daily update
[deliverable/binutils-gdb.git] / gdb / remote.c
CommitLineData
c906108c 1/* Remote target communications for serial-line targets in custom GDB protocol
8926118c 2
6aba47ca
DJ
3 Copyright (C) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997,
4 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007
29182b13 5 Free Software Foundation, Inc.
c906108c 6
c5aa993b
JM
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
197e01b6
EZ
21 Foundation, Inc., 51 Franklin Street, Fifth Floor,
22 Boston, MA 02110-1301, USA. */
c5aa993b 23
23860348 24/* See the GDB User Guide for details of the GDB remote protocol. */
c5aa993b 25
c906108c
SS
26#include "defs.h"
27#include "gdb_string.h"
28#include <ctype.h>
29#include <fcntl.h>
c906108c
SS
30#include "inferior.h"
31#include "bfd.h"
32#include "symfile.h"
60250e8b 33#include "exceptions.h"
c906108c 34#include "target.h"
c5aa993b 35/*#include "terminal.h" */
c906108c
SS
36#include "gdbcmd.h"
37#include "objfiles.h"
38#include "gdb-stabs.h"
39#include "gdbthread.h"
c2c6d25f 40#include "remote.h"
4e052eda 41#include "regcache.h"
fd0407d6 42#include "value.h"
1ff9c3d6 43#include "gdb_assert.h"
6867ae3e 44#include "observer.h"
a77053c2 45#include "solib.h"
37a105a1
DJ
46#include "cli/cli-decode.h"
47#include "cli/cli-setshow.h"
424163ea 48#include "target-descriptions.h"
c906108c 49
7a292a7a 50#include <ctype.h>
9846de1b 51#include <sys/time.h>
c906108c 52
43ff13b4 53#include "event-loop.h"
c2c6d25f 54#include "event-top.h"
2acceee2 55#include "inf-loop.h"
43ff13b4 56
c906108c
SS
57#include <signal.h>
58#include "serial.h"
59
6240bebf
MS
60#include "gdbcore.h" /* for exec_bfd */
61
449092f6
CV
62#include "remote-fileio.h"
63
fd79ecee
DJ
64#include "memory-map.h"
65
6765f3e5
DJ
66/* The size to align memory write packets, when practical. The protocol
67 does not guarantee any alignment, and gdb will generate short
68 writes and unaligned writes, but even as a best-effort attempt this
69 can improve bulk transfers. For instance, if a write is misaligned
70 relative to the target's data bus, the stub may need to make an extra
71 round trip fetching data from the target. This doesn't make a
72 huge difference, but it's easy to do, so we try to be helpful.
73
74 The alignment chosen is arbitrary; usually data bus width is
75 important here, not the possibly larger cache line size. */
76enum { REMOTE_ALIGN_WRITES = 16 };
77
23860348 78/* Prototypes for local functions. */
6426a772
JM
79static void cleanup_sigint_signal_handler (void *dummy);
80static void initialize_sigint_signal_handler (void);
6d820c5c 81static int getpkt_sane (char **buf, long *sizeof_buf, int forever);
6426a772 82
a14ed312
KB
83static void handle_remote_sigint (int);
84static void handle_remote_sigint_twice (int);
85static void async_remote_interrupt (gdb_client_data);
86void async_remote_interrupt_twice (gdb_client_data);
43ff13b4 87
a14ed312 88static void build_remote_gdbarch_data (void);
0f71a2f6 89
a14ed312 90static void remote_files_info (struct target_ops *ignore);
c906108c 91
316f2060 92static void remote_prepare_to_store (struct regcache *regcache);
c906108c 93
56be3814 94static void remote_fetch_registers (struct regcache *regcache, int regno);
c906108c 95
39f77062
KB
96static void remote_resume (ptid_t ptid, int step,
97 enum target_signal siggnal);
98static void remote_async_resume (ptid_t ptid, int step,
a14ed312 99 enum target_signal siggnal);
a14ed312
KB
100static void remote_open (char *name, int from_tty);
101static void remote_async_open (char *name, int from_tty);
c906108c 102
a14ed312
KB
103static void extended_remote_open (char *name, int from_tty);
104static void extended_remote_async_open (char *name, int from_tty);
c906108c 105
92d1e331
DJ
106static void remote_open_1 (char *, int, struct target_ops *, int extended_p,
107 int async_p);
c906108c 108
a14ed312 109static void remote_close (int quitting);
c906108c 110
56be3814 111static void remote_store_registers (struct regcache *regcache, int regno);
c906108c 112
a14ed312
KB
113static void remote_mourn (void);
114static void remote_async_mourn (void);
c906108c 115
a14ed312 116static void extended_remote_restart (void);
c906108c 117
a14ed312 118static void extended_remote_mourn (void);
c906108c 119
a14ed312 120static void remote_mourn_1 (struct target_ops *);
c906108c 121
6d820c5c 122static void remote_send (char **buf, long *sizeof_buf_p);
c906108c 123
a14ed312 124static int readchar (int timeout);
c906108c 125
39f77062
KB
126static ptid_t remote_wait (ptid_t ptid,
127 struct target_waitstatus *status);
128static ptid_t remote_async_wait (ptid_t ptid,
129 struct target_waitstatus *status);
c906108c 130
a14ed312
KB
131static void remote_kill (void);
132static void remote_async_kill (void);
c906108c 133
a14ed312 134static int tohex (int nib);
c906108c 135
a14ed312 136static void remote_detach (char *args, int from_tty);
c906108c 137
a14ed312 138static void remote_interrupt (int signo);
c906108c 139
a14ed312 140static void remote_interrupt_twice (int signo);
7a292a7a 141
a14ed312 142static void interrupt_query (void);
c906108c 143
a14ed312 144static void set_thread (int, int);
c906108c 145
39f77062 146static int remote_thread_alive (ptid_t);
c906108c 147
a14ed312 148static void get_offsets (void);
c906108c 149
6d820c5c
DJ
150static void skip_frame (void);
151
152static long read_frame (char **buf_p, long *sizeof_buf);
c906108c 153
a14ed312 154static int hexnumlen (ULONGEST num);
c906108c 155
a14ed312 156static void init_remote_ops (void);
c906108c 157
a14ed312 158static void init_extended_remote_ops (void);
c906108c 159
a14ed312 160static void remote_stop (void);
c906108c 161
a14ed312 162static int ishex (int ch, int *val);
c906108c 163
a14ed312 164static int stubhex (int ch);
c906108c 165
a14ed312 166static int hexnumstr (char *, ULONGEST);
c906108c 167
a14ed312 168static int hexnumnstr (char *, ULONGEST, int);
2df3850c 169
a14ed312 170static CORE_ADDR remote_address_masked (CORE_ADDR);
c906108c 171
a14ed312 172static void print_packet (char *);
c906108c 173
a14ed312 174static unsigned long crc32 (unsigned char *, int, unsigned int);
c906108c 175
a14ed312 176static void compare_sections_command (char *, int);
c906108c 177
a14ed312 178static void packet_command (char *, int);
c906108c 179
a14ed312 180static int stub_unpack_int (char *buff, int fieldlength);
c906108c 181
39f77062 182static ptid_t remote_current_thread (ptid_t oldptid);
c906108c 183
a14ed312 184static void remote_find_new_threads (void);
c906108c 185
a14ed312 186static void record_currthread (int currthread);
c906108c 187
30559e10 188static int fromhex (int a);
c906108c 189
cfd77fa1 190static int hex2bin (const char *hex, gdb_byte *bin, int count);
c906108c 191
cfd77fa1 192static int bin2hex (const gdb_byte *bin, char *hex, int count);
234fa6d1 193
a14ed312 194static int putpkt_binary (char *buf, int cnt);
c906108c 195
a14ed312 196static void check_binary_download (CORE_ADDR addr);
c906108c 197
5a2468f5 198struct packet_config;
5a2468f5 199
a14ed312 200static void show_packet_config_cmd (struct packet_config *config);
5a2468f5 201
d471ea57 202static void update_packet_config (struct packet_config *config);
5a2468f5 203
bb572ddd
DJ
204static void set_remote_protocol_packet_cmd (char *args, int from_tty,
205 struct cmd_list_element *c);
206
207static void show_remote_protocol_packet_cmd (struct ui_file *file,
208 int from_tty,
209 struct cmd_list_element *c,
210 const char *value);
211
a14ed312 212void _initialize_remote (void);
c906108c 213
bb572ddd
DJ
214/* For "set remote" and "show remote". */
215
216static struct cmd_list_element *remote_set_cmdlist;
217static struct cmd_list_element *remote_show_cmdlist;
218
ea9c271d
DJ
219/* Description of the remote protocol state for the currently
220 connected target. This is per-target state, and independent of the
221 selected architecture. */
222
223struct remote_state
224{
225 /* A buffer to use for incoming packets, and its current size. The
226 buffer is grown dynamically for larger incoming packets.
227 Outgoing packets may also be constructed in this buffer.
228 BUF_SIZE is always at least REMOTE_PACKET_SIZE;
229 REMOTE_PACKET_SIZE should be used to limit the length of outgoing
230 packets. */
231 char *buf;
232 long buf_size;
be2a5f71
DJ
233
234 /* If we negotiated packet size explicitly (and thus can bypass
235 heuristics for the largest packet size that will not overflow
236 a buffer in the stub), this will be set to that packet size.
237 Otherwise zero, meaning to use the guessed size. */
238 long explicit_packet_size;
ea9c271d
DJ
239};
240
241/* This data could be associated with a target, but we do not always
242 have access to the current target when we need it, so for now it is
243 static. This will be fine for as long as only one target is in use
244 at a time. */
245static struct remote_state remote_state;
246
247static struct remote_state *
0b83947e 248get_remote_state_raw (void)
ea9c271d
DJ
249{
250 return &remote_state;
251}
252
253/* Description of the remote protocol for a given architecture. */
d01949b6 254
ad10f812
AC
255struct packet_reg
256{
257 long offset; /* Offset into G packet. */
258 long regnum; /* GDB's internal register number. */
259 LONGEST pnum; /* Remote protocol register number. */
b323314b 260 int in_g_packet; /* Always part of G packet. */
2bc416ba 261 /* long size in bytes; == register_size (current_gdbarch, regnum);
23860348 262 at present. */
c9f4d572
UW
263 /* char *name; == gdbarch_register_name (current_gdbarch, regnum);
264 at present. */
ad10f812
AC
265};
266
ea9c271d 267struct remote_arch_state
d01949b6 268{
ad10f812
AC
269 /* Description of the remote protocol registers. */
270 long sizeof_g_packet;
b323314b
AC
271
272 /* Description of the remote protocol registers indexed by REGNUM
f57d151a 273 (making an array gdbarch_num_regs in size). */
b323314b 274 struct packet_reg *regs;
ad10f812 275
d01949b6
AC
276 /* This is the size (in chars) of the first response to the ``g''
277 packet. It is used as a heuristic when determining the maximum
278 size of memory-read and memory-write packets. A target will
279 typically only reserve a buffer large enough to hold the ``g''
280 packet. The size does not include packet overhead (headers and
23860348 281 trailers). */
d01949b6
AC
282 long actual_register_packet_size;
283
284 /* This is the maximum size (in chars) of a non read/write packet.
23860348 285 It is also used as a cap on the size of read/write packets. */
d01949b6
AC
286 long remote_packet_size;
287};
288
3c3bea1c 289
d01949b6
AC
290/* Handle for retreving the remote protocol data from gdbarch. */
291static struct gdbarch_data *remote_gdbarch_data_handle;
292
ea9c271d
DJ
293static struct remote_arch_state *
294get_remote_arch_state (void)
d01949b6 295{
451fbdda 296 return gdbarch_data (current_gdbarch, remote_gdbarch_data_handle);
d01949b6
AC
297}
298
0b83947e
DJ
299/* Fetch the global remote target state. */
300
301static struct remote_state *
302get_remote_state (void)
303{
304 /* Make sure that the remote architecture state has been
305 initialized, because doing so might reallocate rs->buf. Any
306 function which calls getpkt also needs to be mindful of changes
307 to rs->buf, but this call limits the number of places which run
308 into trouble. */
309 get_remote_arch_state ();
310
311 return get_remote_state_raw ();
312}
313
74ca34ce
DJ
314static int
315compare_pnums (const void *lhs_, const void *rhs_)
316{
317 const struct packet_reg * const *lhs = lhs_;
318 const struct packet_reg * const *rhs = rhs_;
319
320 if ((*lhs)->pnum < (*rhs)->pnum)
321 return -1;
322 else if ((*lhs)->pnum == (*rhs)->pnum)
323 return 0;
324 else
325 return 1;
326}
327
d01949b6
AC
328static void *
329init_remote_state (struct gdbarch *gdbarch)
330{
74ca34ce 331 int regnum, num_remote_regs, offset;
0b83947e 332 struct remote_state *rs = get_remote_state_raw ();
ea9c271d 333 struct remote_arch_state *rsa;
74ca34ce 334 struct packet_reg **remote_regs;
ea9c271d
DJ
335
336 rsa = GDBARCH_OBSTACK_ZALLOC (gdbarch, struct remote_arch_state);
d01949b6 337
123dc839
DJ
338 /* Use the architecture to build a regnum<->pnum table, which will be
339 1:1 unless a feature set specifies otherwise. */
f57d151a
UW
340 rsa->regs = GDBARCH_OBSTACK_CALLOC (gdbarch,
341 gdbarch_num_regs (current_gdbarch),
342 struct packet_reg);
343 for (regnum = 0; regnum < gdbarch_num_regs (current_gdbarch); regnum++)
ad10f812 344 {
ea9c271d 345 struct packet_reg *r = &rsa->regs[regnum];
baef701f
DJ
346
347 if (register_size (current_gdbarch, regnum) == 0)
348 /* Do not try to fetch zero-sized (placeholder) registers. */
349 r->pnum = -1;
350 else
351 r->pnum = gdbarch_remote_register_number (gdbarch, regnum);
352
b323314b 353 r->regnum = regnum;
74ca34ce
DJ
354 }
355
356 /* Define the g/G packet format as the contents of each register
357 with a remote protocol number, in order of ascending protocol
358 number. */
359
f57d151a
UW
360 remote_regs = alloca (gdbarch_num_regs (current_gdbarch)
361 * sizeof (struct packet_reg *));
362 for (num_remote_regs = 0, regnum = 0;
363 regnum < gdbarch_num_regs (current_gdbarch);
364 regnum++)
74ca34ce
DJ
365 if (rsa->regs[regnum].pnum != -1)
366 remote_regs[num_remote_regs++] = &rsa->regs[regnum];
7d58c67d 367
74ca34ce
DJ
368 qsort (remote_regs, num_remote_regs, sizeof (struct packet_reg *),
369 compare_pnums);
370
371 for (regnum = 0, offset = 0; regnum < num_remote_regs; regnum++)
372 {
373 remote_regs[regnum]->in_g_packet = 1;
374 remote_regs[regnum]->offset = offset;
375 offset += register_size (current_gdbarch, remote_regs[regnum]->regnum);
ad10f812
AC
376 }
377
74ca34ce
DJ
378 /* Record the maximum possible size of the g packet - it may turn out
379 to be smaller. */
380 rsa->sizeof_g_packet = offset;
381
d01949b6
AC
382 /* Default maximum number of characters in a packet body. Many
383 remote stubs have a hardwired buffer size of 400 bytes
384 (c.f. BUFMAX in m68k-stub.c and i386-stub.c). BUFMAX-1 is used
385 as the maximum packet-size to ensure that the packet and an extra
386 NUL character can always fit in the buffer. This stops GDB
387 trashing stubs that try to squeeze an extra NUL into what is
ea9c271d
DJ
388 already a full buffer (As of 1999-12-04 that was most stubs). */
389 rsa->remote_packet_size = 400 - 1;
d01949b6 390
ea9c271d
DJ
391 /* This one is filled in when a ``g'' packet is received. */
392 rsa->actual_register_packet_size = 0;
393
394 /* Should rsa->sizeof_g_packet needs more space than the
ad10f812
AC
395 default, adjust the size accordingly. Remember that each byte is
396 encoded as two characters. 32 is the overhead for the packet
397 header / footer. NOTE: cagney/1999-10-26: I suspect that 8
d01949b6 398 (``$NN:G...#NN'') is a better guess, the below has been padded a
23860348 399 little. */
ea9c271d
DJ
400 if (rsa->sizeof_g_packet > ((rsa->remote_packet_size - 32) / 2))
401 rsa->remote_packet_size = (rsa->sizeof_g_packet * 2 + 32);
802188a7 402
ea9c271d
DJ
403 /* Make sure that the packet buffer is plenty big enough for
404 this architecture. */
405 if (rs->buf_size < rsa->remote_packet_size)
406 {
407 rs->buf_size = 2 * rsa->remote_packet_size;
7fca722e 408 rs->buf = xrealloc (rs->buf, rs->buf_size);
ea9c271d 409 }
6d820c5c 410
ea9c271d
DJ
411 return rsa;
412}
413
414/* Return the current allowed size of a remote packet. This is
415 inferred from the current architecture, and should be used to
416 limit the length of outgoing packets. */
417static long
418get_remote_packet_size (void)
419{
be2a5f71 420 struct remote_state *rs = get_remote_state ();
ea9c271d
DJ
421 struct remote_arch_state *rsa = get_remote_arch_state ();
422
be2a5f71
DJ
423 if (rs->explicit_packet_size)
424 return rs->explicit_packet_size;
425
ea9c271d 426 return rsa->remote_packet_size;
d01949b6
AC
427}
428
ad10f812 429static struct packet_reg *
ea9c271d 430packet_reg_from_regnum (struct remote_arch_state *rsa, long regnum)
ad10f812 431{
f57d151a 432 if (regnum < 0 && regnum >= gdbarch_num_regs (current_gdbarch))
b323314b
AC
433 return NULL;
434 else
ad10f812 435 {
ea9c271d 436 struct packet_reg *r = &rsa->regs[regnum];
b323314b
AC
437 gdb_assert (r->regnum == regnum);
438 return r;
ad10f812 439 }
ad10f812
AC
440}
441
442static struct packet_reg *
ea9c271d 443packet_reg_from_pnum (struct remote_arch_state *rsa, LONGEST pnum)
ad10f812 444{
b323314b 445 int i;
f57d151a 446 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
ad10f812 447 {
ea9c271d 448 struct packet_reg *r = &rsa->regs[i];
b323314b
AC
449 if (r->pnum == pnum)
450 return r;
ad10f812
AC
451 }
452 return NULL;
d01949b6
AC
453}
454
3c3bea1c
GS
455/* FIXME: graces/2002-08-08: These variables should eventually be
456 bound to an instance of the target object (as in gdbarch-tdep()),
457 when such a thing exists. */
458
459/* This is set to the data address of the access causing the target
460 to stop for a watchpoint. */
461static CORE_ADDR remote_watch_data_address;
462
94e08568 463/* This is non-zero if target stopped for a watchpoint. */
3c3bea1c
GS
464static int remote_stopped_by_watchpoint_p;
465
c906108c
SS
466static struct target_ops remote_ops;
467
468static struct target_ops extended_remote_ops;
469
43ff13b4 470/* Temporary target ops. Just like the remote_ops and
23860348 471 extended_remote_ops, but with asynchronous support. */
43ff13b4
JM
472static struct target_ops remote_async_ops;
473
474static struct target_ops extended_async_remote_ops;
475
6426a772
JM
476/* FIXME: cagney/1999-09-23: Even though getpkt was called with
477 ``forever'' still use the normal timeout mechanism. This is
478 currently used by the ASYNC code to guarentee that target reads
479 during the initial connect always time-out. Once getpkt has been
480 modified to return a timeout indication and, in turn
481 remote_wait()/wait_for_inferior() have gained a timeout parameter
23860348 482 this can go away. */
6426a772
JM
483static int wait_forever_enabled_p = 1;
484
485
c906108c
SS
486/* This variable chooses whether to send a ^C or a break when the user
487 requests program interruption. Although ^C is usually what remote
488 systems expect, and that is the default here, sometimes a break is
489 preferable instead. */
490
491static int remote_break;
492
c906108c
SS
493/* Descriptor for I/O to remote machine. Initialize it to NULL so that
494 remote_open knows that we don't have a file open when the program
495 starts. */
819cc324 496static struct serial *remote_desc = NULL;
c906108c 497
c906108c
SS
498/* This variable sets the number of bits in an address that are to be
499 sent in a memory ("M" or "m") packet. Normally, after stripping
500 leading zeros, the entire address would be sent. This variable
501 restricts the address to REMOTE_ADDRESS_SIZE bits. HISTORY: The
502 initial implementation of remote.c restricted the address sent in
503 memory packets to ``host::sizeof long'' bytes - (typically 32
504 bits). Consequently, for 64 bit targets, the upper 32 bits of an
505 address was never sent. Since fixing this bug may cause a break in
506 some remote targets this variable is principly provided to
23860348 507 facilitate backward compatibility. */
c906108c
SS
508
509static int remote_address_size;
510
6426a772
JM
511/* Tempoary to track who currently owns the terminal. See
512 target_async_terminal_* for more details. */
513
514static int remote_async_terminal_ours_p;
515
11cf8741 516\f
11cf8741 517/* User configurable variables for the number of characters in a
ea9c271d
DJ
518 memory read/write packet. MIN (rsa->remote_packet_size,
519 rsa->sizeof_g_packet) is the default. Some targets need smaller
24b06219 520 values (fifo overruns, et.al.) and some users need larger values
ad10f812
AC
521 (speed up transfers). The variables ``preferred_*'' (the user
522 request), ``current_*'' (what was actually set) and ``forced_*''
23860348 523 (Positive - a soft limit, negative - a hard limit). */
11cf8741
JM
524
525struct memory_packet_config
526{
527 char *name;
528 long size;
529 int fixed_p;
530};
531
532/* Compute the current size of a read/write packet. Since this makes
533 use of ``actual_register_packet_size'' the computation is dynamic. */
534
535static long
536get_memory_packet_size (struct memory_packet_config *config)
537{
d01949b6 538 struct remote_state *rs = get_remote_state ();
ea9c271d
DJ
539 struct remote_arch_state *rsa = get_remote_arch_state ();
540
11cf8741
JM
541 /* NOTE: The somewhat arbitrary 16k comes from the knowledge (folk
542 law?) that some hosts don't cope very well with large alloca()
543 calls. Eventually the alloca() code will be replaced by calls to
544 xmalloc() and make_cleanups() allowing this restriction to either
23860348 545 be lifted or removed. */
11cf8741
JM
546#ifndef MAX_REMOTE_PACKET_SIZE
547#define MAX_REMOTE_PACKET_SIZE 16384
548#endif
3de11b2e 549 /* NOTE: 20 ensures we can write at least one byte. */
11cf8741 550#ifndef MIN_REMOTE_PACKET_SIZE
3de11b2e 551#define MIN_REMOTE_PACKET_SIZE 20
11cf8741
JM
552#endif
553 long what_they_get;
554 if (config->fixed_p)
555 {
556 if (config->size <= 0)
557 what_they_get = MAX_REMOTE_PACKET_SIZE;
558 else
559 what_they_get = config->size;
560 }
561 else
562 {
ea9c271d 563 what_they_get = get_remote_packet_size ();
23860348 564 /* Limit the packet to the size specified by the user. */
11cf8741
JM
565 if (config->size > 0
566 && what_they_get > config->size)
567 what_they_get = config->size;
be2a5f71
DJ
568
569 /* Limit it to the size of the targets ``g'' response unless we have
570 permission from the stub to use a larger packet size. */
571 if (rs->explicit_packet_size == 0
572 && rsa->actual_register_packet_size > 0
573 && what_they_get > rsa->actual_register_packet_size)
574 what_they_get = rsa->actual_register_packet_size;
11cf8741
JM
575 }
576 if (what_they_get > MAX_REMOTE_PACKET_SIZE)
577 what_they_get = MAX_REMOTE_PACKET_SIZE;
578 if (what_they_get < MIN_REMOTE_PACKET_SIZE)
579 what_they_get = MIN_REMOTE_PACKET_SIZE;
6d820c5c
DJ
580
581 /* Make sure there is room in the global buffer for this packet
582 (including its trailing NUL byte). */
583 if (rs->buf_size < what_they_get + 1)
584 {
585 rs->buf_size = 2 * what_they_get;
586 rs->buf = xrealloc (rs->buf, 2 * what_they_get);
587 }
588
11cf8741
JM
589 return what_they_get;
590}
591
592/* Update the size of a read/write packet. If they user wants
23860348 593 something really big then do a sanity check. */
11cf8741
JM
594
595static void
596set_memory_packet_size (char *args, struct memory_packet_config *config)
597{
598 int fixed_p = config->fixed_p;
599 long size = config->size;
600 if (args == NULL)
8a3fe4f8 601 error (_("Argument required (integer, `fixed' or `limited')."));
11cf8741
JM
602 else if (strcmp (args, "hard") == 0
603 || strcmp (args, "fixed") == 0)
604 fixed_p = 1;
605 else if (strcmp (args, "soft") == 0
606 || strcmp (args, "limit") == 0)
607 fixed_p = 0;
608 else
609 {
610 char *end;
611 size = strtoul (args, &end, 0);
612 if (args == end)
8a3fe4f8 613 error (_("Invalid %s (bad syntax)."), config->name);
11cf8741
JM
614#if 0
615 /* Instead of explicitly capping the size of a packet to
616 MAX_REMOTE_PACKET_SIZE or dissallowing it, the user is
617 instead allowed to set the size to something arbitrarily
23860348 618 large. */
11cf8741 619 if (size > MAX_REMOTE_PACKET_SIZE)
8a3fe4f8 620 error (_("Invalid %s (too large)."), config->name);
11cf8741
JM
621#endif
622 }
23860348 623 /* Extra checks? */
11cf8741
JM
624 if (fixed_p && !config->fixed_p)
625 {
e2e0b3e5
AC
626 if (! query (_("The target may not be able to correctly handle a %s\n"
627 "of %ld bytes. Change the packet size? "),
11cf8741 628 config->name, size))
8a3fe4f8 629 error (_("Packet size not changed."));
11cf8741 630 }
23860348 631 /* Update the config. */
11cf8741
JM
632 config->fixed_p = fixed_p;
633 config->size = size;
634}
635
636static void
637show_memory_packet_size (struct memory_packet_config *config)
638{
a3f17187 639 printf_filtered (_("The %s is %ld. "), config->name, config->size);
11cf8741 640 if (config->fixed_p)
a3f17187 641 printf_filtered (_("Packets are fixed at %ld bytes.\n"),
11cf8741
JM
642 get_memory_packet_size (config));
643 else
a3f17187 644 printf_filtered (_("Packets are limited to %ld bytes.\n"),
11cf8741
JM
645 get_memory_packet_size (config));
646}
647
648static struct memory_packet_config memory_write_packet_config =
649{
650 "memory-write-packet-size",
651};
652
653static void
654set_memory_write_packet_size (char *args, int from_tty)
655{
656 set_memory_packet_size (args, &memory_write_packet_config);
657}
658
659static void
660show_memory_write_packet_size (char *args, int from_tty)
661{
662 show_memory_packet_size (&memory_write_packet_config);
663}
664
665static long
666get_memory_write_packet_size (void)
667{
668 return get_memory_packet_size (&memory_write_packet_config);
669}
670
671static struct memory_packet_config memory_read_packet_config =
672{
673 "memory-read-packet-size",
674};
675
676static void
677set_memory_read_packet_size (char *args, int from_tty)
678{
679 set_memory_packet_size (args, &memory_read_packet_config);
680}
681
682static void
683show_memory_read_packet_size (char *args, int from_tty)
684{
685 show_memory_packet_size (&memory_read_packet_config);
686}
687
688static long
689get_memory_read_packet_size (void)
690{
691 long size = get_memory_packet_size (&memory_read_packet_config);
692 /* FIXME: cagney/1999-11-07: Functions like getpkt() need to get an
693 extra buffer size argument before the memory read size can be
ea9c271d
DJ
694 increased beyond this. */
695 if (size > get_remote_packet_size ())
696 size = get_remote_packet_size ();
11cf8741
JM
697 return size;
698}
699
11cf8741 700\f
5a2468f5
JM
701/* Generic configuration support for packets the stub optionally
702 supports. Allows the user to specify the use of the packet as well
23860348 703 as allowing GDB to auto-detect support in the remote stub. */
5a2468f5
JM
704
705enum packet_support
706 {
707 PACKET_SUPPORT_UNKNOWN = 0,
708 PACKET_ENABLE,
709 PACKET_DISABLE
710 };
711
5a2468f5
JM
712struct packet_config
713 {
bb572ddd
DJ
714 const char *name;
715 const char *title;
7f19b9a2 716 enum auto_boolean detect;
5a2468f5
JM
717 enum packet_support support;
718 };
719
d471ea57 720/* Analyze a packet's return value and update the packet config
23860348 721 accordingly. */
d471ea57
AC
722
723enum packet_result
724{
725 PACKET_ERROR,
726 PACKET_OK,
727 PACKET_UNKNOWN
728};
729
5a2468f5 730static void
d471ea57 731update_packet_config (struct packet_config *config)
5a2468f5 732{
d471ea57
AC
733 switch (config->detect)
734 {
7f19b9a2 735 case AUTO_BOOLEAN_TRUE:
d471ea57
AC
736 config->support = PACKET_ENABLE;
737 break;
7f19b9a2 738 case AUTO_BOOLEAN_FALSE:
d471ea57
AC
739 config->support = PACKET_DISABLE;
740 break;
7f19b9a2 741 case AUTO_BOOLEAN_AUTO:
d471ea57
AC
742 config->support = PACKET_SUPPORT_UNKNOWN;
743 break;
744 }
5a2468f5
JM
745}
746
747static void
fba45db2 748show_packet_config_cmd (struct packet_config *config)
5a2468f5
JM
749{
750 char *support = "internal-error";
751 switch (config->support)
752 {
753 case PACKET_ENABLE:
754 support = "enabled";
755 break;
756 case PACKET_DISABLE:
757 support = "disabled";
758 break;
759 case PACKET_SUPPORT_UNKNOWN:
760 support = "unknown";
761 break;
762 }
763 switch (config->detect)
764 {
7f19b9a2 765 case AUTO_BOOLEAN_AUTO:
37a105a1
DJ
766 printf_filtered (_("Support for the `%s' packet is auto-detected, currently %s.\n"),
767 config->name, support);
5a2468f5 768 break;
7f19b9a2
AC
769 case AUTO_BOOLEAN_TRUE:
770 case AUTO_BOOLEAN_FALSE:
37a105a1
DJ
771 printf_filtered (_("Support for the `%s' packet is currently %s.\n"),
772 config->name, support);
8e248173 773 break;
5a2468f5
JM
774 }
775}
776
777static void
bb572ddd
DJ
778add_packet_config_cmd (struct packet_config *config, const char *name,
779 const char *title, int legacy)
d471ea57 780{
5a2468f5
JM
781 char *set_doc;
782 char *show_doc;
d471ea57 783 char *cmd_name;
3ed07be4 784
5a2468f5
JM
785 config->name = name;
786 config->title = title;
7f19b9a2 787 config->detect = AUTO_BOOLEAN_AUTO;
8e248173 788 config->support = PACKET_SUPPORT_UNKNOWN;
b435e160
AC
789 set_doc = xstrprintf ("Set use of remote protocol `%s' (%s) packet",
790 name, title);
791 show_doc = xstrprintf ("Show current use of remote protocol `%s' (%s) packet",
792 name, title);
d471ea57 793 /* set/show TITLE-packet {auto,on,off} */
b435e160 794 cmd_name = xstrprintf ("%s-packet", title);
e9e68a56 795 add_setshow_auto_boolean_cmd (cmd_name, class_obscure,
2c5b56ce 796 &config->detect, set_doc, show_doc, NULL, /* help_doc */
bb572ddd
DJ
797 set_remote_protocol_packet_cmd,
798 show_remote_protocol_packet_cmd,
799 &remote_set_cmdlist, &remote_show_cmdlist);
23860348 800 /* set/show remote NAME-packet {auto,on,off} -- legacy. */
d471ea57
AC
801 if (legacy)
802 {
803 char *legacy_name;
b435e160 804 legacy_name = xstrprintf ("%s-packet", name);
d471ea57 805 add_alias_cmd (legacy_name, cmd_name, class_obscure, 0,
bb572ddd 806 &remote_set_cmdlist);
d471ea57 807 add_alias_cmd (legacy_name, cmd_name, class_obscure, 0,
bb572ddd 808 &remote_show_cmdlist);
d471ea57 809 }
5a2468f5
JM
810}
811
d471ea57 812static enum packet_result
a76d924d 813packet_check_result (const char *buf)
5a2468f5 814{
d471ea57 815 if (buf[0] != '\0')
5a2468f5 816 {
d471ea57 817 /* The stub recognized the packet request. Check that the
23860348 818 operation succeeded. */
a76d924d
DJ
819 if (buf[0] == 'E'
820 && isxdigit (buf[1]) && isxdigit (buf[2])
821 && buf[3] == '\0')
822 /* "Enn" - definitly an error. */
823 return PACKET_ERROR;
824
825 /* Always treat "E." as an error. This will be used for
826 more verbose error messages, such as E.memtypes. */
827 if (buf[0] == 'E' && buf[1] == '.')
