* gdbarch.sh (deprecated_register_size): Remove.
[deliverable/binutils-gdb.git] / gdb / remote.c
CommitLineData
c906108c 1/* Remote target communications for serial-line targets in custom GDB protocol
8926118c 2
6aba47ca
DJ
3 Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997,
4 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007
29182b13 5 Free Software Foundation, Inc.
c906108c 6
c5aa993b
JM
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
197e01b6
EZ
21 Foundation, Inc., 51 Franklin Street, Fifth Floor,
22 Boston, MA 02110-1301, USA. */
c5aa993b 23
23860348 24/* See the GDB User Guide for details of the GDB remote protocol. */
c5aa993b 25
c906108c
SS
26#include "defs.h"
27#include "gdb_string.h"
28#include <ctype.h>
29#include <fcntl.h>
c906108c
SS
30#include "inferior.h"
31#include "bfd.h"
32#include "symfile.h"
60250e8b 33#include "exceptions.h"
c906108c 34#include "target.h"
c5aa993b 35/*#include "terminal.h" */
c906108c
SS
36#include "gdbcmd.h"
37#include "objfiles.h"
38#include "gdb-stabs.h"
39#include "gdbthread.h"
c2c6d25f 40#include "remote.h"
4e052eda 41#include "regcache.h"
fd0407d6 42#include "value.h"
1ff9c3d6 43#include "gdb_assert.h"
6867ae3e 44#include "observer.h"
a77053c2 45#include "solib.h"
37a105a1
DJ
46#include "cli/cli-decode.h"
47#include "cli/cli-setshow.h"
424163ea 48#include "target-descriptions.h"
c906108c 49
7a292a7a 50#include <ctype.h>
9846de1b 51#include <sys/time.h>
c906108c 52
43ff13b4 53#include "event-loop.h"
c2c6d25f 54#include "event-top.h"
2acceee2 55#include "inf-loop.h"
43ff13b4 56
c906108c
SS
57#include <signal.h>
58#include "serial.h"
59
6240bebf
MS
60#include "gdbcore.h" /* for exec_bfd */
61
449092f6
CV
62#include "remote-fileio.h"
63
fd79ecee
DJ
64#include "memory-map.h"
65
6765f3e5
DJ
66/* The size to align memory write packets, when practical. The protocol
67 does not guarantee any alignment, and gdb will generate short
68 writes and unaligned writes, but even as a best-effort attempt this
69 can improve bulk transfers. For instance, if a write is misaligned
70 relative to the target's data bus, the stub may need to make an extra
71 round trip fetching data from the target. This doesn't make a
72 huge difference, but it's easy to do, so we try to be helpful.
73
74 The alignment chosen is arbitrary; usually data bus width is
75 important here, not the possibly larger cache line size. */
76enum { REMOTE_ALIGN_WRITES = 16 };
77
23860348 78/* Prototypes for local functions. */
6426a772
JM
79static void cleanup_sigint_signal_handler (void *dummy);
80static void initialize_sigint_signal_handler (void);
6d820c5c 81static int getpkt_sane (char **buf, long *sizeof_buf, int forever);
6426a772 82
a14ed312
KB
83static void handle_remote_sigint (int);
84static void handle_remote_sigint_twice (int);
85static void async_remote_interrupt (gdb_client_data);
86void async_remote_interrupt_twice (gdb_client_data);
43ff13b4 87
a14ed312 88static void build_remote_gdbarch_data (void);
0f71a2f6 89
a14ed312 90static void remote_files_info (struct target_ops *ignore);
c906108c 91
316f2060 92static void remote_prepare_to_store (struct regcache *regcache);
c906108c 93
56be3814 94static void remote_fetch_registers (struct regcache *regcache, int regno);
c906108c 95
39f77062
KB
96static void remote_resume (ptid_t ptid, int step,
97 enum target_signal siggnal);
98static void remote_async_resume (ptid_t ptid, int step,
a14ed312 99 enum target_signal siggnal);
a14ed312
KB
100static void remote_open (char *name, int from_tty);
101static void remote_async_open (char *name, int from_tty);
c906108c 102
a14ed312
KB
103static void extended_remote_open (char *name, int from_tty);
104static void extended_remote_async_open (char *name, int from_tty);
c906108c 105
92d1e331
DJ
106static void remote_open_1 (char *, int, struct target_ops *, int extended_p,
107 int async_p);
c906108c 108
a14ed312 109static void remote_close (int quitting);
c906108c 110
56be3814 111static void remote_store_registers (struct regcache *regcache, int regno);
c906108c 112
a14ed312
KB
113static void remote_mourn (void);
114static void remote_async_mourn (void);
c906108c 115
a14ed312 116static void extended_remote_restart (void);
c906108c 117
a14ed312 118static void extended_remote_mourn (void);
c906108c 119
a14ed312 120static void remote_mourn_1 (struct target_ops *);
c906108c 121
6d820c5c 122static void remote_send (char **buf, long *sizeof_buf_p);
c906108c 123
a14ed312 124static int readchar (int timeout);
c906108c 125
39f77062
KB
126static ptid_t remote_wait (ptid_t ptid,
127 struct target_waitstatus *status);
128static ptid_t remote_async_wait (ptid_t ptid,
129 struct target_waitstatus *status);
c906108c 130
a14ed312
KB
131static void remote_kill (void);
132static void remote_async_kill (void);
c906108c 133
a14ed312 134static int tohex (int nib);
c906108c 135
a14ed312 136static void remote_detach (char *args, int from_tty);
c906108c 137
a14ed312 138static void remote_interrupt (int signo);
c906108c 139
a14ed312 140static void remote_interrupt_twice (int signo);
7a292a7a 141
a14ed312 142static void interrupt_query (void);
c906108c 143
a14ed312 144static void set_thread (int, int);
c906108c 145
39f77062 146static int remote_thread_alive (ptid_t);
c906108c 147
a14ed312 148static void get_offsets (void);
c906108c 149
6d820c5c
DJ
150static void skip_frame (void);
151
152static long read_frame (char **buf_p, long *sizeof_buf);
c906108c 153
a14ed312 154static int hexnumlen (ULONGEST num);
c906108c 155
a14ed312 156static void init_remote_ops (void);
c906108c 157
a14ed312 158static void init_extended_remote_ops (void);
c906108c 159
a14ed312 160static void remote_stop (void);
c906108c 161
a14ed312 162static int ishex (int ch, int *val);
c906108c 163
a14ed312 164static int stubhex (int ch);
c906108c 165
a14ed312 166static int hexnumstr (char *, ULONGEST);
c906108c 167
a14ed312 168static int hexnumnstr (char *, ULONGEST, int);
2df3850c 169
a14ed312 170static CORE_ADDR remote_address_masked (CORE_ADDR);
c906108c 171
a14ed312 172static void print_packet (char *);
c906108c 173
a14ed312 174static unsigned long crc32 (unsigned char *, int, unsigned int);
c906108c 175
a14ed312 176static void compare_sections_command (char *, int);
c906108c 177
a14ed312 178static void packet_command (char *, int);
c906108c 179
a14ed312 180static int stub_unpack_int (char *buff, int fieldlength);
c906108c 181
39f77062 182static ptid_t remote_current_thread (ptid_t oldptid);
c906108c 183
a14ed312 184static void remote_find_new_threads (void);
c906108c 185
a14ed312 186static void record_currthread (int currthread);
c906108c 187
30559e10 188static int fromhex (int a);
c906108c 189
cfd77fa1 190static int hex2bin (const char *hex, gdb_byte *bin, int count);
c906108c 191
cfd77fa1 192static int bin2hex (const gdb_byte *bin, char *hex, int count);
234fa6d1 193
a14ed312 194static int putpkt_binary (char *buf, int cnt);
c906108c 195
a14ed312 196static void check_binary_download (CORE_ADDR addr);
c906108c 197
5a2468f5 198struct packet_config;
5a2468f5 199
a14ed312 200static void show_packet_config_cmd (struct packet_config *config);
5a2468f5 201
d471ea57 202static void update_packet_config (struct packet_config *config);
5a2468f5 203
bb572ddd
DJ
204static void set_remote_protocol_packet_cmd (char *args, int from_tty,
205 struct cmd_list_element *c);
206
207static void show_remote_protocol_packet_cmd (struct ui_file *file,
208 int from_tty,
209 struct cmd_list_element *c,
210 const char *value);
211
a14ed312 212void _initialize_remote (void);
c906108c 213
bb572ddd
DJ
214/* For "set remote" and "show remote". */
215
216static struct cmd_list_element *remote_set_cmdlist;
217static struct cmd_list_element *remote_show_cmdlist;
218
ea9c271d
DJ
219/* Description of the remote protocol state for the currently
220 connected target. This is per-target state, and independent of the
221 selected architecture. */
222
223struct remote_state
224{
225 /* A buffer to use for incoming packets, and its current size. The
226 buffer is grown dynamically for larger incoming packets.
227 Outgoing packets may also be constructed in this buffer.
228 BUF_SIZE is always at least REMOTE_PACKET_SIZE;
229 REMOTE_PACKET_SIZE should be used to limit the length of outgoing
230 packets. */
231 char *buf;
232 long buf_size;
be2a5f71
DJ
233
234 /* If we negotiated packet size explicitly (and thus can bypass
235 heuristics for the largest packet size that will not overflow
236 a buffer in the stub), this will be set to that packet size.
237 Otherwise zero, meaning to use the guessed size. */
238 long explicit_packet_size;
ea9c271d
DJ
239};
240
241/* This data could be associated with a target, but we do not always
242 have access to the current target when we need it, so for now it is
243 static. This will be fine for as long as only one target is in use
244 at a time. */
245static struct remote_state remote_state;
246
247static struct remote_state *
0b83947e 248get_remote_state_raw (void)
ea9c271d
DJ
249{
250 return &remote_state;
251}
252
253/* Description of the remote protocol for a given architecture. */
d01949b6 254
ad10f812
AC
255struct packet_reg
256{
257 long offset; /* Offset into G packet. */
258 long regnum; /* GDB's internal register number. */
259 LONGEST pnum; /* Remote protocol register number. */
b323314b 260 int in_g_packet; /* Always part of G packet. */
2bc416ba 261 /* long size in bytes; == register_size (current_gdbarch, regnum);
23860348 262 at present. */
c9f4d572
UW
263 /* char *name; == gdbarch_register_name (current_gdbarch, regnum);
264 at present. */
ad10f812
AC
265};
266
ea9c271d 267struct remote_arch_state
d01949b6 268{
ad10f812
AC
269 /* Description of the remote protocol registers. */
270 long sizeof_g_packet;
b323314b
AC
271
272 /* Description of the remote protocol registers indexed by REGNUM
f57d151a 273 (making an array gdbarch_num_regs in size). */
b323314b 274 struct packet_reg *regs;
ad10f812 275
d01949b6
AC
276 /* This is the size (in chars) of the first response to the ``g''
277 packet. It is used as a heuristic when determining the maximum
278 size of memory-read and memory-write packets. A target will
279 typically only reserve a buffer large enough to hold the ``g''
280 packet. The size does not include packet overhead (headers and
23860348 281 trailers). */
d01949b6
AC
282 long actual_register_packet_size;
283
284 /* This is the maximum size (in chars) of a non read/write packet.
23860348 285 It is also used as a cap on the size of read/write packets. */
d01949b6
AC
286 long remote_packet_size;
287};
288
3c3bea1c 289
d01949b6
AC
290/* Handle for retreving the remote protocol data from gdbarch. */
291static struct gdbarch_data *remote_gdbarch_data_handle;
292
ea9c271d
DJ
293static struct remote_arch_state *
294get_remote_arch_state (void)
d01949b6 295{
451fbdda 296 return gdbarch_data (current_gdbarch, remote_gdbarch_data_handle);
d01949b6
AC
297}
298
0b83947e
DJ
299/* Fetch the global remote target state. */
300
301static struct remote_state *
302get_remote_state (void)
303{
304 /* Make sure that the remote architecture state has been
305 initialized, because doing so might reallocate rs->buf. Any
306 function which calls getpkt also needs to be mindful of changes
307 to rs->buf, but this call limits the number of places which run
308 into trouble. */
309 get_remote_arch_state ();
310
311 return get_remote_state_raw ();
312}
313
74ca34ce
DJ
314static int
315compare_pnums (const void *lhs_, const void *rhs_)
316{
317 const struct packet_reg * const *lhs = lhs_;
318 const struct packet_reg * const *rhs = rhs_;
319
320 if ((*lhs)->pnum < (*rhs)->pnum)
321 return -1;
322 else if ((*lhs)->pnum == (*rhs)->pnum)
323 return 0;
324 else
325 return 1;
326}
327
d01949b6
AC
328static void *
329init_remote_state (struct gdbarch *gdbarch)
330{
74ca34ce 331 int regnum, num_remote_regs, offset;
0b83947e 332 struct remote_state *rs = get_remote_state_raw ();
ea9c271d 333 struct remote_arch_state *rsa;
74ca34ce 334 struct packet_reg **remote_regs;
ea9c271d
DJ
335
336 rsa = GDBARCH_OBSTACK_ZALLOC (gdbarch, struct remote_arch_state);
d01949b6 337
123dc839
DJ
338 /* Use the architecture to build a regnum<->pnum table, which will be
339 1:1 unless a feature set specifies otherwise. */
f57d151a
UW
340 rsa->regs = GDBARCH_OBSTACK_CALLOC (gdbarch,
341 gdbarch_num_regs (current_gdbarch),
342 struct packet_reg);
343 for (regnum = 0; regnum < gdbarch_num_regs (current_gdbarch); regnum++)
ad10f812 344 {
ea9c271d 345 struct packet_reg *r = &rsa->regs[regnum];
baef701f
DJ
346
347 if (register_size (current_gdbarch, regnum) == 0)
348 /* Do not try to fetch zero-sized (placeholder) registers. */
349 r->pnum = -1;
350 else
351 r->pnum = gdbarch_remote_register_number (gdbarch, regnum);
352
b323314b 353 r->regnum = regnum;
74ca34ce
DJ
354 }
355
356 /* Define the g/G packet format as the contents of each register
357 with a remote protocol number, in order of ascending protocol
358 number. */
359
f57d151a
UW
360 remote_regs = alloca (gdbarch_num_regs (current_gdbarch)
361 * sizeof (struct packet_reg *));
362 for (num_remote_regs = 0, regnum = 0;
363 regnum < gdbarch_num_regs (current_gdbarch);
364 regnum++)
74ca34ce
DJ
365 if (rsa->regs[regnum].pnum != -1)
366 remote_regs[num_remote_regs++] = &rsa->regs[regnum];
7d58c67d 367
74ca34ce
DJ
368 qsort (remote_regs, num_remote_regs, sizeof (struct packet_reg *),
369 compare_pnums);
370
371 for (regnum = 0, offset = 0; regnum < num_remote_regs; regnum++)
372 {
373 remote_regs[regnum]->in_g_packet = 1;
374 remote_regs[regnum]->offset = offset;
375 offset += register_size (current_gdbarch, remote_regs[regnum]->regnum);
ad10f812
AC
376 }
377
74ca34ce
DJ
378 /* Record the maximum possible size of the g packet - it may turn out
379 to be smaller. */
380 rsa->sizeof_g_packet = offset;
381
d01949b6
AC
382 /* Default maximum number of characters in a packet body. Many
383 remote stubs have a hardwired buffer size of 400 bytes
384 (c.f. BUFMAX in m68k-stub.c and i386-stub.c). BUFMAX-1 is used
385 as the maximum packet-size to ensure that the packet and an extra
386 NUL character can always fit in the buffer. This stops GDB
387 trashing stubs that try to squeeze an extra NUL into what is
ea9c271d
DJ
388 already a full buffer (As of 1999-12-04 that was most stubs). */
389 rsa->remote_packet_size = 400 - 1;
d01949b6 390
ea9c271d
DJ
391 /* This one is filled in when a ``g'' packet is received. */
392 rsa->actual_register_packet_size = 0;
393
394 /* Should rsa->sizeof_g_packet needs more space than the
ad10f812
AC
395 default, adjust the size accordingly. Remember that each byte is
396 encoded as two characters. 32 is the overhead for the packet
397 header / footer. NOTE: cagney/1999-10-26: I suspect that 8
d01949b6 398 (``$NN:G...#NN'') is a better guess, the below has been padded a
23860348 399 little. */
ea9c271d
DJ
400 if (rsa->sizeof_g_packet > ((rsa->remote_packet_size - 32) / 2))
401 rsa->remote_packet_size = (rsa->sizeof_g_packet * 2 + 32);
802188a7 402
ea9c271d
DJ
403 /* Make sure that the packet buffer is plenty big enough for
404 this architecture. */
405 if (rs->buf_size < rsa->remote_packet_size)
406 {
407 rs->buf_size = 2 * rsa->remote_packet_size;
7fca722e 408 rs->buf = xrealloc (rs->buf, rs->buf_size);
ea9c271d 409 }
6d820c5c 410
ea9c271d
DJ
411 return rsa;
412}
413
414/* Return the current allowed size of a remote packet. This is
415 inferred from the current architecture, and should be used to
416 limit the length of outgoing packets. */
417static long
418get_remote_packet_size (void)
419{
be2a5f71 420 struct remote_state *rs = get_remote_state ();
ea9c271d
DJ
421 struct remote_arch_state *rsa = get_remote_arch_state ();
422
be2a5f71
DJ
423 if (rs->explicit_packet_size)
424 return rs->explicit_packet_size;
425
ea9c271d 426 return rsa->remote_packet_size;
d01949b6
AC
427}
428
ad10f812 429static struct packet_reg *
ea9c271d 430packet_reg_from_regnum (struct remote_arch_state *rsa, long regnum)
ad10f812 431{
f57d151a 432 if (regnum < 0 && regnum >= gdbarch_num_regs (current_gdbarch))
b323314b
AC
433 return NULL;
434 else
ad10f812 435 {
ea9c271d 436 struct packet_reg *r = &rsa->regs[regnum];
b323314b
AC
437 gdb_assert (r->regnum == regnum);
438 return r;
ad10f812 439 }
ad10f812
AC
440}
441
442static struct packet_reg *
ea9c271d 443packet_reg_from_pnum (struct remote_arch_state *rsa, LONGEST pnum)
ad10f812 444{
b323314b 445 int i;
f57d151a 446 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
ad10f812 447 {
ea9c271d 448 struct packet_reg *r = &rsa->regs[i];
b323314b
AC
449 if (r->pnum == pnum)
450 return r;
ad10f812
AC
451 }
452 return NULL;
d01949b6
AC
453}
454
3c3bea1c
GS
455/* FIXME: graces/2002-08-08: These variables should eventually be
456 bound to an instance of the target object (as in gdbarch-tdep()),
457 when such a thing exists. */
458
459/* This is set to the data address of the access causing the target
460 to stop for a watchpoint. */
461static CORE_ADDR remote_watch_data_address;
462
94e08568 463/* This is non-zero if target stopped for a watchpoint. */
3c3bea1c
GS
464static int remote_stopped_by_watchpoint_p;
465
c906108c
SS
466static struct target_ops remote_ops;
467
468static struct target_ops extended_remote_ops;
469
43ff13b4 470/* Temporary target ops. Just like the remote_ops and
23860348 471 extended_remote_ops, but with asynchronous support. */
43ff13b4
JM
472static struct target_ops remote_async_ops;
473
474static struct target_ops extended_async_remote_ops;
475
6426a772
JM
476/* FIXME: cagney/1999-09-23: Even though getpkt was called with
477 ``forever'' still use the normal timeout mechanism. This is
478 currently used by the ASYNC code to guarentee that target reads
479 during the initial connect always time-out. Once getpkt has been
480 modified to return a timeout indication and, in turn
481 remote_wait()/wait_for_inferior() have gained a timeout parameter
23860348 482 this can go away. */
6426a772
JM
483static int wait_forever_enabled_p = 1;
484
485
c906108c
SS
486/* This variable chooses whether to send a ^C or a break when the user
487 requests program interruption. Although ^C is usually what remote
488 systems expect, and that is the default here, sometimes a break is
489 preferable instead. */
490
491static int remote_break;
492
c906108c
SS
493/* Descriptor for I/O to remote machine. Initialize it to NULL so that
494 remote_open knows that we don't have a file open when the program
495 starts. */
819cc324 496static struct serial *remote_desc = NULL;
c906108c 497
c906108c
SS
498/* This variable sets the number of bits in an address that are to be
499 sent in a memory ("M" or "m") packet. Normally, after stripping
500 leading zeros, the entire address would be sent. This variable
501 restricts the address to REMOTE_ADDRESS_SIZE bits. HISTORY: The
502 initial implementation of remote.c restricted the address sent in
503 memory packets to ``host::sizeof long'' bytes - (typically 32
504 bits). Consequently, for 64 bit targets, the upper 32 bits of an
505 address was never sent. Since fixing this bug may cause a break in
506 some remote targets this variable is principly provided to
23860348 507 facilitate backward compatibility. */
c906108c
SS
508
509static int remote_address_size;
510
6426a772
JM
511/* Tempoary to track who currently owns the terminal. See
512 target_async_terminal_* for more details. */
513
514static int remote_async_terminal_ours_p;
515
11cf8741 516\f
11cf8741 517/* User configurable variables for the number of characters in a
ea9c271d
DJ
518 memory read/write packet. MIN (rsa->remote_packet_size,
519 rsa->sizeof_g_packet) is the default. Some targets need smaller
24b06219 520 values (fifo overruns, et.al.) and some users need larger values
ad10f812
AC
521 (speed up transfers). The variables ``preferred_*'' (the user
522 request), ``current_*'' (what was actually set) and ``forced_*''
23860348 523 (Positive - a soft limit, negative - a hard limit). */
11cf8741
JM
524
525struct memory_packet_config
526{
527 char *name;
528 long size;
529 int fixed_p;
530};
531
532/* Compute the current size of a read/write packet. Since this makes
533 use of ``actual_register_packet_size'' the computation is dynamic. */
534
535static long
536get_memory_packet_size (struct memory_packet_config *config)
537{
d01949b6 538 struct remote_state *rs = get_remote_state ();
ea9c271d
DJ
539 struct remote_arch_state *rsa = get_remote_arch_state ();
540
11cf8741
JM
541 /* NOTE: The somewhat arbitrary 16k comes from the knowledge (folk
542 law?) that some hosts don't cope very well with large alloca()
543 calls. Eventually the alloca() code will be replaced by calls to
544 xmalloc() and make_cleanups() allowing this restriction to either
23860348 545 be lifted or removed. */
11cf8741
JM
546#ifndef MAX_REMOTE_PACKET_SIZE
547#define MAX_REMOTE_PACKET_SIZE 16384
548#endif
3de11b2e 549 /* NOTE: 20 ensures we can write at least one byte. */
11cf8741 550#ifndef MIN_REMOTE_PACKET_SIZE
3de11b2e 551#define MIN_REMOTE_PACKET_SIZE 20
11cf8741
JM
552#endif
553 long what_they_get;
554 if (config->fixed_p)
555 {
556 if (config->size <= 0)
557 what_they_get = MAX_REMOTE_PACKET_SIZE;
558 else
559 what_they_get = config->size;
560 }
561 else
562 {
ea9c271d 563 what_they_get = get_remote_packet_size ();
23860348 564 /* Limit the packet to the size specified by the user. */
11cf8741
JM
565 if (config->size > 0
566 && what_they_get > config->size)
567 what_they_get = config->size;
be2a5f71
DJ
568
569 /* Limit it to the size of the targets ``g'' response unless we have
570 permission from the stub to use a larger packet size. */
571 if (rs->explicit_packet_size == 0
572 && rsa->actual_register_packet_size > 0
573 && what_they_get > rsa->actual_register_packet_size)
574 what_they_get = rsa->actual_register_packet_size;
11cf8741
JM
575 }
576 if (what_they_get > MAX_REMOTE_PACKET_SIZE)
577 what_they_get = MAX_REMOTE_PACKET_SIZE;
578 if (what_they_get < MIN_REMOTE_PACKET_SIZE)
579 what_they_get = MIN_REMOTE_PACKET_SIZE;
6d820c5c
DJ
580
581 /* Make sure there is room in the global buffer for this packet
582 (including its trailing NUL byte). */
583 if (rs->buf_size < what_they_get + 1)
584 {
585 rs->buf_size = 2 * what_they_get;
586 rs->buf = xrealloc (rs->buf, 2 * what_they_get);
587 }
588
11cf8741
JM
589 return what_they_get;
590}
591
592/* Update the size of a read/write packet. If they user wants
23860348 593 something really big then do a sanity check. */
11cf8741
JM
594
595static void
596set_memory_packet_size (char *args, struct memory_packet_config *config)
597{
598 int fixed_p = config->fixed_p;
599 long size = config->size;
600 if (args == NULL)
8a3fe4f8 601 error (_("Argument required (integer, `fixed' or `limited')."));
11cf8741
JM
602 else if (strcmp (args, "hard") == 0
603 || strcmp (args, "fixed") == 0)
604 fixed_p = 1;
605 else if (strcmp (args, "soft") == 0
606 || strcmp (args, "limit") == 0)
607 fixed_p = 0;
608 else
609 {
610 char *end;
611 size = strtoul (args, &end, 0);
612 if (args == end)
8a3fe4f8 613 error (_("Invalid %s (bad syntax)."), config->name);
11cf8741
JM
614#if 0
615 /* Instead of explicitly capping the size of a packet to
616 MAX_REMOTE_PACKET_SIZE or dissallowing it, the user is
617 instead allowed to set the size to something arbitrarily
23860348 618 large. */
11cf8741 619 if (size > MAX_REMOTE_PACKET_SIZE)
8a3fe4f8 620 error (_("Invalid %s (too large)."), config->name);
11cf8741
JM
621#endif
622 }
23860348 623 /* Extra checks? */
11cf8741
JM
624 if (fixed_p && !config->fixed_p)
625 {
e2e0b3e5
AC
626 if (! query (_("The target may not be able to correctly handle a %s\n"
627 "of %ld bytes. Change the packet size? "),
11cf8741 628 config->name, size))
8a3fe4f8 629 error (_("Packet size not changed."));
11cf8741 630 }
23860348 631 /* Update the config. */
11cf8741
JM
632 config->fixed_p = fixed_p;
633 config->size = size;
634}
635
636static void
637show_memory_packet_size (struct memory_packet_config *config)
638{
a3f17187 639 printf_filtered (_("The %s is %ld. "), config->name, config->size);
11cf8741 640 if (config->fixed_p)
a3f17187 641 printf_filtered (_("Packets are fixed at %ld bytes.\n"),
11cf8741
JM
642 get_memory_packet_size (config));
643 else
a3f17187 644 printf_filtered (_("Packets are limited to %ld bytes.\n"),
11cf8741
JM
645 get_memory_packet_size (config));
646}
647
648static struct memory_packet_config memory_write_packet_config =
649{
650 "memory-write-packet-size",
651};
652
653static void
654set_memory_write_packet_size (char *args, int from_tty)
655{
656 set_memory_packet_size (args, &memory_write_packet_config);
657}
658
659static void
660show_memory_write_packet_size (char *args, int from_tty)
661{
662 show_memory_packet_size (&memory_write_packet_config);
663}
664
665static long
666get_memory_write_packet_size (void)
667{
668 return get_memory_packet_size (&memory_write_packet_config);
669}
670
671static struct memory_packet_config memory_read_packet_config =
672{
673 "memory-read-packet-size",
674};
675
676static void
677set_memory_read_packet_size (char *args, int from_tty)
678{
679 set_memory_packet_size (args, &memory_read_packet_config);
680}
681
682static void
683show_memory_read_packet_size (char *args, int from_tty)
684{
685 show_memory_packet_size (&memory_read_packet_config);
686}
687
688static long
689get_memory_read_packet_size (void)
690{
691 long size = get_memory_packet_size (&memory_read_packet_config);
692 /* FIXME: cagney/1999-11-07: Functions like getpkt() need to get an
693 extra buffer size argument before the memory read size can be
ea9c271d
DJ
694 increased beyond this. */
695 if (size > get_remote_packet_size ())
696 size = get_remote_packet_size ();
11cf8741
JM
697 return size;
698}
699
11cf8741 700\f
5a2468f5
JM
701/* Generic configuration support for packets the stub optionally
702 supports. Allows the user to specify the use of the packet as well
23860348 703 as allowing GDB to auto-detect support in the remote stub. */
5a2468f5
JM
704
705enum packet_support
706 {
707 PACKET_SUPPORT_UNKNOWN = 0,
708 PACKET_ENABLE,
709 PACKET_DISABLE
710 };
711
5a2468f5
JM
712struct packet_config
713 {
bb572ddd
DJ
714 const char *name;
715 const char *title;
7f19b9a2 716 enum auto_boolean detect;
5a2468f5
JM
717 enum packet_support support;
718 };
719
d471ea57 720/* Analyze a packet's return value and update the packet config
23860348 721 accordingly. */
d471ea57
AC
722
723enum packet_result
724{
725 PACKET_ERROR,
726 PACKET_OK,
727 PACKET_UNKNOWN
728};
729
5a2468f5 730static void
d471ea57 731update_packet_config (struct packet_config *config)
5a2468f5 732{
d471ea57
AC
733 switch (config->detect)
734 {
7f19b9a2 735 case AUTO_BOOLEAN_TRUE:
d471ea57
AC
736 config->support = PACKET_ENABLE;
737 break;
7f19b9a2 738 case AUTO_BOOLEAN_FALSE:
d471ea57
AC
739 config->support = PACKET_DISABLE;
740 break;
7f19b9a2 741 case AUTO_BOOLEAN_AUTO:
d471ea57
AC
742 config->support = PACKET_SUPPORT_UNKNOWN;
743 break;
744 }
5a2468f5
JM
745}
746
747static void
fba45db2 748show_packet_config_cmd (struct packet_config *config)
5a2468f5
JM
749{
750 char *support = "internal-error";
751 switch (config->support)
752 {
753 case PACKET_ENABLE:
754 support = "enabled";
755 break;
756 case PACKET_DISABLE:
757 support = "disabled";
758 break;
759 case PACKET_SUPPORT_UNKNOWN:
760 support = "unknown";
761 break;
762 }
763 switch (config->detect)
764 {
7f19b9a2 765 case AUTO_BOOLEAN_AUTO:
37a105a1
DJ
766 printf_filtered (_("Support for the `%s' packet is auto-detected, currently %s.\n"),
767 config->name, support);
5a2468f5 768 break;
7f19b9a2
AC
769 case AUTO_BOOLEAN_TRUE:
770 case AUTO_BOOLEAN_FALSE:
37a105a1
DJ
771 printf_filtered (_("Support for the `%s' packet is currently %s.\n"),
772 config->name, support);
8e248173 773 break;
5a2468f5
JM
774 }
775}
776
777static void
bb572ddd
DJ
778add_packet_config_cmd (struct packet_config *config, const char *name,
779 const char *title, int legacy)
d471ea57 780{
5a2468f5
JM
781 char *set_doc;
782 char *show_doc;
d471ea57 783 char *cmd_name;
3ed07be4 784
5a2468f5
JM
785 config->name = name;
786 config->title = title;
7f19b9a2 787 config->detect = AUTO_BOOLEAN_AUTO;
8e248173 788 config->support = PACKET_SUPPORT_UNKNOWN;
b435e160
AC
789 set_doc = xstrprintf ("Set use of remote protocol `%s' (%s) packet",
790 name, title);
791 show_doc = xstrprintf ("Show current use of remote protocol `%s' (%s) packet",
792 name, title);
d471ea57 793 /* set/show TITLE-packet {auto,on,off} */
b435e160 794 cmd_name = xstrprintf ("%s-packet", title);
e9e68a56 795 add_setshow_auto_boolean_cmd (cmd_name, class_obscure,
2c5b56ce 796 &config->detect, set_doc, show_doc, NULL, /* help_doc */
bb572ddd
DJ
797 set_remote_protocol_packet_cmd,
798 show_remote_protocol_packet_cmd,
799 &remote_set_cmdlist, &remote_show_cmdlist);
23860348 800 /* set/show remote NAME-packet {auto,on,off} -- legacy. */
d471ea57
AC
801 if (legacy)
802 {
803 char *legacy_name;
b435e160 804 legacy_name = xstrprintf ("%s-packet", name);
d471ea57 805 add_alias_cmd (legacy_name, cmd_name, class_obscure, 0,
bb572ddd 806 &remote_set_cmdlist);
d471ea57 807 add_alias_cmd (legacy_name, cmd_name, class_obscure, 0,
bb572ddd 808 &remote_show_cmdlist);
d471ea57 809 }
5a2468f5
JM
810}
811
d471ea57 812static enum packet_result
a76d924d 813packet_check_result (const char *buf)
5a2468f5 814{
d471ea57 815 if (buf[0] != '\0')
5a2468f5 816 {
d471ea57 817 /* The stub recognized the packet request. Check that the
23860348 818 operation succeeded. */
a76d924d
DJ
819 if (buf[0] == 'E'
820 && isxdigit (buf[1]) && isxdigit (buf[2])
821 && buf[3] == '\0')
822 /* "Enn" - definitly an error. */
823 return PACKET_ERROR;
824
825 /* Always treat "E." as an error. This will be used for
826 more verbose error messages, such as E.memtypes. */
827 if (buf[0] == 'E' && buf[1] == '.')
