL_RAW(array_desc); | |
600 | ||
601 | #if defined (LOG_FILE) | |
602 | log_file = fopen (LOG_FILE, "w"); | |
603 | if (log_file == NULL) | |
604 | perror_with_name (LOG_FILE); | |
605 | fprintf_filtered (log_file, "GDB %s (%s", version); | |
606 | fprintf_filtered (log_file, " --target %s)\n", array_ops.to_shortname); | |
607 | fprintf_filtered (log_file, "Remote target %s connected to %s\n\n", array_ops.to_shortname, dev_name); | |
608 | #endif | |
609 | ||
610 | /* see if the target is alive. For a ROM monitor, we can just try to force the | |
611 | expect_prompt to print a few times. For the GDB remote protocol, the application | |
612 | being debugged is sitting at a breakpoint and waiting for GDB to initialize | |
613 | the connection. We force it to give us an empty packet to see if it's alive. | |
614 | */ | |
615 | debuglogs (3, "Trying to ACK the target's debug stub"); | |
616 | /* unless your are on the new hardware, the old board won't initialize | |
7bb5e831 | 617 | because the '@' doesn't flush output like it does on the new ROMS. |
3e437fe6 | 618 | */ |
7bb5e831 | 619 | printf_monitor ("@"); /* ask for the last signal */ |
b284227c RS |
620 | expect_prompt(1); /* See if we get a expect_prompt */ |
621 | #ifdef TEST_ARRAY /* skip packet for testing */ | |
3e437fe6 RS |
622 | make_gdb_packet (packet, "?"); /* ask for a bogus packet */ |
623 | if (array_send_packet (packet) == 0) | |
624 | error ("Couldn't transmit packet\n"); | |
7bb5e831 | 625 | printf_monitor ("@\n"); /* force it to flush stdout */ |
3e437fe6 | 626 | expect_prompt(1); /* See if we get a expect_prompt */ |
b284227c RS |
627 | #endif |
628 | push_target (&array_ops); | |
3e437fe6 RS |
629 | if (from_tty) |
630 | printf("Remote target %s connected to %s\n", array_ops.to_shortname, dev_name); | |
631 | } | |
632 | ||
633 | /* | |
634 | * array_close -- Close out all files and local state before this | |
635 | * target loses control. | |
636 | */ | |
637 | ||
638 | static void | |
639 | array_close (quitting) | |
640 | int quitting; | |
641 | { | |
642 | SERIAL_CLOSE(array_desc); | |
643 | array_desc = NULL; | |
644 | ||
645 | debuglogs (1, "array_close (quitting=%d)", quitting); | |
646 | ||
647 | #if defined (LOG_FILE) | |
648 | if (log_file) { | |
649 | if (ferror(log_file)) | |
650 | printf_filtered ("Error writing log file.\n"); | |
651 | if (fclose(log_file) != 0) | |
652 | printf_filtered ("Error closing log file.\n"); | |
653 | } | |
654 | #endif | |
655 | } | |
656 | ||
657 | /* | |
658 | * array_detach -- terminate the open connection to the remote | |
659 | * debugger. Use this when you want to detach and do something | |
660 | * else with your gdb. | |
661 | */ | |
662 | static void | |
663 | array_detach (from_tty) | |
664 | int from_tty; | |
665 | { | |
666 | ||
667 | debuglogs (1, "array_detach ()"); | |
668 | ||
669 | pop_target(); /* calls array_close to do the real work */ | |
670 | if (from_tty) | |
671 | printf ("Ending remote %s debugging\n", target_shortname); | |
672 | } | |
673 | ||
674 | /* | |
675 | * array_attach -- attach GDB to the target. | |
676 | */ | |
677 | static void | |
678 | array_attach (args, from_tty) | |
679 | char *args; | |
680 | int from_tty; | |
681 | { | |
682 | if (from_tty) | |
683 | printf ("Starting remote %s debugging\n", target_shortname); | |
684 | ||
685 | debuglogs (1, "array_attach (args=%s)", args); | |
686 | ||
687 | printf_monitor ("go %x\n"); | |
688 | /* swallow the echo. */ | |
689 | expect ("go %x\n", 1); | |
690 | } | |
691 | ||
692 | /* | |
693 | * array_resume -- Tell the remote machine to resume. | |
694 | */ | |
695 | static void | |
696 | array_resume (pid, step, sig) | |
697 | int pid, step; | |
698 | enum target_signal sig; | |
699 | { | |
