* python/py-utils.c (gdb_pymodule_addobject): Cast away const.
[deliverable/binutils-gdb.git] / gdb / monitor.c
CommitLineData
c906108c 1/* Remote debugging interface for boot monitors, for GDB.
0a65a603 2
28e7fd62 3 Copyright (C) 1990-2013 Free Software Foundation, Inc.
0a65a603 4
c906108c
SS
5 Contributed by Cygnus Support. Written by Rob Savoye for Cygnus.
6 Resurrected from the ashes by Stu Grossman.
7
c5aa993b 8 This file is part of GDB.
c906108c 9
c5aa993b
JM
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
a9762ec7 12 the Free Software Foundation; either version 3 of the License, or
c5aa993b 13 (at your option) any later version.
c906108c 14
c5aa993b
JM
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
c906108c 19
c5aa993b 20 You should have received a copy of the GNU General Public License
a9762ec7 21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c 22
025bb325 23/* This file was derived from various remote-* modules. It is a collection
c906108c 24 of generic support functions so GDB can talk directly to a ROM based
025bb325 25 monitor. This saves use from having to hack an exception based handler
8e1a459b 26 into existence, and makes for quick porting.
c906108c
SS
27
28 This module talks to a debug monitor called 'MONITOR', which
29 We communicate with MONITOR via either a direct serial line, or a TCP
30 (or possibly TELNET) stream to a terminal multiplexor,
31 which in turn talks to the target board. */
32
33/* FIXME 32x64: This code assumes that registers and addresses are at
34 most 32 bits long. If they can be larger, you will need to declare
35 values as LONGEST and use %llx or some such to print values when
36 building commands to send to the monitor. Since we don't know of
37 any actual 64-bit targets with ROM monitors that use this code,
38 it's not an issue right now. -sts 4/18/96 */
39
40#include "defs.h"
41#include "gdbcore.h"
42#include "target.h"
60250e8b 43#include "exceptions.h"
c906108c
SS
44#include <signal.h>
45#include <ctype.h>
46#include "gdb_string.h"
47#include <sys/types.h>
48#include "command.h"
49#include "serial.h"
50#include "monitor.h"
51#include "gdbcmd.h"
52#include "inferior.h"
88987551 53#include "gdb_regex.h"
c906108c 54#include "srec.h"
4e052eda 55#include "regcache.h"
c0a2216e 56#include "gdbthread.h"
40e397df 57#include "readline/readline.h"
c906108c
SS
58
59static char *dev_name;
60static struct target_ops *targ_ops;
61
a14ed312 62static void monitor_interrupt_query (void);
08ae6d95 63static void monitor_interrupt_twice (int);
f9c72d52 64static void monitor_stop (ptid_t);
c410a84c 65static void monitor_dump_regs (struct regcache *regcache);
08ae6d95 66
c906108c 67#if 0
a14ed312 68static int from_hex (int a);
c906108c 69#endif
c906108c
SS
70
71static struct monitor_ops *current_monitor;
72
025bb325 73static int hashmark; /* flag set by "set hash". */
c906108c
SS
74
75static int timeout = 30;
76
025bb325 77static int in_monitor_wait = 0; /* Non-zero means we are in monitor_wait(). */
c906108c 78
025bb325 79static void (*ofunc) (); /* Old SIGINT signal handler. */
c906108c 80
9e086581
JM
81static CORE_ADDR *breakaddr;
82
c906108c
SS
83/* Descriptor for I/O to remote machine. Initialize it to NULL so
84 that monitor_open knows that we don't have a file open when the
85 program starts. */
86
ba3a8523 87static struct serial *monitor_desc = NULL;
c906108c 88
025bb325 89/* Pointer to regexp pattern matching data. */
c906108c
SS
90
91static struct re_pattern_buffer register_pattern;
92static char register_fastmap[256];
93
94static struct re_pattern_buffer getmem_resp_delim_pattern;
95static char getmem_resp_delim_fastmap[256];
96
1456ad8e
AC
97static struct re_pattern_buffer setmem_resp_delim_pattern;
98static char setmem_resp_delim_fastmap[256];
99
100static struct re_pattern_buffer setreg_resp_delim_pattern;
101static char setreg_resp_delim_fastmap[256];
102
c906108c
SS
103static int dump_reg_flag; /* Non-zero means do a dump_registers cmd when
104 monitor_wait wakes up. */
105
3e43a32a
MS
106static int first_time = 0; /* Is this the first time we're
107 executing after gaving created the
025bb325 108 child proccess? */
c906108c 109
5e0b29c1
PA
110
111/* This is the ptid we use while we're connected to a monitor. Its
112 value is arbitrary, as monitor targets don't have a notion of
113 processes or threads, but we need something non-null to place in
114 inferior_ptid. */
115static ptid_t monitor_ptid;
116
d4f3574e
SS
117#define TARGET_BUF_SIZE 2048
118
2df3850c 119/* Monitor specific debugging information. Typically only useful to
025bb325 120 the developer of a new monitor interface. */
c906108c 121
a0b31db1 122static void monitor_debug (const char *fmt, ...) ATTRIBUTE_PRINTF (1, 2);
2df3850c 123
ccce17b0 124static unsigned int monitor_debug_p = 0;
2df3850c
JM
125
126/* NOTE: This file alternates between monitor_debug_p and remote_debug
b2fa5097 127 when determining if debug information is printed. Perhaps this
025bb325 128 could be simplified. */
2df3850c
JM
129
130static void
131monitor_debug (const char *fmt, ...)
132{
133 if (monitor_debug_p)
134 {
135 va_list args;
b8d56208 136
2df3850c
JM
137 va_start (args, fmt);
138 vfprintf_filtered (gdb_stdlog, fmt, args);
139 va_end (args);
140 }
141}
142
143
144/* Convert a string into a printable representation, Return # byte in
145 the new string. When LEN is >0 it specifies the size of the
025bb325 146 string. Otherwize strlen(oldstr) is used. */
2df3850c
JM
147
148static void
149monitor_printable_string (char *newstr, char *oldstr, int len)
c906108c 150{
c906108c 151 int ch;
2df3850c
JM
152 int i;
153
154 if (len <= 0)
155 len = strlen (oldstr);
c906108c 156
2df3850c 157 for (i = 0; i < len; i++)
c906108c 158 {
2df3850c 159 ch = oldstr[i];
c906108c 160 switch (ch)
c5aa993b 161 {
c906108c
SS
162 default:
163 if (isprint (ch))
164 *newstr++ = ch;
165
166 else
167 {
168 sprintf (newstr, "\\x%02x", ch & 0xff);
169 newstr += 4;
170 }
171 break;
172
c5aa993b
JM
173 case '\\':
174 *newstr++ = '\\';
175 *newstr++ = '\\';
176 break;
177 case '\b':
178 *newstr++ = '\\';
179 *newstr++ = 'b';
180 break;
181 case '\f':
182 *newstr++ = '\\';
183 *newstr++ = 't';
184 break;
185 case '\n':
186 *newstr++ = '\\';
187 *newstr++ = 'n';
188 break;
189 case '\r':
190 *newstr++ = '\\';
191 *newstr++ = 'r';
192 break;
193 case '\t':
194 *newstr++ = '\\';
195 *newstr++ = 't';
196 break;
197 case '\v':
198 *newstr++ = '\\';
199 *newstr++ = 'v';
200 break;
201 }
c906108c
SS
202 }
203
204 *newstr++ = '\0';
c906108c
SS
205}
206
207/* Print monitor errors with a string, converting the string to printable
208 representation. */
209
210static void
2df3850c
JM
211monitor_error (char *function, char *message,
212 CORE_ADDR memaddr, int len, char *string, int final_char)
c906108c 213{
c5aa993b 214 int real_len = (len == 0 && string != (char *) 0) ? strlen (string) : len;
c906108c 215 char *safe_string = alloca ((real_len * 4) + 1);
b8d56208 216
2df3850c 217 monitor_printable_string (safe_string, string, real_len);
c906108c
SS
218
219 if (final_char)
5af949e3 220 error (_("%s (%s): %s: %s%c"),
f5656ead 221 function, paddress (target_gdbarch (), memaddr),
5af949e3 222 message, safe_string, final_char);
c906108c 223 else
5af949e3 224 error (_("%s (%s): %s: %s"),
f5656ead 225 function, paddress (target_gdbarch (), memaddr),
5af949e3 226 message, safe_string);
c906108c
SS
227}
228
229/* Convert hex digit A to a number. */
230
231static int
fba45db2 232fromhex (int a)
c906108c
SS
233{
234 if (a >= '0' && a <= '9')
235 return a - '0';
236 else if (a >= 'a' && a <= 'f')
237 return a - 'a' + 10;
c5aa993b
JM
238 else if (a >= 'A' && a <= 'F')
239 return a - 'A' + 10;
c906108c 240 else
8a3fe4f8 241 error (_("Invalid hex digit %d"), a);
c906108c
SS
242}
243
244/* monitor_vsprintf - similar to vsprintf but handles 64-bit addresses
245
246 This function exists to get around the problem that many host platforms
247 don't have a printf that can print 64-bit addresses. The %A format
248 specification is recognized as a special case, and causes the argument
249 to be printed as a 64-bit hexadecimal address.
250
251 Only format specifiers of the form "[0-9]*[a-z]" are recognized.
252 If it is a '%s' format, the argument is a string; otherwise the
253 argument is assumed to be a long integer.
254
025bb325 255 %% is also turned into a single %. */
c5aa993b 256
c906108c 257static void
fba45db2 258monitor_vsprintf (char *sndbuf, char *pattern, va_list args)
c906108c 259{
f5656ead 260 int addr_bit = gdbarch_addr_bit (target_gdbarch ());
c906108c
SS
261 char format[10];
262 char fmt;
263 char *p;
264 int i;
265 long arg_int;
266 CORE_ADDR arg_addr;
267 char *arg_string;
268
269 for (p = pattern; *p; p++)
270 {
271 if (*p == '%')
272 {
273 /* Copy the format specifier to a separate buffer. */
274 format[0] = *p++;
275 for (i = 1; *p >= '0' && *p <= '9' && i < (int) sizeof (format) - 2;
276 i++, p++)
277 format[i] = *p;
278 format[i] = fmt = *p;
c5aa993b 279 format[i + 1] = '\0';
c906108c
SS
280
281 /* Fetch the next argument and print it. */
282 switch (fmt)
283 {
284 case '%':
285 strcpy (sndbuf, "%");
286 break;
287 case 'A':
288 arg_addr = va_arg (args, CORE_ADDR);
5af949e3 289 strcpy (sndbuf, phex_nz (arg_addr, addr_bit / 8));
c906108c
SS
290 break;
291 case 's':
292 arg_string = va_arg (args, char *);
293 sprintf (sndbuf, format, arg_string);
294 break;
295 default:
296 arg_int = va_arg (args, long);
297 sprintf (sndbuf, format, arg_int);
298 break;
299 }
300 sndbuf += strlen (sndbuf);
301 }
302 else
303 *sndbuf++ = *p;
304 }
305 *sndbuf = '\0';
306}
307
308
309/* monitor_printf_noecho -- Send data to monitor, but don't expect an echo.
