Copy comments from gdbarch.sh to gdbarch.h. Fix a number of K&R params.
[deliverable/binutils-gdb.git] / gdb / i386-stub.c
CommitLineData
c906108c
SS
1/****************************************************************************
2
3 THIS SOFTWARE IS NOT COPYRIGHTED
4
5 HP offers the following for use in the public domain. HP makes no
6 warranty with regard to the software or it's performance and the
7 user accepts the software "AS IS" with all faults.
8
9 HP DISCLAIMS ANY WARRANTIES, EXPRESS OR IMPLIED, WITH REGARD
10 TO THIS SOFTWARE INCLUDING BUT NOT LIMITED TO THE WARRANTIES
11 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
12
13****************************************************************************/
14
15/****************************************************************************
16 * Header: remcom.c,v 1.34 91/03/09 12:29:49 glenne Exp $
17 *
18 * Module name: remcom.c $
19 * Revision: 1.34 $
20 * Date: 91/03/09 12:29:49 $
21 * Contributor: Lake Stevens Instrument Division$
22 *
23 * Description: low level support for gdb debugger. $
24 *
25 * Considerations: only works on target hardware $
26 *
27 * Written by: Glenn Engel $
28 * ModuleState: Experimental $
29 *
30 * NOTES: See Below $
31 *
32 * Modified for 386 by Jim Kingdon, Cygnus Support.
33 *
34 * To enable debugger support, two things need to happen. One, a
35 * call to set_debug_traps() is necessary in order to allow any breakpoints
36 * or error conditions to be properly intercepted and reported to gdb.
37 * Two, a breakpoint needs to be generated to begin communication. This
38 * is most easily accomplished by a call to breakpoint(). Breakpoint()
39 * simulates a breakpoint by executing a trap #1.
40 *
41 * The external function exceptionHandler() is
42 * used to attach a specific handler to a specific 386 vector number.
43 * It should use the same privilege level it runs at. It should
44 * install it as an interrupt gate so that interrupts are masked
45 * while the handler runs.
c906108c
SS
46 *
47 * Because gdb will sometimes write to the stack area to execute function
48 * calls, this program cannot rely on using the supervisor stack so it
49 * uses it's own stack area reserved in the int array remcomStack.
50 *
51 *************
52 *
53 * The following gdb commands are supported:
54 *
55 * command function Return value
56 *
57 * g return the value of the CPU registers hex data or ENN
58 * G set the value of the CPU registers OK or ENN
59 *
60 * mAA..AA,LLLL Read LLLL bytes at address AA..AA hex data or ENN
61 * MAA..AA,LLLL: Write LLLL bytes at address AA.AA OK or ENN
62 *
63 * c Resume at current address SNN ( signal NN)
64 * cAA..AA Continue at address AA..AA SNN
65 *
66 * s Step one instruction SNN
67 * sAA..AA Step one instruction from AA..AA SNN
68 *
69 * k kill
70 *
71 * ? What was the last sigval ? SNN (signal NN)
72 *
73 * All commands and responses are sent with a packet which includes a
74 * checksum. A packet consists of
75 *
76 * $<packet info>#<checksum>.
77 *
78 * where
79 * <packet info> :: <characters representing the command or response>
80 * <checksum> :: < two hex digits computed as modulo 256 sum of <packetinfo>>
81 *
82 * When a packet is received, it is first acknowledged with either '+' or '-'.
83 * '+' indicates a successful transfer. '-' indicates a failed transfer.