700 | debuglogs (1, "array_resume (step=%d, sig=%d)", step, sig); | |
701 | ||
702 | if (step) { | |
703 | printf_monitor ("s\n"); | |
704 | } else { | |
f9ac2066 | 705 | printf_monitor ("go\n"); |
3e437fe6 RS |
706 | } |
707 | } | |
708 | ||
b284227c RS |
709 | #define TMPBUFSIZ 5 |
710 | ||
3e437fe6 RS |
711 | /* |
712 | * array_wait -- Wait until the remote machine stops, then return, | |
713 | * storing status in status just as `wait' would. | |
714 | */ | |
715 | static int | |
716 | array_wait (pid, status) | |
717 | int pid; | |
718 | struct target_waitstatus *status; | |
719 | { | |
720 | int old_timeout = timeout; | |
b284227c RS |
721 | int result, i; |
722 | char c; | |
723 | serial_t tty_desc; | |
724 | serial_ttystate ttystate; | |
3e437fe6 RS |
725 | |
726 | debuglogs(1, "array_wait (), printing extraneous text."); | |
727 | ||
728 | status->kind = TARGET_WAITKIND_EXITED; | |
729 | status->value.integer = 0; | |
730 | ||
731 | timeout = 0; /* Don't time out -- user program is running. */ | |
b284227c | 732 | |
9e77e83d | 733 | #if !defined(__GO32__) && !defined(__MSDOS__) && !defined(_WIN32) |
b284227c RS |
734 | tty_desc = SERIAL_FDOPEN (0); |
735 | ttystate = SERIAL_GET_TTY_STATE (tty_desc); | |
736 | SERIAL_RAW (tty_desc); | |
3e437fe6 | 737 | |
b284227c RS |
738 | i = 0; |
739 | /* poll on the serial port and the keyboard. */ | |
740 | while (1) { | |
741 | c = readchar(timeout); | |
742 | if (c > 0) { | |
743 | if (c == *(ARRAY_PROMPT + i)) { | |
744 | if (++i >= strlen (ARRAY_PROMPT)) { /* matched the prompt */ | |
745 | debuglogs (4, "array_wait(), got the expect_prompt."); | |
746 | break; | |
747 | } | |
748 | } else { /* not the prompt */ | |
749 | i = 0; | |
750 | } | |
751 | fputc_unfiltered (c, gdb_stdout); | |
752 | fflush (stdout); | |
753 | } | |
754 | c = SERIAL_READCHAR(tty_desc, timeout); | |
755 | if (c > 0) { | |
756 | SERIAL_WRITE(array_desc, &c, 1); | |
757 | /* do this so it looks like there's keyboard echo */ | |
758 | if (c == 3) /* exit on Control-C */ | |
759 | break; | |
e8f1ad9a | 760 | #if 0 |
b284227c RS |
761 | fputc_unfiltered (c, gdb_stdout); |
762 | fflush (stdout); | |
e8f1ad9a | 763 | #endif |
b284227c RS |
764 | } |
765 | } | |
766 | SERIAL_SET_TTY_STATE (tty_desc, ttystate); | |
767 | #else | |
768 | expect_prompt(1); | |
3e437fe6 | 769 | debuglogs (4, "array_wait(), got the expect_prompt."); |
b284227c | 770 | #endif |
3e437fe6 RS |
771 | |
772 | status->kind = TARGET_WAITKIND_STOPPED; | |
773 | status->value.sig = TARGET_SIGNAL_TRAP; | |
774 | ||
3e437fe6 RS |
775 | timeout = old_timeout; |
776 | ||
777 | return 0; | |
778 | } | |
779 | ||
780 | /* | |
781 | * array_fetch_registers -- read the remote registers into the | |
782 | * block regs. | |
783 | */ | |
784 | static void | |
785 | array_fetch_registers (ignored) | |
786 | int ignored; | |
787 | { | |
788 | int regno, i; | |
789 | char *p; | |
790 | unsigned char packet[PBUFSIZ]; | |
791 | char regs[REGISTER_BYTES]; | |
792 | ||
793 | debuglogs (1, "array_fetch_registers (ignored=%d)\n", ignored); | |
794 | ||
795 | memset (packet, 0, PBUFSIZ); | |
796 | /* Unimplemented registers read as all bits zero. */ | |
797 | memset (regs, 0, REGISTER_BYTES); | |
798 | make_gdb_packet (packet, "g"); | |
799 | if (array_send_packet (packet) == 0) | |
800 | error ("Couldn't transmit packet\n"); | |
801 | if (array_get_packet (packet) == 0) | |
802 | error ("Couldn't receive packet\n"); | |
803 | /* FIXME: read bytes from packet */ | |
804 | debuglogs (4, "array_fetch_registers: Got a \"%s\" back\n", packet); | |
805 | for (regno = 0; regno <= PC_REGNUM+4; regno++) { | |
806 | /* supply register stores in target byte order, so swap here */ | |
807 | /* FIXME: convert from ASCII hex to raw bytes */ | |
