* valprint.c (print_longest): Fix a syntax error in #ifdef
[deliverable/binutils-gdb.git] / gdb / remote-pa.c
CommitLineData
2e0fa11c
RS
1/* Remote target communications for serial-line targets in custom GDB protocol
2 Copyright 1988, 1991, 1992, 1993, 1994 Free Software Foundation, Inc.
3
4This file is part of GDB.
5
6This program is free software; you can redistribute it and/or modify
7it under the terms of the GNU General Public License as published by
8the Free Software Foundation; either version 2 of the License, or
9(at your option) any later version.
10
11This program is distributed in the hope that it will be useful,
12but WITHOUT ANY WARRANTY; without even the implied warranty of
13MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14GNU General Public License for more details.
15
16You should have received a copy of the GNU General Public License
17along with this program; if not, write to the Free Software
18Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
19
20/* Remote communication protocol.
21
22 A debug packet whose contents are <data>
23 is encapsulated for transmission in the form:
24
25 $ <data> # CSUM1 CSUM2
26
27 <data> must be ASCII alphanumeric and cannot include characters
28 '$' or '#'. If <data> starts with two characters followed by
29 ':', then the existing stubs interpret this as a sequence number.
30
31 CSUM1 and CSUM2 are ascii hex representation of an 8-bit
32 checksum of <data>, the most significant nibble is sent first.
33 the hex digits 0-9,a-f are used.
34
35 Receiver responds with:
36
37 + - if CSUM is correct and ready for next packet
38 - - if CSUM is incorrect
39
40 <data> is as follows:
41 All values are encoded in ascii hex digits.
42
43 Request Packet
44
45 read registers g
46 reply XX....X Each byte of register data
47 is described by two hex digits.
48 Registers are in the internal order
49 for GDB, and the bytes in a register
50 are in the same order the machine uses.
51 or ENN for an error.
52
53 write regs GXX..XX Each byte of register data
54 is described by two hex digits.
55 reply OK for success
56 ENN for an error
57
58 write reg Pn...=r... Write register n... with value r...,
59 which contains two hex digits for each
60 byte in the register (target byte
61 order).
62 reply OK for success
63 ENN for an error
64 (not supported by all stubs).
65
66 read mem mAA..AA,LLLL AA..AA is address, LLLL is length.
67 reply XX..XX XX..XX is mem contents
68 Can be fewer bytes than requested
69 if able to read only part of the data.
70 or ENN NN is errno
71
72 write mem MAA..AA,LLLL:XX..XX
73 AA..AA is address,
74 LLLL is number of bytes,
75 XX..XX is data
76 reply OK for success
77 ENN for an error (this includes the case
78 where only part of the data was
79 written).
80
81 cont cAA..AA AA..AA is address to resume
82 If AA..AA is omitted,
83 resume at same address.
84
85 step sAA..AA AA..AA is address to resume
86 If AA..AA is omitted,
87 resume at same address.
88
89 last signal ? Reply the current reason for stopping.
90 This is the same reply as is generated
91 for step or cont : SAA where AA is the
92 signal number.
93
94 There is no immediate reply to step or cont.
95 The reply comes when the machine stops.
96 It is SAA AA is the "signal number"
97
98 or... TAAn...:r...;n:r...;n...:r...;
99 AA = signal number
100 n... = register number
101 r... = register contents
102 or... WAA The process exited, and AA is
103 the exit status. This is only
104 applicable for certains sorts of
105 targets.
106 kill request k
107
108 toggle debug d toggle debug flag (see 386 & 68k stubs)
109 reset r reset -- see sparc stub.
110 reserved <other> On other requests, the stub should
111 ignore the request and send an empty
112 response ($#<checksum>). This way
113 we can extend the protocol and GDB
114 can tell whether the stub it is
115 talking to uses the old or the new.
116 search tAA:PP,MM Search backwards starting at address
117 AA for a match with pattern PP and
118 mask MM. PP and MM are 4 bytes.
119 Not supported by all stubs.
120
121 general query qXXXX Request info about XXXX.
122 general set QXXXX=yyyy Set value of XXXX to yyyy.
123 query sect offs qOffsets Get section offsets. Reply is
124 Text=xxx;Data=yyy;Bss=zzz
125 console output Otext Send text to stdout. Only comes from
126 remote target.
127
128 Responses can be run-length encoded to save space. A '*' means that
129 the next character is an ASCII encoding giving a repeat count which
130 stands for that many repititions of the character preceding the '*'.
131 The encoding is n+29, yielding a printable character where n >=3
132 (which is where rle starts to win). Don't use an n > 126.
133
134 So
135 "0* " means the same as "0000". */
136
137#include "defs.h"
138#include <string.h>
139#include <fcntl.h>
140#include "frame.h"
141#include "inferior.h"
142#include "bfd.h"
143#include "symfile.h"
144#include "target.h"
145#include "wait.h"
146#include "terminal.h"
147#include "gdbcmd.h"
148#include "objfiles.h"
149#include "gdb-stabs.h"
4682251b 150#include "remote-utils.h"
2e0fa11c
RS
151#include "dcache.h"
152
153#ifdef USG
154#include <sys/types.h>
155#endif
156
157#include <signal.h>
158#include "serial.h"
159
160/* Prototypes for local functions */
161
162static int
163remote_write_bytes PARAMS ((CORE_ADDR memaddr, unsigned char *myaddr, int len));
164
165static int
166remote_read_bytes PARAMS ((CORE_ADDR memaddr, unsigned char *myaddr, int len));
167
168static void
169remote_files_info PARAMS ((struct target_ops *ignore));
170
171static int
172remote_xfer_memory PARAMS ((CORE_ADDR memaddr, char *myaddr, int len,
173 int should_write, struct target_ops *target));
174
175static void
176remote_prepare_to_store PARAMS ((void));
177
178static void
179remote_fetch_registers PARAMS ((int regno));
180
181static void
182remote_resume PARAMS ((int pid, int step, enum target_signal siggnal));
183
184static int
185remote_start_remote PARAMS ((char *dummy));
186
187static void
188remote_open PARAMS ((char *name, int from_tty));
189
190static void
191remote_close PARAMS ((int quitting));
192
193static void
194remote_store_registers PARAMS ((int regno));
195
196static void
197getpkt PARAMS ((char *buf, int forever));
198
199static void
200putpkt PARAMS ((char *buf));
201
202static void
203remote_send PARAMS ((char *buf));
204
205static int
206readchar PARAMS ((int timeout));
207
4682251b
RS
208static int
209remote_wait PARAMS ((int pid, struct target_waitstatus *status));
2e0fa11c
RS
210
211static int
212tohex PARAMS ((int nib));
213
214static int
215fromhex PARAMS ((int a));
216
217static void
218remote_detach PARAMS ((char *args, int from_tty));
219
220static void
221remote_interrupt PARAMS ((int signo));
222
223static void
224remote_interrupt_twice PARAMS ((int signo));
225
226static void
227interrupt_query PARAMS ((void));
228
4682251b
RS
229static void
230hppro_load PARAMS ((char *name, int from_tty));
231
2e0fa11c
RS
232extern struct target_ops remote_ops; /* Forward decl */
233
234/* This was 5 seconds, which is a long time to sit and wait.