84 *
85 * Example:
86 *
87 * Host: Reply:
88 * $m0,10#2a +$00010203040506070809101112131415#42
89 *
90 ****************************************************************************/
91
92#include <stdio.h>
93#include <string.h>
94
95/************************************************************************
96 *
97 * external low-level support routines
98 */
c906108c
SS
99
100extern void putDebugChar(); /* write a single character */
101extern int getDebugChar(); /* read and return a single char */
d4f3574e 102extern void exceptionHandler(); /* assign an exception handler */
c906108c
SS
103
104/************************************************************************/
105/* BUFMAX defines the maximum number of characters in inbound/outbound buffers*/
106/* at least NUMREGBYTES*2 are needed for register packets */
107#define BUFMAX 400
108
109static char initialized; /* boolean flag. != 0 means we've been initialized */
110
111int remote_debug;
112/* debug > 0 prints ill-formed commands in valid packets & checksum errors */
113
c906108c
SS
114static const char hexchars[]="0123456789abcdef";
115
116/* Number of registers. */
117#define NUMREGS 16
118
119/* Number of bytes of registers. */
120#define NUMREGBYTES (NUMREGS * 4)
121
122enum regnames {EAX, ECX, EDX, EBX, ESP, EBP, ESI, EDI,
123 PC /* also known as eip */,
124 PS /* also known as eflags */,
125 CS, SS, DS, ES, FS, GS};
126
127/*
128 * these should not be static cuz they can be used outside this module
129 */
130int registers[NUMREGS];
131
132#define STACKSIZE 10000
133int remcomStack[STACKSIZE/sizeof(int)];
134static int* stackPtr = &remcomStack[STACKSIZE/sizeof(int) - 1];
135
c906108c
SS
136/*************************** ASSEMBLY CODE MACROS *************************/
137/* */
138
139extern void
140return_to_prog ();
141
142/* Restore the program's registers (including the stack pointer, which
143 means we get the right stack and don't have to worry about popping our
144 return address and any stack frames and so on) and return. */
145asm(".text");
146asm(".globl _return_to_prog");
147asm("_return_to_prog:");
148asm(" movw _registers+44, %ss");
149asm(" movl _registers+16, %esp");
150asm(" movl _registers+4, %ecx");
151asm(" movl _registers+8, %edx");
152asm(" movl _registers+12, %ebx");
153asm(" movl _registers+20, %ebp");
154asm(" movl _registers+24, %esi");
155asm(" movl _registers+28, %edi");
156asm(" movw _registers+48, %ds");
157asm(" movw _registers+52, %es");
158asm(" movw _registers+56, %fs");
159asm(" movw _registers+60, %gs");
160asm(" movl _registers+36, %eax");
161asm(" pushl %eax"); /* saved eflags */
162asm(" movl _registers+40, %eax");
163asm(" pushl %eax"); /* saved cs */
164asm(" movl _registers+32, %eax");
165asm(" pushl %eax"); /* saved eip */
166asm(" movl _registers, %eax");
167/* use iret to restore pc and flags together so
168 that trace flag works right. */
169asm(" iret");
170
171#define BREAKPOINT() asm(" int $3");
172
173/* Put the error code here just in case the user cares. */
174int gdb_i386errcode;
175/* Likewise, the vector number here (since GDB only gets the signal
176 number through the usual means, and that's not very specific). */
177int gdb_i386vector = -1;
178
179/* GDB stores segment registers in 32-bit words (that's just the way
180 m-i386v.h is written). So zero the appropriate areas in registers. */
181#define SAVE_REGISTERS1() \
182 asm ("movl %eax, _registers"); \
183 asm ("movl %ecx, _registers+4"); \
184 asm ("movl %edx, _registers+8"); \
185 asm ("movl %ebx, _registers+12"); \
186 asm ("movl %ebp, _registers+20"); \
187 asm ("movl %esi, _registers+24"); \
188 asm ("movl %edi, _registers+28"); \
189 asm ("movw $0, %ax"); \