808 | i = ascii2hexword (packet + (regno * 8)); | |
809 | debuglogs (5, "Adding register %d = %x\n", regno, i); | |
810 | SWAP_TARGET_AND_HOST (&i, 4); | |
811 | supply_register (regno, (char *)&i); | |
812 | } | |
813 | } | |
814 | ||
815 | /* | |
816 | * This is unused by targets like this one that use a | |
817 | * protocol based on GDB's remote protocol. | |
818 | */ | |
819 | static void | |
820 | array_fetch_register (ignored) | |
821 | int ignored; | |
822 | { | |
823 | array_fetch_registers (); | |
824 | } | |
825 | ||
826 | /* | |
827 | * Get all the registers from the targets. They come back in a large array. | |
828 | */ | |
829 | static void | |
830 | array_store_registers (ignored) | |
831 | int ignored; | |
832 | { | |
833 | int regno; | |
834 | unsigned long i; | |
835 | char packet[PBUFSIZ]; | |
836 | char buf[PBUFSIZ]; | |
837 | char num[9]; | |
838 | ||
839 | debuglogs (1, "array_store_registers()"); | |
840 | ||
841 | memset (packet, 0, PBUFSIZ); | |
842 | memset (buf, 0, PBUFSIZ); | |
843 | buf[0] = 'G'; | |
844 | ||
845 | /* Unimplemented registers read as all bits zero. */ | |
846 | /* FIXME: read bytes from packet */ | |
847 | for (regno = 0; regno < 41; regno++) { /* FIXME */ | |
848 | /* supply register stores in target byte order, so swap here */ | |
849 | /* FIXME: convert from ASCII hex to raw bytes */ | |
850 | i = (unsigned long)read_register (regno); | |
851 | hexword2ascii (num, i); | |
852 | strcpy (buf+(regno * 8)+1, num); | |
853 | } | |
854 | *(buf + (regno * 8) + 2) = 0; | |
855 | make_gdb_packet (packet, buf); | |
856 | if (array_send_packet (packet) == 0) | |
857 | error ("Couldn't transmit packet\n"); | |
858 | if (array_get_packet (packet) == 0) | |
859 | error ("Couldn't receive packet\n"); | |
860 | ||
861 | registers_changed (); | |
862 | } | |
863 | ||
864 | /* | |
865 | * This is unused by targets like this one that use a | |
866 | * protocol based on GDB's remote protocol. | |
867 | */ | |
868 | static void | |
869 | array_store_register (ignored) | |
870 | int ignored; | |
871 | { | |
872 | array_store_registers (); | |
873 | } | |
874 | ||
875 | /* Get ready to modify the registers array. On machines which store | |
876 | individual registers, this doesn't need to do anything. On machines | |
877 | which store all the registers in one fell swoop, this makes sure | |
878 | that registers contains all the registers from the program being | |
879 | debugged. */ | |
880 | ||
881 | static void | |
882 | array_prepare_to_store () | |
883 | { | |
884 | /* Do nothing, since we can store individual regs */ | |
885 | } | |
886 | ||
887 | static void | |
888 | array_files_info () | |
889 | { | |
890 | printf ("\tAttached to %s at %d baud.\n", | |
7bb5e831 | 891 | dev_name, baudrate); |
3e437fe6 RS |
892 | } |
893 | ||
894 | /* | |
895 | * array_write_inferior_memory -- Copy LEN bytes of data from debugger | |
896 | * memory at MYADDR to inferior's memory at MEMADDR. Returns length moved. | |
897 | */ | |
898 | static int | |
899 | array_write_inferior_memory (memaddr, myaddr, len) | |
900 | CORE_ADDR memaddr; | |
901 | unsigned char *myaddr; | |
902 | int len; | |
903 | { | |
904 | unsigned long i; | |
905 | int j; | |
906 | char packet[PBUFSIZ]; | |
907 | char buf[PBUFSIZ]; | |
908 | char num[9]; | |
909 | char *p; | |
910 | ||
911 | debuglogs (1, "array_write_inferior_memory (memaddr=0x%x, myaddr=0x%x, len=%d)", memaddr, myaddr, len); | |
912 | memset (buf, '\0', PBUFSIZ); /* this also sets the string terminator */ | |
913 | p = buf; | |
914 | ||
915 | *p++ = 'M'; /* The command to write memory */ | |
916 | hexword2ascii (num, memaddr); /* convert the address */ | |
917 | strcpy (p, num); /* copy the address */ | |
918 | p += 8; | |
919 | *p++ = ','; /* add comma delimeter */ | |