828 return PACKET_ERROR;
829
830 /* The packet may or may not be OK. Just assume it is. */
831 return PACKET_OK;
832 }
833 else
834 /* The stub does not support the packet. */
835 return PACKET_UNKNOWN;
836}
837
838static enum packet_result
839packet_ok (const char *buf, struct packet_config *config)
840{
841 enum packet_result result;
842
843 result = packet_check_result (buf);
844 switch (result)
845 {
846 case PACKET_OK:
847 case PACKET_ERROR:
848 /* The stub recognized the packet request. */
d471ea57
AC
849 switch (config->support)
850 {
851 case PACKET_SUPPORT_UNKNOWN:
852 if (remote_debug)
853 fprintf_unfiltered (gdb_stdlog,
854 "Packet %s (%s) is supported\n",
855 config->name, config->title);
856 config->support = PACKET_ENABLE;
857 break;
858 case PACKET_DISABLE:
8e65ff28 859 internal_error (__FILE__, __LINE__,
e2e0b3e5 860 _("packet_ok: attempt to use a disabled packet"));
d471ea57
AC
861 break;
862 case PACKET_ENABLE:
863 break;
864 }
a76d924d
DJ
865 break;
866 case PACKET_UNKNOWN:
23860348 867 /* The stub does not support the packet. */
d471ea57
AC
868 switch (config->support)
869 {
870 case PACKET_ENABLE:
7f19b9a2 871 if (config->detect == AUTO_BOOLEAN_AUTO)
d471ea57 872 /* If the stub previously indicated that the packet was
23860348 873 supported then there is a protocol error.. */
8a3fe4f8 874 error (_("Protocol error: %s (%s) conflicting enabled responses."),
d471ea57
AC
875 config->name, config->title);
876 else
23860348 877 /* The user set it wrong. */
8a3fe4f8 878 error (_("Enabled packet %s (%s) not recognized by stub"),
d471ea57
AC
879 config->name, config->title);
880 break;
881 case PACKET_SUPPORT_UNKNOWN:
882 if (remote_debug)
883 fprintf_unfiltered (gdb_stdlog,
884 "Packet %s (%s) is NOT supported\n",
885 config->name, config->title);
886 config->support = PACKET_DISABLE;
887 break;
888 case PACKET_DISABLE:
889 break;
890 }
a76d924d 891 break;
5a2468f5 892 }
a76d924d
DJ
893
894 return result;
5a2468f5
JM
895}
896
444abaca
DJ
897enum {
898 PACKET_vCont = 0,
899 PACKET_X,
900 PACKET_qSymbol,
901 PACKET_P,
902 PACKET_p,
903 PACKET_Z0,
904 PACKET_Z1,
905 PACKET_Z2,
906 PACKET_Z3,
907 PACKET_Z4,
0876f84a 908 PACKET_qXfer_auxv,
23181151 909 PACKET_qXfer_features,
fd79ecee 910 PACKET_qXfer_memory_map,
0e7f50da
UW
911 PACKET_qXfer_spu_read,
912 PACKET_qXfer_spu_write,
444abaca 913 PACKET_qGetTLSAddr,
be2a5f71 914 PACKET_qSupported,
89be2091 915 PACKET_QPassSignals,
444abaca
DJ
916 PACKET_MAX
917};
506fb367 918
444abaca 919static struct packet_config remote_protocol_packets[PACKET_MAX];
dc8acb97
MS
920
921static void
444abaca
DJ
922set_remote_protocol_packet_cmd (char *args, int from_tty,
923 struct cmd_list_element *c)
dc8acb97 924{
444abaca 925 struct packet_config *packet;
dc8acb97 926
444abaca
DJ
927 for (packet = remote_protocol_packets;
928 packet < &remote_protocol_packets[PACKET_MAX];
929 packet++)
930 {
931 if (&packet->detect == c->var)
932 {
933 update_packet_config (packet);
934 return;
935 }
936 }
937 internal_error (__FILE__, __LINE__, "Could not find config for %s",
938 c->name);
dc8acb97
MS
939}
940
5a2468f5 941static void
444abaca
DJ
942show_remote_protocol_packet_cmd (struct ui_file *file, int from_tty,
943 struct cmd_list_element *c,
944 const char *value)
5a2468f5 945{
444abaca 946 struct packet_config *packet;
5a2468f5 947
444abaca
DJ
948 for (packet = remote_protocol_packets;
949 packet < &remote_protocol_packets[PACKET_MAX];
950 packet++)
951 {
952 if (&packet->detect == c->var)
953 {
954 show_packet_config_cmd (packet);
955 return;
956 }
957 }
958 internal_error (__FILE__, __LINE__, "Could not find config for %s",
959 c->name);
5a2468f5
JM
960}
961
d471ea57
AC
962/* Should we try one of the 'Z' requests? */
963
964enum Z_packet_type
965{
966 Z_PACKET_SOFTWARE_BP,
967 Z_PACKET_HARDWARE_BP,
968 Z_PACKET_WRITE_WP,
969 Z_PACKET_READ_WP,
970 Z_PACKET_ACCESS_WP,
971 NR_Z_PACKET_TYPES
972};
96baa820 973
d471ea57 974/* For compatibility with older distributions. Provide a ``set remote
23860348 975 Z-packet ...'' command that updates all the Z packet types. */
d471ea57 976
7f19b9a2 977static enum auto_boolean remote_Z_packet_detect;
96baa820
JM
978
979static void
fba45db2
KB
980set_remote_protocol_Z_packet_cmd (char *args, int from_tty,
981 struct cmd_list_element *c)
96baa820 982{
d471ea57
AC
983 int i;
984 for (i = 0; i < NR_Z_PACKET_TYPES; i++)
985 {
444abaca
DJ
986 remote_protocol_packets[PACKET_Z0 + i].detect = remote_Z_packet_detect;
987 update_packet_config (&remote_protocol_packets[PACKET_Z0 + i]);
d471ea57 988 }
96baa820
JM
989}
990
991static void
08546159
AC
992show_remote_protocol_Z_packet_cmd (struct ui_file *file, int from_tty,
993 struct cmd_list_element *c,
994 const char *value)
96baa820 995{
d471ea57
AC
996 int i;
997 for (i = 0; i < NR_Z_PACKET_TYPES; i++)
998 {
444abaca 999 show_packet_config_cmd (&remote_protocol_packets[PACKET_Z0 + i]);
d471ea57 1000 }
96baa820
JM
1001}
1002
9d1f7ab2
MS
1003/* Should we try the 'ThreadInfo' query packet?
1004
1005 This variable (NOT available to the user: auto-detect only!)
1006 determines whether GDB will use the new, simpler "ThreadInfo"
1007 query or the older, more complex syntax for thread queries.
802188a7 1008 This is an auto-detect variable (set to true at each connect,
9d1f7ab2
MS
1009 and set to false when the target fails to recognize it). */
1010
1011static int use_threadinfo_query;
1012static int use_threadextra_query;
1013
23860348 1014/* Tokens for use by the asynchronous signal handlers for SIGINT. */
d5d6fca5
DJ
1015static struct async_signal_handler *sigint_remote_twice_token;
1016static struct async_signal_handler *sigint_remote_token;
43ff13b4 1017
c906108c
SS
1018/* These are pointers to hook functions that may be set in order to
1019 modify resume/wait behavior for a particular architecture. */
1020
9a4105ab
AC
1021void (*deprecated_target_resume_hook) (void);
1022void (*deprecated_target_wait_loop_hook) (void);
c906108c
SS
1023\f
1024
c5aa993b 1025
c906108c
SS
1026/* These are the threads which we last sent to the remote system.
1027 -1 for all or -2 for not sent yet. */
1028static int general_thread;
cce74817 1029static int continue_thread;
c906108c
SS
1030
1031/* Call this function as a result of
1032 1) A halt indication (T packet) containing a thread id
1033 2) A direct query of currthread
1034 3) Successful execution of set thread
1035 */
1036
1037static void
fba45db2 1038record_currthread (int currthread)
c906108c 1039{
c906108c 1040 general_thread = currthread;
cce74817 1041
c906108c
SS
1042 /* If this is a new thread, add it to GDB's thread list.
1043 If we leave it up to WFI to do this, bad things will happen. */
39f77062 1044 if (!in_thread_list (pid_to_ptid (currthread)))
0f71a2f6 1045 {
39f77062 1046 add_thread (pid_to_ptid (currthread));
8b93c638 1047 ui_out_text (uiout, "[New ");
39f77062 1048 ui_out_text (uiout, target_pid_to_str (pid_to_ptid (currthread)));
8b93c638 1049 ui_out_text (uiout, "]\n");
0f71a2f6 1050 }
c906108c
SS
1051}
1052
89be2091
DJ
1053static char *last_pass_packet;
1054
1055/* If 'QPassSignals' is supported, tell the remote stub what signals
1056 it can simply pass through to the inferior without reporting. */
1057
1058static void
1059remote_pass_signals (void)
1060{
1061 if (remote_protocol_packets[PACKET_QPassSignals].support != PACKET_DISABLE)
1062 {
1063 char *pass_packet, *p;
1064 int numsigs = (int) TARGET_SIGNAL_LAST;
1065 int count = 0, i;
1066
1067 gdb_assert (numsigs < 256);
1068 for (i = 0; i < numsigs; i++)
1069 {
1070 if (signal_stop_state (i) == 0
1071 && signal_print_state (i) == 0
1072 && signal_pass_state (i) == 1)
1073 count++;
1074 }
1075 pass_packet = xmalloc (count * 3 + strlen ("QPassSignals:") + 1);
1076 strcpy (pass_packet, "QPassSignals:");
1077 p = pass_packet + strlen (pass_packet);
1078 for (i = 0; i < numsigs; i++)
1079 {
1080 if (signal_stop_state (i) == 0
1081 && signal_print_state (i) == 0
1082 && signal_pass_state (i) == 1)
1083 {
1084 if (i >= 16)
1085 *p++ = tohex (i >> 4);
1086 *p++ = tohex (i & 15);
1087 if (count)
1088 *p++ = ';';
1089 else
1090 break;
1091 count--;
1092 }
1093 }
1094 *p = 0;
1095 if (!last_pass_packet || strcmp (last_pass_packet, pass_packet))
1096 {
1097 struct remote_state *rs = get_remote_state ();
1098 char *buf = rs->buf;
1099
1100 putpkt (pass_packet);
1101 getpkt (&rs->buf, &rs->buf_size, 0);
1102 packet_ok (buf, &remote_protocol_packets[PACKET_QPassSignals]);
1103 if (last_pass_packet)
1104 xfree (last_pass_packet);
1105 last_pass_packet = pass_packet;
1106 }
1107 else
1108 xfree (pass_packet);
1109 }
1110}
1111
c906108c
SS
1112#define MAGIC_NULL_PID 42000
1113
1114static void
fba45db2 1115set_thread (int th, int gen)
c906108c 1116{
d01949b6 1117 struct remote_state *rs = get_remote_state ();
6d820c5c 1118 char *buf = rs->buf;
cce74817 1119 int state = gen ? general_thread : continue_thread;
c906108c
SS
1120
1121 if (state == th)
1122 return;
1123
1124 buf[0] = 'H';
1125 buf[1] = gen ? 'g' : 'c';
1126 if (th == MAGIC_NULL_PID)
1127 {
1128 buf[2] = '0';
1129 buf[3] = '\0';
1130 }
1131 else if (th < 0)
ea9c271d 1132 xsnprintf (&buf[2], get_remote_packet_size () - 2, "-%x", -th);
c906108c 1133 else
ea9c271d 1134 xsnprintf (&buf[2], get_remote_packet_size () - 2, "%x", th);
c906108c 1135 putpkt (buf);
6d820c5c 1136 getpkt (&rs->buf, &rs->buf_size, 0);
c906108c 1137 if (gen)
c5aa993b 1138 general_thread = th;
c906108c 1139 else
cce74817 1140 continue_thread = th;
c906108c
SS
1141}
1142\f
1143/* Return nonzero if the thread TH is still alive on the remote system. */
1144
1145static int
39f77062 1146remote_thread_alive (ptid_t ptid)
c906108c 1147{
6d820c5c 1148 struct remote_state *rs = get_remote_state ();
39f77062 1149 int tid = PIDGET (ptid);
c906108c 1150
cce74817 1151 if (tid < 0)
2e9f7625 1152 xsnprintf (rs->buf, get_remote_packet_size (), "T-%08x", -tid);
c906108c 1153 else
2e9f7625
DJ
1154 xsnprintf (rs->buf, get_remote_packet_size (), "T%08x", tid);
1155 putpkt (rs->buf);
6d820c5c 1156 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 1157 return (rs->buf[0] == 'O' && rs->buf[1] == 'K');
c906108c
SS
1158}
1159
1160/* About these extended threadlist and threadinfo packets. They are
1161 variable length packets but, the fields within them are often fixed
1162 length. They are redundent enough to send over UDP as is the
1163 remote protocol in general. There is a matching unit test module
1164 in libstub. */
1165
cce74817
JM
1166#define OPAQUETHREADBYTES 8
1167
1168/* a 64 bit opaque identifier */
1169typedef unsigned char threadref[OPAQUETHREADBYTES];
1170
23860348
MS
1171/* WARNING: This threadref data structure comes from the remote O.S.,
1172 libstub protocol encoding, and remote.c. it is not particularly
1173 changable. */
cce74817
JM
1174
1175/* Right now, the internal structure is int. We want it to be bigger.
1176 Plan to fix this.
c5aa993b 1177 */
cce74817 1178
23860348 1179typedef int gdb_threadref; /* Internal GDB thread reference. */
cce74817 1180
9d1f7ab2 1181/* gdb_ext_thread_info is an internal GDB data structure which is
cfde0993 1182 equivalent to the reply of the remote threadinfo packet. */
cce74817
JM
1183
1184struct gdb_ext_thread_info
c5aa993b 1185 {
23860348 1186 threadref threadid; /* External form of thread reference. */
2bc416ba 1187 int active; /* Has state interesting to GDB?
23860348 1188 regs, stack. */
2bc416ba 1189 char display[256]; /* Brief state display, name,
cedea757 1190 blocked/suspended. */
23860348 1191 char shortname[32]; /* To be used to name threads. */
2bc416ba 1192 char more_display[256]; /* Long info, statistics, queue depth,
23860348 1193 whatever. */
c5aa993b 1194 };
cce74817
JM
1195
1196/* The volume of remote transfers can be limited by submitting
1197 a mask containing bits specifying the desired information.
1198 Use a union of these values as the 'selection' parameter to
1199 get_thread_info. FIXME: Make these TAG names more thread specific.
c5aa993b 1200 */
cce74817
JM
1201
1202#define TAG_THREADID 1
1203#define TAG_EXISTS 2
1204#define TAG_DISPLAY 4
1205#define TAG_THREADNAME 8
c5aa993b 1206#define TAG_MOREDISPLAY 16
cce74817 1207
23860348 1208#define BUF_THREAD_ID_SIZE (OPAQUETHREADBYTES * 2)
c906108c 1209
b2dd6311 1210char *unpack_varlen_hex (char *buff, ULONGEST *result);
cce74817 1211
a14ed312 1212static char *unpack_nibble (char *buf, int *val);
cce74817 1213
a14ed312 1214static char *pack_nibble (char *buf, int nibble);
cce74817 1215
23860348 1216static char *pack_hex_byte (char *pkt, int /* unsigned char */ byte);
cce74817 1217
a14ed312 1218static char *unpack_byte (char *buf, int *value);
cce74817 1219
a14ed312 1220static char *pack_int (char *buf, int value);
cce74817 1221
a14ed312 1222static char *unpack_int (char *buf, int *value);
cce74817 1223
a14ed312 1224static char *unpack_string (char *src, char *dest, int length);
cce74817 1225
23860348 1226static char *pack_threadid (char *pkt, threadref *id);
cce74817 1227
23860348 1228static char *unpack_threadid (char *inbuf, threadref *id);
cce74817 1229
23860348 1230void int_to_threadref (threadref *id, int value);
cce74817 1231
23860348 1232static int threadref_to_int (threadref *ref);
cce74817 1233
23860348 1234static void copy_threadref (threadref *dest, threadref *src);
cce74817 1235
23860348 1236static int threadmatch (threadref *dest, threadref *src);
cce74817 1237
2bc416ba 1238static char *pack_threadinfo_request (char *pkt, int mode,
23860348 1239 threadref *id);
cce74817 1240
a14ed312 1241static int remote_unpack_thread_info_response (char *pkt,
23860348 1242 threadref *expectedref,
a14ed312
KB
1243 struct gdb_ext_thread_info
1244 *info);
cce74817
JM
1245
1246
2bc416ba 1247static int remote_get_threadinfo (threadref *threadid,
23860348 1248 int fieldset, /*TAG mask */
a14ed312 1249 struct gdb_ext_thread_info *info);
cce74817 1250
a14ed312
KB
1251static char *pack_threadlist_request (char *pkt, int startflag,
1252 int threadcount,
23860348 1253 threadref *nextthread);
cce74817 1254
a14ed312
KB
1255static int parse_threadlist_response (char *pkt,
1256 int result_limit,
23860348 1257 threadref *original_echo,
2bc416ba 1258 threadref *resultlist,
23860348 1259 int *doneflag);
cce74817 1260
a14ed312 1261static int remote_get_threadlist (int startflag,
23860348 1262 threadref *nextthread,
a14ed312
KB
1263 int result_limit,
1264 int *done,
2bc416ba 1265 int *result_count,
23860348 1266 threadref *threadlist);
cce74817 1267
23860348 1268typedef int (*rmt_thread_action) (threadref *ref, void *context);
cce74817 1269
a14ed312
KB
1270static int remote_threadlist_iterator (rmt_thread_action stepfunction,
1271 void *context, int looplimit);
cce74817 1272
23860348 1273static int remote_newthread_step (threadref *ref, void *context);
cce74817 1274
23860348 1275/* Encode 64 bits in 16 chars of hex. */
c906108c
SS
1276
1277static const char hexchars[] = "0123456789abcdef";
1278
1279static int
fba45db2 1280ishex (int ch, int *val)
c906108c
SS
1281{
1282 if ((ch >= 'a') && (ch <= 'f'))
1283 {
1284 *val = ch - 'a' + 10;
1285 return 1;
1286 }
1287 if ((ch >= 'A') && (ch <= 'F'))
1288 {
1289 *val = ch - 'A' + 10;
1290 return 1;
1291 }
1292 if ((ch >= '0') && (ch <= '9'))
1293 {
1294 *val = ch - '0';
1295 return 1;
1296 }
1297 return 0;
1298}
1299
1300static int
fba45db2 1301stubhex (int ch)
c906108c
SS
1302{
1303 if (ch >= 'a' && ch <= 'f')
1304 return ch - 'a' + 10;
1305 if (ch >= '0' && ch <= '9')
1306 return ch - '0';
1307 if (ch >= 'A' && ch <= 'F')
1308 return ch - 'A' + 10;
1309 return -1;
1310}
1311
1312static int
fba45db2 1313stub_unpack_int (char *buff, int fieldlength)
c906108c
SS
1314{
1315 int nibble;
1316 int retval = 0;
1317
1318 while (fieldlength)
1319 {
1320 nibble = stubhex (*buff++);
1321 retval |= nibble;
1322 fieldlength--;
1323 if (fieldlength)
1324 retval = retval << 4;
1325 }
1326 return retval;
1327}
1328
1329char *
fba45db2 1330unpack_varlen_hex (char *buff, /* packet to parse */
b2dd6311 1331 ULONGEST *result)
c906108c
SS
1332{
1333 int nibble;
d49c44d5 1334 ULONGEST retval = 0;
c906108c
SS
1335
1336 while (ishex (*buff, &nibble))
1337 {
1338 buff++;
1339 retval = retval << 4;
1340 retval |= nibble & 0x0f;
1341 }
1342 *result = retval;
1343 return buff;
1344}
1345
1346static char *
fba45db2 1347unpack_nibble (char *buf, int *val)
c906108c
SS
1348{
1349 ishex (*buf++, val);
1350 return buf;
1351}
1352
1353static char *
fba45db2 1354pack_nibble (char *buf, int nibble)
c906108c
SS
1355{
1356 *buf++ = hexchars[(nibble & 0x0f)];
1357 return buf;
1358}
1359
1360static char *
fba45db2 1361pack_hex_byte (char *pkt, int byte)
c906108c
SS
1362{
1363 *pkt++ = hexchars[(byte >> 4) & 0xf];
1364 *pkt++ = hexchars[(byte & 0xf)];
1365 return pkt;
1366}
1367
1368static char *
fba45db2 1369unpack_byte (char *buf, int *value)
c906108c
SS
1370{
1371 *value = stub_unpack_int (buf, 2);
1372 return buf + 2;
1373}
1374
1375static char *
fba45db2 1376pack_int (char *buf, int value)
c906108c
SS
1377{
1378 buf = pack_hex_byte (buf, (value >> 24) & 0xff);
1379 buf = pack_hex_byte (buf, (value >> 16) & 0xff);
1380 buf = pack_hex_byte (buf, (value >> 8) & 0x0ff);
1381 buf = pack_hex_byte (buf, (value & 0xff));
1382 return buf;
1383}
1384
1385static char *
fba45db2 1386unpack_int (char *buf, int *value)
c906108c
SS
1387{
1388 *value = stub_unpack_int (buf, 8);
1389 return buf + 8;
1390}
1391
23860348 1392#if 0 /* Currently unused, uncomment when needed. */
a14ed312 1393static char *pack_string (char *pkt, char *string);
c906108c
SS
1394
1395static char *
fba45db2 1396pack_string (char *pkt, char *string)
c906108c
SS
1397{
1398 char ch;
1399 int len;
1400
1401 len = strlen (string);
1402 if (len > 200)
23860348 1403 len = 200; /* Bigger than most GDB packets, junk??? */
c906108c
SS
1404 pkt = pack_hex_byte (pkt, len);
1405 while (len-- > 0)
1406 {
1407 ch = *string++;
1408 if ((ch == '\0') || (ch == '#'))
23860348 1409 ch = '*'; /* Protect encapsulation. */
c906108c
SS
1410 *pkt++ = ch;
1411 }
1412 return pkt;
1413}
1414#endif /* 0 (unused) */
1415
1416static char *
fba45db2 1417unpack_string (char *src, char *dest, int length)
c906108c
SS
1418{
1419 while (length--)
1420 *dest++ = *src++;
1421 *dest = '\0';
1422 return src;
1423}
1424
1425static char *
fba45db2 1426pack_threadid (char *pkt, threadref *id)
c906108c
SS
1427{
1428 char *limit;
1429 unsigned char *altid;
1430
1431 altid = (unsigned char *) id;
1432 limit = pkt + BUF_THREAD_ID_SIZE;
1433 while (pkt < limit)
1434 pkt = pack_hex_byte (pkt, *altid++);
1435 return pkt;
1436}
1437
1438
1439static char *
fba45db2 1440unpack_threadid (char *inbuf, threadref *id)
c906108c
SS
1441{
1442 char *altref;
1443 char *limit = inbuf + BUF_THREAD_ID_SIZE;
1444 int x, y;
1445
1446 altref = (char *) id;
1447
1448 while (inbuf < limit)
1449 {
1450 x = stubhex (*inbuf++);
1451 y = stubhex (*inbuf++);
1452 *altref++ = (x << 4) | y;
1453 }
1454 return inbuf;
1455}
1456
1457/* Externally, threadrefs are 64 bits but internally, they are still
1458 ints. This is due to a mismatch of specifications. We would like
1459 to use 64bit thread references internally. This is an adapter
1460 function. */
1461
1462void
fba45db2 1463int_to_threadref (threadref *id, int value)
c906108c
SS
1464{
1465 unsigned char *scan;
1466
1467 scan = (unsigned char *) id;
1468 {
1469 int i = 4;
1470 while (i--)
1471 *scan++ = 0;
1472 }
1473 *scan++ = (value >> 24) & 0xff;
1474 *scan++ = (value >> 16) & 0xff;
1475 *scan++ = (value >> 8) & 0xff;
1476 *scan++ = (value & 0xff);
1477}
1478
1479static int
fba45db2 1480threadref_to_int (threadref *ref)
c906108c
SS
1481{
1482 int i, value = 0;
1483 unsigned char *scan;
1484
cfd77fa1 1485 scan = *ref;
c906108c
SS
1486 scan += 4;
1487 i = 4;
1488 while (i-- > 0)
1489 value = (value << 8) | ((*scan++) & 0xff);
1490 return value;
1491}
1492
1493static void
fba45db2 1494copy_threadref (threadref *dest, threadref *src)
c906108c
SS
1495{
1496 int i;
1497 unsigned char *csrc, *cdest;
1498
1499 csrc = (unsigned char *) src;
1500 cdest = (unsigned char *) dest;
1501 i = 8;
1502 while (i--)
1503 *cdest++ = *csrc++;
1504}
1505
1506static int
fba45db2 1507threadmatch (threadref *dest, threadref *src)
c906108c 1508{
23860348 1509 /* Things are broken right now, so just assume we got a match. */
c906108c
SS
1510#if 0
1511 unsigned char *srcp, *destp;
1512 int i, result;
1513 srcp = (char *) src;
1514 destp = (char *) dest;
1515
1516 result = 1;
1517 while (i-- > 0)
1518 result &= (*srcp++ == *destp++) ? 1 : 0;
1519 return result;
1520#endif
1521 return 1;
1522}
1523
1524/*
c5aa993b
JM
1525 threadid:1, # always request threadid
1526 context_exists:2,
1527 display:4,
1528 unique_name:8,
1529 more_display:16
1530 */
c906108c
SS
1531
1532/* Encoding: 'Q':8,'P':8,mask:32,threadid:64 */
1533
1534static char *
fba45db2 1535pack_threadinfo_request (char *pkt, int mode, threadref *id)
c906108c 1536{
23860348
MS
1537 *pkt++ = 'q'; /* Info Query */
1538 *pkt++ = 'P'; /* process or thread info */
1539 pkt = pack_int (pkt, mode); /* mode */
c906108c 1540 pkt = pack_threadid (pkt, id); /* threadid */
23860348 1541 *pkt = '\0'; /* terminate */
c906108c
SS
1542 return pkt;
1543}
1544
23860348 1545/* These values tag the fields in a thread info response packet. */
c906108c 1546/* Tagging the fields allows us to request specific fields and to
23860348 1547 add more fields as time goes by. */
c906108c 1548
23860348 1549#define TAG_THREADID 1 /* Echo the thread identifier. */
c5aa993b 1550#define TAG_EXISTS 2 /* Is this process defined enough to
23860348 1551 fetch registers and its stack? */
c5aa993b 1552#define TAG_DISPLAY 4 /* A short thing maybe to put on a window */
23860348 1553#define TAG_THREADNAME 8 /* string, maps 1-to-1 with a thread is. */
802188a7 1554#define TAG_MOREDISPLAY 16 /* Whatever the kernel wants to say about
23860348 1555 the process. */
c906108c
SS
1556
1557static int
fba45db2
KB
1558remote_unpack_thread_info_response (char *pkt, threadref *expectedref,
1559 struct gdb_ext_thread_info *info)
c906108c 1560{
d01949b6 1561 struct remote_state *rs = get_remote_state ();
c906108c 1562 int mask, length;
cfd77fa1 1563 int tag;
c906108c 1564 threadref ref;
6d820c5c 1565 char *limit = pkt + rs->buf_size; /* Plausible parsing limit. */
c906108c
SS
1566 int retval = 1;
1567
23860348 1568 /* info->threadid = 0; FIXME: implement zero_threadref. */
c906108c
SS
1569 info->active = 0;
1570 info->display[0] = '\0';
1571 info->shortname[0] = '\0';
1572 info->more_display[0] = '\0';
1573
23860348
MS
1574 /* Assume the characters indicating the packet type have been
1575 stripped. */
c906108c
SS
1576 pkt = unpack_int (pkt, &mask); /* arg mask */
1577 pkt = unpack_threadid (pkt, &ref);
1578
1579 if (mask == 0)
8a3fe4f8 1580 warning (_("Incomplete response to threadinfo request."));
c906108c 1581 if (!threadmatch (&ref, expectedref))
23860348 1582 { /* This is an answer to a different request. */
8a3fe4f8 1583 warning (_("ERROR RMT Thread info mismatch."));
c906108c
SS
1584 return 0;
1585 }
1586 copy_threadref (&info->threadid, &ref);
1587
23860348 1588 /* Loop on tagged fields , try to bail if somthing goes wrong. */
c906108c 1589
23860348
MS
1590 /* Packets are terminated with nulls. */
1591 while ((pkt < limit) && mask && *pkt)
c906108c
SS
1592 {
1593 pkt = unpack_int (pkt, &tag); /* tag */
23860348
MS
1594 pkt = unpack_byte (pkt, &length); /* length */
1595 if (!(tag & mask)) /* Tags out of synch with mask. */
c906108c 1596 {
8a3fe4f8 1597 warning (_("ERROR RMT: threadinfo tag mismatch."));
c906108c
SS
1598 retval = 0;
1599 break;
1600 }
1601 if (tag == TAG_THREADID)
1602 {
1603 if (length != 16)
1604 {
8a3fe4f8 1605 warning (_("ERROR RMT: length of threadid is not 16."));
c906108c
SS
1606 retval = 0;
1607 break;
1608 }
1609 pkt = unpack_threadid (pkt, &ref);
1610 mask = mask & ~TAG_THREADID;
1611 continue;
1612 }
1613 if (tag == TAG_EXISTS)
1614 {
1615 info->active = stub_unpack_int (pkt, length);
1616 pkt += length;
1617 mask = mask & ~(TAG_EXISTS);
1618 if (length > 8)
1619 {
8a3fe4f8 1620 warning (_("ERROR RMT: 'exists' length too long."));
c906108c
SS
1621 retval = 0;
1622 break;
1623 }
1624 continue;
1625 }
1626 if (tag == TAG_THREADNAME)
1627 {
1628 pkt = unpack_string (pkt, &info->shortname[0], length);
1629 mask = mask & ~TAG_THREADNAME;
1630 continue;
1631 }
1632 if (tag == TAG_DISPLAY)
1633 {
1634 pkt = unpack_string (pkt, &info->display[0], length);
1635 mask = mask & ~TAG_DISPLAY;
1636 continue;
1637 }
1638 if (tag == TAG_MOREDISPLAY)
1639 {
1640 pkt = unpack_string (pkt, &info->more_display[0], length);
1641 mask = mask & ~TAG_MOREDISPLAY;
1642 continue;
1643 }
8a3fe4f8 1644 warning (_("ERROR RMT: unknown thread info tag."));
23860348 1645 break; /* Not a tag we know about. */
c906108c
SS
1646 }
1647 return retval;
1648}
1649
1650static int
fba45db2
KB
1651remote_get_threadinfo (threadref *threadid, int fieldset, /* TAG mask */
1652 struct gdb_ext_thread_info *info)
c906108c 1653{
d01949b6 1654 struct remote_state *rs = get_remote_state ();
c906108c 1655 int result;
c906108c 1656
2e9f7625
DJ
1657 pack_threadinfo_request (rs->buf, fieldset, threadid);
1658 putpkt (rs->buf);
6d820c5c 1659 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 1660 result = remote_unpack_thread_info_response (rs->buf + 2,
23860348 1661 threadid, info);
c906108c
SS
1662 return result;
1663}
1664
c906108c
SS
1665/* Format: i'Q':8,i"L":8,initflag:8,batchsize:16,lastthreadid:32 */
1666
1667static char *
fba45db2
KB
1668pack_threadlist_request (char *pkt, int startflag, int threadcount,
1669 threadref *nextthread)
c906108c
SS
1670{
1671 *pkt++ = 'q'; /* info query packet */
1672 *pkt++ = 'L'; /* Process LIST or threadLIST request */
23860348 1673 pkt = pack_nibble (pkt, startflag); /* initflag 1 bytes */
c906108c
SS
1674 pkt = pack_hex_byte (pkt, threadcount); /* threadcount 2 bytes */
1675 pkt = pack_threadid (pkt, nextthread); /* 64 bit thread identifier */
1676 *pkt = '\0';
1677 return pkt;
1678}
1679
1680/* Encoding: 'q':8,'M':8,count:16,done:8,argthreadid:64,(threadid:64)* */
1681
1682static int
fba45db2
KB
1683parse_threadlist_response (char *pkt, int result_limit,
1684 threadref *original_echo, threadref *resultlist,
1685 int *doneflag)
c906108c 1686{
d01949b6 1687 struct remote_state *rs = get_remote_state ();
c906108c
SS
1688 char *limit;
1689 int count, resultcount, done;
1690
1691 resultcount = 0;
1692 /* Assume the 'q' and 'M chars have been stripped. */
6d820c5c 1693 limit = pkt + (rs->buf_size - BUF_THREAD_ID_SIZE);
23860348 1694 /* done parse past here */
c906108c
SS
1695 pkt = unpack_byte (pkt, &count); /* count field */
1696 pkt = unpack_nibble (pkt, &done);
1697 /* The first threadid is the argument threadid. */
1698 pkt = unpack_threadid (pkt, original_echo); /* should match query packet */
1699 while ((count-- > 0) && (pkt < limit))
1700 {
1701 pkt = unpack_threadid (pkt, resultlist++);
1702 if (resultcount++ >= result_limit)
1703 break;
1704 }
1705 if (doneflag)
1706 *doneflag = done;
1707 return resultcount;
1708}
1709
1710static int
fba45db2
KB
1711remote_get_threadlist (int startflag, threadref *nextthread, int result_limit,
1712 int *done, int *result_count, threadref *threadlist)
c906108c 1713{
d01949b6 1714 struct remote_state *rs = get_remote_state ();
c906108c 1715 static threadref echo_nextthread;
c906108c
SS
1716 int result = 1;
1717
23860348 1718 /* Trancate result limit to be smaller than the packet size. */
ea9c271d
DJ
1719 if ((((result_limit + 1) * BUF_THREAD_ID_SIZE) + 10) >= get_remote_packet_size ())
1720 result_limit = (get_remote_packet_size () / BUF_THREAD_ID_SIZE) - 2;
c906108c 1721
6d820c5c
DJ
1722 pack_threadlist_request (rs->buf, startflag, result_limit, nextthread);
1723 putpkt (rs->buf);
1724 getpkt (&rs->buf, &rs->buf_size, 0);
c906108c
SS
1725
1726 *result_count =
6d820c5c 1727 parse_threadlist_response (rs->buf + 2, result_limit, &echo_nextthread,
c906108c
SS
1728 threadlist, done);
1729
1730 if (!threadmatch (&echo_nextthread, nextthread))
1731 {
23860348
MS
1732 /* FIXME: This is a good reason to drop the packet. */
1733 /* Possably, there is a duplicate response. */
c906108c
SS
1734 /* Possabilities :
1735 retransmit immediatly - race conditions
1736 retransmit after timeout - yes
1737 exit
1738 wait for packet, then exit
1739 */
8a3fe4f8 1740 warning (_("HMM: threadlist did not echo arg thread, dropping it."));
23860348 1741 return 0; /* I choose simply exiting. */
c906108c
SS
1742 }
1743 if (*result_count <= 0)
1744 {
1745 if (*done != 1)
1746 {
8a3fe4f8 1747 warning (_("RMT ERROR : failed to get remote thread list."));
c906108c
SS
1748 result = 0;
1749 }
1750 return result; /* break; */
1751 }
1752 if (*result_count > result_limit)
1753 {
1754 *result_count = 0;
8a3fe4f8 1755 warning (_("RMT ERROR: threadlist response longer than requested."));
c906108c
SS
1756 return 0;
1757 }
1758 return result;
1759}
1760
23860348
MS
1761/* This is the interface between remote and threads, remotes upper
1762 interface. */
c906108c
SS
1763
1764/* remote_find_new_threads retrieves the thread list and for each
1765 thread in the list, looks up the thread in GDB's internal list,
1766 ading the thread if it does not already exist. This involves
1767 getting partial thread lists from the remote target so, polling the
1768 quit_flag is required. */
1769
1770
23860348 1771/* About this many threadisds fit in a packet. */
c906108c
SS
1772
1773#define MAXTHREADLISTRESULTS 32
1774
1775static int
fba45db2
KB
1776remote_threadlist_iterator (rmt_thread_action stepfunction, void *context,
1777 int looplimit)
c906108c
SS
1778{
1779 int done, i, result_count;
1780 int startflag = 1;
1781 int result = 1;
1782 int loopcount = 0;
1783 static threadref nextthread;
1784 static threadref resultthreadlist[MAXTHREADLISTRESULTS];
1785
1786 done = 0;
1787 while (!done)
1788 {
1789 if (loopcount++ > looplimit)
1790 {
1791 result = 0;
8a3fe4f8 1792 warning (_("Remote fetch threadlist -infinite loop-."));
c906108c
SS
1793 break;
1794 }
1795 if (!remote_get_threadlist (startflag, &nextthread, MAXTHREADLISTRESULTS,
1796 &done, &result_count, resultthreadlist))
1797 {
1798 result = 0;
1799 break;
1800 }
23860348 1801 /* Clear for later iterations. */
c906108c
SS
1802 startflag = 0;
1803 /* Setup to resume next batch of thread references, set nextthread. */
1804 if (result_count >= 1)
1805 copy_threadref (&nextthread, &resultthreadlist[result_count - 1]);
1806 i = 0;
1807 while (result_count--)
1808 if (!(result = (*stepfunction) (&resultthreadlist[i++], context)))
1809 break;
1810 }
1811 return result;
1812}
1813
1814static int
fba45db2 1815remote_newthread_step (threadref *ref, void *context)
c906108c 1816{
39f77062 1817 ptid_t ptid;
c906108c 1818
39f77062
KB
1819 ptid = pid_to_ptid (threadref_to_int (ref));
1820
1821 if (!in_thread_list (ptid))
1822 add_thread (ptid);
c906108c
SS
1823 return 1; /* continue iterator */
1824}
1825
1826#define CRAZY_MAX_THREADS 1000
1827
39f77062
KB
1828static ptid_t
1829remote_current_thread (ptid_t oldpid)
c906108c 1830{
d01949b6 1831 struct remote_state *rs = get_remote_state ();
c906108c
SS
1832
1833 putpkt ("qC");
6d820c5c 1834 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 1835 if (rs->buf[0] == 'Q' && rs->buf[1] == 'C')
c273b20f
JB
1836 /* Use strtoul here, so we'll correctly parse values whose highest
1837 bit is set. The protocol carries them as a simple series of
1838 hex digits; in the absence of a sign, strtol will see such
1839 values as positive numbers out of range for signed 'long', and
1840 return LONG_MAX to indicate an overflow. */
2e9f7625 1841 return pid_to_ptid (strtoul (&rs->buf[2], NULL, 16));
c906108c
SS
1842 else
1843 return oldpid;
1844}
1845
802188a7
RM
1846/* Find new threads for info threads command.