235 Unless this is going though some terminal server or multiplexer or
236 other form of hairy serial connection, I would think 2 seconds would
237 be plenty. */
238static int remote_timeout = 2;
239
2e0fa11c
RS
240/* Descriptor for I/O to remote machine. Initialize it to NULL so that
241 remote_open knows that we don't have a file open when the program
242 starts. */
4682251b 243extern serial_t remote_desc;
2e0fa11c
RS
244
245/* Having this larger than 400 causes us to be incompatible with m68k-stub.c
246 and i386-stub.c. Normally, no one would notice because it only matters
247 for writing large chunks of memory (e.g. in downloads). Also, this needs
248 to be more than 400 if required to hold the registers (see below, where
249 we round it up based on REGISTER_BYTES). */
250#define PBUFSIZ 400
251
252/* Maximum number of bytes to read/write at once. The value here
253 is chosen to fill up a packet (the headers account for the 32). */
254#define MAXBUFBYTES ((PBUFSIZ-32)/2)
255
256/* Round up PBUFSIZ to hold all the registers, at least. */
257/* The blank line after the #if seems to be required to work around a
258 bug in HP's PA compiler. */
259#if REGISTER_BYTES > MAXBUFBYTES
260
261#undef PBUFSIZ
262#define PBUFSIZ (REGISTER_BYTES * 2 + 32)
263#endif
264
265/* Should we try the 'P' request? If this is set to one when the stub
266 doesn't support 'P', the only consequence is some unnecessary traffic. */
267static int stub_supports_P = 1;
268
4682251b
RS
269/* sets the download protocol, choices are srec, generic, boot */
270char *loadtype;
271static char *loadtype_str;
272static void set_loadtype_command
273PARAMS ((char *, int, struct cmd_list_element *));
274
275static void
276hppro_load (file, from_tty)
277 char *file;
278 int from_tty;
279{
280 puts ("Loading... HA!");
281}
282
2e0fa11c
RS
283\f
284/* Clean up connection to a remote debugger. */
285
286/* ARGSUSED */
287static void
288remote_close (quitting)
289 int quitting;
290{
4682251b
RS
291 if (remote_desc)
292 SERIAL_CLOSE (remote_desc);
293 remote_desc = NULL;
2e0fa11c
RS
294}
295
296/* Query the remote side for the text, data and bss offsets. */
297
298static void
299get_offsets ()
300{
301 unsigned char buf[PBUFSIZ];
302 int nvals;
303 CORE_ADDR text_addr, data_addr, bss_addr;
304 struct section_offsets *offs;
305
306 putpkt ("qOffsets");
307
308 getpkt (buf, 0);
309
310 if (buf[0] == '\000')
311 return; /* Return silently. Stub doesn't support this
312 command. */
313 if (buf[0] == 'E')
314 {
315 warning ("Remote failure reply: %s", buf);
316 return;
317 }
318
319 nvals = sscanf (buf, "Text=%lx;Data=%lx;Bss=%lx", &text_addr, &data_addr,
320 &bss_addr);
321 if (nvals != 3)
322 error ("Malformed response to offset query, %s", buf);
323
324 if (symfile_objfile == NULL)
325 return;
326
327 offs = (struct section_offsets *) alloca (sizeof (struct section_offsets)
328 + symfile_objfile->num_sections
329 * sizeof (offs->offsets));
330 memcpy (offs, symfile_objfile->section_offsets,
331 sizeof (struct section_offsets)
332 + symfile_objfile->num_sections
333 * sizeof (offs->offsets));
334
335 /* FIXME: This code assumes gdb-stabs.h is being used; it's broken
336 for xcoff, dwarf, sdb-coff, etc. But there is no simple
337 canonical representation for this stuff. (Just what does "text"
338 as seen by the stub mean, anyway? I think it means all sections
339 with SEC_CODE set, but we currently have no way to deal with that). */
340
341 ANOFFSET (offs, SECT_OFF_TEXT) = text_addr;
342
343 /* This is a temporary kludge to force data and bss to use the same offsets
344 because that's what nlmconv does now. The real solution requires changes
345 to the stub and remote.c that I don't have time to do right now. */
346
347 ANOFFSET (offs, SECT_OFF_DATA) = data_addr;
348 ANOFFSET (offs, SECT_OFF_BSS) = data_addr;
349
350 objfile_relocate (symfile_objfile, offs);
351}
352
4682251b 353#define INBUFSIZE 10
2e0fa11c 354
4682251b
RS
355void
356boot_board()
357{
358 char c;
359 char buf[INBUFSIZE];
360 char *ptr;
361
362 /* See if we can connect to the boot ROM command line */
363 ptr = buf;
364 while (1) {
365 SERIAL_WRITE (remote_desc, "\r\n", 2);
366 c = readchar (2);
367 if ((sr_get_debug() > 2) && (isascii(c)))
368 putchar (c);
369 if (c == SERIAL_TIMEOUT) {
370 if (sr_get_debug())
371 puts_filtered ("Timed out.\n");
372 break;
373 }
374 if (c == '&') {
375 if (sr_get_debug() > 2)
376 puts ("Got ACK from stub");
377 break;
378 }
379 if (c == '>') {
380 if (sr_get_debug() > 2)
381 puts ("Got prompt from ROM monitor");
382 break;
383 }
384 }
385
386}
387
388/* Stub for catch_errors. */
2e0fa11c
RS
389static int
390remote_start_remote (dummy)
391 char *dummy;
392{
4682251b
RS
393 int timeout;
394
2e0fa11c
RS
395 immediate_quit = 1; /* Allow user to interrupt it */
396
397 /* Ack any packet which the remote side has already sent. */
398
4682251b
RS
399 if (sr_get_debug())
400 puts ("Trying a '+' to ACK the target.");
401
402 SERIAL_WRITE (remote_desc, "+", 1);
403
404#if 0
405 boot_board();
2e0fa11c
RS
406
407 get_offsets (); /* Get text, data & bss offsets */
4682251b 408#endif
2e0fa11c
RS
409
410 putpkt ("?"); /* initiate a query from remote machine */
411 immediate_quit = 0;
412
413 start_remote (); /* Initialize gdb process mechanisms */
414
415 return 1;
416}
417
418/* Open a connection to a remote debugger.