920 | hexword2ascii (num, len); /* Get the length as a 4 digit number */ | |
921 | *p++ = num[4]; | |
922 | *p++ = num[5]; | |
923 | *p++ = num[6]; | |
924 | *p++ = num[7]; | |
925 | *p++ = ':'; /* add the colon delimeter */ | |
926 | for (j = 0; j < len; j++) { /* copy the data in after converting it */ | |
927 | *p++ = tohex ((myaddr[j] >> 4) & 0xf); | |
928 | *p++ = tohex (myaddr[j] & 0xf); | |
929 | } | |
930 | ||
931 | make_gdb_packet (packet, buf); | |
932 | if (array_send_packet (packet) == 0) | |
933 | error ("Couldn't transmit packet\n"); | |
934 | if (array_get_packet (packet) == 0) | |
935 | error ("Couldn't receive packet\n"); | |
936 | ||
937 | return len; | |
938 | } | |
939 | ||
940 | /* | |
941 | * array_read_inferior_memory -- read LEN bytes from inferior memory | |
942 | * at MEMADDR. Put the result at debugger address MYADDR. Returns | |
943 | * length moved. | |
944 | */ | |
945 | static int | |
946 | array_read_inferior_memory(memaddr, myaddr, len) | |
947 | CORE_ADDR memaddr; | |
948 | char *myaddr; | |
949 | int len; | |
950 | { | |
e8f1ad9a | 951 | int j; |
3e437fe6 RS |
952 | char buf[20]; |
953 | char packet[PBUFSIZ]; | |
e8f1ad9a FF |
954 | int count; /* Number of bytes read so far. */ |
955 | unsigned long startaddr; /* Starting address of this pass. */ | |
956 | int len_this_pass; /* Number of bytes to read in this pass. */ | |
3e437fe6 RS |
957 | |
958 | debuglogs (1, "array_read_inferior_memory (memaddr=0x%x, myaddr=0x%x, len=%d)", memaddr, myaddr, len); | |
959 | ||
960 | /* Note that this code works correctly if startaddr is just less | |
961 | than UINT_MAX (well, really CORE_ADDR_MAX if there was such a | |
962 | thing). That is, something like | |
963 | array_read_bytes (CORE_ADDR_MAX - 4, foo, 4) | |
964 | works--it never adds len To memaddr and gets 0. */ | |
965 | /* However, something like | |
966 | array_read_bytes (CORE_ADDR_MAX - 3, foo, 4) | |
967 | doesn't need to work. Detect it and give up if there's an attempt | |
968 | to do that. */ | |
969 | if (((memaddr - 1) + len) < memaddr) { | |
970 | errno = EIO; | |
971 | return 0; | |
972 | } | |
973 | ||
e8f1ad9a FF |
974 | for (count = 0, startaddr = memaddr; count < len; startaddr += len_this_pass) |
975 | { | |
976 | /* Try to align to 16 byte boundry (why?) */ | |
977 | len_this_pass = 16; | |
978 | if ((startaddr % 16) != 0) | |
979 | { | |
980 | len_this_pass -= startaddr % 16; | |
981 | } | |
982 | /* Only transfer bytes we need */ | |
983 | if (len_this_pass > (len - count)) | |
984 | { | |
985 | len_this_pass = (len - count); | |
986 | } | |
987 | /* Fetch the bytes */ | |
988 | debuglogs (3, "read %d bytes from inferior address %x", len_this_pass, | |
989 | startaddr); | |
3e437fe6 RS |
990 | sprintf (buf, "m%08x,%04x", startaddr, len_this_pass); |
991 | make_gdb_packet (packet, buf); | |
992 | if (array_send_packet (packet) == 0) | |
e8f1ad9a FF |
993 | { |
994 | error ("Couldn't transmit packet\n"); | |
995 | } | |
3e437fe6 | 996 | if (array_get_packet (packet) == 0) |
e8f1ad9a FF |
997 | { |
998 | error ("Couldn't receive packet\n"); | |
999 | } | |
3e437fe6 | 1000 | if (*packet == 0) |
e8f1ad9a FF |
1001 | { |
1002 | error ("Got no data in the GDB packet\n"); | |
1003 | } | |
1004 | /* Pick packet apart and xfer bytes to myaddr */ | |
1005 | debuglogs (4, "array_read_inferior_memory: Got a \"%s\" back\n", packet); | |
1006 | for (j = 0; j < len_this_pass ; j++) | |
1007 | { | |
1008 | /* extract the byte values */ | |
1009 | myaddr[count++] = from_hex (*(packet+(j*2))) * 16 + from_hex (*(packet+(j*2)+1)); | |
1010 | debuglogs (5, "myaddr[%d] set to %x\n", count-1, myaddr[count-1]); | |
1011 | } | |
3e437fe6 | 1012 | } |
e8f1ad9a | 1013 | return (count); |
3e437fe6 RS |