828 return PACKET_ERROR;
829
830 /* The packet may or may not be OK. Just assume it is. */
831 return PACKET_OK;
832 }
833 else
834 /* The stub does not support the packet. */
835 return PACKET_UNKNOWN;
836}
837
838static enum packet_result
839packet_ok (const char *buf, struct packet_config *config)
840{
841 enum packet_result result;
842
843 result = packet_check_result (buf);
844 switch (result)
845 {
846 case PACKET_OK:
847 case PACKET_ERROR:
848 /* The stub recognized the packet request. */
d471ea57
AC
849 switch (config->support)
850 {
851 case PACKET_SUPPORT_UNKNOWN:
852 if (remote_debug)
853 fprintf_unfiltered (gdb_stdlog,
854 "Packet %s (%s) is supported\n",
855 config->name, config->title);
856 config->support = PACKET_ENABLE;
857 break;
858 case PACKET_DISABLE:
8e65ff28 859 internal_error (__FILE__, __LINE__,
e2e0b3e5 860 _("packet_ok: attempt to use a disabled packet"));
d471ea57
AC
861 break;
862 case PACKET_ENABLE:
863 break;
864 }
a76d924d
DJ
865 break;
866 case PACKET_UNKNOWN:
23860348 867 /* The stub does not support the packet. */
d471ea57
AC
868 switch (config->support)
869 {
870 case PACKET_ENABLE:
7f19b9a2 871 if (config->detect == AUTO_BOOLEAN_AUTO)
d471ea57 872 /* If the stub previously indicated that the packet was
23860348 873 supported then there is a protocol error.. */
8a3fe4f8 874 error (_("Protocol error: %s (%s) conflicting enabled responses."),
d471ea57
AC
875 config->name, config->title);
876 else
23860348 877 /* The user set it wrong. */
8a3fe4f8 878 error (_("Enabled packet %s (%s) not recognized by stub"),
d471ea57
AC
879 config->name, config->title);
880 break;
881 case PACKET_SUPPORT_UNKNOWN:
882 if (remote_debug)
883 fprintf_unfiltered (gdb_stdlog,
884 "Packet %s (%s) is NOT supported\n",
885 config->name, config->title);
886 config->support = PACKET_DISABLE;
887 break;
888 case PACKET_DISABLE:
889 break;
890 }
a76d924d 891 break;
5a2468f5 892 }
a76d924d
DJ
893
894 return result;
5a2468f5
JM
895}
896
444abaca
DJ
897enum {
898 PACKET_vCont = 0,
899 PACKET_X,
900 PACKET_qSymbol,
901 PACKET_P,
902 PACKET_p,
903 PACKET_Z0,
904 PACKET_Z1,
905 PACKET_Z2,
906 PACKET_Z3,
907 PACKET_Z4,
0876f84a 908 PACKET_qXfer_auxv,
23181151 909 PACKET_qXfer_features,
fd79ecee 910 PACKET_qXfer_memory_map,
0e7f50da
UW
911 PACKET_qXfer_spu_read,
912 PACKET_qXfer_spu_write,
444abaca 913 PACKET_qGetTLSAddr,
be2a5f71 914 PACKET_qSupported,
89be2091 915 PACKET_QPassSignals,
444abaca
DJ
916 PACKET_MAX
917};
506fb367 918
444abaca 919static struct packet_config remote_protocol_packets[PACKET_MAX];
dc8acb97
MS
920
921static void
444abaca
DJ
922set_remote_protocol_packet_cmd (char *args, int from_tty,
923 struct cmd_list_element *c)
dc8acb97 924{
444abaca 925 struct packet_config *packet;
dc8acb97 926
444abaca
DJ
927 for (packet = remote_protocol_packets;
928 packet < &remote_protocol_packets[PACKET_MAX];
929 packet++)
930 {
931 if (&packet->detect == c->var)
932 {
933 update_packet_config (packet);
934 return;
935 }
936 }
937 internal_error (__FILE__, __LINE__, "Could not find config for %s",
938 c->name);
dc8acb97
MS
939}
940
5a2468f5 941static void
444abaca
DJ
942show_remote_protocol_packet_cmd (struct ui_file *file, int from_tty,
943 struct cmd_list_element *c,
944 const char *value)
5a2468f5 945{
444abaca 946 struct packet_config *packet;
5a2468f5 947
444abaca
DJ
948 for (packet = remote_protocol_packets;
949 packet < &remote_protocol_packets[PACKET_MAX];
950 packet++)
951 {
952 if (&packet->detect == c->var)
953 {
954 show_packet_config_cmd (packet);
955 return;
956 }
957 }
958 internal_error (__FILE__, __LINE__, "Could not find config for %s",
959 c->name);
5a2468f5
JM
960}
961
d471ea57
AC
962/* Should we try one of the 'Z' requests? */
963
964enum Z_packet_type
965{
966 Z_PACKET_SOFTWARE_BP,
967 Z_PACKET_HARDWARE_BP,
968 Z_PACKET_WRITE_WP,
969 Z_PACKET_READ_WP,
970 Z_PACKET_ACCESS_WP,
971 NR_Z_PACKET_TYPES
972};
96baa820 973
d471ea57 974/* For compatibility with older distributions. Provide a ``set remote
23860348 975 Z-packet ...'' command that updates all the Z packet types. */
d471ea57 976
7f19b9a2 977static enum auto_boolean remote_Z_packet_detect;
96baa820
JM
978
979static void
fba45db2
KB
980set_remote_protocol_Z_packet_cmd (char *args, int from_tty,
981 struct cmd_list_element *c)
96baa820 982{
d471ea57
AC
983 int i;
984 for (i = 0; i < NR_Z_PACKET_TYPES; i++)
985 {
444abaca
DJ
986 remote_protocol_packets[PACKET_Z0 + i].detect = remote_Z_packet_detect;
987 update_packet_config (&remote_protocol_packets[PACKET_Z0 + i]);
d471ea57 988 }
96baa820
JM
989}
990
991static void
08546159
AC
992show_remote_protocol_Z_packet_cmd (struct ui_file *file, int from_tty,
993 struct cmd_list_element *c,
994 const char *value)
96baa820 995{
d471ea57
AC
996 int i;
997 for (i = 0; i < NR_Z_PACKET_TYPES; i++)
998 {
444abaca 999 show_packet_config_cmd (&remote_protocol_packets[PACKET_Z0 + i]);
d471ea57 1000 }
96baa820
JM
1001}
1002
9d1f7ab2
MS
1003/* Should we try the 'ThreadInfo' query packet?
1004
1005 This variable (NOT available to the user: auto-detect only!)
1006 determines whether GDB will use the new, simpler "ThreadInfo"
1007 query or the older, more complex syntax for thread queries.
802188a7 1008 This is an auto-detect variable (set to true at each connect,
9d1f7ab2
MS
1009 and set to false when the target fails to recognize it). */
1010
1011static int use_threadinfo_query;
1012static int use_threadextra_query;
1013
23860348 1014/* Tokens for use by the asynchronous signal handlers for SIGINT. */
d5d6fca5
DJ
1015static struct async_signal_handler *sigint_remote_twice_token;
1016static struct async_signal_handler *sigint_remote_token;
43ff13b4 1017
c906108c
SS
1018/* These are pointers to hook functions that may be set in order to
1019 modify resume/wait behavior for a particular architecture. */
1020
9a4105ab
AC
1021void (*deprecated_target_resume_hook) (void);
1022void (*deprecated_target_wait_loop_hook) (void);
c906108c
SS
1023\f
1024
c5aa993b 1025
c906108c
SS
1026/* These are the threads which we last sent to the remote system.
1027 -1 for all or -2 for not sent yet. */
1028static int general_thread;
cce74817 1029static int continue_thread;
c906108c
SS
1030
1031/* Call this function as a result of
1032 1) A halt indication (T packet) containing a thread id
1033 2) A direct query of currthread
1034 3) Successful execution of set thread
1035 */
1036
1037static void
fba45db2 1038record_currthread (int currthread)
c906108c 1039{
c906108c 1040 general_thread = currthread;
cce74817 1041
c906108c
SS
1042 /* If this is a new thread, add it to GDB's thread list.
1043 If we leave it up to WFI to do this, bad things will happen. */
39f77062 1044 if (!in_thread_list (pid_to_ptid (currthread)))
0f71a2f6 1045 {
39f77062 1046 add_thread (pid_to_ptid (currthread));
8b93c638 1047 ui_out_text (uiout, "[New ");
39f77062 1048 ui_out_text (uiout, target_pid_to_str (pid_to_ptid (currthread)));
8b93c638 1049 ui_out_text (uiout, "]\n");
0f71a2f6 1050 }
c906108c
SS
1051}
1052
89be2091
DJ
1053static char *last_pass_packet;
1054
1055/* If 'QPassSignals' is supported, tell the remote stub what signals
1056 it can simply pass through to the inferior without reporting. */
1057
1058static void
1059remote_pass_signals (void)
1060{
1061 if (remote_protocol_packets[PACKET_QPassSignals].support != PACKET_DISABLE)
1062 {
1063 char *pass_packet, *p;
1064 int numsigs = (int) TARGET_SIGNAL_LAST;
1065 int count = 0, i;
1066
1067 gdb_assert (numsigs < 256);
1068 for (i = 0; i < numsigs; i++)
1069 {
1070 if (signal_stop_state (i) == 0
1071 && signal_print_state (i) == 0
1072 && signal_pass_state (i) == 1)
1073 count++;
1074 }
1075 pass_packet = xmalloc (count * 3 + strlen ("QPassSignals:") + 1);
1076 strcpy (pass_packet, "QPassSignals:");
1077 p = pass_packet + strlen (pass_packet);
1078 for (i = 0; i < numsigs; i++)
1079 {
1080 if (signal_stop_state (i) == 0
1081 && signal_print_state (i) == 0
1082 && signal_pass_state (i) == 1)
1083 {
1084 if (i >= 16)
1085 *p++ = tohex (i >> 4);
1086 *p++ = tohex (i & 15);
1087 if (count)
1088 *p++ = ';';
1089 else
1090 break;
1091 count--;
1092 }
1093 }
1094 *p = 0;
1095 if (!last_pass_packet || strcmp (last_pass_packet, pass_packet))
1096 {
1097 struct remote_state *rs = get_remote_state ();
1098 char *buf = rs->buf;
1099
1100 putpkt (pass_packet);
1101 getpkt (&rs->buf, &rs->buf_size, 0);
1102 packet_ok (buf, &remote_protocol_packets[PACKET_QPassSignals]);
1103 if (last_pass_packet)
1104 xfree (last_pass_packet);
1105 last_pass_packet = pass_packet;
1106 }
1107 else
1108 xfree (pass_packet);
1109 }
1110}
1111
c906108c
SS
1112#define MAGIC_NULL_PID 42000
1113
1114static void
fba45db2 1115set_thread (int th, int gen)
c906108c 1116{
d01949b6 1117 struct remote_state *rs = get_remote_state ();
6d820c5c 1118 char *buf = rs->buf;
cce74817 1119 int state = gen ? general_thread : continue_thread;
c906108c
SS
1120
1121 if (state == th)
1122 return;
1123
1124 buf[0] = 'H';
1125 buf[1] = gen ? 'g' : 'c';
1126 if (th == MAGIC_NULL_PID)
1127 {
1128 buf[2] = '0';
1129 buf[3] = '\0';
1130 }
1131 else if (th < 0)
ea9c271d 1132 xsnprintf (&buf[2], get_remote_packet_size () - 2, "-%x", -th);
c906108c 1133 else
ea9c271d 1134 xsnprintf (&buf[2], get_remote_packet_size () - 2, "%x", th);
c906108c 1135 putpkt (buf);
6d820c5c 1136 getpkt (&rs->buf, &rs->buf_size, 0);
c906108c 1137 if (gen)
c5aa993b 1138 general_thread = th;
c906108c 1139 else
cce74817 1140 continue_thread = th;
c906108c
SS
1141}
1142\f
1143/* Return nonzero if the thread TH is still alive on the remote system. */
1144
1145static int
39f77062 1146remote_thread_alive (ptid_t ptid)
c906108c 1147{
6d820c5c 1148 struct remote_state *rs = get_remote_state ();
39f77062 1149 int tid = PIDGET (ptid);
c906108c 1150
cce74817 1151 if (tid < 0)
2e9f7625 1152 xsnprintf (rs->buf, get_remote_packet_size (), "T-%08x", -tid);
c906108c 1153 else
2e9f7625
DJ
1154 xsnprintf (rs->buf, get_remote_packet_size (), "T%08x", tid);
1155 putpkt (rs->buf);
6d820c5c 1156 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 1157 return (rs->buf[0] == 'O' && rs->buf[1] == 'K');
c906108c
SS
1158}
1159
1160/* About these extended threadlist and threadinfo packets. They are
1161 variable length packets but, the fields within them are often fixed
1162 length. They are redundent enough to send over UDP as is the
1163 remote protocol in general. There is a matching unit test module
1164 in libstub. */
1165
cce74817
JM
1166#define OPAQUETHREADBYTES 8
1167
1168/* a 64 bit opaque identifier */
1169typedef unsigned char threadref[OPAQUETHREADBYTES];
1170
23860348
MS
1171/* WARNING: This threadref data structure comes from the remote O.S.,
1172 libstub protocol encoding, and remote.c. it is not particularly
1173 changable. */
cce74817
JM
1174
1175/* Right now, the internal structure is int. We want it to be bigger.
1176 Plan to fix this.
c5aa993b 1177 */
cce74817 1178
23860348 1179typedef int gdb_threadref; /* Internal GDB thread reference. */
cce74817 1180
9d1f7ab2 1181/* gdb_ext_thread_info is an internal GDB data structure which is
cfde0993 1182 equivalent to the reply of the remote threadinfo packet. */
cce74817
JM
1183
1184struct gdb_ext_thread_info
c5aa993b 1185 {
23860348 1186 threadref threadid; /* External form of thread reference. */
2bc416ba 1187 int active; /* Has state interesting to GDB?
23860348 1188 regs, stack. */
2bc416ba 1189 char display[256]; /* Brief state display, name,
cedea757 1190 blocked/suspended. */
23860348 1191 char shortname[32]; /* To be used to name threads. */
2bc416ba 1192 char more_display[256]; /* Long info, statistics, queue depth,
23860348 1193 whatever. */
c5aa993b 1194 };
cce74817
JM
1195
1196/* The volume of remote transfers can be limited by submitting
1197 a mask containing bits specifying the desired information.
1198 Use a union of these values as the 'selection' parameter to
1199 get_thread_info. FIXME: Make these TAG names more thread specific.
c5aa993b 1200 */
cce74817
JM
1201
1202#define TAG_THREADID 1
1203#define TAG_EXISTS 2
1204#define TAG_DISPLAY 4
1205#define TAG_THREADNAME 8
c5aa993b 1206#define TAG_MOREDISPLAY 16
cce74817 1207
23860348 1208#define BUF_THREAD_ID_SIZE (OPAQUETHREADBYTES * 2)
c906108c 1209
b2dd6311 1210char *unpack_varlen_hex (char *buff, ULONGEST *result);
cce74817 1211
a14ed312 1212static char *unpack_nibble (char *buf, int *val);
cce74817 1213
a14ed312 1214static char *pack_nibble (char *buf, int nibble);
cce74817 1215
23860348 1216static char *pack_hex_byte (char *pkt, int /* unsigned char */ byte);
cce74817 1217
a14ed312 1218static char *unpack_byte (char *buf, int *value);
cce74817 1219
a14ed312 1220static char *pack_int (char *buf, int value);
cce74817 1221
a14ed312 1222static char *unpack_int (char *buf, int *value);
cce74817 1223
a14ed312 1224static char *unpack_string (char *src, char *dest, int length);
cce74817 1225
23860348 1226static char *pack_threadid (char *pkt, threadref *id);
cce74817 1227
23860348 1228static char *unpack_threadid (char *inbuf, threadref *id);
cce74817 1229
23860348 1230void int_to_threadref (threadref *id, int value);
cce74817 1231
23860348 1232static int threadref_to_int (threadref *ref);
cce74817 1233
23860348 1234static void copy_threadref (threadref *dest, threadref *src);
cce74817 1235
23860348 1236static int threadmatch (threadref *dest, threadref *src);
cce74817 1237
2bc416ba 1238static char *pack_threadinfo_request (char *pkt, int mode,
23860348 1239 threadref *id);
cce74817 1240
a14ed312 1241static int remote_unpack_thread_info_response (char *pkt,
23860348 1242 threadref *expectedref,
a14ed312
KB
1243 struct gdb_ext_thread_info
1244 *info);
cce74817
JM
1245
1246
2bc416ba 1247static int remote_get_threadinfo (threadref *threadid,
23860348 1248 int fieldset, /*TAG mask */
a14ed312 1249 struct gdb_ext_thread_info *info);
cce74817 1250
a14ed312
KB
1251static char *pack_threadlist_request (char *pkt, int startflag,
1252 int threadcount,
23860348 1253 threadref *nextthread);
cce74817 1254
a14ed312
KB
1255static int parse_threadlist_response (char *pkt,
1256 int result_limit,
23860348 1257 threadref *original_echo,
2bc416ba 1258 threadref *resultlist,
23860348 1259 int *doneflag);
cce74817 1260
a14ed312 1261static int remote_get_threadlist (int startflag,
23860348 1262 threadref *nextthread,
a14ed312
KB
1263 int result_limit,
1264 int *done,
2bc416ba 1265 int *result_count,
23860348 1266 threadref *threadlist);
cce74817 1267
23860348 1268typedef int (*rmt_thread_action) (threadref *ref, void *context);
cce74817 1269
a14ed312
KB
1270static int remote_threadlist_iterator (rmt_thread_action stepfunction,
1271 void *context, int looplimit);
cce74817 1272
23860348 1273static int remote_newthread_step (threadref *ref, void *context);
cce74817 1274
23860348 1275/* Encode 64 bits in 16 chars of hex. */
c906108c
SS
1276
1277static const char hexchars[] = "0123456789abcdef";
1278
1279static int
fba45db2 1280ishex (int ch, int *val)
c906108c
SS
1281{
1282 if ((ch >= 'a') && (ch <= 'f'))
1283 {
1284 *val = ch - 'a' + 10;
1285 return 1;
1286 }
1287 if ((ch >= 'A') && (ch <= 'F'))
1288 {
1289 *val = ch - 'A' + 10;
1290 return 1;
1291 }
1292 if ((ch >= '0') && (ch <= '9'))
1293 {
1294 *val = ch - '0';
1295 return 1;
1296 }
1297 return 0;
1298}
1299
1300static int
fba45db2 1301stubhex (int ch)
c906108c
SS
1302{
1303 if (ch >= 'a' && ch <= 'f')
1304 return ch - 'a' + 10;
1305 if (ch >= '0' && ch <= '9')
1306 return ch - '0';
1307 if (ch >= 'A' && ch <= 'F')
1308 return ch - 'A' + 10;
1309 return -1;
1310}
1311
1312static int
fba45db2 1313stub_unpack_int (char *buff, int fieldlength)
c906108c
SS
1314{
1315 int nibble;
1316 int retval = 0;
1317
1318 while (fieldlength)
1319 {
1320 nibble = stubhex (*buff++);
1321 retval |= nibble;
1322 fieldlength--;
1323 if (fieldlength)
1324 retval = retval << 4;
1325 }
1326 return retval;
1327}
1328
1329char *
fba45db2 1330unpack_varlen_hex (char *buff, /* packet to parse */
b2dd6311 1331 ULONGEST *result)
c906108c
SS
1332{
1333 int nibble;
d49c44d5 1334 ULONGEST retval = 0;
c906108c
SS
1335
1336 while (ishex (*buff, &nibble))
1337 {
1338 buff++;
1339 retval = retval << 4;
1340 retval |= nibble & 0x0f;
1341 }
1342 *result = retval;
1343 return buff;
1344}
1345
1346static char *
fba45db2 1347unpack_nibble (char *buf, int *val)
c906108c
SS
1348{
1349 ishex (*buf++, val);
1350 return buf;
1351}
1352
1353static char *
fba45db2 1354pack_nibble (char *buf, int nibble)
c906108c
SS
1355{
1356 *buf++ = hexchars[(nibble & 0x0f)];
1357 return buf;
1358}
1359
1360static char *
fba45db2 1361pack_hex_byte (char *pkt, int byte)
c906108c
SS
1362{
1363 *pkt++ = hexchars[(byte >> 4) & 0xf];
1364 *pkt++ = hexchars[(byte & 0xf)];
1365 return pkt;
1366}
1367
1368static char *
fba45db2 1369unpack_byte (char *buf, int *value)
c906108c
SS
1370{
1371 *value = stub_unpack_int (buf, 2);
1372 return buf + 2;
1373}
1374
1375static char *
fba45db2 1376pack_int (char *buf, int value)
c906108c
SS
1377{
1378 buf = pack_hex_byte (buf, (value >> 24) & 0xff);
1379 buf = pack_hex_byte (buf, (value >> 16) & 0xff);
1380 buf = pack_hex_byte (buf, (value >> 8) & 0x0ff);
1381 buf = pack_hex_byte (buf, (value & 0xff));
1382 return buf;
1383}
1384
1385static char *
fba45db2 1386unpack_int (char *buf, int *value)
c906108c
SS
1387{
1388 *value = stub_unpack_int (buf, 8);
1389 return buf + 8;
1390}
1391
23860348 1392#if 0 /* Currently unused, uncomment when needed. */
a14ed312 1393static char *pack_string (char *pkt, char *string);
c906108c
SS
1394
1395static char *
fba45db2 1396pack_string (char *pkt, char *string)
c906108c
SS
1397{
1398 char ch;
1399 int len;
1400
1401 len = strlen (string);
1402 if (len > 200)
23860348 1403 len = 200; /* Bigger than most GDB packets, junk??? */
c906108c
SS
1404 pkt = pack_hex_byte (pkt, len);
1405 while (len-- > 0)
1406 {
1407 ch = *string++;
1408 if ((ch == '\0') || (ch == '#'))
23860348 1409 ch = '*'; /* Protect encapsulation. */
c906108c
SS
1410 *pkt++ = ch;
1411 }
1412 return pkt;
1413}
1414#endif /* 0 (unused) */
1415
1416static char *
fba45db2 1417unpack_string (char *src, char *dest, int length)
c906108c
SS
1418{
1419 while (length--)
1420 *dest++ = *src++;
1421 *dest = '\0';
1422 return src;
1423}
1424
1425static char *
fba45db2 1426pack_threadid (char *pkt, threadref *id)
c906108c
SS
1427{
1428 char *limit;
1429 unsigned char *altid;
1430
1431 altid = (unsigned char *) id;
1432 limit = pkt + BUF_THREAD_ID_SIZE;
1433 while (pkt < limit)
1434 pkt = pack_hex_byte (pkt, *altid++);
1435 return pkt;
1436}
1437
1438
1439static char *
fba45db2 1440unpack_threadid (char *inbuf, threadref *id)
c906108c
SS
1441{
1442 char *altref;
1443 char *limit = inbuf + BUF_THREAD_ID_SIZE;
1444 int x, y;
1445
1446 altref = (char *) id;
1447
1448 while (inbuf < limit)
1449 {
1450 x = stubhex (*inbuf++);
1451 y = stubhex (*inbuf++);
1452 *altref++ = (x << 4) | y;
1453 }
1454 return inbuf;
1455}
1456
1457/* Externally, threadrefs are 64 bits but internally, they are still
1458 ints. This is due to a mismatch of specifications. We would like
1459 to use 64bit thread references internally. This is an adapter
1460 function. */
1461
1462void
fba45db2 1463int_to_threadref (threadref *id, int value)
c906108c
SS
1464{
1465 unsigned char *scan;
1466
1467 scan = (unsigned char *) id;
1468 {
1469 int i = 4;
1470 while (i--)
1471 *scan++ = 0;
1472 }
1473 *scan++ = (value >> 24) & 0xff;
1474 *scan++ = (value >> 16) & 0xff;
1475 *scan++ = (value >> 8) & 0xff;
1476 *scan++ = (value & 0xff);
1477}
1478
1479static int
fba45db2 1480threadref_to_int (threadref *ref)
c906108c
SS
1481{
1482 int i, value = 0;
1483 unsigned char *scan;
1484
cfd77fa1 1485 scan = *ref;
c906108c
SS
1486 scan += 4;
1487 i = 4;
1488 while (i-- > 0)
1489 value = (value << 8) | ((*scan++) & 0xff);
1490 return value;
1491}
1492
1493static void
fba45db2 1494copy_threadref (threadref *dest, threadref *src)
c906108c
SS
1495{
1496 int i;
1497 unsigned char *csrc, *cdest;
1498
1499 csrc = (unsigned char *) src;
1500 cdest = (unsigned char *) dest;
1501 i = 8;
1502 while (i--)
1503 *cdest++ = *csrc++;
1504}
1505
1506static int
fba45db2 1507threadmatch (threadref *dest, threadref *src)
c906108c 1508{
23860348 1509 /* Things are broken right now, so just assume we got a match. */
c906108c
SS
1510#if 0
1511 unsigned char *srcp, *destp;
1512 int i, result;
1513 srcp = (char *) src;
1514 destp = (char *) dest;
1515
1516 result = 1;
1517 while (i-- > 0)
1518 result &= (*srcp++ == *destp++) ? 1 : 0;
1519 return result;
1520#endif
1521 return 1;
1522}
1523
1524/*
c5aa993b
JM
1525 threadid:1, # always request threadid
1526 context_exists:2,
1527 display:4,
1528 unique_name:8,
1529 more_display:16
1530 */
c906108c
SS
1531
1532/* Encoding: 'Q':8,'P':8,mask:32,threadid:64 */
1533
1534static char *
fba45db2 1535pack_threadinfo_request (char *pkt, int mode, threadref *id)
c906108c 1536{
23860348
MS
1537 *pkt++ = 'q'; /* Info Query */
1538 *pkt++ = 'P'; /* process or thread info */
1539 pkt = pack_int (pkt, mode); /* mode */
c906108c 1540 pkt = pack_threadid (pkt, id); /* threadid */
23860348 1541 *pkt = '\0'; /* terminate */
c906108c
SS
1542 return pkt;
1543}
1544
23860348 1545/* These values tag the fields in a thread info response packet. */
c906108c 1546/* Tagging the fields allows us to request specific fields and to
23860348 1547 add more fields as time goes by. */
c906108c 1548
23860348 1549#define TAG_THREADID 1 /* Echo the thread identifier. */
c5aa993b 1550#define TAG_EXISTS 2 /* Is this process defined enough to
23860348 1551 fetch registers and its stack? */
c5aa993b 1552#define TAG_DISPLAY 4 /* A short thing maybe to put on a window */
23860348 1553#define TAG_THREADNAME 8 /* string, maps 1-to-1 with a thread is. */
802188a7 1554#define TAG_MOREDISPLAY 16 /* Whatever the kernel wants to say about
23860348 1555 the process. */
c906108c
SS
1556
1557static int
fba45db2
KB
1558remote_unpack_thread_info_response (char *pkt, threadref *expectedref,
1559 struct gdb_ext_thread_info *info)
c906108c 1560{
d01949b6 1561 struct remote_state *rs = get_remote_state ();
c906108c 1562 int mask, length;
cfd77fa1 1563 int tag;
c906108c 1564 threadref ref;
6d820c5c 1565 char *limit = pkt + rs->buf_size; /* Plausible parsing limit. */
c906108c
SS
1566 int retval = 1;
1567
23860348 1568 /* info->threadid = 0; FIXME: implement zero_threadref. */
c906108c
SS
1569 info->active = 0;
1570 info->display[0] = '\0';
1571 info->shortname[0] = '\0';
1572 info->more_display[0] = '\0';
1573
23860348
MS
1574 /* Assume the characters indicating the packet type have been
1575 stripped. */
c906108c
SS
1576 pkt = unpack_int (pkt, &mask); /* arg mask */
1577 pkt = unpack_threadid (pkt, &ref);
1578
1579 if (mask == 0)
8a3fe4f8 1580 warning (_("Incomplete response to threadinfo request."));
c906108c 1581 if (!threadmatch (&ref, expectedref))
23860348 1582 { /* This is an answer to a different request. */
8a3fe4f8 1583 warning (_("ERROR RMT Thread info mismatch."));
c906108c
SS
1584 return 0;
1585 }
1586 copy_threadref (&info->threadid, &ref);
1587
23860348 1588 /* Loop on tagged fields , try to bail if somthing goes wrong. */
c906108c 1589
23860348
MS
1590 /* Packets are terminated with nulls. */
1591 while ((pkt < limit) && mask && *pkt)
c906108c
SS
1592 {
1593 pkt = unpack_int (pkt, &tag); /* tag */
23860348
MS
1594 pkt = unpack_byte (pkt, &length); /* length */
1595 if (!(tag & mask)) /* Tags out of synch with mask. */
c906108c 1596 {
8a3fe4f8 1597 warning (_("ERROR RMT: threadinfo tag mismatch."));
c906108c
SS
1598 retval = 0;
1599 break;
1600 }
1601 if (tag == TAG_THREADID)
1602 {
1603 if (length != 16)
1604 {
8a3fe4f8 1605 warning (_("ERROR RMT: length of threadid is not 16."));
c906108c
SS
1606 retval = 0;
1607 break;
1608 }
1609 pkt = unpack_threadid (pkt, &ref);
1610 mask = mask & ~TAG_THREADID;
1611 continue;
1612 }
1613 if (tag == TAG_EXISTS)
1614 {
1615 info->active = stub_unpack_int (pkt, length);
1616 pkt += length;
1617 mask = mask & ~(TAG_EXISTS);
1618 if (length > 8)
1619 {
8a3fe4f8 1620 warning (_("ERROR RMT: 'exists' length too long."));
c906108c
SS
1621 retval = 0;
1622 break;
1623 }
1624 continue;
1625 }
1626 if (tag == TAG_THREADNAME)
1627 {
1628 pkt = unpack_string (pkt, &info->shortname[0], length);
1629 mask = mask & ~TAG_THREADNAME;
1630 continue;
1631 }
1632 if (tag == TAG_DISPLAY)
1633 {
1634 pkt = unpack_string (pkt, &info->display[0], length);
1635 mask = mask & ~TAG_DISPLAY;
1636 continue;
1637 }
1638 if (tag == TAG_MOREDISPLAY)
1639 {
1640 pkt = unpack_string (pkt, &info->more_display[0], length);
1641 mask = mask & ~TAG_MOREDISPLAY;
1642 continue;
1643 }
8a3fe4f8 1644 warning (_("ERROR RMT: unknown thread info tag."));
23860348 1645 break; /* Not a tag we know about. */
c906108c
SS
1646 }
1647 return retval;
1648}
1649
1650static int
fba45db2
KB
1651remote_get_threadinfo (threadref *threadid, int fieldset, /* TAG mask */
1652 struct gdb_ext_thread_info *info)
c906108c 1653{
d01949b6 1654 struct remote_state *rs = get_remote_state ();
c906108c 1655 int result;
c906108c 1656
2e9f7625
DJ
1657 pack_threadinfo_request (rs->buf, fieldset, threadid);
1658 putpkt (rs->buf);
6d820c5c 1659 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 1660 result = remote_unpack_thread_info_response (rs->buf + 2,
23860348 1661 threadid, info);
c906108c
SS
1662 return result;
1663}
1664
c906108c
SS
1665/* Format: i'Q':8,i"L":8,initflag:8,batchsize:16,lastthreadid:32 */
1666
1667static char *
fba45db2
KB
1668pack_threadlist_request (char *pkt, int startflag, int threadcount,
1669 threadref *nextthread)
c906108c
SS
1670{
1671 *pkt++ = 'q'; /* info query packet */
1672 *pkt++ = 'L'; /* Process LIST or threadLIST request */
23860348 1673 pkt = pack_nibble (pkt, startflag); /* initflag 1 bytes */
c906108c
SS
1674 pkt = pack_hex_byte (pkt, threadcount); /* threadcount 2 bytes */
1675 pkt = pack_threadid (pkt, nextthread); /* 64 bit thread identifier */
1676 *pkt = '\0';
1677 return pkt;
1678}
1679
1680/* Encoding: 'q':8,'M':8,count:16,done:8,argthreadid:64,(threadid:64)* */
1681
1682static int
fba45db2
KB
1683parse_threadlist_response (char *pkt, int result_limit,
1684 threadref *original_echo, threadref *resultlist,
1685 int *doneflag)
c906108c 1686{
d01949b6 1687 struct remote_state *rs = get_remote_state ();
c906108c
SS
1688 char *limit;
1689 int count, resultcount, done;
1690
1691 resultcount = 0;
1692 /* Assume the 'q' and 'M chars have been stripped. */
6d820c5c 1693 limit = pkt + (rs->buf_size - BUF_THREAD_ID_SIZE);
23860348 1694 /* done parse past here */
c906108c
SS
1695 pkt = unpack_byte (pkt, &count); /* count field */
1696 pkt = unpack_nibble (pkt, &done);
1697 /* The first threadid is the argument threadid. */
1698 pkt = unpack_threadid (pkt, original_echo); /* should match query packet */
1699 while ((count-- > 0) && (pkt < limit))
1700 {
1701 pkt = unpack_threadid (pkt, resultlist++);
1702 if (resultcount++ >= result_limit)
1703 break;
1704 }
1705 if (doneflag)
1706 *doneflag = done;
1707 return resultcount;
1708}
1709
1710static int
fba45db2
KB
1711remote_get_threadlist (int startflag, threadref *nextthread, int result_limit,
1712 int *done, int *result_count, threadref *threadlist)
c906108c 1713{
d01949b6 1714 struct remote_state *rs = get_remote_state ();
c906108c 1715 static threadref echo_nextthread;
c906108c
SS
1716 int result = 1;
1717
23860348 1718 /* Trancate result limit to be smaller than the packet size. */
ea9c271d
DJ
1719 if ((((result_limit + 1) * BUF_THREAD_ID_SIZE) + 10) >= get_remote_packet_size ())
1720 result_limit = (get_remote_packet_size () / BUF_THREAD_ID_SIZE) - 2;
c906108c 1721
6d820c5c
DJ
1722 pack_threadlist_request (rs->buf, startflag, result_limit, nextthread);
1723 putpkt (rs->buf);
1724 getpkt (&rs->buf, &rs->buf_size, 0);
c906108c
SS
1725
1726 *result_count =
6d820c5c 1727 parse_threadlist_response (rs->buf + 2, result_limit, &echo_nextthread,
c906108c
SS
1728 threadlist, done);
1729
1730 if (!threadmatch (&echo_nextthread, nextthread))
1731 {
23860348
MS
1732 /* FIXME: This is a good reason to drop the packet. */
1733 /* Possably, there is a duplicate response. */
c906108c
SS
1734 /* Possabilities :
1735 retransmit immediatly - race conditions
1736 retransmit after timeout - yes
1737 exit
1738 wait for packet, then exit
1739 */
8a3fe4f8 1740 warning (_("HMM: threadlist did not echo arg thread, dropping it."));
23860348 1741 return 0; /* I choose simply exiting. */
c906108c
SS
1742 }
1743 if (*result_count <= 0)
1744 {
1745 if (*done != 1)
1746 {
8a3fe4f8 1747 warning (_("RMT ERROR : failed to get remote thread list."));
c906108c
SS
1748 result = 0;
1749 }
1750 return result; /* break; */
1751 }
1752 if (*result_count > result_limit)
1753 {
1754 *result_count = 0;
8a3fe4f8 1755 warning (_("RMT ERROR: threadlist response longer than requested."));
c906108c
SS
1756 return 0;
1757 }
1758 return result;
1759}
1760
23860348
MS
1761/* This is the interface between remote and threads, remotes upper
1762 interface. */
c906108c
SS
1763
1764/* remote_find_new_threads retrieves the thread list and for each
1765 thread in the list, looks up the thread in GDB's internal list,
1766 ading the thread if it does not already exist. This involves
1767 getting partial thread lists from the remote target so, polling the
1768 quit_flag is required. */
1769
1770
23860348 1771/* About this many threadisds fit in a packet. */
c906108c
SS
1772
1773#define MAXTHREADLISTRESULTS 32
1774
1775static int
fba45db2
KB
1776remote_threadlist_iterator (rmt_thread_action stepfunction, void *context,
1777 int looplimit)
c906108c
SS
1778{
1779 int done, i, result_count;
1780 int startflag = 1;
1781 int result = 1;
1782 int loopcount = 0;
1783 static threadref nextthread;
1784 static threadref resultthreadlist[MAXTHREADLISTRESULTS];
1785
1786 done = 0;
1787 while (!done)
1788 {
1789 if (loopcount++ > looplimit)
1790 {
1791 result = 0;
8a3fe4f8 1792 warning (_("Remote fetch threadlist -infinite loop-."));
c906108c
SS
1793 break;
1794 }
1795 if (!remote_get_threadlist (startflag, &nextthread, MAXTHREADLISTRESULTS,
1796 &done, &result_count, resultthreadlist))
1797 {
1798 result = 0;
1799 break;
1800 }
23860348 1801 /* Clear for later iterations. */
c906108c
SS
1802 startflag = 0;
1803 /* Setup to resume next batch of thread references, set nextthread. */
1804 if (result_count >= 1)
1805 copy_threadref (&nextthread, &resultthreadlist[result_count - 1]);
1806 i = 0;
1807 while (result_count--)
1808 if (!(result = (*stepfunction) (&resultthreadlist[i++], context)))
1809 break;
1810 }
1811 return result;
1812}
1813
1814static int
fba45db2 1815remote_newthread_step (threadref *ref, void *context)
c906108c 1816{
39f77062 1817 ptid_t ptid;
c906108c 1818
39f77062
KB
1819 ptid = pid_to_ptid (threadref_to_int (ref));
1820
1821 if (!in_thread_list (ptid))
1822 add_thread (ptid);
c906108c
SS
1823 return 1; /* continue iterator */
1824}
1825
1826#define CRAZY_MAX_THREADS 1000
1827
39f77062
KB
1828static ptid_t
1829remote_current_thread (ptid_t oldpid)
c906108c 1830{
d01949b6 1831 struct remote_state *rs = get_remote_state ();
c906108c
SS
1832
1833 putpkt ("qC");
6d820c5c 1834 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 1835 if (rs->buf[0] == 'Q' && rs->buf[1] == 'C')
c273b20f
JB
1836 /* Use strtoul here, so we'll correctly parse values whose highest
1837 bit is set. The protocol carries them as a simple series of
1838 hex digits; in the absence of a sign, strtol will see such
1839 values as positive numbers out of range for signed 'long', and
1840 return LONG_MAX to indicate an overflow. */
2e9f7625 1841 return pid_to_ptid (strtoul (&rs->buf[2], NULL, 16));
c906108c
SS
1842 else
1843 return oldpid;
1844}
1845
802188a7
RM
1846/* Find new threads for info threads command.