190 asm ("movw %ds, _registers+48"); \
191 asm ("movw %ax, _registers+50"); \
192 asm ("movw %es, _registers+52"); \
193 asm ("movw %ax, _registers+54"); \
194 asm ("movw %fs, _registers+56"); \
195 asm ("movw %ax, _registers+58"); \
196 asm ("movw %gs, _registers+60"); \
197 asm ("movw %ax, _registers+62");
198#define SAVE_ERRCODE() \
199 asm ("popl %ebx"); \
200 asm ("movl %ebx, _gdb_i386errcode");
201#define SAVE_REGISTERS2() \
202 asm ("popl %ebx"); /* old eip */ \
203 asm ("movl %ebx, _registers+32"); \
204 asm ("popl %ebx"); /* old cs */ \
205 asm ("movl %ebx, _registers+40"); \
206 asm ("movw %ax, _registers+42"); \
207 asm ("popl %ebx"); /* old eflags */ \
208 asm ("movl %ebx, _registers+36"); \
209 /* Now that we've done the pops, we can save the stack pointer."); */ \
210 asm ("movw %ss, _registers+44"); \
211 asm ("movw %ax, _registers+46"); \
212 asm ("movl %esp, _registers+16");
213
214/* See if mem_fault_routine is set, if so just IRET to that address. */
215#define CHECK_FAULT() \
216 asm ("cmpl $0, _mem_fault_routine"); \
217 asm ("jne mem_fault");
218
219asm (".text");
220asm ("mem_fault:");
221/* OK to clobber temp registers; we're just going to end up in set_mem_err. */
222/* Pop error code from the stack and save it. */
223asm (" popl %eax");
224asm (" movl %eax, _gdb_i386errcode");
225
226asm (" popl %eax"); /* eip */
227/* We don't want to return there, we want to return to the function
228 pointed to by mem_fault_routine instead. */
229asm (" movl _mem_fault_routine, %eax");
230asm (" popl %ecx"); /* cs (low 16 bits; junk in hi 16 bits). */
231asm (" popl %edx"); /* eflags */
232
233/* Remove this stack frame; when we do the iret, we will be going to
234 the start of a function, so we want the stack to look just like it
235 would after a "call" instruction. */
236asm (" leave");
237
238/* Push the stuff that iret wants. */
239asm (" pushl %edx"); /* eflags */
240asm (" pushl %ecx"); /* cs */
241asm (" pushl %eax"); /* eip */
242
243/* Zero mem_fault_routine. */
244asm (" movl $0, %eax");
245asm (" movl %eax, _mem_fault_routine");
246
247asm ("iret");
248
249#define CALL_HOOK() asm("call _remcomHandler");
250
251/* This function is called when a i386 exception occurs. It saves
252 * all the cpu regs in the _registers array, munges the stack a bit,
253 * and invokes an exception handler (remcom_handler).
254 *
255 * stack on entry: stack on exit:
256 * old eflags vector number
257 * old cs (zero-filled to 32 bits)
258 * old eip
259 *
260 */
261extern void _catchException3();
262asm(".text");
263asm(".globl __catchException3");
264asm("__catchException3:");
265SAVE_REGISTERS1();
266SAVE_REGISTERS2();
267asm ("pushl $3");
268CALL_HOOK();
269
270/* Same thing for exception 1. */
271extern void _catchException1();
272asm(".text");
273asm(".globl __catchException1");
274asm("__catchException1:");
275SAVE_REGISTERS1();
276SAVE_REGISTERS2();
277asm ("pushl $1");
278CALL_HOOK();
279
280/* Same thing for exception 0. */
281extern void _catchException0();
282asm(".text");
283asm(".globl __catchException0");
284asm("__catchException0:");
285SAVE_REGISTERS1();
286SAVE_REGISTERS2();
287asm ("pushl $0");
288CALL_HOOK();
289
290/* Same thing for exception 4. */
291extern void _catchException4();
292asm(".text");
293asm(".globl __catchException4");
294asm("__catchException4:");
295SAVE_REGISTERS1();
296SAVE_REGISTERS2();
297asm ("pushl $4");
298CALL_HOOK();
299
300/* Same thing for exception 5. */
301extern void _catchException5();
302asm(".text");
303asm(".globl __catchException5");
304asm("__catchException5:");
305SAVE_REGISTERS1();
306SAVE_REGISTERS2();
307asm ("pushl $5");
308CALL_HOOK();
309
310/* Same thing for exception 6. */