419 NAME is the filename used for communication. */
420
421static DCACHE *remote_dcache;
422
423static void
424remote_open (name, from_tty)
425 char *name;
426 int from_tty;
427{
428 if (name == 0)
429 error (
430"To open a remote debug connection, you need to specify what serial\n\
431device is attached to the remote system (e.g. /dev/ttya).");
432
433 target_preopen (from_tty);
434
435 unpush_target (&remote_ops);
436
437 remote_dcache = dcache_init (remote_read_bytes, remote_write_bytes);
438
4682251b
RS
439 remote_desc = SERIAL_OPEN (name);
440 if (!remote_desc)
2e0fa11c
RS
441 perror_with_name (name);
442
443 if (baud_rate != -1)
444 {
4682251b 445 if (SERIAL_SETBAUDRATE (remote_desc, baud_rate))
2e0fa11c 446 {
4682251b 447 SERIAL_CLOSE (remote_desc);
2e0fa11c
RS
448 perror_with_name (name);
449 }
450 }
451
4682251b 452 SERIAL_RAW (remote_desc);
2e0fa11c
RS
453
454 /* If there is something sitting in the buffer we might take it as a
455 response to a command, which would be bad. */
4682251b 456 SERIAL_FLUSH_INPUT (remote_desc);
2e0fa11c
RS
457
458 if (from_tty)
459 {
460 puts_filtered ("Remote debugging using ");
461 puts_filtered (name);
462 puts_filtered ("\n");
463 }
464 push_target (&remote_ops); /* Switch to using remote target now */
465
466 /* Start out by trying the 'P' request to set registers. We set this each
467 time that we open a new target so that if the user switches from one
468 stub to another, we can (if the target is closed and reopened) cope. */
469 stub_supports_P = 1;
470
471 /* Without this, some commands which require an active target (such as kill)
472 won't work. This variable serves (at least) double duty as both the pid
473 of the target process (if it has such), and as a flag indicating that a
474 target is active. These functions should be split out into seperate
475 variables, especially since GDB will someday have a notion of debugging
476 several processes. */
477
478 inferior_pid = 42000;
479
480 /* Start the remote connection; if error (0), discard this target.
481 In particular, if the user quits, be sure to discard it
482 (we'd be in an inconsistent state otherwise). */
483 if (!catch_errors (remote_start_remote, (char *)0,
484 "Couldn't establish connection to remote target\n", RETURN_MASK_ALL))
485 pop_target();
486}
487
488/* remote_detach()
489 takes a program previously attached to and detaches it.
490 We better not have left any breakpoints
491 in the program or it'll die when it hits one.
492 Close the open connection to the remote debugger.
493 Use this when you want to detach and do something else
494 with your gdb. */
495
496static void
497remote_detach (args, from_tty)
498 char *args;
499 int from_tty;
500{
501 if (args)
502 error ("Argument given to \"detach\" when remotely debugging.");
503
504 pop_target ();
505 if (from_tty)
506 puts_filtered ("Ending remote debugging.\n");
507}
508
509/* Convert hex digit A to a number. */
510
511static int
512fromhex (a)
513 int a;
514{
515 if (a >= '0' && a <= '9')
516 return a - '0';
517 else if (a >= 'a' && a <= 'f')
518 return a - 'a' + 10;
519 else
520 error ("Reply contains invalid hex digit");
521}
522
523/* Convert number NIB to a hex digit. */
524
525static int
526tohex (nib)
527 int nib;
528{
529 if (nib < 10)
530 return '0'+nib;
531 else
532 return 'a'+nib-10;
533}
534\f
535/* Tell the remote machine to resume. */
536
537static void
538remote_resume (pid, step, siggnal)
539 int pid, step;
540 enum target_signal siggnal;
541{
542 char buf[PBUFSIZ];
543
544 if (siggnal)
545 {
546 target_terminal_ours_for_output ();
547 printf_filtered
548 ("Can't send signals to a remote system. %s not sent.\n",
4682251b 549 target_signal_to_name (siggnal)); target_terminal_inferior ();
2e0fa11c
RS
550 }
551
552 dcache_flush (remote_dcache);
553
554 strcpy (buf, step ? "s": "c");
555
556 putpkt (buf);
557}
558\f
559/* Send ^C to target to halt it. Target will respond, and send us a
560 packet. */
561
562static void
563remote_interrupt (signo)
564 int signo;
565{
566 /* If this doesn't work, try more severe steps. */
567 signal (signo, remote_interrupt_twice);
568
569 if (remote_debug)
570 printf_unfiltered ("remote_interrupt called\n");
571
4682251b 572 SERIAL_WRITE (remote_desc, "\003", 1); /* Send a ^C */
2e0fa11c
RS
573}
574
575static void (*ofunc)();
576
577/* The user typed ^C twice. */
578static void
579remote_interrupt_twice (signo)
580 int signo;
581{
582 signal (signo, ofunc);
583
584 interrupt_query ();
585
586 signal (signo, remote_interrupt);
587}
588
589/* Ask the user what to do when an interrupt is received. */
590
591static void
592interrupt_query ()
593{
594 target_terminal_ours ();
595
596 if (query ("Interrupted while waiting for the program.\n\
597Give up (and stop debugging it)? "))
598 {
599 target_mourn_inferior ();
600 return_to_top_level (RETURN_QUIT);
601 }
602
603 target_terminal_inferior ();
604}
605
606/* Wait until the remote machine stops, then return,
607 storing status in STATUS just as `wait' would.