1847 * Original version, using John Metzler's thread protocol.
9d1f7ab2 1848 */
cce74817
JM
1849
1850static void
fba45db2 1851remote_find_new_threads (void)
c906108c 1852{
c5aa993b
JM
1853 remote_threadlist_iterator (remote_newthread_step, 0,
1854 CRAZY_MAX_THREADS);
39f77062
KB
1855 if (PIDGET (inferior_ptid) == MAGIC_NULL_PID) /* ack ack ack */
1856 inferior_ptid = remote_current_thread (inferior_ptid);
c906108c
SS
1857}
1858
9d1f7ab2
MS
1859/*
1860 * Find all threads for info threads command.
1861 * Uses new thread protocol contributed by Cisco.
1862 * Falls back and attempts to use the older method (above)
1863 * if the target doesn't respond to the new method.
1864 */
1865
0f71a2f6
JM
1866static void
1867remote_threads_info (void)
1868{
d01949b6 1869 struct remote_state *rs = get_remote_state ();
085dd6e6 1870 char *bufp;
0f71a2f6
JM
1871 int tid;
1872
1873 if (remote_desc == 0) /* paranoia */
8a3fe4f8 1874 error (_("Command can only be used when connected to the remote target."));
0f71a2f6 1875
9d1f7ab2
MS
1876 if (use_threadinfo_query)
1877 {
1878 putpkt ("qfThreadInfo");
6d820c5c 1879 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 1880 bufp = rs->buf;
9d1f7ab2 1881 if (bufp[0] != '\0') /* q packet recognized */
802188a7 1882 {
9d1f7ab2
MS
1883 while (*bufp++ == 'm') /* reply contains one or more TID */
1884 {
1885 do
1886 {
c273b20f
JB
1887 /* Use strtoul here, so we'll correctly parse values
1888 whose highest bit is set. The protocol carries
1889 them as a simple series of hex digits; in the
1890 absence of a sign, strtol will see such values as
1891 positive numbers out of range for signed 'long',
1892 and return LONG_MAX to indicate an overflow. */
1893 tid = strtoul (bufp, &bufp, 16);
39f77062
KB
1894 if (tid != 0 && !in_thread_list (pid_to_ptid (tid)))
1895 add_thread (pid_to_ptid (tid));
9d1f7ab2
MS
1896 }
1897 while (*bufp++ == ','); /* comma-separated list */
1898 putpkt ("qsThreadInfo");
6d820c5c 1899 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 1900 bufp = rs->buf;
9d1f7ab2
MS
1901 }
1902 return; /* done */
1903 }
1904 }
1905
23860348 1906 /* Else fall back to old method based on jmetzler protocol. */
9d1f7ab2
MS
1907 use_threadinfo_query = 0;
1908 remote_find_new_threads ();
1909 return;
1910}
1911
802188a7 1912/*
9d1f7ab2
MS
1913 * Collect a descriptive string about the given thread.
1914 * The target may say anything it wants to about the thread
1915 * (typically info about its blocked / runnable state, name, etc.).
1916 * This string will appear in the info threads display.
802188a7 1917 *
9d1f7ab2
MS
1918 * Optional: targets are not required to implement this function.
1919 */
1920
1921static char *
1922remote_threads_extra_info (struct thread_info *tp)
1923{
d01949b6 1924 struct remote_state *rs = get_remote_state ();
9d1f7ab2
MS
1925 int result;
1926 int set;
1927 threadref id;
1928 struct gdb_ext_thread_info threadinfo;
23860348 1929 static char display_buf[100]; /* arbitrary... */
9d1f7ab2
MS
1930 int n = 0; /* position in display_buf */
1931
1932 if (remote_desc == 0) /* paranoia */
8e65ff28 1933 internal_error (__FILE__, __LINE__,
e2e0b3e5 1934 _("remote_threads_extra_info"));
9d1f7ab2
MS
1935
1936 if (use_threadextra_query)
1937 {
2e9f7625 1938 xsnprintf (rs->buf, get_remote_packet_size (), "qThreadExtraInfo,%x",
ecbc58df 1939 PIDGET (tp->ptid));
2e9f7625 1940 putpkt (rs->buf);
6d820c5c 1941 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 1942 if (rs->buf[0] != 0)
9d1f7ab2 1943 {
2e9f7625
DJ
1944 n = min (strlen (rs->buf) / 2, sizeof (display_buf));
1945 result = hex2bin (rs->buf, (gdb_byte *) display_buf, n);
30559e10 1946 display_buf [result] = '\0';
9d1f7ab2
MS
1947 return display_buf;
1948 }
0f71a2f6 1949 }
9d1f7ab2
MS
1950
1951 /* If the above query fails, fall back to the old method. */
1952 use_threadextra_query = 0;
1953 set = TAG_THREADID | TAG_EXISTS | TAG_THREADNAME
1954 | TAG_MOREDISPLAY | TAG_DISPLAY;
39f77062 1955 int_to_threadref (&id, PIDGET (tp->ptid));
9d1f7ab2
MS
1956 if (remote_get_threadinfo (&id, set, &threadinfo))
1957 if (threadinfo.active)
0f71a2f6 1958 {
9d1f7ab2 1959 if (*threadinfo.shortname)
2bc416ba 1960 n += xsnprintf (&display_buf[0], sizeof (display_buf) - n,
ecbc58df 1961 " Name: %s,", threadinfo.shortname);
9d1f7ab2 1962 if (*threadinfo.display)
2bc416ba 1963 n += xsnprintf (&display_buf[n], sizeof (display_buf) - n,
ecbc58df 1964 " State: %s,", threadinfo.display);
9d1f7ab2 1965 if (*threadinfo.more_display)
2bc416ba 1966 n += xsnprintf (&display_buf[n], sizeof (display_buf) - n,
ecbc58df 1967 " Priority: %s", threadinfo.more_display);
9d1f7ab2
MS
1968
1969 if (n > 0)
c5aa993b 1970 {
23860348 1971 /* For purely cosmetic reasons, clear up trailing commas. */
9d1f7ab2
MS
1972 if (',' == display_buf[n-1])
1973 display_buf[n-1] = ' ';
1974 return display_buf;
c5aa993b 1975 }
0f71a2f6 1976 }
9d1f7ab2 1977 return NULL;
0f71a2f6 1978}
c906108c 1979\f
c5aa993b 1980
24b06219 1981/* Restart the remote side; this is an extended protocol operation. */
c906108c
SS
1982
1983static void
fba45db2 1984extended_remote_restart (void)
c906108c 1985{
d01949b6 1986 struct remote_state *rs = get_remote_state ();
c906108c
SS
1987
1988 /* Send the restart command; for reasons I don't understand the
1989 remote side really expects a number after the "R". */
ea9c271d 1990 xsnprintf (rs->buf, get_remote_packet_size (), "R%x", 0);
6d820c5c 1991 putpkt (rs->buf);
c906108c 1992
ad9a8f3f 1993 remote_fileio_reset ();
2bc416ba 1994
c906108c
SS
1995 /* Now query for status so this looks just like we restarted
1996 gdbserver from scratch. */
1997 putpkt ("?");
01d3a6ce 1998 getpkt (&rs->buf, &rs->buf_size, 0);
c906108c
SS
1999}
2000\f
2001/* Clean up connection to a remote debugger. */
2002
c906108c 2003static void
fba45db2 2004remote_close (int quitting)
c906108c
SS
2005{
2006 if (remote_desc)
2cd58942 2007 serial_close (remote_desc);
c906108c
SS
2008 remote_desc = NULL;
2009}
2010
23860348 2011/* Query the remote side for the text, data and bss offsets. */
c906108c
SS
2012
2013static void
fba45db2 2014get_offsets (void)
c906108c 2015{
d01949b6 2016 struct remote_state *rs = get_remote_state ();
2e9f7625 2017 char *buf;
085dd6e6 2018 char *ptr;
c906108c
SS
2019 int lose;
2020 CORE_ADDR text_addr, data_addr, bss_addr;
2021 struct section_offsets *offs;
2022
2023 putpkt ("qOffsets");
6d820c5c 2024 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 2025 buf = rs->buf;
c906108c
SS
2026
2027 if (buf[0] == '\000')
2028 return; /* Return silently. Stub doesn't support
23860348 2029 this command. */
c906108c
SS
2030 if (buf[0] == 'E')
2031 {
8a3fe4f8 2032 warning (_("Remote failure reply: %s"), buf);
c906108c
SS
2033 return;
2034 }
2035
2036 /* Pick up each field in turn. This used to be done with scanf, but
2037 scanf will make trouble if CORE_ADDR size doesn't match
2038 conversion directives correctly. The following code will work
2039 with any size of CORE_ADDR. */
2040 text_addr = data_addr = bss_addr = 0;
2041 ptr = buf;
2042 lose = 0;
2043
2044 if (strncmp (ptr, "Text=", 5) == 0)
2045 {
2046 ptr += 5;
2047 /* Don't use strtol, could lose on big values. */
2048 while (*ptr && *ptr != ';')
2049 text_addr = (text_addr << 4) + fromhex (*ptr++);
2050 }
2051 else
2052 lose = 1;
2053
2054 if (!lose && strncmp (ptr, ";Data=", 6) == 0)
2055 {
2056 ptr += 6;
2057 while (*ptr && *ptr != ';')
2058 data_addr = (data_addr << 4) + fromhex (*ptr++);
2059 }
2060 else
2061 lose = 1;
2062
2063 if (!lose && strncmp (ptr, ";Bss=", 5) == 0)
2064 {
2065 ptr += 5;
2066 while (*ptr && *ptr != ';')
2067 bss_addr = (bss_addr << 4) + fromhex (*ptr++);
2068 }
2069 else
2070 lose = 1;
2071
2072 if (lose)
8a3fe4f8 2073 error (_("Malformed response to offset query, %s"), buf);
c906108c
SS
2074
2075 if (symfile_objfile == NULL)
2076 return;
2077
802188a7 2078 offs = ((struct section_offsets *)
a39a16c4 2079 alloca (SIZEOF_N_SECTION_OFFSETS (symfile_objfile->num_sections)));
802188a7 2080 memcpy (offs, symfile_objfile->section_offsets,
a39a16c4 2081 SIZEOF_N_SECTION_OFFSETS (symfile_objfile->num_sections));
c906108c 2082
a4c8257b 2083 offs->offsets[SECT_OFF_TEXT (symfile_objfile)] = text_addr;
c906108c
SS
2084
2085 /* This is a temporary kludge to force data and bss to use the same offsets
2086 because that's what nlmconv does now. The real solution requires changes
2087 to the stub and remote.c that I don't have time to do right now. */
2088
a4c8257b
EZ
2089 offs->offsets[SECT_OFF_DATA (symfile_objfile)] = data_addr;
2090 offs->offsets[SECT_OFF_BSS (symfile_objfile)] = data_addr;
c906108c
SS
2091
2092 objfile_relocate (symfile_objfile, offs);
2093}
2094
8621d6a9 2095/* Stub for catch_exception. */
0f71a2f6 2096
9cbc821d 2097static void
8621d6a9 2098remote_start_remote (struct ui_out *uiout, void *from_tty_p)
c906108c 2099{
8621d6a9
DJ
2100 int from_tty = * (int *) from_tty_p;
2101
23860348 2102 immediate_quit++; /* Allow user to interrupt it. */
c906108c
SS
2103
2104 /* Ack any packet which the remote side has already sent. */
2cd58942 2105 serial_write (remote_desc, "+", 1);
c906108c
SS
2106
2107 /* Let the stub know that we want it to return the thread. */
2108 set_thread (-1, 0);
2109
39f77062 2110 inferior_ptid = remote_current_thread (inferior_ptid);
c906108c 2111
23860348 2112 get_offsets (); /* Get text, data & bss offsets. */
c906108c 2113
23860348 2114 putpkt ("?"); /* Initiate a query from remote machine. */
8edbea78 2115 immediate_quit--;
c906108c 2116
8621d6a9 2117 start_remote (from_tty); /* Initialize gdb process mechanisms. */
c906108c
SS
2118}
2119
2120/* Open a connection to a remote debugger.
2121 NAME is the filename used for communication. */
2122
2123static void
fba45db2 2124remote_open (char *name, int from_tty)
c906108c 2125{
92d1e331 2126 remote_open_1 (name, from_tty, &remote_ops, 0, 0);
c906108c
SS
2127}
2128
23860348 2129/* Just like remote_open, but with asynchronous support. */
43ff13b4 2130static void
fba45db2 2131remote_async_open (char *name, int from_tty)
43ff13b4 2132{
92d1e331 2133 remote_open_1 (name, from_tty, &remote_async_ops, 0, 1);
43ff13b4
JM
2134}
2135
c906108c
SS
2136/* Open a connection to a remote debugger using the extended
2137 remote gdb protocol. NAME is the filename used for communication. */
2138
2139static void
fba45db2 2140extended_remote_open (char *name, int from_tty)
c906108c 2141{
92d1e331
DJ
2142 remote_open_1 (name, from_tty, &extended_remote_ops, 1 /*extended_p */,
2143 0 /* async_p */);
c906108c
SS
2144}
2145
23860348 2146/* Just like extended_remote_open, but with asynchronous support. */
43ff13b4 2147static void
fba45db2 2148extended_remote_async_open (char *name, int from_tty)
43ff13b4 2149{
92d1e331
DJ
2150 remote_open_1 (name, from_tty, &extended_async_remote_ops,
2151 1 /*extended_p */, 1 /* async_p */);
43ff13b4
JM
2152}
2153
c906108c
SS
2154/* Generic code for opening a connection to a remote target. */
2155
d471ea57
AC
2156static void
2157init_all_packet_configs (void)
2158{
2159 int i;
444abaca
DJ
2160 for (i = 0; i < PACKET_MAX; i++)
2161 update_packet_config (&remote_protocol_packets[i]);
d471ea57
AC
2162}
2163
23860348 2164/* Symbol look-up. */
dc8acb97
MS
2165
2166static void
2167remote_check_symbols (struct objfile *objfile)
2168{
d01949b6 2169 struct remote_state *rs = get_remote_state ();
dc8acb97
MS
2170 char *msg, *reply, *tmp;
2171 struct minimal_symbol *sym;
2172 int end;
2173
444abaca 2174 if (remote_protocol_packets[PACKET_qSymbol].support == PACKET_DISABLE)
dc8acb97
MS
2175 return;
2176
6d820c5c
DJ
2177 /* Allocate a message buffer. We can't reuse the input buffer in RS,
2178 because we need both at the same time. */
ea9c271d 2179 msg = alloca (get_remote_packet_size ());
6d820c5c 2180
23860348 2181 /* Invite target to request symbol lookups. */
dc8acb97
MS
2182
2183 putpkt ("qSymbol::");
6d820c5c
DJ
2184 getpkt (&rs->buf, &rs->buf_size, 0);
2185 packet_ok (rs->buf, &remote_protocol_packets[PACKET_qSymbol]);
2e9f7625 2186 reply = rs->buf;
dc8acb97
MS
2187
2188 while (strncmp (reply, "qSymbol:", 8) == 0)
2189 {
2190 tmp = &reply[8];
cfd77fa1 2191 end = hex2bin (tmp, (gdb_byte *) msg, strlen (tmp) / 2);
dc8acb97
MS
2192 msg[end] = '\0';
2193 sym = lookup_minimal_symbol (msg, NULL, NULL);
2194 if (sym == NULL)
ea9c271d 2195 xsnprintf (msg, get_remote_packet_size (), "qSymbol::%s", &reply[8]);
dc8acb97 2196 else
ea9c271d 2197 xsnprintf (msg, get_remote_packet_size (), "qSymbol:%s:%s",
ecbc58df
WZ
2198 paddr_nz (SYMBOL_VALUE_ADDRESS (sym)),
2199 &reply[8]);
dc8acb97 2200 putpkt (msg);
6d820c5c 2201 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 2202 reply = rs->buf;
dc8acb97
MS
2203 }
2204}
2205
9db8d71f
DJ
2206static struct serial *
2207remote_serial_open (char *name)
2208{
2209 static int udp_warning = 0;
2210
2211 /* FIXME: Parsing NAME here is a hack. But we want to warn here instead
2212 of in ser-tcp.c, because it is the remote protocol assuming that the
2213 serial connection is reliable and not the serial connection promising
2214 to be. */
2215 if (!udp_warning && strncmp (name, "udp:", 4) == 0)
2216 {
8a3fe4f8
AC
2217 warning (_("\
2218The remote protocol may be unreliable over UDP.\n\
2219Some events may be lost, rendering further debugging impossible."));
9db8d71f
DJ
2220 udp_warning = 1;
2221 }
2222
2223 return serial_open (name);
2224}
2225
be2a5f71
DJ
2226/* This type describes each known response to the qSupported
2227 packet. */
2228struct protocol_feature
2229{
2230 /* The name of this protocol feature. */
2231 const char *name;
2232
2233 /* The default for this protocol feature. */
2234 enum packet_support default_support;
2235
2236 /* The function to call when this feature is reported, or after
2237 qSupported processing if the feature is not supported.
2238 The first argument points to this structure. The second
2239 argument indicates whether the packet requested support be
2240 enabled, disabled, or probed (or the default, if this function
2241 is being called at the end of processing and this feature was
2242 not reported). The third argument may be NULL; if not NULL, it
2243 is a NUL-terminated string taken from the packet following
2244 this feature's name and an equals sign. */
2245 void (*func) (const struct protocol_feature *, enum packet_support,
2246 const char *);
2247
2248 /* The corresponding packet for this feature. Only used if
2249 FUNC is remote_supported_packet. */
2250 int packet;
2251};
2252
be2a5f71
DJ
2253static void
2254remote_supported_packet (const struct protocol_feature *feature,
2255 enum packet_support support,
2256 const char *argument)
2257{
2258 if (argument)
2259 {
2260 warning (_("Remote qSupported response supplied an unexpected value for"
2261 " \"%s\"."), feature->name);
2262 return;
2263 }
2264
2265 if (remote_protocol_packets[feature->packet].support
2266 == PACKET_SUPPORT_UNKNOWN)
2267 remote_protocol_packets[feature->packet].support = support;
2268}
be2a5f71
DJ
2269
2270static void
2271remote_packet_size (const struct protocol_feature *feature,
2272 enum packet_support support, const char *value)
2273{
2274 struct remote_state *rs = get_remote_state ();
2275
2276 int packet_size;
2277 char *value_end;
2278
2279 if (support != PACKET_ENABLE)
2280 return;
2281
2282 if (value == NULL || *value == '\0')
2283 {
2284 warning (_("Remote target reported \"%s\" without a size."),
2285 feature->name);
2286 return;
2287 }
2288
2289 errno = 0;
2290 packet_size = strtol (value, &value_end, 16);
2291 if (errno != 0 || *value_end != '\0' || packet_size < 0)
2292 {
2293 warning (_("Remote target reported \"%s\" with a bad size: \"%s\"."),
2294 feature->name, value);
2295 return;
2296 }
2297
2298 if (packet_size > MAX_REMOTE_PACKET_SIZE)
2299 {
2300 warning (_("limiting remote suggested packet size (%d bytes) to %d"),
2301 packet_size, MAX_REMOTE_PACKET_SIZE);
2302 packet_size = MAX_REMOTE_PACKET_SIZE;
2303 }
2304
2305 /* Record the new maximum packet size. */
2306 rs->explicit_packet_size = packet_size;
2307}
2308
2309static struct protocol_feature remote_protocol_features[] = {
0876f84a 2310 { "PacketSize", PACKET_DISABLE, remote_packet_size, -1 },
40e57cf2 2311 { "qXfer:auxv:read", PACKET_DISABLE, remote_supported_packet,
fd79ecee 2312 PACKET_qXfer_auxv },
23181151
DJ
2313 { "qXfer:features:read", PACKET_DISABLE, remote_supported_packet,
2314 PACKET_qXfer_features },
fd79ecee 2315 { "qXfer:memory-map:read", PACKET_DISABLE, remote_supported_packet,
89be2091 2316 PACKET_qXfer_memory_map },
4de6483e
UW
2317 { "qXfer:spu:read", PACKET_DISABLE, remote_supported_packet,
2318 PACKET_qXfer_spu_read },
2319 { "qXfer:spu:write", PACKET_DISABLE, remote_supported_packet,
2320 PACKET_qXfer_spu_write },
89be2091
DJ
2321 { "QPassSignals", PACKET_DISABLE, remote_supported_packet,
2322 PACKET_QPassSignals },
be2a5f71
DJ
2323};
2324
2325static void
2326remote_query_supported (void)
2327{
2328 struct remote_state *rs = get_remote_state ();
2329 char *next;
2330 int i;
2331 unsigned char seen [ARRAY_SIZE (remote_protocol_features)];
2332
2333 /* The packet support flags are handled differently for this packet
2334 than for most others. We treat an error, a disabled packet, and
2335 an empty response identically: any features which must be reported
2336 to be used will be automatically disabled. An empty buffer
2337 accomplishes this, since that is also the representation for a list
2338 containing no features. */
2339
2340 rs->buf[0] = 0;
2341 if (remote_protocol_packets[PACKET_qSupported].support != PACKET_DISABLE)
2342 {
2343 putpkt ("qSupported");
2344 getpkt (&rs->buf, &rs->buf_size, 0);
2345
2346 /* If an error occured, warn, but do not return - just reset the
2347 buffer to empty and go on to disable features. */
2348 if (packet_ok (rs->buf, &remote_protocol_packets[PACKET_qSupported])
2349 == PACKET_ERROR)
2350 {
2351 warning (_("Remote failure reply: %s"), rs->buf);
2352 rs->buf[0] = 0;
2353 }
2354 }
2355
2356 memset (seen, 0, sizeof (seen));
2357
2358 next = rs->buf;
2359 while (*next)
2360 {
2361 enum packet_support is_supported;
2362 char *p, *end, *name_end, *value;
2363
2364 /* First separate out this item from the rest of the packet. If
2365 there's another item after this, we overwrite the separator
2366 (terminated strings are much easier to work with). */
2367 p = next;
2368 end = strchr (p, ';');
2369 if (end == NULL)
2370 {
2371 end = p + strlen (p);
2372 next = end;
2373 }
2374 else
2375 {
89be2091
DJ
2376 *end = '\0';
2377 next = end + 1;
2378
be2a5f71
DJ
2379 if (end == p)
2380 {
2381 warning (_("empty item in \"qSupported\" response"));
2382 continue;
2383 }
be2a5f71
DJ
2384 }
2385
2386 name_end = strchr (p, '=');
2387 if (name_end)
2388 {
2389 /* This is a name=value entry. */
2390 is_supported = PACKET_ENABLE;
2391 value = name_end + 1;
2392 *name_end = '\0';
2393 }
2394 else
2395 {
2396 value = NULL;
2397 switch (end[-1])
2398 {
2399 case '+':
2400 is_supported = PACKET_ENABLE;
2401 break;
2402
2403 case '-':
2404 is_supported = PACKET_DISABLE;
2405 break;
2406
2407 case '?':
2408 is_supported = PACKET_SUPPORT_UNKNOWN;
2409 break;
2410
2411 default:
2412 warning (_("unrecognized item \"%s\" in \"qSupported\" response"), p);
2413 continue;
2414 }
2415 end[-1] = '\0';
2416 }
2417
2418 for (i = 0; i < ARRAY_SIZE (remote_protocol_features); i++)
2419 if (strcmp (remote_protocol_features[i].name, p) == 0)
2420 {
2421 const struct protocol_feature *feature;
2422
2423 seen[i] = 1;
2424 feature = &remote_protocol_features[i];
2425 feature->func (feature, is_supported, value);
2426 break;
2427 }
2428 }
2429
2430 /* If we increased the packet size, make sure to increase the global
2431 buffer size also. We delay this until after parsing the entire
2432 qSupported packet, because this is the same buffer we were
2433 parsing. */
2434 if (rs->buf_size < rs->explicit_packet_size)
2435 {
2436 rs->buf_size = rs->explicit_packet_size;
2437 rs->buf = xrealloc (rs->buf, rs->buf_size);
2438 }
2439
2440 /* Handle the defaults for unmentioned features. */
2441 for (i = 0; i < ARRAY_SIZE (remote_protocol_features); i++)
2442 if (!seen[i])
2443 {
2444 const struct protocol_feature *feature;
2445
2446 feature = &remote_protocol_features[i];
2447 feature->func (feature, feature->default_support, NULL);
2448 }
2449}
2450
2451
c906108c 2452static void
fba45db2 2453remote_open_1 (char *name, int from_tty, struct target_ops *target,
92d1e331 2454 int extended_p, int async_p)
c906108c 2455{
d01949b6 2456 struct remote_state *rs = get_remote_state ();
c906108c 2457 if (name == 0)
8a3fe4f8 2458 error (_("To open a remote debug connection, you need to specify what\n"
22e04375 2459 "serial device is attached to the remote system\n"
8a3fe4f8 2460 "(e.g. /dev/ttyS0, /dev/ttya, COM1, etc.)."));
c906108c 2461
23860348 2462 /* See FIXME above. */
92d1e331
DJ
2463 if (!async_p)
2464 wait_forever_enabled_p = 1;
6426a772 2465
c906108c
SS
2466 target_preopen (from_tty);
2467
2468 unpush_target (target);
2469
89be2091
DJ
2470 /* Make sure we send the passed signals list the next time we resume. */
2471 xfree (last_pass_packet);
2472 last_pass_packet = NULL;
2473
ad9a8f3f 2474 remote_fileio_reset ();
1dd41f16
NS
2475 reopen_exec_file ();
2476 reread_symbols ();
2477
9db8d71f 2478 remote_desc = remote_serial_open (name);
c906108c
SS
2479 if (!remote_desc)
2480 perror_with_name (name);
2481
2482 if (baud_rate != -1)
2483 {
2cd58942 2484 if (serial_setbaudrate (remote_desc, baud_rate))
c906108c 2485 {
9b74d5d3
KB
2486 /* The requested speed could not be set. Error out to
2487 top level after closing remote_desc. Take care to
2488 set remote_desc to NULL to avoid closing remote_desc
2489 more than once. */
2cd58942 2490 serial_close (remote_desc);
9b74d5d3 2491 remote_desc = NULL;
c906108c
SS
2492 perror_with_name (name);
2493 }
2494 }
2495
2cd58942 2496 serial_raw (remote_desc);
c906108c
SS
2497
2498 /* If there is something sitting in the buffer we might take it as a
2499 response to a command, which would be bad. */
2cd58942 2500 serial_flush_input (remote_desc);
c906108c
SS
2501
2502 if (from_tty)
2503 {
2504 puts_filtered ("Remote debugging using ");
2505 puts_filtered (name);
2506 puts_filtered ("\n");
2507 }
23860348 2508 push_target (target); /* Switch to using remote target now. */
c906108c 2509
be2a5f71
DJ
2510 /* Reset the target state; these things will be queried either by
2511 remote_query_supported or as they are needed. */
d471ea57 2512 init_all_packet_configs ();
be2a5f71 2513 rs->explicit_packet_size = 0;
802188a7 2514
c5aa993b 2515 general_thread = -2;
cce74817 2516 continue_thread = -2;
c906108c 2517
9d1f7ab2
MS
2518 /* Probe for ability to use "ThreadInfo" query, as required. */
2519 use_threadinfo_query = 1;
2520 use_threadextra_query = 1;
2521
be2a5f71
DJ
2522 /* The first packet we send to the target is the optional "supported
2523 packets" request. If the target can answer this, it will tell us
2524 which later probes to skip. */
2525 remote_query_supported ();
2526
424163ea
DJ
2527 /* Next, if the target can specify a description, read it. We do
2528 this before anything involving memory or registers. */
2529 target_find_description ();
2530
c906108c
SS
2531 /* Without this, some commands which require an active target (such
2532 as kill) won't work. This variable serves (at least) double duty
2533 as both the pid of the target process (if it has such), and as a
2534 flag indicating that a target is active. These functions should
2535 be split out into seperate variables, especially since GDB will
2536 someday have a notion of debugging several processes. */
2537
39f77062 2538 inferior_ptid = pid_to_ptid (MAGIC_NULL_PID);
92d1e331
DJ
2539
2540 if (async_p)
2541 {
23860348 2542 /* With this target we start out by owning the terminal. */
92d1e331
DJ
2543 remote_async_terminal_ours_p = 1;
2544
2545 /* FIXME: cagney/1999-09-23: During the initial connection it is
2546 assumed that the target is already ready and able to respond to
2547 requests. Unfortunately remote_start_remote() eventually calls
2548 wait_for_inferior() with no timeout. wait_forever_enabled_p gets
2549 around this. Eventually a mechanism that allows
2550 wait_for_inferior() to expect/get timeouts will be
23860348 2551 implemented. */
92d1e331
DJ
2552 wait_forever_enabled_p = 0;
2553 }
2554
23860348 2555 /* First delete any symbols previously loaded from shared libraries. */
f78f6cf1 2556 no_shared_libraries (NULL, 0);