1847 * Original version, using John Metzler's thread protocol.
9d1f7ab2 1848 */
cce74817
JM
1849
1850static void
fba45db2 1851remote_find_new_threads (void)
c906108c 1852{
c5aa993b
JM
1853 remote_threadlist_iterator (remote_newthread_step, 0,
1854 CRAZY_MAX_THREADS);
39f77062
KB
1855 if (PIDGET (inferior_ptid) == MAGIC_NULL_PID) /* ack ack ack */
1856 inferior_ptid = remote_current_thread (inferior_ptid);
c906108c
SS
1857}
1858
9d1f7ab2
MS
1859/*
1860 * Find all threads for info threads command.
1861 * Uses new thread protocol contributed by Cisco.
1862 * Falls back and attempts to use the older method (above)
1863 * if the target doesn't respond to the new method.
1864 */
1865
0f71a2f6
JM
1866static void
1867remote_threads_info (void)
1868{
d01949b6 1869 struct remote_state *rs = get_remote_state ();
085dd6e6 1870 char *bufp;
0f71a2f6
JM
1871 int tid;
1872
1873 if (remote_desc == 0) /* paranoia */
8a3fe4f8 1874 error (_("Command can only be used when connected to the remote target."));
0f71a2f6 1875
9d1f7ab2
MS
1876 if (use_threadinfo_query)
1877 {
1878 putpkt ("qfThreadInfo");
6d820c5c 1879 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 1880 bufp = rs->buf;
9d1f7ab2 1881 if (bufp[0] != '\0') /* q packet recognized */
802188a7 1882 {
9d1f7ab2
MS
1883 while (*bufp++ == 'm') /* reply contains one or more TID */
1884 {
1885 do
1886 {
c273b20f
JB
1887 /* Use strtoul here, so we'll correctly parse values
1888 whose highest bit is set. The protocol carries
1889 them as a simple series of hex digits; in the
1890 absence of a sign, strtol will see such values as
1891 positive numbers out of range for signed 'long',
1892 and return LONG_MAX to indicate an overflow. */
1893 tid = strtoul (bufp, &bufp, 16);
39f77062
KB
1894 if (tid != 0 && !in_thread_list (pid_to_ptid (tid)))
1895 add_thread (pid_to_ptid (tid));
9d1f7ab2
MS
1896 }
1897 while (*bufp++ == ','); /* comma-separated list */
1898 putpkt ("qsThreadInfo");
6d820c5c 1899 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 1900 bufp = rs->buf;
9d1f7ab2
MS
1901 }
1902 return; /* done */
1903 }
1904 }
1905
23860348 1906 /* Else fall back to old method based on jmetzler protocol. */
9d1f7ab2
MS
1907 use_threadinfo_query = 0;
1908 remote_find_new_threads ();
1909 return;
1910}
1911
802188a7 1912/*
9d1f7ab2
MS
1913 * Collect a descriptive string about the given thread.
1914 * The target may say anything it wants to about the thread
1915 * (typically info about its blocked / runnable state, name, etc.).
1916 * This string will appear in the info threads display.
802188a7 1917 *
9d1f7ab2
MS
1918 * Optional: targets are not required to implement this function.
1919 */
1920
1921static char *
1922remote_threads_extra_info (struct thread_info *tp)
1923{
d01949b6 1924 struct remote_state *rs = get_remote_state ();
9d1f7ab2
MS
1925 int result;
1926 int set;
1927 threadref id;
1928 struct gdb_ext_thread_info threadinfo;
23860348 1929 static char display_buf[100]; /* arbitrary... */
9d1f7ab2
MS
1930 int n = 0; /* position in display_buf */
1931
1932 if (remote_desc == 0) /* paranoia */
8e65ff28 1933 internal_error (__FILE__, __LINE__,
e2e0b3e5 1934 _("remote_threads_extra_info"));
9d1f7ab2
MS
1935
1936 if (use_threadextra_query)
1937 {
2e9f7625 1938 xsnprintf (rs->buf, get_remote_packet_size (), "qThreadExtraInfo,%x",
ecbc58df 1939 PIDGET (tp->ptid));
2e9f7625 1940 putpkt (rs->buf);
6d820c5c 1941 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 1942 if (rs->buf[0] != 0)
9d1f7ab2 1943 {
2e9f7625
DJ
1944 n = min (strlen (rs->buf) / 2, sizeof (display_buf));
1945 result = hex2bin (rs->buf, (gdb_byte *) display_buf, n);
30559e10 1946 display_buf [result] = '\0';
9d1f7ab2
MS
1947 return display_buf;
1948 }
0f71a2f6 1949 }
9d1f7ab2
MS
1950
1951 /* If the above query fails, fall back to the old method. */
1952 use_threadextra_query = 0;
1953 set = TAG_THREADID | TAG_EXISTS | TAG_THREADNAME
1954 | TAG_MOREDISPLAY | TAG_DISPLAY;
39f77062 1955 int_to_threadref (&id, PIDGET (tp->ptid));
9d1f7ab2
MS
1956 if (remote_get_threadinfo (&id, set, &threadinfo))
1957 if (threadinfo.active)
0f71a2f6 1958 {
9d1f7ab2 1959 if (*threadinfo.shortname)
2bc416ba 1960 n += xsnprintf (&display_buf[0], sizeof (display_buf) - n,
ecbc58df 1961 " Name: %s,", threadinfo.shortname);
9d1f7ab2 1962 if (*threadinfo.display)
2bc416ba 1963 n += xsnprintf (&display_buf[n], sizeof (display_buf) - n,
ecbc58df 1964 " State: %s,", threadinfo.display);
9d1f7ab2 1965 if (*threadinfo.more_display)
2bc416ba 1966 n += xsnprintf (&display_buf[n], sizeof (display_buf) - n,
ecbc58df 1967 " Priority: %s", threadinfo.more_display);
9d1f7ab2
MS
1968
1969 if (n > 0)
c5aa993b 1970 {
23860348 1971 /* For purely cosmetic reasons, clear up trailing commas. */
9d1f7ab2
MS
1972 if (',' == display_buf[n-1])
1973 display_buf[n-1] = ' ';
1974 return display_buf;
c5aa993b 1975 }
0f71a2f6 1976 }
9d1f7ab2 1977 return NULL;
0f71a2f6 1978}
c906108c 1979\f
c5aa993b 1980
24b06219 1981/* Restart the remote side; this is an extended protocol operation. */
c906108c
SS
1982
1983static void
fba45db2 1984extended_remote_restart (void)
c906108c 1985{
d01949b6 1986 struct remote_state *rs = get_remote_state ();
c906108c
SS
1987
1988 /* Send the restart command; for reasons I don't understand the
1989 remote side really expects a number after the "R". */
ea9c271d 1990 xsnprintf (rs->buf, get_remote_packet_size (), "R%x", 0);
6d820c5c 1991 putpkt (rs->buf);
c906108c 1992
ad9a8f3f 1993 remote_fileio_reset ();
2bc416ba 1994
c906108c
SS
1995 /* Now query for status so this looks just like we restarted
1996 gdbserver from scratch. */
1997 putpkt ("?");
01d3a6ce 1998 getpkt (&rs->buf, &rs->buf_size, 0);
c906108c
SS
1999}
2000\f
2001/* Clean up connection to a remote debugger. */
2002
c906108c 2003static void
fba45db2 2004remote_close (int quitting)
c906108c
SS
2005{
2006 if (remote_desc)
2cd58942 2007 serial_close (remote_desc);
c906108c
SS
2008 remote_desc = NULL;
2009}
2010
23860348 2011/* Query the remote side for the text, data and bss offsets. */
c906108c
SS
2012
2013static void
fba45db2 2014get_offsets (void)
c906108c 2015{
d01949b6 2016 struct remote_state *rs = get_remote_state ();
2e9f7625 2017 char *buf;
085dd6e6 2018 char *ptr;
31d99776
DJ
2019 int lose, num_segments = 0, do_sections, do_segments;
2020 CORE_ADDR text_addr, data_addr, bss_addr, segments[2];
c906108c 2021 struct section_offsets *offs;
31d99776
DJ
2022 struct symfile_segment_data *data;
2023
2024 if (symfile_objfile == NULL)
2025 return;
c906108c
SS
2026
2027 putpkt ("qOffsets");
6d820c5c 2028 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 2029 buf = rs->buf;
c906108c
SS
2030
2031 if (buf[0] == '\000')
2032 return; /* Return silently. Stub doesn't support
23860348 2033 this command. */
c906108c
SS
2034 if (buf[0] == 'E')
2035 {
8a3fe4f8 2036 warning (_("Remote failure reply: %s"), buf);
c906108c
SS
2037 return;
2038 }
2039
2040 /* Pick up each field in turn. This used to be done with scanf, but
2041 scanf will make trouble if CORE_ADDR size doesn't match
2042 conversion directives correctly. The following code will work
2043 with any size of CORE_ADDR. */
2044 text_addr = data_addr = bss_addr = 0;
2045 ptr = buf;
2046 lose = 0;
2047
2048 if (strncmp (ptr, "Text=", 5) == 0)
2049 {
2050 ptr += 5;
2051 /* Don't use strtol, could lose on big values. */
2052 while (*ptr && *ptr != ';')
2053 text_addr = (text_addr << 4) + fromhex (*ptr++);
c906108c 2054
31d99776
DJ
2055 if (strncmp (ptr, ";Data=", 6) == 0)
2056 {
2057 ptr += 6;
2058 while (*ptr && *ptr != ';')
2059 data_addr = (data_addr << 4) + fromhex (*ptr++);
2060 }
2061 else
2062 lose = 1;
2063
2064 if (!lose && strncmp (ptr, ";Bss=", 5) == 0)
2065 {
2066 ptr += 5;
2067 while (*ptr && *ptr != ';')
2068 bss_addr = (bss_addr << 4) + fromhex (*ptr++);
c906108c 2069
31d99776
DJ
2070 if (bss_addr != data_addr)
2071 warning (_("Target reported unsupported offsets: %s"), buf);
2072 }
2073 else
2074 lose = 1;
2075 }
2076 else if (strncmp (ptr, "TextSeg=", 8) == 0)
c906108c 2077 {
31d99776
DJ
2078 ptr += 8;
2079 /* Don't use strtol, could lose on big values. */
c906108c 2080 while (*ptr && *ptr != ';')
31d99776
DJ
2081 text_addr = (text_addr << 4) + fromhex (*ptr++);
2082 num_segments = 1;
2083
2084 if (strncmp (ptr, ";DataSeg=", 9) == 0)
2085 {
2086 ptr += 9;
2087 while (*ptr && *ptr != ';')
2088 data_addr = (data_addr << 4) + fromhex (*ptr++);
2089 num_segments++;
2090 }
c906108c
SS
2091 }
2092 else
2093 lose = 1;
2094
2095 if (lose)
8a3fe4f8 2096 error (_("Malformed response to offset query, %s"), buf);
31d99776
DJ
2097 else if (*ptr != '\0')
2098 warning (_("Target reported unsupported offsets: %s"), buf);
c906108c 2099
802188a7 2100 offs = ((struct section_offsets *)
a39a16c4 2101 alloca (SIZEOF_N_SECTION_OFFSETS (symfile_objfile->num_sections)));
802188a7 2102 memcpy (offs, symfile_objfile->section_offsets,
a39a16c4 2103 SIZEOF_N_SECTION_OFFSETS (symfile_objfile->num_sections));
c906108c 2104
31d99776
DJ
2105 data = get_symfile_segment_data (symfile_objfile->obfd);
2106 do_segments = (data != NULL);
2107 do_sections = num_segments == 0;
c906108c 2108
31d99776
DJ
2109 /* Text= and Data= specify offsets for the text and data sections,
2110 but symfile_map_offsets_to_segments expects base addresses
2111 instead of offsets. If we have two segments, we can still
2112 try to relocate the whole segments instead of just ".text"
2113 and ".data". */
2114 if (num_segments == 0)
2115 {
2116 do_sections = 1;
2117 if (data == NULL || data->num_segments != 2)
2118 do_segments = 0;
2119 else
2120 {
2121 segments[0] = data->segment_bases[0] + text_addr;
2122 segments[1] = data->segment_bases[1] + data_addr;
2123 }
2124 }
2125 else
2126 {
2127 do_sections = 0;
2128 segments[0] = text_addr;
2129 segments[1] = data_addr;
2130 }
2131
2132 if (do_segments)
2133 {
2134 int ret = symfile_map_offsets_to_segments (symfile_objfile->obfd, data,
2135 offs, num_segments, segments);
2136
2137 if (ret == 0 && !do_sections)
2138 error (_("Can not handle qOffsets TextSeg response with this symbol file"));
2139
2140 if (ret > 0)
2141 do_sections = 0;
2142 }
c906108c 2143
31d99776
DJ
2144 free_symfile_segment_data (data);
2145
2146 if (do_sections)
2147 {
2148 offs->offsets[SECT_OFF_TEXT (symfile_objfile)] = text_addr;
2149
2150 /* This is a temporary kludge to force data and bss to use the same offsets
2151 because that's what nlmconv does now. The real solution requires changes
2152 to the stub and remote.c that I don't have time to do right now. */
2153
2154 offs->offsets[SECT_OFF_DATA (symfile_objfile)] = data_addr;
2155 offs->offsets[SECT_OFF_BSS (symfile_objfile)] = data_addr;
2156 }
c906108c
SS
2157
2158 objfile_relocate (symfile_objfile, offs);
2159}
2160
8621d6a9 2161/* Stub for catch_exception. */
0f71a2f6 2162
9cbc821d 2163static void
8621d6a9 2164remote_start_remote (struct ui_out *uiout, void *from_tty_p)
c906108c 2165{
8621d6a9
DJ
2166 int from_tty = * (int *) from_tty_p;
2167
23860348 2168 immediate_quit++; /* Allow user to interrupt it. */
c906108c
SS
2169
2170 /* Ack any packet which the remote side has already sent. */
2cd58942 2171 serial_write (remote_desc, "+", 1);
c906108c
SS
2172
2173 /* Let the stub know that we want it to return the thread. */
2174 set_thread (-1, 0);
2175
39f77062 2176 inferior_ptid = remote_current_thread (inferior_ptid);
c906108c 2177
23860348 2178 get_offsets (); /* Get text, data & bss offsets. */
c906108c 2179
23860348 2180 putpkt ("?"); /* Initiate a query from remote machine. */
8edbea78 2181 immediate_quit--;
c906108c 2182
8621d6a9 2183 start_remote (from_tty); /* Initialize gdb process mechanisms. */
c906108c
SS
2184}
2185
2186/* Open a connection to a remote debugger.
2187 NAME is the filename used for communication. */
2188
2189static void
fba45db2 2190remote_open (char *name, int from_tty)
c906108c 2191{
92d1e331 2192 remote_open_1 (name, from_tty, &remote_ops, 0, 0);
c906108c
SS
2193}
2194
23860348 2195/* Just like remote_open, but with asynchronous support. */
43ff13b4 2196static void
fba45db2 2197remote_async_open (char *name, int from_tty)
43ff13b4 2198{
92d1e331 2199 remote_open_1 (name, from_tty, &remote_async_ops, 0, 1);
43ff13b4
JM
2200}
2201
c906108c
SS
2202/* Open a connection to a remote debugger using the extended
2203 remote gdb protocol. NAME is the filename used for communication. */
2204
2205static void
fba45db2 2206extended_remote_open (char *name, int from_tty)
c906108c 2207{
92d1e331
DJ
2208 remote_open_1 (name, from_tty, &extended_remote_ops, 1 /*extended_p */,
2209 0 /* async_p */);
c906108c
SS
2210}
2211
23860348 2212/* Just like extended_remote_open, but with asynchronous support. */
43ff13b4 2213static void
fba45db2 2214extended_remote_async_open (char *name, int from_tty)
43ff13b4 2215{
92d1e331
DJ
2216 remote_open_1 (name, from_tty, &extended_async_remote_ops,
2217 1 /*extended_p */, 1 /* async_p */);
43ff13b4
JM
2218}
2219
c906108c
SS
2220/* Generic code for opening a connection to a remote target. */
2221
d471ea57
AC
2222static void
2223init_all_packet_configs (void)
2224{
2225 int i;
444abaca
DJ
2226 for (i = 0; i < PACKET_MAX; i++)
2227 update_packet_config (&remote_protocol_packets[i]);
d471ea57
AC
2228}
2229
23860348 2230/* Symbol look-up. */
dc8acb97
MS
2231
2232static void
2233remote_check_symbols (struct objfile *objfile)
2234{
d01949b6 2235 struct remote_state *rs = get_remote_state ();
dc8acb97
MS
2236 char *msg, *reply, *tmp;
2237 struct minimal_symbol *sym;
2238 int end;
2239
444abaca 2240 if (remote_protocol_packets[PACKET_qSymbol].support == PACKET_DISABLE)
dc8acb97
MS
2241 return;
2242
6d820c5c
DJ
2243 /* Allocate a message buffer. We can't reuse the input buffer in RS,
2244 because we need both at the same time. */
ea9c271d 2245 msg = alloca (get_remote_packet_size ());
6d820c5c 2246
23860348 2247 /* Invite target to request symbol lookups. */
dc8acb97
MS
2248
2249 putpkt ("qSymbol::");
6d820c5c
DJ
2250 getpkt (&rs->buf, &rs->buf_size, 0);
2251 packet_ok (rs->buf, &remote_protocol_packets[PACKET_qSymbol]);
2e9f7625 2252 reply = rs->buf;
dc8acb97
MS
2253
2254 while (strncmp (reply, "qSymbol:", 8) == 0)
2255 {
2256 tmp = &reply[8];
cfd77fa1 2257 end = hex2bin (tmp, (gdb_byte *) msg, strlen (tmp) / 2);
dc8acb97
MS
2258 msg[end] = '\0';
2259 sym = lookup_minimal_symbol (msg, NULL, NULL);
2260 if (sym == NULL)
ea9c271d 2261 xsnprintf (msg, get_remote_packet_size (), "qSymbol::%s", &reply[8]);
dc8acb97 2262 else
ea9c271d 2263 xsnprintf (msg, get_remote_packet_size (), "qSymbol:%s:%s",
ecbc58df
WZ
2264 paddr_nz (SYMBOL_VALUE_ADDRESS (sym)),
2265 &reply[8]);
dc8acb97 2266 putpkt (msg);
6d820c5c 2267 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 2268 reply = rs->buf;
dc8acb97
MS
2269 }
2270}
2271
9db8d71f
DJ
2272static struct serial *
2273remote_serial_open (char *name)
2274{
2275 static int udp_warning = 0;
2276
2277 /* FIXME: Parsing NAME here is a hack. But we want to warn here instead
2278 of in ser-tcp.c, because it is the remote protocol assuming that the
2279 serial connection is reliable and not the serial connection promising
2280 to be. */
2281 if (!udp_warning && strncmp (name, "udp:", 4) == 0)
2282 {
8a3fe4f8
AC
2283 warning (_("\
2284The remote protocol may be unreliable over UDP.\n\
2285Some events may be lost, rendering further debugging impossible."));
9db8d71f
DJ
2286 udp_warning = 1;
2287 }
2288
2289 return serial_open (name);
2290}
2291
be2a5f71
DJ
2292/* This type describes each known response to the qSupported
2293 packet. */
2294struct protocol_feature
2295{
2296 /* The name of this protocol feature. */
2297 const char *name;
2298
2299 /* The default for this protocol feature. */
2300 enum packet_support default_support;
2301
2302 /* The function to call when this feature is reported, or after
2303 qSupported processing if the feature is not supported.
2304 The first argument points to this structure. The second
2305 argument indicates whether the packet requested support be
2306 enabled, disabled, or probed (or the default, if this function
2307 is being called at the end of processing and this feature was
2308 not reported). The third argument may be NULL; if not NULL, it
2309 is a NUL-terminated string taken from the packet following
2310 this feature's name and an equals sign. */
2311 void (*func) (const struct protocol_feature *, enum packet_support,
2312 const char *);
2313
2314 /* The corresponding packet for this feature. Only used if
2315 FUNC is remote_supported_packet. */
2316 int packet;
2317};
2318
be2a5f71
DJ
2319static void
2320remote_supported_packet (const struct protocol_feature *feature,
2321 enum packet_support support,
2322 const char *argument)
2323{
2324 if (argument)
2325 {
2326 warning (_("Remote qSupported response supplied an unexpected value for"
2327 " \"%s\"."), feature->name);
2328 return;
2329 }
2330
2331 if (remote_protocol_packets[feature->packet].support
2332 == PACKET_SUPPORT_UNKNOWN)
2333 remote_protocol_packets[feature->packet].support = support;
2334}
be2a5f71
DJ
2335
2336static void
2337remote_packet_size (const struct protocol_feature *feature,
2338 enum packet_support support, const char *value)
2339{
2340 struct remote_state *rs = get_remote_state ();
2341
2342 int packet_size;
2343 char *value_end;
2344
2345 if (support != PACKET_ENABLE)
2346 return;
2347
2348 if (value == NULL || *value == '\0')
2349 {
2350 warning (_("Remote target reported \"%s\" without a size."),
2351 feature->name);
2352 return;
2353 }
2354
2355 errno = 0;
2356 packet_size = strtol (value, &value_end, 16);
2357 if (errno != 0 || *value_end != '\0' || packet_size < 0)
2358 {
2359 warning (_("Remote target reported \"%s\" with a bad size: \"%s\"."),
2360 feature->name, value);
2361 return;
2362 }
2363
2364 if (packet_size > MAX_REMOTE_PACKET_SIZE)
2365 {
2366 warning (_("limiting remote suggested packet size (%d bytes) to %d"),
2367 packet_size, MAX_REMOTE_PACKET_SIZE);
2368 packet_size = MAX_REMOTE_PACKET_SIZE;
2369 }
2370
2371 /* Record the new maximum packet size. */
2372 rs->explicit_packet_size = packet_size;
2373}
2374
2375static struct protocol_feature remote_protocol_features[] = {
0876f84a 2376 { "PacketSize", PACKET_DISABLE, remote_packet_size, -1 },
40e57cf2 2377 { "qXfer:auxv:read", PACKET_DISABLE, remote_supported_packet,
fd79ecee 2378 PACKET_qXfer_auxv },
23181151
DJ
2379 { "qXfer:features:read", PACKET_DISABLE, remote_supported_packet,
2380 PACKET_qXfer_features },
fd79ecee 2381 { "qXfer:memory-map:read", PACKET_DISABLE, remote_supported_packet,
89be2091 2382 PACKET_qXfer_memory_map },
4de6483e
UW
2383 { "qXfer:spu:read", PACKET_DISABLE, remote_supported_packet,
2384 PACKET_qXfer_spu_read },
2385 { "qXfer:spu:write", PACKET_DISABLE, remote_supported_packet,
2386 PACKET_qXfer_spu_write },
89be2091
DJ
2387 { "QPassSignals", PACKET_DISABLE, remote_supported_packet,
2388 PACKET_QPassSignals },
be2a5f71
DJ
2389};
2390
2391static void
2392remote_query_supported (void)
2393{
2394 struct remote_state *rs = get_remote_state ();
2395 char *next;
2396 int i;
2397 unsigned char seen [ARRAY_SIZE (remote_protocol_features)];
2398
2399 /* The packet support flags are handled differently for this packet
2400 than for most others. We treat an error, a disabled packet, and
2401 an empty response identically: any features which must be reported
2402 to be used will be automatically disabled. An empty buffer
2403 accomplishes this, since that is also the representation for a list
2404 containing no features. */
2405
2406 rs->buf[0] = 0;
2407 if (remote_protocol_packets[PACKET_qSupported].support != PACKET_DISABLE)
2408 {
2409 putpkt ("qSupported");
2410 getpkt (&rs->buf, &rs->buf_size, 0);
2411
2412 /* If an error occured, warn, but do not return - just reset the
2413 buffer to empty and go on to disable features. */
2414 if (packet_ok (rs->buf, &remote_protocol_packets[PACKET_qSupported])
2415 == PACKET_ERROR)
2416 {
2417 warning (_("Remote failure reply: %s"), rs->buf);
2418 rs->buf[0] = 0;
2419 }
2420 }
2421
2422 memset (seen, 0, sizeof (seen));
2423
2424 next = rs->buf;
2425 while (*next)
2426 {
2427 enum packet_support is_supported;
2428 char *p, *end, *name_end, *value;
2429
2430 /* First separate out this item from the rest of the packet. If
2431 there's another item after this, we overwrite the separator
2432 (terminated strings are much easier to work with). */
2433 p = next;
2434 end = strchr (p, ';');
2435 if (end == NULL)
2436 {
2437 end = p + strlen (p);
2438 next = end;
2439 }
2440 else
2441 {
89be2091
DJ
2442 *end = '\0';
2443 next = end + 1;
2444
be2a5f71
DJ
2445 if (end == p)
2446 {
2447 warning (_("empty item in \"qSupported\" response"));
2448 continue;
2449 }
be2a5f71
DJ
2450 }
2451
2452 name_end = strchr (p, '=');
2453 if (name_end)
2454 {
2455 /* This is a name=value entry. */
2456 is_supported = PACKET_ENABLE;
2457 value = name_end + 1;
2458 *name_end = '\0';
2459 }
2460 else
2461 {
2462 value = NULL;
2463 switch (end[-1])
2464 {
2465 case '+':
2466 is_supported = PACKET_ENABLE;
2467 break;
2468
2469 case '-':
2470 is_supported = PACKET_DISABLE;
2471 break;
2472
2473 case '?':
2474 is_supported = PACKET_SUPPORT_UNKNOWN;
2475 break;
2476
2477 default:
2478 warning (_("unrecognized item \"%s\" in \"qSupported\" response"), p);
2479 continue;
2480 }
2481 end[-1] = '\0';
2482 }
2483
2484 for (i = 0; i < ARRAY_SIZE (remote_protocol_features); i++)
2485 if (strcmp (remote_protocol_features[i].name, p) == 0)
2486 {
2487 const struct protocol_feature *feature;
2488
2489 seen[i] = 1;
2490 feature = &remote_protocol_features[i];
2491 feature->func (feature, is_supported, value);
2492 break;
2493 }
2494 }
2495
2496 /* If we increased the packet size, make sure to increase the global
2497 buffer size also. We delay this until after parsing the entire
2498 qSupported packet, because this is the same buffer we were
2499 parsing. */
2500 if (rs->buf_size < rs->explicit_packet_size)
2501 {
2502 rs->buf_size = rs->explicit_packet_size;
2503 rs->buf = xrealloc (rs->buf, rs->buf_size);
2504 }
2505
2506 /* Handle the defaults for unmentioned features. */
2507 for (i = 0; i < ARRAY_SIZE (remote_protocol_features); i++)
2508 if (!seen[i])
2509 {
2510 const struct protocol_feature *feature;
2511
2512 feature = &remote_protocol_features[i];
2513 feature->func (feature, feature->default_support, NULL);
2514 }
2515}
2516
2517
c906108c 2518static void
fba45db2 2519remote_open_1 (char *name, int from_tty, struct target_ops *target,
92d1e331 2520 int extended_p, int async_p)
c906108c 2521{
d01949b6 2522 struct remote_state *rs = get_remote_state ();
c906108c 2523 if (name == 0)
8a3fe4f8 2524 error (_("To open a remote debug connection, you need to specify what\n"
22e04375 2525 "serial device is attached to the remote system\n"
8a3fe4f8 2526 "(e.g. /dev/ttyS0, /dev/ttya, COM1, etc.)."));
c906108c 2527
23860348 2528 /* See FIXME above. */
92d1e331
DJ
2529 if (!async_p)
2530 wait_forever_enabled_p = 1;
6426a772 2531
c906108c
SS
2532 target_preopen (from_tty);
2533
2534 unpush_target (target);
2535
89be2091
DJ
2536 /* Make sure we send the passed signals list the next time we resume. */
2537 xfree (last_pass_packet);
2538 last_pass_packet = NULL;
2539
ad9a8f3f 2540 remote_fileio_reset ();
1dd41f16
NS
2541 reopen_exec_file ();
2542 reread_symbols ();
2543
9db8d71f 2544 remote_desc = remote_serial_open (name);
c906108c
SS
2545 if (!remote_desc)
2546 perror_with_name (name);
2547
2548 if (baud_rate != -1)
2549 {
2cd58942 2550 if (serial_setbaudrate (remote_desc, baud_rate))
c906108c 2551 {
9b74d5d3
KB
2552 /* The requested speed could not be set. Error out to
2553 top level after closing remote_desc. Take care to
2554 set remote_desc to NULL to avoid closing remote_desc
2555 more than once. */
2cd58942 2556 serial_close (remote_desc);
9b74d5d3 2557 remote_desc = NULL;
c906108c
SS
2558 perror_with_name (name);
2559 }
2560 }
2561
2cd58942 2562 serial_raw (remote_desc);
c906108c
SS
2563
2564 /* If there is something sitting in the buffer we might take it as a
2565 response to a command, which would be bad. */
2cd58942 2566 serial_flush_input (remote_desc);
c906108c
SS
2567
2568 if (from_tty)
2569 {
2570 puts_filtered ("Remote debugging using ");
2571 puts_filtered (name);
2572 puts_filtered ("\n");
2573 }
23860348 2574 push_target (target); /* Switch to using remote target now. */
c906108c 2575
be2a5f71
DJ
2576 /* Reset the target state; these things will be queried either by
2577 remote_query_supported or as they are needed. */
d471ea57 2578 init_all_packet_configs ();
be2a5f71 2579 rs->explicit_packet_size = 0;
802188a7 2580
c5aa993b 2581 general_thread = -2;
cce74817 2582 continue_thread = -2;
c906108c 2583
9d1f7ab2
MS
2584 /* Probe for ability to use "ThreadInfo" query, as required. */
2585 use_threadinfo_query = 1;
2586 use_threadextra_query = 1;
2587
be2a5f71
DJ
2588 /* The first packet we send to the target is the optional "supported
2589 packets" request. If the target can answer this, it will tell us
2590 which later probes to skip. */
2591 remote_query_supported ();
2592
424163ea
DJ
2593 /* Next, if the target can specify a description, read it. We do
2594 this before anything involving memory or registers. */
2595 target_find_description ();
2596
c906108c
SS
2597 /* Without this, some commands which require an active target (such
2598 as kill) won't work. This variable serves (at least) double duty
2599 as both the pid of the target process (if it has such), and as a
2600 flag indicating that a target is active. These functions should
2601 be split out into seperate variables, especially since GDB will
2602 someday have a notion of debugging several processes. */
2603
39f77062 2604 inferior_ptid = pid_to_ptid (MAGIC_NULL_PID);
92d1e331
DJ
2605
2606 if (async_p)
2607 {
23860348 2608 /* With this target we start out by owning the terminal. */
92d1e331
DJ
2609 remote_async_terminal_ours_p = 1;
2610
2611 /* FIXME: cagney/1999-09-23: During the initial connection it is
2612 assumed that the target is already ready and able to respond to
2613 requests. Unfortunately remote_start_remote() eventually calls
2614 wait_for_inferior() with no timeout. wait_forever_enabled_p gets
2615 around this. Eventually a mechanism that allows
2616 wait_for_inferior() to expect/get timeouts will be
23860348 2617 implemented. */
92d1e331
DJ
2618 wait_forever_enabled_p = 0;
2619 }
2620
23860348 2621 /* First delete any symbols previously loaded from shared libraries. */
f78f6cf1 2622 no_shared_libraries (NULL, 0);
f78f6cf1 2623
36918e70 2624 /* Start the remote connection. If error() or QUIT, discard this
165b8e33
AC
2625 target (we'd otherwise be in an inconsistent state) and then
2626 propogate the error on up the exception chain. This ensures that
2627 the caller doesn't stumble along blindly assuming that the
2628 function succeeded. The CLI doesn't have this problem but other
2629 UI's, such as MI do.
36918e70
AC
2630
2631 FIXME: cagney/2002-05-19: Instead of re-throwing the exception,
2632 this function should return an error indication letting the
ce2826aa 2633 caller restore the previous state. Unfortunately the command
36918e70
AC
2634 ``target remote'' is directly wired to this function making that
2635 impossible. On a positive note, the CLI side of this problem has
2636 been fixed - the function set_cmd_context() makes it possible for
2637 all the ``target ....'' commands to share a common callback
2638 function. See cli-dump.c. */
109c3e39
AC
2639 {
2640 struct gdb_exception ex
8621d6a9
DJ
2641 = catch_exception (uiout, remote_start_remote, &from_tty,
2642 RETURN_MASK_ALL);
109c3e39
AC
2643 if (ex.reason < 0)
2644 {
2645 pop_target ();
2646 if (async_p)
2647 wait_forever_enabled_p = 1;
2648 throw_exception (ex);
2649 }
2650 }
c906108c 2651
92d1e331
DJ
2652 if (async_p)
2653 wait_forever_enabled_p = 1;
6426a772
JM
2654
2655 if (extended_p)
43ff13b4 2656 {
6240bebf 2657 /* Tell the remote that we are using the extended protocol. */
6426a772 2658 putpkt ("!");
6d820c5c 2659 getpkt (&rs->buf, &rs->buf_size, 0);
43ff13b4 2660 }
a77053c2 2661
23860348 2662 if (exec_bfd) /* No use without an exec file. */
9353355f 2663 remote_check_symbols (symfile_objfile);
43ff13b4
JM
2664}
2665
c906108c
SS
2666/* This takes a program previously attached to and detaches it. After
2667 this is done, GDB can be used to debug some other program. We
2668 better not have left any breakpoints in the target program or it'll
2669 die when it hits one. */
2670
2671static void
fba45db2 2672remote_detach (char *args, int from_tty)
c906108c 2673{
d01949b6 2674 struct remote_state *rs = get_remote_state ();
c906108c
SS
2675
2676 if (args)
8a3fe4f8 2677 error (_("Argument given to \"detach\" when remotely debugging."));
c906108c
SS
2678
2679 /* Tell the remote target to detach. */
6d820c5c 2680 strcpy (rs->buf, "D");
4ddda9b5
PA
2681 putpkt (rs->buf);
2682 getpkt (&rs->buf, &rs->buf_size, 0);
2683
2684 if (rs->buf[0] == 'E')
2685 error (_("Can't detach process."));
c906108c 2686
23860348 2687 /* Unregister the file descriptor from the event loop. */
6ad8ae5c
DJ
2688 if (target_is_async_p ())
2689 serial_async (remote_desc, NULL, 0);
2690
cca728d0 2691 target_mourn_inferior ();
c906108c
SS
2692 if (from_tty)
2693 puts_filtered ("Ending remote debugging.\n");
2694}
2695
6ad8ae5c
DJ
2696/* Same as remote_detach, but don't send the "D" packet; just disconnect. */
2697
43ff13b4 2698static void
597320e7 2699remote_disconnect (struct target_ops *target, char *args, int from_tty)
43ff13b4 2700{
43ff13b4 2701 if (args)
8a3fe4f8 2702 error (_("Argument given to \"detach\" when remotely debugging."));
43ff13b4 2703
23860348 2704 /* Unregister the file descriptor from the event loop. */
ed9a39eb 2705 if (target_is_async_p ())
2cd58942 2706 serial_async (remote_desc, NULL, 0);
43ff13b4 2707
cca728d0 2708 target_mourn_inferior ();
43ff13b4
JM
2709 if (from_tty)
2710 puts_filtered ("Ending remote debugging.\n");
2711}
2712
c906108c
SS
2713/* Convert hex digit A to a number. */
2714
30559e10 2715static int
fba45db2 2716fromhex (int a)
c906108c
SS
2717{
2718 if (a >= '0' && a <= '9')
2719 return a - '0';
2720 else if (a >= 'a' && a <= 'f')
2721 return a - 'a' + 10;
2722 else if (a >= 'A' && a <= 'F')
2723 return a - 'A' + 10;
c5aa993b 2724 else
8a3fe4f8 2725 error (_("Reply contains invalid hex digit %d"), a);
c906108c
SS
2726}
2727
30559e10 2728static int
cfd77fa1 2729hex2bin (const char *hex, gdb_byte *bin, int count)
30559e10
MS
2730{
2731 int i;
2732
30559e10
MS
2733 for (i = 0; i < count; i++)
2734 {
2735 if (hex[0] == 0 || hex[1] == 0)
2736 {
2737 /* Hex string is short, or of uneven length.