608 Returns "pid" (though it's not clear what, if anything, that
609 means in the case of this target). */
610
611static int
612remote_wait (pid, status)
613 int pid;
614 struct target_waitstatus *status;
615{
616 unsigned char buf[PBUFSIZ];
617
618 status->kind = TARGET_WAITKIND_EXITED;
619 status->value.integer = 0;
620
621 while (1)
622 {
623 unsigned char *p;
624
625 ofunc = (void (*)()) signal (SIGINT, remote_interrupt);
626 getpkt ((char *) buf, 1);
627 signal (SIGINT, ofunc);
628
629 switch (buf[0])
630 {
631 case 'E': /* Error of some sort */
632 warning ("Remote failure reply: %s", buf);
633 continue;
634 case 'T': /* Status with PC, SP, FP, ... */
635 {
636 int i;
637 long regno;
638 char regs[MAX_REGISTER_RAW_SIZE];
639
640 /* Expedited reply, containing Signal, {regno, reg} repeat */
641 /* format is: 'Tssn...:r...;n...:r...;n...:r...;#cc', where
642 ss = signal number
643 n... = register number
644 r... = register contents
645 */
646
647 p = &buf[3]; /* after Txx */
648
649 while (*p)
650 {
651 unsigned char *p1;
652
653 regno = strtol (p, &p1, 16); /* Read the register number */
654
655 if (p1 == p)
656 warning ("Remote sent badly formed register number: %s\nPacket: '%s'\n",
657 p1, buf);
658
659 p = p1;
660
661 if (*p++ != ':')
662 warning ("Malformed packet (missing colon): %s\nPacket: '%s'\n",
663 p, buf);
664
665 if (regno >= NUM_REGS)
666 warning ("Remote sent bad register number %d: %s\nPacket: '%s'\n",
667 regno, p, buf);
668
669 for (i = 0; i < REGISTER_RAW_SIZE (regno); i++)
670 {
671 if (p[0] == 0 || p[1] == 0)
672 warning ("Remote reply is too short: %s", buf);
673 regs[i] = fromhex (p[0]) * 16 + fromhex (p[1]);
674 p += 2;
675 }
676
677 if (*p++ != ';')
678 warning ("Remote register badly formatted: %s", buf);
679
680 supply_register (regno, regs);
681 }
682 }
683 /* fall through */
684 case 'S': /* Old style status, just signal only */
685 status->kind = TARGET_WAITKIND_STOPPED;
686 status->value.sig = (enum target_signal)
687 (((fromhex (buf[1])) << 4) + (fromhex (buf[2])));
688
689 return inferior_pid;
690 case 'W': /* Target exited */
691 {
692 /* The remote process exited. */
693 status->kind = TARGET_WAITKIND_EXITED;
694 status->value.integer = (fromhex (buf[1]) << 4) + fromhex (buf[2]);
695 return inferior_pid;
696 }
697 case 'O': /* Console output */
698 fputs_filtered (buf + 1, gdb_stdout);
699 continue;
700 default:
701 warning ("Invalid remote reply: %s", buf);
702 continue;
703 }
704 }
705 return inferior_pid;
706}
707
708/* Number of bytes of registers this stub implements. */
709static int register_bytes_found;
710
711/* Read the remote registers into the block REGS. */
712/* Currently we just read all the registers, so we don't use regno. */
713/* ARGSUSED */
714static void
715remote_fetch_registers (regno)
716 int regno;
717{
718 char buf[PBUFSIZ];
719 int i;
720 char *p;
721 char regs[REGISTER_BYTES];
722
723 sprintf (buf, "g");
724 remote_send (buf);
725
726 /* Unimplemented registers read as all bits zero. */
727 memset (regs, 0, REGISTER_BYTES);
728
729 /* We can get out of synch in various cases. If the first character
730 in the buffer is not a hex character, assume that has happened
731 and try to fetch another packet to read. */
732 while ((buf[0] < '0' || buf[0] > '9')
733 && (buf[0] < 'a' || buf[0] > 'f'))
734 {
735 if (remote_debug)
736 printf_unfiltered ("Bad register packet; fetching a new packet\n");
737 getpkt (buf, 0);
738 }
739
740 /* Reply describes registers byte by byte, each byte encoded as two
741 hex characters. Suck them all up, then supply them to the
742 register cacheing/storage mechanism. */
743
744 p = buf;
745 for (i = 0; i < REGISTER_BYTES; i++)
746 {
747 if (p[0] == 0)
748 break;
749 if (p[1] == 0)
750 {
751 warning ("Remote reply is of odd length: %s", buf);
752 /* Don't change register_bytes_found in this case, and don't
753 print a second warning. */
754 goto supply_them;
755 }
756 regs[i] = fromhex (p[0]) * 16 + fromhex (p[1]);
757 p += 2;
758 }
759
760 if (i != register_bytes_found)
761 {
762 register_bytes_found = i;
763#ifdef REGISTER_BYTES_OK
764 if (!REGISTER_BYTES_OK (i))
765 warning ("Remote reply is too short: %s", buf);
766#endif
767 }
768
769 supply_them:
770 for (i = 0; i < NUM_REGS; i++)
771 supply_register (i, &regs[REGISTER_BYTE(i)]);
772}
773
774/* Prepare to store registers. Since we may send them all (using a
775 'G' request), we have to read out the ones we don't want to change
776 first. */
777
778static void
779remote_prepare_to_store ()
780{
781 /* Make sure the entire registers array is valid. */
782 read_register_bytes (0, (char *)NULL, REGISTER_BYTES);
783}
784
785/* Store register REGNO, or all registers if REGNO == -1, from the contents
786 of REGISTERS. FIXME: ignores errors. */
787
788static void
789remote_store_registers (regno)
790 int regno;
791{
792 char buf[PBUFSIZ];
793 int i;
794 char *p;
795
796 if (regno >= 0 && stub_supports_P)
797 {
798 /* Try storing a single register. */
799 char *regp;
800
801 sprintf (buf, "P%x=", regno);
802 p = buf + strlen (buf);
803 regp = &registers[REGISTER_BYTE (regno)];
804 for (i = 0; i < REGISTER_RAW_SIZE (regno); ++i)
805 {
806 *p++ = tohex ((regp[i] >> 4) & 0xf);
807 *p++ = tohex (regp[i] & 0xf);
808 }
809 *p = '\0';
810 remote_send (buf);
811 if (buf[0] != '\0')
812 {
813 /* The stub understands the 'P' request. We are done. */
814 return;
815 }
816
817 /* The stub does not support the 'P' request. Use 'G' instead,
818 and don't try using 'P' in the future (it will just waste our
819 time). */
820 stub_supports_P = 0;
821 }
822
823 buf[0] = 'G';
824
825 /* Command describes registers byte by byte,
826 each byte encoded as two hex characters. */
827
828 p = buf + 1;
829 /* remote_prepare_to_store insures that register_bytes_found gets set. */
830 for (i = 0; i < register_bytes_found; i++)
831 {
832 *p++ = tohex ((registers[i] >> 4) & 0xf);
833 *p++ = tohex (registers[i] & 0xf);
834 }
835 *p = '\0';
836
837 remote_send (buf);
838}
839
840#if 0
841
842/* Use of the data cache is disabled because it loses for looking at
843 and changing hardware I/O ports and the like. Accepting `volatile'
ba6ef5e5
JK
844 would perhaps be one way to fix it. Another idea would be to use the
845 executable file for the text segment (for all SEC_CODE sections?