f78f6cf1 2557
36918e70 2558 /* Start the remote connection. If error() or QUIT, discard this
165b8e33
AC
2559 target (we'd otherwise be in an inconsistent state) and then
2560 propogate the error on up the exception chain. This ensures that
2561 the caller doesn't stumble along blindly assuming that the
2562 function succeeded. The CLI doesn't have this problem but other
2563 UI's, such as MI do.
36918e70
AC
2564
2565 FIXME: cagney/2002-05-19: Instead of re-throwing the exception,
2566 this function should return an error indication letting the
ce2826aa 2567 caller restore the previous state. Unfortunately the command
36918e70
AC
2568 ``target remote'' is directly wired to this function making that
2569 impossible. On a positive note, the CLI side of this problem has
2570 been fixed - the function set_cmd_context() makes it possible for
2571 all the ``target ....'' commands to share a common callback
2572 function. See cli-dump.c. */
109c3e39
AC
2573 {
2574 struct gdb_exception ex
8621d6a9
DJ
2575 = catch_exception (uiout, remote_start_remote, &from_tty,
2576 RETURN_MASK_ALL);
109c3e39
AC
2577 if (ex.reason < 0)
2578 {
2579 pop_target ();
2580 if (async_p)
2581 wait_forever_enabled_p = 1;
2582 throw_exception (ex);
2583 }
2584 }
c906108c 2585
92d1e331
DJ
2586 if (async_p)
2587 wait_forever_enabled_p = 1;
6426a772
JM
2588
2589 if (extended_p)
43ff13b4 2590 {
6240bebf 2591 /* Tell the remote that we are using the extended protocol. */
6426a772 2592 putpkt ("!");
6d820c5c 2593 getpkt (&rs->buf, &rs->buf_size, 0);
43ff13b4 2594 }
a77053c2 2595
23860348 2596 if (exec_bfd) /* No use without an exec file. */
9353355f 2597 remote_check_symbols (symfile_objfile);
43ff13b4
JM
2598}
2599
c906108c
SS
2600/* This takes a program previously attached to and detaches it. After
2601 this is done, GDB can be used to debug some other program. We
2602 better not have left any breakpoints in the target program or it'll
2603 die when it hits one. */
2604
2605static void
fba45db2 2606remote_detach (char *args, int from_tty)
c906108c 2607{
d01949b6 2608 struct remote_state *rs = get_remote_state ();
c906108c
SS
2609
2610 if (args)
8a3fe4f8 2611 error (_("Argument given to \"detach\" when remotely debugging."));
c906108c
SS
2612
2613 /* Tell the remote target to detach. */
6d820c5c 2614 strcpy (rs->buf, "D");
4ddda9b5
PA
2615 putpkt (rs->buf);
2616 getpkt (&rs->buf, &rs->buf_size, 0);
2617
2618 if (rs->buf[0] == 'E')
2619 error (_("Can't detach process."));
c906108c 2620
23860348 2621 /* Unregister the file descriptor from the event loop. */
6ad8ae5c
DJ
2622 if (target_is_async_p ())
2623 serial_async (remote_desc, NULL, 0);
2624
cca728d0 2625 target_mourn_inferior ();
c906108c
SS
2626 if (from_tty)
2627 puts_filtered ("Ending remote debugging.\n");
2628}
2629
6ad8ae5c
DJ
2630/* Same as remote_detach, but don't send the "D" packet; just disconnect. */
2631
43ff13b4 2632static void
597320e7 2633remote_disconnect (struct target_ops *target, char *args, int from_tty)
43ff13b4 2634{
43ff13b4 2635 if (args)
8a3fe4f8 2636 error (_("Argument given to \"detach\" when remotely debugging."));
43ff13b4 2637
23860348 2638 /* Unregister the file descriptor from the event loop. */
ed9a39eb 2639 if (target_is_async_p ())
2cd58942 2640 serial_async (remote_desc, NULL, 0);
43ff13b4 2641
cca728d0 2642 target_mourn_inferior ();
43ff13b4
JM
2643 if (from_tty)
2644 puts_filtered ("Ending remote debugging.\n");
2645}
2646
c906108c
SS
2647/* Convert hex digit A to a number. */
2648
30559e10 2649static int
fba45db2 2650fromhex (int a)
c906108c
SS
2651{
2652 if (a >= '0' && a <= '9')
2653 return a - '0';
2654 else if (a >= 'a' && a <= 'f')
2655 return a - 'a' + 10;
2656 else if (a >= 'A' && a <= 'F')
2657 return a - 'A' + 10;
c5aa993b 2658 else
8a3fe4f8 2659 error (_("Reply contains invalid hex digit %d"), a);
c906108c
SS
2660}
2661
30559e10 2662static int
cfd77fa1 2663hex2bin (const char *hex, gdb_byte *bin, int count)
30559e10
MS
2664{
2665 int i;
2666
30559e10
MS
2667 for (i = 0; i < count; i++)
2668 {
2669 if (hex[0] == 0 || hex[1] == 0)
2670 {
2671 /* Hex string is short, or of uneven length.
23860348 2672 Return the count that has been converted so far. */
30559e10
MS
2673 return i;
2674 }
2675 *bin++ = fromhex (hex[0]) * 16 + fromhex (hex[1]);
2676 hex += 2;
2677 }
2678 return i;
2679}
2680
c906108c
SS
2681/* Convert number NIB to a hex digit. */
2682
2683static int
fba45db2 2684tohex (int nib)
c906108c
SS
2685{
2686 if (nib < 10)
c5aa993b 2687 return '0' + nib;
c906108c 2688 else
c5aa993b 2689 return 'a' + nib - 10;
c906108c 2690}
30559e10
MS
2691
2692static int
cfd77fa1 2693bin2hex (const gdb_byte *bin, char *hex, int count)
30559e10
MS
2694{
2695 int i;
23860348 2696 /* May use a length, or a nul-terminated string as input. */
30559e10 2697 if (count == 0)
cfd77fa1 2698 count = strlen ((char *) bin);
30559e10
MS
2699
2700 for (i = 0; i < count; i++)
2701 {
2702 *hex++ = tohex ((*bin >> 4) & 0xf);
2703 *hex++ = tohex (*bin++ & 0xf);
2704 }
2705 *hex = 0;
2706 return i;
2707}
c906108c 2708\f
506fb367
DJ
2709/* Check for the availability of vCont. This function should also check
2710 the response. */
c906108c
SS
2711
2712static void
6d820c5c 2713remote_vcont_probe (struct remote_state *rs)
c906108c 2714{
2e9f7625 2715 char *buf;
6d820c5c 2716
2e9f7625
DJ
2717 strcpy (rs->buf, "vCont?");
2718 putpkt (rs->buf);
6d820c5c 2719 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 2720 buf = rs->buf;
c906108c 2721
506fb367
DJ
2722 /* Make sure that the features we assume are supported. */
2723 if (strncmp (buf, "vCont", 5) == 0)
2724 {
2725 char *p = &buf[5];
2726 int support_s, support_S, support_c, support_C;
2727
2728 support_s = 0;
2729 support_S = 0;
2730 support_c = 0;
2731 support_C = 0;
2732 while (p && *p == ';')
2733 {
2734 p++;
2735 if (*p == 's' && (*(p + 1) == ';' || *(p + 1) == 0))
2736 support_s = 1;
2737 else if (*p == 'S' && (*(p + 1) == ';' || *(p + 1) == 0))
2738 support_S = 1;
2739 else if (*p == 'c' && (*(p + 1) == ';' || *(p + 1) == 0))
2740 support_c = 1;
2741 else if (*p == 'C' && (*(p + 1) == ';' || *(p + 1) == 0))
2742 support_C = 1;
2743
2744 p = strchr (p, ';');
2745 }
c906108c 2746
506fb367
DJ
2747 /* If s, S, c, and C are not all supported, we can't use vCont. Clearing
2748 BUF will make packet_ok disable the packet. */
2749 if (!support_s || !support_S || !support_c || !support_C)
2750 buf[0] = 0;
2751 }
c906108c 2752
444abaca 2753 packet_ok (buf, &remote_protocol_packets[PACKET_vCont]);
506fb367 2754}
c906108c 2755
506fb367
DJ
2756/* Resume the remote inferior by using a "vCont" packet. The thread
2757 to be resumed is PTID; STEP and SIGGNAL indicate whether the
2758 resumed thread should be single-stepped and/or signalled. If PTID's
2759 PID is -1, then all threads are resumed; the thread to be stepped and/or
2760 signalled is given in the global INFERIOR_PTID. This function returns
2761 non-zero iff it resumes the inferior.
44eaed12 2762
506fb367
DJ
2763 This function issues a strict subset of all possible vCont commands at the
2764 moment. */
44eaed12 2765
506fb367
DJ
2766static int
2767remote_vcont_resume (ptid_t ptid, int step, enum target_signal siggnal)
2768{
2769 struct remote_state *rs = get_remote_state ();
2770 int pid = PIDGET (ptid);
2963ee1d 2771 char *buf = NULL, *outbuf;
506fb367 2772 struct cleanup *old_cleanup;
44eaed12 2773
444abaca 2774 if (remote_protocol_packets[PACKET_vCont].support == PACKET_SUPPORT_UNKNOWN)
6d820c5c 2775 remote_vcont_probe (rs);
44eaed12 2776
444abaca 2777 if (remote_protocol_packets[PACKET_vCont].support == PACKET_DISABLE)
6d820c5c 2778 return 0;
44eaed12 2779
506fb367
DJ
2780 /* If we could generate a wider range of packets, we'd have to worry
2781 about overflowing BUF. Should there be a generic
2782 "multi-part-packet" packet? */
2783
2784 if (PIDGET (inferior_ptid) == MAGIC_NULL_PID)
c906108c 2785 {
506fb367
DJ
2786 /* MAGIC_NULL_PTID means that we don't have any active threads, so we
2787 don't have any PID numbers the inferior will understand. Make sure
2788 to only send forms that do not specify a PID. */
2789 if (step && siggnal != TARGET_SIGNAL_0)
2963ee1d 2790 outbuf = xstrprintf ("vCont;S%02x", siggnal);
506fb367 2791 else if (step)
2963ee1d 2792 outbuf = xstrprintf ("vCont;s");
506fb367 2793 else if (siggnal != TARGET_SIGNAL_0)
2963ee1d 2794 outbuf = xstrprintf ("vCont;C%02x", siggnal);
506fb367 2795 else
2963ee1d 2796 outbuf = xstrprintf ("vCont;c");
506fb367
DJ
2797 }
2798 else if (pid == -1)
2799 {
2800 /* Resume all threads, with preference for INFERIOR_PTID. */
2801 if (step && siggnal != TARGET_SIGNAL_0)
2963ee1d
DJ
2802 outbuf = xstrprintf ("vCont;S%02x:%x;c", siggnal,
2803 PIDGET (inferior_ptid));
506fb367 2804 else if (step)
2963ee1d 2805 outbuf = xstrprintf ("vCont;s:%x;c", PIDGET (inferior_ptid));
506fb367 2806 else if (siggnal != TARGET_SIGNAL_0)
2963ee1d
DJ
2807 outbuf = xstrprintf ("vCont;C%02x:%x;c", siggnal,
2808 PIDGET (inferior_ptid));
506fb367 2809 else
2963ee1d 2810 outbuf = xstrprintf ("vCont;c");
c906108c
SS
2811 }
2812 else
506fb367
DJ
2813 {
2814 /* Scheduler locking; resume only PTID. */
2815 if (step && siggnal != TARGET_SIGNAL_0)
2963ee1d 2816 outbuf = xstrprintf ("vCont;S%02x:%x", siggnal, pid);
506fb367 2817 else if (step)
2963ee1d 2818 outbuf = xstrprintf ("vCont;s:%x", pid);
506fb367 2819 else if (siggnal != TARGET_SIGNAL_0)
2963ee1d 2820 outbuf = xstrprintf ("vCont;C%02x:%x", siggnal, pid);
506fb367 2821 else
2963ee1d 2822 outbuf = xstrprintf ("vCont;c:%x", pid);
506fb367 2823 }
c906108c 2824
ea9c271d 2825 gdb_assert (outbuf && strlen (outbuf) < get_remote_packet_size ());
6d820c5c 2826 old_cleanup = make_cleanup (xfree, outbuf);
2963ee1d
DJ
2827
2828 putpkt (outbuf);
506fb367
DJ
2829
2830 do_cleanups (old_cleanup);
2831
2832 return 1;
c906108c 2833}
43ff13b4 2834
506fb367
DJ
2835/* Tell the remote machine to resume. */
2836
2837static enum target_signal last_sent_signal = TARGET_SIGNAL_0;
2838
2839static int last_sent_step;
2840
43ff13b4 2841static void
506fb367 2842remote_resume (ptid_t ptid, int step, enum target_signal siggnal)
43ff13b4 2843{
d01949b6 2844 struct remote_state *rs = get_remote_state ();
2e9f7625 2845 char *buf;
39f77062 2846 int pid = PIDGET (ptid);
43ff13b4 2847
43ff13b4
JM
2848 last_sent_signal = siggnal;
2849 last_sent_step = step;
2850
2851 /* A hook for when we need to do something at the last moment before
2852 resumption. */
9a4105ab
AC
2853 if (deprecated_target_resume_hook)
2854 (*deprecated_target_resume_hook) ();
43ff13b4 2855
89be2091
DJ
2856 /* Update the inferior on signals to silently pass, if they've changed. */
2857 remote_pass_signals ();
2858
506fb367
DJ
2859 /* The vCont packet doesn't need to specify threads via Hc. */
2860 if (remote_vcont_resume (ptid, step, siggnal))
2861 return;
2862
2863 /* All other supported resume packets do use Hc, so call set_thread. */
2864 if (pid == -1)
23860348 2865 set_thread (0, 0); /* Run any thread. */
506fb367 2866 else
23860348 2867 set_thread (pid, 0); /* Run this thread. */
506fb367 2868
2e9f7625 2869 buf = rs->buf;
43ff13b4
JM
2870 if (siggnal != TARGET_SIGNAL_0)
2871 {
2872 buf[0] = step ? 'S' : 'C';
c5aa993b 2873 buf[1] = tohex (((int) siggnal >> 4) & 0xf);
506fb367 2874 buf[2] = tohex (((int) siggnal) & 0xf);
43ff13b4
JM
2875 buf[3] = '\0';
2876 }
2877 else
c5aa993b 2878 strcpy (buf, step ? "s" : "c");
506fb367 2879
44eaed12 2880 putpkt (buf);
506fb367
DJ
2881}
2882
23860348 2883/* Same as remote_resume, but with async support. */
506fb367
DJ
2884static void
2885remote_async_resume (ptid_t ptid, int step, enum target_signal siggnal)
2886{
2887 remote_resume (ptid, step, siggnal);
43ff13b4 2888
2acceee2
JM
2889 /* We are about to start executing the inferior, let's register it
2890 with the event loop. NOTE: this is the one place where all the
2891 execution commands end up. We could alternatively do this in each
23860348 2892 of the execution commands in infcmd.c. */
2acceee2
JM
2893 /* FIXME: ezannoni 1999-09-28: We may need to move this out of here
2894 into infcmd.c in order to allow inferior function calls to work
23860348 2895 NOT asynchronously. */
362646f5 2896 if (target_can_async_p ())
2acceee2 2897 target_async (inferior_event_handler, 0);
23860348 2898 /* Tell the world that the target is now executing. */
2acceee2
JM
2899 /* FIXME: cagney/1999-09-23: Is it the targets responsibility to set
2900 this? Instead, should the client of target just assume (for
2901 async targets) that the target is going to start executing? Is
2902 this information already found in the continuation block? */
ed9a39eb 2903 if (target_is_async_p ())
2acceee2 2904 target_executing = 1;
43ff13b4 2905}
c906108c 2906\f
43ff13b4
JM
2907
2908/* Set up the signal handler for SIGINT, while the target is
23860348 2909 executing, ovewriting the 'regular' SIGINT signal handler. */
43ff13b4 2910static void
fba45db2 2911initialize_sigint_signal_handler (void)
43ff13b4 2912{
c5aa993b 2913 sigint_remote_token =
43ff13b4
JM
2914 create_async_signal_handler (async_remote_interrupt, NULL);
2915 signal (SIGINT, handle_remote_sigint);
2916}
2917
23860348 2918/* Signal handler for SIGINT, while the target is executing. */
43ff13b4 2919static void
fba45db2 2920handle_remote_sigint (int sig)
43ff13b4
JM
2921{
2922 signal (sig, handle_remote_sigint_twice);
c5aa993b 2923 sigint_remote_twice_token =
43ff13b4
JM
2924 create_async_signal_handler (async_remote_interrupt_twice, NULL);
2925 mark_async_signal_handler_wrapper (sigint_remote_token);
2926}
2927
2928/* Signal handler for SIGINT, installed after SIGINT has already been
2929 sent once. It will take effect the second time that the user sends
23860348 2930 a ^C. */
43ff13b4 2931static void
fba45db2 2932handle_remote_sigint_twice (int sig)
43ff13b4
JM
2933{
2934 signal (sig, handle_sigint);
c5aa993b 2935 sigint_remote_twice_token =
2df3850c 2936 create_async_signal_handler (inferior_event_handler_wrapper, NULL);
43ff13b4
JM
2937 mark_async_signal_handler_wrapper (sigint_remote_twice_token);
2938}
2939
6426a772 2940/* Perform the real interruption of the target execution, in response
23860348 2941 to a ^C. */
c5aa993b 2942static void
fba45db2 2943async_remote_interrupt (gdb_client_data arg)
43ff13b4
JM
2944{
2945 if (remote_debug)
2946 fprintf_unfiltered (gdb_stdlog, "remote_interrupt called\n");
2947
2948 target_stop ();
2949}
2950
2951/* Perform interrupt, if the first attempt did not succeed. Just give
23860348 2952 up on the target alltogether. */
2df3850c 2953void
fba45db2 2954async_remote_interrupt_twice (gdb_client_data arg)
43ff13b4 2955{
2df3850c
JM
2956 if (remote_debug)
2957 fprintf_unfiltered (gdb_stdlog, "remote_interrupt_twice called\n");
6426a772 2958 /* Do something only if the target was not killed by the previous
23860348 2959 cntl-C. */
6426a772
JM
2960 if (target_executing)
2961 {
2962 interrupt_query ();
2963 signal (SIGINT, handle_remote_sigint);
2964 }
43ff13b4
JM
2965}
2966
2967/* Reinstall the usual SIGINT handlers, after the target has
23860348 2968 stopped. */
6426a772
JM
2969static void
2970cleanup_sigint_signal_handler (void *dummy)
43ff13b4
JM
2971{
2972 signal (SIGINT, handle_sigint);
2973 if (sigint_remote_twice_token)
d5d6fca5 2974 delete_async_signal_handler (&sigint_remote_twice_token);
43ff13b4 2975 if (sigint_remote_token)
d5d6fca5 2976 delete_async_signal_handler (&sigint_remote_token);
43ff13b4
JM
2977}
2978
c906108c
SS
2979/* Send ^C to target to halt it. Target will respond, and send us a
2980 packet. */
507f3c78 2981static void (*ofunc) (int);
c906108c 2982
7a292a7a
SS
2983/* The command line interface's stop routine. This function is installed
2984 as a signal handler for SIGINT. The first time a user requests a
2985 stop, we call remote_stop to send a break or ^C. If there is no
2986 response from the target (it didn't stop when the user requested it),
23860348 2987 we ask the user if he'd like to detach from the target. */
c906108c 2988static void
fba45db2 2989remote_interrupt (int signo)
c906108c 2990{
23860348 2991 /* If this doesn't work, try more severe steps. */
7a292a7a
SS
2992 signal (signo, remote_interrupt_twice);
2993
2994 if (remote_debug)
0f71a2f6 2995 fprintf_unfiltered (gdb_stdlog, "remote_interrupt called\n");
7a292a7a
SS
2996
2997 target_stop ();
2998}
2999
3000/* The user typed ^C twice. */
3001
3002static void
fba45db2 3003remote_interrupt_twice (int signo)
7a292a7a
SS
3004{
3005 signal (signo, ofunc);
3006 interrupt_query ();
c906108c
SS
3007 signal (signo, remote_interrupt);
3008}
7a292a7a
SS
3009
3010/* This is the generic stop called via the target vector. When a target
3011 interrupt is requested, either by the command line or the GUI, we
23860348 3012 will eventually end up here. */
c906108c 3013static void
fba45db2 3014remote_stop (void)
c906108c 3015{
7a292a7a
SS
3016 /* Send a break or a ^C, depending on user preference. */
3017 if (remote_debug)
0f71a2f6 3018 fprintf_unfiltered (gdb_stdlog, "remote_stop called\n");
c906108c 3019
7a292a7a 3020 if (remote_break)
2cd58942 3021 serial_send_break (remote_desc);
c906108c 3022 else
2cd58942 3023 serial_write (remote_desc, "\003", 1);
c906108c
SS
3024}
3025
3026/* Ask the user what to do when an interrupt is received. */
3027
3028static void
fba45db2 3029interrupt_query (void)
c906108c
SS
3030{
3031 target_terminal_ours ();
3032
3033 if (query ("Interrupted while waiting for the program.\n\
3034Give up (and stop debugging it)? "))
3035 {
3036 target_mourn_inferior ();
315a522e 3037 deprecated_throw_reason (RETURN_QUIT);
c906108c
SS
3038 }
3039
3040 target_terminal_inferior ();
3041}
3042
6426a772
JM
3043/* Enable/disable target terminal ownership. Most targets can use
3044 terminal groups to control terminal ownership. Remote targets are
3045 different in that explicit transfer of ownership to/from GDB/target
23860348 3046 is required. */
6426a772
JM
3047
3048static void
3049remote_async_terminal_inferior (void)
3050{
3051 /* FIXME: cagney/1999-09-27: Shouldn't need to test for
3052 sync_execution here. This function should only be called when
3053 GDB is resuming the inferior in the forground. A background
3054 resume (``run&'') should leave GDB in control of the terminal and
23860348 3055 consequently should not call this code. */
6426a772
JM
3056 if (!sync_execution)
3057 return;
3058 /* FIXME: cagney/1999-09-27: Closely related to the above. Make
3059 calls target_terminal_*() idenpotent. The event-loop GDB talking
3060 to an asynchronous target with a synchronous command calls this
3061 function from both event-top.c and infrun.c/infcmd.c. Once GDB
3062 stops trying to transfer the terminal to the target when it
3063 shouldn't this guard can go away. */
3064 if (!remote_async_terminal_ours_p)
3065 return;
3066 delete_file_handler (input_fd);
3067 remote_async_terminal_ours_p = 0;
3068 initialize_sigint_signal_handler ();
3069 /* NOTE: At this point we could also register our selves as the
3070 recipient of all input. Any characters typed could then be
23860348 3071 passed on down to the target. */
6426a772
JM
3072}
3073
3074static void
3075remote_async_terminal_ours (void)
3076{
23860348 3077 /* See FIXME in remote_async_terminal_inferior. */
6426a772
JM
3078 if (!sync_execution)
3079 return;
23860348 3080 /* See FIXME in remote_async_terminal_inferior. */
6426a772
JM
3081 if (remote_async_terminal_ours_p)
3082 return;
3083 cleanup_sigint_signal_handler (NULL);
3084 add_file_handler (input_fd, stdin_event_handler, 0);
3085 remote_async_terminal_ours_p = 1;
3086}
3087
c906108c
SS
3088/* If nonzero, ignore the next kill. */
3089
3090int kill_kludge;
3091
3092void
917317f4 3093remote_console_output (char *msg)
c906108c
SS
3094{
3095 char *p;
3096
c5aa993b 3097 for (p = msg; p[0] && p[1]; p += 2)
c906108c
SS
3098 {
3099 char tb[2];
3100 char c = fromhex (p[0]) * 16 + fromhex (p[1]);
3101 tb[0] = c;
3102 tb[1] = 0;
43ff13b4 3103 fputs_unfiltered (tb, gdb_stdtarg);
c906108c 3104 }
917317f4 3105 gdb_flush (gdb_stdtarg);
c906108c
SS
3106}
3107
0f71a2f6
JM
3108/* Wait until the remote machine stops, then return,
3109 storing status in STATUS just as `wait' would.
802188a7 3110 Returns "pid", which in the case of a multi-threaded
0f71a2f6 3111 remote OS, is the thread-id. */
c906108c 3112
39f77062
KB
3113static ptid_t
3114remote_wait (ptid_t ptid, struct target_waitstatus *status)
c906108c 3115{
d01949b6 3116 struct remote_state *rs = get_remote_state ();
ea9c271d 3117 struct remote_arch_state *rsa = get_remote_arch_state ();
b2dd6311 3118 ULONGEST thread_num = -1;
3c3bea1c 3119 ULONGEST addr;
c906108c
SS
3120
3121 status->kind = TARGET_WAITKIND_EXITED;
3122 status->value.integer = 0;
3123
3124 while (1)
3125 {
2e9f7625 3126 char *buf, *p;
c906108c 3127
c906108c 3128 ofunc = signal (SIGINT, remote_interrupt);
6d820c5c 3129 getpkt (&rs->buf, &rs->buf_size, 1);
c906108c
SS
3130 signal (SIGINT, ofunc);
3131
2e9f7625
DJ
3132 buf = rs->buf;
3133
c906108c 3134 /* This is a hook for when we need to do something (perhaps the
c5aa993b 3135 collection of trace data) every time the target stops. */
9a4105ab
AC
3136 if (deprecated_target_wait_loop_hook)
3137 (*deprecated_target_wait_loop_hook) ();
c906108c 3138
3c3bea1c
GS
3139 remote_stopped_by_watchpoint_p = 0;
3140
c906108c
SS
3141 switch (buf[0])
3142 {
23860348 3143 case 'E': /* Error of some sort. */
8a3fe4f8 3144 warning (_("Remote failure reply: %s"), buf);
c906108c 3145 continue;
23860348 3146 case 'F': /* File-I/O request. */
449092f6
CV
3147 remote_fileio_request (buf);
3148 continue;
23860348 3149 case 'T': /* Status with PC, SP, FP, ... */
c906108c 3150 {
cfd77fa1 3151 gdb_byte regs[MAX_REGISTER_SIZE];
c906108c 3152
23860348 3153 /* Expedited reply, containing Signal, {regno, reg} repeat. */
c906108c 3154 /* format is: 'Tssn...:r...;n...:r...;n...:r...;#cc', where
c5aa993b
JM
3155 ss = signal number
3156 n... = register number
3157 r... = register contents
3158 */
c906108c
SS
3159 p = &buf[3]; /* after Txx */
3160
3161 while (*p)
3162 {
cfd77fa1 3163 char *p1;
c906108c 3164 char *p_temp;
97345198 3165 int fieldsize;
3c3bea1c
GS
3166 LONGEST pnum = 0;
3167
23860348
MS
3168 /* If the packet contains a register number save it in
3169 pnum and set p1 to point to the character following
3170 it. Otherwise p1 points to p. */
c906108c 3171
23860348
MS
3172 /* If this packet is an awatch packet, don't parse the
3173 'a' as a register number. */
3c3bea1c
GS
3174
3175 if (strncmp (p, "awatch", strlen("awatch")) != 0)
3176 {
3177 /* Read the ``P'' register number. */
3178 pnum = strtol (p, &p_temp, 16);
cfd77fa1 3179 p1 = p_temp;
3c3bea1c 3180 }
802188a7 3181 else
3c3bea1c 3182 p1 = p;
c906108c 3183
23860348 3184 if (p1 == p) /* No register number present here. */
c906108c 3185 {
cfd77fa1 3186 p1 = strchr (p, ':');
c906108c 3187 if (p1 == NULL)
670aa98f 3188 error (_("Malformed packet(a) (missing colon): %s\n\
8a3fe4f8 3189Packet: '%s'\n"),
670aa98f 3190 p, buf);
3c3bea1c 3191 if (strncmp (p, "thread", p1 - p) == 0)
c906108c
SS
3192 {
3193 p_temp = unpack_varlen_hex (++p1, &thread_num);
3194 record_currthread (thread_num);
cfd77fa1 3195 p = p_temp;
c906108c 3196 }
3c3bea1c
GS
3197 else if ((strncmp (p, "watch", p1 - p) == 0)
3198 || (strncmp (p, "rwatch", p1 - p) == 0)
3199 || (strncmp (p, "awatch", p1 - p) == 0))
3200 {
3201 remote_stopped_by_watchpoint_p = 1;
3202 p = unpack_varlen_hex (++p1, &addr);
3203 remote_watch_data_address = (CORE_ADDR)addr;
3204 }
3205 else
3206 {
3207 /* Silently skip unknown optional info. */
3208 p_temp = strchr (p1 + 1, ';');
3209 if (p_temp)
cfd77fa1 3210 p = p_temp;
3c3bea1c 3211 }
c906108c
SS
3212 }
3213 else
3214 {
ea9c271d 3215 struct packet_reg *reg = packet_reg_from_pnum (rsa, pnum);
c906108c
SS
3216 p = p1;
3217
3218 if (*p++ != ':')
8a3fe4f8
AC
3219 error (_("Malformed packet(b) (missing colon): %s\n\
3220Packet: '%s'\n"),
3fcb8548 3221 p, buf);
c906108c 3222
ad10f812 3223 if (reg == NULL)
8a3fe4f8
AC
3224 error (_("Remote sent bad register number %s: %s\n\
3225Packet: '%s'\n"),
3fcb8548 3226 phex_nz (pnum, 0), p, buf);
c906108c 3227
cfd77fa1 3228 fieldsize = hex2bin (p, regs,
2bc416ba 3229 register_size (current_gdbarch,
23860348 3230 reg->regnum));
97345198 3231 p += 2 * fieldsize;
2bc416ba 3232 if (fieldsize < register_size (current_gdbarch,
23860348 3233 reg->regnum))
8a3fe4f8 3234 warning (_("Remote reply is too short: %s"), buf);
2bc416ba 3235 regcache_raw_supply (current_regcache,
23860348 3236 reg->regnum, regs);
c906108c
SS
3237 }
3238
3239 if (*p++ != ';')
2bc416ba 3240 error (_("Remote register badly formatted: %s\nhere: %s"),
23860348 3241 buf, p);
c906108c
SS
3242 }
3243 }
3244 /* fall through */
23860348 3245 case 'S': /* Old style status, just signal only. */
c906108c
SS
3246 status->kind = TARGET_WAITKIND_STOPPED;
3247 status->value.sig = (enum target_signal)
3248 (((fromhex (buf[1])) << 4) + (fromhex (buf[2])));
3249
0f71a2f6
JM
3250 if (buf[3] == 'p')
3251 {
0f71a2f6
JM
3252 thread_num = strtol ((const char *) &buf[4], NULL, 16);
3253 record_currthread (thread_num);
3254 }
c906108c 3255 goto got_status;
23860348 3256 case 'W': /* Target exited. */
c906108c
SS
3257 {
3258 /* The remote process exited. */
3259 status->kind = TARGET_WAITKIND_EXITED;
3260 status->value.integer = (fromhex (buf[1]) << 4) + fromhex (buf[2]);
3261 goto got_status;
3262 }
3263 case 'X':
3264 status->kind = TARGET_WAITKIND_SIGNALLED;
3265 status->value.sig = (enum target_signal)
3266 (((fromhex (buf[1])) << 4) + (fromhex (buf[2])));
3267 kill_kludge = 1;
3268
3269 goto got_status;
23860348 3270 case 'O': /* Console output. */
c906108c
SS
3271 remote_console_output (buf + 1);
3272 continue;
3273 case '\0':
3274 if (last_sent_signal != TARGET_SIGNAL_0)
3275 {
3276 /* Zero length reply means that we tried 'S' or 'C' and
c5aa993b 3277 the remote system doesn't support it. */
c906108c
SS
3278 target_terminal_ours_for_output ();
3279 printf_filtered
3280 ("Can't send signals to this remote system. %s not sent.\n",
3281 target_signal_to_name (last_sent_signal));
3282 last_sent_signal = TARGET_SIGNAL_0;
3283 target_terminal_inferior ();
3284
3285 strcpy ((char *) buf, last_sent_step ? "s" : "c");
3286 putpkt ((char *) buf);
3287 continue;
3288 }
3289 /* else fallthrough */
3290 default:
8a3fe4f8 3291 warning (_("Invalid remote reply: %s"), buf);
c906108c
SS
3292 continue;
3293 }
3294 }
c5aa993b 3295got_status:
c906108c
SS
3296 if (thread_num != -1)
3297 {
39f77062 3298 return pid_to_ptid (thread_num);
c906108c 3299 }
39f77062 3300 return inferior_ptid;
c906108c
SS
3301}
3302
23860348 3303/* Async version of remote_wait. */
39f77062
KB
3304static ptid_t
3305remote_async_wait (ptid_t ptid, struct target_waitstatus *status)
43ff13b4 3306{
d01949b6 3307 struct remote_state *rs = get_remote_state ();
ea9c271d 3308 struct remote_arch_state *rsa = get_remote_arch_state ();
b2dd6311 3309 ULONGEST thread_num = -1;
3c3bea1c 3310 ULONGEST addr;
43ff13b4
JM
3311
3312 status->kind = TARGET_WAITKIND_EXITED;
3313 status->value.integer = 0;
3314
3c3bea1c
GS
3315 remote_stopped_by_watchpoint_p = 0;
3316
43ff13b4
JM
3317 while (1)
3318 {
2e9f7625 3319 char *buf, *p;
c5aa993b 3320
ed9a39eb 3321 if (!target_is_async_p ())
43ff13b4 3322 ofunc = signal (SIGINT, remote_interrupt);
6426a772
JM
3323 /* FIXME: cagney/1999-09-27: If we're in async mode we should
3324 _never_ wait for ever -> test on target_is_async_p().