23860348 2738 Return the count that has been converted so far. */
30559e10
MS
2739 return i;
2740 }
2741 *bin++ = fromhex (hex[0]) * 16 + fromhex (hex[1]);
2742 hex += 2;
2743 }
2744 return i;
2745}
2746
c906108c
SS
2747/* Convert number NIB to a hex digit. */
2748
2749static int
fba45db2 2750tohex (int nib)
c906108c
SS
2751{
2752 if (nib < 10)
c5aa993b 2753 return '0' + nib;
c906108c 2754 else
c5aa993b 2755 return 'a' + nib - 10;
c906108c 2756}
30559e10
MS
2757
2758static int
cfd77fa1 2759bin2hex (const gdb_byte *bin, char *hex, int count)
30559e10
MS
2760{
2761 int i;
23860348 2762 /* May use a length, or a nul-terminated string as input. */
30559e10 2763 if (count == 0)
cfd77fa1 2764 count = strlen ((char *) bin);
30559e10
MS
2765
2766 for (i = 0; i < count; i++)
2767 {
2768 *hex++ = tohex ((*bin >> 4) & 0xf);
2769 *hex++ = tohex (*bin++ & 0xf);
2770 }
2771 *hex = 0;
2772 return i;
2773}
c906108c 2774\f
506fb367
DJ
2775/* Check for the availability of vCont. This function should also check
2776 the response. */
c906108c
SS
2777
2778static void
6d820c5c 2779remote_vcont_probe (struct remote_state *rs)
c906108c 2780{
2e9f7625 2781 char *buf;
6d820c5c 2782
2e9f7625
DJ
2783 strcpy (rs->buf, "vCont?");
2784 putpkt (rs->buf);
6d820c5c 2785 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 2786 buf = rs->buf;
c906108c 2787
506fb367
DJ
2788 /* Make sure that the features we assume are supported. */
2789 if (strncmp (buf, "vCont", 5) == 0)
2790 {
2791 char *p = &buf[5];
2792 int support_s, support_S, support_c, support_C;
2793
2794 support_s = 0;
2795 support_S = 0;
2796 support_c = 0;
2797 support_C = 0;
2798 while (p && *p == ';')
2799 {
2800 p++;
2801 if (*p == 's' && (*(p + 1) == ';' || *(p + 1) == 0))
2802 support_s = 1;
2803 else if (*p == 'S' && (*(p + 1) == ';' || *(p + 1) == 0))
2804 support_S = 1;
2805 else if (*p == 'c' && (*(p + 1) == ';' || *(p + 1) == 0))
2806 support_c = 1;
2807 else if (*p == 'C' && (*(p + 1) == ';' || *(p + 1) == 0))
2808 support_C = 1;
2809
2810 p = strchr (p, ';');
2811 }
c906108c 2812
506fb367
DJ
2813 /* If s, S, c, and C are not all supported, we can't use vCont. Clearing
2814 BUF will make packet_ok disable the packet. */
2815 if (!support_s || !support_S || !support_c || !support_C)
2816 buf[0] = 0;
2817 }
c906108c 2818
444abaca 2819 packet_ok (buf, &remote_protocol_packets[PACKET_vCont]);
506fb367 2820}
c906108c 2821
506fb367
DJ
2822/* Resume the remote inferior by using a "vCont" packet. The thread
2823 to be resumed is PTID; STEP and SIGGNAL indicate whether the
2824 resumed thread should be single-stepped and/or signalled. If PTID's
2825 PID is -1, then all threads are resumed; the thread to be stepped and/or
2826 signalled is given in the global INFERIOR_PTID. This function returns
2827 non-zero iff it resumes the inferior.
44eaed12 2828
506fb367
DJ
2829 This function issues a strict subset of all possible vCont commands at the
2830 moment. */
44eaed12 2831
506fb367
DJ
2832static int
2833remote_vcont_resume (ptid_t ptid, int step, enum target_signal siggnal)
2834{
2835 struct remote_state *rs = get_remote_state ();
2836 int pid = PIDGET (ptid);
2963ee1d 2837 char *buf = NULL, *outbuf;
506fb367 2838 struct cleanup *old_cleanup;
44eaed12 2839
444abaca 2840 if (remote_protocol_packets[PACKET_vCont].support == PACKET_SUPPORT_UNKNOWN)
6d820c5c 2841 remote_vcont_probe (rs);
44eaed12 2842
444abaca 2843 if (remote_protocol_packets[PACKET_vCont].support == PACKET_DISABLE)
6d820c5c 2844 return 0;
44eaed12 2845
506fb367
DJ
2846 /* If we could generate a wider range of packets, we'd have to worry
2847 about overflowing BUF. Should there be a generic
2848 "multi-part-packet" packet? */
2849
2850 if (PIDGET (inferior_ptid) == MAGIC_NULL_PID)
c906108c 2851 {
506fb367
DJ
2852 /* MAGIC_NULL_PTID means that we don't have any active threads, so we
2853 don't have any PID numbers the inferior will understand. Make sure
2854 to only send forms that do not specify a PID. */
2855 if (step && siggnal != TARGET_SIGNAL_0)
2963ee1d 2856 outbuf = xstrprintf ("vCont;S%02x", siggnal);
506fb367 2857 else if (step)
2963ee1d 2858 outbuf = xstrprintf ("vCont;s");
506fb367 2859 else if (siggnal != TARGET_SIGNAL_0)
2963ee1d 2860 outbuf = xstrprintf ("vCont;C%02x", siggnal);
506fb367 2861 else
2963ee1d 2862 outbuf = xstrprintf ("vCont;c");
506fb367
DJ
2863 }
2864 else if (pid == -1)
2865 {
2866 /* Resume all threads, with preference for INFERIOR_PTID. */
2867 if (step && siggnal != TARGET_SIGNAL_0)
2963ee1d
DJ
2868 outbuf = xstrprintf ("vCont;S%02x:%x;c", siggnal,
2869 PIDGET (inferior_ptid));
506fb367 2870 else if (step)
2963ee1d 2871 outbuf = xstrprintf ("vCont;s:%x;c", PIDGET (inferior_ptid));
506fb367 2872 else if (siggnal != TARGET_SIGNAL_0)
2963ee1d
DJ
2873 outbuf = xstrprintf ("vCont;C%02x:%x;c", siggnal,
2874 PIDGET (inferior_ptid));
506fb367 2875 else
2963ee1d 2876 outbuf = xstrprintf ("vCont;c");
c906108c
SS
2877 }
2878 else
506fb367
DJ
2879 {
2880 /* Scheduler locking; resume only PTID. */
2881 if (step && siggnal != TARGET_SIGNAL_0)
2963ee1d 2882 outbuf = xstrprintf ("vCont;S%02x:%x", siggnal, pid);
506fb367 2883 else if (step)
2963ee1d 2884 outbuf = xstrprintf ("vCont;s:%x", pid);
506fb367 2885 else if (siggnal != TARGET_SIGNAL_0)
2963ee1d 2886 outbuf = xstrprintf ("vCont;C%02x:%x", siggnal, pid);
506fb367 2887 else
2963ee1d 2888 outbuf = xstrprintf ("vCont;c:%x", pid);
506fb367 2889 }
c906108c 2890
ea9c271d 2891 gdb_assert (outbuf && strlen (outbuf) < get_remote_packet_size ());
6d820c5c 2892 old_cleanup = make_cleanup (xfree, outbuf);
2963ee1d
DJ
2893
2894 putpkt (outbuf);
506fb367
DJ
2895
2896 do_cleanups (old_cleanup);
2897
2898 return 1;
c906108c 2899}
43ff13b4 2900
506fb367
DJ
2901/* Tell the remote machine to resume. */
2902
2903static enum target_signal last_sent_signal = TARGET_SIGNAL_0;
2904
2905static int last_sent_step;
2906
43ff13b4 2907static void
506fb367 2908remote_resume (ptid_t ptid, int step, enum target_signal siggnal)
43ff13b4 2909{
d01949b6 2910 struct remote_state *rs = get_remote_state ();
2e9f7625 2911 char *buf;
39f77062 2912 int pid = PIDGET (ptid);
43ff13b4 2913
43ff13b4
JM
2914 last_sent_signal = siggnal;
2915 last_sent_step = step;
2916
2917 /* A hook for when we need to do something at the last moment before
2918 resumption. */
9a4105ab
AC
2919 if (deprecated_target_resume_hook)
2920 (*deprecated_target_resume_hook) ();
43ff13b4 2921
89be2091
DJ
2922 /* Update the inferior on signals to silently pass, if they've changed. */
2923 remote_pass_signals ();
2924
506fb367
DJ
2925 /* The vCont packet doesn't need to specify threads via Hc. */
2926 if (remote_vcont_resume (ptid, step, siggnal))
2927 return;
2928
2929 /* All other supported resume packets do use Hc, so call set_thread. */
2930 if (pid == -1)
23860348 2931 set_thread (0, 0); /* Run any thread. */
506fb367 2932 else
23860348 2933 set_thread (pid, 0); /* Run this thread. */
506fb367 2934
2e9f7625 2935 buf = rs->buf;
43ff13b4
JM
2936 if (siggnal != TARGET_SIGNAL_0)
2937 {
2938 buf[0] = step ? 'S' : 'C';
c5aa993b 2939 buf[1] = tohex (((int) siggnal >> 4) & 0xf);
506fb367 2940 buf[2] = tohex (((int) siggnal) & 0xf);
43ff13b4
JM
2941 buf[3] = '\0';
2942 }
2943 else
c5aa993b 2944 strcpy (buf, step ? "s" : "c");
506fb367 2945
44eaed12 2946 putpkt (buf);
506fb367
DJ
2947}
2948
23860348 2949/* Same as remote_resume, but with async support. */
506fb367
DJ
2950static void
2951remote_async_resume (ptid_t ptid, int step, enum target_signal siggnal)
2952{
2953 remote_resume (ptid, step, siggnal);
43ff13b4 2954
2acceee2
JM
2955 /* We are about to start executing the inferior, let's register it
2956 with the event loop. NOTE: this is the one place where all the
2957 execution commands end up. We could alternatively do this in each
23860348 2958 of the execution commands in infcmd.c. */
2acceee2
JM
2959 /* FIXME: ezannoni 1999-09-28: We may need to move this out of here
2960 into infcmd.c in order to allow inferior function calls to work
23860348 2961 NOT asynchronously. */
362646f5 2962 if (target_can_async_p ())
2acceee2 2963 target_async (inferior_event_handler, 0);
23860348 2964 /* Tell the world that the target is now executing. */
2acceee2
JM
2965 /* FIXME: cagney/1999-09-23: Is it the targets responsibility to set
2966 this? Instead, should the client of target just assume (for
2967 async targets) that the target is going to start executing? Is
2968 this information already found in the continuation block? */
ed9a39eb 2969 if (target_is_async_p ())
2acceee2 2970 target_executing = 1;
43ff13b4 2971}
c906108c 2972\f
43ff13b4
JM
2973
2974/* Set up the signal handler for SIGINT, while the target is
23860348 2975 executing, ovewriting the 'regular' SIGINT signal handler. */
43ff13b4 2976static void
fba45db2 2977initialize_sigint_signal_handler (void)
43ff13b4 2978{
c5aa993b 2979 sigint_remote_token =
43ff13b4
JM
2980 create_async_signal_handler (async_remote_interrupt, NULL);
2981 signal (SIGINT, handle_remote_sigint);
2982}
2983
23860348 2984/* Signal handler for SIGINT, while the target is executing. */
43ff13b4 2985static void
fba45db2 2986handle_remote_sigint (int sig)
43ff13b4
JM
2987{
2988 signal (sig, handle_remote_sigint_twice);
c5aa993b 2989 sigint_remote_twice_token =
43ff13b4
JM
2990 create_async_signal_handler (async_remote_interrupt_twice, NULL);
2991 mark_async_signal_handler_wrapper (sigint_remote_token);
2992}
2993
2994/* Signal handler for SIGINT, installed after SIGINT has already been
2995 sent once. It will take effect the second time that the user sends
23860348 2996 a ^C. */
43ff13b4 2997static void
fba45db2 2998handle_remote_sigint_twice (int sig)
43ff13b4
JM
2999{
3000 signal (sig, handle_sigint);
c5aa993b 3001 sigint_remote_twice_token =
2df3850c 3002 create_async_signal_handler (inferior_event_handler_wrapper, NULL);
43ff13b4
JM
3003 mark_async_signal_handler_wrapper (sigint_remote_twice_token);
3004}
3005
6426a772 3006/* Perform the real interruption of the target execution, in response
23860348 3007 to a ^C. */
c5aa993b 3008static void
fba45db2 3009async_remote_interrupt (gdb_client_data arg)
43ff13b4
JM
3010{
3011 if (remote_debug)
3012 fprintf_unfiltered (gdb_stdlog, "remote_interrupt called\n");
3013
3014 target_stop ();
3015}
3016
3017/* Perform interrupt, if the first attempt did not succeed. Just give
23860348 3018 up on the target alltogether. */
2df3850c 3019void
fba45db2 3020async_remote_interrupt_twice (gdb_client_data arg)
43ff13b4 3021{
2df3850c
JM
3022 if (remote_debug)
3023 fprintf_unfiltered (gdb_stdlog, "remote_interrupt_twice called\n");
6426a772 3024 /* Do something only if the target was not killed by the previous
23860348 3025 cntl-C. */
6426a772
JM
3026 if (target_executing)
3027 {
3028 interrupt_query ();
3029 signal (SIGINT, handle_remote_sigint);
3030 }
43ff13b4
JM
3031}
3032
3033/* Reinstall the usual SIGINT handlers, after the target has
23860348 3034 stopped. */
6426a772
JM
3035static void
3036cleanup_sigint_signal_handler (void *dummy)
43ff13b4
JM
3037{
3038 signal (SIGINT, handle_sigint);
3039 if (sigint_remote_twice_token)
d5d6fca5 3040 delete_async_signal_handler (&sigint_remote_twice_token);
43ff13b4 3041 if (sigint_remote_token)
d5d6fca5 3042 delete_async_signal_handler (&sigint_remote_token);
43ff13b4
JM
3043}
3044
c906108c
SS
3045/* Send ^C to target to halt it. Target will respond, and send us a
3046 packet. */
507f3c78 3047static void (*ofunc) (int);
c906108c 3048
7a292a7a
SS
3049/* The command line interface's stop routine. This function is installed
3050 as a signal handler for SIGINT. The first time a user requests a
3051 stop, we call remote_stop to send a break or ^C. If there is no
3052 response from the target (it didn't stop when the user requested it),
23860348 3053 we ask the user if he'd like to detach from the target. */
c906108c 3054static void
fba45db2 3055remote_interrupt (int signo)
c906108c 3056{
23860348 3057 /* If this doesn't work, try more severe steps. */
7a292a7a
SS
3058 signal (signo, remote_interrupt_twice);
3059
3060 if (remote_debug)
0f71a2f6 3061 fprintf_unfiltered (gdb_stdlog, "remote_interrupt called\n");
7a292a7a
SS
3062
3063 target_stop ();
3064}
3065
3066/* The user typed ^C twice. */
3067
3068static void
fba45db2 3069remote_interrupt_twice (int signo)
7a292a7a
SS
3070{
3071 signal (signo, ofunc);
3072 interrupt_query ();
c906108c
SS
3073 signal (signo, remote_interrupt);
3074}
7a292a7a
SS
3075
3076/* This is the generic stop called via the target vector. When a target
3077 interrupt is requested, either by the command line or the GUI, we
23860348 3078 will eventually end up here. */
c906108c 3079static void
fba45db2 3080remote_stop (void)
c906108c 3081{
7a292a7a
SS
3082 /* Send a break or a ^C, depending on user preference. */
3083 if (remote_debug)
0f71a2f6 3084 fprintf_unfiltered (gdb_stdlog, "remote_stop called\n");
c906108c 3085
7a292a7a 3086 if (remote_break)
2cd58942 3087 serial_send_break (remote_desc);
c906108c 3088 else
2cd58942 3089 serial_write (remote_desc, "\003", 1);
c906108c
SS
3090}
3091
3092/* Ask the user what to do when an interrupt is received. */
3093
3094static void
fba45db2 3095interrupt_query (void)
c906108c
SS
3096{
3097 target_terminal_ours ();
3098
3099 if (query ("Interrupted while waiting for the program.\n\
3100Give up (and stop debugging it)? "))
3101 {
3102 target_mourn_inferior ();
315a522e 3103 deprecated_throw_reason (RETURN_QUIT);
c906108c
SS
3104 }
3105
3106 target_terminal_inferior ();
3107}
3108
6426a772
JM
3109/* Enable/disable target terminal ownership. Most targets can use
3110 terminal groups to control terminal ownership. Remote targets are
3111 different in that explicit transfer of ownership to/from GDB/target
23860348 3112 is required. */
6426a772
JM
3113
3114static void
3115remote_async_terminal_inferior (void)
3116{
3117 /* FIXME: cagney/1999-09-27: Shouldn't need to test for
3118 sync_execution here. This function should only be called when
3119 GDB is resuming the inferior in the forground. A background
3120 resume (``run&'') should leave GDB in control of the terminal and
23860348 3121 consequently should not call this code. */
6426a772
JM
3122 if (!sync_execution)
3123 return;
3124 /* FIXME: cagney/1999-09-27: Closely related to the above. Make
3125 calls target_terminal_*() idenpotent. The event-loop GDB talking
3126 to an asynchronous target with a synchronous command calls this
3127 function from both event-top.c and infrun.c/infcmd.c. Once GDB
3128 stops trying to transfer the terminal to the target when it
3129 shouldn't this guard can go away. */
3130 if (!remote_async_terminal_ours_p)
3131 return;
3132 delete_file_handler (input_fd);
3133 remote_async_terminal_ours_p = 0;
3134 initialize_sigint_signal_handler ();
3135 /* NOTE: At this point we could also register our selves as the
3136 recipient of all input. Any characters typed could then be
23860348 3137 passed on down to the target. */
6426a772
JM
3138}
3139
3140static void
3141remote_async_terminal_ours (void)
3142{
23860348 3143 /* See FIXME in remote_async_terminal_inferior. */
6426a772
JM
3144 if (!sync_execution)
3145 return;
23860348 3146 /* See FIXME in remote_async_terminal_inferior. */
6426a772
JM
3147 if (remote_async_terminal_ours_p)
3148 return;
3149 cleanup_sigint_signal_handler (NULL);
3150 add_file_handler (input_fd, stdin_event_handler, 0);
3151 remote_async_terminal_ours_p = 1;
3152}
3153
c906108c
SS
3154/* If nonzero, ignore the next kill. */
3155
3156int kill_kludge;
3157
3158void
917317f4 3159remote_console_output (char *msg)
c906108c
SS
3160{
3161 char *p;
3162
c5aa993b 3163 for (p = msg; p[0] && p[1]; p += 2)
c906108c
SS
3164 {
3165 char tb[2];
3166 char c = fromhex (p[0]) * 16 + fromhex (p[1]);
3167 tb[0] = c;
3168 tb[1] = 0;
43ff13b4 3169 fputs_unfiltered (tb, gdb_stdtarg);
c906108c 3170 }
917317f4 3171 gdb_flush (gdb_stdtarg);
c906108c
SS
3172}
3173
0f71a2f6
JM
3174/* Wait until the remote machine stops, then return,
3175 storing status in STATUS just as `wait' would.
802188a7 3176 Returns "pid", which in the case of a multi-threaded
0f71a2f6 3177 remote OS, is the thread-id. */
c906108c 3178
39f77062
KB
3179static ptid_t
3180remote_wait (ptid_t ptid, struct target_waitstatus *status)
c906108c 3181{
d01949b6 3182 struct remote_state *rs = get_remote_state ();
ea9c271d 3183 struct remote_arch_state *rsa = get_remote_arch_state ();
b2dd6311 3184 ULONGEST thread_num = -1;
3c3bea1c 3185 ULONGEST addr;
c906108c
SS
3186
3187 status->kind = TARGET_WAITKIND_EXITED;
3188 status->value.integer = 0;
3189
3190 while (1)
3191 {
2e9f7625 3192 char *buf, *p;
c906108c 3193
c906108c 3194 ofunc = signal (SIGINT, remote_interrupt);
6d820c5c 3195 getpkt (&rs->buf, &rs->buf_size, 1);
c906108c
SS
3196 signal (SIGINT, ofunc);
3197
2e9f7625
DJ
3198 buf = rs->buf;
3199
c906108c 3200 /* This is a hook for when we need to do something (perhaps the
c5aa993b 3201 collection of trace data) every time the target stops. */
9a4105ab
AC
3202 if (deprecated_target_wait_loop_hook)
3203 (*deprecated_target_wait_loop_hook) ();
c906108c 3204
3c3bea1c
GS
3205 remote_stopped_by_watchpoint_p = 0;
3206
c906108c
SS
3207 switch (buf[0])
3208 {
23860348 3209 case 'E': /* Error of some sort. */
8a3fe4f8 3210 warning (_("Remote failure reply: %s"), buf);
c906108c 3211 continue;
23860348 3212 case 'F': /* File-I/O request. */
449092f6
CV
3213 remote_fileio_request (buf);
3214 continue;
23860348 3215 case 'T': /* Status with PC, SP, FP, ... */
c906108c 3216 {
cfd77fa1 3217 gdb_byte regs[MAX_REGISTER_SIZE];
c906108c 3218
23860348 3219 /* Expedited reply, containing Signal, {regno, reg} repeat. */
c906108c 3220 /* format is: 'Tssn...:r...;n...:r...;n...:r...;#cc', where
c5aa993b
JM
3221 ss = signal number
3222 n... = register number
3223 r... = register contents
3224 */
c906108c
SS
3225 p = &buf[3]; /* after Txx */
3226
3227 while (*p)
3228 {
cfd77fa1 3229 char *p1;
c906108c 3230 char *p_temp;
97345198 3231 int fieldsize;
3c3bea1c
GS
3232 LONGEST pnum = 0;
3233
23860348
MS
3234 /* If the packet contains a register number save it in
3235 pnum and set p1 to point to the character following
3236 it. Otherwise p1 points to p. */
c906108c 3237
23860348
MS
3238 /* If this packet is an awatch packet, don't parse the
3239 'a' as a register number. */
3c3bea1c
GS
3240
3241 if (strncmp (p, "awatch", strlen("awatch")) != 0)
3242 {
3243 /* Read the ``P'' register number. */
3244 pnum = strtol (p, &p_temp, 16);
cfd77fa1 3245 p1 = p_temp;
3c3bea1c 3246 }
802188a7 3247 else
3c3bea1c 3248 p1 = p;
c906108c 3249
23860348 3250 if (p1 == p) /* No register number present here. */
c906108c 3251 {
cfd77fa1 3252 p1 = strchr (p, ':');
c906108c 3253 if (p1 == NULL)
670aa98f 3254 error (_("Malformed packet(a) (missing colon): %s\n\
8a3fe4f8 3255Packet: '%s'\n"),
670aa98f 3256 p, buf);
3c3bea1c 3257 if (strncmp (p, "thread", p1 - p) == 0)
c906108c
SS
3258 {
3259 p_temp = unpack_varlen_hex (++p1, &thread_num);
3260 record_currthread (thread_num);
cfd77fa1 3261 p = p_temp;
c906108c 3262 }
3c3bea1c
GS
3263 else if ((strncmp (p, "watch", p1 - p) == 0)
3264 || (strncmp (p, "rwatch", p1 - p) == 0)
3265 || (strncmp (p, "awatch", p1 - p) == 0))
3266 {
3267 remote_stopped_by_watchpoint_p = 1;
3268 p = unpack_varlen_hex (++p1, &addr);
3269 remote_watch_data_address = (CORE_ADDR)addr;
3270 }
3271 else
3272 {
3273 /* Silently skip unknown optional info. */
3274 p_temp = strchr (p1 + 1, ';');
3275 if (p_temp)
cfd77fa1 3276 p = p_temp;
3c3bea1c 3277 }
c906108c
SS
3278 }
3279 else
3280 {
ea9c271d 3281 struct packet_reg *reg = packet_reg_from_pnum (rsa, pnum);
c906108c
SS
3282 p = p1;
3283
3284 if (*p++ != ':')
8a3fe4f8
AC
3285 error (_("Malformed packet(b) (missing colon): %s\n\
3286Packet: '%s'\n"),
3fcb8548 3287 p, buf);
c906108c 3288
ad10f812 3289 if (reg == NULL)
8a3fe4f8
AC
3290 error (_("Remote sent bad register number %s: %s\n\
3291Packet: '%s'\n"),
3fcb8548 3292 phex_nz (pnum, 0), p, buf);
c906108c 3293
cfd77fa1 3294 fieldsize = hex2bin (p, regs,
2bc416ba 3295 register_size (current_gdbarch,
23860348 3296 reg->regnum));
97345198 3297 p += 2 * fieldsize;
2bc416ba 3298 if (fieldsize < register_size (current_gdbarch,
23860348 3299 reg->regnum))
8a3fe4f8 3300 warning (_("Remote reply is too short: %s"), buf);
594f7785 3301 regcache_raw_supply (get_current_regcache (),
23860348 3302 reg->regnum, regs);
c906108c
SS
3303 }
3304
3305 if (*p++ != ';')
2bc416ba 3306 error (_("Remote register badly formatted: %s\nhere: %s"),
23860348 3307 buf, p);
c906108c
SS
3308 }
3309 }
3310 /* fall through */
23860348 3311 case 'S': /* Old style status, just signal only. */
c906108c
SS
3312 status->kind = TARGET_WAITKIND_STOPPED;
3313 status->value.sig = (enum target_signal)
3314 (((fromhex (buf[1])) << 4) + (fromhex (buf[2])));
3315
0f71a2f6
JM
3316 if (buf[3] == 'p')
3317 {
0f71a2f6
JM
3318 thread_num = strtol ((const char *) &buf[4], NULL, 16);
3319 record_currthread (thread_num);
3320 }
c906108c 3321 goto got_status;
23860348 3322 case 'W': /* Target exited. */
c906108c
SS
3323 {
3324 /* The remote process exited. */
3325 status->kind = TARGET_WAITKIND_EXITED;
3326 status->value.integer = (fromhex (buf[1]) << 4) + fromhex (buf[2]);
3327 goto got_status;
3328 }
3329 case 'X':
3330 status->kind = TARGET_WAITKIND_SIGNALLED;
3331 status->value.sig = (enum target_signal)
3332 (((fromhex (buf[1])) << 4) + (fromhex (buf[2])));
3333 kill_kludge = 1;
3334
3335 goto got_status;
23860348 3336 case 'O': /* Console output. */
c906108c
SS
3337 remote_console_output (buf + 1);
3338 continue;
3339 case '\0':
3340 if (last_sent_signal != TARGET_SIGNAL_0)
3341 {
3342 /* Zero length reply means that we tried 'S' or 'C' and
c5aa993b 3343 the remote system doesn't support it. */
c906108c
SS
3344 target_terminal_ours_for_output ();
3345 printf_filtered
3346 ("Can't send signals to this remote system. %s not sent.\n",
3347 target_signal_to_name (last_sent_signal));
3348 last_sent_signal = TARGET_SIGNAL_0;
3349 target_terminal_inferior ();
3350
3351 strcpy ((char *) buf, last_sent_step ? "s" : "c");
3352 putpkt ((char *) buf);
3353 continue;
3354 }
3355 /* else fallthrough */
3356 default:
8a3fe4f8 3357 warning (_("Invalid remote reply: %s"), buf);
c906108c
SS
3358 continue;
3359 }
3360 }
c5aa993b 3361got_status:
c906108c
SS
3362 if (thread_num != -1)
3363 {
39f77062 3364 return pid_to_ptid (thread_num);
c906108c 3365 }
39f77062 3366 return inferior_ptid;
c906108c
SS
3367}
3368
23860348 3369/* Async version of remote_wait. */
39f77062
KB
3370static ptid_t
3371remote_async_wait (ptid_t ptid, struct target_waitstatus *status)
43ff13b4 3372{
d01949b6 3373 struct remote_state *rs = get_remote_state ();
ea9c271d 3374 struct remote_arch_state *rsa = get_remote_arch_state ();
b2dd6311 3375 ULONGEST thread_num = -1;
3c3bea1c 3376 ULONGEST addr;
43ff13b4
JM
3377
3378 status->kind = TARGET_WAITKIND_EXITED;
3379 status->value.integer = 0;
3380
3c3bea1c
GS
3381 remote_stopped_by_watchpoint_p = 0;
3382
43ff13b4
JM
3383 while (1)
3384 {
2e9f7625 3385 char *buf, *p;
c5aa993b 3386
ed9a39eb 3387 if (!target_is_async_p ())
43ff13b4 3388 ofunc = signal (SIGINT, remote_interrupt);
6426a772
JM
3389 /* FIXME: cagney/1999-09-27: If we're in async mode we should
3390 _never_ wait for ever -> test on target_is_async_p().