1014 | } |
1015 | ||
1016 | /* FIXME-someday! merge these two. */ | |
1017 | static int | |
1018 | array_xfer_memory (memaddr, myaddr, len, write, target) | |
1019 | CORE_ADDR memaddr; | |
1020 | char *myaddr; | |
1021 | int len; | |
1022 | int write; | |
1023 | struct target_ops *target; /* ignored */ | |
1024 | { | |
1025 | if (write) | |
1026 | return array_write_inferior_memory (memaddr, myaddr, len); | |
1027 | else | |
1028 | return array_read_inferior_memory (memaddr, myaddr, len); | |
1029 | } | |
1030 | ||
1031 | static void | |
1032 | array_kill (args, from_tty) | |
1033 | char *args; | |
1034 | int from_tty; | |
1035 | { | |
1036 | return; /* ignore attempts to kill target system */ | |
1037 | } | |
1038 | ||
1039 | /* Clean up when a program exits. | |
1040 | The program actually lives on in the remote processor's RAM, and may be | |
1041 | run again without a download. Don't leave it full of breakpoint | |
1042 | instructions. */ | |
1043 | ||
1044 | static void | |
1045 | array_mourn_inferior () | |
1046 | { | |
1047 | remove_breakpoints (); | |
1048 | generic_mourn_inferior (); /* Do all the proper things now */ | |
1049 | } | |
1050 | ||
1051 | #define MAX_ARRAY_BREAKPOINTS 16 | |
1052 | ||
1053 | extern int memory_breakpoint_size; | |
1054 | static CORE_ADDR breakaddr[MAX_ARRAY_BREAKPOINTS] = {0}; | |
1055 | ||
1056 | /* | |
1057 | * array_insert_breakpoint -- add a breakpoint | |
1058 | */ | |
1059 | static int | |
1060 | array_insert_breakpoint (addr, shadow) | |
1061 | CORE_ADDR addr; | |
1062 | char *shadow; | |
1063 | { | |
1064 | int i; | |
1065 | ||
1066 | debuglogs (1, "array_insert_breakpoint() addr = 0x%x", addr); | |
1067 | ||
1068 | for (i = 0; i <= MAX_ARRAY_BREAKPOINTS; i++) { | |
1069 | if (breakaddr[i] == 0) { | |
1070 | breakaddr[i] = addr; | |
1071 | if (sr_get_debug() > 4) | |
1072 | printf ("Breakpoint at %x\n", addr); | |
1073 | array_read_inferior_memory(addr, shadow, memory_breakpoint_size); | |
7bb5e831 RS |
1074 | printf_monitor("b 0x%x\n", addr); |
1075 | expect_prompt(1); | |
3e437fe6 RS |
1076 | return 0; |
1077 | } | |
1078 | } | |
1079 | ||
1080 | fprintf(stderr, "Too many breakpoints (> 16) for monitor\n"); | |
1081 | return 1; | |
1082 | } | |
1083 | ||
1084 | /* | |
1085 | * _remove_breakpoint -- Tell the monitor to remove a breakpoint | |
1086 | */ | |
1087 | static int | |
1088 | array_remove_breakpoint (addr, shadow) | |
1089 | CORE_ADDR addr; | |
1090 | char *shadow; | |
1091 | { | |
1092 | int i; | |
1093 | ||
1094 | debuglogs (1, "array_remove_breakpoint() addr = 0x%x", addr); | |
1095 | ||
1096 | for (i = 0; i < MAX_ARRAY_BREAKPOINTS; i++) { | |
1097 | if (breakaddr[i] == addr) { | |
1098 | breakaddr[i] = 0; | |
1099 | /* some monitors remove breakpoints based on the address */ | |
7bb5e831 RS |
1100 | printf_monitor("bd %x\n", i); |
1101 | expect_prompt(1); | |
3e437fe6 RS |
1102 | return 0; |
1103 | } | |
1104 | } | |
1105 | fprintf(stderr, "Can't find breakpoint associated with 0x%x\n", addr); | |
1106 | return 1; | |
1107 | } | |
1108 | ||
1109 | static void | |
1110 | array_stop () | |
1111 | { | |
1112 | debuglogs (1, "array_stop()"); | |
1113 | printf_monitor("\003"); | |
1114 | expect_prompt(1); | |
1115 | } | |
1116 | ||
1117 | /* | |
1118 | * array_command -- put a command string, in args, out to MONITOR. | |
1119 | * Output from MONITOR is placed on the users terminal until the | |
1120 | * expect_prompt is seen. FIXME | |
1121 | */ | |
1122 | static void | |
1123 | monitor_command (args, fromtty) | |
1124 | char *args; | |
1125 | int fromtty; | |
1126 | { | |
1127 | debuglogs (1, "monitor_command (args=%s)", args); | |
1128 | ||
1129 | if (array_desc == NULL) | |
1130 | error("monitor target not open."); | |
1131 | ||
1132 | if (!args) | |