3325 However, before we do that we need to ensure that the caller
23860348 3326 knows how to take the target into/out of async mode. */
6d820c5c 3327 getpkt (&rs->buf, &rs->buf_size, wait_forever_enabled_p);
ed9a39eb 3328 if (!target_is_async_p ())
43ff13b4
JM
3329 signal (SIGINT, ofunc);
3330
2e9f7625
DJ
3331 buf = rs->buf;
3332
43ff13b4 3333 /* This is a hook for when we need to do something (perhaps the
c5aa993b 3334 collection of trace data) every time the target stops. */
9a4105ab
AC
3335 if (deprecated_target_wait_loop_hook)
3336 (*deprecated_target_wait_loop_hook) ();
43ff13b4
JM
3337
3338 switch (buf[0])
3339 {
23860348 3340 case 'E': /* Error of some sort. */
8a3fe4f8 3341 warning (_("Remote failure reply: %s"), buf);
43ff13b4 3342 continue;
23860348 3343 case 'F': /* File-I/O request. */
449092f6
CV
3344 remote_fileio_request (buf);
3345 continue;
23860348 3346 case 'T': /* Status with PC, SP, FP, ... */
43ff13b4 3347 {
cfd77fa1 3348 gdb_byte regs[MAX_REGISTER_SIZE];
43ff13b4 3349
23860348 3350 /* Expedited reply, containing Signal, {regno, reg} repeat. */
43ff13b4 3351 /* format is: 'Tssn...:r...;n...:r...;n...:r...;#cc', where
c5aa993b
JM
3352 ss = signal number
3353 n... = register number
3354 r... = register contents
3355 */
43ff13b4
JM
3356 p = &buf[3]; /* after Txx */
3357
3358 while (*p)
3359 {
cfd77fa1 3360 char *p1;
43ff13b4 3361 char *p_temp;
6c3f2dbf 3362 int fieldsize;
3c3bea1c 3363 long pnum = 0;
43ff13b4 3364
23860348
MS
3365 /* If the packet contains a register number, save it
3366 in pnum and set p1 to point to the character
3367 following it. Otherwise p1 points to p. */
3c3bea1c
GS
3368
3369 /* If this packet is an awatch packet, don't parse the 'a'
3370 as a register number. */
802188a7 3371
3c3bea1c
GS
3372 if (!strncmp (p, "awatch", strlen ("awatch")) != 0)
3373 {
3374 /* Read the register number. */
3375 pnum = strtol (p, &p_temp, 16);
cfd77fa1 3376 p1 = p_temp;
3c3bea1c 3377 }
802188a7 3378 else
3c3bea1c 3379 p1 = p;
43ff13b4 3380
23860348 3381 if (p1 == p) /* No register number present here. */
43ff13b4 3382 {
cfd77fa1 3383 p1 = strchr (p, ':');
43ff13b4 3384 if (p1 == NULL)
8a3fe4f8
AC
3385 error (_("Malformed packet(a) (missing colon): %s\n\
3386Packet: '%s'\n"),
3fcb8548 3387 p, buf);
3c3bea1c 3388 if (strncmp (p, "thread", p1 - p) == 0)
43ff13b4
JM
3389 {
3390 p_temp = unpack_varlen_hex (++p1, &thread_num);
3391 record_currthread (thread_num);
cfd77fa1 3392 p = p_temp;
43ff13b4 3393 }
3c3bea1c
GS
3394 else if ((strncmp (p, "watch", p1 - p) == 0)
3395 || (strncmp (p, "rwatch", p1 - p) == 0)
3396 || (strncmp (p, "awatch", p1 - p) == 0))
3397 {
3398 remote_stopped_by_watchpoint_p = 1;
3399 p = unpack_varlen_hex (++p1, &addr);
3400 remote_watch_data_address = (CORE_ADDR)addr;
3401 }
3402 else
3403 {
3404 /* Silently skip unknown optional info. */
cfd77fa1 3405 p_temp = strchr (p1 + 1, ';');
3c3bea1c
GS
3406 if (p_temp)
3407 p = p_temp;
3408 }
43ff13b4 3409 }
802188a7 3410
43ff13b4
JM
3411 else
3412 {
ea9c271d 3413 struct packet_reg *reg = packet_reg_from_pnum (rsa, pnum);
43ff13b4 3414 p = p1;
43ff13b4 3415 if (*p++ != ':')
8a3fe4f8
AC
3416 error (_("Malformed packet(b) (missing colon): %s\n\
3417Packet: '%s'\n"),
3fcb8548 3418 p, buf);
43ff13b4 3419
ad10f812 3420 if (reg == NULL)
8a3fe4f8
AC
3421 error (_("Remote sent bad register number %ld: %s\n\
3422Packet: '%s'\n"),
3fcb8548 3423 pnum, p, buf);
43ff13b4 3424
cfd77fa1 3425 fieldsize = hex2bin (p, regs,
2bc416ba 3426 register_size (current_gdbarch,
23860348 3427 reg->regnum));
6c3f2dbf 3428 p += 2 * fieldsize;
2bc416ba 3429 if (fieldsize < register_size (current_gdbarch,
23860348 3430 reg->regnum))
8a3fe4f8 3431 warning (_("Remote reply is too short: %s"), buf);
23a6d369 3432 regcache_raw_supply (current_regcache, reg->regnum, regs);
43ff13b4
JM
3433 }
3434
3435 if (*p++ != ';')
8a3fe4f8 3436 error (_("Remote register badly formatted: %s\nhere: %s"),
0a2cfde4 3437 buf, p);
43ff13b4
JM
3438 }
3439 }
3440 /* fall through */
23860348 3441 case 'S': /* Old style status, just signal only. */
43ff13b4
JM
3442 status->kind = TARGET_WAITKIND_STOPPED;
3443 status->value.sig = (enum target_signal)
3444 (((fromhex (buf[1])) << 4) + (fromhex (buf[2])));
3445
3446 if (buf[3] == 'p')
3447 {
43ff13b4
JM
3448 thread_num = strtol ((const char *) &buf[4], NULL, 16);
3449 record_currthread (thread_num);
3450 }
43ff13b4 3451 goto got_status;
23860348 3452 case 'W': /* Target exited. */
43ff13b4
JM
3453 {
3454 /* The remote process exited. */
3455 status->kind = TARGET_WAITKIND_EXITED;
3456 status->value.integer = (fromhex (buf[1]) << 4) + fromhex (buf[2]);
3457 goto got_status;
3458 }
3459 case 'X':
3460 status->kind = TARGET_WAITKIND_SIGNALLED;
3461 status->value.sig = (enum target_signal)
3462 (((fromhex (buf[1])) << 4) + (fromhex (buf[2])));
3463 kill_kludge = 1;
3464
3465 goto got_status;
23860348 3466 case 'O': /* Console output. */
43ff13b4 3467 remote_console_output (buf + 1);
c4093a6a 3468 /* Return immediately to the event loop. The event loop will
23860348 3469 still be waiting on the inferior afterwards. */
c4093a6a
JM
3470 status->kind = TARGET_WAITKIND_IGNORE;
3471 goto got_status;
43ff13b4
JM
3472 case '\0':
3473 if (last_sent_signal != TARGET_SIGNAL_0)
3474 {
3475 /* Zero length reply means that we tried 'S' or 'C' and
c5aa993b 3476 the remote system doesn't support it. */
43ff13b4
JM
3477 target_terminal_ours_for_output ();
3478 printf_filtered
3479 ("Can't send signals to this remote system. %s not sent.\n",
3480 target_signal_to_name (last_sent_signal));
3481 last_sent_signal = TARGET_SIGNAL_0;
3482 target_terminal_inferior ();
3483
3484 strcpy ((char *) buf, last_sent_step ? "s" : "c");
3485 putpkt ((char *) buf);
3486 continue;
3487 }
3488 /* else fallthrough */
3489 default:
8a3fe4f8 3490 warning (_("Invalid remote reply: %s"), buf);
43ff13b4
JM
3491 continue;
3492 }
3493 }
c5aa993b 3494got_status:
43ff13b4
JM
3495 if (thread_num != -1)
3496 {
39f77062 3497 return pid_to_ptid (thread_num);
43ff13b4 3498 }
39f77062 3499 return inferior_ptid;
43ff13b4
JM
3500}
3501
74ca34ce 3502/* Fetch a single register using a 'p' packet. */
c906108c 3503
b96ec7ac 3504static int
56be3814 3505fetch_register_using_p (struct regcache *regcache, struct packet_reg *reg)
b96ec7ac
AC
3506{
3507 struct remote_state *rs = get_remote_state ();
2e9f7625 3508 char *buf, *p;
b96ec7ac
AC
3509 char regp[MAX_REGISTER_SIZE];
3510 int i;
3511
74ca34ce
DJ
3512 if (remote_protocol_packets[PACKET_p].support == PACKET_DISABLE)
3513 return 0;
3514
3515 if (reg->pnum == -1)
3516 return 0;
3517
2e9f7625 3518 p = rs->buf;
fcad0fa4 3519 *p++ = 'p';
74ca34ce 3520 p += hexnumstr (p, reg->pnum);
fcad0fa4 3521 *p++ = '\0';
6d820c5c 3522 remote_send (&rs->buf, &rs->buf_size);
3f9a994c 3523
2e9f7625
DJ
3524 buf = rs->buf;
3525
74ca34ce
DJ
3526 switch (packet_ok (buf, &remote_protocol_packets[PACKET_p]))
3527 {
3528 case PACKET_OK:
3529 break;
3530 case PACKET_UNKNOWN:
3531 return 0;
3532 case PACKET_ERROR:
3533 error (_("Could not fetch register \"%s\""),
3534 gdbarch_register_name (current_gdbarch, reg->regnum));
3535 }
3f9a994c
JB
3536
3537 /* If this register is unfetchable, tell the regcache. */
3538 if (buf[0] == 'x')
8480adf2 3539 {
56be3814 3540 regcache_raw_supply (regcache, reg->regnum, NULL);
8480adf2 3541 return 1;
b96ec7ac 3542 }
b96ec7ac 3543
3f9a994c
JB
3544 /* Otherwise, parse and supply the value. */
3545 p = buf;
3546 i = 0;
3547 while (p[0] != 0)
3548 {
3549 if (p[1] == 0)
74ca34ce 3550 error (_("fetch_register_using_p: early buf termination"));
3f9a994c
JB
3551
3552 regp[i++] = fromhex (p[0]) * 16 + fromhex (p[1]);
3553 p += 2;
3554 }
56be3814 3555 regcache_raw_supply (regcache, reg->regnum, regp);
3f9a994c 3556 return 1;
b96ec7ac
AC
3557}
3558
74ca34ce
DJ
3559/* Fetch the registers included in the target's 'g' packet. */
3560
29709017
DJ
3561static int
3562send_g_packet (void)
c906108c 3563{
d01949b6 3564 struct remote_state *rs = get_remote_state ();
74ca34ce 3565 int i, buf_len;
c906108c 3566 char *p;
74ca34ce 3567 char *regs;
c906108c 3568
74ca34ce
DJ
3569 sprintf (rs->buf, "g");
3570 remote_send (&rs->buf, &rs->buf_size);
c906108c 3571
29709017
DJ
3572 /* We can get out of synch in various cases. If the first character
3573 in the buffer is not a hex character, assume that has happened
3574 and try to fetch another packet to read. */
3575 while ((rs->buf[0] < '0' || rs->buf[0] > '9')
3576 && (rs->buf[0] < 'A' || rs->buf[0] > 'F')
3577 && (rs->buf[0] < 'a' || rs->buf[0] > 'f')
3578 && rs->buf[0] != 'x') /* New: unavailable register value. */
3579 {
3580 if (remote_debug)
3581 fprintf_unfiltered (gdb_stdlog,
3582 "Bad register packet; fetching a new packet\n");
3583 getpkt (&rs->buf, &rs->buf_size, 0);
3584 }
3585
74ca34ce
DJ
3586 buf_len = strlen (rs->buf);
3587
3588 /* Sanity check the received packet. */
3589 if (buf_len % 2 != 0)
3590 error (_("Remote 'g' packet reply is of odd length: %s"), rs->buf);
29709017
DJ
3591
3592 return buf_len / 2;
3593}
3594
3595static void
56be3814 3596process_g_packet (struct regcache *regcache)
29709017
DJ
3597{
3598 struct remote_state *rs = get_remote_state ();
3599 struct remote_arch_state *rsa = get_remote_arch_state ();
3600 int i, buf_len;
3601 char *p;
3602 char *regs;
3603
3604 buf_len = strlen (rs->buf);
3605
3606 /* Further sanity checks, with knowledge of the architecture. */
74ca34ce
DJ
3607 if (buf_len > 2 * rsa->sizeof_g_packet)
3608 error (_("Remote 'g' packet reply is too long: %s"), rs->buf);
3609
3610 /* Save the size of the packet sent to us by the target. It is used
3611 as a heuristic when determining the max size of packets that the
3612 target can safely receive. */
3613 if (rsa->actual_register_packet_size == 0)
3614 rsa->actual_register_packet_size = buf_len;
3615
3616 /* If this is smaller than we guessed the 'g' packet would be,
3617 update our records. A 'g' reply that doesn't include a register's
3618 value implies either that the register is not available, or that
3619 the 'p' packet must be used. */
3620 if (buf_len < 2 * rsa->sizeof_g_packet)
b323314b 3621 {
74ca34ce
DJ
3622 rsa->sizeof_g_packet = buf_len / 2;
3623
f57d151a 3624 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
b96ec7ac 3625 {
74ca34ce
DJ
3626 if (rsa->regs[i].pnum == -1)
3627 continue;
3628
3629 if (rsa->regs[i].offset >= rsa->sizeof_g_packet)
3630 rsa->regs[i].in_g_packet = 0;
b96ec7ac 3631 else
74ca34ce 3632 rsa->regs[i].in_g_packet = 1;
b96ec7ac 3633 }
74ca34ce 3634 }
b323314b 3635
74ca34ce 3636 regs = alloca (rsa->sizeof_g_packet);
c906108c
SS
3637
3638 /* Unimplemented registers read as all bits zero. */
ea9c271d 3639 memset (regs, 0, rsa->sizeof_g_packet);
c906108c 3640
c906108c
SS
3641 /* Reply describes registers byte by byte, each byte encoded as two
3642 hex characters. Suck them all up, then supply them to the
3643 register cacheing/storage mechanism. */
3644
74ca34ce 3645 p = rs->buf;
ea9c271d 3646 for (i = 0; i < rsa->sizeof_g_packet; i++)
c906108c 3647 {
74ca34ce
DJ
3648 if (p[0] == 0 || p[1] == 0)
3649 /* This shouldn't happen - we adjusted sizeof_g_packet above. */
3650 internal_error (__FILE__, __LINE__,
3651 "unexpected end of 'g' packet reply");
3652
c906108c 3653 if (p[0] == 'x' && p[1] == 'x')
c5aa993b 3654 regs[i] = 0; /* 'x' */
c906108c
SS
3655 else
3656 regs[i] = fromhex (p[0]) * 16 + fromhex (p[1]);
3657 p += 2;
3658 }
3659
ad10f812 3660 {
b323314b 3661 int i;
f57d151a 3662 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
ad10f812 3663 {
ea9c271d 3664 struct packet_reg *r = &rsa->regs[i];
b323314b
AC
3665 if (r->in_g_packet)
3666 {
74ca34ce
DJ
3667 if (r->offset * 2 >= strlen (rs->buf))
3668 /* This shouldn't happen - we adjusted in_g_packet above. */
3669 internal_error (__FILE__, __LINE__,
3670 "unexpected end of 'g' packet reply");
3671 else if (rs->buf[r->offset * 2] == 'x')
8ccc1287 3672 {
74ca34ce 3673 gdb_assert (r->offset * 2 < strlen (rs->buf));
8ccc1287
AC
3674 /* The register isn't available, mark it as such (at
3675 the same time setting the value to zero). */
56be3814 3676 regcache_raw_supply (regcache, r->regnum, NULL);
8ccc1287
AC
3677 }
3678 else
56be3814 3679 regcache_raw_supply (regcache, r->regnum,
8ccc1287 3680 regs + r->offset);
b323314b 3681 }
ad10f812
AC
3682 }
3683 }
c906108c
SS
3684}
3685
29709017 3686static void
56be3814 3687fetch_registers_using_g (struct regcache *regcache)
29709017
DJ
3688{
3689 send_g_packet ();
56be3814 3690 process_g_packet (regcache);
29709017
DJ
3691}
3692
74ca34ce 3693static void
56be3814 3694remote_fetch_registers (struct regcache *regcache, int regnum)
74ca34ce
DJ
3695{
3696 struct remote_state *rs = get_remote_state ();
3697 struct remote_arch_state *rsa = get_remote_arch_state ();
3698 int i;
3699
3700 set_thread (PIDGET (inferior_ptid), 1);
3701
3702 if (regnum >= 0)
3703 {
3704 struct packet_reg *reg = packet_reg_from_regnum (rsa, regnum);
3705 gdb_assert (reg != NULL);
3706
3707 /* If this register might be in the 'g' packet, try that first -
3708 we are likely to read more than one register. If this is the
3709 first 'g' packet, we might be overly optimistic about its
3710 contents, so fall back to 'p'. */
3711 if (reg->in_g_packet)
3712 {
56be3814 3713 fetch_registers_using_g (regcache);
74ca34ce
DJ
3714 if (reg->in_g_packet)
3715 return;
3716 }
3717
56be3814 3718 if (fetch_register_using_p (regcache, reg))
74ca34ce
DJ
3719 return;
3720
3721 /* This register is not available. */
56be3814 3722 regcache_raw_supply (regcache, reg->regnum, NULL);
74ca34ce
DJ
3723
3724 return;
3725 }
3726
56be3814 3727 fetch_registers_using_g (regcache);
74ca34ce 3728
f57d151a 3729 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
74ca34ce 3730 if (!rsa->regs[i].in_g_packet)
56be3814 3731 if (!fetch_register_using_p (regcache, &rsa->regs[i]))
74ca34ce
DJ
3732 {
3733 /* This register is not available. */
56be3814 3734 regcache_raw_supply (regcache, i, NULL);
74ca34ce
DJ
3735 }
3736}
3737
c906108c
SS
3738/* Prepare to store registers. Since we may send them all (using a
3739 'G' request), we have to read out the ones we don't want to change
3740 first. */
3741
c5aa993b 3742static void
316f2060 3743remote_prepare_to_store (struct regcache *regcache)
c906108c 3744{
ea9c271d 3745 struct remote_arch_state *rsa = get_remote_arch_state ();
cf0e1e0d 3746 int i;
cfd77fa1 3747 gdb_byte buf[MAX_REGISTER_SIZE];
cf0e1e0d 3748
c906108c 3749 /* Make sure the entire registers array is valid. */
444abaca 3750 switch (remote_protocol_packets[PACKET_P].support)
5a2468f5
JM
3751 {
3752 case PACKET_DISABLE:
3753 case PACKET_SUPPORT_UNKNOWN:
cf0e1e0d 3754 /* Make sure all the necessary registers are cached. */
f57d151a 3755 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
ea9c271d 3756 if (rsa->regs[i].in_g_packet)
316f2060 3757 regcache_raw_read (regcache, rsa->regs[i].regnum, buf);
5a2468f5
JM
3758 break;
3759 case PACKET_ENABLE:
3760 break;
3761 }
3762}
3763
ad10f812 3764/* Helper: Attempt to store REGNUM using the P packet. Return fail IFF
23860348 3765 packet was not recognized. */
5a2468f5
JM
3766
3767static int
56be3814 3768store_register_using_P (const struct regcache *regcache, struct packet_reg *reg)
5a2468f5 3769{
d01949b6 3770 struct remote_state *rs = get_remote_state ();
ea9c271d 3771 struct remote_arch_state *rsa = get_remote_arch_state ();
5a2468f5 3772 /* Try storing a single register. */
6d820c5c 3773 char *buf = rs->buf;
cfd77fa1 3774 gdb_byte regp[MAX_REGISTER_SIZE];
5a2468f5 3775 char *p;
5a2468f5 3776
74ca34ce
DJ
3777 if (remote_protocol_packets[PACKET_P].support == PACKET_DISABLE)
3778 return 0;
3779
3780 if (reg->pnum == -1)
3781 return 0;
3782
ea9c271d 3783 xsnprintf (buf, get_remote_packet_size (), "P%s=", phex_nz (reg->pnum, 0));
5a2468f5 3784 p = buf + strlen (buf);
56be3814 3785 regcache_raw_collect (regcache, reg->regnum, regp);
3acba339 3786 bin2hex (regp, p, register_size (current_gdbarch, reg->regnum));
6d820c5c 3787 remote_send (&rs->buf, &rs->buf_size);
5a2468f5 3788
74ca34ce
DJ
3789 switch (packet_ok (rs->buf, &remote_protocol_packets[PACKET_P]))
3790 {
3791 case PACKET_OK:
3792 return 1;
3793 case PACKET_ERROR:
3794 error (_("Could not write register \"%s\""),
3795 gdbarch_register_name (current_gdbarch, reg->regnum));
3796 case PACKET_UNKNOWN:
3797 return 0;
3798 default:
3799 internal_error (__FILE__, __LINE__, _("Bad result from packet_ok"));
3800 }
c906108c
SS
3801}
3802
23860348
MS
3803/* Store register REGNUM, or all registers if REGNUM == -1, from the
3804 contents of the register cache buffer. FIXME: ignores errors. */
c906108c
SS
3805
3806static void
56be3814 3807store_registers_using_G (const struct regcache *regcache)
c906108c 3808{
d01949b6 3809 struct remote_state *rs = get_remote_state ();
ea9c271d 3810 struct remote_arch_state *rsa = get_remote_arch_state ();
cfd77fa1 3811 gdb_byte *regs;
c906108c
SS
3812 char *p;
3813
193cb69f
AC
3814 /* Extract all the registers in the regcache copying them into a
3815 local buffer. */
3816 {
b323314b 3817 int i;
ea9c271d
DJ
3818 regs = alloca (rsa->sizeof_g_packet);
3819 memset (regs, 0, rsa->sizeof_g_packet);
f57d151a 3820 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
193cb69f 3821 {
ea9c271d 3822 struct packet_reg *r = &rsa->regs[i];
b323314b 3823 if (r->in_g_packet)
56be3814 3824 regcache_raw_collect (regcache, r->regnum, regs + r->offset);
193cb69f
AC
3825 }
3826 }
c906108c
SS
3827
3828 /* Command describes registers byte by byte,
3829 each byte encoded as two hex characters. */
6d820c5c 3830 p = rs->buf;
193cb69f 3831 *p++ = 'G';
74ca34ce
DJ
3832 /* remote_prepare_to_store insures that rsa->sizeof_g_packet gets
3833 updated. */
3834 bin2hex (regs, p, rsa->sizeof_g_packet);
6d820c5c 3835 remote_send (&rs->buf, &rs->buf_size);
c906108c 3836}
74ca34ce
DJ
3837
3838/* Store register REGNUM, or all registers if REGNUM == -1, from the contents
3839 of the register cache buffer. FIXME: ignores errors. */
3840
3841static void
56be3814 3842remote_store_registers (struct regcache *regcache, int regnum)
74ca34ce
DJ
3843{
3844 struct remote_state *rs = get_remote_state ();
3845 struct remote_arch_state *rsa = get_remote_arch_state ();
3846 int i;
3847
3848 set_thread (PIDGET (inferior_ptid), 1);
3849
3850 if (regnum >= 0)
3851 {
3852 struct packet_reg *reg = packet_reg_from_regnum (rsa, regnum);
3853 gdb_assert (reg != NULL);
3854
3855 /* Always prefer to store registers using the 'P' packet if
3856 possible; we often change only a small number of registers.
3857 Sometimes we change a larger number; we'd need help from a
3858 higher layer to know to use 'G'. */
56be3814 3859 if (store_register_using_P (regcache, reg))
74ca34ce
DJ
3860 return;
3861
3862 /* For now, don't complain if we have no way to write the
3863 register. GDB loses track of unavailable registers too
3864 easily. Some day, this may be an error. We don't have
3865 any way to read the register, either... */
3866 if (!reg->in_g_packet)
3867 return;
3868
56be3814 3869 store_registers_using_G (regcache);
74ca34ce
DJ
3870 return;
3871 }
3872
56be3814 3873 store_registers_using_G (regcache);
74ca34ce 3874
f57d151a 3875 for (i = 0; i < gdbarch_num_regs (current_gdbarch); i++)
74ca34ce 3876 if (!rsa->regs[i].in_g_packet)
56be3814 3877 if (!store_register_using_P (regcache, &rsa->regs[i]))
74ca34ce
DJ
3878 /* See above for why we do not issue an error here. */
3879 continue;
3880}
c906108c
SS
3881\f
3882
3883/* Return the number of hex digits in num. */
3884
3885static int
fba45db2 3886hexnumlen (ULONGEST num)
c906108c
SS
3887{
3888 int i;
3889
3890 for (i = 0; num != 0; i++)
3891 num >>= 4;
3892
3893 return max (i, 1);
3894}
3895
2df3850c 3896/* Set BUF to the minimum number of hex digits representing NUM. */
c906108c
SS
3897
3898static int
fba45db2 3899hexnumstr (char *buf, ULONGEST num)
c906108c 3900{
c906108c 3901 int len = hexnumlen (num);
2df3850c
JM
3902 return hexnumnstr (buf, num, len);
3903}
3904
c906108c 3905
2df3850c 3906/* Set BUF to the hex digits representing NUM, padded to WIDTH characters. */
c906108c 3907
2df3850c 3908static int
fba45db2 3909hexnumnstr (char *buf, ULONGEST num, int width)
2df3850c
JM
3910{
3911 int i;
3912
3913 buf[width] = '\0';
3914
3915 for (i = width - 1; i >= 0; i--)
c906108c 3916 {
c5aa993b 3917 buf[i] = "0123456789abcdef"[(num & 0xf)];
c906108c
SS
3918 num >>= 4;
3919 }
3920
2df3850c 3921 return width;
c906108c
SS
3922}
3923
23860348 3924/* Mask all but the least significant REMOTE_ADDRESS_SIZE bits. */
c906108c
SS
3925
3926static CORE_ADDR
fba45db2 3927remote_address_masked (CORE_ADDR addr)
c906108c
SS
3928{
3929 if (remote_address_size > 0
3930 && remote_address_size < (sizeof (ULONGEST) * 8))
3931 {
3932 /* Only create a mask when that mask can safely be constructed
23860348 3933 in a ULONGEST variable. */
c906108c
SS
3934 ULONGEST mask = 1;
3935 mask = (mask << remote_address_size) - 1;
3936 addr &= mask;
3937 }
3938 return addr;
3939}
3940
a31ea83d
DJ
3941/* Convert BUFFER, binary data at least LEN bytes long, into escaped
3942 binary data in OUT_BUF. Set *OUT_LEN to the length of the data
3943 encoded in OUT_BUF, and return the number of bytes in OUT_BUF
3944 (which may be more than *OUT_LEN due to escape characters). The
3945 total number of bytes in the output buffer will be at most
3946 OUT_MAXLEN. */
3947
3948static int
3949remote_escape_output (const gdb_byte *buffer, int len,
3950 gdb_byte *out_buf, int *out_len,
3951 int out_maxlen)
3952{
3953 int input_index, output_index;
3954
3955 output_index = 0;
3956 for (input_index = 0; input_index < len; input_index++)
3957 {
3958 gdb_byte b = buffer[input_index];
3959
3960 if (b == '$' || b == '#' || b == '}')
3961 {
3962 /* These must be escaped. */
3963 if (output_index + 2 > out_maxlen)
3964 break;
3965 out_buf[output_index++] = '}';
3966 out_buf[output_index++] = b ^ 0x20;
3967 }
3968 else
3969 {
3970 if (output_index + 1 > out_maxlen)
3971 break;
3972 out_buf[output_index++] = b;
3973 }
3974 }
3975
3976 *out_len = input_index;
3977 return output_index;
3978}
3979
0876f84a
DJ
3980/* Convert BUFFER, escaped data LEN bytes long, into binary data
3981 in OUT_BUF. Return the number of bytes written to OUT_BUF.
3982 Raise an error if the total number of bytes exceeds OUT_MAXLEN.
3983
3984 This function reverses remote_escape_output. It allows more
3985 escaped characters than that function does, in particular because
3986 '*' must be escaped to avoid the run-length encoding processing
3987 in reading packets. */
3988
3989static int
3990remote_unescape_input (const gdb_byte *buffer, int len,
3991 gdb_byte *out_buf, int out_maxlen)
3992{
3993 int input_index, output_index;
3994 int escaped;
3995
3996 output_index = 0;
3997 escaped = 0;
3998 for (input_index = 0; input_index < len; input_index++)
3999 {
4000 gdb_byte b = buffer[input_index];
4001
4002 if (output_index + 1 > out_maxlen)
4003 {
4004 warning (_("Received too much data from remote target;"
4005 " ignoring overflow."));
4006 return output_index;
4007 }
4008
4009 if (escaped)
4010 {
4011 out_buf[output_index++] = b ^ 0x20;
4012 escaped = 0;
4013 }
4014 else if (b == '}')
4015 escaped = 1;
4016 else
4017 out_buf[output_index++] = b;
4018 }
4019
4020 if (escaped)
4021 error (_("Unmatched escape character in target response."));
4022
4023 return output_index;
4024}
4025
c906108c
SS
4026/* Determine whether the remote target supports binary downloading.
4027 This is accomplished by sending a no-op memory write of zero length
4028 to the target at the specified address. It does not suffice to send
23860348
MS
4029 the whole packet, since many stubs strip the eighth bit and
4030 subsequently compute a wrong checksum, which causes real havoc with
4031 remote_write_bytes.