3391 However, before we do that we need to ensure that the caller
23860348 3392 knows how to take the target into/out of async mode. */
6d820c5c 3393 getpkt (&rs->buf, &rs->buf_size, wait_forever_enabled_p);
ed9a39eb 3394 if (!target_is_async_p ())
43ff13b4
JM
3395 signal (SIGINT, ofunc);
3396
2e9f7625
DJ
3397 buf = rs->buf;
3398
43ff13b4 3399 /* This is a hook for when we need to do something (perhaps the
c5aa993b 3400 collection of trace data) every time the target stops. */
9a4105ab
AC
3401 if (deprecated_target_wait_loop_hook)
3402 (*deprecated_target_wait_loop_hook) ();
43ff13b4
JM
3403
3404 switch (buf[0])
3405 {
23860348 3406 case 'E': /* Error of some sort. */
8a3fe4f8 3407 warning (_("Remote failure reply: %s"), buf);
43ff13b4 3408 continue;
23860348 3409 case 'F': /* File-I/O request. */
449092f6
CV
3410 remote_fileio_request (buf);
3411 continue;
23860348 3412 case 'T': /* Status with PC, SP, FP, ... */
43ff13b4 3413 {
cfd77fa1 3414 gdb_byte regs[MAX_REGISTER_SIZE];
43ff13b4 3415
23860348 3416 /* Expedited reply, containing Signal, {regno, reg} repeat. */
43ff13b4 3417 /* format is: 'Tssn...:r...;n...:r...;n...:r...;#cc', where
c5aa993b
JM
3418 ss = signal number
3419 n... = register number
3420 r... = register contents
3421 */
43ff13b4
JM
3422 p = &buf[3]; /* after Txx */
3423
3424 while (*p)
3425 {
cfd77fa1 3426 char *p1;
43ff13b4 3427 char *p_temp;
6c3f2dbf 3428 int fieldsize;
3c3bea1c 3429 long pnum = 0;
43ff13b4 3430
23860348
MS
3431 /* If the packet contains a register number, save it
3432 in pnum and set p1 to point to the character
3433 following it. Otherwise p1 points to p. */
3c3bea1c
GS
3434
3435 /* If this packet is an awatch packet, don't parse the 'a'
3436 as a register number. */
802188a7 3437
3c3bea1c
GS
3438 if (!strncmp (p, "awatch", strlen ("awatch")) != 0)
3439 {
3440 /* Read the register number. */
3441 pnum = strtol (p, &p_temp, 16);
cfd77fa1 3442 p1 = p_temp;
3c3bea1c 3443 }
802188a7 3444 else
3c3bea1c 3445 p1 = p;
43ff13b4 3446
23860348 3447 if (p1 == p) /* No register number present here. */
43ff13b4 3448 {
cfd77fa1 3449 p1 = strchr (p, ':');
43ff13b4 3450 if (p1 == NULL)
8a3fe4f8
AC
3451 error (_("Malformed packet(a) (missing colon): %s\n\
3452Packet: '%s'\n"),
3fcb8548 3453 p, buf);
3c3bea1c 3454 if (strncmp (p, "thread", p1 - p) == 0)
43ff13b4
JM
3455 {
3456 p_temp = unpack_varlen_hex (++p1, &thread_num);
3457 record_currthread (thread_num);
cfd77fa1 3458 p = p_temp;
43ff13b4 3459 }
3c3bea1c
GS
3460 else if ((strncmp (p, "watch", p1 - p) == 0)
3461 || (strncmp (p, "rwatch", p1 - p) == 0)
3462 || (strncmp (p, "awatch", p1 - p) == 0))
3463 {
3464 remote_stopped_by_watchpoint_p = 1;
3465 p = unpack_varlen_hex (++p1, &addr);
3466 remote_watch_data_address = (CORE_ADDR)addr;
3467 }
3468 else
3469 {
3470 /* Silently skip unknown optional info. */
cfd77fa1 3471 p_temp = strchr (p1 + 1, ';');
3c3bea1c
GS
3472 if (p_temp)
3473 p = p_temp;
3474 }
43ff13b4 3475 }
802188a7 3476
43ff13b4
JM
3477 else
3478 {
ea9c271d 3479 struct packet_reg *reg = packet_reg_from_pnum (rsa, pnum);
43ff13b4 3480 p = p1;
43ff13b4 3481 if (*p++ != ':')
8a3fe4f8
AC
3482 error (_("Malformed packet(b) (missing colon): %s\n\
3483Packet: '%s'\n"),
3fcb8548 3484 p, buf);
43ff13b4 3485
ad10f812 3486 if (reg == NULL)
8a3fe4f8
AC
3487 error (_("Remote sent bad register number %ld: %s\n\
3488Packet: '%s'\n"),
3fcb8548 3489 pnum, p, buf);
43ff13b4 3490
cfd77fa1 3491 fieldsize = hex2bin (p, regs,
2bc416ba 3492 register_size (current_gdbarch,
23860348 3493 reg->regnum));
6c3f2dbf 3494 p += 2 * fieldsize;
2bc416ba 3495 if (fieldsize < register_size (current_gdbarch,
23860348 3496 reg->regnum))
8a3fe4f8 3497 warning (_("Remote reply is too short: %s"), buf);
594f7785
UW
3498 regcache_raw_supply (get_current_regcache (),
3499 reg->regnum, regs);
43ff13b4
JM
3500 }
3501
3502 if (*p++ != ';')
8a3fe4f8 3503 error (_("Remote register badly formatted: %s\nhere: %s"),
0a2cfde4 3504 buf, p);
43ff13b4
JM
3505 }
3506 }
3507 /* fall through */
23860348 3508 case 'S': /* Old style status, just signal only. */
43ff13b4
JM
3509 status->kind = TARGET_WAITKIND_STOPPED;
3510 status->value.sig = (enum target_signal)
3511 (((fromhex (buf[1])) << 4) + (fromhex (buf[2])));
3512
3513 if (buf[3] == 'p')
3514 {
43ff13b4
JM
3515 thread_num = strtol ((const char *) &buf[4], NULL, 16);
3516 record_currthread (thread_num);
3517 }
43ff13b4 3518 goto got_status;
23860348 3519 case 'W': /* Target exited. */
43ff13b4
JM
3520 {
3521 /* The remote process exited. */
3522 status->kind = TARGET_WAITKIND_EXITED;
3523 status->value.integer = (fromhex (buf[1]) << 4) + fromhex (buf[2]);
3524 goto got_status;
3525 }
3526 case 'X':
3527 status->kind = TARGET_WAITKIND_SIGNALLED;
3528 status->value.sig = (enum target_signal)
3529 (((fromhex (buf[1])) << 4) + (fromhex (buf[2])));
3530 kill_kludge = 1;
3531
3532 goto got_status;
23860348 3533 case 'O': /* Console output. */
43ff13b4 3534 remote_console_output (buf + 1);
c4093a6a 3535 /* Return immediately to the event loop. The event loop will
23860348 3536 still be waiting on the inferior afterwards. */
c4093a6a
JM
3537 status->kind = TARGET_WAITKIND_IGNORE;
3538 goto got_status;
43ff13b4
JM
3539 case '\0':
3540 if (last_sent_signal != TARGET_SIGNAL_0)
3541 {
3542 /* Zero length reply means that we tried 'S' or 'C' and
c5aa993b 3543 the remote system doesn't support it. */
43ff13b4
JM
3544 target_terminal_ours_for_output ();
3545 printf_filtered
3546 ("Can't send signals to this remote system. %s not sent.\n",
3547 target_signal_to_name (last_sent_signal));
3548 last_sent_signal = TARGET_SIGNAL_0;
3549 target_terminal_inferior ();
3550
3551 strcpy ((char *) buf, last_sent_step ? "s" : "c");
3552 putpkt ((char *) buf);
3553 continue;
3554 }
3555 /* else fallthrough */
3556 default:
8a3fe4f8 3557 warning (_("Invalid remote reply: %s"), buf);
43ff13b4
JM
3558 continue;
3559 }
3560 }
c5aa993b 3561got_status:
43ff13b4
JM
3562 if (thread_num != -1)
3563 {
39f77062 3564 return pid_to_ptid (thread_num);
43ff13b4 3565 }
39f77062 3566 return inferior_ptid;
43ff13b4
JM
3567}
3568
74ca34ce 3569/* Fetch a single register using a 'p' packet. */
c906108c 3570
b96ec7ac 3571static int
56be3814 3572fetch_register_using_p (struct regcache *regcache, struct packet_reg *reg)
b96ec7ac
AC
3573{
3574 struct remote_state *rs = get_remote_state ();
2e9f7625 3575 char *buf, *p;
b96ec7ac
AC
3576 char regp[MAX_REGISTER_SIZE];
3577 int i;
3578
74ca34ce
DJ
3579 if (remote_protocol_packets[PACKET_p].support == PACKET_DISABLE)
3580 return 0;
3581
3582 if (reg->pnum == -1)
3583 return 0;
3584
2e9f7625 3585 p = rs->buf;
fcad0fa4 3586 *p++ = 'p';
74ca34ce 3587 p += hexnumstr (p, reg->pnum);
fcad0fa4 3588 *p++ = '\0';
6d820c5c 3589 remote_send (&rs->buf, &rs->buf_size);
3f9a994c 3590
2e9f7625
DJ
3591 buf = rs->buf;
3592
74ca34ce
DJ
3593 switch (packet_ok (buf, &remote_protocol_packets[PACKET_p]))
3594 {
3595 case PACKET_OK:
3596 break;
3597 case PACKET_UNKNOWN:
3598 return 0;
3599 case PACKET_ERROR:
3600 error (_("Could not fetch register \"%s\""),
3601 gdbarch_register_name (current_gdbarch, reg->regnum));
3602 }
3f9a994c
JB
3603
3604 /* If this register is unfetchable, tell the regcache. */
3605 if (buf[0] == 'x')
8480adf2 3606 {
56be3814 3607 regcache_raw_supply (regcache, reg->regnum, NULL);
8480adf2 3608 return 1;
b96ec7ac 3609 }
b96ec7ac 3610
3f9a994c
JB
3611 /* Otherwise, parse and supply the value. */
3612 p = buf;
3613 i = 0;
3614 while (p[0] != 0)
3615 {
3616 if (p[1] == 0)
74ca34ce 3617 error (_("fetch_register_using_p: early buf termination"));
3f9a994c
JB
3618
3619 regp[i++] = fromhex (p[0]) * 16 + fromhex (p[1]);
3620 p += 2;
3621 }
56be3814 3622 regcache_raw_supply (regcache, reg->regnum, regp);
3f9a994c 3623 return 1;
b96ec7ac
AC
3624}
3625
74ca34ce
DJ
3626/* Fetch the registers included in the target's 'g' packet. */
3627
29709017
DJ
3628static int
3629send_g_packet (void)
c906108c 3630{
d01949b6 3631 struct remote_state *rs = get_remote_state ();
74ca34ce 3632 int i, buf_len;
c906108c 3633 char *p;
74ca34ce 3634 char *regs;
c906108c 3635
74ca34ce
DJ
3636 sprintf (rs->buf, "g");
3637 remote_send (&rs->buf, &rs->buf_size);
c906108c 3638
29709017
DJ
3639 /* We can get out of synch in various cases. If the first character
3640 in the buffer is not a hex character, assume that has happened
3641 and try to fetch another packet to read. */
3642 while ((rs->buf[0] < '0' || rs->buf[0] > '9')
3643 && (rs->buf[0] < 'A' || rs->buf[0] > 'F')
3644 && (rs->buf[0] < 'a' || rs->buf[0] > 'f')
3645 && rs->buf[0] != 'x') /* New: unavailable register value. */
3646 {
3647 if (remote_debug)
3648 fprintf_unfiltered (gdb_stdlog,
3649 "Bad register packet; fetching a new packet\n");
3650 getpkt (&rs->buf, &rs->buf_size, 0);
3651 }
3652
74ca34ce
DJ
3653 buf_len = strlen (rs->buf);
3654
3655 /* Sanity check the received packet. */
3656 if (buf_len % 2 != 0)
3657 error (_("Remote 'g' packet reply is of odd length: %s"), rs->buf);
29709017
DJ
3658
3659 return buf_len / 2;
3660}
3661
3662static void
56be3814 3663process_g_packet (struct regcache *regcache)
29709017
DJ
3664{
3665 struct remote_state *rs = get_remote_state ();
3666 struct remote_arch_state *rsa = get_remote_arch_state ();
3667 int i, buf_len;
3668 char *p;
3669 char *regs;
3670
3671 buf_len = strlen (rs->buf);
3672
3673 /* Further sanity checks, with knowledge of the architecture. */
74ca34ce
DJ
3674 if (buf_len > 2 * rsa->sizeof_g_packet)
3675 error (_("Remote 'g' packet reply is too long: %s"), rs->buf);
3676
3677 /* Save the size of the packet sent to us by the target. It is used
3678 as a heuristic when determining the max size of packets that the
3679 target can safely receive. */
3680 if (rsa->actual_register_packet_size == 0)
3681 rsa->actual_register_packet_size = buf_len;
3682
3683 /* If this is smaller than we guessed the 'g' packet would be,
3684 update our records. A 'g' reply that doesn't include a register's
3685 value implies either that the register is not available, or that
3686 the 'p' packet must be used. */
3687 if (buf_len < 2 * rsa->sizeof_g_packet)
b323314b 3688 {
74ca34ce
DJ
3689 rsa->sizeof_g_packet = buf_len / 2;
3690
f57d151a 3691 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
b96ec7ac 3692 {
74ca34ce
DJ
3693 if (rsa->regs[i].pnum == -1)
3694 continue;
3695
3696 if (rsa->regs[i].offset >= rsa->sizeof_g_packet)
3697 rsa->regs[i].in_g_packet = 0;
b96ec7ac 3698 else
74ca34ce 3699 rsa->regs[i].in_g_packet = 1;
b96ec7ac 3700 }
74ca34ce 3701 }
b323314b 3702
74ca34ce 3703 regs = alloca (rsa->sizeof_g_packet);
c906108c
SS
3704
3705 /* Unimplemented registers read as all bits zero. */
ea9c271d 3706 memset (regs, 0, rsa->sizeof_g_packet);
c906108c 3707
c906108c
SS
3708 /* Reply describes registers byte by byte, each byte encoded as two
3709 hex characters. Suck them all up, then supply them to the
3710 register cacheing/storage mechanism. */
3711
74ca34ce 3712 p = rs->buf;
ea9c271d 3713 for (i = 0; i < rsa->sizeof_g_packet; i++)
c906108c 3714 {
74ca34ce
DJ
3715 if (p[0] == 0 || p[1] == 0)
3716 /* This shouldn't happen - we adjusted sizeof_g_packet above. */
3717 internal_error (__FILE__, __LINE__,
3718 "unexpected end of 'g' packet reply");
3719
c906108c 3720 if (p[0] == 'x' && p[1] == 'x')
c5aa993b 3721 regs[i] = 0; /* 'x' */
c906108c
SS
3722 else
3723 regs[i] = fromhex (p[0]) * 16 + fromhex (p[1]);
3724 p += 2;
3725 }
3726
ad10f812 3727 {
b323314b 3728 int i;
f57d151a 3729 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
ad10f812 3730 {
ea9c271d 3731 struct packet_reg *r = &rsa->regs[i];
b323314b
AC
3732 if (r->in_g_packet)
3733 {
74ca34ce
DJ
3734 if (r->offset * 2 >= strlen (rs->buf))
3735 /* This shouldn't happen - we adjusted in_g_packet above. */
3736 internal_error (__FILE__, __LINE__,
3737 "unexpected end of 'g' packet reply");
3738 else if (rs->buf[r->offset * 2] == 'x')
8ccc1287 3739 {
74ca34ce 3740 gdb_assert (r->offset * 2 < strlen (rs->buf));
8ccc1287
AC
3741 /* The register isn't available, mark it as such (at
3742 the same time setting the value to zero). */
56be3814 3743 regcache_raw_supply (regcache, r->regnum, NULL);
8ccc1287
AC
3744 }
3745 else
56be3814 3746 regcache_raw_supply (regcache, r->regnum,
8ccc1287 3747 regs + r->offset);
b323314b 3748 }
ad10f812
AC
3749 }
3750 }
c906108c
SS
3751}
3752
29709017 3753static void
56be3814 3754fetch_registers_using_g (struct regcache *regcache)
29709017
DJ
3755{
3756 send_g_packet ();
56be3814 3757 process_g_packet (regcache);
29709017
DJ
3758}
3759
74ca34ce 3760static void
56be3814 3761remote_fetch_registers (struct regcache *regcache, int regnum)
74ca34ce
DJ
3762{
3763 struct remote_state *rs = get_remote_state ();
3764 struct remote_arch_state *rsa = get_remote_arch_state ();
3765 int i;
3766
3767 set_thread (PIDGET (inferior_ptid), 1);
3768
3769 if (regnum >= 0)
3770 {
3771 struct packet_reg *reg = packet_reg_from_regnum (rsa, regnum);
3772 gdb_assert (reg != NULL);
3773
3774 /* If this register might be in the 'g' packet, try that first -
3775 we are likely to read more than one register. If this is the
3776 first 'g' packet, we might be overly optimistic about its
3777 contents, so fall back to 'p'. */
3778 if (reg->in_g_packet)
3779 {
56be3814 3780 fetch_registers_using_g (regcache);
74ca34ce
DJ
3781 if (reg->in_g_packet)
3782 return;
3783 }
3784
56be3814 3785 if (fetch_register_using_p (regcache, reg))
74ca34ce
DJ
3786 return;
3787
3788 /* This register is not available. */
56be3814 3789 regcache_raw_supply (regcache, reg->regnum, NULL);
74ca34ce
DJ
3790
3791 return;
3792 }
3793
56be3814 3794 fetch_registers_using_g (regcache);
74ca34ce 3795
f57d151a 3796 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
74ca34ce 3797 if (!rsa->regs[i].in_g_packet)
56be3814 3798 if (!fetch_register_using_p (regcache, &rsa->regs[i]))
74ca34ce
DJ
3799 {
3800 /* This register is not available. */
56be3814 3801 regcache_raw_supply (regcache, i, NULL);
74ca34ce
DJ
3802 }
3803}
3804
c906108c
SS
3805/* Prepare to store registers. Since we may send them all (using a
3806 'G' request), we have to read out the ones we don't want to change
3807 first. */
3808
c5aa993b 3809static void
316f2060 3810remote_prepare_to_store (struct regcache *regcache)
c906108c 3811{
ea9c271d 3812 struct remote_arch_state *rsa = get_remote_arch_state ();
cf0e1e0d 3813 int i;
cfd77fa1 3814 gdb_byte buf[MAX_REGISTER_SIZE];
cf0e1e0d 3815
c906108c 3816 /* Make sure the entire registers array is valid. */
444abaca 3817 switch (remote_protocol_packets[PACKET_P].support)
5a2468f5
JM
3818 {
3819 case PACKET_DISABLE:
3820 case PACKET_SUPPORT_UNKNOWN:
cf0e1e0d 3821 /* Make sure all the necessary registers are cached. */
f57d151a 3822 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
ea9c271d 3823 if (rsa->regs[i].in_g_packet)
316f2060 3824 regcache_raw_read (regcache, rsa->regs[i].regnum, buf);
5a2468f5
JM
3825 break;
3826 case PACKET_ENABLE:
3827 break;
3828 }
3829}
3830
ad10f812 3831/* Helper: Attempt to store REGNUM using the P packet. Return fail IFF
23860348 3832 packet was not recognized. */
5a2468f5
JM
3833
3834static int
56be3814 3835store_register_using_P (const struct regcache *regcache, struct packet_reg *reg)
5a2468f5 3836{
d01949b6 3837 struct remote_state *rs = get_remote_state ();
ea9c271d 3838 struct remote_arch_state *rsa = get_remote_arch_state ();
5a2468f5 3839 /* Try storing a single register. */
6d820c5c 3840 char *buf = rs->buf;
cfd77fa1 3841 gdb_byte regp[MAX_REGISTER_SIZE];
5a2468f5 3842 char *p;
5a2468f5 3843
74ca34ce
DJ
3844 if (remote_protocol_packets[PACKET_P].support == PACKET_DISABLE)
3845 return 0;
3846
3847 if (reg->pnum == -1)
3848 return 0;
3849
ea9c271d 3850 xsnprintf (buf, get_remote_packet_size (), "P%s=", phex_nz (reg->pnum, 0));
5a2468f5 3851 p = buf + strlen (buf);
56be3814 3852 regcache_raw_collect (regcache, reg->regnum, regp);
3acba339 3853 bin2hex (regp, p, register_size (current_gdbarch, reg->regnum));
6d820c5c 3854 remote_send (&rs->buf, &rs->buf_size);
5a2468f5 3855
74ca34ce
DJ
3856 switch (packet_ok (rs->buf, &remote_protocol_packets[PACKET_P]))
3857 {
3858 case PACKET_OK:
3859 return 1;
3860 case PACKET_ERROR:
3861 error (_("Could not write register \"%s\""),
3862 gdbarch_register_name (current_gdbarch, reg->regnum));
3863 case PACKET_UNKNOWN:
3864 return 0;
3865 default:
3866 internal_error (__FILE__, __LINE__, _("Bad result from packet_ok"));
3867 }
c906108c
SS
3868}
3869
23860348
MS
3870/* Store register REGNUM, or all registers if REGNUM == -1, from the
3871 contents of the register cache buffer. FIXME: ignores errors. */
c906108c
SS
3872
3873static void
56be3814 3874store_registers_using_G (const struct regcache *regcache)
c906108c 3875{
d01949b6 3876 struct remote_state *rs = get_remote_state ();
ea9c271d 3877 struct remote_arch_state *rsa = get_remote_arch_state ();
cfd77fa1 3878 gdb_byte *regs;
c906108c
SS
3879 char *p;
3880
193cb69f
AC
3881 /* Extract all the registers in the regcache copying them into a
3882 local buffer. */
3883 {
b323314b 3884 int i;
ea9c271d
DJ
3885 regs = alloca (rsa->sizeof_g_packet);
3886 memset (regs, 0, rsa->sizeof_g_packet);
f57d151a 3887 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
193cb69f 3888 {
ea9c271d 3889 struct packet_reg *r = &rsa->regs[i];
b323314b 3890 if (r->in_g_packet)
56be3814 3891 regcache_raw_collect (regcache, r->regnum, regs + r->offset);
193cb69f
AC
3892 }
3893 }
c906108c
SS
3894
3895 /* Command describes registers byte by byte,
3896 each byte encoded as two hex characters. */
6d820c5c 3897 p = rs->buf;
193cb69f 3898 *p++ = 'G';
74ca34ce
DJ
3899 /* remote_prepare_to_store insures that rsa->sizeof_g_packet gets
3900 updated. */
3901 bin2hex (regs, p, rsa->sizeof_g_packet);
6d820c5c 3902 remote_send (&rs->buf, &rs->buf_size);
c906108c 3903}
74ca34ce
DJ
3904
3905/* Store register REGNUM, or all registers if REGNUM == -1, from the contents
3906 of the register cache buffer. FIXME: ignores errors. */
3907
3908static void
56be3814 3909remote_store_registers (struct regcache *regcache, int regnum)
74ca34ce
DJ
3910{
3911 struct remote_state *rs = get_remote_state ();
3912 struct remote_arch_state *rsa = get_remote_arch_state ();
3913 int i;
3914
3915 set_thread (PIDGET (inferior_ptid), 1);
3916
3917 if (regnum >= 0)
3918 {
3919 struct packet_reg *reg = packet_reg_from_regnum (rsa, regnum);
3920 gdb_assert (reg != NULL);
3921
3922 /* Always prefer to store registers using the 'P' packet if
3923 possible; we often change only a small number of registers.
3924 Sometimes we change a larger number; we'd need help from a
3925 higher layer to know to use 'G'. */
56be3814 3926 if (store_register_using_P (regcache, reg))
74ca34ce
DJ
3927 return;
3928
3929 /* For now, don't complain if we have no way to write the
3930 register. GDB loses track of unavailable registers too
3931 easily. Some day, this may be an error. We don't have
3932 any way to read the register, either... */
3933 if (!reg->in_g_packet)
3934 return;
3935
56be3814 3936 store_registers_using_G (regcache);
74ca34ce
DJ
3937 return;
3938 }
3939
56be3814 3940 store_registers_using_G (regcache);
74ca34ce 3941
f57d151a 3942 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
74ca34ce 3943 if (!rsa->regs[i].in_g_packet)
56be3814 3944 if (!store_register_using_P (regcache, &rsa->regs[i]))
74ca34ce
DJ
3945 /* See above for why we do not issue an error here. */
3946 continue;
3947}
c906108c
SS
3948\f
3949
3950/* Return the number of hex digits in num. */
3951
3952static int
fba45db2 3953hexnumlen (ULONGEST num)
c906108c
SS
3954{
3955 int i;
3956
3957 for (i = 0; num != 0; i++)
3958 num >>= 4;
3959
3960 return max (i, 1);
3961}
3962
2df3850c 3963/* Set BUF to the minimum number of hex digits representing NUM. */
c906108c
SS
3964
3965static int
fba45db2 3966hexnumstr (char *buf, ULONGEST num)
c906108c 3967{
c906108c 3968 int len = hexnumlen (num);
2df3850c
JM
3969 return hexnumnstr (buf, num, len);
3970}
3971
c906108c 3972
2df3850c 3973/* Set BUF to the hex digits representing NUM, padded to WIDTH characters. */
c906108c 3974
2df3850c 3975static int
fba45db2 3976hexnumnstr (char *buf, ULONGEST num, int width)
2df3850c
JM
3977{
3978 int i;
3979
3980 buf[width] = '\0';
3981
3982 for (i = width - 1; i >= 0; i--)
c906108c 3983 {
c5aa993b 3984 buf[i] = "0123456789abcdef"[(num & 0xf)];
c906108c
SS
3985 num >>= 4;
3986 }
3987
2df3850c 3988 return width;
c906108c
SS
3989}
3990
23860348 3991/* Mask all but the least significant REMOTE_ADDRESS_SIZE bits. */
c906108c
SS
3992
3993static CORE_ADDR
fba45db2 3994remote_address_masked (CORE_ADDR addr)
c906108c
SS
3995{
3996 if (remote_address_size > 0
3997 && remote_address_size < (sizeof (ULONGEST) * 8))
3998 {
3999 /* Only create a mask when that mask can safely be constructed
23860348 4000 in a ULONGEST variable. */
c906108c
SS
4001 ULONGEST mask = 1;
4002 mask = (mask << remote_address_size) - 1;
4003 addr &= mask;
4004 }
4005 return addr;
4006}
4007
a31ea83d
DJ
4008/* Convert BUFFER, binary data at least LEN bytes long, into escaped
4009 binary data in OUT_BUF. Set *OUT_LEN to the length of the data
4010 encoded in OUT_BUF, and return the number of bytes in OUT_BUF
4011 (which may be more than *OUT_LEN due to escape characters). The
4012 total number of bytes in the output buffer will be at most
4013 OUT_MAXLEN. */
4014
4015static int
4016remote_escape_output (const gdb_byte *buffer, int len,
4017 gdb_byte *out_buf, int *out_len,
4018 int out_maxlen)
4019{
4020 int input_index, output_index;
4021
4022 output_index = 0;
4023 for (input_index = 0; input_index < len; input_index++)
4024 {
4025 gdb_byte b = buffer[input_index];
4026
4027 if (b == '$' || b == '#' || b == '}')
4028 {
4029 /* These must be escaped. */
4030 if (output_index + 2 > out_maxlen)
4031 break;
4032 out_buf[output_index++] = '}';
4033 out_buf[output_index++] = b ^ 0x20;
4034 }
4035 else
4036 {
4037 if (output_index + 1 > out_maxlen)
4038 break;
4039 out_buf[output_index++] = b;
4040 }
4041 }
4042
4043 *out_len = input_index;
4044 return output_index;
4045}
4046
0876f84a
DJ
4047/* Convert BUFFER, escaped data LEN bytes long, into binary data
4048 in OUT_BUF. Return the number of bytes written to OUT_BUF.
4049 Raise an error if the total number of bytes exceeds OUT_MAXLEN.
4050
4051 This function reverses remote_escape_output. It allows more
4052 escaped characters than that function does, in particular because
4053 '*' must be escaped to avoid the run-length encoding processing
4054 in reading packets. */
4055
4056static int
4057remote_unescape_input (const gdb_byte *buffer, int len,
4058 gdb_byte *out_buf, int out_maxlen)
4059{
4060 int input_index, output_index;
4061 int escaped;
4062
4063 output_index = 0;
4064 escaped = 0;
4065 for (input_index = 0; input_index < len; input_index++)
4066 {
4067 gdb_byte b = buffer[input_index];
4068
4069 if (output_index + 1 > out_maxlen)
4070 {
4071 warning (_("Received too much data from remote target;"
4072 " ignoring overflow."));
4073 return output_index;
4074 }
4075
4076 if (escaped)
4077 {
4078 out_buf[output_index++] = b ^ 0x20;
4079 escaped = 0;
4080 }
4081 else if (b == '}')
4082 escaped = 1;
4083 else
4084 out_buf[output_index++] = b;
4085 }
4086
4087 if (escaped)
4088 error (_("Unmatched escape character in target response."));
4089
4090 return output_index;
4091}
4092
c906108c
SS
4093/* Determine whether the remote target supports binary downloading.
4094 This is accomplished by sending a no-op memory write of zero length
4095 to the target at the specified address. It does not suffice to send
23860348
MS
4096 the whole packet, since many stubs strip the eighth bit and
4097 subsequently compute a wrong checksum, which causes real havoc with
4098 remote_write_bytes.
7a292a7a 4099
96baa820
JM
4100 NOTE: This can still lose if the serial line is not eight-bit
4101 clean. In cases like this, the user should clear "remote
23860348 4102 X-packet". */
96baa820 4103
c906108c 4104static void
fba45db2 4105check_binary_download (CORE_ADDR addr)
c906108c 4106{
d01949b6 4107 struct remote_state *rs = get_remote_state ();
24b06219 4108
444abaca 4109 switch (remote_protocol_packets[PACKET_X].support)
c906108c 4110 {
96baa820
JM
4111 case PACKET_DISABLE:
4112 break;
4113 case PACKET_ENABLE:
4114 break;
4115 case PACKET_SUPPORT_UNKNOWN:
4116 {
96baa820 4117 char *p;
802188a7 4118
2e9f7625 4119 p = rs->buf;
96baa820
JM
4120 *p++ = 'X';
4121 p += hexnumstr (p, (ULONGEST) addr);
4122 *p++ = ',';
4123 p += hexnumstr (p, (ULONGEST) 0);
4124 *p++ = ':';
4125 *p = '\0';
802188a7 4126
2e9f7625 4127 putpkt_binary (rs->buf, (int) (p - rs->buf));
6d820c5c 4128 getpkt (&rs->buf, &rs->buf_size, 0);
c906108c 4129
2e9f7625 4130 if (rs->buf[0] == '\0')
96baa820
JM
4131 {
4132 if (remote_debug)
4133 fprintf_unfiltered (gdb_stdlog,
4134 "binary downloading NOT suppported by target\n");
444abaca 4135 remote_protocol_packets[PACKET_X].support = PACKET_DISABLE;
96baa820
JM
4136 }
4137 else
4138 {
4139 if (remote_debug)
4140 fprintf_unfiltered (gdb_stdlog,
4141 "binary downloading suppported by target\n");
444abaca 4142 remote_protocol_packets[PACKET_X].support = PACKET_ENABLE;
96baa820
JM
4143 }
4144 break;
4145 }
c906108c
SS
4146 }
4147}
4148
4149/* Write memory data directly to the remote machine.
4150 This does not inform the data cache; the data cache uses this.
a76d924d 4151 HEADER is the starting part of the packet.
c906108c
SS
4152 MEMADDR is the address in the remote memory space.
4153 MYADDR is the address of the buffer in our space.
4154 LEN is the number of bytes.
a76d924d
DJ
4155 PACKET_FORMAT should be either 'X' or 'M', and indicates if we
4156 should send data as binary ('X'), or hex-encoded ('M').
4157
4158 The function creates packet of the form
4159 <HEADER><ADDRESS>,<LENGTH>:<DATA>
4160
4161 where encoding of <DATA> is termined by PACKET_FORMAT.
4162
4163 If USE_LENGTH is 0, then the <LENGTH> field and the preceding comma
4164 are omitted.
4165
4166 Returns the number of bytes transferred, or 0 (setting errno) for
23860348 4167 error. Only transfer a single packet. */
c906108c 4168
a76d924d
DJ
4169static int
4170remote_write_bytes_aux (const char *header, CORE_ADDR memaddr,
4171 const gdb_byte *myaddr, int len,
4172 char packet_format, int use_length)
c906108c 4173{
6d820c5c 4174 struct remote_state *rs = get_remote_state ();
cfd77fa1 4175 char *p;
a76d924d
DJ
4176 char *plen = NULL;
4177 int plenlen = 0;
917317f4
JM
4178 int todo;
4179 int nr_bytes;
a257b5bb 4180 int payload_size;
6765f3e5 4181 int payload_length;
a76d924d
DJ
4182 int header_length;
4183
4184 if (packet_format != 'X' && packet_format != 'M')
4185 internal_error (__FILE__, __LINE__,
4186 "remote_write_bytes_aux: bad packet format");
c906108c 4187
b2182ed2
DJ
4188 if (len <= 0)
4189 return 0;
4190
3de11b2e 4191 payload_size = get_memory_write_packet_size ();
2bc416ba 4192
6d820c5c
DJ
4193 /* The packet buffer will be large enough for the payload;
4194 get_memory_packet_size ensures this. */
a76d924d 4195 rs->buf[0] = '\0';
c906108c 4196
a257b5bb 4197 /* Compute the size of the actual payload by subtracting out the
3de11b2e
NS
4198 packet header and footer overhead: "$M<memaddr>,<len>:...#nn".
4199 */
a76d924d
DJ
4200 payload_size -= strlen ("$,:#NN");
4201 if (!use_length)
4202 /* The comma won't be used. */
4203 payload_size += 1;
4204 header_length = strlen (header);
4205 payload_size -= header_length;
3de11b2e 4206 payload_size -= hexnumlen (memaddr);
c906108c 4207
a76d924d 4208 /* Construct the packet excluding the data: "<header><memaddr>,<len>:". */
917317f4 4209
a76d924d
DJ
4210 strcat (rs->buf, header);
4211 p = rs->buf + strlen (header);
4212
4213 /* Compute a best guess of the number of bytes actually transfered. */
4214 if (packet_format == 'X')
c906108c 4215 {
23860348 4216 /* Best guess at number of bytes that will fit. */
a257b5bb 4217 todo = min (len, payload_size);
a76d924d
DJ
4218 if (use_length)
4219 payload_size -= hexnumlen (todo);
3de11b2e 4220 todo = min (todo, payload_size);
a76d924d
DJ
4221 }
4222 else
4223 {
23860348 4224 /* Num bytes that will fit. */
a257b5bb 4225 todo = min (len, payload_size / 2);
a76d924d
DJ
4226 if (use_length)
4227 payload_size -= hexnumlen (todo);
3de11b2e 4228 todo = min (todo, payload_size / 2);
917317f4 4229 }
a76d924d 4230
3de11b2e
NS
4231 if (todo <= 0)
4232 internal_error (__FILE__, __LINE__,
4233 _("minumum packet size too small to write data"));
802188a7 4234
6765f3e5
DJ
4235 /* If we already need another packet, then try to align the end
4236 of this packet to a useful boundary. */
4237 if (todo > 2 * REMOTE_ALIGN_WRITES && todo < len)
4238 todo = ((memaddr + todo) & ~(REMOTE_ALIGN_WRITES - 1)) - memaddr;
4239
a257b5bb 4240 /* Append "<memaddr>". */
917317f4
JM
4241 memaddr = remote_address_masked (memaddr);
4242 p += hexnumstr (p, (ULONGEST) memaddr);
a257b5bb 4243
a76d924d
DJ
4244 if (use_length)
4245 {
4246 /* Append ",". */
4247 *p++ = ',';
802188a7 4248
a76d924d
DJ
4249 /* Append <len>. Retain the location/size of <len>. It may need to
4250 be adjusted once the packet body has been created. */
4251 plen = p;
4252 plenlen = hexnumstr (p, (ULONGEST) todo);
4253 p += plenlen;
4254 }
a257b5bb
AC
4255
4256 /* Append ":". */
917317f4
JM
4257 *p++ = ':';
4258 *p = '\0';
802188a7 4259
a257b5bb 4260 /* Append the packet body. */
a76d924d 4261 if (packet_format == 'X')
917317f4 4262 {
917317f4
JM
4263 /* Binary mode. Send target system values byte by byte, in
4264 increasing byte addresses. Only escape certain critical
4265 characters. */
6765f3e5
DJ
4266 payload_length = remote_escape_output (myaddr, todo, p, &nr_bytes,
4267 payload_size);
4268
4269 /* If not all TODO bytes fit, then we'll need another packet. Make
9b7194bc
DJ
4270 a second try to keep the end of the packet aligned. Don't do
4271 this if the packet is tiny. */
4272 if (nr_bytes < todo && nr_bytes > 2 * REMOTE_ALIGN_WRITES)
6765f3e5
DJ
4273 {
4274 int new_nr_bytes;
4275
4276 new_nr_bytes = (((memaddr + nr_bytes) & ~(REMOTE_ALIGN_WRITES - 1))
4277 - memaddr);
4278 if (new_nr_bytes != nr_bytes)
4279 payload_length = remote_escape_output (myaddr, new_nr_bytes,
4280 p, &nr_bytes,
4281 payload_size);
4282 }
4283
4284 p += payload_length;
a76d924d 4285 if (use_length && nr_bytes < todo)
c906108c 4286 {
802188a7 4287 /* Escape chars have filled up the buffer prematurely,
917317f4
JM
4288 and we have actually sent fewer bytes than planned.