311extern void _catchException6();
312asm(".text");
313asm(".globl __catchException6");
314asm("__catchException6:");
315SAVE_REGISTERS1();
316SAVE_REGISTERS2();
317asm ("pushl $6");
318CALL_HOOK();
319
320/* Same thing for exception 7. */
321extern void _catchException7();
322asm(".text");
323asm(".globl __catchException7");
324asm("__catchException7:");
325SAVE_REGISTERS1();
326SAVE_REGISTERS2();
327asm ("pushl $7");
328CALL_HOOK();
329
330/* Same thing for exception 8. */
331extern void _catchException8();
332asm(".text");
333asm(".globl __catchException8");
334asm("__catchException8:");
335SAVE_REGISTERS1();
336SAVE_ERRCODE();
337SAVE_REGISTERS2();
338asm ("pushl $8");
339CALL_HOOK();
340
341/* Same thing for exception 9. */
342extern void _catchException9();
343asm(".text");
344asm(".globl __catchException9");
345asm("__catchException9:");
346SAVE_REGISTERS1();
347SAVE_REGISTERS2();
348asm ("pushl $9");
349CALL_HOOK();
350
351/* Same thing for exception 10. */
352extern void _catchException10();
353asm(".text");
354asm(".globl __catchException10");
355asm("__catchException10:");
356SAVE_REGISTERS1();
357SAVE_ERRCODE();
358SAVE_REGISTERS2();
359asm ("pushl $10");
360CALL_HOOK();
361
362/* Same thing for exception 12. */
363extern void _catchException12();
364asm(".text");
365asm(".globl __catchException12");
366asm("__catchException12:");
367SAVE_REGISTERS1();
368SAVE_ERRCODE();
369SAVE_REGISTERS2();
370asm ("pushl $12");
371CALL_HOOK();
372
373/* Same thing for exception 16. */
374extern void _catchException16();
375asm(".text");
376asm(".globl __catchException16");
377asm("__catchException16:");
378SAVE_REGISTERS1();
379SAVE_REGISTERS2();
380asm ("pushl $16");
381CALL_HOOK();
382
383/* For 13, 11, and 14 we have to deal with the CHECK_FAULT stuff. */
384
385/* Same thing for exception 13. */
386extern void _catchException13 ();
387asm (".text");
388asm (".globl __catchException13");
389asm ("__catchException13:");
390CHECK_FAULT();
391SAVE_REGISTERS1();
392SAVE_ERRCODE();
393SAVE_REGISTERS2();
394asm ("pushl $13");
395CALL_HOOK();
396
397/* Same thing for exception 11. */
398extern void _catchException11 ();
399asm (".text");
400asm (".globl __catchException11");
401asm ("__catchException11:");
402CHECK_FAULT();
403SAVE_REGISTERS1();
404SAVE_ERRCODE();
405SAVE_REGISTERS2();
406asm ("pushl $11");
407CALL_HOOK();
408
409/* Same thing for exception 14. */
410extern void _catchException14 ();
411asm (".text");
412asm (".globl __catchException14");
413asm ("__catchException14:");
414CHECK_FAULT();
415SAVE_REGISTERS1();
416SAVE_ERRCODE();
417SAVE_REGISTERS2();
418asm ("pushl $14");
419CALL_HOOK();
420
421/*
422 * remcomHandler is a front end for handle_exception. It moves the
423 * stack pointer into an area reserved for debugger use.
424 */
425asm("_remcomHandler:");
426asm(" popl %eax"); /* pop off return address */
427asm(" popl %eax"); /* get the exception number */
428asm(" movl _stackPtr, %esp"); /* move to remcom stack area */
429asm(" pushl %eax"); /* push exception onto stack */
430asm(" call _handle_exception"); /* this never returns */
431
432void _returnFromException()
433{
434 return_to_prog ();
435}
436
437int hex(ch)
438char ch;
439{
440 if ((ch >= 'a') && (ch <= 'f')) return (ch-'a'+10);
441 if ((ch >= '0') && (ch <= '9')) return (ch-'0');
442 if ((ch >= 'A') && (ch <= 'F')) return (ch-'A'+10);
443 return (-1);
444}
445
d4f3574e
SS
446static char remcomInBuffer[BUFMAX];
447static char remcomOutBuffer[BUFMAX];
448
c906108c 449/* scan for the sequence $<data>#<checksum> */
104c1213
JM
450
451unsigned char *
fba45db2 452getpacket (void)
c906108c 453{
d4f3574e 454 unsigned char *buffer = &remcomInBuffer[0];