846 For all SEC_READONLY sections?). This has problems if you want to
847 actually see what the memory contains (e.g. self-modifying code,
848 clobbered memory, user downloaded the wrong thing). */
2e0fa11c
RS
849
850/* Read a word from remote address ADDR and return it.
851 This goes through the data cache. */
852
853static int
854remote_fetch_word (addr)
855 CORE_ADDR addr;
856{
2e0fa11c
RS
857 return dcache_fetch (remote_dcache, addr);
858}
859
860/* Write a word WORD into remote address ADDR.
861 This goes through the data cache. */
862
863static void
864remote_store_word (addr, word)
865 CORE_ADDR addr;
866 int word;
867{
868 dcache_poke (remote_dcache, addr, word);
869}
870#endif /* 0 */
871\f
872/* Write memory data directly to the remote machine.
873 This does not inform the data cache; the data cache uses this.
874 MEMADDR is the address in the remote memory space.
875 MYADDR is the address of the buffer in our space.
876 LEN is the number of bytes.
877
878 Returns number of bytes transferred, or 0 for error. */
879
880static int
881remote_write_bytes (memaddr, myaddr, len)
882 CORE_ADDR memaddr;
883 unsigned char *myaddr;
884 int len;
885{
886 char buf[PBUFSIZ];
887 int i;
888 char *p;
889
890 /* FIXME-32x64: Need a version of print_address_numeric which puts the
891 result in a buffer like sprintf. */
892 sprintf (buf, "M%lx,%x:", (unsigned long) memaddr, len);
893
894 /* We send target system values byte by byte, in increasing byte addresses,
895 each byte encoded as two hex characters. */
896
897 p = buf + strlen (buf);
898 for (i = 0; i < len; i++)
899 {
900 *p++ = tohex ((myaddr[i] >> 4) & 0xf);
901 *p++ = tohex (myaddr[i] & 0xf);
902 }
903 *p = '\0';
904
905 putpkt (buf);
906 getpkt (buf, 0);
907
908 if (buf[0] == 'E')
909 {
910 /* There is no correspondance between what the remote protocol uses
911 for errors and errno codes. We would like a cleaner way of
912 representing errors (big enough to include errno codes, bfd_error
913 codes, and others). But for now just return EIO. */
914 errno = EIO;
915 return 0;
916 }
917 return len;
918}
919
920/* Read memory data directly from the remote machine.
921 This does not use the data cache; the data cache uses this.
922 MEMADDR is the address in the remote memory space.
923 MYADDR is the address of the buffer in our space.
924 LEN is the number of bytes.
925
926 Returns number of bytes transferred, or 0 for error. */
927
928static int
929remote_read_bytes (memaddr, myaddr, len)
930 CORE_ADDR memaddr;
931 unsigned char *myaddr;
932 int len;
933{
934 char buf[PBUFSIZ];
935 int i;
936 char *p;
937
938 if (len > PBUFSIZ / 2 - 1)
939 abort ();
940
941 /* FIXME-32x64: Need a version of print_address_numeric which puts the
942 result in a buffer like sprintf. */
943 sprintf (buf, "m%lx,%x", (unsigned long) memaddr, len);
944 putpkt (buf);
945 getpkt (buf, 0);
946
947 if (buf[0] == 'E')
948 {
949 /* There is no correspondance between what the remote protocol uses
950 for errors and errno codes. We would like a cleaner way of
951 representing errors (big enough to include errno codes, bfd_error
952 codes, and others). But for now just return EIO. */
953 errno = EIO;
954 return 0;
955 }
956
957 /* Reply describes memory byte by byte,
958 each byte encoded as two hex characters. */
959
960 p = buf;
961 for (i = 0; i < len; i++)
962 {
963 if (p[0] == 0 || p[1] == 0)
964 /* Reply is short. This means that we were able to read only part
965 of what we wanted to. */
966 break;
967 myaddr[i] = fromhex (p[0]) * 16 + fromhex (p[1]);
968 p += 2;
969 }
970 return i;
971}
972\f
973/* Read or write LEN bytes from inferior memory at MEMADDR, transferring
974 to or from debugger address MYADDR. Write to inferior if SHOULD_WRITE is
975 nonzero. Returns length of data written or read; 0 for error. */
976
977/* ARGSUSED */
978static int
979remote_xfer_memory(memaddr, myaddr, len, should_write, target)
980 CORE_ADDR memaddr;
981 char *myaddr;
982 int len;
983 int should_write;
984 struct target_ops *target; /* ignored */
985{
986 int xfersize;
987 int bytes_xferred;
988 int total_xferred = 0;