310 Works just like printf. */
311
312void
c5aa993b 313monitor_printf_noecho (char *pattern,...)
c906108c
SS
314{
315 va_list args;
316 char sndbuf[2000];
317 int len;
318
c906108c 319 va_start (args, pattern);
c906108c
SS
320
321 monitor_vsprintf (sndbuf, pattern, args);
322
323 len = strlen (sndbuf);
324 if (len + 1 > sizeof sndbuf)
3e43a32a
MS
325 internal_error (__FILE__, __LINE__,
326 _("failed internal consistency check"));
c906108c 327
2df3850c 328 if (monitor_debug_p)
c906108c
SS
329 {
330 char *safe_string = (char *) alloca ((strlen (sndbuf) * 4) + 1);
b8d56208 331
2df3850c
JM
332 monitor_printable_string (safe_string, sndbuf, 0);
333 fprintf_unfiltered (gdb_stdlog, "sent[%s]\n", safe_string);
c906108c 334 }
c5aa993b 335
c906108c
SS
336 monitor_write (sndbuf, len);
337}
338
339/* monitor_printf -- Send data to monitor and check the echo. Works just like
340 printf. */
341
342void
c5aa993b 343monitor_printf (char *pattern,...)
c906108c
SS
344{
345 va_list args;
346 char sndbuf[2000];
347 int len;
348
c906108c 349 va_start (args, pattern);
c906108c
SS
350
351 monitor_vsprintf (sndbuf, pattern, args);
352
353 len = strlen (sndbuf);
354 if (len + 1 > sizeof sndbuf)
3e43a32a
MS
355 internal_error (__FILE__, __LINE__,
356 _("failed internal consistency check"));
c906108c 357
2df3850c 358 if (monitor_debug_p)
c906108c
SS
359 {
360 char *safe_string = (char *) alloca ((len * 4) + 1);
b8d56208 361
2df3850c
JM
362 monitor_printable_string (safe_string, sndbuf, 0);
363 fprintf_unfiltered (gdb_stdlog, "sent[%s]\n", safe_string);
c906108c
SS
364 }
365
366 monitor_write (sndbuf, len);
367
3e43a32a
MS
368 /* We used to expect that the next immediate output was the
369 characters we just output, but sometimes some extra junk appeared
370 before the characters we expected, like an extra prompt, or a
371 portmaster sending telnet negotiations. So, just start searching
372 for what we sent, and skip anything unknown. */
2df3850c
JM
373 monitor_debug ("ExpectEcho\n");
374 monitor_expect (sndbuf, (char *) 0, 0);
c906108c
SS
375}
376
377
378/* Write characters to the remote system. */
379
380void
fba45db2 381monitor_write (char *buf, int buflen)
c906108c 382{
2cd58942
AC
383 if (serial_write (monitor_desc, buf, buflen))
384 fprintf_unfiltered (gdb_stderr, "serial_write failed: %s\n",
c906108c
SS
385 safe_strerror (errno));
386}
387
388
389/* Read a binary character from the remote system, doing all the fancy
390 timeout stuff, but without interpreting the character in any way,
391 and without printing remote debug information. */
392
393int
fba45db2 394monitor_readchar (void)
c906108c
SS
395{
396 int c;
397 int looping;
398
399 do
400 {
401 looping = 0;
2cd58942 402 c = serial_readchar (monitor_desc, timeout);
c906108c
SS
403
404 if (c >= 0)
c5aa993b 405 c &= 0xff; /* don't lose bit 7 */
c906108c
SS
406 }
407 while (looping);
408
409 if (c >= 0)
410 return c;
411
412 if (c == SERIAL_TIMEOUT)
8a3fe4f8 413 error (_("Timeout reading from remote system."));
c906108c 414
e2e0b3e5 415 perror_with_name (_("remote-monitor"));
c906108c
SS
416}
417
418
419/* Read a character from the remote system, doing all the fancy
420 timeout stuff. */
421
422static int
fba45db2 423readchar (int timeout)
c906108c
SS
424{
425 int c;
c5aa993b
JM
426 static enum
427 {
428 last_random, last_nl, last_cr, last_crnl
429 }
430 state = last_random;
c906108c
SS
431 int looping;
432
433 do
434 {
435 looping = 0;
2cd58942 436 c = serial_readchar (monitor_desc, timeout);
c906108c
SS
437
438 if (c >= 0)
439 {
440 c &= 0x7f;
c906108c 441 /* This seems to interfere with proper function of the
025bb325 442 input stream. */
2df3850c 443 if (monitor_debug_p || remote_debug)
c906108c
SS
444 {
445 char buf[2];
b8d56208 446
c906108c
SS
447 buf[0] = c;
448 buf[1] = '\0';
449 puts_debug ("read -->", buf, "<--");
450 }
c5aa993b 451
c906108c
SS
452 }
453
025bb325 454 /* Canonicialize \n\r combinations into one \r. */
c906108c
SS
455 if ((current_monitor->flags & MO_HANDLE_NL) != 0)
456 {
457 if ((c == '\r' && state == last_nl)
458 || (c == '\n' && state == last_cr))
459 {
460 state = last_crnl;
461 looping = 1;
462 }
463 else if (c == '\r')
464 state = last_cr;
465 else if (c != '\n')
466 state = last_random;
467 else
468 {
469 state = last_nl;
470 c = '\r';
471 }
472 }
473 }
474 while (looping);
475
476 if (c >= 0)
477 return c;
478
479 if (c == SERIAL_TIMEOUT)
7a292a7a 480#if 0
025bb325
MS
481 /* I fail to see how detaching here can be useful. */
482 if (in_monitor_wait) /* Watchdog went off. */
c906108c
SS
483 {
484 target_mourn_inferior ();
8a3fe4f8 485 error (_("GDB serial timeout has expired. Target detached."));
c906108c
SS
486 }
487 else
488#endif
8a3fe4f8 489 error (_("Timeout reading from remote system."));
c906108c 490
e2e0b3e5 491 perror_with_name (_("remote-monitor"));
c906108c
SS
492}
493
494/* Scan input from the remote system, until STRING is found. If BUF is non-
495 zero, then collect input until we have collected either STRING or BUFLEN-1
496 chars. In either case we terminate BUF with a 0. If input overflows BUF
497 because STRING can't be found, return -1, else return number of chars in BUF
498 (minus the terminating NUL). Note that in the non-overflow case, STRING
499 will be at the end of BUF. */
500
501int
fba45db2 502monitor_expect (char *string, char *buf, int buflen)
c906108c
SS
503{
504 char *p = string;
505 int obuflen = buflen;
506 int c;
c906108c 507
2df3850c 508 if (monitor_debug_p)
c906108c
SS
509 {
510 char *safe_string = (char *) alloca ((strlen (string) * 4) + 1);
2df3850c
JM
511 monitor_printable_string (safe_string, string, 0);
512 fprintf_unfiltered (gdb_stdlog, "MON Expecting '%s'\n", safe_string);
c906108c
SS
513 }
514
8edbea78 515 immediate_quit++;
522002f9 516 QUIT;
c906108c
SS
517 while (1)
518 {
519 if (buf)
520 {
521 if (buflen < 2)
522 {
523 *buf = '\000';
8edbea78 524 immediate_quit--;
c906108c
SS
525 return -1;
526 }
527
528 c = readchar (timeout);
529 if (c == '\000')
530 continue;
531 *buf++ = c;
532 buflen--;
533 }
534 else
535 c = readchar (timeout);
536
025bb325 537 /* Don't expect any ^C sent to be echoed. */
c5aa993b 538
c906108c
SS
539 if (*p == '\003' || c == *p)
540 {
541 p++;
542 if (*p == '\0')
543 {
8edbea78 544 immediate_quit--;
c906108c
SS
545
546 if (buf)
547 {
548 *buf++ = '\000';
549 return obuflen - buflen;
550 }
551 else
552 return 0;
553 }
554 }
c906108c
SS
555 else
556 {
a0b3c4fd
JM
557 /* We got a character that doesn't match the string. We need to
558 back up p, but how far? If we're looking for "..howdy" and the
559 monitor sends "...howdy"? There's certainly a match in there,
560 but when we receive the third ".", we won't find it if we just
561 restart the matching at the beginning of the string.
562
563 This is a Boyer-Moore kind of situation. We want to reset P to
564 the end of the longest prefix of STRING that is a suffix of
565 what we've read so far. In the example above, that would be
566 ".." --- the longest prefix of "..howdy" that is a suffix of
567 "...". This longest prefix could be the empty string, if C
568 is nowhere to be found in STRING.
569
570 If this longest prefix is not the empty string, it must contain
571 C, so let's search from the end of STRING for instances of C,
572 and see if the portion of STRING before that is a suffix of
573 what we read before C. Actually, we can search backwards from
574 p, since we know no prefix can be longer than that.
575
576 Note that we can use STRING itself, along with C, as a record
025bb325 577 of what we've received so far. :) */
a0b3c4fd
JM
578 int i;
579
580 for (i = (p - string) - 1; i >= 0; i--)
581 if (string[i] == c)
582 {
583 /* Is this prefix a suffix of what we've read so far?
584 In other words, does
025bb325 585 string[0 .. i-1] == string[p - i, p - 1]? */
a0b3c4fd
JM
586 if (! memcmp (string, p - i, i))
587 {
588 p = string + i + 1;
589 break;
590 }
591 }
592 if (i < 0)
593 p = string;
c906108c
SS
594 }
595 }
596}
597
598/* Search for a regexp. */
599
600static int
fba45db2 601monitor_expect_regexp (struct re_pattern_buffer *pat, char *buf, int buflen)
c906108c
SS
602{
603 char *mybuf;
604 char *p;
b8d56208 605
2df3850c 606 monitor_debug ("MON Expecting regexp\n");
c906108c
SS
607 if (buf)
608 mybuf = buf;
609 else
610 {
d4f3574e
SS
611 mybuf = alloca (TARGET_BUF_SIZE);
612 buflen = TARGET_BUF_SIZE;
c906108c
SS
613 }
614
615 p = mybuf;
616 while (1)
617 {
618 int retval;
619
620 if (p - mybuf >= buflen)
025bb325 621 { /* Buffer about to overflow. */
c906108c
SS
622
623/* On overflow, we copy the upper half of the buffer to the lower half. Not
025bb325 624 great, but it usually works... */
c906108c
SS
625
626 memcpy (mybuf, mybuf + buflen / 2, buflen / 2);
627 p = mybuf + buflen / 2;
628 }
629
630 *p++ = readchar (timeout);
631
632 retval = re_search (pat, mybuf, p - mybuf, 0, p - mybuf, NULL);
633 if (retval >= 0)
634 return 1;
635 }
636}
637
638/* Keep discarding input until we see the MONITOR prompt.
639
640 The convention for dealing with the prompt is that you
641 o give your command
642 o *then* wait for the prompt.