c906108c
SS
455 unsigned char checksum;
456 unsigned char xmitcsum;
104c1213 457 int count;
c906108c
SS
458 char ch;
459
104c1213
JM
460 while (1)
461 {
462 /* wait around for the start character, ignore all other characters */
463 while ((ch = getDebugChar ()) != '$')
464 ;
465
466retry:
467 checksum = 0;
468 xmitcsum = -1;
469 count = 0;
470
471 /* now, read until a # or end of buffer is found */
472 while (count < BUFMAX)
473 {
474 ch = getDebugChar ();
475 if (ch == '$')
476 goto retry;
477 if (ch == '#')
478 break;
479 checksum = checksum + ch;
480 buffer[count] = ch;
481 count = count + 1;
482 }
483 buffer[count] = 0;
484
485 if (ch == '#')
486 {
487 ch = getDebugChar ();
488 xmitcsum = hex (ch) << 4;
489 ch = getDebugChar ();
490 xmitcsum += hex (ch);
491
492 if (checksum != xmitcsum)
493 {
494 if (remote_debug)
495 {
496 fprintf (stderr,
497 "bad checksum. My count = 0x%x, sent=0x%x. buf=%s\n",
498 checksum, xmitcsum, buffer);
499 }
500 putDebugChar ('-'); /* failed checksum */
501 }
502 else
503 {
504 putDebugChar ('+'); /* successful transfer */
505
506 /* if a sequence char is present, reply the sequence ID */
507 if (buffer[2] == ':')
508 {
509 putDebugChar (buffer[0]);
510 putDebugChar (buffer[1]);
511
512 return &buffer[3];
513 }
514
515 return &buffer[0];
516 }
517 }
c906108c 518 }
c906108c
SS
519}
520
521/* send the packet in buffer. */
522
c906108c 523void putpacket(buffer)
104c1213 524 unsigned char *buffer;
c906108c
SS
525{
526 unsigned char checksum;
527 int count;
528 char ch;
529
530 /* $<packet info>#<checksum>. */
531 do {
532 putDebugChar('$');
533 checksum = 0;
534 count = 0;
535
536 while (ch=buffer[count]) {
537 putDebugChar(ch);
538 checksum += ch;
539 count += 1;
540 }
541
542 putDebugChar('#');
543 putDebugChar(hexchars[checksum >> 4]);
544 putDebugChar(hexchars[checksum % 16]);
545
104c1213 546 } while (getDebugChar() != '+');
c906108c
SS
547
548}
549
c906108c
SS
550void debug_error(format, parm)
551char * format;
552char * parm;
553{
554 if (remote_debug) fprintf (stderr,format,parm);
555}
556
557/* Address of a routine to RTE to if we get a memory fault. */
558static void (*volatile mem_fault_routine)() = NULL;
559
560/* Indicate to caller of mem2hex or hex2mem that there has been an
561 error. */
562static volatile int mem_err = 0;
563
564void
fba45db2 565set_mem_err (void)
c906108c
SS
566{
567 mem_err = 1;
568}
569
570/* These are separate functions so that they are so short and sweet
571 that the compiler won't save any registers (if there is a fault
572 to mem_fault, they won't get restored, so there better not be any
573 saved). */
574int
fba45db2 575get_char (char *addr)
c906108c
SS
576{
577 return *addr;
578}
579
580void
fba45db2 581set_char (char *addr, int val)
c906108c
SS
582{
583 *addr = val;
584}
585
586/* convert the memory pointed to by mem into hex, placing result in buf */
587/* return a pointer to the last char put in buf (null) */
588/* If MAY_FAULT is non-zero, then we should set mem_err in response to
589 a fault; if zero treat a fault like any other fault in the stub. */
590char* mem2hex(mem, buf, count, may_fault)
591char* mem;
592char* buf;
593int count;
594int may_fault;
595{
596 int i;
597 unsigned char ch;
598
599 if (may_fault)
600 mem_fault_routine = set_mem_err;
601 for (i=0;i<count;i++) {
602 ch = get_char (mem++);
603 if (may_fault && mem_err)
604 return (buf);
605 *buf++ = hexchars[ch >> 4];
606 *buf++ = hexchars[ch % 16];
607 }
608 *buf = 0;
609 if (may_fault)
610 mem_fault_routine = NULL;
611 return(buf);
612}
613
614/* convert the hex array pointed to by buf into binary to be placed in mem */
615/* return a pointer to the character AFTER the last byte written */