989
990 while (len > 0)
991 {
992 if (len > MAXBUFBYTES)
993 xfersize = MAXBUFBYTES;
994 else
995 xfersize = len;
996
997 if (should_write)
998 bytes_xferred = remote_write_bytes (memaddr,
999 (unsigned char *)myaddr, xfersize);
1000 else
1001 bytes_xferred = remote_read_bytes (memaddr,
1002 (unsigned char *)myaddr, xfersize);
1003
1004 /* If we get an error, we are done xferring. */
1005 if (bytes_xferred == 0)
1006 break;
1007
1008 memaddr += bytes_xferred;
1009 myaddr += bytes_xferred;
1010 len -= bytes_xferred;
1011 total_xferred += bytes_xferred;
1012 }
1013 return total_xferred;
1014}
1015
1016#if 0
1017/* Enable after 4.12. */
1018
1019void
1020remote_search (len, data, mask, startaddr, increment, lorange, hirange
1021 addr_found, data_found)
1022 int len;
1023 char *data;
1024 char *mask;
1025 CORE_ADDR startaddr;
1026 int increment;
1027 CORE_ADDR lorange;
1028 CORE_ADDR hirange;
1029 CORE_ADDR *addr_found;
1030 char *data_found;
1031{
1032 if (increment == -4 && len == 4)
1033 {
1034 long mask_long, data_long;
1035 long data_found_long;
1036 CORE_ADDR addr_we_found;
1037 char buf[PBUFSIZ];
1038 long returned_long[2];
1039 char *p;
1040
1041 mask_long = extract_unsigned_integer (mask, len);
1042 data_long = extract_unsigned_integer (data, len);
1043 sprintf (buf, "t%x:%x,%x", startaddr, data_long, mask_long);
1044 putpkt (buf);
1045 getpkt (buf, 0);
1046 if (buf[0] == '\0')
1047 {
1048 /* The stub doesn't support the 't' request. We might want to
1049 remember this fact, but on the other hand the stub could be
1050 switched on us. Maybe we should remember it only until
1051 the next "target remote". */
1052 generic_search (len, data, mask, startaddr, increment, lorange,
1053 hirange, addr_found, data_found);
1054 return;
1055 }
1056
1057 if (buf[0] == 'E')
1058 /* There is no correspondance between what the remote protocol uses
1059 for errors and errno codes. We would like a cleaner way of
1060 representing errors (big enough to include errno codes, bfd_error
1061 codes, and others). But for now just use EIO. */
1062 memory_error (EIO, startaddr);
1063 p = buf;
1064 addr_we_found = 0;
1065 while (*p != '\0' && *p != ',')
1066 addr_we_found = (addr_we_found << 4) + fromhex (*p++);
1067 if (*p == '\0')
1068 error ("Protocol error: short return for search");
1069
1070 data_found_long = 0;
1071 while (*p != '\0' && *p != ',')
1072 data_found_long = (data_found_long << 4) + fromhex (*p++);
1073 /* Ignore anything after this comma, for future extensions. */
1074
1075 if (addr_we_found < lorange || addr_we_found >= hirange)
1076 {
1077 *addr_found = 0;
1078 return;
1079 }
1080
1081 *addr_found = addr_we_found;
1082 *data_found = store_unsigned_integer (data_we_found, len);
1083 return;
1084 }
1085 generic_search (len, data, mask, startaddr, increment, lorange,
1086 hirange, addr_found, data_found);
1087}
1088#endif /* 0 */
1089\f
1090static void
1091remote_files_info (ignore)
1092 struct target_ops *ignore;
1093{
1094 puts_filtered ("Debugging a target over a serial line.\n");
1095}
1096\f
1097/* Stuff for dealing with the packets which are part of this protocol.
1098 See comment at top of file for details. */
1099
1100/* Read a single character from the remote end, masking it down to 7 bits. */
1101
1102static int
1103readchar (timeout)
1104 int timeout;
1105{
1106 int ch;
1107
4682251b 1108 ch = SERIAL_READCHAR (remote_desc, timeout);
2e0fa11c
RS
1109
1110 switch (ch)
1111 {
1112 case SERIAL_EOF:
1113 error ("Remote connection closed");
1114 case SERIAL_ERROR:
1115 perror_with_name ("Remote communication error");
1116 case SERIAL_TIMEOUT:
1117 return ch;
1118 default:
1119 return ch & 0x7f;
1120 }
1121}
1122
1123/* Send the command in BUF to the remote machine,
1124 and read the reply into BUF.
1125 Report an error if we get an error reply. */
1126
1127static void
1128remote_send (buf)
1129 char *buf;
1130{
1131
1132 putpkt (buf);
1133 getpkt (buf, 0);
1134
1135 if (buf[0] == 'E')
1136 error ("Remote failure reply: %s", buf);
1137}
1138
1139/* Send a packet to the remote machine, with error checking.