643
644 Thus the last thing that a procedure does with the serial line will
645 be an monitor_expect_prompt(). Exception: monitor_resume does not
646 wait for the prompt, because the terminal is being handed over to
647 the inferior. However, the next thing which happens after that is
648 a monitor_wait which does wait for the prompt. Note that this
649 includes abnormal exit, e.g. error(). This is necessary to prevent
650 getting into states from which we can't recover. */
651
652int
fba45db2 653monitor_expect_prompt (char *buf, int buflen)
c906108c 654{
2df3850c
JM
655 monitor_debug ("MON Expecting prompt\n");
656 return monitor_expect (current_monitor->prompt, buf, buflen);
c906108c
SS
657}
658
659/* Get N 32-bit words from remote, each preceded by a space, and put
660 them in registers starting at REGNO. */
661
662#if 0
663static unsigned long
fba45db2 664get_hex_word (void)
c906108c
SS
665{
666 unsigned long val;
667 int i;
668 int ch;
669
670 do
671 ch = readchar (timeout);
c5aa993b 672 while (isspace (ch));
c906108c
SS
673
674 val = from_hex (ch);
675
676 for (i = 7; i >= 1; i--)
677 {
678 ch = readchar (timeout);
679 if (!isxdigit (ch))
680 break;
681 val = (val << 4) | from_hex (ch);
682 }
683
684 return val;
685}
686#endif
687
688static void
fba45db2
KB
689compile_pattern (char *pattern, struct re_pattern_buffer *compiled_pattern,
690 char *fastmap)
c906108c
SS
691{
692 int tmp;
693 const char *val;
694
695 compiled_pattern->fastmap = fastmap;
696
697 tmp = re_set_syntax (RE_SYNTAX_EMACS);
698 val = re_compile_pattern (pattern,
699 strlen (pattern),
700 compiled_pattern);
701 re_set_syntax (tmp);
702
703 if (val)
3e43a32a
MS
704 error (_("compile_pattern: Can't compile pattern string `%s': %s!"),
705 pattern, val);
c906108c
SS
706
707 if (fastmap)
708 re_compile_fastmap (compiled_pattern);
709}
710
025bb325 711/* Open a connection to a remote debugger. NAME is the filename used
c906108c
SS
712 for communication. */
713
714void
fba45db2 715monitor_open (char *args, struct monitor_ops *mon_ops, int from_tty)
c906108c
SS
716{
717 char *name;
718 char **p;
6c95b8df 719 struct inferior *inf;
c906108c
SS
720
721 if (mon_ops->magic != MONITOR_OPS_MAGIC)
8a3fe4f8 722 error (_("Magic number of monitor_ops struct wrong."));
c906108c
SS
723
724 targ_ops = mon_ops->target;
725 name = targ_ops->to_shortname;
726
727 if (!args)
cce7e648 728 error (_("Use `target %s DEVICE-NAME' to use a serial port, or\n\
8a3fe4f8 729`target %s HOST-NAME:PORT-NUMBER' to use a network connection."), name, name);
c906108c
SS
730
731 target_preopen (from_tty);
732
025bb325 733 /* Setup pattern for register dump. */
c906108c
SS
734
735 if (mon_ops->register_pattern)
736 compile_pattern (mon_ops->register_pattern, &register_pattern,
737 register_fastmap);
738
739 if (mon_ops->getmem.resp_delim)
740 compile_pattern (mon_ops->getmem.resp_delim, &getmem_resp_delim_pattern,
741 getmem_resp_delim_fastmap);
742
1456ad8e
AC
743 if (mon_ops->setmem.resp_delim)
744 compile_pattern (mon_ops->setmem.resp_delim, &setmem_resp_delim_pattern,
745 setmem_resp_delim_fastmap);
746
747 if (mon_ops->setreg.resp_delim)
748 compile_pattern (mon_ops->setreg.resp_delim, &setreg_resp_delim_pattern,
749 setreg_resp_delim_fastmap);
750
c906108c
SS
751 unpush_target (targ_ops);
752
753 if (dev_name)
b8c9b27d 754 xfree (dev_name);
4fcf66da 755 dev_name = xstrdup (args);
c906108c 756
2cd58942 757 monitor_desc = serial_open (dev_name);
c906108c
SS
758
759 if (!monitor_desc)
760 perror_with_name (dev_name);
761
762 if (baud_rate != -1)
763 {
2cd58942 764 if (serial_setbaudrate (monitor_desc, baud_rate))
c906108c 765 {
2cd58942 766 serial_close (monitor_desc);
c906108c
SS
767 perror_with_name (dev_name);
768 }
769 }
c5aa993b 770
2cd58942 771 serial_raw (monitor_desc);
c906108c 772
2cd58942 773 serial_flush_input (monitor_desc);
c906108c 774
025bb325 775 /* some systems only work with 2 stop bits. */
c906108c 776
2cd58942 777 serial_setstopbits (monitor_desc, mon_ops->stopbits);
c906108c
SS
778
779 current_monitor = mon_ops;
780
781 /* See if we can wake up the monitor. First, try sending a stop sequence,
782 then send the init strings. Last, remove all breakpoints. */
783
784 if (current_monitor->stop)
785 {
f9c72d52 786 monitor_stop (inferior_ptid);
c906108c 787 if ((current_monitor->flags & MO_NO_ECHO_ON_OPEN) == 0)
c5aa993b 788 {
2df3850c 789 monitor_debug ("EXP Open echo\n");
c5aa993b
JM
790 monitor_expect_prompt (NULL, 0);
791 }
c906108c
SS
792 }
793
025bb325 794 /* wake up the monitor and see if it's alive. */
c906108c
SS
795 for (p = mon_ops->init; *p != NULL; p++)
796 {
797 /* Some of the characters we send may not be echoed,
025bb325 798 but we hope to get a prompt at the end of it all. */
c5aa993b 799
c906108c 800 if ((current_monitor->flags & MO_NO_ECHO_ON_OPEN) == 0)
c5aa993b 801 monitor_printf (*p);
c906108c 802 else
c5aa993b 803 monitor_printf_noecho (*p);
c906108c
SS
804 monitor_expect_prompt (NULL, 0);
805 }
806
2cd58942 807 serial_flush_input (monitor_desc);
c906108c 808
9e086581
JM
809 /* Alloc breakpoints */
810 if (mon_ops->set_break != NULL)
811 {
812 if (mon_ops->num_breakpoints == 0)
813 mon_ops->num_breakpoints = 8;
814
3e43a32a
MS
815 breakaddr = (CORE_ADDR *)
816 xmalloc (mon_ops->num_breakpoints * sizeof (CORE_ADDR));
9e086581
JM
817 memset (breakaddr, 0, mon_ops->num_breakpoints * sizeof (CORE_ADDR));
818 }
819
025bb325 820 /* Remove all breakpoints. */
c906108c
SS
821
822 if (mon_ops->clr_all_break)
823 {
824 monitor_printf (mon_ops->clr_all_break);
825 monitor_expect_prompt (NULL, 0);
826 }
827
828 if (from_tty)
3e43a32a
MS
829 printf_unfiltered (_("Remote target %s connected to %s\n"),
830 name, dev_name);
c906108c
SS
831
832 push_target (targ_ops);
833
c0a2216e
PA
834 /* Start afresh. */
835 init_thread_list ();
836
5e0b29c1
PA
837 /* Make run command think we are busy... */
838 inferior_ptid = monitor_ptid;
6c95b8df
PA
839 inf = current_inferior ();
840 inferior_appeared (inf, ptid_get_pid (inferior_ptid));
5e0b29c1 841 add_thread_silent (inferior_ptid);
c906108c 842
025bb325 843 /* Give monitor_wait something to read. */
c906108c
SS
844
845 monitor_printf (current_monitor->line_term);
846
6e586cc5
YQ
847 init_wait_for_inferior ();
848
8621d6a9 849 start_remote (from_tty);
c906108c
SS
850}
851
852/* Close out all files and local state before this target loses
853 control. */
854
855void
460014f5 856monitor_close (void)
c906108c
SS
857{
858 if (monitor_desc)
2cd58942 859 serial_close (monitor_desc);
9e086581 860
025bb325 861 /* Free breakpoint memory. */
9e086581
JM
862 if (breakaddr != NULL)
863 {
b8c9b27d 864 xfree (breakaddr);
9e086581
JM
865 breakaddr = NULL;
866 }
867
c906108c 868 monitor_desc = NULL;
5e0b29c1
PA
869
870 delete_thread_silent (monitor_ptid);
7f9f62ba 871 delete_inferior_silent (ptid_get_pid (monitor_ptid));
c906108c
SS
872}
873
874/* Terminate the open connection to the remote debugger. Use this
875 when you want to detach and do something else with your gdb. */
876
877static void
136d6dae 878monitor_detach (struct target_ops *ops, char *args, int from_tty)
c906108c 879{
025bb325 880 pop_target (); /* calls monitor_close to do the real work. */
c906108c 881 if (from_tty)
a3f17187 882 printf_unfiltered (_("Ending remote %s debugging\n"), target_shortname);
c906108c
SS
883}
884
885/* Convert VALSTR into the target byte-ordered value of REGNO and store it. */
886
887char *
c410a84c 888monitor_supply_register (struct regcache *regcache, int regno, char *valstr)
c906108c 889{
e17a4113
UW
890 struct gdbarch *gdbarch = get_regcache_arch (regcache);
891 enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
d4f3574e 892 ULONGEST val;
123a958e 893 unsigned char regbuf[MAX_REGISTER_SIZE];
c906108c
SS
894 char *p;
895
4ce44c66 896 val = 0;
d4f3574e
SS
897 p = valstr;
898 while (p && *p != '\0')
899 {
900 if (*p == '\r' || *p == '\n')
901 {
902 while (*p != '\0')
903 p++;
904 break;
905 }
906 if (isspace (*p))
907 {
908 p++;
909 continue;
910 }
911 if (!isxdigit (*p) && *p != 'x')
912 {
913 break;
914 }
915
916 val <<= 4;
917 val += fromhex (*p++);
918 }
2df3850c 919 monitor_debug ("Supplying Register %d %s\n", regno, valstr);
c906108c 920
1fcef334 921 if (val == 0 && valstr == p)
8a3fe4f8 922 error (_("monitor_supply_register (%d): bad value from monitor: %s."),
c906108c
SS
923 regno, valstr);
924
025bb325 925 /* supply register stores in target byte order, so swap here. */
c906108c 926
e17a4113 927 store_unsigned_integer (regbuf, register_size (gdbarch, regno), byte_order,
9b072297 928 val);
c906108c 929
c410a84c 930 regcache_raw_supply (regcache, regno, regbuf);
c906108c
SS
931
932 return p;
933}
934
935/* Tell the remote machine to resume. */
936
c906108c 937static void
28439f5e 938monitor_resume (struct target_ops *ops,
2ea28649 939 ptid_t ptid, int step, enum gdb_signal sig)
c906108c 940{
025bb325 941 /* Some monitors require a different command when starting a program. */
2df3850c 942 monitor_debug ("MON resume\n");
c906108c
SS
943 if (current_monitor->flags & MO_RUN_FIRST_TIME && first_time == 1)
944 {
945 first_time = 0;
946 monitor_printf ("run\r");
947 if (current_monitor->flags & MO_NEED_REGDUMP_AFTER_CONT)
c5aa993b 948 dump_reg_flag = 1;
c906108c
SS
949 return;
950 }
c906108c
SS
951 if (step)
952 monitor_printf (current_monitor->step);
953 else
954 {
955 if (current_monitor->continue_hook)
c5aa993b
JM
956 (*current_monitor->continue_hook) ();
957 else
958 monitor_printf (current_monitor->cont);
c906108c
SS
959 if (current_monitor->flags & MO_NEED_REGDUMP_AFTER_CONT)
960 dump_reg_flag = 1;
961 }
962}
963
964/* Parse the output of a register dump command. A monitor specific
965 regexp is used to extract individual register descriptions of the
966 form REG=VAL. Each description is split up into a name and a value
967 string which are passed down to monitor specific code. */
968
969static void
c410a84c 970parse_register_dump (struct regcache *regcache, char *buf, int len)
c906108c 971{
2df3850c
JM
972 monitor_debug ("MON Parsing register dump\n");
973 while (1)
c906108c
SS
974 {
975 int regnamelen, vallen;
976 char *regname, *val;
b8d56208 977
c906108c 978 /* Element 0 points to start of register name, and element 1
c5aa993b 979 points to the start of the register value. */
c906108c
SS
980 struct re_registers register_strings;
981
982 memset (&register_strings, 0, sizeof (struct re_registers));
983
984 if (re_search (&register_pattern, buf, len, 0, len,
985 &register_strings) == -1)
986 break;
987
988 regnamelen = register_strings.end[1] - register_strings.start[1];