616char* hex2mem(buf, mem, count, may_fault)
617char* buf;
618char* mem;
619int count;
620int may_fault;
621{
622 int i;
623 unsigned char ch;
624
625 if (may_fault)
626 mem_fault_routine = set_mem_err;
627 for (i=0;i<count;i++) {
628 ch = hex(*buf++) << 4;
629 ch = ch + hex(*buf++);
630 set_char (mem++, ch);
631 if (may_fault && mem_err)
632 return (mem);
633 }
634 if (may_fault)
635 mem_fault_routine = NULL;
636 return(mem);
637}
638
639/* this function takes the 386 exception vector and attempts to
640 translate this number into a unix compatible signal value */
641int computeSignal( exceptionVector )
642int exceptionVector;
643{
644 int sigval;
645 switch (exceptionVector) {
646 case 0 : sigval = 8; break; /* divide by zero */
647 case 1 : sigval = 5; break; /* debug exception */
648 case 3 : sigval = 5; break; /* breakpoint */
649 case 4 : sigval = 16; break; /* into instruction (overflow) */
650 case 5 : sigval = 16; break; /* bound instruction */
651 case 6 : sigval = 4; break; /* Invalid opcode */
652 case 7 : sigval = 8; break; /* coprocessor not available */
653 case 8 : sigval = 7; break; /* double fault */
654 case 9 : sigval = 11; break; /* coprocessor segment overrun */
655 case 10 : sigval = 11; break; /* Invalid TSS */
656 case 11 : sigval = 11; break; /* Segment not present */
657 case 12 : sigval = 11; break; /* stack exception */
658 case 13 : sigval = 11; break; /* general protection */
659 case 14 : sigval = 11; break; /* page fault */
660 case 16 : sigval = 7; break; /* coprocessor error */
661 default:
662 sigval = 7; /* "software generated"*/
663 }
664 return (sigval);
665}
666
667/**********************************************/
668/* WHILE WE FIND NICE HEX CHARS, BUILD AN INT */
669/* RETURN NUMBER OF CHARS PROCESSED */
670/**********************************************/
671int hexToInt(char **ptr, int *intValue)
672{
673 int numChars = 0;
674 int hexValue;
675
676 *intValue = 0;
677
678 while (**ptr)
679 {
680 hexValue = hex(**ptr);
681 if (hexValue >=0)
682 {
683 *intValue = (*intValue <<4) | hexValue;
684 numChars ++;
685 }
686 else
687 break;
688
689 (*ptr)++;
690 }
691
692 return (numChars);
693}
694
695/*
696 * This function does all command procesing for interfacing to gdb.
697 */
698void handle_exception(int exceptionVector)
699{
104c1213 700 int sigval, stepping;
c906108c
SS
701 int addr, length;
702 char * ptr;
703 int newPC;
704
705 gdb_i386vector = exceptionVector;
706
707 if (remote_debug) printf("vector=%d, sr=0x%x, pc=0x%x\n",
708 exceptionVector,
709 registers[ PS ],
710 registers[ PC ]);
711
712 /* reply to host that an exception has occurred */
713 sigval = computeSignal( exceptionVector );
714 remcomOutBuffer[0] = 'S';
715 remcomOutBuffer[1] = hexchars[sigval >> 4];
716 remcomOutBuffer[2] = hexchars[sigval % 16];
717 remcomOutBuffer[3] = 0;
718
719 putpacket(remcomOutBuffer);
720
104c1213
JM
721 stepping = 0;
722
c906108c 723 while (1==1) {
c906108c 724 remcomOutBuffer[0] = 0;
d4f3574e 725 ptr = getpacket();
104c1213
JM
726
727 switch (*ptr++) {
c906108c
SS
728 case '?' : remcomOutBuffer[0] = 'S';
729 remcomOutBuffer[1] = hexchars[sigval >> 4];
730 remcomOutBuffer[2] = hexchars[sigval % 16];
731 remcomOutBuffer[3] = 0;
732 break;
733 case 'd' : remote_debug = !(remote_debug); /* toggle debug flag */
734 break;
735 case 'g' : /* return the value of the CPU registers */
736 mem2hex((char*) registers, remcomOutBuffer, NUMREGBYTES, 0);
737 break;
738 case 'G' : /* set the value of the CPU registers - return OK */
104c1213 739 hex2mem(ptr, (char*) registers, NUMREGBYTES, 0);
c906108c
SS
740 strcpy(remcomOutBuffer,"OK");
741 break;
742 case 'P' : /* set the value of a single CPU register - return OK */