7a292a7a 4032
96baa820
JM
4033 NOTE: This can still lose if the serial line is not eight-bit
4034 clean. In cases like this, the user should clear "remote
23860348 4035 X-packet". */
96baa820 4036
c906108c 4037static void
fba45db2 4038check_binary_download (CORE_ADDR addr)
c906108c 4039{
d01949b6 4040 struct remote_state *rs = get_remote_state ();
24b06219 4041
444abaca 4042 switch (remote_protocol_packets[PACKET_X].support)
c906108c 4043 {
96baa820
JM
4044 case PACKET_DISABLE:
4045 break;
4046 case PACKET_ENABLE:
4047 break;
4048 case PACKET_SUPPORT_UNKNOWN:
4049 {
96baa820 4050 char *p;
802188a7 4051
2e9f7625 4052 p = rs->buf;
96baa820
JM
4053 *p++ = 'X';
4054 p += hexnumstr (p, (ULONGEST) addr);
4055 *p++ = ',';
4056 p += hexnumstr (p, (ULONGEST) 0);
4057 *p++ = ':';
4058 *p = '\0';
802188a7 4059
2e9f7625 4060 putpkt_binary (rs->buf, (int) (p - rs->buf));
6d820c5c 4061 getpkt (&rs->buf, &rs->buf_size, 0);
c906108c 4062
2e9f7625 4063 if (rs->buf[0] == '\0')
96baa820
JM
4064 {
4065 if (remote_debug)
4066 fprintf_unfiltered (gdb_stdlog,
4067 "binary downloading NOT suppported by target\n");
444abaca 4068 remote_protocol_packets[PACKET_X].support = PACKET_DISABLE;
96baa820
JM
4069 }
4070 else
4071 {
4072 if (remote_debug)
4073 fprintf_unfiltered (gdb_stdlog,
4074 "binary downloading suppported by target\n");
444abaca 4075 remote_protocol_packets[PACKET_X].support = PACKET_ENABLE;
96baa820
JM
4076 }
4077 break;
4078 }
c906108c
SS
4079 }
4080}
4081
4082/* Write memory data directly to the remote machine.
4083 This does not inform the data cache; the data cache uses this.
a76d924d 4084 HEADER is the starting part of the packet.
c906108c
SS
4085 MEMADDR is the address in the remote memory space.
4086 MYADDR is the address of the buffer in our space.
4087 LEN is the number of bytes.
a76d924d
DJ
4088 PACKET_FORMAT should be either 'X' or 'M', and indicates if we
4089 should send data as binary ('X'), or hex-encoded ('M').
4090
4091 The function creates packet of the form
4092 <HEADER><ADDRESS>,<LENGTH>:<DATA>
4093
4094 where encoding of <DATA> is termined by PACKET_FORMAT.
4095
4096 If USE_LENGTH is 0, then the <LENGTH> field and the preceding comma
4097 are omitted.
4098
4099 Returns the number of bytes transferred, or 0 (setting errno) for
23860348 4100 error. Only transfer a single packet. */
c906108c 4101
a76d924d
DJ
4102static int
4103remote_write_bytes_aux (const char *header, CORE_ADDR memaddr,
4104 const gdb_byte *myaddr, int len,
4105 char packet_format, int use_length)
c906108c 4106{
6d820c5c 4107 struct remote_state *rs = get_remote_state ();
cfd77fa1 4108 char *p;
a76d924d
DJ
4109 char *plen = NULL;
4110 int plenlen = 0;
917317f4
JM
4111 int todo;
4112 int nr_bytes;
a257b5bb 4113 int payload_size;
6765f3e5 4114 int payload_length;
a76d924d
DJ
4115 int header_length;
4116
4117 if (packet_format != 'X' && packet_format != 'M')
4118 internal_error (__FILE__, __LINE__,
4119 "remote_write_bytes_aux: bad packet format");
c906108c 4120
b2182ed2
DJ
4121 if (len <= 0)
4122 return 0;
4123
3de11b2e 4124 payload_size = get_memory_write_packet_size ();
2bc416ba 4125
6d820c5c
DJ
4126 /* The packet buffer will be large enough for the payload;
4127 get_memory_packet_size ensures this. */
a76d924d 4128 rs->buf[0] = '\0';
c906108c 4129
a257b5bb 4130 /* Compute the size of the actual payload by subtracting out the
3de11b2e
NS
4131 packet header and footer overhead: "$M<memaddr>,<len>:...#nn".
4132 */
a76d924d
DJ
4133 payload_size -= strlen ("$,:#NN");
4134 if (!use_length)
4135 /* The comma won't be used. */
4136 payload_size += 1;
4137 header_length = strlen (header);
4138 payload_size -= header_length;
3de11b2e 4139 payload_size -= hexnumlen (memaddr);
c906108c 4140
a76d924d 4141 /* Construct the packet excluding the data: "<header><memaddr>,<len>:". */
917317f4 4142
a76d924d
DJ
4143 strcat (rs->buf, header);
4144 p = rs->buf + strlen (header);
4145
4146 /* Compute a best guess of the number of bytes actually transfered. */
4147 if (packet_format == 'X')
c906108c 4148 {
23860348 4149 /* Best guess at number of bytes that will fit. */
a257b5bb 4150 todo = min (len, payload_size);
a76d924d
DJ
4151 if (use_length)
4152 payload_size -= hexnumlen (todo);
3de11b2e 4153 todo = min (todo, payload_size);
a76d924d
DJ
4154 }
4155 else
4156 {
23860348 4157 /* Num bytes that will fit. */
a257b5bb 4158 todo = min (len, payload_size / 2);
a76d924d
DJ
4159 if (use_length)
4160 payload_size -= hexnumlen (todo);
3de11b2e 4161 todo = min (todo, payload_size / 2);
917317f4 4162 }
a76d924d 4163
3de11b2e
NS
4164 if (todo <= 0)
4165 internal_error (__FILE__, __LINE__,
4166 _("minumum packet size too small to write data"));
802188a7 4167
6765f3e5
DJ
4168 /* If we already need another packet, then try to align the end
4169 of this packet to a useful boundary. */
4170 if (todo > 2 * REMOTE_ALIGN_WRITES && todo < len)
4171 todo = ((memaddr + todo) & ~(REMOTE_ALIGN_WRITES - 1)) - memaddr;
4172
a257b5bb 4173 /* Append "<memaddr>". */
917317f4
JM
4174 memaddr = remote_address_masked (memaddr);
4175 p += hexnumstr (p, (ULONGEST) memaddr);
a257b5bb 4176
a76d924d
DJ
4177 if (use_length)
4178 {
4179 /* Append ",". */
4180 *p++ = ',';
802188a7 4181
a76d924d
DJ
4182 /* Append <len>. Retain the location/size of <len>. It may need to
4183 be adjusted once the packet body has been created. */
4184 plen = p;
4185 plenlen = hexnumstr (p, (ULONGEST) todo);
4186 p += plenlen;
4187 }
a257b5bb
AC
4188
4189 /* Append ":". */
917317f4
JM
4190 *p++ = ':';
4191 *p = '\0';
802188a7 4192
a257b5bb 4193 /* Append the packet body. */
a76d924d 4194 if (packet_format == 'X')
917317f4 4195 {
917317f4
JM
4196 /* Binary mode. Send target system values byte by byte, in
4197 increasing byte addresses. Only escape certain critical
4198 characters. */
6765f3e5
DJ
4199 payload_length = remote_escape_output (myaddr, todo, p, &nr_bytes,
4200 payload_size);
4201
4202 /* If not all TODO bytes fit, then we'll need another packet. Make
9b7194bc
DJ
4203 a second try to keep the end of the packet aligned. Don't do
4204 this if the packet is tiny. */
4205 if (nr_bytes < todo && nr_bytes > 2 * REMOTE_ALIGN_WRITES)
6765f3e5
DJ
4206 {
4207 int new_nr_bytes;
4208
4209 new_nr_bytes = (((memaddr + nr_bytes) & ~(REMOTE_ALIGN_WRITES - 1))
4210 - memaddr);
4211 if (new_nr_bytes != nr_bytes)
4212 payload_length = remote_escape_output (myaddr, new_nr_bytes,
4213 p, &nr_bytes,
4214 payload_size);
4215 }
4216
4217 p += payload_length;
a76d924d 4218 if (use_length && nr_bytes < todo)
c906108c 4219 {
802188a7 4220 /* Escape chars have filled up the buffer prematurely,
917317f4
JM
4221 and we have actually sent fewer bytes than planned.
4222 Fix-up the length field of the packet. Use the same
4223 number of characters as before. */
917317f4
JM
4224 plen += hexnumnstr (plen, (ULONGEST) nr_bytes, plenlen);
4225 *plen = ':'; /* overwrite \0 from hexnumnstr() */
c906108c 4226 }
a76d924d
DJ
4227 }
4228 else
4229 {
917317f4
JM
4230 /* Normal mode: Send target system values byte by byte, in
4231 increasing byte addresses. Each byte is encoded as a two hex
4232 value. */
2644f393 4233 nr_bytes = bin2hex (myaddr, p, todo);
aa6c0017 4234 p += 2 * nr_bytes;
c906108c 4235 }
802188a7 4236
2e9f7625 4237 putpkt_binary (rs->buf, (int) (p - rs->buf));
6d820c5c 4238 getpkt (&rs->buf, &rs->buf_size, 0);
802188a7 4239
2e9f7625 4240 if (rs->buf[0] == 'E')
917317f4
JM
4241 {
4242 /* There is no correspondance between what the remote protocol
4243 uses for errors and errno codes. We would like a cleaner way
4244 of representing errors (big enough to include errno codes,
4245 bfd_error codes, and others). But for now just return EIO. */
4246 errno = EIO;
4247 return 0;
4248 }
802188a7 4249
23860348
MS
4250 /* Return NR_BYTES, not TODO, in case escape chars caused us to send
4251 fewer bytes than we'd planned. */
917317f4 4252 return nr_bytes;
c906108c
SS
4253}
4254
a76d924d
DJ
4255/* Write memory data directly to the remote machine.
4256 This does not inform the data cache; the data cache uses this.
4257 MEMADDR is the address in the remote memory space.
4258 MYADDR is the address of the buffer in our space.
4259 LEN is the number of bytes.
4260
4261 Returns number of bytes transferred, or 0 (setting errno) for
4262 error. Only transfer a single packet. */
4263
4264int
4265remote_write_bytes (CORE_ADDR memaddr, const gdb_byte *myaddr, int len)
4266{
4267 char *packet_format = 0;
4268
4269 /* Check whether the target supports binary download. */
4270 check_binary_download (memaddr);
4271
4272 switch (remote_protocol_packets[PACKET_X].support)
4273 {
4274 case PACKET_ENABLE:
4275 packet_format = "X";
4276 break;
4277 case PACKET_DISABLE:
4278 packet_format = "M";
4279 break;
4280 case PACKET_SUPPORT_UNKNOWN:
4281 internal_error (__FILE__, __LINE__,
4282 _("remote_write_bytes: bad internal state"));
4283 default:
4284 internal_error (__FILE__, __LINE__, _("bad switch"));
4285 }
4286
4287 return remote_write_bytes_aux (packet_format,
4288 memaddr, myaddr, len, packet_format[0], 1);
4289}
4290
c906108c
SS
4291/* Read memory data directly from the remote machine.
4292 This does not use the data cache; the data cache uses this.
4293 MEMADDR is the address in the remote memory space.
4294 MYADDR is the address of the buffer in our space.
4295 LEN is the number of bytes.
4296
4297 Returns number of bytes transferred, or 0 for error. */
4298
917317f4
JM
4299/* NOTE: cagney/1999-10-18: This function (and its siblings in other
4300 remote targets) shouldn't attempt to read the entire buffer.
4301 Instead it should read a single packet worth of data and then
4302 return the byte size of that packet to the caller. The caller (its
4303 caller and its callers caller ;-) already contains code for
23860348 4304 handling partial reads. */
917317f4 4305
449092f6 4306int
cfd77fa1 4307remote_read_bytes (CORE_ADDR memaddr, gdb_byte *myaddr, int len)
c906108c 4308{
6d820c5c 4309 struct remote_state *rs = get_remote_state ();
23860348 4310 int max_buf_size; /* Max size of packet output buffer. */
c906108c
SS
4311 int origlen;
4312
b2182ed2
DJ
4313 if (len <= 0)
4314 return 0;
4315
11cf8741 4316 max_buf_size = get_memory_read_packet_size ();
6d820c5c
DJ
4317 /* The packet buffer will be large enough for the payload;
4318 get_memory_packet_size ensures this. */
c906108c
SS
4319
4320 origlen = len;
4321 while (len > 0)
4322 {
c906108c
SS
4323 char *p;
4324 int todo;
4325 int i;
4326
c5aa993b 4327 todo = min (len, max_buf_size / 2); /* num bytes that will fit */
c906108c
SS
4328
4329 /* construct "m"<memaddr>","<len>" */
2e9f7625 4330 /* sprintf (rs->buf, "m%lx,%x", (unsigned long) memaddr, todo); */
c906108c 4331 memaddr = remote_address_masked (memaddr);
2e9f7625 4332 p = rs->buf;
c906108c
SS
4333 *p++ = 'm';
4334 p += hexnumstr (p, (ULONGEST) memaddr);
4335 *p++ = ',';
4336 p += hexnumstr (p, (ULONGEST) todo);
4337 *p = '\0';
4338
2e9f7625 4339 putpkt (rs->buf);
6d820c5c 4340 getpkt (&rs->buf, &rs->buf_size, 0);
c906108c 4341
2e9f7625
DJ
4342 if (rs->buf[0] == 'E'
4343 && isxdigit (rs->buf[1]) && isxdigit (rs->buf[2])
4344 && rs->buf[3] == '\0')
c906108c 4345 {
23860348
MS
4346 /* There is no correspondance between what the remote
4347 protocol uses for errors and errno codes. We would like
4348 a cleaner way of representing errors (big enough to
4349 include errno codes, bfd_error codes, and others). But
4350 for now just return EIO. */
c906108c
SS
4351 errno = EIO;
4352 return 0;
4353 }
4354
c5aa993b
JM
4355 /* Reply describes memory byte by byte,
4356 each byte encoded as two hex characters. */
c906108c 4357
2e9f7625 4358 p = rs->buf;
30559e10 4359 if ((i = hex2bin (p, myaddr, todo)) < todo)
c906108c 4360 {
30559e10 4361 /* Reply is short. This means that we were able to read
23860348 4362 only part of what we wanted to. */
30559e10 4363 return i + (origlen - len);
c906108c
SS
4364 }
4365 myaddr += todo;
4366 memaddr += todo;
4367 len -= todo;
4368 }
4369 return origlen;
4370}
4371\f
4372/* Read or write LEN bytes from inferior memory at MEMADDR,
23860348
MS
4373 transferring to or from debugger address BUFFER. Write to inferior
4374 if SHOULD_WRITE is nonzero. Returns length of data written or
4375 read; 0 for error. TARGET is unused. */
392a587b 4376
c906108c 4377static int
961cb7b5 4378remote_xfer_memory (CORE_ADDR mem_addr, gdb_byte *buffer, int mem_len,
0a65a603 4379 int should_write, struct mem_attrib *attrib,
29e57380 4380 struct target_ops *target)
c906108c 4381{
4930751a
C
4382 int res;
4383
4930751a 4384 if (should_write)
b2182ed2 4385 res = remote_write_bytes (mem_addr, buffer, mem_len);
4930751a 4386 else
b2182ed2 4387 res = remote_read_bytes (mem_addr, buffer, mem_len);
4930751a
C
4388
4389 return res;
c906108c
SS
4390}
4391
a76d924d
DJ
4392/* Sends a packet with content determined by the printf format string
4393 FORMAT and the remaining arguments, then gets the reply. Returns
4394 whether the packet was a success, a failure, or unknown. */
4395
4396enum packet_result
4397remote_send_printf (const char *format, ...)
4398{
4399 struct remote_state *rs = get_remote_state ();
4400 int max_size = get_remote_packet_size ();
4401
4402 va_list ap;
4403 va_start (ap, format);
4404
4405 rs->buf[0] = '\0';
4406 if (vsnprintf (rs->buf, max_size, format, ap) >= max_size)
4407 internal_error (__FILE__, __LINE__, "Too long remote packet.");
4408
4409 if (putpkt (rs->buf) < 0)
4410 error (_("Communication problem with target."));
4411
4412 rs->buf[0] = '\0';
4413 getpkt (&rs->buf, &rs->buf_size, 0);
4414
4415 return packet_check_result (rs->buf);
4416}
4417
4418static void
4419restore_remote_timeout (void *p)
4420{
4421 int value = *(int *)p;
4422 remote_timeout = value;
4423}
4424
4425/* Flash writing can take quite some time. We'll set
4426 effectively infinite timeout for flash operations.
4427 In future, we'll need to decide on a better approach. */
4428static const int remote_flash_timeout = 1000;
4429
4430static void
4431remote_flash_erase (struct target_ops *ops,
4432 ULONGEST address, LONGEST length)
4433{
4434 int saved_remote_timeout = remote_timeout;
4435 enum packet_result ret;
4436
4437 struct cleanup *back_to = make_cleanup (restore_remote_timeout,
4438 &saved_remote_timeout);
4439 remote_timeout = remote_flash_timeout;
4440
4441 ret = remote_send_printf ("vFlashErase:%s,%s",
4442 paddr (address),
4443 phex (length, 4));
4444 switch (ret)
4445 {
4446 case PACKET_UNKNOWN:
4447 error (_("Remote target does not support flash erase"));
4448 case PACKET_ERROR:
4449 error (_("Error erasing flash with vFlashErase packet"));
4450 default:
4451 break;
4452 }
4453
4454 do_cleanups (back_to);
4455}
4456
4457static LONGEST
4458remote_flash_write (struct target_ops *ops,
4459 ULONGEST address, LONGEST length,
4460 const gdb_byte *data)
4461{
4462 int saved_remote_timeout = remote_timeout;
4463 int ret;
4464 struct cleanup *back_to = make_cleanup (restore_remote_timeout,
4465 &saved_remote_timeout);
4466
4467 remote_timeout = remote_flash_timeout;
4468 ret = remote_write_bytes_aux ("vFlashWrite:", address, data, length, 'X', 0);
4469 do_cleanups (back_to);
4470
4471 return ret;
4472}
4473
4474static void
4475remote_flash_done (struct target_ops *ops)
4476{
4477 int saved_remote_timeout = remote_timeout;
4478 int ret;
4479 struct cleanup *back_to = make_cleanup (restore_remote_timeout,
4480 &saved_remote_timeout);
4481
4482 remote_timeout = remote_flash_timeout;
4483 ret = remote_send_printf ("vFlashDone");
4484 do_cleanups (back_to);
4485
4486 switch (ret)
4487 {
4488 case PACKET_UNKNOWN:
4489 error (_("Remote target does not support vFlashDone"));
4490 case PACKET_ERROR:
4491 error (_("Error finishing flash operation"));
4492 default:
4493 break;
4494 }
4495}
4496
c906108c 4497static void
fba45db2 4498remote_files_info (struct target_ops *ignore)
c906108c
SS
4499{
4500 puts_filtered ("Debugging a target over a serial line.\n");
4501}
4502\f
4503/* Stuff for dealing with the packets which are part of this protocol.
4504 See comment at top of file for details. */
4505
0876f84a 4506/* Read a single character from the remote end. */
c906108c
SS
4507
4508static int
fba45db2 4509readchar (int timeout)
c906108c
SS
4510{
4511 int ch;
4512
2cd58942 4513 ch = serial_readchar (remote_desc, timeout);
c906108c 4514
2acceee2 4515 if (ch >= 0)
0876f84a 4516 return ch;
2acceee2
JM
4517
4518 switch ((enum serial_rc) ch)
c906108c
SS
4519 {
4520 case SERIAL_EOF:
2acceee2 4521 target_mourn_inferior ();
8a3fe4f8 4522 error (_("Remote connection closed"));
2acceee2 4523 /* no return */
c906108c 4524 case SERIAL_ERROR:
e2e0b3e5 4525 perror_with_name (_("Remote communication error"));
2acceee2 4526 /* no return */
c906108c 4527 case SERIAL_TIMEOUT:
2acceee2 4528 break;
c906108c 4529 }
2acceee2 4530 return ch;
c906108c
SS
4531}
4532
6d820c5c
DJ
4533/* Send the command in *BUF to the remote machine, and read the reply
4534 into *BUF. Report an error if we get an error reply. Resize
4535 *BUF using xrealloc if necessary to hold the result, and update
4536 *SIZEOF_BUF. */
c906108c
SS
4537
4538static void
6d820c5c
DJ
4539remote_send (char **buf,
4540 long *sizeof_buf)
c906108c 4541{
6d820c5c 4542 putpkt (*buf);
c2d11a7d 4543 getpkt (buf, sizeof_buf, 0);
c906108c 4544
6d820c5c
DJ
4545 if ((*buf)[0] == 'E')
4546 error (_("Remote failure reply: %s"), *buf);
c906108c
SS
4547}
4548
4549/* Display a null-terminated packet on stdout, for debugging, using C
4550 string notation. */
4551
4552static void
fba45db2 4553print_packet (char *buf)
c906108c
SS
4554{
4555 puts_filtered ("\"");
43e526b9 4556 fputstr_filtered (buf, '"', gdb_stdout);
c906108c
SS
4557 puts_filtered ("\"");
4558}
4559
4560int
fba45db2 4561putpkt (char *buf)
c906108c
SS
4562{
4563 return putpkt_binary (buf, strlen (buf));
4564}
4565
4566/* Send a packet to the remote machine, with error checking. The data
23860348 4567 of the packet is in BUF. The string in BUF can be at most
ea9c271d 4568 get_remote_packet_size () - 5 to account for the $, # and checksum,
23860348
MS
4569 and for a possible /0 if we are debugging (remote_debug) and want
4570 to print the sent packet as a string. */
c906108c
SS
4571
4572static int
fba45db2 4573putpkt_binary (char *buf, int cnt)
c906108c
SS
4574{
4575 int i;
4576 unsigned char csum = 0;
11cf8741 4577 char *buf2 = alloca (cnt + 6);
085dd6e6 4578
c906108c
SS
4579 int ch;
4580 int tcount = 0;
4581 char *p;
4582
4583 /* Copy the packet into buffer BUF2, encapsulating it
4584 and giving it a checksum. */
4585
c906108c
SS
4586 p = buf2;
4587 *p++ = '$';
4588
4589 for (i = 0; i < cnt; i++)
4590 {
4591 csum += buf[i];
4592 *p++ = buf[i];
4593 }
4594 *p++ = '#';
4595 *p++ = tohex ((csum >> 4) & 0xf);
4596 *p++ = tohex (csum & 0xf);
4597
4598 /* Send it over and over until we get a positive ack. */
4599
4600 while (1)
4601 {
4602 int started_error_output = 0;
4603
4604 if (remote_debug)
4605 {
4606 *p = '\0';
43e526b9
JM
4607 fprintf_unfiltered (gdb_stdlog, "Sending packet: ");
4608 fputstrn_unfiltered (buf2, p - buf2, 0, gdb_stdlog);
d4f3574e 4609 fprintf_unfiltered (gdb_stdlog, "...");
0f71a2f6 4610 gdb_flush (gdb_stdlog);
c906108c 4611 }
2cd58942 4612 if (serial_write (remote_desc, buf2, p - buf2))
e2e0b3e5 4613 perror_with_name (_("putpkt: write failed"));
c906108c 4614
23860348 4615 /* Read until either a timeout occurs (-2) or '+' is read. */
c906108c
SS
4616 while (1)
4617 {
4618 ch = readchar (remote_timeout);
4619
c5aa993b 4620 if (remote_debug)
c906108c
SS
4621 {
4622 switch (ch)
4623 {
4624 case '+':
1216fa2c 4625 case '-':
c906108c
SS
4626 case SERIAL_TIMEOUT:
4627 case '$':
4628 if (started_error_output)
4629 {
4630 putchar_unfiltered ('\n');
4631 started_error_output = 0;
4632 }
4633 }
4634 }
4635
4636 switch (ch)
4637 {
4638 case '+':
4639 if (remote_debug)
0f71a2f6 4640 fprintf_unfiltered (gdb_stdlog, "Ack\n");
c906108c 4641 return 1;
1216fa2c
AC
4642 case '-':
4643 if (remote_debug)
4644 fprintf_unfiltered (gdb_stdlog, "Nak\n");
c906108c 4645 case SERIAL_TIMEOUT:
c5aa993b 4646 tcount++;
c906108c
SS
4647 if (tcount > 3)
4648 return 0;
23860348 4649 break; /* Retransmit buffer. */
c906108c
SS
4650 case '$':
4651 {
40e3f985 4652 if (remote_debug)
2bc416ba 4653 fprintf_unfiltered (gdb_stdlog,
23860348 4654 "Packet instead of Ack, ignoring it\n");
d6f7abdf
AC
4655 /* It's probably an old response sent because an ACK
4656 was lost. Gobble up the packet and ack it so it
4657 doesn't get retransmitted when we resend this
4658 packet. */
6d820c5c 4659 skip_frame ();
d6f7abdf 4660 serial_write (remote_desc, "+", 1);
23860348 4661 continue; /* Now, go look for +. */
c906108c
SS
4662 }
4663 default:
4664 if (remote_debug)
4665 {
4666 if (!started_error_output)
4667 {
4668 started_error_output = 1;
0f71a2f6 4669 fprintf_unfiltered (gdb_stdlog, "putpkt: Junk: ");
c906108c 4670 }
0f71a2f6 4671 fputc_unfiltered (ch & 0177, gdb_stdlog);
c906108c
SS
4672 }
4673 continue;
4674 }
23860348 4675 break; /* Here to retransmit. */
c906108c
SS
4676 }
4677
4678#if 0
4679 /* This is wrong. If doing a long backtrace, the user should be
c5aa993b
JM
4680 able to get out next time we call QUIT, without anything as
4681 violent as interrupt_query. If we want to provide a way out of
4682 here without getting to the next QUIT, it should be based on
4683 hitting ^C twice as in remote_wait. */
c906108c
SS
4684 if (quit_flag)
4685 {
4686 quit_flag = 0;
4687 interrupt_query ();
4688 }
4689#endif
4690 }
4691}
4692
6d820c5c
DJ
4693/* Come here after finding the start of a frame when we expected an
4694 ack. Do our best to discard the rest of this packet. */
4695
4696static void
4697skip_frame (void)
4698{
4699 int c;
4700
4701 while (1)
4702 {
4703 c = readchar (remote_timeout);
4704 switch (c)
4705 {
4706 case SERIAL_TIMEOUT:
4707 /* Nothing we can do. */
4708 return;
4709 case '#':
4710 /* Discard the two bytes of checksum and stop. */
4711 c = readchar (remote_timeout);
4712 if (c >= 0)
4713 c = readchar (remote_timeout);
4714
4715 return;
4716 case '*': /* Run length encoding. */
4717 /* Discard the repeat count. */
4718 c = readchar (remote_timeout);
4719 if (c < 0)
4720 return;
4721 break;
4722 default:
4723 /* A regular character. */
4724 break;
4725 }
4726 }
4727}
4728
c906108c 4729/* Come here after finding the start of the frame. Collect the rest
6d820c5c
DJ
4730 into *BUF, verifying the checksum, length, and handling run-length
4731 compression. NUL terminate the buffer. If there is not enough room,
4732 expand *BUF using xrealloc.
c906108c 4733
c2d11a7d
JM
4734 Returns -1 on error, number of characters in buffer (ignoring the
4735 trailing NULL) on success. (could be extended to return one of the
23860348 4736 SERIAL status indications). */
c2d11a7d
JM
4737
4738static long
6d820c5c
DJ
4739read_frame (char **buf_p,
4740 long *sizeof_buf)
c906108c
SS
4741{
4742 unsigned char csum;
c2d11a7d 4743 long bc;
c906108c 4744 int c;
6d820c5c 4745 char *buf = *buf_p;
c906108c
SS
4746
4747 csum = 0;
c2d11a7d 4748 bc = 0;
c906108c
SS
4749
4750 while (1)
4751 {
4752 c = readchar (remote_timeout);
c906108c
SS
4753 switch (c)
4754 {
4755 case SERIAL_TIMEOUT:
4756 if (remote_debug)
0f71a2f6 4757 fputs_filtered ("Timeout in mid-packet, retrying\n", gdb_stdlog);
c2d11a7d 4758 return -1;
c906108c
SS
4759 case '$':
4760 if (remote_debug)
0f71a2f6
JM
4761 fputs_filtered ("Saw new packet start in middle of old one\n",
4762 gdb_stdlog);
23860348 4763 return -1; /* Start a new packet, count retries. */
c906108c
SS
4764 case '#':
4765 {
4766 unsigned char pktcsum;
e1b09194
AC
4767 int check_0 = 0;
4768 int check_1 = 0;
c906108c 4769
c2d11a7d 4770 buf[bc] = '\0';
c906108c 4771
e1b09194
AC
4772 check_0 = readchar (remote_timeout);
4773 if (check_0 >= 0)
4774 check_1 = readchar (remote_timeout);
802188a7 4775
e1b09194
AC
4776 if (check_0 == SERIAL_TIMEOUT || check_1 == SERIAL_TIMEOUT)
4777 {
4778 if (remote_debug)
2bc416ba 4779 fputs_filtered ("Timeout in checksum, retrying\n",
23860348 4780 gdb_stdlog);
e1b09194
AC
4781 return -1;
4782 }
4783 else if (check_0 < 0 || check_1 < 0)
40e3f985
FN
4784 {
4785 if (remote_debug)
2bc416ba 4786 fputs_filtered ("Communication error in checksum\n",
23860348 4787 gdb_stdlog);
40e3f985
FN
4788 return -1;
4789 }
c906108c 4790
e1b09194 4791 pktcsum = (fromhex (check_0) << 4) | fromhex (check_1);
c906108c 4792 if (csum == pktcsum)
c2d11a7d 4793 return bc;
c906108c 4794
c5aa993b 4795 if (remote_debug)
c906108c 4796 {
0f71a2f6 4797 fprintf_filtered (gdb_stdlog,
c5aa993b 4798 "Bad checksum, sentsum=0x%x, csum=0x%x, buf=",
0f71a2f6 4799 pktcsum, csum);
0876f84a 4800 fputstrn_filtered (buf, bc, 0, gdb_stdlog);
0f71a2f6 4801 fputs_filtered ("\n", gdb_stdlog);
c906108c 4802 }
c2d11a7d 4803 /* Number of characters in buffer ignoring trailing
23860348 4804 NULL. */
c2d11a7d 4805 return -1;
c906108c 4806 }
23860348 4807 case '*': /* Run length encoding. */
c2c6d25f
JM
4808 {
4809 int repeat;
4810 csum += c;
c906108c 4811
b4501125
AC
4812 c = readchar (remote_timeout);
4813 csum += c;
23860348 4814 repeat = c - ' ' + 3; /* Compute repeat count. */
c906108c 4815
23860348 4816 /* The character before ``*'' is repeated. */
c2d11a7d 4817
6d820c5c 4818 if (repeat > 0 && repeat <= 255 && bc > 0)
c2c6d25f 4819 {
6d820c5c
DJ
4820 if (bc + repeat - 1 >= *sizeof_buf - 1)
4821 {
4822 /* Make some more room in the buffer. */
4823 *sizeof_buf += repeat;
4824 *buf_p = xrealloc (*buf_p, *sizeof_buf);
4825 buf = *buf_p;
4826 }
4827
c2d11a7d
JM
4828 memset (&buf[bc], buf[bc - 1], repeat);
4829 bc += repeat;
c2c6d25f
JM
4830 continue;
4831 }
4832
c2d11a7d 4833 buf[bc] = '\0';
6d820c5c 4834 printf_filtered (_("Invalid run length encoding: %s\n"), buf);
c2d11a7d 4835 return -1;
c2c6d25f 4836 }
c906108c 4837 default:
6d820c5c 4838 if (bc >= *sizeof_buf - 1)
c906108c 4839 {
6d820c5c
DJ
4840 /* Make some more room in the buffer. */
4841 *sizeof_buf *= 2;
4842 *buf_p = xrealloc (*buf_p, *sizeof_buf);
4843 buf = *buf_p;
c906108c
SS
4844 }
4845
6d820c5c
DJ
4846 buf[bc++] = c;
4847 csum += c;
4848 continue;
c906108c
SS
4849 }
4850 }
4851}
4852
4853/* Read a packet from the remote machine, with error checking, and
6d820c5c
DJ
4854 store it in *BUF. Resize *BUF using xrealloc if necessary to hold
4855 the result, and update *SIZEOF_BUF. If FOREVER, wait forever
4856 rather than timing out; this is used (in synchronous mode) to wait
4857 for a target that is is executing user code to stop. */
d9fcf2fb
JM
4858/* FIXME: ezannoni 2000-02-01 this wrapper is necessary so that we
4859 don't have to change all the calls to getpkt to deal with the
4860 return value, because at the moment I don't know what the right
23860348 4861 thing to do it for those. */
c906108c 4862void
6d820c5c
DJ
4863getpkt (char **buf,
4864 long *sizeof_buf,
c2d11a7d 4865 int forever)
d9fcf2fb
JM
4866{
4867 int timed_out;
4868
4869 timed_out = getpkt_sane (buf, sizeof_buf, forever);
4870}
4871
4872
4873/* Read a packet from the remote machine, with error checking, and
6d820c5c
DJ
4874 store it in *BUF. Resize *BUF using xrealloc if necessary to hold
4875 the result, and update *SIZEOF_BUF. If FOREVER, wait forever
4876 rather than timing out; this is used (in synchronous mode) to wait
4877 for a target that is is executing user code to stop. If FOREVER ==
4878 0, this function is allowed to time out gracefully and return an
0876f84a
DJ
4879 indication of this to the caller. Otherwise return the number
4880 of bytes read. */
3172dc30 4881static int
6d820c5c 4882getpkt_sane (char **buf, long *sizeof_buf, int forever)
c906108c
SS
4883{
4884 int c;
4885 int tries;
4886 int timeout;
4887 int val;
4888
6d820c5c 4889 strcpy (*buf, "timeout");
c906108c
SS
4890
4891 if (forever)
4892 {
c906108c 4893 timeout = watchdog > 0 ? watchdog : -1;
c906108c
SS
4894 }
4895
4896 else
4897 timeout = remote_timeout;
4898
4899#define MAX_TRIES 3
4900
4901 for (tries = 1; tries <= MAX_TRIES; tries++)
4902 {
4903 /* This can loop forever if the remote side sends us characters
23860348
MS
4904 continuously, but if it pauses, we'll get a zero from
4905 readchar because of timeout. Then we'll count that as a
4906 retry. */
c906108c 4907
23860348
MS
4908 /* Note that we will only wait forever prior to the start of a
4909 packet. After that, we expect characters to arrive at a
4910 brisk pace. They should show up within remote_timeout
4911 intervals. */
c906108c
SS
4912
4913 do
4914 {
4915 c = readchar (timeout);
4916
4917 if (c == SERIAL_TIMEOUT)
4918 {
23860348 4919 if (forever) /* Watchdog went off? Kill the target. */
c906108c 4920 {
2acceee2 4921 QUIT;
c906108c 4922 target_mourn_inferior ();
8a3fe4f8 4923 error (_("Watchdog has expired. Target detached."));
c906108c 4924 }
c906108c 4925 if (remote_debug)
0f71a2f6 4926 fputs_filtered ("Timed out.\n", gdb_stdlog);
c906108c
SS
4927 goto retry;
4928 }
4929 }
4930 while (c != '$');
4931
4932 /* We've found the start of a packet, now collect the data. */
4933
c2d11a7d 4934 val = read_frame (buf, sizeof_buf);
c906108c 4935
c2d11a7d 4936 if (val >= 0)
c906108c
SS
4937 {
4938 if (remote_debug)
43e526b9
JM
4939 {
4940 fprintf_unfiltered (gdb_stdlog, "Packet received: ");
0876f84a 4941 fputstrn_unfiltered (*buf, val, 0, gdb_stdlog);
43e526b9
JM
4942 fprintf_unfiltered (gdb_stdlog, "\n");
4943 }
2cd58942 4944 serial_write (remote_desc, "+", 1);
0876f84a 4945 return val;
c906108c
SS
4946 }
4947
4948 /* Try the whole thing again. */
4949 retry:
2cd58942 4950 serial_write (remote_desc, "-", 1);
c906108c
SS
4951 }
4952
2bc416ba 4953 /* We have tried hard enough, and just can't receive the packet.