4289 Fix-up the length field of the packet. Use the same
4290 number of characters as before. */
917317f4
JM
4291 plen += hexnumnstr (plen, (ULONGEST) nr_bytes, plenlen);
4292 *plen = ':'; /* overwrite \0 from hexnumnstr() */
c906108c 4293 }
a76d924d
DJ
4294 }
4295 else
4296 {
917317f4
JM
4297 /* Normal mode: Send target system values byte by byte, in
4298 increasing byte addresses. Each byte is encoded as a two hex
4299 value. */
2644f393 4300 nr_bytes = bin2hex (myaddr, p, todo);
aa6c0017 4301 p += 2 * nr_bytes;
c906108c 4302 }
802188a7 4303
2e9f7625 4304 putpkt_binary (rs->buf, (int) (p - rs->buf));
6d820c5c 4305 getpkt (&rs->buf, &rs->buf_size, 0);
802188a7 4306
2e9f7625 4307 if (rs->buf[0] == 'E')
917317f4
JM
4308 {
4309 /* There is no correspondance between what the remote protocol
4310 uses for errors and errno codes. We would like a cleaner way
4311 of representing errors (big enough to include errno codes,
4312 bfd_error codes, and others). But for now just return EIO. */
4313 errno = EIO;
4314 return 0;
4315 }
802188a7 4316
23860348
MS
4317 /* Return NR_BYTES, not TODO, in case escape chars caused us to send
4318 fewer bytes than we'd planned. */
917317f4 4319 return nr_bytes;
c906108c
SS
4320}
4321
a76d924d
DJ
4322/* Write memory data directly to the remote machine.
4323 This does not inform the data cache; the data cache uses this.
4324 MEMADDR is the address in the remote memory space.
4325 MYADDR is the address of the buffer in our space.
4326 LEN is the number of bytes.
4327
4328 Returns number of bytes transferred, or 0 (setting errno) for
4329 error. Only transfer a single packet. */
4330
4331int
4332remote_write_bytes (CORE_ADDR memaddr, const gdb_byte *myaddr, int len)
4333{
4334 char *packet_format = 0;
4335
4336 /* Check whether the target supports binary download. */
4337 check_binary_download (memaddr);
4338
4339 switch (remote_protocol_packets[PACKET_X].support)
4340 {
4341 case PACKET_ENABLE:
4342 packet_format = "X";
4343 break;
4344 case PACKET_DISABLE:
4345 packet_format = "M";
4346 break;
4347 case PACKET_SUPPORT_UNKNOWN:
4348 internal_error (__FILE__, __LINE__,
4349 _("remote_write_bytes: bad internal state"));
4350 default:
4351 internal_error (__FILE__, __LINE__, _("bad switch"));
4352 }
4353
4354 return remote_write_bytes_aux (packet_format,
4355 memaddr, myaddr, len, packet_format[0], 1);
4356}
4357
c906108c
SS
4358/* Read memory data directly from the remote machine.
4359 This does not use the data cache; the data cache uses this.
4360 MEMADDR is the address in the remote memory space.
4361 MYADDR is the address of the buffer in our space.
4362 LEN is the number of bytes.
4363
4364 Returns number of bytes transferred, or 0 for error. */
4365
917317f4
JM
4366/* NOTE: cagney/1999-10-18: This function (and its siblings in other
4367 remote targets) shouldn't attempt to read the entire buffer.
4368 Instead it should read a single packet worth of data and then
4369 return the byte size of that packet to the caller. The caller (its
4370 caller and its callers caller ;-) already contains code for
23860348 4371 handling partial reads. */
917317f4 4372
449092f6 4373int
cfd77fa1 4374remote_read_bytes (CORE_ADDR memaddr, gdb_byte *myaddr, int len)
c906108c 4375{
6d820c5c 4376 struct remote_state *rs = get_remote_state ();
23860348 4377 int max_buf_size; /* Max size of packet output buffer. */
c906108c
SS
4378 int origlen;
4379
b2182ed2
DJ
4380 if (len <= 0)
4381 return 0;
4382
11cf8741 4383 max_buf_size = get_memory_read_packet_size ();
6d820c5c
DJ
4384 /* The packet buffer will be large enough for the payload;
4385 get_memory_packet_size ensures this. */
c906108c
SS
4386
4387 origlen = len;
4388 while (len > 0)
4389 {
c906108c
SS
4390 char *p;
4391 int todo;
4392 int i;
4393
c5aa993b 4394 todo = min (len, max_buf_size / 2); /* num bytes that will fit */
c906108c
SS
4395
4396 /* construct "m"<memaddr>","<len>" */
2e9f7625 4397 /* sprintf (rs->buf, "m%lx,%x", (unsigned long) memaddr, todo); */
c906108c 4398 memaddr = remote_address_masked (memaddr);
2e9f7625 4399 p = rs->buf;
c906108c
SS
4400 *p++ = 'm';
4401 p += hexnumstr (p, (ULONGEST) memaddr);
4402 *p++ = ',';
4403 p += hexnumstr (p, (ULONGEST) todo);
4404 *p = '\0';
4405
2e9f7625 4406 putpkt (rs->buf);
6d820c5c 4407 getpkt (&rs->buf, &rs->buf_size, 0);
c906108c 4408
2e9f7625
DJ
4409 if (rs->buf[0] == 'E'
4410 && isxdigit (rs->buf[1]) && isxdigit (rs->buf[2])
4411 && rs->buf[3] == '\0')
c906108c 4412 {
23860348
MS
4413 /* There is no correspondance between what the remote
4414 protocol uses for errors and errno codes. We would like
4415 a cleaner way of representing errors (big enough to
4416 include errno codes, bfd_error codes, and others). But
4417 for now just return EIO. */
c906108c
SS
4418 errno = EIO;
4419 return 0;
4420 }
4421
c5aa993b
JM
4422 /* Reply describes memory byte by byte,
4423 each byte encoded as two hex characters. */
c906108c 4424
2e9f7625 4425 p = rs->buf;
30559e10 4426 if ((i = hex2bin (p, myaddr, todo)) < todo)
c906108c 4427 {
30559e10 4428 /* Reply is short. This means that we were able to read
23860348 4429 only part of what we wanted to. */
30559e10 4430 return i + (origlen - len);
c906108c
SS
4431 }
4432 myaddr += todo;
4433 memaddr += todo;
4434 len -= todo;
4435 }
4436 return origlen;
4437}
4438\f
4439/* Read or write LEN bytes from inferior memory at MEMADDR,
23860348
MS
4440 transferring to or from debugger address BUFFER. Write to inferior
4441 if SHOULD_WRITE is nonzero. Returns length of data written or
4442 read; 0 for error. TARGET is unused. */
392a587b 4443
c906108c 4444static int
961cb7b5 4445remote_xfer_memory (CORE_ADDR mem_addr, gdb_byte *buffer, int mem_len,
0a65a603 4446 int should_write, struct mem_attrib *attrib,
29e57380 4447 struct target_ops *target)
c906108c 4448{
4930751a
C
4449 int res;
4450
4930751a 4451 if (should_write)
b2182ed2 4452 res = remote_write_bytes (mem_addr, buffer, mem_len);
4930751a 4453 else
b2182ed2 4454 res = remote_read_bytes (mem_addr, buffer, mem_len);
4930751a
C
4455
4456 return res;
c906108c
SS
4457}
4458
a76d924d
DJ
4459/* Sends a packet with content determined by the printf format string
4460 FORMAT and the remaining arguments, then gets the reply. Returns
4461 whether the packet was a success, a failure, or unknown. */
4462
4463enum packet_result
4464remote_send_printf (const char *format, ...)
4465{
4466 struct remote_state *rs = get_remote_state ();
4467 int max_size = get_remote_packet_size ();
4468
4469 va_list ap;
4470 va_start (ap, format);
4471
4472 rs->buf[0] = '\0';
4473 if (vsnprintf (rs->buf, max_size, format, ap) >= max_size)
4474 internal_error (__FILE__, __LINE__, "Too long remote packet.");
4475
4476 if (putpkt (rs->buf) < 0)
4477 error (_("Communication problem with target."));
4478
4479 rs->buf[0] = '\0';
4480 getpkt (&rs->buf, &rs->buf_size, 0);
4481
4482 return packet_check_result (rs->buf);
4483}
4484
4485static void
4486restore_remote_timeout (void *p)
4487{
4488 int value = *(int *)p;
4489 remote_timeout = value;
4490}
4491
4492/* Flash writing can take quite some time. We'll set
4493 effectively infinite timeout for flash operations.
4494 In future, we'll need to decide on a better approach. */
4495static const int remote_flash_timeout = 1000;
4496
4497static void
4498remote_flash_erase (struct target_ops *ops,
4499 ULONGEST address, LONGEST length)
4500{
4501 int saved_remote_timeout = remote_timeout;
4502 enum packet_result ret;
4503
4504 struct cleanup *back_to = make_cleanup (restore_remote_timeout,
4505 &saved_remote_timeout);
4506 remote_timeout = remote_flash_timeout;
4507
4508 ret = remote_send_printf ("vFlashErase:%s,%s",
4509 paddr (address),
4510 phex (length, 4));
4511 switch (ret)
4512 {
4513 case PACKET_UNKNOWN:
4514 error (_("Remote target does not support flash erase"));
4515 case PACKET_ERROR:
4516 error (_("Error erasing flash with vFlashErase packet"));
4517 default:
4518 break;
4519 }
4520
4521 do_cleanups (back_to);
4522}
4523
4524static LONGEST
4525remote_flash_write (struct target_ops *ops,
4526 ULONGEST address, LONGEST length,
4527 const gdb_byte *data)
4528{
4529 int saved_remote_timeout = remote_timeout;
4530 int ret;
4531 struct cleanup *back_to = make_cleanup (restore_remote_timeout,
4532 &saved_remote_timeout);
4533
4534 remote_timeout = remote_flash_timeout;
4535 ret = remote_write_bytes_aux ("vFlashWrite:", address, data, length, 'X', 0);
4536 do_cleanups (back_to);
4537
4538 return ret;
4539}
4540
4541static void
4542remote_flash_done (struct target_ops *ops)
4543{
4544 int saved_remote_timeout = remote_timeout;
4545 int ret;
4546 struct cleanup *back_to = make_cleanup (restore_remote_timeout,
4547 &saved_remote_timeout);
4548
4549 remote_timeout = remote_flash_timeout;
4550 ret = remote_send_printf ("vFlashDone");
4551 do_cleanups (back_to);
4552
4553 switch (ret)
4554 {
4555 case PACKET_UNKNOWN:
4556 error (_("Remote target does not support vFlashDone"));
4557 case PACKET_ERROR:
4558 error (_("Error finishing flash operation"));
4559 default:
4560 break;
4561 }
4562}
4563
c906108c 4564static void
fba45db2 4565remote_files_info (struct target_ops *ignore)
c906108c
SS
4566{
4567 puts_filtered ("Debugging a target over a serial line.\n");
4568}
4569\f
4570/* Stuff for dealing with the packets which are part of this protocol.
4571 See comment at top of file for details. */
4572
0876f84a 4573/* Read a single character from the remote end. */
c906108c
SS
4574
4575static int
fba45db2 4576readchar (int timeout)
c906108c
SS
4577{
4578 int ch;
4579
2cd58942 4580 ch = serial_readchar (remote_desc, timeout);
c906108c 4581
2acceee2 4582 if (ch >= 0)
0876f84a 4583 return ch;
2acceee2
JM
4584
4585 switch ((enum serial_rc) ch)
c906108c
SS
4586 {
4587 case SERIAL_EOF:
2acceee2 4588 target_mourn_inferior ();
8a3fe4f8 4589 error (_("Remote connection closed"));
2acceee2 4590 /* no return */
c906108c 4591 case SERIAL_ERROR:
e2e0b3e5 4592 perror_with_name (_("Remote communication error"));
2acceee2 4593 /* no return */
c906108c 4594 case SERIAL_TIMEOUT:
2acceee2 4595 break;
c906108c 4596 }
2acceee2 4597 return ch;
c906108c
SS
4598}
4599
6d820c5c
DJ
4600/* Send the command in *BUF to the remote machine, and read the reply
4601 into *BUF. Report an error if we get an error reply. Resize
4602 *BUF using xrealloc if necessary to hold the result, and update
4603 *SIZEOF_BUF. */
c906108c
SS
4604
4605static void
6d820c5c
DJ
4606remote_send (char **buf,
4607 long *sizeof_buf)
c906108c 4608{
6d820c5c 4609 putpkt (*buf);
c2d11a7d 4610 getpkt (buf, sizeof_buf, 0);
c906108c 4611
6d820c5c
DJ
4612 if ((*buf)[0] == 'E')
4613 error (_("Remote failure reply: %s"), *buf);
c906108c
SS
4614}
4615
4616/* Display a null-terminated packet on stdout, for debugging, using C
4617 string notation. */
4618
4619static void
fba45db2 4620print_packet (char *buf)
c906108c
SS
4621{
4622 puts_filtered ("\"");
43e526b9 4623 fputstr_filtered (buf, '"', gdb_stdout);
c906108c
SS
4624 puts_filtered ("\"");
4625}
4626
4627int
fba45db2 4628putpkt (char *buf)
c906108c
SS
4629{
4630 return putpkt_binary (buf, strlen (buf));
4631}
4632
4633/* Send a packet to the remote machine, with error checking. The data
23860348 4634 of the packet is in BUF. The string in BUF can be at most
ea9c271d 4635 get_remote_packet_size () - 5 to account for the $, # and checksum,
23860348
MS
4636 and for a possible /0 if we are debugging (remote_debug) and want
4637 to print the sent packet as a string. */
c906108c
SS
4638
4639static int
fba45db2 4640putpkt_binary (char *buf, int cnt)
c906108c
SS
4641{
4642 int i;
4643 unsigned char csum = 0;
11cf8741 4644 char *buf2 = alloca (cnt + 6);
085dd6e6 4645
c906108c
SS
4646 int ch;
4647 int tcount = 0;
4648 char *p;
4649
4650 /* Copy the packet into buffer BUF2, encapsulating it
4651 and giving it a checksum. */
4652
c906108c
SS
4653 p = buf2;
4654 *p++ = '$';
4655
4656 for (i = 0; i < cnt; i++)
4657 {
4658 csum += buf[i];
4659 *p++ = buf[i];
4660 }
4661 *p++ = '#';
4662 *p++ = tohex ((csum >> 4) & 0xf);
4663 *p++ = tohex (csum & 0xf);
4664
4665 /* Send it over and over until we get a positive ack. */
4666
4667 while (1)
4668 {
4669 int started_error_output = 0;
4670
4671 if (remote_debug)
4672 {
4673 *p = '\0';
43e526b9
JM
4674 fprintf_unfiltered (gdb_stdlog, "Sending packet: ");
4675 fputstrn_unfiltered (buf2, p - buf2, 0, gdb_stdlog);
d4f3574e 4676 fprintf_unfiltered (gdb_stdlog, "...");
0f71a2f6 4677 gdb_flush (gdb_stdlog);
c906108c 4678 }
2cd58942 4679 if (serial_write (remote_desc, buf2, p - buf2))
e2e0b3e5 4680 perror_with_name (_("putpkt: write failed"));
c906108c 4681
23860348 4682 /* Read until either a timeout occurs (-2) or '+' is read. */
c906108c
SS
4683 while (1)
4684 {
4685 ch = readchar (remote_timeout);
4686
c5aa993b 4687 if (remote_debug)
c906108c
SS
4688 {
4689 switch (ch)
4690 {
4691 case '+':
1216fa2c 4692 case '-':
c906108c
SS
4693 case SERIAL_TIMEOUT:
4694 case '$':
4695 if (started_error_output)
4696 {
4697 putchar_unfiltered ('\n');
4698 started_error_output = 0;
4699 }
4700 }
4701 }
4702
4703 switch (ch)
4704 {
4705 case '+':
4706 if (remote_debug)
0f71a2f6 4707 fprintf_unfiltered (gdb_stdlog, "Ack\n");
c906108c 4708 return 1;
1216fa2c
AC
4709 case '-':
4710 if (remote_debug)
4711 fprintf_unfiltered (gdb_stdlog, "Nak\n");
c906108c 4712 case SERIAL_TIMEOUT:
c5aa993b 4713 tcount++;
c906108c
SS
4714 if (tcount > 3)
4715 return 0;
23860348 4716 break; /* Retransmit buffer. */
c906108c
SS
4717 case '$':
4718 {
40e3f985 4719 if (remote_debug)
2bc416ba 4720 fprintf_unfiltered (gdb_stdlog,
23860348 4721 "Packet instead of Ack, ignoring it\n");
d6f7abdf
AC
4722 /* It's probably an old response sent because an ACK
4723 was lost. Gobble up the packet and ack it so it
4724 doesn't get retransmitted when we resend this
4725 packet. */
6d820c5c 4726 skip_frame ();
d6f7abdf 4727 serial_write (remote_desc, "+", 1);
23860348 4728 continue; /* Now, go look for +. */
c906108c
SS
4729 }
4730 default:
4731 if (remote_debug)
4732 {
4733 if (!started_error_output)
4734 {
4735 started_error_output = 1;
0f71a2f6 4736 fprintf_unfiltered (gdb_stdlog, "putpkt: Junk: ");
c906108c 4737 }
0f71a2f6 4738 fputc_unfiltered (ch & 0177, gdb_stdlog);
c906108c
SS
4739 }
4740 continue;
4741 }
23860348 4742 break; /* Here to retransmit. */
c906108c
SS
4743 }
4744
4745#if 0
4746 /* This is wrong. If doing a long backtrace, the user should be
c5aa993b
JM
4747 able to get out next time we call QUIT, without anything as
4748 violent as interrupt_query. If we want to provide a way out of
4749 here without getting to the next QUIT, it should be based on
4750 hitting ^C twice as in remote_wait. */
c906108c
SS
4751 if (quit_flag)
4752 {
4753 quit_flag = 0;
4754 interrupt_query ();
4755 }
4756#endif
4757 }
4758}
4759
6d820c5c
DJ
4760/* Come here after finding the start of a frame when we expected an
4761 ack. Do our best to discard the rest of this packet. */
4762
4763static void
4764skip_frame (void)
4765{
4766 int c;
4767
4768 while (1)
4769 {
4770 c = readchar (remote_timeout);
4771 switch (c)
4772 {
4773 case SERIAL_TIMEOUT:
4774 /* Nothing we can do. */
4775 return;
4776 case '#':
4777 /* Discard the two bytes of checksum and stop. */
4778 c = readchar (remote_timeout);
4779 if (c >= 0)
4780 c = readchar (remote_timeout);
4781
4782 return;
4783 case '*': /* Run length encoding. */
4784 /* Discard the repeat count. */
4785 c = readchar (remote_timeout);
4786 if (c < 0)
4787 return;
4788 break;
4789 default:
4790 /* A regular character. */
4791 break;
4792 }
4793 }
4794}
4795
c906108c 4796/* Come here after finding the start of the frame. Collect the rest
6d820c5c
DJ
4797 into *BUF, verifying the checksum, length, and handling run-length
4798 compression. NUL terminate the buffer. If there is not enough room,
4799 expand *BUF using xrealloc.
c906108c 4800
c2d11a7d
JM
4801 Returns -1 on error, number of characters in buffer (ignoring the
4802 trailing NULL) on success. (could be extended to return one of the
23860348 4803 SERIAL status indications). */
c2d11a7d
JM
4804
4805static long
6d820c5c
DJ
4806read_frame (char **buf_p,
4807 long *sizeof_buf)
c906108c
SS
4808{
4809 unsigned char csum;
c2d11a7d 4810 long bc;
c906108c 4811 int c;
6d820c5c 4812 char *buf = *buf_p;
c906108c
SS
4813
4814 csum = 0;
c2d11a7d 4815 bc = 0;
c906108c
SS
4816
4817 while (1)
4818 {
4819 c = readchar (remote_timeout);
c906108c
SS
4820 switch (c)
4821 {
4822 case SERIAL_TIMEOUT:
4823 if (remote_debug)
0f71a2f6 4824 fputs_filtered ("Timeout in mid-packet, retrying\n", gdb_stdlog);
c2d11a7d 4825 return -1;
c906108c
SS
4826 case '$':
4827 if (remote_debug)
0f71a2f6
JM
4828 fputs_filtered ("Saw new packet start in middle of old one\n",
4829 gdb_stdlog);
23860348 4830 return -1; /* Start a new packet, count retries. */
c906108c
SS
4831 case '#':
4832 {
4833 unsigned char pktcsum;
e1b09194
AC
4834 int check_0 = 0;
4835 int check_1 = 0;
c906108c 4836
c2d11a7d 4837 buf[bc] = '\0';
c906108c 4838
e1b09194
AC
4839 check_0 = readchar (remote_timeout);
4840 if (check_0 >= 0)
4841 check_1 = readchar (remote_timeout);
802188a7 4842
e1b09194
AC
4843 if (check_0 == SERIAL_TIMEOUT || check_1 == SERIAL_TIMEOUT)
4844 {
4845 if (remote_debug)
2bc416ba 4846 fputs_filtered ("Timeout in checksum, retrying\n",
23860348 4847 gdb_stdlog);
e1b09194
AC
4848 return -1;
4849 }
4850 else if (check_0 < 0 || check_1 < 0)
40e3f985
FN
4851 {
4852 if (remote_debug)
2bc416ba 4853 fputs_filtered ("Communication error in checksum\n",
23860348 4854 gdb_stdlog);
40e3f985
FN
4855 return -1;
4856 }
c906108c 4857
e1b09194 4858 pktcsum = (fromhex (check_0) << 4) | fromhex (check_1);
c906108c 4859 if (csum == pktcsum)
c2d11a7d 4860 return bc;
c906108c 4861
c5aa993b 4862 if (remote_debug)
c906108c 4863 {
0f71a2f6 4864 fprintf_filtered (gdb_stdlog,
c5aa993b 4865 "Bad checksum, sentsum=0x%x, csum=0x%x, buf=",
0f71a2f6 4866 pktcsum, csum);
0876f84a 4867 fputstrn_filtered (buf, bc, 0, gdb_stdlog);
0f71a2f6 4868 fputs_filtered ("\n", gdb_stdlog);
c906108c 4869 }
c2d11a7d 4870 /* Number of characters in buffer ignoring trailing
23860348 4871 NULL. */
c2d11a7d 4872 return -1;
c906108c 4873 }
23860348 4874 case '*': /* Run length encoding. */
c2c6d25f
JM
4875 {
4876 int repeat;
4877 csum += c;
c906108c 4878
b4501125
AC
4879 c = readchar (remote_timeout);
4880 csum += c;
23860348 4881 repeat = c - ' ' + 3; /* Compute repeat count. */
c906108c 4882
23860348 4883 /* The character before ``*'' is repeated. */
c2d11a7d 4884
6d820c5c 4885 if (repeat > 0 && repeat <= 255 && bc > 0)
c2c6d25f 4886 {
6d820c5c
DJ
4887 if (bc + repeat - 1 >= *sizeof_buf - 1)
4888 {
4889 /* Make some more room in the buffer. */
4890 *sizeof_buf += repeat;
4891 *buf_p = xrealloc (*buf_p, *sizeof_buf);
4892 buf = *buf_p;
4893 }
4894
c2d11a7d
JM
4895 memset (&buf[bc], buf[bc - 1], repeat);
4896 bc += repeat;
c2c6d25f
JM
4897 continue;
4898 }
4899
c2d11a7d 4900 buf[bc] = '\0';
6d820c5c 4901 printf_filtered (_("Invalid run length encoding: %s\n"), buf);
c2d11a7d 4902 return -1;
c2c6d25f 4903 }
c906108c 4904 default:
6d820c5c 4905 if (bc >= *sizeof_buf - 1)
c906108c 4906 {
6d820c5c
DJ
4907 /* Make some more room in the buffer. */
4908 *sizeof_buf *= 2;
4909 *buf_p = xrealloc (*buf_p, *sizeof_buf);
4910 buf = *buf_p;
c906108c
SS
4911 }
4912
6d820c5c
DJ
4913 buf[bc++] = c;
4914 csum += c;
4915 continue;
c906108c
SS
4916 }
4917 }
4918}
4919
4920/* Read a packet from the remote machine, with error checking, and
6d820c5c
DJ
4921 store it in *BUF. Resize *BUF using xrealloc if necessary to hold
4922 the result, and update *SIZEOF_BUF. If FOREVER, wait forever
4923 rather than timing out; this is used (in synchronous mode) to wait
4924 for a target that is is executing user code to stop. */
d9fcf2fb
JM
4925/* FIXME: ezannoni 2000-02-01 this wrapper is necessary so that we
4926 don't have to change all the calls to getpkt to deal with the
4927 return value, because at the moment I don't know what the right
23860348 4928 thing to do it for those. */
c906108c 4929void
6d820c5c
DJ
4930getpkt (char **buf,
4931 long *sizeof_buf,
c2d11a7d 4932 int forever)
d9fcf2fb
JM
4933{
4934 int timed_out;
4935
4936 timed_out = getpkt_sane (buf, sizeof_buf, forever);
4937}
4938
4939
4940/* Read a packet from the remote machine, with error checking, and
6d820c5c
DJ
4941 store it in *BUF. Resize *BUF using xrealloc if necessary to hold
4942 the result, and update *SIZEOF_BUF. If FOREVER, wait forever
4943 rather than timing out; this is used (in synchronous mode) to wait
4944 for a target that is is executing user code to stop. If FOREVER ==
4945 0, this function is allowed to time out gracefully and return an
0876f84a
DJ
4946 indication of this to the caller. Otherwise return the number
4947 of bytes read. */
3172dc30 4948static int
6d820c5c 4949getpkt_sane (char **buf, long *sizeof_buf, int forever)
c906108c
SS
4950{
4951 int c;
4952 int tries;
4953 int timeout;
4954 int val;
4955
6d820c5c 4956 strcpy (*buf, "timeout");
c906108c
SS
4957
4958 if (forever)
4959 {
c906108c 4960 timeout = watchdog > 0 ? watchdog : -1;
c906108c
SS
4961 }
4962
4963 else
4964 timeout = remote_timeout;
4965
4966#define MAX_TRIES 3
4967
4968 for (tries = 1; tries <= MAX_TRIES; tries++)
4969 {
4970 /* This can loop forever if the remote side sends us characters
23860348
MS
4971 continuously, but if it pauses, we'll get a zero from
4972 readchar because of timeout. Then we'll count that as a
4973 retry. */
c906108c 4974
23860348
MS
4975 /* Note that we will only wait forever prior to the start of a
4976 packet. After that, we expect characters to arrive at a
4977 brisk pace. They should show up within remote_timeout
4978 intervals. */
c906108c
SS
4979
4980 do
4981 {
4982 c = readchar (timeout);
4983
4984 if (c == SERIAL_TIMEOUT)
4985 {
23860348 4986 if (forever) /* Watchdog went off? Kill the target. */
c906108c 4987 {
2acceee2 4988 QUIT;
c906108c 4989 target_mourn_inferior ();
8a3fe4f8 4990 error (_("Watchdog has expired. Target detached."));
c906108c 4991 }
c906108c 4992 if (remote_debug)
0f71a2f6 4993 fputs_filtered ("Timed out.\n", gdb_stdlog);
c906108c
SS
4994 goto retry;
4995 }
4996 }
4997 while (c != '$');
4998
4999 /* We've found the start of a packet, now collect the data. */
5000
c2d11a7d 5001 val = read_frame (buf, sizeof_buf);
c906108c 5002
c2d11a7d 5003 if (val >= 0)
c906108c
SS
5004 {
5005 if (remote_debug)
43e526b9
JM
5006 {
5007 fprintf_unfiltered (gdb_stdlog, "Packet received: ");
0876f84a 5008 fputstrn_unfiltered (*buf, val, 0, gdb_stdlog);
43e526b9
JM
5009 fprintf_unfiltered (gdb_stdlog, "\n");
5010 }
2cd58942 5011 serial_write (remote_desc, "+", 1);
0876f84a 5012 return val;
c906108c
SS
5013 }
5014
5015 /* Try the whole thing again. */
5016 retry:
2cd58942 5017 serial_write (remote_desc, "-", 1);
c906108c
SS
5018 }
5019
2bc416ba 5020 /* We have tried hard enough, and just can't receive the packet.
23860348 5021 Give up. */
c906108c 5022
a3f17187 5023 printf_unfiltered (_("Ignoring packet error, continuing...\n"));
2cd58942 5024 serial_write (remote_desc, "+", 1);
0876f84a 5025 return -1;
c906108c
SS
5026}
5027\f
5028static void
fba45db2 5029remote_kill (void)
c906108c
SS
5030{
5031 /* For some mysterious reason, wait_for_inferior calls kill instead of
5032 mourn after it gets TARGET_WAITKIND_SIGNALLED. Work around it. */
5033 if (kill_kludge)
5034 {
5035 kill_kludge = 0;
5036 target_mourn_inferior ();
5037 return;
5038 }
5039
5040 /* Use catch_errors so the user can quit from gdb even when we aren't on
5041 speaking terms with the remote system. */
c5aa993b 5042 catch_errors ((catch_errors_ftype *) putpkt, "k", "", RETURN_MASK_ERROR);
c906108c
SS
5043
5044 /* Don't wait for it to die. I'm not really sure it matters whether
5045 we do or not. For the existing stubs, kill is a noop. */
5046 target_mourn_inferior ();
5047}
5048
23860348 5049/* Async version of remote_kill. */
43ff13b4 5050static void
fba45db2 5051remote_async_kill (void)
43ff13b4 5052{
23860348 5053 /* Unregister the file descriptor from the event loop. */
ed9a39eb 5054 if (target_is_async_p ())
2cd58942 5055 serial_async (remote_desc, NULL, 0);
43ff13b4
JM
5056
5057 /* For some mysterious reason, wait_for_inferior calls kill instead of
5058 mourn after it gets TARGET_WAITKIND_SIGNALLED. Work around it. */
5059 if (kill_kludge)
5060 {
5061 kill_kludge = 0;
5062 target_mourn_inferior ();
5063 return;
5064 }
5065
23860348
MS
5066 /* Use catch_errors so the user can quit from gdb even when we
5067 aren't on speaking terms with the remote system. */
c5aa993b 5068 catch_errors ((catch_errors_ftype *) putpkt, "k", "", RETURN_MASK_ERROR);
43ff13b4
JM
5069
5070 /* Don't wait for it to die. I'm not really sure it matters whether
5071 we do or not. For the existing stubs, kill is a noop. */
5072 target_mourn_inferior ();
5073}
5074
c906108c 5075static void
fba45db2 5076remote_mourn (void)
c906108c
SS
5077{
5078 remote_mourn_1 (&remote_ops);
5079}
5080
53a5351d 5081static void
fba45db2 5082remote_async_mourn (void)
53a5351d
JM
5083{
5084 remote_mourn_1 (&remote_async_ops);
5085}
5086
c906108c 5087static void
fba45db2 5088extended_remote_mourn (void)
c906108c
SS
5089{
5090 /* We do _not_ want to mourn the target like this; this will
5091 remove the extended remote target from the target stack,
802188a7 5092 and the next time the user says "run" it'll fail.
c906108c
SS
5093
5094 FIXME: What is the right thing to do here? */
5095#if 0
5096 remote_mourn_1 (&extended_remote_ops);
5097#endif
5098}
5099
5100/* Worker function for remote_mourn. */
5101static void
fba45db2 5102remote_mourn_1 (struct target_ops *target)
c906108c
SS
5103{
5104 unpush_target (target);
5105 generic_mourn_inferior ();
5106}
5107
5108/* In the extended protocol we want to be able to do things like
5109 "run" and have them basically work as expected. So we need
802188a7 5110 a special create_inferior function.
c906108c
SS
5111
5112 FIXME: One day add support for changing the exec file
5113 we're debugging, arguments and an environment. */
5114
5115static void
23860348
MS
5116extended_remote_create_inferior (char *exec_file, char *args,
5117 char **env, int from_tty)
c906108c
SS
5118{
5119 /* Rip out the breakpoints; we'll reinsert them after restarting
5120 the remote server. */
5121 remove_breakpoints ();
5122
5123 /* Now restart the remote server. */
5124 extended_remote_restart ();
5125
424163ea
DJ
5126 /* NOTE: We don't need to recheck for a target description here; but
5127 if we gain the ability to switch the remote executable we may
5128 need to, if for instance we are running a process which requested
5129 different emulated hardware from the operating system. A
5130 concrete example of this is ARM GNU/Linux, where some binaries
5131 will have a legacy FPA coprocessor emulated and others may have
5132 access to a hardware VFP unit. */
5133
c906108c
SS
5134 /* Now put the breakpoints back in. This way we're safe if the
5135 restart function works via a unix fork on the remote side. */
5136 insert_breakpoints ();
5137
5138 /* Clean up from the last time we were running. */
5139 clear_proceed_status ();
c906108c
SS
5140}
5141
23860348 5142/* Async version of extended_remote_create_inferior. */
43ff13b4 5143static void
23860348
MS
5144extended_remote_async_create_inferior (char *exec_file, char *args,
5145 char **env, int from_tty)
43ff13b4
JM
5146{
5147 /* Rip out the breakpoints; we'll reinsert them after restarting
5148 the remote server. */
5149 remove_breakpoints ();
5150
5151 /* If running asynchronously, register the target file descriptor
23860348 5152 with the event loop. */
362646f5 5153 if (target_can_async_p ())
2acceee2 5154 target_async (inferior_event_handler, 0);
43ff13b4
JM
5155
5156 /* Now restart the remote server. */
5157 extended_remote_restart ();
5158
424163ea
DJ
5159 /* NOTE: We don't need to recheck for a target description here; but
5160 if we gain the ability to switch the remote executable we may
5161 need to, if for instance we are running a process which requested
5162 different emulated hardware from the operating system. A
5163 concrete example of this is ARM GNU/Linux, where some binaries
5164 will have a legacy FPA coprocessor emulated and others may have
5165 access to a hardware VFP unit. */
5166
43ff13b4
JM
5167 /* Now put the breakpoints back in. This way we're safe if the
5168 restart function works via a unix fork on the remote side. */
5169 insert_breakpoints ();
5170
5171 /* Clean up from the last time we were running. */
5172 clear_proceed_status ();
43ff13b4 5173}
c906108c 5174\f
c5aa993b 5175
8181d85f
DJ
5176/* Insert a breakpoint. On targets that have software breakpoint
5177 support, we ask the remote target to do the work; on targets
5178 which don't, we insert a traditional memory breakpoint. */
c906108c
SS
5179
5180static int
8181d85f 5181remote_insert_breakpoint (struct bp_target_info *bp_tgt)
c906108c 5182{
8181d85f 5183 CORE_ADDR addr = bp_tgt->placed_address;
d01949b6 5184 struct remote_state *rs = get_remote_state ();
96baa820 5185
d471ea57
AC
5186 /* Try the "Z" s/w breakpoint packet if it is not already disabled.