743 {
744 int regno;
745
c906108c
SS
746 if (hexToInt (&ptr, &regno) && *ptr++ == '=')
747 if (regno >= 0 && regno < NUMREGS)
748 {
749 hex2mem (ptr, (char *)&registers[regno], 4, 0);
750 strcpy(remcomOutBuffer,"OK");
751 break;
752 }
753
754 strcpy (remcomOutBuffer, "E01");
755 break;
756 }
757
758 /* mAA..AA,LLLL Read LLLL bytes at address AA..AA */
759 case 'm' :
760 /* TRY TO READ %x,%x. IF SUCCEED, SET PTR = 0 */
c906108c
SS
761 if (hexToInt(&ptr,&addr))
762 if (*(ptr++) == ',')
763 if (hexToInt(&ptr,&length))
764 {
765 ptr = 0;
766 mem_err = 0;
767 mem2hex((char*) addr, remcomOutBuffer, length, 1);
768 if (mem_err) {
769 strcpy (remcomOutBuffer, "E03");
770 debug_error ("memory fault");
771 }
772 }
773
774 if (ptr)
775 {
776 strcpy(remcomOutBuffer,"E01");
c906108c
SS
777 }
778 break;
779
780 /* MAA..AA,LLLL: Write LLLL bytes at address AA.AA return OK */
781 case 'M' :
782 /* TRY TO READ '%x,%x:'. IF SUCCEED, SET PTR = 0 */
c906108c
SS
783 if (hexToInt(&ptr,&addr))
784 if (*(ptr++) == ',')
785 if (hexToInt(&ptr,&length))
786 if (*(ptr++) == ':')
787 {
788 mem_err = 0;
789 hex2mem(ptr, (char*) addr, length, 1);
790
791 if (mem_err) {
792 strcpy (remcomOutBuffer, "E03");
793 debug_error ("memory fault");
794 } else {
795 strcpy(remcomOutBuffer,"OK");
796 }
797
798 ptr = 0;
799 }
800 if (ptr)
801 {
802 strcpy(remcomOutBuffer,"E02");
c906108c
SS
803 }
804 break;
805
806 /* cAA..AA Continue at address AA..AA(optional) */
807 /* sAA..AA Step one instruction from AA..AA(optional) */
c906108c 808 case 's' :
104c1213
JM
809 stepping = 1;
810 case 'c' :
c906108c 811 /* try to read optional parameter, pc unchanged if no parm */
c906108c
SS
812 if (hexToInt(&ptr,&addr))
813 registers[ PC ] = addr;
814
815 newPC = registers[ PC];
816
817 /* clear the trace bit */
818 registers[ PS ] &= 0xfffffeff;
819
820 /* set the trace bit if we're stepping */
104c1213 821 if (stepping) registers[ PS ] |= 0x100;
c906108c 822
c906108c 823 _returnFromException(); /* this is a jump */
c906108c
SS
824 break;
825
826 /* kill the program */
827 case 'k' : /* do nothing */
828#if 0
829 /* Huh? This doesn't look like "nothing".
830 m68k-stub.c and sparc-stub.c don't have it. */
831 BREAKPOINT();
832#endif
833 break;
834 } /* switch */
835
836 /* reply to the request */
837 putpacket(remcomOutBuffer);
838 }
839}
840
841/* this function is used to set up exception handlers for tracing and
842 breakpoints */
843void set_debug_traps()
844{
845extern void remcomHandler();
846int exception;
847
848 stackPtr = &remcomStack[STACKSIZE/sizeof(int) - 1];
849
850 exceptionHandler (0, _catchException0);
851 exceptionHandler (1, _catchException1);
852 exceptionHandler (3, _catchException3);
853 exceptionHandler (4, _catchException4);
854 exceptionHandler (5, _catchException5);
855 exceptionHandler (6, _catchException6);
856 exceptionHandler (7, _catchException7);
857 exceptionHandler (8, _catchException8);
858 exceptionHandler (9, _catchException9);
859 exceptionHandler (10, _catchException10);
860 exceptionHandler (11, _catchException11);
861 exceptionHandler (12, _catchException12);
862 exceptionHandler (13, _catchException13);
863 exceptionHandler (14, _catchException14);
864 exceptionHandler (16, _catchException16);
865
c906108c 866 initialized = 1;
c906108c
SS
867}
868
869/* This function will generate a breakpoint exception. It is used at the
870 beginning of a program to sync up with a debugger and can be used
871 otherwise as a quick means to stop program execution and "break" into
872 the debugger. */
873
874void breakpoint()
875{
876 if (initialized)
c906108c 877 BREAKPOINT();
c906108c 878}
This page took 0.102849 seconds and 4 git commands to generate.