23860348 4954 Give up. */
c906108c 4955
a3f17187 4956 printf_unfiltered (_("Ignoring packet error, continuing...\n"));
2cd58942 4957 serial_write (remote_desc, "+", 1);
0876f84a 4958 return -1;
c906108c
SS
4959}
4960\f
4961static void
fba45db2 4962remote_kill (void)
c906108c
SS
4963{
4964 /* For some mysterious reason, wait_for_inferior calls kill instead of
4965 mourn after it gets TARGET_WAITKIND_SIGNALLED. Work around it. */
4966 if (kill_kludge)
4967 {
4968 kill_kludge = 0;
4969 target_mourn_inferior ();
4970 return;
4971 }
4972
4973 /* Use catch_errors so the user can quit from gdb even when we aren't on
4974 speaking terms with the remote system. */
c5aa993b 4975 catch_errors ((catch_errors_ftype *) putpkt, "k", "", RETURN_MASK_ERROR);
c906108c
SS
4976
4977 /* Don't wait for it to die. I'm not really sure it matters whether
4978 we do or not. For the existing stubs, kill is a noop. */
4979 target_mourn_inferior ();
4980}
4981
23860348 4982/* Async version of remote_kill. */
43ff13b4 4983static void
fba45db2 4984remote_async_kill (void)
43ff13b4 4985{
23860348 4986 /* Unregister the file descriptor from the event loop. */
ed9a39eb 4987 if (target_is_async_p ())
2cd58942 4988 serial_async (remote_desc, NULL, 0);
43ff13b4
JM
4989
4990 /* For some mysterious reason, wait_for_inferior calls kill instead of
4991 mourn after it gets TARGET_WAITKIND_SIGNALLED. Work around it. */
4992 if (kill_kludge)
4993 {
4994 kill_kludge = 0;
4995 target_mourn_inferior ();
4996 return;
4997 }
4998
23860348
MS
4999 /* Use catch_errors so the user can quit from gdb even when we
5000 aren't on speaking terms with the remote system. */
c5aa993b 5001 catch_errors ((catch_errors_ftype *) putpkt, "k", "", RETURN_MASK_ERROR);
43ff13b4
JM
5002
5003 /* Don't wait for it to die. I'm not really sure it matters whether
5004 we do or not. For the existing stubs, kill is a noop. */
5005 target_mourn_inferior ();
5006}
5007
c906108c 5008static void
fba45db2 5009remote_mourn (void)
c906108c
SS
5010{
5011 remote_mourn_1 (&remote_ops);
5012}
5013
53a5351d 5014static void
fba45db2 5015remote_async_mourn (void)
53a5351d
JM
5016{
5017 remote_mourn_1 (&remote_async_ops);
5018}
5019
c906108c 5020static void
fba45db2 5021extended_remote_mourn (void)
c906108c
SS
5022{
5023 /* We do _not_ want to mourn the target like this; this will
5024 remove the extended remote target from the target stack,
802188a7 5025 and the next time the user says "run" it'll fail.
c906108c
SS
5026
5027 FIXME: What is the right thing to do here? */
5028#if 0
5029 remote_mourn_1 (&extended_remote_ops);
5030#endif
5031}
5032
5033/* Worker function for remote_mourn. */
5034static void
fba45db2 5035remote_mourn_1 (struct target_ops *target)
c906108c
SS
5036{
5037 unpush_target (target);
5038 generic_mourn_inferior ();
5039}
5040
5041/* In the extended protocol we want to be able to do things like
5042 "run" and have them basically work as expected. So we need
802188a7 5043 a special create_inferior function.
c906108c
SS
5044
5045 FIXME: One day add support for changing the exec file
5046 we're debugging, arguments and an environment. */
5047
5048static void
23860348
MS
5049extended_remote_create_inferior (char *exec_file, char *args,
5050 char **env, int from_tty)
c906108c
SS
5051{
5052 /* Rip out the breakpoints; we'll reinsert them after restarting
5053 the remote server. */
5054 remove_breakpoints ();
5055
5056 /* Now restart the remote server. */
5057 extended_remote_restart ();
5058
424163ea
DJ
5059 /* NOTE: We don't need to recheck for a target description here; but
5060 if we gain the ability to switch the remote executable we may
5061 need to, if for instance we are running a process which requested
5062 different emulated hardware from the operating system. A
5063 concrete example of this is ARM GNU/Linux, where some binaries
5064 will have a legacy FPA coprocessor emulated and others may have
5065 access to a hardware VFP unit. */
5066
c906108c
SS
5067 /* Now put the breakpoints back in. This way we're safe if the
5068 restart function works via a unix fork on the remote side. */
5069 insert_breakpoints ();
5070
5071 /* Clean up from the last time we were running. */
5072 clear_proceed_status ();
c906108c
SS
5073}
5074
23860348 5075/* Async version of extended_remote_create_inferior. */
43ff13b4 5076static void
23860348
MS
5077extended_remote_async_create_inferior (char *exec_file, char *args,
5078 char **env, int from_tty)
43ff13b4
JM
5079{
5080 /* Rip out the breakpoints; we'll reinsert them after restarting
5081 the remote server. */
5082 remove_breakpoints ();
5083
5084 /* If running asynchronously, register the target file descriptor
23860348 5085 with the event loop. */
362646f5 5086 if (target_can_async_p ())
2acceee2 5087 target_async (inferior_event_handler, 0);
43ff13b4
JM
5088
5089 /* Now restart the remote server. */
5090 extended_remote_restart ();
5091
424163ea
DJ
5092 /* NOTE: We don't need to recheck for a target description here; but
5093 if we gain the ability to switch the remote executable we may
5094 need to, if for instance we are running a process which requested
5095 different emulated hardware from the operating system. A
5096 concrete example of this is ARM GNU/Linux, where some binaries
5097 will have a legacy FPA coprocessor emulated and others may have
5098 access to a hardware VFP unit. */
5099
43ff13b4
JM
5100 /* Now put the breakpoints back in. This way we're safe if the
5101 restart function works via a unix fork on the remote side. */
5102 insert_breakpoints ();
5103
5104 /* Clean up from the last time we were running. */
5105 clear_proceed_status ();
43ff13b4 5106}
c906108c 5107\f
c5aa993b 5108
8181d85f
DJ
5109/* Insert a breakpoint. On targets that have software breakpoint
5110 support, we ask the remote target to do the work; on targets
5111 which don't, we insert a traditional memory breakpoint. */
c906108c
SS
5112
5113static int
8181d85f 5114remote_insert_breakpoint (struct bp_target_info *bp_tgt)
c906108c 5115{
8181d85f 5116 CORE_ADDR addr = bp_tgt->placed_address;
d01949b6 5117 struct remote_state *rs = get_remote_state ();
96baa820 5118
d471ea57
AC
5119 /* Try the "Z" s/w breakpoint packet if it is not already disabled.
5120 If it succeeds, then set the support to PACKET_ENABLE. If it
5121 fails, and the user has explicitly requested the Z support then
23860348 5122 report an error, otherwise, mark it disabled and go on. */
802188a7 5123
444abaca 5124 if (remote_protocol_packets[PACKET_Z0].support != PACKET_DISABLE)
96baa820 5125 {
6d820c5c 5126 char *p = rs->buf;
802188a7 5127
96baa820
JM
5128 *(p++) = 'Z';
5129 *(p++) = '0';
5130 *(p++) = ',';
3b3b875c
UW
5131 gdbarch_breakpoint_from_pc
5132 (current_gdbarch, &bp_tgt->placed_address, &bp_tgt->placed_size);
8181d85f
DJ
5133 addr = (ULONGEST) remote_address_masked (bp_tgt->placed_address);
5134 p += hexnumstr (p, addr);
5135 sprintf (p, ",%d", bp_tgt->placed_size);
802188a7 5136
6d820c5c
DJ
5137 putpkt (rs->buf);
5138 getpkt (&rs->buf, &rs->buf_size, 0);
96baa820 5139
6d820c5c 5140 switch (packet_ok (rs->buf, &remote_protocol_packets[PACKET_Z0]))
96baa820 5141 {
d471ea57
AC
5142 case PACKET_ERROR:
5143 return -1;
5144 case PACKET_OK:
5145 return 0;
5146 case PACKET_UNKNOWN:
5147 break;
96baa820
JM
5148 }
5149 }
c906108c 5150
8181d85f 5151 return memory_insert_breakpoint (bp_tgt);
c906108c
SS
5152}
5153
5154static int
8181d85f 5155remote_remove_breakpoint (struct bp_target_info *bp_tgt)
c906108c 5156{
8181d85f 5157 CORE_ADDR addr = bp_tgt->placed_address;
d01949b6 5158 struct remote_state *rs = get_remote_state ();
96baa820
JM
5159 int bp_size;
5160
444abaca 5161 if (remote_protocol_packets[PACKET_Z0].support != PACKET_DISABLE)
96baa820 5162 {
6d820c5c 5163 char *p = rs->buf;
802188a7 5164
96baa820
JM
5165 *(p++) = 'z';
5166 *(p++) = '0';
5167 *(p++) = ',';
5168
8181d85f
DJ
5169 addr = (ULONGEST) remote_address_masked (bp_tgt->placed_address);
5170 p += hexnumstr (p, addr);
5171 sprintf (p, ",%d", bp_tgt->placed_size);
802188a7 5172
6d820c5c
DJ
5173 putpkt (rs->buf);
5174 getpkt (&rs->buf, &rs->buf_size, 0);
96baa820 5175
6d820c5c 5176 return (rs->buf[0] == 'E');
96baa820
JM
5177 }
5178
8181d85f 5179 return memory_remove_breakpoint (bp_tgt);
c906108c
SS
5180}
5181
d471ea57
AC
5182static int
5183watchpoint_to_Z_packet (int type)
5184{
5185 switch (type)
5186 {
5187 case hw_write:
bb858e6a 5188 return Z_PACKET_WRITE_WP;
d471ea57
AC
5189 break;
5190 case hw_read:
bb858e6a 5191 return Z_PACKET_READ_WP;
d471ea57
AC
5192 break;
5193 case hw_access:
bb858e6a 5194 return Z_PACKET_ACCESS_WP;
d471ea57
AC
5195 break;
5196 default:
8e65ff28 5197 internal_error (__FILE__, __LINE__,
e2e0b3e5 5198 _("hw_bp_to_z: bad watchpoint type %d"), type);
d471ea57
AC
5199 }
5200}
5201
3c3bea1c 5202static int
fba45db2 5203remote_insert_watchpoint (CORE_ADDR addr, int len, int type)
96baa820 5204{
d01949b6 5205 struct remote_state *rs = get_remote_state ();
e514a9d6 5206 char *p;
d471ea57 5207 enum Z_packet_type packet = watchpoint_to_Z_packet (type);
96baa820 5208
444abaca 5209 if (remote_protocol_packets[PACKET_Z0 + packet].support == PACKET_DISABLE)
5cffb350 5210 return -1;
802188a7 5211
6d820c5c
DJ
5212 sprintf (rs->buf, "Z%x,", packet);
5213 p = strchr (rs->buf, '\0');
96baa820
JM
5214 addr = remote_address_masked (addr);
5215 p += hexnumstr (p, (ULONGEST) addr);
d4f3574e 5216 sprintf (p, ",%x", len);
802188a7 5217
6d820c5c
DJ
5218 putpkt (rs->buf);
5219 getpkt (&rs->buf, &rs->buf_size, 0);
96baa820 5220
6d820c5c 5221 switch (packet_ok (rs->buf, &remote_protocol_packets[PACKET_Z0 + packet]))
d471ea57
AC
5222 {
5223 case PACKET_ERROR:
5224 case PACKET_UNKNOWN:
5225 return -1;
5226 case PACKET_OK:
5227 return 0;
5228 }
8e65ff28 5229 internal_error (__FILE__, __LINE__,
e2e0b3e5 5230 _("remote_insert_watchpoint: reached end of function"));
96baa820
JM
5231}
5232
d471ea57 5233
3c3bea1c 5234static int
fba45db2 5235remote_remove_watchpoint (CORE_ADDR addr, int len, int type)
96baa820 5236{
d01949b6 5237 struct remote_state *rs = get_remote_state ();
e514a9d6 5238 char *p;
d471ea57
AC
5239 enum Z_packet_type packet = watchpoint_to_Z_packet (type);
5240
444abaca 5241 if (remote_protocol_packets[PACKET_Z0 + packet].support == PACKET_DISABLE)
5cffb350 5242 return -1;
802188a7 5243
6d820c5c
DJ
5244 sprintf (rs->buf, "z%x,", packet);
5245 p = strchr (rs->buf, '\0');
96baa820
JM
5246 addr = remote_address_masked (addr);
5247 p += hexnumstr (p, (ULONGEST) addr);
d4f3574e 5248 sprintf (p, ",%x", len);
6d820c5c
DJ
5249 putpkt (rs->buf);
5250 getpkt (&rs->buf, &rs->buf_size, 0);
96baa820 5251
6d820c5c 5252 switch (packet_ok (rs->buf, &remote_protocol_packets[PACKET_Z0 + packet]))
d471ea57
AC
5253 {
5254 case PACKET_ERROR:
5255 case PACKET_UNKNOWN:
5256 return -1;
5257 case PACKET_OK:
5258 return 0;
5259 }
8e65ff28 5260 internal_error (__FILE__, __LINE__,
e2e0b3e5 5261 _("remote_remove_watchpoint: reached end of function"));
96baa820
JM
5262}
5263
3c3bea1c 5264
501eef12
AC
5265int remote_hw_watchpoint_limit = -1;
5266int remote_hw_breakpoint_limit = -1;
d471ea57 5267
b9362cc7 5268static int
3c3bea1c 5269remote_check_watch_resources (int type, int cnt, int ot)
96baa820 5270{
3c3bea1c
GS
5271 if (type == bp_hardware_breakpoint)
5272 {
5273 if (remote_hw_breakpoint_limit == 0)
5274 return 0;
501eef12
AC
5275 else if (remote_hw_breakpoint_limit < 0)
5276 return 1;
3c3bea1c
GS
5277 else if (cnt <= remote_hw_breakpoint_limit)
5278 return 1;
5279 }
5280 else
5281 {
5282 if (remote_hw_watchpoint_limit == 0)
5283 return 0;
501eef12
AC
5284 else if (remote_hw_watchpoint_limit < 0)
5285 return 1;
3c3bea1c
GS
5286 else if (ot)
5287 return -1;
5288 else if (cnt <= remote_hw_watchpoint_limit)
5289 return 1;
5290 }
5291 return -1;
5292}
5293
b9362cc7 5294static int
3c3bea1c
GS
5295remote_stopped_by_watchpoint (void)
5296{
5297 return remote_stopped_by_watchpoint_p;
5298}
5299
7270d8f2
OF
5300extern int stepped_after_stopped_by_watchpoint;
5301
4aa7a7f5
JJ
5302static int
5303remote_stopped_data_address (struct target_ops *target, CORE_ADDR *addr_p)
3c3bea1c 5304{
4aa7a7f5 5305 int rc = 0;
7270d8f2
OF
5306 if (remote_stopped_by_watchpoint ()
5307 || stepped_after_stopped_by_watchpoint)
4aa7a7f5
JJ
5308 {
5309 *addr_p = remote_watch_data_address;
5310 rc = 1;
5311 }
5312
5313 return rc;
3c3bea1c
GS
5314}
5315
5316
5317static int
8181d85f 5318remote_insert_hw_breakpoint (struct bp_target_info *bp_tgt)
3c3bea1c 5319{
8181d85f 5320 CORE_ADDR addr;
d01949b6 5321 struct remote_state *rs = get_remote_state ();
6d820c5c 5322 char *p = rs->buf;
802188a7 5323
c8189ed1 5324 /* The length field should be set to the size of a breakpoint
8181d85f 5325 instruction, even though we aren't inserting one ourselves. */
c8189ed1 5326
3b3b875c
UW
5327 gdbarch_breakpoint_from_pc
5328 (current_gdbarch, &bp_tgt->placed_address, &bp_tgt->placed_size);
3c3bea1c 5329
444abaca 5330 if (remote_protocol_packets[PACKET_Z1].support == PACKET_DISABLE)
5cffb350 5331 return -1;
2bc416ba 5332
96baa820
JM
5333 *(p++) = 'Z';
5334 *(p++) = '1';
5335 *(p++) = ',';
802188a7 5336
8181d85f 5337 addr = remote_address_masked (bp_tgt->placed_address);
96baa820 5338 p += hexnumstr (p, (ULONGEST) addr);
8181d85f 5339 sprintf (p, ",%x", bp_tgt->placed_size);
96baa820 5340
6d820c5c
DJ
5341 putpkt (rs->buf);
5342 getpkt (&rs->buf, &rs->buf_size, 0);
96baa820 5343
6d820c5c 5344 switch (packet_ok (rs->buf, &remote_protocol_packets[PACKET_Z1]))
d471ea57
AC
5345 {
5346 case PACKET_ERROR:
5347 case PACKET_UNKNOWN:
5348 return -1;
5349 case PACKET_OK:
5350 return 0;
5351 }
8e65ff28 5352 internal_error (__FILE__, __LINE__,
e2e0b3e5 5353 _("remote_insert_hw_breakpoint: reached end of function"));
96baa820
JM
5354}
5355
d471ea57 5356
802188a7 5357static int
8181d85f 5358remote_remove_hw_breakpoint (struct bp_target_info *bp_tgt)
96baa820 5359{
8181d85f 5360 CORE_ADDR addr;
d01949b6 5361 struct remote_state *rs = get_remote_state ();
6d820c5c 5362 char *p = rs->buf;
c8189ed1 5363
444abaca 5364 if (remote_protocol_packets[PACKET_Z1].support == PACKET_DISABLE)
5cffb350 5365 return -1;
802188a7 5366
96baa820
JM
5367 *(p++) = 'z';
5368 *(p++) = '1';
5369 *(p++) = ',';
802188a7 5370
8181d85f 5371 addr = remote_address_masked (bp_tgt->placed_address);
96baa820 5372 p += hexnumstr (p, (ULONGEST) addr);
8181d85f 5373 sprintf (p, ",%x", bp_tgt->placed_size);
96baa820 5374
6d820c5c
DJ
5375 putpkt (rs->buf);
5376 getpkt (&rs->buf, &rs->buf_size, 0);
802188a7 5377
6d820c5c 5378 switch (packet_ok (rs->buf, &remote_protocol_packets[PACKET_Z1]))
d471ea57
AC
5379 {
5380 case PACKET_ERROR:
5381 case PACKET_UNKNOWN:
5382 return -1;
5383 case PACKET_OK:
5384 return 0;
5385 }
8e65ff28 5386 internal_error (__FILE__, __LINE__,
e2e0b3e5 5387 _("remote_remove_hw_breakpoint: reached end of function"));
96baa820 5388}
96baa820 5389
c906108c
SS
5390/* Some targets are only capable of doing downloads, and afterwards
5391 they switch to the remote serial protocol. This function provides
5392 a clean way to get from the download target to the remote target.
5393 It's basically just a wrapper so that we don't have to expose any
5394 of the internal workings of remote.c.
5395
5396 Prior to calling this routine, you should shutdown the current
5397 target code, else you will get the "A program is being debugged
5398 already..." message. Usually a call to pop_target() suffices. */
5399
5400void
fba45db2 5401push_remote_target (char *name, int from_tty)
c906108c 5402{
a3f17187 5403 printf_filtered (_("Switching to remote protocol\n"));
c906108c
SS
5404 remote_open (name, from_tty);
5405}
5406
23860348 5407/* Table used by the crc32 function to calcuate the checksum. */
c906108c 5408
c5aa993b
JM
5409static unsigned long crc32_table[256] =
5410{0, 0};
c906108c
SS
5411
5412static unsigned long
fba45db2 5413crc32 (unsigned char *buf, int len, unsigned int crc)
c906108c 5414{
c5aa993b 5415 if (!crc32_table[1])
c906108c 5416 {
23860348 5417 /* Initialize the CRC table and the decoding table. */
c906108c
SS
5418 int i, j;
5419 unsigned int c;
5420
5421 for (i = 0; i < 256; i++)
c5aa993b
JM
5422 {
5423 for (c = i << 24, j = 8; j > 0; --j)
5424 c = c & 0x80000000 ? (c << 1) ^ 0x04c11db7 : (c << 1);
5425 crc32_table[i] = c;
5426 }
c906108c
SS
5427 }
5428
5429 while (len--)
5430 {
5431 crc = (crc << 8) ^ crc32_table[((crc >> 24) ^ *buf) & 255];
5432 buf++;
5433 }
5434 return crc;
5435}
5436
5437/* compare-sections command
5438
5439 With no arguments, compares each loadable section in the exec bfd
5440 with the same memory range on the target, and reports mismatches.
5441 Useful for verifying the image on the target against the exec file.
5442 Depends on the target understanding the new "qCRC:" request. */
5443
e514a9d6
JM
5444/* FIXME: cagney/1999-10-26: This command should be broken down into a
5445 target method (target verify memory) and generic version of the
5446 actual command. This will allow other high-level code (especially
23860348 5447 generic_load()) to make use of this target functionality. */
e514a9d6 5448
c906108c 5449static void
fba45db2 5450compare_sections_command (char *args, int from_tty)
c906108c 5451{
d01949b6 5452 struct remote_state *rs = get_remote_state ();
c906108c
SS
5453 asection *s;
5454 unsigned long host_crc, target_crc;
5455 extern bfd *exec_bfd;
5456 struct cleanup *old_chain;
085dd6e6
JM
5457 char *tmp;
5458 char *sectdata;
ce359b09 5459 const char *sectname;
c906108c
SS
5460 bfd_size_type size;
5461 bfd_vma lma;
5462 int matched = 0;
5463 int mismatched = 0;
5464
5465 if (!exec_bfd)
8a3fe4f8 5466 error (_("command cannot be used without an exec file"));
c906108c
SS
5467 if (!current_target.to_shortname ||
5468 strcmp (current_target.to_shortname, "remote") != 0)
8a3fe4f8 5469 error (_("command can only be used with remote target"));
c906108c 5470
c5aa993b 5471 for (s = exec_bfd->sections; s; s = s->next)
c906108c
SS
5472 {
5473 if (!(s->flags & SEC_LOAD))
c5aa993b 5474 continue; /* skip non-loadable section */
c906108c 5475
2c500098 5476 size = bfd_get_section_size (s);
c906108c 5477 if (size == 0)
c5aa993b 5478 continue; /* skip zero-length section */
c906108c 5479
ce359b09 5480 sectname = bfd_get_section_name (exec_bfd, s);
c906108c 5481 if (args && strcmp (args, sectname) != 0)
c5aa993b 5482 continue; /* not the section selected by user */
c906108c 5483
c5aa993b 5484 matched = 1; /* do this section */
c906108c 5485 lma = s->lma;
23860348 5486 /* FIXME: assumes lma can fit into long. */
ea9c271d 5487 xsnprintf (rs->buf, get_remote_packet_size (), "qCRC:%lx,%lx",
ecbc58df 5488 (long) lma, (long) size);
6d820c5c 5489 putpkt (rs->buf);
c906108c 5490
23860348
MS
5491 /* Be clever; compute the host_crc before waiting for target
5492 reply. */
c906108c 5493 sectdata = xmalloc (size);
b8c9b27d 5494 old_chain = make_cleanup (xfree, sectdata);
c906108c
SS
5495 bfd_get_section_contents (exec_bfd, s, sectdata, 0, size);
5496 host_crc = crc32 ((unsigned char *) sectdata, size, 0xffffffff);
5497
6d820c5c
DJ
5498 getpkt (&rs->buf, &rs->buf_size, 0);
5499 if (rs->buf[0] == 'E')
8a3fe4f8 5500 error (_("target memory fault, section %s, range 0x%s -- 0x%s"),
823ca731 5501 sectname, paddr (lma), paddr (lma + size));
6d820c5c 5502 if (rs->buf[0] != 'C')
8a3fe4f8 5503 error (_("remote target does not support this operation"));
c906108c 5504
6d820c5c 5505 for (target_crc = 0, tmp = &rs->buf[1]; *tmp; tmp++)
c906108c
SS
5506 target_crc = target_crc * 16 + fromhex (*tmp);
5507
d4f3574e
SS
5508 printf_filtered ("Section %s, range 0x%s -- 0x%s: ",
5509 sectname, paddr (lma), paddr (lma + size));
c906108c
SS
5510 if (host_crc == target_crc)
5511 printf_filtered ("matched.\n");
5512 else
c5aa993b
JM
5513 {
5514 printf_filtered ("MIS-MATCHED!\n");
5515 mismatched++;
5516 }
c906108c
SS
5517
5518 do_cleanups (old_chain);
5519 }
5520 if (mismatched > 0)
8a3fe4f8
AC
5521 warning (_("One or more sections of the remote executable does not match\n\
5522the loaded file\n"));
c906108c 5523 if (args && !matched)
a3f17187 5524 printf_filtered (_("No loaded section named '%s'.\n"), args);
c906108c
SS
5525}
5526
0e7f50da
UW
5527/* Write LEN bytes from WRITEBUF into OBJECT_NAME/ANNEX at OFFSET
5528 into remote target. The number of bytes written to the remote
5529 target is returned, or -1 for error. */
5530
5531static LONGEST
5532remote_write_qxfer (struct target_ops *ops, const char *object_name,
5533 const char *annex, const gdb_byte *writebuf,
5534 ULONGEST offset, LONGEST len,
5535 struct packet_config *packet)
5536{
5537 int i, buf_len;
5538 ULONGEST n;
5539 gdb_byte *wbuf;
5540 struct remote_state *rs = get_remote_state ();
5541 int max_size = get_memory_write_packet_size ();
5542
5543 if (packet->support == PACKET_DISABLE)
5544 return -1;
5545
5546 /* Insert header. */
5547 i = snprintf (rs->buf, max_size,
5548 "qXfer:%s:write:%s:%s:",
5549 object_name, annex ? annex : "",
5550 phex_nz (offset, sizeof offset));
5551 max_size -= (i + 1);
5552
5553 /* Escape as much data as fits into rs->buf. */
5554 buf_len = remote_escape_output
5555 (writebuf, len, (rs->buf + i), &max_size, max_size);
5556
5557 if (putpkt_binary (rs->buf, i + buf_len) < 0
5558 || getpkt_sane (&rs->buf, &rs->buf_size, 0) < 0
5559 || packet_ok (rs->buf, packet) != PACKET_OK)
5560 return -1;
5561
5562 unpack_varlen_hex (rs->buf, &n);
5563 return n;
5564}
5565
0876f84a
DJ
5566/* Read OBJECT_NAME/ANNEX from the remote target using a qXfer packet.
5567 Data at OFFSET, of up to LEN bytes, is read into READBUF; the
5568 number of bytes read is returned, or 0 for EOF, or -1 for error.