5187 If it succeeds, then set the support to PACKET_ENABLE. If it
5188 fails, and the user has explicitly requested the Z support then
23860348 5189 report an error, otherwise, mark it disabled and go on. */
802188a7 5190
444abaca 5191 if (remote_protocol_packets[PACKET_Z0].support != PACKET_DISABLE)
96baa820 5192 {
6d820c5c 5193 char *p = rs->buf;
802188a7 5194
96baa820
JM
5195 *(p++) = 'Z';
5196 *(p++) = '0';
5197 *(p++) = ',';
3b3b875c
UW
5198 gdbarch_breakpoint_from_pc
5199 (current_gdbarch, &bp_tgt->placed_address, &bp_tgt->placed_size);
8181d85f
DJ
5200 addr = (ULONGEST) remote_address_masked (bp_tgt->placed_address);
5201 p += hexnumstr (p, addr);
5202 sprintf (p, ",%d", bp_tgt->placed_size);
802188a7 5203
6d820c5c
DJ
5204 putpkt (rs->buf);
5205 getpkt (&rs->buf, &rs->buf_size, 0);
96baa820 5206
6d820c5c 5207 switch (packet_ok (rs->buf, &remote_protocol_packets[PACKET_Z0]))
96baa820 5208 {
d471ea57
AC
5209 case PACKET_ERROR:
5210 return -1;
5211 case PACKET_OK:
5212 return 0;
5213 case PACKET_UNKNOWN:
5214 break;
96baa820
JM
5215 }
5216 }
c906108c 5217
8181d85f 5218 return memory_insert_breakpoint (bp_tgt);
c906108c
SS
5219}
5220
5221static int
8181d85f 5222remote_remove_breakpoint (struct bp_target_info *bp_tgt)
c906108c 5223{
8181d85f 5224 CORE_ADDR addr = bp_tgt->placed_address;
d01949b6 5225 struct remote_state *rs = get_remote_state ();
96baa820
JM
5226 int bp_size;
5227
444abaca 5228 if (remote_protocol_packets[PACKET_Z0].support != PACKET_DISABLE)
96baa820 5229 {
6d820c5c 5230 char *p = rs->buf;
802188a7 5231
96baa820
JM
5232 *(p++) = 'z';
5233 *(p++) = '0';
5234 *(p++) = ',';
5235
8181d85f
DJ
5236 addr = (ULONGEST) remote_address_masked (bp_tgt->placed_address);
5237 p += hexnumstr (p, addr);
5238 sprintf (p, ",%d", bp_tgt->placed_size);
802188a7 5239
6d820c5c
DJ
5240 putpkt (rs->buf);
5241 getpkt (&rs->buf, &rs->buf_size, 0);
96baa820 5242
6d820c5c 5243 return (rs->buf[0] == 'E');
96baa820
JM
5244 }
5245
8181d85f 5246 return memory_remove_breakpoint (bp_tgt);
c906108c
SS
5247}
5248
d471ea57
AC
5249static int
5250watchpoint_to_Z_packet (int type)
5251{
5252 switch (type)
5253 {
5254 case hw_write:
bb858e6a 5255 return Z_PACKET_WRITE_WP;
d471ea57
AC
5256 break;
5257 case hw_read:
bb858e6a 5258 return Z_PACKET_READ_WP;
d471ea57
AC
5259 break;
5260 case hw_access:
bb858e6a 5261 return Z_PACKET_ACCESS_WP;
d471ea57
AC
5262 break;
5263 default:
8e65ff28 5264 internal_error (__FILE__, __LINE__,
e2e0b3e5 5265 _("hw_bp_to_z: bad watchpoint type %d"), type);
d471ea57
AC
5266 }
5267}
5268
3c3bea1c 5269static int
fba45db2 5270remote_insert_watchpoint (CORE_ADDR addr, int len, int type)
96baa820 5271{
d01949b6 5272 struct remote_state *rs = get_remote_state ();
e514a9d6 5273 char *p;
d471ea57 5274 enum Z_packet_type packet = watchpoint_to_Z_packet (type);
96baa820 5275
444abaca 5276 if (remote_protocol_packets[PACKET_Z0 + packet].support == PACKET_DISABLE)
5cffb350 5277 return -1;
802188a7 5278
6d820c5c
DJ
5279 sprintf (rs->buf, "Z%x,", packet);
5280 p = strchr (rs->buf, '\0');
96baa820
JM
5281 addr = remote_address_masked (addr);
5282 p += hexnumstr (p, (ULONGEST) addr);
d4f3574e 5283 sprintf (p, ",%x", len);
802188a7 5284
6d820c5c
DJ
5285 putpkt (rs->buf);
5286 getpkt (&rs->buf, &rs->buf_size, 0);
96baa820 5287
6d820c5c 5288 switch (packet_ok (rs->buf, &remote_protocol_packets[PACKET_Z0 + packet]))
d471ea57
AC
5289 {
5290 case PACKET_ERROR:
5291 case PACKET_UNKNOWN:
5292 return -1;
5293 case PACKET_OK:
5294 return 0;
5295 }
8e65ff28 5296 internal_error (__FILE__, __LINE__,
e2e0b3e5 5297 _("remote_insert_watchpoint: reached end of function"));
96baa820
JM
5298}
5299
d471ea57 5300
3c3bea1c 5301static int
fba45db2 5302remote_remove_watchpoint (CORE_ADDR addr, int len, int type)
96baa820 5303{
d01949b6 5304 struct remote_state *rs = get_remote_state ();
e514a9d6 5305 char *p;
d471ea57
AC
5306 enum Z_packet_type packet = watchpoint_to_Z_packet (type);
5307
444abaca 5308 if (remote_protocol_packets[PACKET_Z0 + packet].support == PACKET_DISABLE)
5cffb350 5309 return -1;
802188a7 5310
6d820c5c
DJ
5311 sprintf (rs->buf, "z%x,", packet);
5312 p = strchr (rs->buf, '\0');
96baa820
JM
5313 addr = remote_address_masked (addr);
5314 p += hexnumstr (p, (ULONGEST) addr);
d4f3574e 5315 sprintf (p, ",%x", len);
6d820c5c
DJ
5316 putpkt (rs->buf);
5317 getpkt (&rs->buf, &rs->buf_size, 0);
96baa820 5318
6d820c5c 5319 switch (packet_ok (rs->buf, &remote_protocol_packets[PACKET_Z0 + packet]))
d471ea57
AC
5320 {
5321 case PACKET_ERROR:
5322 case PACKET_UNKNOWN:
5323 return -1;
5324 case PACKET_OK:
5325 return 0;
5326 }
8e65ff28 5327 internal_error (__FILE__, __LINE__,
e2e0b3e5 5328 _("remote_remove_watchpoint: reached end of function"));
96baa820
JM
5329}
5330
3c3bea1c 5331
501eef12
AC
5332int remote_hw_watchpoint_limit = -1;
5333int remote_hw_breakpoint_limit = -1;
d471ea57 5334
b9362cc7 5335static int
3c3bea1c 5336remote_check_watch_resources (int type, int cnt, int ot)
96baa820 5337{
3c3bea1c
GS
5338 if (type == bp_hardware_breakpoint)
5339 {
5340 if (remote_hw_breakpoint_limit == 0)
5341 return 0;
501eef12
AC
5342 else if (remote_hw_breakpoint_limit < 0)
5343 return 1;
3c3bea1c
GS
5344 else if (cnt <= remote_hw_breakpoint_limit)
5345 return 1;
5346 }
5347 else
5348 {
5349 if (remote_hw_watchpoint_limit == 0)
5350 return 0;
501eef12
AC
5351 else if (remote_hw_watchpoint_limit < 0)
5352 return 1;
3c3bea1c
GS
5353 else if (ot)
5354 return -1;
5355 else if (cnt <= remote_hw_watchpoint_limit)
5356 return 1;
5357 }
5358 return -1;
5359}
5360
b9362cc7 5361static int
3c3bea1c
GS
5362remote_stopped_by_watchpoint (void)
5363{
5364 return remote_stopped_by_watchpoint_p;
5365}
5366
7270d8f2
OF
5367extern int stepped_after_stopped_by_watchpoint;
5368
4aa7a7f5
JJ
5369static int
5370remote_stopped_data_address (struct target_ops *target, CORE_ADDR *addr_p)
3c3bea1c 5371{
4aa7a7f5 5372 int rc = 0;
7270d8f2
OF
5373 if (remote_stopped_by_watchpoint ()
5374 || stepped_after_stopped_by_watchpoint)
4aa7a7f5
JJ
5375 {
5376 *addr_p = remote_watch_data_address;
5377 rc = 1;
5378 }
5379
5380 return rc;
3c3bea1c
GS
5381}
5382
5383
5384static int
8181d85f 5385remote_insert_hw_breakpoint (struct bp_target_info *bp_tgt)
3c3bea1c 5386{
8181d85f 5387 CORE_ADDR addr;
d01949b6 5388 struct remote_state *rs = get_remote_state ();
6d820c5c 5389 char *p = rs->buf;
802188a7 5390
c8189ed1 5391 /* The length field should be set to the size of a breakpoint
8181d85f 5392 instruction, even though we aren't inserting one ourselves. */
c8189ed1 5393
3b3b875c
UW
5394 gdbarch_breakpoint_from_pc
5395 (current_gdbarch, &bp_tgt->placed_address, &bp_tgt->placed_size);
3c3bea1c 5396
444abaca 5397 if (remote_protocol_packets[PACKET_Z1].support == PACKET_DISABLE)
5cffb350 5398 return -1;
2bc416ba 5399
96baa820
JM
5400 *(p++) = 'Z';
5401 *(p++) = '1';
5402 *(p++) = ',';
802188a7 5403
8181d85f 5404 addr = remote_address_masked (bp_tgt->placed_address);
96baa820 5405 p += hexnumstr (p, (ULONGEST) addr);
8181d85f 5406 sprintf (p, ",%x", bp_tgt->placed_size);
96baa820 5407
6d820c5c
DJ
5408 putpkt (rs->buf);
5409 getpkt (&rs->buf, &rs->buf_size, 0);
96baa820 5410
6d820c5c 5411 switch (packet_ok (rs->buf, &remote_protocol_packets[PACKET_Z1]))
d471ea57
AC
5412 {
5413 case PACKET_ERROR:
5414 case PACKET_UNKNOWN:
5415 return -1;
5416 case PACKET_OK:
5417 return 0;
5418 }
8e65ff28 5419 internal_error (__FILE__, __LINE__,
e2e0b3e5 5420 _("remote_insert_hw_breakpoint: reached end of function"));
96baa820
JM
5421}
5422
d471ea57 5423
802188a7 5424static int
8181d85f 5425remote_remove_hw_breakpoint (struct bp_target_info *bp_tgt)
96baa820 5426{
8181d85f 5427 CORE_ADDR addr;
d01949b6 5428 struct remote_state *rs = get_remote_state ();
6d820c5c 5429 char *p = rs->buf;
c8189ed1 5430
444abaca 5431 if (remote_protocol_packets[PACKET_Z1].support == PACKET_DISABLE)
5cffb350 5432 return -1;
802188a7 5433
96baa820
JM
5434 *(p++) = 'z';
5435 *(p++) = '1';
5436 *(p++) = ',';
802188a7 5437
8181d85f 5438 addr = remote_address_masked (bp_tgt->placed_address);
96baa820 5439 p += hexnumstr (p, (ULONGEST) addr);
8181d85f 5440 sprintf (p, ",%x", bp_tgt->placed_size);
96baa820 5441
6d820c5c
DJ
5442 putpkt (rs->buf);
5443 getpkt (&rs->buf, &rs->buf_size, 0);
802188a7 5444
6d820c5c 5445 switch (packet_ok (rs->buf, &remote_protocol_packets[PACKET_Z1]))
d471ea57
AC
5446 {
5447 case PACKET_ERROR:
5448 case PACKET_UNKNOWN:
5449 return -1;
5450 case PACKET_OK:
5451 return 0;
5452 }
8e65ff28 5453 internal_error (__FILE__, __LINE__,
e2e0b3e5 5454 _("remote_remove_hw_breakpoint: reached end of function"));
96baa820 5455}
96baa820 5456
c906108c
SS
5457/* Some targets are only capable of doing downloads, and afterwards
5458 they switch to the remote serial protocol. This function provides
5459 a clean way to get from the download target to the remote target.
5460 It's basically just a wrapper so that we don't have to expose any
5461 of the internal workings of remote.c.
5462
5463 Prior to calling this routine, you should shutdown the current
5464 target code, else you will get the "A program is being debugged
5465 already..." message. Usually a call to pop_target() suffices. */
5466
5467void
fba45db2 5468push_remote_target (char *name, int from_tty)
c906108c 5469{
a3f17187 5470 printf_filtered (_("Switching to remote protocol\n"));
c906108c
SS
5471 remote_open (name, from_tty);
5472}
5473
23860348 5474/* Table used by the crc32 function to calcuate the checksum. */
c906108c 5475
c5aa993b
JM
5476static unsigned long crc32_table[256] =
5477{0, 0};
c906108c
SS
5478
5479static unsigned long
fba45db2 5480crc32 (unsigned char *buf, int len, unsigned int crc)
c906108c 5481{
c5aa993b 5482 if (!crc32_table[1])
c906108c 5483 {
23860348 5484 /* Initialize the CRC table and the decoding table. */
c906108c
SS
5485 int i, j;
5486 unsigned int c;
5487
5488 for (i = 0; i < 256; i++)
c5aa993b
JM
5489 {
5490 for (c = i << 24, j = 8; j > 0; --j)
5491 c = c & 0x80000000 ? (c << 1) ^ 0x04c11db7 : (c << 1);
5492 crc32_table[i] = c;
5493 }
c906108c
SS
5494 }
5495
5496 while (len--)
5497 {
5498 crc = (crc << 8) ^ crc32_table[((crc >> 24) ^ *buf) & 255];
5499 buf++;
5500 }
5501 return crc;
5502}
5503
5504/* compare-sections command
5505
5506 With no arguments, compares each loadable section in the exec bfd
5507 with the same memory range on the target, and reports mismatches.
5508 Useful for verifying the image on the target against the exec file.
5509 Depends on the target understanding the new "qCRC:" request. */
5510
e514a9d6
JM
5511/* FIXME: cagney/1999-10-26: This command should be broken down into a
5512 target method (target verify memory) and generic version of the
5513 actual command. This will allow other high-level code (especially
23860348 5514 generic_load()) to make use of this target functionality. */
e514a9d6 5515
c906108c 5516static void
fba45db2 5517compare_sections_command (char *args, int from_tty)
c906108c 5518{
d01949b6 5519 struct remote_state *rs = get_remote_state ();
c906108c
SS
5520 asection *s;
5521 unsigned long host_crc, target_crc;
5522 extern bfd *exec_bfd;
5523 struct cleanup *old_chain;
085dd6e6
JM
5524 char *tmp;
5525 char *sectdata;
ce359b09 5526 const char *sectname;
c906108c
SS
5527 bfd_size_type size;
5528 bfd_vma lma;
5529 int matched = 0;
5530 int mismatched = 0;
5531
5532 if (!exec_bfd)
8a3fe4f8 5533 error (_("command cannot be used without an exec file"));
c906108c
SS
5534 if (!current_target.to_shortname ||
5535 strcmp (current_target.to_shortname, "remote") != 0)
8a3fe4f8 5536 error (_("command can only be used with remote target"));
c906108c 5537
c5aa993b 5538 for (s = exec_bfd->sections; s; s = s->next)
c906108c
SS
5539 {
5540 if (!(s->flags & SEC_LOAD))
c5aa993b 5541 continue; /* skip non-loadable section */
c906108c 5542
2c500098 5543 size = bfd_get_section_size (s);
c906108c 5544 if (size == 0)
c5aa993b 5545 continue; /* skip zero-length section */
c906108c 5546
ce359b09 5547 sectname = bfd_get_section_name (exec_bfd, s);
c906108c 5548 if (args && strcmp (args, sectname) != 0)
c5aa993b 5549 continue; /* not the section selected by user */
c906108c 5550
c5aa993b 5551 matched = 1; /* do this section */
c906108c 5552 lma = s->lma;
23860348 5553 /* FIXME: assumes lma can fit into long. */
ea9c271d 5554 xsnprintf (rs->buf, get_remote_packet_size (), "qCRC:%lx,%lx",
ecbc58df 5555 (long) lma, (long) size);
6d820c5c 5556 putpkt (rs->buf);
c906108c 5557
23860348
MS
5558 /* Be clever; compute the host_crc before waiting for target
5559 reply. */
c906108c 5560 sectdata = xmalloc (size);
b8c9b27d 5561 old_chain = make_cleanup (xfree, sectdata);
c906108c
SS
5562 bfd_get_section_contents (exec_bfd, s, sectdata, 0, size);
5563 host_crc = crc32 ((unsigned char *) sectdata, size, 0xffffffff);
5564
6d820c5c
DJ
5565 getpkt (&rs->buf, &rs->buf_size, 0);
5566 if (rs->buf[0] == 'E')
8a3fe4f8 5567 error (_("target memory fault, section %s, range 0x%s -- 0x%s"),
823ca731 5568 sectname, paddr (lma), paddr (lma + size));
6d820c5c 5569 if (rs->buf[0] != 'C')
8a3fe4f8 5570 error (_("remote target does not support this operation"));
c906108c 5571
6d820c5c 5572 for (target_crc = 0, tmp = &rs->buf[1]; *tmp; tmp++)
c906108c
SS
5573 target_crc = target_crc * 16 + fromhex (*tmp);
5574
d4f3574e
SS
5575 printf_filtered ("Section %s, range 0x%s -- 0x%s: ",
5576 sectname, paddr (lma), paddr (lma + size));
c906108c
SS
5577 if (host_crc == target_crc)
5578 printf_filtered ("matched.\n");
5579 else
c5aa993b
JM
5580 {
5581 printf_filtered ("MIS-MATCHED!\n");
5582 mismatched++;
5583 }
c906108c
SS
5584
5585 do_cleanups (old_chain);
5586 }
5587 if (mismatched > 0)
8a3fe4f8
AC
5588 warning (_("One or more sections of the remote executable does not match\n\
5589the loaded file\n"));
c906108c 5590 if (args && !matched)
a3f17187 5591 printf_filtered (_("No loaded section named '%s'.\n"), args);
c906108c
SS
5592}
5593
0e7f50da
UW
5594/* Write LEN bytes from WRITEBUF into OBJECT_NAME/ANNEX at OFFSET
5595 into remote target. The number of bytes written to the remote
5596 target is returned, or -1 for error. */
5597
5598static LONGEST
5599remote_write_qxfer (struct target_ops *ops, const char *object_name,
5600 const char *annex, const gdb_byte *writebuf,
5601 ULONGEST offset, LONGEST len,
5602 struct packet_config *packet)
5603{
5604 int i, buf_len;
5605 ULONGEST n;
5606 gdb_byte *wbuf;
5607 struct remote_state *rs = get_remote_state ();
5608 int max_size = get_memory_write_packet_size ();
5609
5610 if (packet->support == PACKET_DISABLE)
5611 return -1;
5612
5613 /* Insert header. */
5614 i = snprintf (rs->buf, max_size,
5615 "qXfer:%s:write:%s:%s:",
5616 object_name, annex ? annex : "",
5617 phex_nz (offset, sizeof offset));
5618 max_size -= (i + 1);
5619
5620 /* Escape as much data as fits into rs->buf. */
5621 buf_len = remote_escape_output
5622 (writebuf, len, (rs->buf + i), &max_size, max_size);
5623
5624 if (putpkt_binary (rs->buf, i + buf_len) < 0
5625 || getpkt_sane (&rs->buf, &rs->buf_size, 0) < 0
5626 || packet_ok (rs->buf, packet) != PACKET_OK)
5627 return -1;
5628
5629 unpack_varlen_hex (rs->buf, &n);
5630 return n;
5631}
5632
0876f84a
DJ
5633/* Read OBJECT_NAME/ANNEX from the remote target using a qXfer packet.
5634 Data at OFFSET, of up to LEN bytes, is read into READBUF; the
5635 number of bytes read is returned, or 0 for EOF, or -1 for error.
5636 The number of bytes read may be less than LEN without indicating an
5637 EOF. PACKET is checked and updated to indicate whether the remote
5638 target supports this object. */
5639
5640static LONGEST
5641remote_read_qxfer (struct target_ops *ops, const char *object_name,
5642 const char *annex,
5643 gdb_byte *readbuf, ULONGEST offset, LONGEST len,
5644 struct packet_config *packet)
5645{
5646 static char *finished_object;
5647 static char *finished_annex;
5648 static ULONGEST finished_offset;
5649
5650 struct remote_state *rs = get_remote_state ();
5651 unsigned int total = 0;
5652 LONGEST i, n, packet_len;
5653
5654 if (packet->support == PACKET_DISABLE)
5655 return -1;
5656
5657 /* Check whether we've cached an end-of-object packet that matches
5658 this request. */
5659 if (finished_object)
5660 {
5661 if (strcmp (object_name, finished_object) == 0
5662 && strcmp (annex ? annex : "", finished_annex) == 0
5663 && offset == finished_offset)
5664 return 0;
5665
5666 /* Otherwise, we're now reading something different. Discard
5667 the cache. */
5668 xfree (finished_object);
5669 xfree (finished_annex);
5670 finished_object = NULL;
5671 finished_annex = NULL;
5672 }
5673
5674 /* Request only enough to fit in a single packet. The actual data
5675 may not, since we don't know how much of it will need to be escaped;
5676 the target is free to respond with slightly less data. We subtract
5677 five to account for the response type and the protocol frame. */
5678 n = min (get_remote_packet_size () - 5, len);
5679 snprintf (rs->buf, get_remote_packet_size () - 4, "qXfer:%s:read:%s:%s,%s",
5680 object_name, annex ? annex : "",
5681 phex_nz (offset, sizeof offset),
5682 phex_nz (n, sizeof n));
5683 i = putpkt (rs->buf);
5684 if (i < 0)
5685 return -1;
5686
5687 rs->buf[0] = '\0';
5688 packet_len = getpkt_sane (&rs->buf, &rs->buf_size, 0);
5689 if (packet_len < 0 || packet_ok (rs->buf, packet) != PACKET_OK)
5690 return -1;
5691
5692 if (rs->buf[0] != 'l' && rs->buf[0] != 'm')
5693 error (_("Unknown remote qXfer reply: %s"), rs->buf);
5694
5695 /* 'm' means there is (or at least might be) more data after this
5696 batch. That does not make sense unless there's at least one byte
5697 of data in this reply. */
5698 if (rs->buf[0] == 'm' && packet_len == 1)
5699 error (_("Remote qXfer reply contained no data."));
5700
5701 /* Got some data. */
5702 i = remote_unescape_input (rs->buf + 1, packet_len - 1, readbuf, n);
5703
5704 /* 'l' is an EOF marker, possibly including a final block of data,
0e7f50da
UW
5705 or possibly empty. If we have the final block of a non-empty
5706 object, record this fact to bypass a subsequent partial read. */
5707 if (rs->buf[0] == 'l' && offset + i > 0)
0876f84a
DJ
5708 {
5709 finished_object = xstrdup (object_name);
5710 finished_annex = xstrdup (annex ? annex : "");
5711 finished_offset = offset + i;
5712 }
5713
5714 return i;
5715}
5716
1e3ff5ad 5717static LONGEST
4b8a223f 5718remote_xfer_partial (struct target_ops *ops, enum target_object object,
961cb7b5
MK
5719 const char *annex, gdb_byte *readbuf,
5720 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
c906108c 5721{
d01949b6 5722 struct remote_state *rs = get_remote_state ();
c906108c 5723 int i;
6d820c5c 5724 char *p2;
1e3ff5ad 5725 char query_type;
c906108c 5726
b2182ed2 5727 /* Handle memory using the standard memory routines. */
21e3b9b9
DJ
5728 if (object == TARGET_OBJECT_MEMORY)
5729 {
5730 int xfered;
5731 errno = 0;
5732
5733 if (writebuf != NULL)
b2182ed2 5734 xfered = remote_write_bytes (offset, writebuf, len);
21e3b9b9 5735 else
b2182ed2 5736 xfered = remote_read_bytes (offset, readbuf, len);
21e3b9b9
DJ
5737
5738 if (xfered > 0)
5739 return xfered;
5740 else if (xfered == 0 && errno == 0)
5741 return 0;
5742 else
5743 return -1;
5744 }
5745
0e7f50da
UW
5746 /* Handle SPU memory using qxfer packets. */
5747 if (object == TARGET_OBJECT_SPU)
5748 {
5749 if (readbuf)
5750 return remote_read_qxfer (ops, "spu", annex, readbuf, offset, len,
5751 &remote_protocol_packets
5752 [PACKET_qXfer_spu_read]);
5753 else
5754 return remote_write_qxfer (ops, "spu", annex, writebuf, offset, len,
5755 &remote_protocol_packets
5756 [PACKET_qXfer_spu_write]);
5757 }
5758
a76d924d
DJ
5759 /* Only handle flash writes. */
5760 if (writebuf != NULL)
5761 {
5762 LONGEST xfered;
5763
5764 switch (object)
5765 {
5766 case TARGET_OBJECT_FLASH:
5767 xfered = remote_flash_write (ops, offset, len, writebuf);
5768
5769 if (xfered > 0)
5770 return xfered;
5771 else if (xfered == 0 && errno == 0)
5772 return 0;
5773 else
5774 return -1;
5775
5776 default:
5777 return -1;
5778 }
5779 }
4b8a223f 5780
1e3ff5ad
AC
5781 /* Map pre-existing objects onto letters. DO NOT do this for new
5782 objects!!! Instead specify new query packets. */
5783 switch (object)
c906108c 5784 {
1e3ff5ad
AC
5785 case TARGET_OBJECT_AVR:
5786 query_type = 'R';
5787 break;
802188a7
RM
5788
5789 case TARGET_OBJECT_AUXV:
0876f84a
DJ
5790 gdb_assert (annex == NULL);
5791 return remote_read_qxfer (ops, "auxv", annex, readbuf, offset, len,
5792 &remote_protocol_packets[PACKET_qXfer_auxv]);
802188a7 5793
23181151
DJ
5794 case TARGET_OBJECT_AVAILABLE_FEATURES:
5795 return remote_read_qxfer
5796 (ops, "features", annex, readbuf, offset, len,
5797 &remote_protocol_packets[PACKET_qXfer_features]);
5798
fd79ecee
DJ
5799 case TARGET_OBJECT_MEMORY_MAP:
5800 gdb_assert (annex == NULL);
5801 return remote_read_qxfer (ops, "memory-map", annex, readbuf, offset, len,
5802 &remote_protocol_packets[PACKET_qXfer_memory_map]);
5803
1e3ff5ad 5804 default:
c906108c
SS
5805 return -1;
5806 }
5807
4b8a223f 5808 /* Note: a zero OFFSET and LEN can be used to query the minimum
1e3ff5ad 5809 buffer size. */
4b8a223f 5810 if (offset == 0 && len == 0)
ea9c271d
DJ
5811 return (get_remote_packet_size ());
5812 /* Minimum outbuf size is get_remote_packet_size (). If LEN is not
24b06219 5813 large enough let the caller deal with it. */
ea9c271d 5814 if (len < get_remote_packet_size ())
1e3ff5ad 5815 return -1;
ea9c271d 5816 len = get_remote_packet_size ();
1e3ff5ad 5817
23860348 5818 /* Except for querying the minimum buffer size, target must be open. */
c5aa993b 5819 if (!remote_desc)
8a3fe4f8 5820 error (_("remote query is only available after target open"));
c906108c 5821
1e3ff5ad 5822 gdb_assert (annex != NULL);
4b8a223f 5823 gdb_assert (readbuf != NULL);
c906108c 5824
6d820c5c 5825 p2 = rs->buf;
c906108c
SS
5826 *p2++ = 'q';
5827 *p2++ = query_type;
5828
23860348
MS
5829 /* We used one buffer char for the remote protocol q command and
5830 another for the query type. As the remote protocol encapsulation
5831 uses 4 chars plus one extra in case we are debugging
5832 (remote_debug), we have PBUFZIZ - 7 left to pack the query
5833 string. */
c906108c 5834 i = 0;
ea9c271d 5835 while (annex[i] && (i < (get_remote_packet_size () - 8)))
c906108c 5836 {
1e3ff5ad
AC
5837 /* Bad caller may have sent forbidden characters. */
5838 gdb_assert (isprint (annex[i]) && annex[i] != '$' && annex[i] != '#');
5839 *p2++ = annex[i];
c906108c
SS
5840 i++;
5841 }
1e3ff5ad
AC
5842 *p2 = '\0';
5843 gdb_assert (annex[i] == '\0');
c906108c 5844
6d820c5c 5845 i = putpkt (rs->buf);
c5aa993b
JM
5846 if (i < 0)
5847 return i;
c906108c 5848
6d820c5c
DJ
5849 getpkt (&rs->buf, &rs->buf_size, 0);
5850 strcpy ((char *) readbuf, rs->buf);
c906108c 5851
cfd77fa1 5852 return strlen ((char *) readbuf);
c906108c
SS
5853}
5854
96baa820
JM
5855static void
5856remote_rcmd (char *command,
d9fcf2fb 5857 struct ui_file *outbuf)
96baa820 5858{
d01949b6 5859 struct remote_state *rs = get_remote_state ();
2e9f7625 5860 char *p = rs->buf;
96baa820
JM
5861
5862 if (!remote_desc)
8a3fe4f8 5863 error (_("remote rcmd is only available after target open"));
96baa820 5864
23860348 5865 /* Send a NULL command across as an empty command. */
7be570e7
JM
5866 if (command == NULL)
5867 command = "";
5868
23860348 5869 /* The query prefix. */
2e9f7625
DJ
5870 strcpy (rs->buf, "qRcmd,");
5871 p = strchr (rs->buf, '\0');
96baa820 5872
2e9f7625 5873 if ((strlen (rs->buf) + strlen (command) * 2 + 8/*misc*/) > get_remote_packet_size ())
8a3fe4f8 5874 error (_("\"monitor\" command ``%s'' is too long."), command);
96baa820 5875
23860348 5876 /* Encode the actual command. */
cfd77fa1 5877 bin2hex ((gdb_byte *) command, p, 0);
96baa820 5878
6d820c5c 5879 if (putpkt (rs->buf) < 0)
8a3fe4f8 5880 error (_("Communication problem with target."));
96baa820
JM
5881
5882 /* get/display the response */
5883 while (1)
5884 {
2e9f7625
DJ
5885 char *buf;
5886
23860348 5887 /* XXX - see also tracepoint.c:remote_get_noisy_reply(). */
2e9f7625 5888 rs->buf[0] = '\0';
6d820c5c 5889 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 5890 buf = rs->buf;
96baa820 5891 if (buf[0] == '\0')
8a3fe4f8 5892 error (_("Target does not support this command."));
96baa820
JM
5893 if (buf[0] == 'O' && buf[1] != 'K')
5894 {
23860348 5895 remote_console_output (buf + 1); /* 'O' message from stub. */
96baa820
JM
5896 continue;
5897 }
5898 if (strcmp (buf, "OK") == 0)
5899 break;
7be570e7
JM
5900 if (strlen (buf) == 3 && buf[0] == 'E'
5901 && isdigit (buf[1]) && isdigit (buf[2]))
5902 {
8a3fe4f8 5903 error (_("Protocol error with Rcmd"));
7be570e7 5904 }
96baa820
JM
5905 for (p = buf; p[0] != '\0' && p[1] != '\0'; p += 2)
5906 {
5907 char c = (fromhex (p[0]) << 4) + fromhex (p[1]);
5908 fputc_unfiltered (c, outbuf);
5909 }
5910 break;
5911 }
5912}
5913
fd79ecee
DJ
5914static VEC(mem_region_s) *
5915remote_memory_map (struct target_ops *ops)
5916{
5917 VEC(mem_region_s) *result = NULL;
5918 char *text = target_read_stralloc (&current_target,
5919 TARGET_OBJECT_MEMORY_MAP, NULL);
5920
5921 if (text)
5922 {
5923 struct cleanup *back_to = make_cleanup (xfree, text);
5924 result = parse_memory_map (text);
5925 do_cleanups (back_to);
5926 }
5927
5928 return result;
5929}
5930
c906108c 5931static void
fba45db2 5932packet_command (char *args, int from_tty)
c906108c 5933{
d01949b6 5934 struct remote_state *rs = get_remote_state ();
c906108c 5935
c5aa993b 5936 if (!remote_desc)
8a3fe4f8 5937 error (_("command can only be used with remote target"));
c906108c 5938
c5aa993b 5939 if (!args)
8a3fe4f8 5940 error (_("remote-packet command requires packet text as argument"));
c906108c
SS
5941
5942 puts_filtered ("sending: ");
5943 print_packet (args);
5944 puts_filtered ("\n");
5945 putpkt (args);
5946
6d820c5c 5947 getpkt (&rs->buf, &rs->buf_size, 0);
c906108c 5948 puts_filtered ("received: ");
6d820c5c 5949 print_packet (rs->buf);
c906108c
SS
5950 puts_filtered ("\n");
5951}
5952
5953#if 0
23860348 5954/* --------- UNIT_TEST for THREAD oriented PACKETS ------------------- */
c906108c 5955
a14ed312 5956static void display_thread_info (struct gdb_ext_thread_info *info);
c906108c 5957
a14ed312 5958static void threadset_test_cmd (char *cmd, int tty);
c906108c 5959
a14ed312 5960static void threadalive_test (char *cmd, int tty);
c906108c 5961
a14ed312 5962static void threadlist_test_cmd (char *cmd, int tty);
c906108c 5963
23860348 5964int get_and_display_threadinfo (threadref *ref);
c906108c 5965
a14ed312 5966static void threadinfo_test_cmd (char *cmd, int tty);
c906108c 5967
23860348 5968static int thread_display_step (threadref *ref, void *context);
c906108c 5969
a14ed312 5970static void threadlist_update_test_cmd (char *cmd, int tty);
c906108c 5971
a14ed312 5972static void init_remote_threadtests (void);
c906108c 5973
23860348 5974#define SAMPLE_THREAD 0x05060708 /* Truncated 64 bit threadid. */
c906108c
SS
5975
5976static void
fba45db2 5977threadset_test_cmd (char *cmd, int tty)
c906108c
SS
5978{
5979 int sample_thread = SAMPLE_THREAD;
5980
a3f17187 5981 printf_filtered (_("Remote threadset test\n"));
c906108c
SS
5982 set_thread (sample_thread, 1);
5983}
5984
5985
5986static void
fba45db2 5987threadalive_test (char *cmd, int tty)
c906108c
SS
5988{
5989 int sample_thread = SAMPLE_THREAD;
5990
39f77062 5991 if (remote_thread_alive (pid_to_ptid (sample_thread)))
c906108c
SS
5992 printf_filtered ("PASS: Thread alive test\n");
5993 else
5994 printf_filtered ("FAIL: Thread alive test\n");
5995}
5996
23860348 5997void output_threadid (char *title, threadref *ref);
c906108c
SS
5998
5999void
fba45db2 6000output_threadid (char *title, threadref *ref)
c906108c
SS
6001{
6002 char hexid[20];
6003
23860348 6004 pack_threadid (&hexid[0], ref); /* Convert threead id into hex. */
c906108c
SS
6005 hexid[16] = 0;
6006 printf_filtered ("%s %s\n", title, (&hexid[0]));
6007}
6008
6009static void
fba45db2 6010threadlist_test_cmd (char *cmd, int tty)
c906108c
SS
6011{
6012 int startflag = 1;
6013 threadref nextthread;
6014 int done, result_count;
6015 threadref threadlist[3];
6016
6017 printf_filtered ("Remote Threadlist test\n");
6018 if (!remote_get_threadlist (startflag, &nextthread, 3, &done,
6019 &result_count, &threadlist[0]))
6020 printf_filtered ("FAIL: threadlist test\n");
6021 else
6022 {
6023 threadref *scan = threadlist;
6024 threadref *limit = scan + result_count;
6025
6026 while (scan < limit)
6027 output_threadid (" thread ", scan++);
6028 }
6029}
6030
6031void
fba45db2 6032display_thread_info (struct gdb_ext_thread_info *info)
c906108c
SS
6033{
6034 output_threadid ("Threadid: ", &info->threadid);
6035 printf_filtered ("Name: %s\n ", info->shortname);
6036 printf_filtered ("State: %s\n", info->display);
6037 printf_filtered ("other: %s\n\n", info->more_display);
6038}
6039
6040int
fba45db2 6041get_and_display_threadinfo (threadref *ref)
c906108c
SS
6042{
6043 int result;
6044 int set;