1133 | error("Missing command."); | |
1134 | ||
1135 | printf_monitor ("%s\n", args); | |
1136 | expect_prompt(0); | |
1137 | } | |
1138 | ||
1139 | /* | |
1140 | * make_gdb_packet -- make a GDB packet. The data is always ASCII. | |
1141 | * A debug packet whose contents are <data> | |
1142 | * is encapsulated for transmission in the form: | |
1143 | * | |
1144 | * $ <data> # CSUM1 CSUM2 | |
1145 | * | |
1146 | * <data> must be ASCII alphanumeric and cannot include characters | |
1147 | * '$' or '#'. If <data> starts with two characters followed by | |
1148 | * ':', then the existing stubs interpret this as a sequence number. | |
1149 | * | |
1150 | * CSUM1 and CSUM2 are ascii hex representation of an 8-bit | |
1151 | * checksum of <data>, the most significant nibble is sent first. | |
1152 | * the hex digits 0-9,a-f are used. | |
1153 | * | |
1154 | */ | |
1155 | static void | |
1156 | make_gdb_packet (buf, data) | |
1157 | char *buf, *data; | |
1158 | { | |
1159 | int i; | |
1160 | unsigned char csum = 0; | |
1161 | int cnt; | |
1162 | char *p; | |
1163 | ||
1164 | debuglogs (3, "make_gdb_packet(%s)\n", data); | |
1165 | cnt = strlen (data); | |
1166 | if (cnt > PBUFSIZ) | |
1167 | error ("make_gdb_packet(): to much data\n"); | |
1168 | ||
1169 | /* start with the packet header */ | |
1170 | p = buf; | |
1171 | *p++ = '$'; | |
1172 | ||
1173 | /* calculate the checksum */ | |
1174 | for (i = 0; i < cnt; i++) { | |
1175 | csum += data[i]; | |
1176 | *p++ = data[i]; | |
1177 | } | |
1178 | ||
1179 | /* terminate the data with a '#' */ | |
1180 | *p++ = '#'; | |
1181 | ||
1182 | /* add the checksum as two ascii digits */ | |
1183 | *p++ = tohex ((csum >> 4) & 0xf); | |
1184 | *p++ = tohex (csum & 0xf); | |
1185 | *p = 0x0; /* Null terminator on string */ | |
1186 | } | |
1187 | ||
1188 | /* | |
1189 | * array_send_packet -- send a GDB packet to the target with error handling. We | |
1190 | * get a '+' (ACK) back if the packet is received and the checksum | |
1191 | * matches. Otherwise a '-' (NAK) is returned. It returns a 1 for a | |
1192 | * successful transmition, or a 0 for a failure. | |
1193 | */ | |
1194 | static int | |
1195 | array_send_packet (packet) | |
1196 | char *packet; | |
1197 | { | |
1198 | int c, retries, i; | |
1199 | char junk[PBUFSIZ]; | |
1200 | ||
1201 | retries = 0; | |
1202 | ||
1203 | #if 0 | |
1204 | /* scan the packet to make sure it only contains valid characters. | |
1205 | this may sound silly, but sometimes a garbled packet will hang | |
1206 | the target board. We scan the whole thing, then print the error | |
1207 | message. | |
1208 | */ | |
1209 | for (i = 0; i < strlen(packet); i++) { | |
1210 | debuglogs (5, "array_send_packet(): Scanning \'%c\'\n", packet[i]); | |
1211 | /* legit hex numbers or command */ | |
1212 | if ((isxdigit(packet[i])) || (isalpha(packet[i]))) | |
1213 | continue; | |
1214 | switch (packet[i]) { | |
1215 | case '+': /* ACK */ | |
1216 | case '-': /* NAK */ | |
1217 | case '#': /* end of packet */ | |
1218 | case '$': /* start of packet */ | |
1219 | continue; | |
1220 | default: /* bogus character */ | |
1221 | retries++; | |
1222 | debuglogs (4, "array_send_packet(): Found a non-ascii digit \'%c\' in the packet.\n", packet[i]); | |
1223 | } | |
1224 | } | |
1225 | #endif | |
1226 | ||
1227 | if (retries > 0) | |
1228 | error ("Can't send packet, found %d non-ascii characters", retries); | |
1229 | ||
1230 | /* ok, try to send the packet */ | |
1231 | retries = 0; | |
1232 | while (retries++ <= 10) { | |
1233 | printf_monitor ("%s", packet); | |
1234 | ||
1235 | /* read until either a timeout occurs (-2) or '+' is read */ | |
1236 | while (retries <= 10) { | |
1237 | c = readchar (-timeout); | |