1140 The data of the packet is in BUF. */
2e0fa11c
RS
1141static void
1142putpkt (buf)
1143 char *buf;
1144{
1145 int i;
1146 unsigned char csum = 0;
1147 char buf2[PBUFSIZ];
1148 int cnt = strlen (buf);
1149 int ch;
1150 char *p;
1151
1152 /* Copy the packet into buffer BUF2, encapsulating it
1153 and giving it a checksum. */
1154
1155 if (cnt > sizeof(buf2) - 5) /* Prosanity check */
1156 abort();
1157
1158 p = buf2;
1159 *p++ = '$';
1160
1161 for (i = 0; i < cnt; i++)
1162 {
1163 csum += buf[i];
1164 *p++ = buf[i];
1165 }
1166 *p++ = '#';
1167 *p++ = tohex ((csum >> 4) & 0xf);
1168 *p++ = tohex (csum & 0xf);
1169
1170 /* Send it over and over until we get a positive ack. */
1171
1172 while (1)
1173 {
1174 int started_error_output = 0;
1175
1176 if (remote_debug)
1177 {
1178 *p = '\0';
1179 printf_unfiltered ("Sending packet: %s...", buf2);
1180 gdb_flush(gdb_stdout);
1181 }
4682251b 1182 if (SERIAL_WRITE (remote_desc, buf2, p - buf2))
2e0fa11c
RS
1183 perror_with_name ("putpkt: write failed");
1184
1185 /* read until either a timeout occurs (-2) or '+' is read */
1186 while (1)
1187 {
1188 ch = readchar (remote_timeout);
1189
1190 if (remote_debug)
1191 {
1192 switch (ch)
1193 {
1194 case '+':
1195 case SERIAL_TIMEOUT:
1196 case '$':
1197 if (started_error_output)
1198 {
7baea946 1199 putchar_unfiltered ('\n');
2e0fa11c
RS
1200 started_error_output = 0;
1201 }
1202 }
1203 }
1204
1205 switch (ch)
1206 {
1207 case '+':
1208 if (remote_debug)
4682251b 1209 printf_unfiltered("Got Ack\n");
2e0fa11c
RS
1210 return;
1211 case SERIAL_TIMEOUT:
1212 break; /* Retransmit buffer */
1213 case '$':
1214 {
1215 unsigned char junkbuf[PBUFSIZ];
1216
1217 /* It's probably an old response, and we're out of sync. Just
1218 gobble up the packet and ignore it. */
1219 getpkt (junkbuf, 0);
1220 continue; /* Now, go look for + */
1221 }
1222 default:
1223 if (remote_debug)
1224 {
1225 if (!started_error_output)
1226 {
1227 started_error_output = 1;
1228 printf_unfiltered ("putpkt: Junk: ");
1229 }
7baea946 1230 putchar_unfiltered (ch & 0177);
2e0fa11c
RS
1231 }
1232 continue;
1233 }
1234 break; /* Here to retransmit */
1235 }
1236
1237#if 0
1238 /* This is wrong. If doing a long backtrace, the user should be
1239 able to get out next time we call QUIT, without anything as violent
1240 as interrupt_query. If we want to provide a way out of here
1241 without getting to the next QUIT, it should be based on hitting
1242 ^C twice as in remote_wait. */
1243 if (quit_flag)
1244 {
1245 quit_flag = 0;
1246 interrupt_query ();
1247 }
1248#endif
1249 }
1250}
1251
1252/* Come here after finding the start of the frame. Collect the rest into BUF,
1253 verifying the checksum, length, and handling run-length compression.
1254 Returns 0 on any error, 1 on success. */
1255
1256static int
1257read_frame (buf)
1258 char *buf;
1259{
1260 unsigned char csum;
1261 char *bp;
1262 int c;
1263
1264 csum = 0;
1265 bp = buf;
1266
1267 while (1)
1268 {
1269 c = readchar (remote_timeout);
1270
1271 switch (c)
1272 {
1273 case SERIAL_TIMEOUT:
1274 if (remote_debug)
1275 puts_filtered ("Timeout in mid-packet, retrying\n");
1276 return 0;
1277 case '$':
1278 if (remote_debug)
1279 puts_filtered ("Saw new packet start in middle of old one\n");
1280 return 0; /* Start a new packet, count retries */
1281 case '#':
1282 {
1283 unsigned char pktcsum;
1284
1285 *bp = '\000';
1286
1287 pktcsum = fromhex (readchar (remote_timeout)) << 4;
1288 pktcsum |= fromhex (readchar (remote_timeout));
1289
1290 if (csum == pktcsum)
1291 return 1;
1292
1293 printf_filtered ("Bad checksum, sentsum=0x%x, csum=0x%x, buf=",
1294 pktcsum, csum);
1295 puts_filtered (buf);
1296 puts_filtered ("\n");
1297
1298 return 0;
1299 }
1300 case '*': /* Run length encoding */
1301 csum += c;
1302 c = readchar (remote_timeout);
1303 csum += c;
1304 c = c - ' ' + 3; /* Compute repeat count */
1305
1306 if (bp + c - 1 < buf + PBUFSIZ - 1)
1307 {
1308 memset (bp, *(bp - 1), c);
1309 bp += c;
1310 continue;
1311 }
1312
1313 *bp = '\0';
1314 printf_filtered ("Repeat count %d too large for buffer: ", c);
1315 puts_filtered (buf);
1316 puts_filtered ("\n");
1317 return 0;
1318
1319 default:
1320 if (bp < buf + PBUFSIZ - 1)
1321 {
1322 *bp++ = c;
1323 csum += c;
1324 continue;
1325 }
1326
1327 *bp = '\0';
1328 puts_filtered ("Remote packet too long: ");
1329 puts_filtered (buf);
1330 puts_filtered ("\n");
1331
1332 return 0;
1333 }
1334 }
1335}
1336
1337/* Read a packet from the remote machine, with error checking,
1338 and store it in BUF. BUF is expected to be of size PBUFSIZ.
1339 If FOREVER, wait forever rather than timing out; this is used
1340 while the target is executing user code. */
1341
1342static void
1343getpkt (buf, forever)
1344 char *buf;
1345 int forever;
1346{
1347 char *bp;
1348 int c;
1349 int tries;
1350 int timeout;
1351 int val;
1352
1353 if (forever)
1354 timeout = -1;
1355 else
1356 timeout = remote_timeout;
1357
1358#define MAX_TRIES 10
1359
1360 for (tries = 1; tries <= MAX_TRIES; tries++)
1361 {
1362 /* This can loop forever if the remote side sends us characters
1363 continuously, but if it pauses, we'll get a zero from readchar
1364 because of timeout. Then we'll count that as a retry. */
1365
1366 /* Note that we will only wait forever prior to the start of a packet.