989 regname = buf + register_strings.start[1];
990 vallen = register_strings.end[2] - register_strings.start[2];
991 val = buf + register_strings.start[2];
992
c410a84c
UW
993 current_monitor->supply_register (regcache, regname, regnamelen,
994 val, vallen);
c906108c
SS
995
996 buf += register_strings.end[0];
997 len -= register_strings.end[0];
998 }
999}
1000
1001/* Send ^C to target to halt it. Target will respond, and send us a
1002 packet. */
1003
1004static void
fba45db2 1005monitor_interrupt (int signo)
c906108c
SS
1006{
1007 /* If this doesn't work, try more severe steps. */
1008 signal (signo, monitor_interrupt_twice);
c5aa993b 1009
2df3850c
JM
1010 if (monitor_debug_p || remote_debug)
1011 fprintf_unfiltered (gdb_stdlog, "monitor_interrupt called\n");
c906108c 1012
f9c72d52 1013 target_stop (inferior_ptid);
c906108c
SS
1014}
1015
1016/* The user typed ^C twice. */
1017
1018static void
fba45db2 1019monitor_interrupt_twice (int signo)
c906108c
SS
1020{
1021 signal (signo, ofunc);
c5aa993b 1022
c906108c
SS
1023 monitor_interrupt_query ();
1024
1025 signal (signo, monitor_interrupt);
1026}
1027
1028/* Ask the user what to do when an interrupt is received. */
1029
1030static void
fba45db2 1031monitor_interrupt_query (void)
c906108c
SS
1032{
1033 target_terminal_ours ();
1034
9e2f0ad4
HZ
1035 if (query (_("Interrupted while waiting for the program.\n\
1036Give up (and stop debugging it)? ")))
c906108c
SS
1037 {
1038 target_mourn_inferior ();
315a522e 1039 deprecated_throw_reason (RETURN_QUIT);
c906108c
SS
1040 }
1041
1042 target_terminal_inferior ();
1043}
1044
1045static void
fba45db2 1046monitor_wait_cleanup (void *old_timeout)
c906108c 1047{
c5aa993b 1048 timeout = *(int *) old_timeout;
c906108c
SS
1049 signal (SIGINT, ofunc);
1050 in_monitor_wait = 0;
1051}
1052
1053
1054
a78f21af 1055static void
c5aa993b
JM
1056monitor_wait_filter (char *buf,
1057 int bufmax,
1058 int *ext_resp_len,
a78f21af 1059 struct target_waitstatus *status)
c906108c 1060{
c5aa993b 1061 int resp_len;
b8d56208 1062
c906108c
SS
1063 do
1064 {
1065 resp_len = monitor_expect_prompt (buf, bufmax);
c5aa993b 1066 *ext_resp_len = resp_len;
c906108c
SS
1067
1068 if (resp_len <= 0)
3e43a32a
MS
1069 fprintf_unfiltered (gdb_stderr,
1070 "monitor_wait: excessive "
1071 "response from monitor: %s.", buf);
c906108c
SS
1072 }
1073 while (resp_len < 0);
1074
1075 /* Print any output characters that were preceded by ^O. */
025bb325 1076 /* FIXME - This would be great as a user settabgle flag. */
2df3850c
JM
1077 if (monitor_debug_p || remote_debug
1078 || current_monitor->flags & MO_PRINT_PROGRAM_OUTPUT)
c906108c
SS
1079 {
1080 int i;
1081
1082 for (i = 0; i < resp_len - 1; i++)
1083 if (buf[i] == 0x0f)
1084 putchar_unfiltered (buf[++i]);
1085 }
1086}
1087
1088
1089
1090/* Wait until the remote machine stops, then return, storing status in
1091 status just as `wait' would. */
1092
39f77062 1093static ptid_t
117de6a9 1094monitor_wait (struct target_ops *ops,
47608cb1 1095 ptid_t ptid, struct target_waitstatus *status, int options)
c906108c
SS
1096{
1097 int old_timeout = timeout;
d4f3574e 1098 char buf[TARGET_BUF_SIZE];
c906108c
SS
1099 int resp_len;
1100 struct cleanup *old_chain;
1101
1102 status->kind = TARGET_WAITKIND_EXITED;
1103 status->value.integer = 0;
1104
1105 old_chain = make_cleanup (monitor_wait_cleanup, &old_timeout);
2df3850c 1106 monitor_debug ("MON wait\n");
c906108c 1107
7a292a7a 1108#if 0
025bb325 1109 /* This is somthing other than a maintenance command. */
c5aa993b 1110 in_monitor_wait = 1;
c906108c
SS
1111 timeout = watchdog > 0 ? watchdog : -1;
1112#else
025bb325 1113 timeout = -1; /* Don't time out -- user program is running. */
c906108c
SS
1114#endif
1115
1116 ofunc = (void (*)()) signal (SIGINT, monitor_interrupt);
1117
1118 if (current_monitor->wait_filter)
c5aa993b
JM
1119 (*current_monitor->wait_filter) (buf, sizeof (buf), &resp_len, status);
1120 else
1121 monitor_wait_filter (buf, sizeof (buf), &resp_len, status);
1122
025bb325 1123#if 0 /* Transferred to monitor wait filter. */
c906108c
SS
1124 do
1125 {
1126 resp_len = monitor_expect_prompt (buf, sizeof (buf));
1127
1128 if (resp_len <= 0)
3e43a32a
MS
1129 fprintf_unfiltered (gdb_stderr,
1130 "monitor_wait: excessive "
1131 "response from monitor: %s.", buf);
c906108c
SS
1132 }
1133 while (resp_len < 0);
1134
1135 /* Print any output characters that were preceded by ^O. */
025bb325 1136 /* FIXME - This would be great as a user settabgle flag. */
2df3850c
JM
1137 if (monitor_debug_p || remote_debug
1138 || current_monitor->flags & MO_PRINT_PROGRAM_OUTPUT)
c906108c
SS
1139 {
1140 int i;
1141
1142 for (i = 0; i < resp_len - 1; i++)
1143 if (buf[i] == 0x0f)
1144 putchar_unfiltered (buf[++i]);
1145 }
c5aa993b 1146#endif
c906108c
SS
1147
1148 signal (SIGINT, ofunc);
1149
1150 timeout = old_timeout;
1151#if 0
1152 if (dump_reg_flag && current_monitor->dump_registers)
1153 {
1154 dump_reg_flag = 0;
1155 monitor_printf (current_monitor->dump_registers);
1156 resp_len = monitor_expect_prompt (buf, sizeof (buf));
1157 }
1158
1159 if (current_monitor->register_pattern)
594f7785 1160 parse_register_dump (get_current_regcache (), buf, resp_len);
c906108c 1161#else
2df3850c 1162 monitor_debug ("Wait fetching registers after stop\n");
594f7785 1163 monitor_dump_regs (get_current_regcache ());
c5aa993b 1164#endif
c906108c
SS
1165
1166 status->kind = TARGET_WAITKIND_STOPPED;
a493e3e2 1167 status->value.sig = GDB_SIGNAL_TRAP;
c906108c
SS
1168
1169 discard_cleanups (old_chain);
1170
1171 in_monitor_wait = 0;
1172
39f77062 1173 return inferior_ptid;
c906108c
SS
1174}
1175
025bb325 1176/* Fetch register REGNO, or all registers if REGNO is -1. Returns
c906108c
SS
1177 errno value. */
1178
1179static void
56be3814 1180monitor_fetch_register (struct regcache *regcache, int regno)
c906108c 1181{
444199e7 1182 const char *name;
86110418
MS
1183 char *zerobuf;
1184 char *regbuf;
c906108c
SS
1185 int i;
1186
d9d9c31f
AC
1187 regbuf = alloca (MAX_REGISTER_SIZE * 2 + 1);
1188 zerobuf = alloca (MAX_REGISTER_SIZE);
1189 memset (zerobuf, 0, MAX_REGISTER_SIZE);
86110418 1190
1c617db8
GS
1191 if (current_monitor->regname != NULL)
1192 name = current_monitor->regname (regno);
1193 else
1194 name = current_monitor->regnames[regno];
2df3850c 1195 monitor_debug ("MON fetchreg %d '%s'\n", regno, name ? name : "(null name)");
c906108c 1196
2df3850c 1197 if (!name || (*name == '\0'))
7a292a7a 1198 {
2df3850c 1199 monitor_debug ("No register known for %d\n", regno);
56be3814 1200 regcache_raw_supply (regcache, regno, zerobuf);
c906108c
SS
1201 return;
1202 }
1203
025bb325 1204 /* Send the register examine command. */
c906108c
SS
1205
1206 monitor_printf (current_monitor->getreg.cmd, name);
1207
1208 /* If RESP_DELIM is specified, we search for that as a leading
1209 delimiter for the register value. Otherwise, we just start
1210 searching from the start of the buf. */
1211
1212 if (current_monitor->getreg.resp_delim)
1213 {
2df3850c
JM
1214 monitor_debug ("EXP getreg.resp_delim\n");
1215 monitor_expect (current_monitor->getreg.resp_delim, NULL, 0);
c906108c
SS
1216 /* Handle case of first 32 registers listed in pairs. */
1217 if (current_monitor->flags & MO_32_REGS_PAIRED
7a292a7a 1218 && (regno & 1) != 0 && regno < 32)
c5aa993b 1219 {
2df3850c 1220 monitor_debug ("EXP getreg.resp_delim\n");
c906108c
SS
1221 monitor_expect (current_monitor->getreg.resp_delim, NULL, 0);
1222 }
1223 }
1224
025bb325 1225 /* Skip leading spaces and "0x" if MO_HEX_PREFIX flag is set. */
c5aa993b 1226 if (current_monitor->flags & MO_HEX_PREFIX)
c906108c
SS
1227 {
1228 int c;
b8d56208 1229
c906108c
SS
1230 c = readchar (timeout);
1231 while (c == ' ')
1232 c = readchar (timeout);
1233 if ((c == '0') && ((c = readchar (timeout)) == 'x'))
1234 ;
1235 else
3e43a32a
MS
1236 error (_("Bad value returned from monitor "
1237 "while fetching register %x."),
c5aa993b 1238 regno);
c906108c
SS
1239 }
1240
1241 /* Read upto the maximum number of hex digits for this register, skipping
1242 spaces, but stop reading if something else is seen. Some monitors
1243 like to drop leading zeros. */
1244
9b072297 1245 for (i = 0; i < register_size (get_regcache_arch (regcache), regno) * 2; i++)
c906108c
SS
1246 {
1247 int c;
b8d56208 1248
c906108c
SS
1249 c = readchar (timeout);
1250 while (c == ' ')
1251 c = readchar (timeout);
1252
1253 if (!isxdigit (c))
1254 break;
1255
1256 regbuf[i] = c;
1257 }
1258
025bb325 1259 regbuf[i] = '\000'; /* Terminate the number. */
2df3850c 1260 monitor_debug ("REGVAL '%s'\n", regbuf);
c906108c
SS
1261
1262 /* If TERM is present, we wait for that to show up. Also, (if TERM
1263 is present), we will send TERM_CMD if that is present. In any
1264 case, we collect all of the output into buf, and then wait for
1265 the normal prompt. */
1266
1267 if (current_monitor->getreg.term)
1268 {
2df3850c 1269 monitor_debug ("EXP getreg.term\n");
025bb325
MS
1270 monitor_expect (current_monitor->getreg.term, NULL, 0); /* Get
1271 response. */
c906108c
SS
1272 }
1273
1274 if (current_monitor->getreg.term_cmd)
c5aa993b 1275 {
2df3850c
JM
1276 monitor_debug ("EMIT getreg.term.cmd\n");
1277 monitor_printf (current_monitor->getreg.term_cmd);
c906108c 1278 }
c5aa993b 1279 if (!current_monitor->getreg.term || /* Already expected or */
025bb325
MS
1280 current_monitor->getreg.term_cmd) /* ack expected. */
1281 monitor_expect_prompt (NULL, 0); /* Get response. */
c906108c 1282
56be3814 1283 monitor_supply_register (regcache, regno, regbuf);
c906108c
SS
1284}
1285
025bb325 1286/* Sometimes, it takes several commands to dump the registers. */
c906108c 1287/* This is a primitive for use by variations of monitor interfaces in
025bb325
MS
1288 case they need to compose the operation. */
1289
c5aa993b 1290int
c410a84c 1291monitor_dump_reg_block (struct regcache *regcache, char *block_cmd)
c906108c 1292{
d4f3574e 1293 char buf[TARGET_BUF_SIZE];
c906108c 1294 int resp_len;
b8d56208 1295
c906108c
SS
1296 monitor_printf (block_cmd);
1297 resp_len = monitor_expect_prompt (buf, sizeof (buf));
c410a84c 1298 parse_register_dump (regcache, buf, resp_len);
c5aa993b 1299 return 1;
c906108c
SS
1300}
1301
1302
1303/* Read the remote registers into the block regs. */
025bb325 1304/* Call the specific function if it has been provided. */
c906108c
SS
1305
1306static void
c410a84c 1307monitor_dump_regs (struct regcache *regcache)
c906108c 1308{
d4f3574e 1309 char buf[TARGET_BUF_SIZE];
c906108c 1310 int resp_len;
b8d56208 1311
c906108c 1312 if (current_monitor->dumpregs)
025bb325
MS