1238 | debuglogs (3, "Reading a GDB protocol packet... Got a '%c'\n", c); | |
1239 | switch (c) { | |
1240 | case '+': | |
1241 | debuglogs (3, "Got Ack\n"); | |
1242 | return 1; | |
1243 | case SERIAL_TIMEOUT: | |
1244 | debuglogs (3, "Timed out reading serial port\n"); | |
7bb5e831 | 1245 | printf_monitor("@"); /* resync with the monitor */ |
3e437fe6 RS |
1246 | expect_prompt(1); /* See if we get a expect_prompt */ |
1247 | break; /* Retransmit buffer */ | |
1248 | case '-': | |
1249 | debuglogs (3, "Got NAK\n"); | |
7bb5e831 | 1250 | printf_monitor("@"); /* resync with the monitor */ |
3e437fe6 RS |
1251 | expect_prompt(1); /* See if we get a expect_prompt */ |
1252 | break; | |
1253 | case '$': | |
1254 | /* it's probably an old response, or the echo of our command. | |
1255 | * just gobble up the packet and ignore it. | |
1256 | */ | |
1257 | debuglogs (3, "Got a junk packet\n"); | |
1258 | i = 0; | |
1259 | do { | |
1260 | c = readchar (timeout); | |
1261 | junk[i++] = c; | |
1262 | } while (c != '#'); | |
1263 | c = readchar (timeout); | |
1264 | junk[i++] = c; | |
1265 | c = readchar (timeout); | |
1266 | junk[i++] = c; | |
1267 | junk[i++] = '\0'; | |
1268 | debuglogs (3, "Reading a junk packet, got a \"%s\"\n", junk); | |
1269 | continue; /* Now, go look for next packet */ | |
1270 | default: | |
1271 | continue; | |
1272 | } | |
1273 | retries++; | |
1274 | debuglogs (3, "Retransmitting packet \"%s\"\n", packet); | |
1275 | break; /* Here to retransmit */ | |
1276 | } | |
1277 | } /* outer while */ | |
1278 | return 0; | |
1279 | } | |
1280 | ||
1281 | /* | |
1282 | * array_get_packet -- get a GDB packet from the target. Basically we read till we | |
1283 | * see a '#', then check the checksum. It returns a 1 if it's gotten a | |
1284 | * packet, or a 0 it the packet wasn't transmitted correctly. | |
1285 | */ | |
1286 | static int | |
1287 | array_get_packet (packet) | |
1288 | char *packet; | |
1289 | { | |
1290 | int c; | |
1291 | int retries; | |
1292 | unsigned char csum; | |
1293 | unsigned char pktcsum; | |
1294 | char *bp; | |
1295 | ||
1296 | csum = 0; | |
1297 | bp = packet; | |
1298 | ||
1299 | memset (packet, 1, PBUFSIZ); | |
1300 | retries = 0; | |
1301 | while (retries <= 10) { | |
1302 | do { | |
1303 | c = readchar (timeout); | |
1304 | if (c == SERIAL_TIMEOUT) { | |
1305 | debuglogs (3, "array_get_packet: got time out from serial port.\n"); | |
1306 | } | |
1307 | debuglogs (3, "Waiting for a '$', got a %c\n", c); | |
1308 | } while (c != '$'); | |
1309 | ||
1310 | retries = 0; | |
1311 | while (retries <= 10) { | |
1312 | c = readchar (timeout); | |
1313 | debuglogs (3, "array_get_packet: got a '%c'\n", c); | |
1314 | switch (c) { | |
1315 | case SERIAL_TIMEOUT: | |
1316 | debuglogs (3, "Timeout in mid-packet, retrying\n"); | |
1317 | return 0; | |
1318 | case '$': | |
1319 | debuglogs (3, "Saw new packet start in middle of old one\n"); | |
1320 | return 0; /* Start a new packet, count retries */ | |
1321 | case '#': | |
1322 | *bp = '\0'; | |
1323 | pktcsum = from_hex (readchar (timeout)) << 4; | |
1324 | pktcsum |= from_hex (readchar (timeout)); | |
1325 | if (csum == 0) | |
1326 | debuglogs (3, "\nGDB packet checksum zero, must be a bogus packet\n"); | |
1327 | if (csum == pktcsum) { | |
1328 | debuglogs (3, "\nGDB packet checksum correct, packet data is \"%s\",\n", packet); | |
7bb5e831 | 1329 | printf_monitor ("@"); |
3e437fe6 RS |
1330 | expect_prompt (1); |
1331 | return 1; | |
1332 | } | |
1333 | debuglogs (3, "Bad checksum, sentsum=0x%x, csum=0x%x\n", pktcsum, csum); | |
1334 | return 0; | |
1335 | case '*': /* Run length encoding */ | |
1336 | debuglogs (5, "Run length encoding in packet\n"); | |
1337 | csum += c; | |
1338 | c = readchar (timeout); | |
1339 | csum += c; | |