1367 After that, we expect characters to arrive at a brisk pace. They
1368 should show up within remote_timeout intervals. */
1369
1370 do
1371 {
1372 c = readchar (timeout);
1373
1374 if (c == SERIAL_TIMEOUT)
1375 {
1376 if (remote_debug)
1377 puts_filtered ("Timed out.\n");
1378 goto retry;
1379 }
1380 }
1381 while (c != '$');
1382
1383 /* We've found the start of a packet, now collect the data. */
1384
1385 val = read_frame (buf);
1386
1387 if (val == 1)
1388 {
1389 if (remote_debug)
1390 fprintf_unfiltered (gdb_stderr, "Packet received: %s\n", buf);
4682251b 1391 SERIAL_WRITE (remote_desc, "+", 1);
2e0fa11c
RS
1392 return;
1393 }
1394
1395 /* Try the whole thing again. */
1396retry:
4682251b 1397 SERIAL_WRITE (remote_desc, "-", 1);
2e0fa11c
RS
1398 }
1399
1400 /* We have tried hard enough, and just can't receive the packet. Give up. */
1401
1402 printf_unfiltered ("Ignoring packet error, continuing...\n");
4682251b 1403 SERIAL_WRITE (remote_desc, "+", 1);
2e0fa11c
RS
1404}
1405\f
1406static void
1407remote_kill ()
1408{
1409 putpkt ("k");
1410 /* Don't wait for it to die. I'm not really sure it matters whether
1411 we do or not. For the existing stubs, kill is a noop. */
1412 target_mourn_inferior ();
1413}
1414
1415static void
1416remote_mourn ()
1417{
1418 unpush_target (&remote_ops);
1419 generic_mourn_inferior ();
1420}
1421\f
1422#ifdef REMOTE_BREAKPOINT
1423
1424/* On some machines, e.g. 68k, we may use a different breakpoint instruction
1425 than other targets. */
1426static unsigned char break_insn[] = REMOTE_BREAKPOINT;
1427
1428/* Check that it fits in BREAKPOINT_MAX bytes. */
1429static unsigned char check_break_insn_size[BREAKPOINT_MAX] = REMOTE_BREAKPOINT;
1430
1431#else /* No REMOTE_BREAKPOINT. */
1432
1433/* Same old breakpoint instruction. This code does nothing different
1434 than mem-break.c. */
1435static unsigned char break_insn[] = BREAKPOINT;
1436
1437#endif /* No REMOTE_BREAKPOINT. */
1438
1439/* Insert a breakpoint on targets that don't have any better breakpoint
1440 support. We read the contents of the target location and stash it,
1441 then overwrite it with a breakpoint instruction. ADDR is the target
1442 location in the target machine. CONTENTS_CACHE is a pointer to
1443 memory allocated for saving the target contents. It is guaranteed
1444 by the caller to be long enough to save sizeof BREAKPOINT bytes (this
1445 is accomplished via BREAKPOINT_MAX). */
1446
1447static int
1448remote_insert_breakpoint (addr, contents_cache)
1449 CORE_ADDR addr;
1450 char *contents_cache;
1451{
1452 int val;
1453
1454 val = target_read_memory (addr, contents_cache, sizeof break_insn);
1455
1456 if (val == 0)
1457 val = target_write_memory (addr, (char *)break_insn, sizeof break_insn);
1458
1459 return val;
1460}
1461
1462static int
1463remote_remove_breakpoint (addr, contents_cache)
1464 CORE_ADDR addr;
1465 char *contents_cache;
1466{
1467 return target_write_memory (addr, contents_cache, sizeof break_insn);
1468}
1469\f
1470/* Define the target subroutine names */
1471
7765123d
RS
1472struct target_ops remote_hppro_ops = {
1473 "hppro", /* to_shortname */
4682251b 1474 "Remote serial target for HP-PRO targets", /* to_longname */
2e0fa11c 1475 "Use a remote computer via a serial line, using a gdb-specific protocol.\n\
4682251b
RS
1476This is for targets that supports the HP-PRO standard.\n\
1477Specify the serial device it is connected to (e.g. /dev/ttya) or telnet port.", /* to_doc */
2e0fa11c
RS
1478 remote_open, /* to_open */
1479 remote_close, /* to_close */
1480 NULL, /* to_attach */
1481 remote_detach, /* to_detach */
1482 remote_resume, /* to_resume */
1483 remote_wait, /* to_wait */
1484 remote_fetch_registers, /* to_fetch_registers */
1485 remote_store_registers, /* to_store_registers */
1486 remote_prepare_to_store, /* to_prepare_to_store */
1487 remote_xfer_memory, /* to_xfer_memory */
1488 remote_files_info, /* to_files_info */
1489
1490 remote_insert_breakpoint, /* to_insert_breakpoint */
1491 remote_remove_breakpoint, /* to_remove_breakpoint */
1492
1493 NULL, /* to_terminal_init */
1494 NULL, /* to_terminal_inferior */
1495 NULL, /* to_terminal_ours_for_output */
1496 NULL, /* to_terminal_ours */
1497 NULL, /* to_terminal_info */
1498 remote_kill, /* to_kill */
4682251b 1499 hppro_load, /* to_load */
2e0fa11c
RS
1500 NULL, /* to_lookup_symbol */
1501 NULL, /* to_create_inferior */
1502 remote_mourn, /* to_mourn_inferior */
1503 0, /* to_can_run */
1504 0, /* to_notice_signals */
78b459a7 1505 0, /* to_stop */
2e0fa11c
RS
1506 process_stratum, /* to_stratum */
1507 NULL, /* to_next */
1508 1, /* to_has_all_memory */
1509 1, /* to_has_memory */
1510 1, /* to_has_stack */
1511 1, /* to_has_registers */
1512 1, /* to_has_execution */
1513 NULL, /* sections */
1514 NULL, /* sections_end */
1515 OPS_MAGIC /* to_magic */
1516};
1517
1518void
7765123d
RS
1519_initialize_remote_hppro ()
1520{
1521 struct cmd_list_element *c;
1522 add_target (&remote_hppro_ops);
1523
1524 /* this sets the type of download protocol */
1525 c = add_set_cmd ("loadtype", no_class, var_string, (char *)&loadtype_str,
1526 "Set the type of the remote load protocol.\n", &setlist);
1527 c->function.sfunc = set_loadtype_command;
1528 add_show_from_set (c, &showlist);
4682251b
RS
1529 loadtype_str = savestring ("generic", 8);
1530
1531 /* this adds a command to boot the board */
1532 add_com ("boot", class_support, boot_board,
1533 "Boot the damn target board.\n");
7765123d
RS
1534}
1535
1536static void
4682251b
RS
1537set_loadtype_command (ignore, from_tty, c)
1538 char *ignore;
7765123d
RS
1539 int from_tty;
1540 struct cmd_list_element *c;
2e0fa11c 1541{
4682251b 1542 loadtype_str = savestring (*(char **) c->var, strlen (*(char **) c->var));
2e0fa11c 1543}
7765123d 1544
This page took 0.132682 seconds and 4 git commands to generate.