1313 (*(current_monitor->dumpregs)) (regcache); /* Call supplied function. */
1314 else if (current_monitor->dump_registers) /* Default version. */
c5aa993b
JM
1315 {
1316 monitor_printf (current_monitor->dump_registers);
c906108c 1317 resp_len = monitor_expect_prompt (buf, sizeof (buf));
c410a84c 1318 parse_register_dump (regcache, buf, resp_len);
c906108c
SS
1319 }
1320 else
025bb325 1321 /* Need some way to read registers. */
3e43a32a
MS
1322 internal_error (__FILE__, __LINE__,
1323 _("failed internal consistency check"));
c906108c
SS
1324}
1325
1326static void
28439f5e
PA
1327monitor_fetch_registers (struct target_ops *ops,
1328 struct regcache *regcache, int regno)
c906108c 1329{
2df3850c 1330 monitor_debug ("MON fetchregs\n");
c5aa993b 1331 if (current_monitor->getreg.cmd)
c906108c
SS
1332 {
1333 if (regno >= 0)
1334 {
56be3814 1335 monitor_fetch_register (regcache, regno);
c906108c
SS
1336 return;
1337 }
1338
9b072297
UW
1339 for (regno = 0; regno < gdbarch_num_regs (get_regcache_arch (regcache));
1340 regno++)
56be3814 1341 monitor_fetch_register (regcache, regno);
c906108c 1342 }
c5aa993b
JM
1343 else
1344 {
56be3814 1345 monitor_dump_regs (regcache);
c5aa993b 1346 }
c906108c
SS
1347}
1348
1349/* Store register REGNO, or all if REGNO == 0. Return errno value. */
1350
1351static void
56be3814 1352monitor_store_register (struct regcache *regcache, int regno)
c906108c 1353{
5af949e3 1354 int reg_size = register_size (get_regcache_arch (regcache), regno);
444199e7 1355 const char *name;
d4f3574e 1356 ULONGEST val;
1c617db8
GS
1357
1358 if (current_monitor->regname != NULL)
1359 name = current_monitor->regname (regno);
1360 else
1361 name = current_monitor->regnames[regno];
1362
c906108c 1363 if (!name || (*name == '\0'))
c5aa993b 1364 {
2df3850c
JM
1365 monitor_debug ("MON Cannot store unknown register\n");
1366 return;
c906108c
SS
1367 }
1368
56be3814 1369 regcache_cooked_read_unsigned (regcache, regno, &val);
5af949e3 1370 monitor_debug ("MON storeg %d %s\n", regno, phex (val, reg_size));
c906108c 1371
025bb325 1372 /* Send the register deposit command. */
c906108c 1373
2df3850c 1374 if (current_monitor->flags & MO_REGISTER_VALUE_FIRST)
c906108c
SS
1375 monitor_printf (current_monitor->setreg.cmd, val, name);
1376 else if (current_monitor->flags & MO_SETREG_INTERACTIVE)
1377 monitor_printf (current_monitor->setreg.cmd, name);
1378 else
1379 monitor_printf (current_monitor->setreg.cmd, name, val);
1380
1456ad8e
AC
1381 if (current_monitor->setreg.resp_delim)
1382 {
1383 monitor_debug ("EXP setreg.resp_delim\n");
1384 monitor_expect_regexp (&setreg_resp_delim_pattern, NULL, 0);
1385 if (current_monitor->flags & MO_SETREG_INTERACTIVE)
5af949e3 1386 monitor_printf ("%s\r", phex_nz (val, reg_size));
1456ad8e 1387 }
c906108c 1388 if (current_monitor->setreg.term)
c5aa993b 1389 {
2df3850c
JM
1390 monitor_debug ("EXP setreg.term\n");
1391 monitor_expect (current_monitor->setreg.term, NULL, 0);
c906108c 1392 if (current_monitor->flags & MO_SETREG_INTERACTIVE)
5af949e3 1393 monitor_printf ("%s\r", phex_nz (val, reg_size));
c906108c
SS
1394 monitor_expect_prompt (NULL, 0);
1395 }
1396 else
1397 monitor_expect_prompt (NULL, 0);
025bb325 1398 if (current_monitor->setreg.term_cmd) /* Mode exit required. */
c5aa993b 1399 {
2df3850c 1400 monitor_debug ("EXP setreg_termcmd\n");
c5aa993b
JM
1401 monitor_printf ("%s", current_monitor->setreg.term_cmd);
1402 monitor_expect_prompt (NULL, 0);
c906108c 1403 }
c5aa993b 1404} /* monitor_store_register */
c906108c
SS
1405
1406/* Store the remote registers. */
1407
1408static void
28439f5e
PA
1409monitor_store_registers (struct target_ops *ops,
1410 struct regcache *regcache, int regno)
c906108c
SS
1411{
1412 if (regno >= 0)
1413 {
56be3814 1414 monitor_store_register (regcache, regno);
c906108c
SS
1415 return;
1416 }
1417
9b072297
UW
1418 for (regno = 0; regno < gdbarch_num_regs (get_regcache_arch (regcache));
1419 regno++)
56be3814 1420 monitor_store_register (regcache, regno);
c906108c
SS
1421}
1422
1423/* Get ready to modify the registers array. On machines which store
1424 individual registers, this doesn't need to do anything. On machines
1425 which store all the registers in one fell swoop, this makes sure
1426 that registers contains all the registers from the program being
1427 debugged. */
1428
1429static void
316f2060 1430monitor_prepare_to_store (struct regcache *regcache)
c906108c 1431{
025bb325 1432 /* Do nothing, since we can store individual regs. */
c906108c
SS
1433}
1434
1435static void
fba45db2 1436monitor_files_info (struct target_ops *ops)
c906108c 1437{
a3f17187 1438 printf_unfiltered (_("\tAttached to %s at %d baud.\n"), dev_name, baud_rate);
c906108c
SS
1439}
1440
1441static int
12ff8552 1442monitor_write_memory (CORE_ADDR memaddr, gdb_byte *myaddr, int len)
c906108c 1443{
f5656ead 1444 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
c5aa993b 1445 unsigned int val, hostval;
c906108c
SS
1446 char *cmd;
1447 int i;
1448
f5656ead 1449 monitor_debug ("MON write %d %s\n", len, paddress (target_gdbarch (), memaddr));
c906108c 1450
2df3850c 1451 if (current_monitor->flags & MO_ADDR_BITS_REMOVE)
f5656ead 1452 memaddr = gdbarch_addr_bits_remove (target_gdbarch (), memaddr);
c906108c
SS
1453
1454 /* Use memory fill command for leading 0 bytes. */
1455
1456 if (current_monitor->fill)
1457 {
1458 for (i = 0; i < len; i++)
1459 if (myaddr[i] != 0)
1460 break;
1461
025bb325 1462 if (i > 4) /* More than 4 zeros is worth doing. */
c906108c 1463 {
2df3850c
JM
1464 monitor_debug ("MON FILL %d\n", i);
1465 if (current_monitor->flags & MO_FILL_USES_ADDR)
3e43a32a
MS
1466 monitor_printf (current_monitor->fill, memaddr,
1467 (memaddr + i) - 1, 0);
c5aa993b
JM
1468 else
1469 monitor_printf (current_monitor->fill, memaddr, i, 0);
c906108c
SS
1470
1471 monitor_expect_prompt (NULL, 0);
1472
1473 return i;
1474 }
1475 }
1476
1477#if 0
1478 /* Can't actually use long longs if VAL is an int (nice idea, though). */
1479 if ((memaddr & 0x7) == 0 && len >= 8 && current_monitor->setmem.cmdll)
1480 {
1481 len = 8;
1482 cmd = current_monitor->setmem.cmdll;
1483 }
1484 else
1485#endif
1486 if ((memaddr & 0x3) == 0 && len >= 4 && current_monitor->setmem.cmdl)
1487 {
1488 len = 4;
1489 cmd = current_monitor->setmem.cmdl;
1490 }
1491 else if ((memaddr & 0x1) == 0 && len >= 2 && current_monitor->setmem.cmdw)
1492 {
1493 len = 2;
1494 cmd = current_monitor->setmem.cmdw;
1495 }
1496 else
1497 {
1498 len = 1;
1499 cmd = current_monitor->setmem.cmdb;
1500 }
1501
e17a4113 1502 val = extract_unsigned_integer (myaddr, len, byte_order);
c5aa993b 1503
c906108c 1504 if (len == 4)
c5aa993b
JM
1505 {
1506 hostval = *(unsigned int *) myaddr;
2df3850c 1507 monitor_debug ("Hostval(%08x) val(%08x)\n", hostval, val);
c906108c
SS
1508 }
1509
1510
1511 if (current_monitor->flags & MO_NO_ECHO_ON_SETMEM)
1512 monitor_printf_noecho (cmd, memaddr, val);
1513 else if (current_monitor->flags & MO_SETMEM_INTERACTIVE)
1514 {
c906108c
SS
1515 monitor_printf_noecho (cmd, memaddr);
1516
1456ad8e
AC
1517 if (current_monitor->setmem.resp_delim)
1518 {
1519 monitor_debug ("EXP setmem.resp_delim");
1520 monitor_expect_regexp (&setmem_resp_delim_pattern, NULL, 0);
1521 monitor_printf ("%x\r", val);
1522 }
c906108c 1523 if (current_monitor->setmem.term)
c5aa993b 1524 {
2df3850c 1525 monitor_debug ("EXP setmem.term");
c906108c
SS
1526 monitor_expect (current_monitor->setmem.term, NULL, 0);
1527 monitor_printf ("%x\r", val);
1528 }
1529 if (current_monitor->setmem.term_cmd)
025bb325 1530 { /* Emit this to get out of the memory editing state. */
c5aa993b 1531 monitor_printf ("%s", current_monitor->setmem.term_cmd);
025bb325 1532 /* Drop through to expecting a prompt. */
c906108c
SS
1533 }
1534 }
1535 else
1536 monitor_printf (cmd, memaddr, val);
1537
1538 monitor_expect_prompt (NULL, 0);
1539
1540 return len;
1541}
1542
1543
c5aa993b 1544static int
12ff8552 1545monitor_write_memory_bytes (CORE_ADDR memaddr, gdb_byte *myaddr, int len)
c906108c 1546{
c5aa993b
JM
1547 unsigned char val;
1548 int written = 0;
b8d56208 1549
c5aa993b
JM
1550 if (len == 0)
1551 return 0;
025bb325 1552 /* Enter the sub mode. */
c5aa993b
JM
1553 monitor_printf (current_monitor->setmem.cmdb, memaddr);
1554 monitor_expect_prompt (NULL, 0);
c906108c
SS
1555 while (len)
1556 {
c5aa993b
JM
1557 val = *myaddr;
1558 monitor_printf ("%x\r", val);
1559 myaddr++;
1560 memaddr++;
1561 written++;
025bb325 1562 /* If we wanted to, here we could validate the address. */
c5aa993b
JM
1563 monitor_expect_prompt (NULL, 0);
1564 len--;
c906108c 1565 }
025bb325 1566 /* Now exit the sub mode. */
c906108c 1567 monitor_printf (current_monitor->getreg.term_cmd);
c5aa993b
JM
1568 monitor_expect_prompt (NULL, 0);
1569 return written;
c906108c
SS
1570}
1571
1572
1573static void
c5aa993b 1574longlongendswap (unsigned char *a)
c906108c 1575{
c5aa993b
JM
1576 int i, j;
1577 unsigned char x;
b8d56208 1578
c5aa993b
JM
1579 i = 0;
1580 j = 7;
c906108c 1581 while (i < 4)
c5aa993b
JM
1582 {
1583 x = *(a + i);
1584 *(a + i) = *(a + j);
1585 *(a + j) = x;
1586 i++, j--;
c906108c
SS
1587 }
1588}
025bb325 1589/* Format 32 chars of long long value, advance the pointer. */
c5aa993b
JM
1590static char *hexlate = "0123456789abcdef";
1591static char *
1592longlong_hexchars (unsigned long long value,
1593 char *outbuff)
c906108c 1594{
c5aa993b
JM
1595 if (value == 0)
1596 {
1597 *outbuff++ = '0';
1598 return outbuff;
1599 }
c906108c 1600 else
c5aa993b
JM
1601 {
1602 static unsigned char disbuf[8]; /* disassembly buffer */
1603 unsigned char *scan, *limit; /* loop controls */
1604 unsigned char c, nib;
1605 int leadzero = 1;
b8d56208 1606
c5aa993b
JM
1607 scan = disbuf;
1608 limit = scan + 8;
1609 {
1610 unsigned long long *dp;
b8d56208 1611
c5aa993b
JM
1612 dp = (unsigned long long *) scan;
1613 *dp = value;
c906108c 1614 }
025bb325 1615 longlongendswap (disbuf); /* FIXME: ONly on big endian hosts. */
c906108c 1616 while (scan < limit)
7a292a7a 1617 {
025bb325 1618 c = *scan++; /* A byte of our long long value. */
c906108c 1619 if (leadzero)
7a292a7a
SS
1620 {
1621 if (c == 0)
1622 continue;
1623 else
025bb325 1624 leadzero = 0; /* Henceforth we print even zeroes. */
7a292a7a 1625 }
c5aa993b 1626 nib = c >> 4; /* high nibble bits */
7a292a7a 1627 *outbuff++ = hexlate[nib];
c5aa993b 1628 nib = c & 0x0f; /* low nibble bits */
7a292a7a 1629 *outbuff++ = hexlate[nib];
c906108c 1630 }
c5aa993b 1631 return outbuff;
c906108c 1632 }
c5aa993b 1633} /* longlong_hexchars */
c906108c
SS
1634
1635
1636
1637/* I am only going to call this when writing virtual byte streams.