1340 | c = c - ' ' + 3; /* Compute repeat count */ | |
1341 | ||
1342 | if (c > 0 && c < 255 && bp + c - 1 < packet + PBUFSIZ - 1) { | |
1343 | memset (bp, *(bp - 1), c); | |
1344 | bp += c; | |
1345 | continue; | |
1346 | } | |
1347 | *bp = '\0'; | |
1348 | printf_filtered ("Repeat count %d too large for buffer.\n", c); | |
1349 | return 0; | |
1350 | ||
1351 | default: | |
1352 | if ((!isxdigit(c)) && (!ispunct(c))) | |
1353 | debuglogs (4, "Got a non-ascii digit \'%c\'.\\n", c); | |
1354 | if (bp < packet + PBUFSIZ - 1) { | |
1355 | *bp++ = c; | |
1356 | csum += c; | |
1357 | continue; | |
1358 | } | |
1359 | ||
1360 | *bp = '\0'; | |
1361 | puts_filtered ("Remote packet too long.\n"); | |
1362 | return 0; | |
1363 | } | |
1364 | } | |
1365 | } | |
1366 | } | |
1367 | ||
1368 | /* | |
1369 | * ascii2hexword -- convert an ascii number represented by 8 digits to a hex value. | |
1370 | */ | |
1371 | static unsigned long | |
1372 | ascii2hexword (mem) | |
1373 | unsigned char *mem; | |
1374 | { | |
1375 | unsigned long val; | |
1376 | int i; | |
1377 | char buf[9]; | |
1378 | ||
1379 | val = 0; | |
1380 | for (i = 0; i < 8; i++) { | |
1381 | val <<= 4; | |
1382 | if (mem[i] >= 'A' && mem[i] <= 'F') | |
1383 | val = val + mem[i] - 'A' + 10; | |
1384 | if (mem[i] >= 'a' && mem[i] <= 'f') | |
1385 | val = val + mem[i] - 'a' + 10; | |
1386 | if (mem[i] >= '0' && mem[i] <= '9') | |
1387 | val = val + mem[i] - '0'; | |
1388 | buf[i] = mem[i]; | |
1389 | } | |
1390 | buf[8] = '\0'; | |
1391 | debuglogs (4, "ascii2hexword() got a 0x%x from %s(%x).\n", val, buf, mem); | |
1392 | return val; | |
1393 | } | |
1394 | ||
1395 | /* | |
1396 | * ascii2hexword -- convert a hex value to an ascii number represented by 8 | |
1397 | * digits. | |
1398 | */ | |
1399 | static char* | |
1400 | hexword2ascii (mem, num) | |
1401 | unsigned char *mem; | |
1402 | unsigned long num; | |
1403 | { | |
1404 | int i; | |
1405 | unsigned char ch; | |
1406 | ||
1407 | debuglogs (4, "hexword2ascii() converting %x ", num); | |
1408 | for (i = 7; i >= 0; i--) { | |
1409 | mem[i] = tohex ((num >> 4) & 0xf); | |
1410 | mem[i] = tohex (num & 0xf); | |
1411 | num = num >> 4; | |
1412 | } | |
1413 | mem[8] = '\0'; | |
1414 | debuglogs (4, "\tto a %s", mem); | |
1415 | } | |
1416 | ||
1417 | /* Convert hex digit A to a number. */ | |
1418 | static int | |
1419 | from_hex (a) | |
1420 | int a; | |
1421 | { | |
1422 | if (a == 0) | |
1423 | return 0; | |
1424 | ||
1425 | debuglogs (4, "from_hex got a 0x%x(%c)\n",a,a); | |
1426 | if (a >= '0' && a <= '9') | |
1427 | return a - '0'; | |
1428 | if (a >= 'a' && a <= 'f') | |
1429 | return a - 'a' + 10; | |
1430 | if (a >= 'A' && a <= 'F') | |
1431 | return a - 'A' + 10; | |
1432 | else { | |
1433 | error ("Reply contains invalid hex digit 0x%x", a); | |
1434 | } | |
1435 | } | |
1436 | ||
1437 | /* Convert number NIB to a hex digit. */ | |
1438 | static int | |
1439 | tohex (nib) | |
1440 | int nib; | |
1441 | { | |
1442 | if (nib < 10) | |
1443 | return '0'+nib; | |
1444 | else | |
1445 | return 'a'+nib-10; | |
1446 | } | |
1447 | ||
1448 | /* | |
1449 | * _initialize_remote_monitors -- setup a few addtitional commands that | |
1450 | * are usually only used by monitors. | |
1451 | */ | |
1452 | void | |
1453 | _initialize_remote_monitors () | |
1454 | { | |
1455 | /* generic monitor command */ | |
1456 | add_com ("monitor", class_obscure, monitor_command, | |
1457 | "Send a command to the debug monitor."); | |
1458 | ||
1459 | } | |
1460 | ||
1461 | /* | |
1462 | * _initialize_array -- do any special init stuff for the target. | |
1463 | */ | |
1464 | void | |
1465 | _initialize_array () | |
1466 | { | |
c719b714 | 1467 | init_array_ops() ; |
3e437fe6 | 1468 | add_target (&array_ops); |
3e437fe6 | 1469 | } |