6045 struct gdb_ext_thread_info threadinfo;
6046
6047 set = TAG_THREADID | TAG_EXISTS | TAG_THREADNAME
6048 | TAG_MOREDISPLAY | TAG_DISPLAY;
6049 if (0 != (result = remote_get_threadinfo (ref, set, &threadinfo)))
6050 display_thread_info (&threadinfo);
6051 return result;
6052}
6053
6054static void
fba45db2 6055threadinfo_test_cmd (char *cmd, int tty)
c906108c
SS
6056{
6057 int athread = SAMPLE_THREAD;
6058 threadref thread;
6059 int set;
6060
6061 int_to_threadref (&thread, athread);
6062 printf_filtered ("Remote Threadinfo test\n");
6063 if (!get_and_display_threadinfo (&thread))
6064 printf_filtered ("FAIL cannot get thread info\n");
6065}
6066
6067static int
fba45db2 6068thread_display_step (threadref *ref, void *context)
c906108c
SS
6069{
6070 /* output_threadid(" threadstep ",ref); *//* simple test */
6071 return get_and_display_threadinfo (ref);
6072}
6073
6074static void
fba45db2 6075threadlist_update_test_cmd (char *cmd, int tty)
c906108c
SS
6076{
6077 printf_filtered ("Remote Threadlist update test\n");
6078 remote_threadlist_iterator (thread_display_step, 0, CRAZY_MAX_THREADS);
6079}
6080
6081static void
6082init_remote_threadtests (void)
6083{
1bedd215
AC
6084 add_com ("tlist", class_obscure, threadlist_test_cmd, _("\
6085Fetch and print the remote list of thread identifiers, one pkt only"));
c906108c 6086 add_com ("tinfo", class_obscure, threadinfo_test_cmd,
1bedd215 6087 _("Fetch and display info about one thread"));
c906108c 6088 add_com ("tset", class_obscure, threadset_test_cmd,
1bedd215 6089 _("Test setting to a different thread"));
c906108c 6090 add_com ("tupd", class_obscure, threadlist_update_test_cmd,
1bedd215 6091 _("Iterate through updating all remote thread info"));
c906108c 6092 add_com ("talive", class_obscure, threadalive_test,
1bedd215 6093 _(" Remote thread alive test "));
c906108c
SS
6094}
6095
6096#endif /* 0 */
6097
f3fb8c85
MS
6098/* Convert a thread ID to a string. Returns the string in a static
6099 buffer. */
6100
6101static char *
39f77062 6102remote_pid_to_str (ptid_t ptid)
f3fb8c85 6103{
fd0a2a6f 6104 static char buf[32];
f3fb8c85 6105
32a5b2f1 6106 xsnprintf (buf, sizeof buf, "Thread %d", ptid_get_pid (ptid));
f3fb8c85
MS
6107 return buf;
6108}
6109
38691318
KB
6110/* Get the address of the thread local variable in OBJFILE which is
6111 stored at OFFSET within the thread local storage for thread PTID. */
6112
6113static CORE_ADDR
6114remote_get_thread_local_address (ptid_t ptid, CORE_ADDR lm, CORE_ADDR offset)
6115{
444abaca 6116 if (remote_protocol_packets[PACKET_qGetTLSAddr].support != PACKET_DISABLE)
38691318
KB
6117 {
6118 struct remote_state *rs = get_remote_state ();
6d820c5c 6119 char *p = rs->buf;
571dd617 6120 enum packet_result result;
38691318
KB
6121
6122 strcpy (p, "qGetTLSAddr:");
6123 p += strlen (p);
6124 p += hexnumstr (p, PIDGET (ptid));
6125 *p++ = ',';
6126 p += hexnumstr (p, offset);
6127 *p++ = ',';
6128 p += hexnumstr (p, lm);
6129 *p++ = '\0';
6130
6d820c5c
DJ
6131 putpkt (rs->buf);
6132 getpkt (&rs->buf, &rs->buf_size, 0);
6133 result = packet_ok (rs->buf, &remote_protocol_packets[PACKET_qGetTLSAddr]);
571dd617 6134 if (result == PACKET_OK)
38691318
KB
6135 {
6136 ULONGEST result;
6137
6d820c5c 6138 unpack_varlen_hex (rs->buf, &result);
38691318
KB
6139 return result;
6140 }
571dd617 6141 else if (result == PACKET_UNKNOWN)
109c3e39
AC
6142 throw_error (TLS_GENERIC_ERROR,
6143 _("Remote target doesn't support qGetTLSAddr packet"));
38691318 6144 else
109c3e39
AC
6145 throw_error (TLS_GENERIC_ERROR,
6146 _("Remote target failed to process qGetTLSAddr request"));
38691318
KB
6147 }
6148 else
109c3e39
AC
6149 throw_error (TLS_GENERIC_ERROR,
6150 _("TLS not supported or disabled on this target"));
38691318
KB
6151 /* Not reached. */
6152 return 0;
6153}
6154
29709017
DJ
6155/* Support for inferring a target description based on the current
6156 architecture and the size of a 'g' packet. While the 'g' packet
6157 can have any size (since optional registers can be left off the
6158 end), some sizes are easily recognizable given knowledge of the
6159 approximate architecture. */
6160
6161struct remote_g_packet_guess
6162{
6163 int bytes;
6164 const struct target_desc *tdesc;
6165};
6166typedef struct remote_g_packet_guess remote_g_packet_guess_s;
6167DEF_VEC_O(remote_g_packet_guess_s);
6168
6169struct remote_g_packet_data
6170{
6171 VEC(remote_g_packet_guess_s) *guesses;
6172};
6173
6174static struct gdbarch_data *remote_g_packet_data_handle;
6175
6176static void *
6177remote_g_packet_data_init (struct obstack *obstack)
6178{
6179 return OBSTACK_ZALLOC (obstack, struct remote_g_packet_data);
6180}
6181
6182void
6183register_remote_g_packet_guess (struct gdbarch *gdbarch, int bytes,
6184 const struct target_desc *tdesc)
6185{
6186 struct remote_g_packet_data *data
6187 = gdbarch_data (gdbarch, remote_g_packet_data_handle);
6188 struct remote_g_packet_guess new_guess, *guess;
6189 int ix;
6190
6191 gdb_assert (tdesc != NULL);
6192
6193 for (ix = 0;
6194 VEC_iterate (remote_g_packet_guess_s, data->guesses, ix, guess);
6195 ix++)
6196 if (guess->bytes == bytes)
6197 internal_error (__FILE__, __LINE__,
6198 "Duplicate g packet description added for size %d",
6199 bytes);
6200
6201 new_guess.bytes = bytes;
6202 new_guess.tdesc = tdesc;
6203 VEC_safe_push (remote_g_packet_guess_s, data->guesses, &new_guess);
6204}
6205
6206static const struct target_desc *
6207remote_read_description (struct target_ops *target)
6208{
6209 struct remote_g_packet_data *data
6210 = gdbarch_data (current_gdbarch, remote_g_packet_data_handle);
6211
6212 if (!VEC_empty (remote_g_packet_guess_s, data->guesses))
6213 {
6214 struct remote_g_packet_guess *guess;
6215 int ix;
6216 int bytes = send_g_packet ();
6217
6218 for (ix = 0;
6219 VEC_iterate (remote_g_packet_guess_s, data->guesses, ix, guess);
6220 ix++)
6221 if (guess->bytes == bytes)
6222 return guess->tdesc;
6223
6224 /* We discard the g packet. A minor optimization would be to
6225 hold on to it, and fill the register cache once we have selected
6226 an architecture, but it's too tricky to do safely. */
6227 }
6228
6229 return NULL;
6230}
6231
c906108c 6232static void
fba45db2 6233init_remote_ops (void)
c906108c 6234{
c5aa993b 6235 remote_ops.to_shortname = "remote";
c906108c 6236 remote_ops.to_longname = "Remote serial target in gdb-specific protocol";
c5aa993b 6237 remote_ops.to_doc =
c906108c 6238 "Use a remote computer via a serial line, using a gdb-specific protocol.\n\
0d06e24b
JM
6239Specify the serial device it is connected to\n\
6240(e.g. /dev/ttyS0, /dev/ttya, COM1, etc.).";
c5aa993b
JM
6241 remote_ops.to_open = remote_open;
6242 remote_ops.to_close = remote_close;
c906108c 6243 remote_ops.to_detach = remote_detach;
6ad8ae5c 6244 remote_ops.to_disconnect = remote_disconnect;
c5aa993b 6245 remote_ops.to_resume = remote_resume;
c906108c
SS
6246 remote_ops.to_wait = remote_wait;
6247 remote_ops.to_fetch_registers = remote_fetch_registers;
6248 remote_ops.to_store_registers = remote_store_registers;
6249 remote_ops.to_prepare_to_store = remote_prepare_to_store;
c8e73a31 6250 remote_ops.deprecated_xfer_memory = remote_xfer_memory;
c5aa993b 6251 remote_ops.to_files_info = remote_files_info;
c906108c
SS
6252 remote_ops.to_insert_breakpoint = remote_insert_breakpoint;
6253 remote_ops.to_remove_breakpoint = remote_remove_breakpoint;
3c3bea1c
GS
6254 remote_ops.to_stopped_by_watchpoint = remote_stopped_by_watchpoint;
6255 remote_ops.to_stopped_data_address = remote_stopped_data_address;
6256 remote_ops.to_can_use_hw_breakpoint = remote_check_watch_resources;
6257 remote_ops.to_insert_hw_breakpoint = remote_insert_hw_breakpoint;
6258 remote_ops.to_remove_hw_breakpoint = remote_remove_hw_breakpoint;
6259 remote_ops.to_insert_watchpoint = remote_insert_watchpoint;
6260 remote_ops.to_remove_watchpoint = remote_remove_watchpoint;
c5aa993b
JM
6261 remote_ops.to_kill = remote_kill;
6262 remote_ops.to_load = generic_load;
c906108c
SS
6263 remote_ops.to_mourn_inferior = remote_mourn;
6264 remote_ops.to_thread_alive = remote_thread_alive;
0f71a2f6 6265 remote_ops.to_find_new_threads = remote_threads_info;
0caabb7e 6266 remote_ops.to_pid_to_str = remote_pid_to_str;
cf759d3b 6267 remote_ops.to_extra_thread_info = remote_threads_extra_info;
c906108c 6268 remote_ops.to_stop = remote_stop;
4b8a223f 6269 remote_ops.to_xfer_partial = remote_xfer_partial;
96baa820 6270 remote_ops.to_rcmd = remote_rcmd;
38691318 6271 remote_ops.to_get_thread_local_address = remote_get_thread_local_address;
c906108c 6272 remote_ops.to_stratum = process_stratum;
c5aa993b
JM
6273 remote_ops.to_has_all_memory = 1;
6274 remote_ops.to_has_memory = 1;
6275 remote_ops.to_has_stack = 1;
6276 remote_ops.to_has_registers = 1;
6277 remote_ops.to_has_execution = 1;
6278 remote_ops.to_has_thread_control = tc_schedlock; /* can lock scheduler */
6279 remote_ops.to_magic = OPS_MAGIC;
fd79ecee 6280 remote_ops.to_memory_map = remote_memory_map;
a76d924d
DJ
6281 remote_ops.to_flash_erase = remote_flash_erase;
6282 remote_ops.to_flash_done = remote_flash_done;
29709017 6283 remote_ops.to_read_description = remote_read_description;
c906108c
SS
6284}
6285
6286/* Set up the extended remote vector by making a copy of the standard
6287 remote vector and adding to it. */
6288
6289static void
fba45db2 6290init_extended_remote_ops (void)
c906108c
SS
6291{
6292 extended_remote_ops = remote_ops;
6293
0f71a2f6 6294 extended_remote_ops.to_shortname = "extended-remote";
c5aa993b 6295 extended_remote_ops.to_longname =
c906108c 6296 "Extended remote serial target in gdb-specific protocol";
c5aa993b 6297 extended_remote_ops.to_doc =
c906108c
SS
6298 "Use a remote computer via a serial line, using a gdb-specific protocol.\n\
6299Specify the serial device it is connected to (e.g. /dev/ttya).",
c5aa993b 6300 extended_remote_ops.to_open = extended_remote_open;
c906108c
SS
6301 extended_remote_ops.to_create_inferior = extended_remote_create_inferior;
6302 extended_remote_ops.to_mourn_inferior = extended_remote_mourn;
0f71a2f6
JM
6303}
6304
6426a772
JM
6305static int
6306remote_can_async_p (void)
6307{
23860348 6308 /* We're async whenever the serial device is. */
2cd58942 6309 return (current_target.to_async_mask_value) && serial_can_async_p (remote_desc);
6426a772
JM
6310}
6311
6312static int
6313remote_is_async_p (void)
6314{
23860348 6315 /* We're async whenever the serial device is. */
2cd58942 6316 return (current_target.to_async_mask_value) && serial_is_async_p (remote_desc);
6426a772
JM
6317}
6318
2acceee2
JM
6319/* Pass the SERIAL event on and up to the client. One day this code
6320 will be able to delay notifying the client of an event until the
23860348 6321 point where an entire packet has been received. */
2acceee2 6322
2bc416ba 6323static void (*async_client_callback) (enum inferior_event_type event_type,
23860348 6324 void *context);
2acceee2
JM
6325static void *async_client_context;
6326static serial_event_ftype remote_async_serial_handler;
6327
6426a772 6328static void
819cc324 6329remote_async_serial_handler (struct serial *scb, void *context)
6426a772 6330{
2acceee2
JM
6331 /* Don't propogate error information up to the client. Instead let
6332 the client find out about the error by querying the target. */
6333 async_client_callback (INF_REG_EVENT, async_client_context);
6334}
6335
6336static void
2bc416ba 6337remote_async (void (*callback) (enum inferior_event_type event_type,
23860348 6338 void *context), void *context)
2acceee2 6339{
ed9a39eb 6340 if (current_target.to_async_mask_value == 0)
8e65ff28 6341 internal_error (__FILE__, __LINE__,
e2e0b3e5 6342 _("Calling remote_async when async is masked"));
ed9a39eb 6343
2acceee2
JM
6344 if (callback != NULL)
6345 {
2cd58942 6346 serial_async (remote_desc, remote_async_serial_handler, NULL);
2acceee2
JM
6347 async_client_callback = callback;
6348 async_client_context = context;
6349 }
6350 else
2cd58942 6351 serial_async (remote_desc, NULL, NULL);
6426a772
JM
6352}
6353
43ff13b4
JM
6354/* Target async and target extended-async.
6355
6356 This are temporary targets, until it is all tested. Eventually
6357 async support will be incorporated int the usual 'remote'
23860348 6358 target. */
43ff13b4
JM
6359
6360static void
c2d11a7d 6361init_remote_async_ops (void)
43ff13b4
JM
6362{
6363 remote_async_ops.to_shortname = "async";
2bc416ba 6364 remote_async_ops.to_longname =
23860348 6365 "Remote serial target in async version of the gdb-specific protocol";
c5aa993b 6366 remote_async_ops.to_doc =
43ff13b4
JM
6367 "Use a remote computer via a serial line, using a gdb-specific protocol.\n\
6368Specify the serial device it is connected to (e.g. /dev/ttya).";
c5aa993b
JM
6369 remote_async_ops.to_open = remote_async_open;
6370 remote_async_ops.to_close = remote_close;
6ad8ae5c
DJ
6371 remote_async_ops.to_detach = remote_detach;
6372 remote_async_ops.to_disconnect = remote_disconnect;
c5aa993b
JM
6373 remote_async_ops.to_resume = remote_async_resume;
6374 remote_async_ops.to_wait = remote_async_wait;
6375 remote_async_ops.to_fetch_registers = remote_fetch_registers;
6376 remote_async_ops.to_store_registers = remote_store_registers;
6377 remote_async_ops.to_prepare_to_store = remote_prepare_to_store;
c8e73a31 6378 remote_async_ops.deprecated_xfer_memory = remote_xfer_memory;
c5aa993b 6379 remote_async_ops.to_files_info = remote_files_info;
43ff13b4
JM
6380 remote_async_ops.to_insert_breakpoint = remote_insert_breakpoint;
6381 remote_async_ops.to_remove_breakpoint = remote_remove_breakpoint;
3c3bea1c
GS
6382 remote_async_ops.to_can_use_hw_breakpoint = remote_check_watch_resources;
6383 remote_async_ops.to_insert_hw_breakpoint = remote_insert_hw_breakpoint;
6384 remote_async_ops.to_remove_hw_breakpoint = remote_remove_hw_breakpoint;
6385 remote_async_ops.to_insert_watchpoint = remote_insert_watchpoint;
6386 remote_async_ops.to_remove_watchpoint = remote_remove_watchpoint;
6387 remote_async_ops.to_stopped_by_watchpoint = remote_stopped_by_watchpoint;
6388 remote_async_ops.to_stopped_data_address = remote_stopped_data_address;
6426a772
JM
6389 remote_async_ops.to_terminal_inferior = remote_async_terminal_inferior;
6390 remote_async_ops.to_terminal_ours = remote_async_terminal_ours;
c5aa993b
JM
6391 remote_async_ops.to_kill = remote_async_kill;
6392 remote_async_ops.to_load = generic_load;
53a5351d 6393 remote_async_ops.to_mourn_inferior = remote_async_mourn;
c5aa993b
JM
6394 remote_async_ops.to_thread_alive = remote_thread_alive;
6395 remote_async_ops.to_find_new_threads = remote_threads_info;
cf759d3b
ND
6396 remote_async_ops.to_pid_to_str = remote_pid_to_str;
6397 remote_async_ops.to_extra_thread_info = remote_threads_extra_info;
43ff13b4 6398 remote_async_ops.to_stop = remote_stop;
4b8a223f 6399 remote_async_ops.to_xfer_partial = remote_xfer_partial;
96baa820 6400 remote_async_ops.to_rcmd = remote_rcmd;
c5aa993b
JM
6401 remote_async_ops.to_stratum = process_stratum;
6402 remote_async_ops.to_has_all_memory = 1;
6403 remote_async_ops.to_has_memory = 1;
6404 remote_async_ops.to_has_stack = 1;
6405 remote_async_ops.to_has_registers = 1;
6406 remote_async_ops.to_has_execution = 1;
6407 remote_async_ops.to_has_thread_control = tc_schedlock; /* can lock scheduler */
6426a772
JM
6408 remote_async_ops.to_can_async_p = remote_can_async_p;
6409 remote_async_ops.to_is_async_p = remote_is_async_p;
6410 remote_async_ops.to_async = remote_async;
ed9a39eb 6411 remote_async_ops.to_async_mask_value = 1;
c5aa993b 6412 remote_async_ops.to_magic = OPS_MAGIC;
fd79ecee 6413 remote_async_ops.to_memory_map = remote_memory_map;
a76d924d
DJ
6414 remote_async_ops.to_flash_erase = remote_flash_erase;
6415 remote_async_ops.to_flash_done = remote_flash_done;
29709017 6416 remote_ops.to_read_description = remote_read_description;
43ff13b4
JM
6417}
6418
6419/* Set up the async extended remote vector by making a copy of the standard
6420 remote vector and adding to it. */
6421
6422static void
c2d11a7d 6423init_extended_async_remote_ops (void)
43ff13b4
JM
6424{
6425 extended_async_remote_ops = remote_async_ops;
6426
6427 extended_async_remote_ops.to_shortname = "extended-async";
c5aa993b 6428 extended_async_remote_ops.to_longname =
43ff13b4 6429 "Extended remote serial target in async gdb-specific protocol";
c5aa993b 6430 extended_async_remote_ops.to_doc =
43ff13b4
JM
6431 "Use a remote computer via a serial line, using an async gdb-specific protocol.\n\
6432Specify the serial device it is connected to (e.g. /dev/ttya).",
c5aa993b 6433 extended_async_remote_ops.to_open = extended_remote_async_open;
43ff13b4
JM
6434 extended_async_remote_ops.to_create_inferior = extended_remote_async_create_inferior;
6435 extended_async_remote_ops.to_mourn_inferior = extended_remote_mourn;
6436}
6437
5a2468f5 6438static void
c2d11a7d 6439set_remote_cmd (char *args, int from_tty)
5a2468f5 6440{
427c3a89 6441 help_list (remote_set_cmdlist, "set remote ", -1, gdb_stdout);
5a2468f5
JM
6442}
6443
d471ea57
AC
6444static void
6445show_remote_cmd (char *args, int from_tty)
6446{
37a105a1 6447 /* We can't just use cmd_show_list here, because we want to skip
427c3a89 6448 the redundant "show remote Z-packet" and the legacy aliases. */
37a105a1
DJ
6449 struct cleanup *showlist_chain;
6450 struct cmd_list_element *list = remote_show_cmdlist;
6451
6452 showlist_chain = make_cleanup_ui_out_tuple_begin_end (uiout, "showlist");
6453 for (; list != NULL; list = list->next)
6454 if (strcmp (list->name, "Z-packet") == 0)
6455 continue;
427c3a89
DJ
6456 else if (list->type == not_set_cmd)
6457 /* Alias commands are exactly like the original, except they
6458 don't have the normal type. */
6459 continue;
6460 else
37a105a1
DJ
6461 {
6462 struct cleanup *option_chain
6463 = make_cleanup_ui_out_tuple_begin_end (uiout, "option");
6464 ui_out_field_string (uiout, "name", list->name);
6465 ui_out_text (uiout, ": ");
427c3a89
DJ
6466 if (list->type == show_cmd)
6467 do_setshow_command ((char *) NULL, from_tty, list);
6468 else
6469 cmd_func (list, NULL, from_tty);
37a105a1
DJ
6470 /* Close the tuple. */
6471 do_cleanups (option_chain);
6472 }
427c3a89
DJ
6473
6474 /* Close the tuple. */
6475 do_cleanups (showlist_chain);
d471ea57 6476}
5a2468f5 6477
0f71a2f6 6478static void
fba45db2 6479build_remote_gdbarch_data (void)
0f71a2f6 6480{
17a912b6 6481 remote_address_size = gdbarch_addr_bit (current_gdbarch);
0f71a2f6
JM
6482}
6483
23860348 6484/* Function to be called whenever a new objfile (shlib) is detected. */
dc8acb97
MS
6485static void
6486remote_new_objfile (struct objfile *objfile)
6487{
23860348 6488 if (remote_desc != 0) /* Have a remote connection. */
06d3b283 6489 remote_check_symbols (objfile);
dc8acb97
MS
6490}
6491
c906108c 6492void
fba45db2 6493_initialize_remote (void)
c906108c 6494{
ea9c271d
DJ
6495 struct remote_state *rs;
6496
0f71a2f6 6497 /* architecture specific data */
2bc416ba 6498 remote_gdbarch_data_handle =
23860348 6499 gdbarch_data_register_post_init (init_remote_state);
29709017
DJ
6500 remote_g_packet_data_handle =
6501 gdbarch_data_register_pre_init (remote_g_packet_data_init);
d01949b6
AC
6502
6503 /* Old tacky stuff. NOTE: This comes after the remote protocol so
6504 that the remote protocol has been initialized. */
046a4708
AC
6505 DEPRECATED_REGISTER_GDBARCH_SWAP (remote_address_size);
6506 deprecated_register_gdbarch_swap (NULL, 0, build_remote_gdbarch_data);
0f71a2f6 6507
ea9c271d
DJ
6508 /* Initialize the per-target state. At the moment there is only one
6509 of these, not one per target. Only one target is active at a
6510 time. The default buffer size is unimportant; it will be expanded
6511 whenever a larger buffer is needed. */
0b83947e 6512 rs = get_remote_state_raw ();
ea9c271d
DJ
6513 rs->buf_size = 400;
6514 rs->buf = xmalloc (rs->buf_size);
6515
c906108c
SS
6516 init_remote_ops ();
6517 add_target (&remote_ops);
6518
6519 init_extended_remote_ops ();
6520 add_target (&extended_remote_ops);
cce74817 6521
43ff13b4
JM
6522 init_remote_async_ops ();
6523 add_target (&remote_async_ops);
6524
6525 init_extended_async_remote_ops ();
6526 add_target (&extended_async_remote_ops);
6527
dc8acb97 6528 /* Hook into new objfile notification. */
06d3b283 6529 observer_attach_new_objfile (remote_new_objfile);
dc8acb97 6530
c906108c
SS
6531#if 0
6532 init_remote_threadtests ();
6533#endif
6534
23860348 6535 /* set/show remote ... */
d471ea57 6536
1bedd215 6537 add_prefix_cmd ("remote", class_maintenance, set_remote_cmd, _("\
5a2468f5
JM
6538Remote protocol specific variables\n\
6539Configure various remote-protocol specific variables such as\n\
1bedd215 6540the packets being used"),
cff3e48b 6541 &remote_set_cmdlist, "set remote ",
23860348 6542 0 /* allow-unknown */, &setlist);
1bedd215 6543 add_prefix_cmd ("remote", class_maintenance, show_remote_cmd, _("\
5a2468f5
JM
6544Remote protocol specific variables\n\
6545Configure various remote-protocol specific variables such as\n\
1bedd215 6546the packets being used"),
cff3e48b 6547 &remote_show_cmdlist, "show remote ",
23860348 6548 0 /* allow-unknown */, &showlist);
5a2468f5 6549
1a966eab
AC
6550 add_cmd ("compare-sections", class_obscure, compare_sections_command, _("\
6551Compare section data on target to the exec file.\n\
6552Argument is a single section name (default: all loaded sections)."),
c906108c
SS
6553 &cmdlist);
6554
1a966eab
AC
6555 add_cmd ("packet", class_maintenance, packet_command, _("\
6556Send an arbitrary packet to a remote target.\n\
c906108c
SS
6557 maintenance packet TEXT\n\
6558If GDB is talking to an inferior via the GDB serial protocol, then\n\
6559this command sends the string TEXT to the inferior, and displays the\n\
6560response packet. GDB supplies the initial `$' character, and the\n\
1a966eab 6561terminating `#' character and checksum."),
c906108c
SS
6562 &maintenancelist);
6563
7915a72c
AC
6564 add_setshow_boolean_cmd ("remotebreak", no_class, &remote_break, _("\
6565Set whether to send break if interrupted."), _("\
6566Show whether to send break if interrupted."), _("\
6567If set, a break, instead of a cntrl-c, is sent to the remote target."),
2c5b56ce 6568 NULL, NULL, /* FIXME: i18n: Whether to send break if interrupted is %s. */
e707bbc2 6569 &setlist, &showlist);
c906108c 6570
23860348 6571 /* Install commands for configuring memory read/write packets. */
11cf8741 6572
1a966eab
AC
6573 add_cmd ("remotewritesize", no_class, set_memory_write_packet_size, _("\
6574Set the maximum number of bytes per memory write packet (deprecated)."),
11cf8741 6575 &setlist);
1a966eab
AC
6576 add_cmd ("remotewritesize", no_class, show_memory_write_packet_size, _("\
6577Show the maximum number of bytes per memory write packet (deprecated)."),
11cf8741
JM
6578 &showlist);
6579 add_cmd ("memory-write-packet-size", no_class,
1a966eab
AC
6580 set_memory_write_packet_size, _("\
6581Set the maximum number of bytes per memory-write packet.\n\
6582Specify the number of bytes in a packet or 0 (zero) for the\n\
6583default packet size. The actual limit is further reduced\n\
6584dependent on the target. Specify ``fixed'' to disable the\n\
6585further restriction and ``limit'' to enable that restriction."),
11cf8741
JM
6586 &remote_set_cmdlist);
6587 add_cmd ("memory-read-packet-size", no_class,
1a966eab
AC
6588 set_memory_read_packet_size, _("\
6589Set the maximum number of bytes per memory-read packet.\n\
6590Specify the number of bytes in a packet or 0 (zero) for the\n\
6591default packet size. The actual limit is further reduced\n\
6592dependent on the target. Specify ``fixed'' to disable the\n\
6593further restriction and ``limit'' to enable that restriction."),
11cf8741
JM
6594 &remote_set_cmdlist);
6595 add_cmd ("memory-write-packet-size", no_class,
6596 show_memory_write_packet_size,
1a966eab 6597 _("Show the maximum number of bytes per memory-write packet."),
11cf8741
JM
6598 &remote_show_cmdlist);
6599 add_cmd ("memory-read-packet-size", no_class,
6600 show_memory_read_packet_size,
1a966eab 6601 _("Show the maximum number of bytes per memory-read packet."),
11cf8741 6602 &remote_show_cmdlist);
c906108c 6603
b3f42336 6604 add_setshow_zinteger_cmd ("hardware-watchpoint-limit", no_class,
7915a72c
AC
6605 &remote_hw_watchpoint_limit, _("\
6606Set the maximum number of target hardware watchpoints."), _("\
6607Show the maximum number of target hardware watchpoints."), _("\
6608Specify a negative limit for unlimited."),
2c5b56ce 6609 NULL, NULL, /* FIXME: i18n: The maximum number of target hardware watchpoints is %s. */
b3f42336
AC
6610 &remote_set_cmdlist, &remote_show_cmdlist);
6611 add_setshow_zinteger_cmd ("hardware-breakpoint-limit", no_class,
7915a72c
AC
6612 &remote_hw_breakpoint_limit, _("\
6613Set the maximum number of target hardware breakpoints."), _("\
6614Show the maximum number of target hardware breakpoints."), _("\
6615Specify a negative limit for unlimited."),
2c5b56ce 6616 NULL, NULL, /* FIXME: i18n: The maximum number of target hardware breakpoints is %s. */
b3f42336 6617 &remote_set_cmdlist, &remote_show_cmdlist);
501eef12 6618
4d28ad1e
AC
6619 add_setshow_integer_cmd ("remoteaddresssize", class_obscure,
6620 &remote_address_size, _("\
6621Set the maximum size of the address (in bits) in a memory packet."), _("\
6622Show the maximum size of the address (in bits) in a memory packet."), NULL,
6623 NULL,
6624 NULL, /* FIXME: i18n: */
6625 &setlist, &showlist);
c906108c 6626
444abaca 6627 add_packet_config_cmd (&remote_protocol_packets[PACKET_X],
bb572ddd 6628 "X", "binary-download", 1);
0f71a2f6 6629
444abaca 6630 add_packet_config_cmd (&remote_protocol_packets[PACKET_vCont],
bb572ddd 6631 "vCont", "verbose-resume", 0);
506fb367 6632
89be2091
DJ
6633 add_packet_config_cmd (&remote_protocol_packets[PACKET_QPassSignals],
6634 "QPassSignals", "pass-signals", 0);
6635
444abaca 6636 add_packet_config_cmd (&remote_protocol_packets[PACKET_qSymbol],
bb572ddd 6637 "qSymbol", "symbol-lookup", 0);
dc8acb97 6638
444abaca 6639 add_packet_config_cmd (&remote_protocol_packets[PACKET_P],
bb572ddd 6640 "P", "set-register", 1);
d471ea57 6641
444abaca 6642 add_packet_config_cmd (&remote_protocol_packets[PACKET_p],
bb572ddd 6643 "p", "fetch-register", 1);
b96ec7ac 6644
444abaca 6645 add_packet_config_cmd (&remote_protocol_packets[PACKET_Z0],
bb572ddd 6646 "Z0", "software-breakpoint", 0);
d471ea57 6647
444abaca 6648 add_packet_config_cmd (&remote_protocol_packets[PACKET_Z1],
bb572ddd 6649 "Z1", "hardware-breakpoint", 0);
d471ea57 6650
444abaca 6651 add_packet_config_cmd (&remote_protocol_packets[PACKET_Z2],
bb572ddd 6652 "Z2", "write-watchpoint", 0);
d471ea57 6653
444abaca 6654 add_packet_config_cmd (&remote_protocol_packets[PACKET_Z3],
bb572ddd 6655 "Z3", "read-watchpoint", 0);
d471ea57 6656
444abaca 6657 add_packet_config_cmd (&remote_protocol_packets[PACKET_Z4],
bb572ddd 6658 "Z4", "access-watchpoint", 0);
d471ea57 6659
0876f84a
DJ
6660 add_packet_config_cmd (&remote_protocol_packets[PACKET_qXfer_auxv],
6661 "qXfer:auxv:read", "read-aux-vector", 0);
802188a7 6662
23181151
DJ
6663 add_packet_config_cmd (&remote_protocol_packets[PACKET_qXfer_features],
6664 "qXfer:features:read", "target-features", 0);
6665
fd79ecee
DJ
6666 add_packet_config_cmd (&remote_protocol_packets[PACKET_qXfer_memory_map],
6667 "qXfer:memory-map:read", "memory-map", 0);
6668
0e7f50da
UW
6669 add_packet_config_cmd (&remote_protocol_packets[PACKET_qXfer_spu_read],
6670 "qXfer:spu:read", "read-spu-object", 0);
6671
6672 add_packet_config_cmd (&remote_protocol_packets[PACKET_qXfer_spu_write],
6673 "qXfer:spu:write", "write-spu-object", 0);
6674
444abaca 6675 add_packet_config_cmd (&remote_protocol_packets[PACKET_qGetTLSAddr],
38691318 6676 "qGetTLSAddr", "get-thread-local-storage-address",
38691318
KB
6677 0);
6678
be2a5f71
DJ
6679 add_packet_config_cmd (&remote_protocol_packets[PACKET_qSupported],
6680 "qSupported", "supported-packets", 0);
6681
37a105a1
DJ
6682 /* Keep the old ``set remote Z-packet ...'' working. Each individual
6683 Z sub-packet has its own set and show commands, but users may
6684 have sets to this variable in their .gdbinit files (or in their
6685 documentation). */
e9e68a56 6686 add_setshow_auto_boolean_cmd ("Z-packet", class_obscure,
7915a72c
AC
6687 &remote_Z_packet_detect, _("\
6688Set use of remote protocol `Z' packets"), _("\
6689Show use of remote protocol `Z' packets "), _("\
3b64bf98 6690When set, GDB will attempt to use the remote breakpoint and watchpoint\n\
7915a72c 6691packets."),
e9e68a56 6692 set_remote_protocol_Z_packet_cmd,
2c5b56ce 6693 show_remote_protocol_Z_packet_cmd, /* FIXME: i18n: Use of remote protocol `Z' packets is %s. */
e9e68a56 6694 &remote_set_cmdlist, &remote_show_cmdlist);
449092f6
CV
6695
6696 /* Eventually initialize fileio. See fileio.c */
6697 initialize_remote_fileio (remote_set_cmdlist, remote_show_cmdlist);
c906108c 6698}
This page took 1.957995 seconds and 4 git commands to generate.