025bb325
MS
1638 Which possably entails endian conversions. */
1639
c5aa993b 1640static int
12ff8552 1641monitor_write_memory_longlongs (CORE_ADDR memaddr, gdb_byte *myaddr, int len)
c906108c 1642{
025bb325 1643 static char hexstage[20]; /* At least 16 digits required, plus null. */
c5aa993b
JM
1644 char *endstring;
1645 long long *llptr;
1646 long long value;
1647 int written = 0;
b8d56208 1648
12ff8552 1649 llptr = (long long *) myaddr;
c5aa993b
JM
1650 if (len == 0)
1651 return 0;
1652 monitor_printf (current_monitor->setmem.cmdll, memaddr);
1653 monitor_expect_prompt (NULL, 0);
1654 while (len >= 8)
1655 {
1656 value = *llptr;
1657 endstring = longlong_hexchars (*llptr, hexstage);
025bb325 1658 *endstring = '\0'; /* NUll terminate for printf. */
c5aa993b
JM
1659 monitor_printf ("%s\r", hexstage);
1660 llptr++;
1661 memaddr += 8;
1662 written += 8;
025bb325 1663 /* If we wanted to, here we could validate the address. */
c5aa993b
JM
1664 monitor_expect_prompt (NULL, 0);
1665 len -= 8;
c906108c 1666 }
025bb325 1667 /* Now exit the sub mode. */
c906108c 1668 monitor_printf (current_monitor->getreg.term_cmd);
c5aa993b
JM
1669 monitor_expect_prompt (NULL, 0);
1670 return written;
1671} /* */
c906108c
SS
1672
1673
1674
1675/* ----- MONITOR_WRITE_MEMORY_BLOCK ---------------------------- */
1676/* This is for the large blocks of memory which may occur in downloading.
1677 And for monitors which use interactive entry,
1678 And for monitors which do not have other downloading methods.
1679 Without this, we will end up calling monitor_write_memory many times
1680 and do the entry and exit of the sub mode many times
1681 This currently assumes...
c5aa993b
JM
1682 MO_SETMEM_INTERACTIVE
1683 ! MO_NO_ECHO_ON_SETMEM
1684 To use this, the you have to patch the monitor_cmds block with
025bb325
MS
1685 this function. Otherwise, its not tuned up for use by all
1686 monitor variations. */
c906108c 1687
c5aa993b 1688static int
12ff8552 1689monitor_write_memory_block (CORE_ADDR memaddr, gdb_byte *myaddr, int len)
c906108c 1690{
c5aa993b 1691 int written;
b8d56208 1692
c5aa993b 1693 written = 0;
025bb325 1694 /* FIXME: This would be a good place to put the zero test. */
c5aa993b 1695#if 1
c906108c 1696 if ((len > 8) && (((len & 0x07)) == 0) && current_monitor->setmem.cmdll)
c5aa993b
JM
1697 {
1698 return monitor_write_memory_longlongs (memaddr, myaddr, len);
1699 }
c906108c 1700#endif
c5aa993b
JM
1701 written = monitor_write_memory_bytes (memaddr, myaddr, len);
1702 return written;
c906108c
SS
1703}
1704
1705/* This is an alternate form of monitor_read_memory which is used for monitors
1706 which can only read a single byte/word/etc. at a time. */
1707
1708static int
12ff8552 1709monitor_read_memory_single (CORE_ADDR memaddr, gdb_byte *myaddr, int len)
c906108c 1710{
f5656ead 1711 enum bfd_endian byte_order = gdbarch_byte_order (target_gdbarch ());
c906108c 1712 unsigned int val;
c5aa993b 1713 char membuf[sizeof (int) * 2 + 1];
c906108c
SS
1714 char *p;
1715 char *cmd;
c906108c 1716
2df3850c 1717 monitor_debug ("MON read single\n");
c906108c
SS
1718#if 0
1719 /* Can't actually use long longs (nice idea, though). In fact, the
1720 call to strtoul below will fail if it tries to convert a value
1721 that's too big to fit in a long. */
1722 if ((memaddr & 0x7) == 0 && len >= 8 && current_monitor->getmem.cmdll)
1723 {
1724 len = 8;
1725 cmd = current_monitor->getmem.cmdll;
1726 }
1727 else
1728#endif
1729 if ((memaddr & 0x3) == 0 && len >= 4 && current_monitor->getmem.cmdl)
1730 {
1731 len = 4;
1732 cmd = current_monitor->getmem.cmdl;
1733 }
1734 else if ((memaddr & 0x1) == 0 && len >= 2 && current_monitor->getmem.cmdw)
1735 {
1736 len = 2;
1737 cmd = current_monitor->getmem.cmdw;
1738 }
1739 else
1740 {
1741 len = 1;
1742 cmd = current_monitor->getmem.cmdb;
1743 }
1744
1745 /* Send the examine command. */
1746
1747 monitor_printf (cmd, memaddr);
1748
1749 /* If RESP_DELIM is specified, we search for that as a leading
1750 delimiter for the memory value. Otherwise, we just start
1751 searching from the start of the buf. */
1752
1753 if (current_monitor->getmem.resp_delim)
c5aa993b 1754 {
2df3850c 1755 monitor_debug ("EXP getmem.resp_delim\n");
c906108c
SS
1756 monitor_expect_regexp (&getmem_resp_delim_pattern, NULL, 0);
1757 }
1758
1759 /* Now, read the appropriate number of hex digits for this loc,
1760 skipping spaces. */
1761
025bb325 1762 /* Skip leading spaces and "0x" if MO_HEX_PREFIX flag is set. */
c5aa993b 1763 if (current_monitor->flags & MO_HEX_PREFIX)
c906108c
SS
1764 {
1765 int c;
1766
1767 c = readchar (timeout);
1768 while (c == ' ')
1769 c = readchar (timeout);
1770 if ((c == '0') && ((c = readchar (timeout)) == 'x'))
1771 ;
1772 else
2df3850c
JM
1773 monitor_error ("monitor_read_memory_single",
1774 "bad response from monitor",
93d56215 1775 memaddr, 0, NULL, 0);
c906108c 1776 }
c906108c 1777
93d56215
AC
1778 {
1779 int i;
b8d56208 1780
93d56215
AC
1781 for (i = 0; i < len * 2; i++)
1782 {
1783 int c;
c906108c 1784
93d56215
AC
1785 while (1)
1786 {
1787 c = readchar (timeout);
1788 if (isxdigit (c))
1789 break;
1790 if (c == ' ')
1791 continue;
1792
1793 monitor_error ("monitor_read_memory_single",
1794 "bad response from monitor",
1795 memaddr, i, membuf, 0);
1796 }
c906108c
SS
1797 membuf[i] = c;
1798 }
025bb325 1799 membuf[i] = '\000'; /* Terminate the number. */
93d56215 1800 }
c906108c
SS
1801
1802/* If TERM is present, we wait for that to show up. Also, (if TERM is
1803 present), we will send TERM_CMD if that is present. In any case, we collect
1804 all of the output into buf, and then wait for the normal prompt. */
1805
1806 if (current_monitor->getmem.term)
1807 {
025bb325
MS
1808 monitor_expect (current_monitor->getmem.term, NULL, 0); /* Get
1809 response. */
c906108c
SS
1810
1811 if (current_monitor->getmem.term_cmd)
1812 {
1813 monitor_printf (current_monitor->getmem.term_cmd);
1814 monitor_expect_prompt (NULL, 0);
1815 }
1816 }
1817 else
025bb325 1818 monitor_expect_prompt (NULL, 0); /* Get response. */
c906108c
SS
1819
1820 p = membuf;
1821 val = strtoul (membuf, &p, 16);
1822
1823 if (val == 0 && membuf == p)
2df3850c
JM
1824 monitor_error ("monitor_read_memory_single",
1825 "bad value from monitor",
c906108c
SS
1826 memaddr, 0, membuf, 0);
1827
025bb325 1828 /* supply register stores in target byte order, so swap here. */
c906108c 1829
e17a4113 1830 store_unsigned_integer (myaddr, len, byte_order, val);
c906108c
SS
1831
1832 return len;
1833}
1834
1835/* Copy LEN bytes of data from debugger memory at MYADDR to inferior's
1836 memory at MEMADDR. Returns length moved. Currently, we do no more
1837 than 16 bytes at a time. */
1838
1839static int
12ff8552 1840monitor_read_memory (CORE_ADDR memaddr, gdb_byte *myaddr, int len)
c906108c
SS
1841{
1842 unsigned int val;
1843 char buf[512];
1844 char *p, *p1;
1845 int resp_len;
1846 int i;
1847 CORE_ADDR dumpaddr;
1848
1849 if (len <= 0)
1850 {
2df3850c 1851 monitor_debug ("Zero length call to monitor_read_memory\n");
c906108c
SS
1852 return 0;
1853 }
1854
3329c4b5 1855 monitor_debug ("MON read block ta(%s) ha(%s) %d\n",
f5656ead 1856 paddress (target_gdbarch (), memaddr),
3329c4b5 1857 host_address_to_string (myaddr), len);
c906108c
SS
1858
1859 if (current_monitor->flags & MO_ADDR_BITS_REMOVE)
f5656ead 1860 memaddr = gdbarch_addr_bits_remove (target_gdbarch (), memaddr);
c906108c
SS
1861
1862 if (current_monitor->flags & MO_GETMEM_READ_SINGLE)
1863 return monitor_read_memory_single (memaddr, myaddr, len);
1864
1865 len = min (len, 16);
1866
177b42fe 1867 /* Some dumpers align the first data with the preceding 16
025bb325
MS
1868 byte boundary. Some print blanks and start at the
1869 requested boundary. EXACT_DUMPADDR */
c906108c
SS
1870
1871 dumpaddr = (current_monitor->flags & MO_EXACT_DUMPADDR)
c5aa993b 1872 ? memaddr : memaddr & ~0x0f;
c906108c
SS
1873
1874 /* See if xfer would cross a 16 byte boundary. If so, clip it. */
1875 if (((memaddr ^ (memaddr + len - 1)) & ~0xf) != 0)
1876 len = ((memaddr + len) & ~0xf) - memaddr;
1877
025bb325 1878 /* Send the memory examine command. */
c906108c
SS
1879
1880 if (current_monitor->flags & MO_GETMEM_NEEDS_RANGE)
7a292a7a 1881 monitor_printf (current_monitor->getmem.cmdb, memaddr, memaddr + len);
c906108c
SS
1882 else if (current_monitor->flags & MO_GETMEM_16_BOUNDARY)
1883 monitor_printf (current_monitor->getmem.cmdb, dumpaddr);
1884 else
1885 monitor_printf (current_monitor->getmem.cmdb, memaddr, len);
1886
1887 /* If TERM is present, we wait for that to show up. Also, (if TERM
1888 is present), we will send TERM_CMD if that is present. In any
1889 case, we collect all of the output into buf, and then wait for
1890 the normal prompt. */
1891
1892 if (current_monitor->getmem.term)
1893 {
3e43a32a 1894 resp_len = monitor_expect (current_monitor->getmem.term,
025bb325 1895 buf, sizeof buf); /* Get response. */
c906108c
SS
1896
1897 if (resp_len <= 0)
2df3850c
JM
1898 monitor_error ("monitor_read_memory",
1899 "excessive response from monitor",
c906108c
SS
1900 memaddr, resp_len, buf, 0);
1901
1902 if (current_monitor->getmem.term_cmd)
1903 {
2cd58942 1904 serial_write (monitor_desc, current_monitor->getmem.term_cmd,
c906108c
SS
1905 strlen (current_monitor->getmem.term_cmd));
1906 monitor_expect_prompt (NULL, 0);
1907 }
1908 }
1909 else
025bb325 1910 resp_len = monitor_expect_prompt (buf, sizeof buf); /* Get response. */
c906108c
SS
1911
1912 p = buf;
1913
1914 /* If RESP_DELIM is specified, we search for that as a leading
1915 delimiter for the values. Otherwise, we just start searching
1916 from the start of the buf. */
1917
1918 if (current_monitor->getmem.resp_delim)
1919 {
1920 int retval, tmp;
1921 struct re_registers resp_strings;
b8d56208 1922
3e43a32a
MS
1923 monitor_debug ("MON getmem.resp_delim %s\n",
1924 current_monitor->getmem.resp_delim);
c906108c
SS
1925
1926 memset (&resp_strings, 0, sizeof (struct re_registers));
1927 tmp = strlen (p);
1928 retval = re_search (&getmem_resp_delim_pattern, p, tmp, 0, tmp,
1929 &resp_strings);
1930
1931 if (retval < 0)
2df3850c
JM
1932 monitor_error ("monitor_read_memory",
1933 "bad response from monitor",
c906108c
SS
1934 memaddr, resp_len, buf, 0);
1935
1936 p += resp_strings.end[0];
1937#if 0
1938 p = strstr (p, current_monitor->getmem.resp_delim);
1939 if (!p)
2df3850c
JM
1940 monitor_error ("monitor_read_memory",
1941 "bad response from monitor",
c906108c
SS
1942 memaddr, resp_len, buf, 0);
1943 p += strlen (current_monitor->getmem.resp_delim);
1944#endif
1945 }
3329c4b5
PM
1946 monitor_debug ("MON scanning %d ,%s '%s'\n", len,
1947 host_address_to_string (p), p);
c906108c
SS
1948 if (current_monitor->flags & MO_GETMEM_16_BOUNDARY)
1949 {
c5aa993b
JM
1950 char c;
1951 int fetched = 0;
c906108c 1952 i = len;
c5aa993b 1953 c = *p;
c906108c 1954
c5aa993b
JM
1955
1956 while (!(c == '\000' || c == '\n' || c == '\r') && i > 0)
1957 {
1958 if (isxdigit (c))
1959 {
1960 if ((dumpaddr >= memaddr) && (i > 0))
1961 {
1962 val = fromhex (c) * 16 + fromhex (*(p + 1));
c906108c 1963 *myaddr++ = val;
2df3850c
JM
1964 if (monitor_debug_p || remote_debug)
1965 fprintf_unfiltered (gdb_stdlog, "[%02x]", val);
c906108c 1966 --i;
c5aa993b 1967 fetched++;
c906108c
SS
1968 }
1969 ++dumpaddr;
1970 ++p;
1971 }
025bb325 1972 ++p; /* Skip a blank or other non hex char. */
c5aa993b 1973 c = *p;
c906108c 1974 }
c5aa993b 1975 if (fetched == 0)
8a3fe4f8 1976 error (_("Failed to read via monitor"));
2df3850c
JM
1977 if (monitor_debug_p || remote_debug)
1978 fprintf_unfiltered (gdb_stdlog, "\n");
025bb325
MS
1979 return fetched; /* Return the number of bytes actually
1980 read. */
c906108c 1981 }
2df3850c 1982 monitor_debug ("MON scanning bytes\n");
c906108c
SS
1983
1984 for (i = len; i > 0; i--)
1985 {
025bb325 1986 /* Skip non-hex chars, but bomb on end of string and newlines. */
c906108c
SS
1987
1988 while (1)
1989 {
1990 if (isxdigit (*p))
1991 break;
1992
1993 if (*p == '\000' || *p == '\n' || *p == '\r')
2df3850c
JM
1994 monitor_error ("monitor_read_memory",
1995 "badly terminated response from monitor",
c906108c
SS
1996 memaddr, resp_len, buf, 0);
1997 p++;
1998 }
1999
2000 val = strtoul (p, &p1, 16);
2001
2002 if (val == 0 && p == p1)
2df3850c
JM
2003 monitor_error ("monitor_read_memory",
2004 "bad value from monitor",
c906108c
SS
2005 memaddr, resp_len, buf, 0);
2006
2007 *myaddr++ = val;
2008
2009 if (i == 1)
2010 break;
2011
2012 p = p1;
2013 }
2014
2015 return len;
2016}
2017
0e7e8d51 2018/* Transfer LEN bytes between target address MEMADDR and GDB address
025bb325
MS
2019 MYADDR. Returns 0 for success, errno code for failure. TARGET is
2020 unused. */
0e7e8d51 2021
c906108c 2022static int
18cf8b5b 2023monitor_xfer_memory (CORE_ADDR memaddr, gdb_byte *myaddr, int len, int write,
0a65a603 2024 struct mem_attrib *attrib, struct target_ops *target)
c906108c 2025{
4930751a
C
2026 int res;
2027
2028 if (write)
2029 {
2030 if (current_monitor->flags & MO_HAS_BLOCKWRITES)
2031 res = monitor_write_memory_block(memaddr, myaddr, len);
2032 else
2033 res = monitor_write_memory(memaddr, myaddr, len);
2034 }
2035 else
2036 {
2037 res = monitor_read_memory(memaddr, myaddr, len);
2038 }
2039
2040 return res;
c906108c
SS
2041}
2042
2043static void
7d85a9c0 2044monitor_kill (struct target_ops *ops)
c906108c 2045{
025bb325 2046 return; /* Ignore attempts to kill target system. */
c906108c
SS
2047}
2048
281b533b 2049/* All we actually do is set the PC to the start address of exec_bfd. */
c906108c
SS
2050
2051static void
136d6dae
VP
2052monitor_create_inferior (struct target_ops *ops, char *exec_file,
2053 char *args, char **env, int from_tty)
c906108c
SS
2054{
2055 if (args && (*args != '\000'))
8a3fe4f8 2056 error (_("Args are not supported by the monitor."));
c906108c
SS
2057
2058 first_time = 1;
2059 clear_proceed_status ();
fb14de7b
UW
2060 regcache_write_pc (get_current_regcache (),
2061 bfd_get_start_address (exec_bfd));
c906108c
SS
2062}
2063
2064/* Clean up when a program exits.
2065 The program actually lives on in the remote processor's RAM, and may be
2066 run again without a download. Don't leave it full of breakpoint
2067 instructions. */
2068
2069static void
136d6dae 2070monitor_mourn_inferior (struct target_ops *ops)
c906108c
SS
2071{
2072 unpush_target (targ_ops);
025bb325 2073 generic_mourn_inferior (); /* Do all the proper things now. */
5e0b29c1 2074 delete_thread_silent (monitor_ptid);
c906108c
SS
2075}
2076
c906108c
SS
2077/* Tell the monitor to add a breakpoint. */
2078
2079static int
a6d9a66e
UW
2080monitor_insert_breakpoint (struct gdbarch *gdbarch,
2081 struct bp_target_info *bp_tgt)
c906108c 2082{
8181d85f 2083 CORE_ADDR addr = bp_tgt->placed_address;
c906108c 2084 int i;
c906108c
SS
2085 int bplen;
2086
5af949e3 2087 monitor_debug ("MON inst bkpt %s\n", paddress (gdbarch, addr));
2df3850c 2088 if (current_monitor->set_break == NULL)
8a3fe4f8 2089 error (_("No set_break defined for this monitor"));
c906108c
SS
2090
2091 if (current_monitor->flags & MO_ADDR_BITS_REMOVE)
a6d9a66e 2092 addr = gdbarch_addr_bits_remove (gdbarch, addr);
c906108c
SS
2093
2094 /* Determine appropriate breakpoint size for this address. */
a6d9a66e 2095 gdbarch_breakpoint_from_pc (gdbarch, &addr, &bplen);
8181d85f
DJ
2096 bp_tgt->placed_address = addr;
2097 bp_tgt->placed_size = bplen;
c906108c 2098
9e086581 2099 for (i = 0; i < current_monitor->num_breakpoints; i++)
c906108c
SS
2100 {
2101 if (breakaddr[i] == 0)
2102 {
2103 breakaddr[i] = addr;
c906108c
SS
2104 monitor_printf (current_monitor->set_break, addr);
2105 monitor_expect_prompt (NULL, 0);
2106 return 0;
2107 }
2108 }
2109
3e43a32a
MS
2110 error (_("Too many breakpoints (> %d) for monitor."),
2111 current_monitor->num_breakpoints);
c906108c
SS
2112}
2113
2114/* Tell the monitor to remove a breakpoint. */
2115
2116static int
a6d9a66e
UW
2117monitor_remove_breakpoint (struct gdbarch *gdbarch,
2118 struct bp_target_info *bp_tgt)
c906108c 2119{
8181d85f 2120 CORE_ADDR addr = bp_tgt->placed_address;
c906108c
SS
2121 int i;
2122
5af949e3 2123 monitor_debug ("MON rmbkpt %s\n", paddress (gdbarch, addr));
2df3850c 2124 if (current_monitor->clr_break == NULL)
8a3fe4f8 2125 error (_("No clr_break defined for this monitor"));
c906108c 2126
9e086581 2127 for (i = 0; i < current_monitor->num_breakpoints; i++)
c906108c
SS
2128 {
2129 if (breakaddr[i] == addr)
2130 {
2131 breakaddr[i] = 0;
025bb325 2132 /* Some monitors remove breakpoints based on the address. */
c906108c
SS
2133 if (current_monitor->flags & MO_CLR_BREAK_USES_ADDR)
2134 monitor_printf (current_monitor->clr_break, addr);
2135 else if (current_monitor->flags & MO_CLR_BREAK_1_BASED)
2136 monitor_printf (current_monitor->clr_break, i + 1);
2137 else
2138 monitor_printf (current_monitor->clr_break, i);
2139 monitor_expect_prompt (NULL, 0);
2140 return 0;
2141 }
2142 }
2143 fprintf_unfiltered (gdb_stderr,
5af949e3
UW
2144 "Can't find breakpoint associated with %s\n",
2145 paddress (gdbarch, addr));
c906108c
SS
2146 return 1;
2147}
2148
2149/* monitor_wait_srec_ack -- wait for the target to send an acknowledgement for
2150 an S-record. Return non-zero if the ACK is received properly. */
2151
2152static int
fba45db2 2153monitor_wait_srec_ack (void)
c906108c 2154{
d4f3574e 2155 int ch;
c906108c
SS
2156
2157 if (current_monitor->flags & MO_SREC_ACK_PLUS)
2158 {
2159 return (readchar (timeout) == '+');
2160 }
2161 else if (current_monitor->flags & MO_SREC_ACK_ROTATE)
2162 {
2163 /* Eat two backspaces, a "rotating" char (|/-\), and a space. */
2164 if ((ch = readchar (1)) < 0)
2165 return 0;
2166 if ((ch = readchar (1)) < 0)
2167 return 0;
2168 if ((ch = readchar (1)) < 0)
2169 return 0;
2170 if ((ch = readchar (1)) < 0)
2171 return 0;
2172 }
2173 return 1;
2174}
2175
025bb325 2176/* monitor_load -- download a file. */
c906108c
SS
2177
2178static void
40e397df 2179monitor_load (char *args, int from_tty)
c906108c 2180{
61a672f1
PA
2181 CORE_ADDR load_offset = 0;
2182 char **argv;
2183 struct cleanup *old_cleanups;
2184 char *filename;
c906108c 2185
61a672f1 2186 monitor_debug ("MON load\n");
40e397df 2187
61a672f1
PA
2188 if (args == NULL)
2189 error_no_arg (_("file to load"));
40e397df 2190
61a672f1
PA
2191 argv = gdb_buildargv (args);
2192 old_cleanups = make_cleanup_freeargv (argv);
40e397df 2193
61a672f1
PA
2194 filename = tilde_expand (argv[0]);
2195 make_cleanup (xfree, filename);
c906108c 2196
61a672f1
PA
2197 /* Enable user to specify address for downloading as 2nd arg to load. */
2198 if (argv[1] != NULL)
2199 {
2200 const char *endptr;
40e397df 2201
61a672f1 2202 load_offset = strtoulst (argv[1], &endptr, 0);
40e397df 2203
61a672f1
PA
2204 /* If the last word was not a valid number then
2205 treat it as a file name with spaces in. */
2206 if (argv[1] == endptr)
2207 error (_("Invalid download offset:%s."), argv[1]);
40e397df 2208
61a672f1
PA
2209 if (argv[2] != NULL)
2210 error (_("Too many parameters."));
2211 }
c906108c 2212
61a672f1
PA
2213 monitor_printf (current_monitor->load);
2214 if (current_monitor->loadresp)
2215 monitor_expect (current_monitor->loadresp, NULL, 0);
c906108c 2216
61a672f1
PA
2217 load_srec (monitor_desc, filename, load_offset,
2218 32, SREC_ALL, hashmark,
2219 current_monitor->flags & MO_SREC_ACK ?
2220 monitor_wait_srec_ack : NULL);
c906108c 2221
61a672f1 2222 monitor_expect_prompt (NULL, 0);
40e397df 2223
61a672f1 2224 do_cleanups (old_cleanups);
c906108c 2225
025bb325 2226 /* Finally, make the PC point at the start address. */
c906108c 2227 if (exec_bfd)
fb14de7b
UW
2228 regcache_write_pc (get_current_regcache (),
2229 bfd_get_start_address (exec_bfd));
c906108c 2230
e8816aac
JB
2231 /* There used to be code here which would clear inferior_ptid and
2232 call clear_symtab_users. None of that should be necessary:
2233 monitor targets should behave like remote protocol targets, and
2234 since generic_load does none of those things, this function
2235 shouldn't either.
2236
2237 Furthermore, clearing inferior_ptid is *incorrect*. After doing
2238 a load, we still have a valid connection to the monitor, with a
2239 live processor state to fiddle with. The user can type
2240 `continue' or `jump *start' and make the program run. If they do
2241 these things, however, GDB will be talking to a running program
2242 while inferior_ptid is null_ptid; this makes things like
2243 reinit_frame_cache very confused. */
c906108c
SS
2244}
2245
2246static void
f9c72d52 2247monitor_stop (ptid_t ptid)
c906108c 2248{
2df3850c 2249 monitor_debug ("MON stop\n");
c906108c 2250 if ((current_monitor->flags & MO_SEND_BREAK_ON_STOP) != 0)
2cd58942 2251 serial_send_break (monitor_desc);
c906108c
SS
2252 if (current_monitor->stop)
2253 monitor_printf_noecho (current_monitor->stop);
2254}
2255
96baa820 2256/* Put a COMMAND string out to MONITOR. Output from MONITOR is placed
025bb325 2257 in OUTPUT until the prompt is seen. FIXME: We read the characters
96baa820 2258 ourseleves here cause of a nasty echo. */
c906108c
SS
2259
2260static void
96baa820 2261monitor_rcmd (char *command,
d9fcf2fb 2262 struct ui_file *outbuf)
c906108c
SS
2263{
2264 char *p;
2265 int resp_len;
2266 char buf[1000];
2267
2268 if (monitor_desc == NULL)
8a3fe4f8 2269 error (_("monitor target not open."));
c906108c
SS
2270
2271 p = current_monitor->prompt;
2272
2273 /* Send the command. Note that if no args were supplied, then we're
2274 just sending the monitor a newline, which is sometimes useful. */
2275
96baa820 2276 monitor_printf ("%s\r", (command ? command : ""));
c906108c
SS
2277
2278 resp_len = monitor_expect_prompt (buf, sizeof buf);
2279
025bb325 2280 fputs_unfiltered (buf, outbuf); /* Output the response. */
c906108c
SS
2281}
2282
2283/* Convert hex digit A to a number. */
2284
2285#if 0
2286static int
fba45db2 2287from_hex (int a)
c5aa993b 2288{
c906108c
SS
2289 if (a >= '0' && a <= '9')
2290 return a - '0';
2291 if (a >= 'a' && a <= 'f')
2292 return a - 'a' + 10;
2293 if (a >= 'A' && a <= 'F')
2294 return a - 'A' + 10;
2295
8a3fe4f8 2296 error (_("Reply contains invalid hex digit 0x%x"), a);
c906108c
SS
2297}
2298#endif
2299
2300char *
fba45db2 2301monitor_get_dev_name (void)
c906108c
SS
2302{
2303 return dev_name;
2304}
2305
5e0b29c1
PA
2306/* Check to see if a thread is still alive. */
2307
2308static int
28439f5e 2309monitor_thread_alive (struct target_ops *ops, ptid_t ptid)
5e0b29c1
PA
2310{
2311 if (ptid_equal (ptid, monitor_ptid))
2312 /* The monitor's task is always alive. */
2313 return 1;
2314
2315 return 0;
2316}
2317
2318/* Convert a thread ID to a string. Returns the string in a static
2319 buffer. */
2320
2321static char *
117de6a9 2322monitor_pid_to_str (struct target_ops *ops, ptid_t ptid)
5e0b29c1
PA
2323{
2324 static char buf[64];
2325
2326 if (ptid_equal (monitor_ptid, ptid))
2327 {
2328 xsnprintf (buf, sizeof buf, "Thread <main>");
2329 return buf;
2330 }
2331
2332 return normal_pid_to_str (ptid);
2333}
2334
c906108c
SS
2335static struct target_ops monitor_ops;
2336
2337static void
2338init_base_monitor_ops (void)
2339{
c906108c 2340 monitor_ops.to_close = monitor_close;
c906108c 2341 monitor_ops.to_detach = monitor_detach;
c906108c
SS
2342 monitor_ops.to_resume = monitor_resume;
2343 monitor_ops.to_wait = monitor_wait;
c906108c
SS
2344 monitor_ops.to_fetch_registers = monitor_fetch_registers;
2345 monitor_ops.to_store_registers = monitor_store_registers;
2346 monitor_ops.to_prepare_to_store = monitor_prepare_to_store;
c8e73a31 2347 monitor_ops.deprecated_xfer_memory = monitor_xfer_memory;
c906108c
SS
2348 monitor_ops.to_files_info = monitor_files_info;
2349 monitor_ops.to_insert_breakpoint = monitor_insert_breakpoint;
2350 monitor_ops.to_remove_breakpoint = monitor_remove_breakpoint;
c906108c
SS
2351 monitor_ops.to_kill = monitor_kill;
2352 monitor_ops.to_load = monitor_load;
c906108c 2353 monitor_ops.to_create_inferior = monitor_create_inferior;
c906108c 2354 monitor_ops.to_mourn_inferior = monitor_mourn_inferior;
c906108c 2355 monitor_ops.to_stop = monitor_stop;
96baa820 2356 monitor_ops.to_rcmd = monitor_rcmd;
49d03eab 2357 monitor_ops.to_log_command = serial_log_command;
5e0b29c1
PA
2358 monitor_ops.to_thread_alive = monitor_thread_alive;
2359 monitor_ops.to_pid_to_str = monitor_pid_to_str;
c906108c 2360 monitor_ops.to_stratum = process_stratum;
c35b1492
PA
2361 monitor_ops.to_has_all_memory = default_child_has_all_memory;
2362 monitor_ops.to_has_memory = default_child_has_memory;
2363 monitor_ops.to_has_stack = default_child_has_stack;
2364 monitor_ops.to_has_registers = default_child_has_registers;
2365 monitor_ops.to_has_execution = default_child_has_execution;
c906108c 2366 monitor_ops.to_magic = OPS_MAGIC;
c5aa993b 2367} /* init_base_monitor_ops */
c906108c 2368
025bb325 2369/* Init the target_ops structure pointed at by OPS. */
c906108c
SS
2370
2371void
fba45db2 2372init_monitor_ops (struct target_ops *ops)
c906108c
SS
2373{
2374 if (monitor_ops.to_magic != OPS_MAGIC)
2375 init_base_monitor_ops ();
2376
2377 memcpy (ops, &monitor_ops, sizeof monitor_ops);
2378}
2379
2380/* Define additional commands that are usually only used by monitors. */
2381
3e43a32a
MS
2382/* -Wmissing-prototypes */
2383extern initialize_file_ftype _initialize_remote_monitors;
a78f21af 2384
c906108c 2385void
fba45db2 2386_initialize_remote_monitors (void)
c906108c
SS
2387{
2388 init_base_monitor_ops ();
5bf193a2
AC
2389 add_setshow_boolean_cmd ("hash", no_class, &hashmark, _("\
2390Set display of activity while downloading a file."), _("\
2391Show display of activity while downloading a file."), _("\
2392When enabled, a hashmark \'#\' is displayed."),
2393 NULL,
2394 NULL, /* FIXME: i18n: */
2395 &setlist, &showlist);
2df3850c 2396
ccce17b0 2397 add_setshow_zuinteger_cmd ("monitor", no_class, &monitor_debug_p, _("\
85c07804
AC
2398Set debugging of remote monitor communication."), _("\
2399Show debugging of remote monitor communication."), _("\
2df3850c 2400When enabled, communication between GDB and the remote monitor\n\
85c07804 2401is displayed."),
ccce17b0
YQ
2402 NULL,
2403 NULL, /* FIXME: i18n: */
2404 &setdebuglist, &showdebuglist);
5e0b29c1
PA
2405
2406 /* Yes, 42000 is arbitrary. The only sense out of it, is that it
2407 isn't 0. */
2408 monitor_ptid = ptid_build (42000, 0, 42000);
c906108c 2409}
This page took 1.399027 seconds and 4 git commands to generate.