5569 The number of bytes read may be less than LEN without indicating an
5570 EOF. PACKET is checked and updated to indicate whether the remote
5571 target supports this object. */
5572
5573static LONGEST
5574remote_read_qxfer (struct target_ops *ops, const char *object_name,
5575 const char *annex,
5576 gdb_byte *readbuf, ULONGEST offset, LONGEST len,
5577 struct packet_config *packet)
5578{
5579 static char *finished_object;
5580 static char *finished_annex;
5581 static ULONGEST finished_offset;
5582
5583 struct remote_state *rs = get_remote_state ();
5584 unsigned int total = 0;
5585 LONGEST i, n, packet_len;
5586
5587 if (packet->support == PACKET_DISABLE)
5588 return -1;
5589
5590 /* Check whether we've cached an end-of-object packet that matches
5591 this request. */
5592 if (finished_object)
5593 {
5594 if (strcmp (object_name, finished_object) == 0
5595 && strcmp (annex ? annex : "", finished_annex) == 0
5596 && offset == finished_offset)
5597 return 0;
5598
5599 /* Otherwise, we're now reading something different. Discard
5600 the cache. */
5601 xfree (finished_object);
5602 xfree (finished_annex);
5603 finished_object = NULL;
5604 finished_annex = NULL;
5605 }
5606
5607 /* Request only enough to fit in a single packet. The actual data
5608 may not, since we don't know how much of it will need to be escaped;
5609 the target is free to respond with slightly less data. We subtract
5610 five to account for the response type and the protocol frame. */
5611 n = min (get_remote_packet_size () - 5, len);
5612 snprintf (rs->buf, get_remote_packet_size () - 4, "qXfer:%s:read:%s:%s,%s",
5613 object_name, annex ? annex : "",
5614 phex_nz (offset, sizeof offset),
5615 phex_nz (n, sizeof n));
5616 i = putpkt (rs->buf);
5617 if (i < 0)
5618 return -1;
5619
5620 rs->buf[0] = '\0';
5621 packet_len = getpkt_sane (&rs->buf, &rs->buf_size, 0);
5622 if (packet_len < 0 || packet_ok (rs->buf, packet) != PACKET_OK)
5623 return -1;
5624
5625 if (rs->buf[0] != 'l' && rs->buf[0] != 'm')
5626 error (_("Unknown remote qXfer reply: %s"), rs->buf);
5627
5628 /* 'm' means there is (or at least might be) more data after this
5629 batch. That does not make sense unless there's at least one byte
5630 of data in this reply. */
5631 if (rs->buf[0] == 'm' && packet_len == 1)
5632 error (_("Remote qXfer reply contained no data."));
5633
5634 /* Got some data. */
5635 i = remote_unescape_input (rs->buf + 1, packet_len - 1, readbuf, n);
5636
5637 /* 'l' is an EOF marker, possibly including a final block of data,
0e7f50da
UW
5638 or possibly empty. If we have the final block of a non-empty
5639 object, record this fact to bypass a subsequent partial read. */
5640 if (rs->buf[0] == 'l' && offset + i > 0)
0876f84a
DJ
5641 {
5642 finished_object = xstrdup (object_name);
5643 finished_annex = xstrdup (annex ? annex : "");
5644 finished_offset = offset + i;
5645 }
5646
5647 return i;
5648}
5649
1e3ff5ad 5650static LONGEST
4b8a223f 5651remote_xfer_partial (struct target_ops *ops, enum target_object object,
961cb7b5
MK
5652 const char *annex, gdb_byte *readbuf,
5653 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
c906108c 5654{
d01949b6 5655 struct remote_state *rs = get_remote_state ();
c906108c 5656 int i;
6d820c5c 5657 char *p2;
1e3ff5ad 5658 char query_type;
c906108c 5659
b2182ed2 5660 /* Handle memory using the standard memory routines. */
21e3b9b9
DJ
5661 if (object == TARGET_OBJECT_MEMORY)
5662 {
5663 int xfered;
5664 errno = 0;
5665
5666 if (writebuf != NULL)
b2182ed2 5667 xfered = remote_write_bytes (offset, writebuf, len);
21e3b9b9 5668 else
b2182ed2 5669 xfered = remote_read_bytes (offset, readbuf, len);
21e3b9b9
DJ
5670
5671 if (xfered > 0)
5672 return xfered;
5673 else if (xfered == 0 && errno == 0)
5674 return 0;
5675 else
5676 return -1;
5677 }
5678
0e7f50da
UW
5679 /* Handle SPU memory using qxfer packets. */
5680 if (object == TARGET_OBJECT_SPU)
5681 {
5682 if (readbuf)
5683 return remote_read_qxfer (ops, "spu", annex, readbuf, offset, len,
5684 &remote_protocol_packets
5685 [PACKET_qXfer_spu_read]);
5686 else
5687 return remote_write_qxfer (ops, "spu", annex, writebuf, offset, len,
5688 &remote_protocol_packets
5689 [PACKET_qXfer_spu_write]);
5690 }
5691
a76d924d
DJ
5692 /* Only handle flash writes. */
5693 if (writebuf != NULL)
5694 {
5695 LONGEST xfered;
5696
5697 switch (object)
5698 {
5699 case TARGET_OBJECT_FLASH:
5700 xfered = remote_flash_write (ops, offset, len, writebuf);
5701
5702 if (xfered > 0)
5703 return xfered;
5704 else if (xfered == 0 && errno == 0)
5705 return 0;
5706 else
5707 return -1;
5708
5709 default:
5710 return -1;
5711 }
5712 }
4b8a223f 5713
1e3ff5ad
AC
5714 /* Map pre-existing objects onto letters. DO NOT do this for new
5715 objects!!! Instead specify new query packets. */
5716 switch (object)
c906108c 5717 {
1e3ff5ad
AC
5718 case TARGET_OBJECT_AVR:
5719 query_type = 'R';
5720 break;
802188a7
RM
5721
5722 case TARGET_OBJECT_AUXV:
0876f84a
DJ
5723 gdb_assert (annex == NULL);
5724 return remote_read_qxfer (ops, "auxv", annex, readbuf, offset, len,
5725 &remote_protocol_packets[PACKET_qXfer_auxv]);
802188a7 5726
23181151
DJ
5727 case TARGET_OBJECT_AVAILABLE_FEATURES:
5728 return remote_read_qxfer
5729 (ops, "features", annex, readbuf, offset, len,
5730 &remote_protocol_packets[PACKET_qXfer_features]);
5731
fd79ecee
DJ
5732 case TARGET_OBJECT_MEMORY_MAP:
5733 gdb_assert (annex == NULL);
5734 return remote_read_qxfer (ops, "memory-map", annex, readbuf, offset, len,
5735 &remote_protocol_packets[PACKET_qXfer_memory_map]);
5736
1e3ff5ad 5737 default:
c906108c
SS
5738 return -1;
5739 }
5740
4b8a223f 5741 /* Note: a zero OFFSET and LEN can be used to query the minimum
1e3ff5ad 5742 buffer size. */
4b8a223f 5743 if (offset == 0 && len == 0)
ea9c271d
DJ
5744 return (get_remote_packet_size ());
5745 /* Minimum outbuf size is get_remote_packet_size (). If LEN is not
24b06219 5746 large enough let the caller deal with it. */
ea9c271d 5747 if (len < get_remote_packet_size ())
1e3ff5ad 5748 return -1;
ea9c271d 5749 len = get_remote_packet_size ();
1e3ff5ad 5750
23860348 5751 /* Except for querying the minimum buffer size, target must be open. */
c5aa993b 5752 if (!remote_desc)
8a3fe4f8 5753 error (_("remote query is only available after target open"));
c906108c 5754
1e3ff5ad 5755 gdb_assert (annex != NULL);
4b8a223f 5756 gdb_assert (readbuf != NULL);
c906108c 5757
6d820c5c 5758 p2 = rs->buf;
c906108c
SS
5759 *p2++ = 'q';
5760 *p2++ = query_type;
5761
23860348
MS
5762 /* We used one buffer char for the remote protocol q command and
5763 another for the query type. As the remote protocol encapsulation
5764 uses 4 chars plus one extra in case we are debugging
5765 (remote_debug), we have PBUFZIZ - 7 left to pack the query
5766 string. */
c906108c 5767 i = 0;
ea9c271d 5768 while (annex[i] && (i < (get_remote_packet_size () - 8)))
c906108c 5769 {
1e3ff5ad
AC
5770 /* Bad caller may have sent forbidden characters. */
5771 gdb_assert (isprint (annex[i]) && annex[i] != '$' && annex[i] != '#');
5772 *p2++ = annex[i];
c906108c
SS
5773 i++;
5774 }
1e3ff5ad
AC
5775 *p2 = '\0';
5776 gdb_assert (annex[i] == '\0');
c906108c 5777
6d820c5c 5778 i = putpkt (rs->buf);
c5aa993b
JM
5779 if (i < 0)
5780 return i;
c906108c 5781
6d820c5c
DJ
5782 getpkt (&rs->buf, &rs->buf_size, 0);
5783 strcpy ((char *) readbuf, rs->buf);
c906108c 5784
cfd77fa1 5785 return strlen ((char *) readbuf);
c906108c
SS
5786}
5787
96baa820
JM
5788static void
5789remote_rcmd (char *command,
d9fcf2fb 5790 struct ui_file *outbuf)
96baa820 5791{
d01949b6 5792 struct remote_state *rs = get_remote_state ();
2e9f7625 5793 char *p = rs->buf;
96baa820
JM
5794
5795 if (!remote_desc)
8a3fe4f8 5796 error (_("remote rcmd is only available after target open"));
96baa820 5797
23860348 5798 /* Send a NULL command across as an empty command. */
7be570e7
JM
5799 if (command == NULL)
5800 command = "";
5801
23860348 5802 /* The query prefix. */
2e9f7625
DJ
5803 strcpy (rs->buf, "qRcmd,");
5804 p = strchr (rs->buf, '\0');
96baa820 5805
2e9f7625 5806 if ((strlen (rs->buf) + strlen (command) * 2 + 8/*misc*/) > get_remote_packet_size ())
8a3fe4f8 5807 error (_("\"monitor\" command ``%s'' is too long."), command);
96baa820 5808
23860348 5809 /* Encode the actual command. */
cfd77fa1 5810 bin2hex ((gdb_byte *) command, p, 0);
96baa820 5811
6d820c5c 5812 if (putpkt (rs->buf) < 0)
8a3fe4f8 5813 error (_("Communication problem with target."));
96baa820
JM
5814
5815 /* get/display the response */
5816 while (1)
5817 {
2e9f7625
DJ
5818 char *buf;
5819
23860348 5820 /* XXX - see also tracepoint.c:remote_get_noisy_reply(). */
2e9f7625 5821 rs->buf[0] = '\0';
6d820c5c 5822 getpkt (&rs->buf, &rs->buf_size, 0);
2e9f7625 5823 buf = rs->buf;
96baa820 5824 if (buf[0] == '\0')
8a3fe4f8 5825 error (_("Target does not support this command."));
96baa820
JM
5826 if (buf[0] == 'O' && buf[1] != 'K')
5827 {
23860348 5828 remote_console_output (buf + 1); /* 'O' message from stub. */
96baa820
JM
5829 continue;
5830 }
5831 if (strcmp (buf, "OK") == 0)
5832 break;
7be570e7
JM
5833 if (strlen (buf) == 3 && buf[0] == 'E'
5834 && isdigit (buf[1]) && isdigit (buf[2]))
5835 {
8a3fe4f8 5836 error (_("Protocol error with Rcmd"));
7be570e7 5837 }
96baa820
JM
5838 for (p = buf; p[0] != '\0' && p[1] != '\0'; p += 2)
5839 {
5840 char c = (fromhex (p[0]) << 4) + fromhex (p[1]);
5841 fputc_unfiltered (c, outbuf);
5842 }
5843 break;
5844 }
5845}
5846
fd79ecee
DJ
5847static VEC(mem_region_s) *
5848remote_memory_map (struct target_ops *ops)
5849{
5850 VEC(mem_region_s) *result = NULL;
5851 char *text = target_read_stralloc (&current_target,
5852 TARGET_OBJECT_MEMORY_MAP, NULL);
5853
5854 if (text)
5855 {
5856 struct cleanup *back_to = make_cleanup (xfree, text);
5857 result = parse_memory_map (text);
5858 do_cleanups (back_to);
5859 }
5860
5861 return result;
5862}
5863
c906108c 5864static void
fba45db2 5865packet_command (char *args, int from_tty)
c906108c 5866{
d01949b6 5867 struct remote_state *rs = get_remote_state ();
c906108c 5868
c5aa993b 5869 if (!remote_desc)
8a3fe4f8 5870 error (_("command can only be used with remote target"));
c906108c 5871
c5aa993b 5872 if (!args)
8a3fe4f8 5873 error (_("remote-packet command requires packet text as argument"));
c906108c
SS
5874
5875 puts_filtered ("sending: ");
5876 print_packet (args);
5877 puts_filtered ("\n");
5878 putpkt (args);
5879
6d820c5c 5880 getpkt (&rs->buf, &rs->buf_size, 0);
c906108c 5881 puts_filtered ("received: ");
6d820c5c 5882 print_packet (rs->buf);
c906108c
SS
5883 puts_filtered ("\n");
5884}
5885
5886#if 0
23860348 5887/* --------- UNIT_TEST for THREAD oriented PACKETS ------------------- */
c906108c 5888
a14ed312 5889static void display_thread_info (struct gdb_ext_thread_info *info);
c906108c 5890
a14ed312 5891static void threadset_test_cmd (char *cmd, int tty);
c906108c 5892
a14ed312 5893static void threadalive_test (char *cmd, int tty);
c906108c 5894
a14ed312 5895static void threadlist_test_cmd (char *cmd, int tty);
c906108c 5896
23860348 5897int get_and_display_threadinfo (threadref *ref);
c906108c 5898
a14ed312 5899static void threadinfo_test_cmd (char *cmd, int tty);
c906108c 5900
23860348 5901static int thread_display_step (threadref *ref, void *context);
c906108c 5902
a14ed312 5903static void threadlist_update_test_cmd (char *cmd, int tty);
c906108c 5904
a14ed312 5905static void init_remote_threadtests (void);
c906108c 5906
23860348 5907#define SAMPLE_THREAD 0x05060708 /* Truncated 64 bit threadid. */
c906108c
SS
5908
5909static void
fba45db2 5910threadset_test_cmd (char *cmd, int tty)
c906108c
SS
5911{
5912 int sample_thread = SAMPLE_THREAD;
5913
a3f17187 5914 printf_filtered (_("Remote threadset test\n"));
c906108c
SS
5915 set_thread (sample_thread, 1);
5916}
5917
5918
5919static void
fba45db2 5920threadalive_test (char *cmd, int tty)
c906108c
SS
5921{
5922 int sample_thread = SAMPLE_THREAD;
5923
39f77062 5924 if (remote_thread_alive (pid_to_ptid (sample_thread)))
c906108c
SS
5925 printf_filtered ("PASS: Thread alive test\n");
5926 else
5927 printf_filtered ("FAIL: Thread alive test\n");
5928}
5929
23860348 5930void output_threadid (char *title, threadref *ref);
c906108c
SS
5931
5932void
fba45db2 5933output_threadid (char *title, threadref *ref)
c906108c
SS
5934{
5935 char hexid[20];
5936
23860348 5937 pack_threadid (&hexid[0], ref); /* Convert threead id into hex. */
c906108c
SS
5938 hexid[16] = 0;
5939 printf_filtered ("%s %s\n", title, (&hexid[0]));
5940}
5941
5942static void
fba45db2 5943threadlist_test_cmd (char *cmd, int tty)
c906108c
SS
5944{
5945 int startflag = 1;
5946 threadref nextthread;
5947 int done, result_count;
5948 threadref threadlist[3];
5949
5950 printf_filtered ("Remote Threadlist test\n");
5951 if (!remote_get_threadlist (startflag, &nextthread, 3, &done,
5952 &result_count, &threadlist[0]))
5953 printf_filtered ("FAIL: threadlist test\n");
5954 else
5955 {
5956 threadref *scan = threadlist;
5957 threadref *limit = scan + result_count;
5958
5959 while (scan < limit)
5960 output_threadid (" thread ", scan++);
5961 }
5962}
5963
5964void
fba45db2 5965display_thread_info (struct gdb_ext_thread_info *info)
c906108c
SS
5966{
5967 output_threadid ("Threadid: ", &info->threadid);
5968 printf_filtered ("Name: %s\n ", info->shortname);
5969 printf_filtered ("State: %s\n", info->display);
5970 printf_filtered ("other: %s\n\n", info->more_display);
5971}
5972
5973int
fba45db2 5974get_and_display_threadinfo (threadref *ref)
c906108c
SS
5975{
5976 int result;
5977 int set;
5978 struct gdb_ext_thread_info threadinfo;
5979
5980 set = TAG_THREADID | TAG_EXISTS | TAG_THREADNAME
5981 | TAG_MOREDISPLAY | TAG_DISPLAY;
5982 if (0 != (result = remote_get_threadinfo (ref, set, &threadinfo)))
5983 display_thread_info (&threadinfo);
5984 return result;
5985}
5986
5987static void
fba45db2 5988threadinfo_test_cmd (char *cmd, int tty)
c906108c
SS
5989{
5990 int athread = SAMPLE_THREAD;
5991 threadref thread;
5992 int set;
5993
5994 int_to_threadref (&thread, athread);
5995 printf_filtered ("Remote Threadinfo test\n");
5996 if (!get_and_display_threadinfo (&thread))
5997 printf_filtered ("FAIL cannot get thread info\n");
5998}
5999
6000static int
fba45db2 6001thread_display_step (threadref *ref, void *context)
c906108c
SS
6002{
6003 /* output_threadid(" threadstep ",ref); *//* simple test */
6004 return get_and_display_threadinfo (ref);
6005}
6006
6007static void
fba45db2 6008threadlist_update_test_cmd (char *cmd, int tty)
c906108c
SS
6009{
6010 printf_filtered ("Remote Threadlist update test\n");
6011 remote_threadlist_iterator (thread_display_step, 0, CRAZY_MAX_THREADS);
6012}
6013
6014static void
6015init_remote_threadtests (void)
6016{
1bedd215
AC
6017 add_com ("tlist", class_obscure, threadlist_test_cmd, _("\
6018Fetch and print the remote list of thread identifiers, one pkt only"));
c906108c 6019 add_com ("tinfo", class_obscure, threadinfo_test_cmd,
1bedd215 6020 _("Fetch and display info about one thread"));
c906108c 6021 add_com ("tset", class_obscure, threadset_test_cmd,
1bedd215 6022 _("Test setting to a different thread"));
c906108c 6023 add_com ("tupd", class_obscure, threadlist_update_test_cmd,
1bedd215 6024 _("Iterate through updating all remote thread info"));
c906108c 6025 add_com ("talive", class_obscure, threadalive_test,
1bedd215 6026 _(" Remote thread alive test "));
c906108c
SS
6027}
6028
6029#endif /* 0 */
6030
f3fb8c85
MS
6031/* Convert a thread ID to a string. Returns the string in a static
6032 buffer. */
6033
6034static char *
39f77062 6035remote_pid_to_str (ptid_t ptid)
f3fb8c85 6036{
fd0a2a6f 6037 static char buf[32];
f3fb8c85 6038
32a5b2f1 6039 xsnprintf (buf, sizeof buf, "Thread %d", ptid_get_pid (ptid));
f3fb8c85
MS
6040 return buf;
6041}
6042
38691318
KB
6043/* Get the address of the thread local variable in OBJFILE which is
6044 stored at OFFSET within the thread local storage for thread PTID. */
6045
6046static CORE_ADDR
6047remote_get_thread_local_address (ptid_t ptid, CORE_ADDR lm, CORE_ADDR offset)
6048{
444abaca 6049 if (remote_protocol_packets[PACKET_qGetTLSAddr].support != PACKET_DISABLE)
38691318
KB
6050 {
6051 struct remote_state *rs = get_remote_state ();
6d820c5c 6052 char *p = rs->buf;
571dd617 6053 enum packet_result result;
38691318
KB
6054
6055 strcpy (p, "qGetTLSAddr:");
6056 p += strlen (p);
6057 p += hexnumstr (p, PIDGET (ptid));
6058 *p++ = ',';
6059 p += hexnumstr (p, offset);
6060 *p++ = ',';
6061 p += hexnumstr (p, lm);
6062 *p++ = '\0';
6063
6d820c5c
DJ
6064 putpkt (rs->buf);
6065 getpkt (&rs->buf, &rs->buf_size, 0);
6066 result = packet_ok (rs->buf, &remote_protocol_packets[PACKET_qGetTLSAddr]);
571dd617 6067 if (result == PACKET_OK)
38691318
KB
6068 {
6069 ULONGEST result;
6070
6d820c5c 6071 unpack_varlen_hex (rs->buf, &result);
38691318
KB
6072 return result;
6073 }
571dd617 6074 else if (result == PACKET_UNKNOWN)
109c3e39
AC
6075 throw_error (TLS_GENERIC_ERROR,
6076 _("Remote target doesn't support qGetTLSAddr packet"));
38691318 6077 else
109c3e39
AC
6078 throw_error (TLS_GENERIC_ERROR,
6079 _("Remote target failed to process qGetTLSAddr request"));
38691318
KB
6080 }
6081 else
109c3e39
AC
6082 throw_error (TLS_GENERIC_ERROR,
6083 _("TLS not supported or disabled on this target"));
38691318
KB
6084 /* Not reached. */
6085 return 0;
6086}
6087
29709017
DJ
6088/* Support for inferring a target description based on the current
6089 architecture and the size of a 'g' packet. While the 'g' packet
6090 can have any size (since optional registers can be left off the
6091 end), some sizes are easily recognizable given knowledge of the
6092 approximate architecture. */
6093
6094struct remote_g_packet_guess
6095{
6096 int bytes;
6097 const struct target_desc *tdesc;
6098};
6099typedef struct remote_g_packet_guess remote_g_packet_guess_s;
6100DEF_VEC_O(remote_g_packet_guess_s);
6101
6102struct remote_g_packet_data
6103{
6104 VEC(remote_g_packet_guess_s) *guesses;
6105};
6106
6107static struct gdbarch_data *remote_g_packet_data_handle;
6108
6109static void *
6110remote_g_packet_data_init (struct obstack *obstack)
6111{
6112 return OBSTACK_ZALLOC (obstack, struct remote_g_packet_data);
6113}
6114
6115void
6116register_remote_g_packet_guess (struct gdbarch *gdbarch, int bytes,
6117 const struct target_desc *tdesc)
6118{
6119 struct remote_g_packet_data *data
6120 = gdbarch_data (gdbarch, remote_g_packet_data_handle);
6121 struct remote_g_packet_guess new_guess, *guess;
6122 int ix;
6123
6124 gdb_assert (tdesc != NULL);
6125
6126 for (ix = 0;
6127 VEC_iterate (remote_g_packet_guess_s, data->guesses, ix, guess);
6128 ix++)
6129 if (guess->bytes == bytes)
6130 internal_error (__FILE__, __LINE__,
6131 "Duplicate g packet description added for size %d",
6132 bytes);
6133
6134 new_guess.bytes = bytes;
6135 new_guess.tdesc = tdesc;
6136 VEC_safe_push (remote_g_packet_guess_s, data->guesses, &new_guess);
6137}
6138
6139static const struct target_desc *
6140remote_read_description (struct target_ops *target)
6141{
6142 struct remote_g_packet_data *data
6143 = gdbarch_data (current_gdbarch, remote_g_packet_data_handle);
6144
6145 if (!VEC_empty (remote_g_packet_guess_s, data->guesses))
6146 {
6147 struct remote_g_packet_guess *guess;
6148 int ix;
6149 int bytes = send_g_packet ();
6150
6151 for (ix = 0;
6152 VEC_iterate (remote_g_packet_guess_s, data->guesses, ix, guess);
6153 ix++)
6154 if (guess->bytes == bytes)
6155 return guess->tdesc;
6156
6157 /* We discard the g packet. A minor optimization would be to
6158 hold on to it, and fill the register cache once we have selected
6159 an architecture, but it's too tricky to do safely. */
6160 }
6161
6162 return NULL;
6163}
6164
c906108c 6165static void
fba45db2 6166init_remote_ops (void)
c906108c 6167{
c5aa993b 6168 remote_ops.to_shortname = "remote";
c906108c 6169 remote_ops.to_longname = "Remote serial target in gdb-specific protocol";
c5aa993b 6170 remote_ops.to_doc =
c906108c 6171 "Use a remote computer via a serial line, using a gdb-specific protocol.\n\
0d06e24b
JM
6172Specify the serial device it is connected to\n\
6173(e.g. /dev/ttyS0, /dev/ttya, COM1, etc.).";
c5aa993b
JM
6174 remote_ops.to_open = remote_open;
6175 remote_ops.to_close = remote_close;
c906108c 6176 remote_ops.to_detach = remote_detach;
6ad8ae5c 6177 remote_ops.to_disconnect = remote_disconnect;
c5aa993b 6178 remote_ops.to_resume = remote_resume;
c906108c
SS
6179 remote_ops.to_wait = remote_wait;
6180 remote_ops.to_fetch_registers = remote_fetch_registers;
6181 remote_ops.to_store_registers = remote_store_registers;
6182 remote_ops.to_prepare_to_store = remote_prepare_to_store;
c8e73a31 6183 remote_ops.deprecated_xfer_memory = remote_xfer_memory;
c5aa993b 6184 remote_ops.to_files_info = remote_files_info;
c906108c
SS
6185 remote_ops.to_insert_breakpoint = remote_insert_breakpoint;
6186 remote_ops.to_remove_breakpoint = remote_remove_breakpoint;
3c3bea1c
GS
6187 remote_ops.to_stopped_by_watchpoint = remote_stopped_by_watchpoint;
6188 remote_ops.to_stopped_data_address = remote_stopped_data_address;
6189 remote_ops.to_can_use_hw_breakpoint = remote_check_watch_resources;
6190 remote_ops.to_insert_hw_breakpoint = remote_insert_hw_breakpoint;
6191 remote_ops.to_remove_hw_breakpoint = remote_remove_hw_breakpoint;
6192 remote_ops.to_insert_watchpoint = remote_insert_watchpoint;
6193 remote_ops.to_remove_watchpoint = remote_remove_watchpoint;
c5aa993b
JM
6194 remote_ops.to_kill = remote_kill;
6195 remote_ops.to_load = generic_load;
c906108c
SS
6196 remote_ops.to_mourn_inferior = remote_mourn;
6197 remote_ops.to_thread_alive = remote_thread_alive;
0f71a2f6 6198 remote_ops.to_find_new_threads = remote_threads_info;
0caabb7e 6199 remote_ops.to_pid_to_str = remote_pid_to_str;
cf759d3b 6200 remote_ops.to_extra_thread_info = remote_threads_extra_info;
c906108c 6201 remote_ops.to_stop = remote_stop;
4b8a223f 6202 remote_ops.to_xfer_partial = remote_xfer_partial;
96baa820 6203 remote_ops.to_rcmd = remote_rcmd;
38691318 6204 remote_ops.to_get_thread_local_address = remote_get_thread_local_address;
c906108c 6205 remote_ops.to_stratum = process_stratum;
c5aa993b
JM
6206 remote_ops.to_has_all_memory = 1;
6207 remote_ops.to_has_memory = 1;
6208 remote_ops.to_has_stack = 1;
6209 remote_ops.to_has_registers = 1;
6210 remote_ops.to_has_execution = 1;
6211 remote_ops.to_has_thread_control = tc_schedlock; /* can lock scheduler */
6212 remote_ops.to_magic = OPS_MAGIC;
fd79ecee 6213 remote_ops.to_memory_map = remote_memory_map;
a76d924d
DJ
6214 remote_ops.to_flash_erase = remote_flash_erase;
6215 remote_ops.to_flash_done = remote_flash_done;
29709017 6216 remote_ops.to_read_description = remote_read_description;
c906108c
SS
6217}
6218
6219/* Set up the extended remote vector by making a copy of the standard
6220 remote vector and adding to it. */
6221
6222static void
fba45db2 6223init_extended_remote_ops (void)
c906108c
SS
6224{
6225 extended_remote_ops = remote_ops;
6226
0f71a2f6 6227 extended_remote_ops.to_shortname = "extended-remote";
c5aa993b 6228 extended_remote_ops.to_longname =
c906108c 6229 "Extended remote serial target in gdb-specific protocol";
c5aa993b 6230 extended_remote_ops.to_doc =
c906108c
SS
6231 "Use a remote computer via a serial line, using a gdb-specific protocol.\n\
6232Specify the serial device it is connected to (e.g. /dev/ttya).",
c5aa993b 6233 extended_remote_ops.to_open = extended_remote_open;
c906108c
SS
6234 extended_remote_ops.to_create_inferior = extended_remote_create_inferior;
6235 extended_remote_ops.to_mourn_inferior = extended_remote_mourn;
0f71a2f6
JM
6236}
6237
6426a772
JM
6238static int
6239remote_can_async_p (void)
6240{
23860348 6241 /* We're async whenever the serial device is. */
2cd58942 6242 return (current_target.to_async_mask_value) && serial_can_async_p (remote_desc);
6426a772
JM
6243}
6244
6245static int
6246remote_is_async_p (void)
6247{
23860348 6248 /* We're async whenever the serial device is. */
2cd58942 6249 return (current_target.to_async_mask_value) && serial_is_async_p (remote_desc);
6426a772
JM
6250}
6251
2acceee2
JM
6252/* Pass the SERIAL event on and up to the client. One day this code
6253 will be able to delay notifying the client of an event until the
23860348 6254 point where an entire packet has been received. */
2acceee2 6255
2bc416ba 6256static void (*async_client_callback) (enum inferior_event_type event_type,
23860348 6257 void *context);
2acceee2
JM
6258static void *async_client_context;
6259static serial_event_ftype remote_async_serial_handler;
6260
6426a772 6261static void
819cc324 6262remote_async_serial_handler (struct serial *scb, void *context)
6426a772 6263{
2acceee2
JM
6264 /* Don't propogate error information up to the client. Instead let
6265 the client find out about the error by querying the target. */
6266 async_client_callback (INF_REG_EVENT, async_client_context);
6267}
6268
6269static void
2bc416ba 6270remote_async (void (*callback) (enum inferior_event_type event_type,
23860348 6271 void *context), void *context)
2acceee2 6272{
ed9a39eb 6273 if (current_target.to_async_mask_value == 0)
8e65ff28 6274 internal_error (__FILE__, __LINE__,
e2e0b3e5 6275 _("Calling remote_async when async is masked"));
ed9a39eb 6276
2acceee2
JM
6277 if (callback != NULL)
6278 {
2cd58942 6279 serial_async (remote_desc, remote_async_serial_handler, NULL);
2acceee2
JM
6280 async_client_callback = callback;
6281 async_client_context = context;
6282 }
6283 else
2cd58942 6284 serial_async (remote_desc, NULL, NULL);
6426a772
JM
6285}
6286
43ff13b4
JM
6287/* Target async and target extended-async.
6288
6289 This are temporary targets, until it is all tested. Eventually
6290 async support will be incorporated int the usual 'remote'
23860348 6291 target. */
43ff13b4
JM
6292
6293static void
c2d11a7d 6294init_remote_async_ops (void)
43ff13b4
JM
6295{
6296 remote_async_ops.to_shortname = "async";
2bc416ba 6297 remote_async_ops.to_longname =
23860348 6298 "Remote serial target in async version of the gdb-specific protocol";
c5aa993b 6299 remote_async_ops.to_doc =
43ff13b4
JM
6300 "Use a remote computer via a serial line, using a gdb-specific protocol.\n\
6301Specify the serial device it is connected to (e.g. /dev/ttya).";
c5aa993b
JM
6302 remote_async_ops.to_open = remote_async_open;
6303 remote_async_ops.to_close = remote_close;
6ad8ae5c
DJ
6304 remote_async_ops.to_detach = remote_detach;
6305 remote_async_ops.to_disconnect = remote_disconnect;
c5aa993b
JM
6306 remote_async_ops.to_resume = remote_async_resume;
6307 remote_async_ops.to_wait = remote_async_wait;
6308 remote_async_ops.to_fetch_registers = remote_fetch_registers;
6309 remote_async_ops.to_store_registers = remote_store_registers;
6310 remote_async_ops.to_prepare_to_store = remote_prepare_to_store;
c8e73a31 6311 remote_async_ops.deprecated_xfer_memory = remote_xfer_memory;
c5aa993b 6312 remote_async_ops.to_files_info = remote_files_info;
43ff13b4
JM
6313 remote_async_ops.to_insert_breakpoint = remote_insert_breakpoint;
6314 remote_async_ops.to_remove_breakpoint = remote_remove_breakpoint;
3c3bea1c
GS
6315 remote_async_ops.to_can_use_hw_breakpoint = remote_check_watch_resources;
6316 remote_async_ops.to_insert_hw_breakpoint = remote_insert_hw_breakpoint;
6317 remote_async_ops.to_remove_hw_breakpoint = remote_remove_hw_breakpoint;
6318 remote_async_ops.to_insert_watchpoint = remote_insert_watchpoint;
6319 remote_async_ops.to_remove_watchpoint = remote_remove_watchpoint;
6320 remote_async_ops.to_stopped_by_watchpoint = remote_stopped_by_watchpoint;
6321 remote_async_ops.to_stopped_data_address = remote_stopped_data_address;
6426a772
JM
6322 remote_async_ops.to_terminal_inferior = remote_async_terminal_inferior;
6323 remote_async_ops.to_terminal_ours = remote_async_terminal_ours;
c5aa993b
JM
6324 remote_async_ops.to_kill = remote_async_kill;
6325 remote_async_ops.to_load = generic_load;
53a5351d 6326 remote_async_ops.to_mourn_inferior = remote_async_mourn;
c5aa993b
JM
6327 remote_async_ops.to_thread_alive = remote_thread_alive;
6328 remote_async_ops.to_find_new_threads = remote_threads_info;
cf759d3b
ND
6329 remote_async_ops.to_pid_to_str = remote_pid_to_str;
6330 remote_async_ops.to_extra_thread_info = remote_threads_extra_info;
43ff13b4 6331 remote_async_ops.to_stop = remote_stop;
4b8a223f 6332 remote_async_ops.to_xfer_partial = remote_xfer_partial;
96baa820 6333 remote_async_ops.to_rcmd = remote_rcmd;
c5aa993b
JM
6334 remote_async_ops.to_stratum = process_stratum;
6335 remote_async_ops.to_has_all_memory = 1;
6336 remote_async_ops.to_has_memory = 1;
6337 remote_async_ops.to_has_stack = 1;
6338 remote_async_ops.to_has_registers = 1;
6339 remote_async_ops.to_has_execution = 1;
6340 remote_async_ops.to_has_thread_control = tc_schedlock; /* can lock scheduler */
6426a772
JM
6341 remote_async_ops.to_can_async_p = remote_can_async_p;
6342 remote_async_ops.to_is_async_p = remote_is_async_p;
6343 remote_async_ops.to_async = remote_async;
ed9a39eb 6344 remote_async_ops.to_async_mask_value = 1;
c5aa993b 6345 remote_async_ops.to_magic = OPS_MAGIC;
fd79ecee 6346 remote_async_ops.to_memory_map = remote_memory_map;
a76d924d
DJ
6347 remote_async_ops.to_flash_erase = remote_flash_erase;
6348 remote_async_ops.to_flash_done = remote_flash_done;
29709017 6349 remote_ops.to_read_description = remote_read_description;
43ff13b4
JM
6350}
6351
6352/* Set up the async extended remote vector by making a copy of the standard
6353 remote vector and adding to it. */
6354
6355static void
c2d11a7d 6356init_extended_async_remote_ops (void)
43ff13b4
JM
6357{
6358 extended_async_remote_ops = remote_async_ops;
6359
6360 extended_async_remote_ops.to_shortname = "extended-async";
c5aa993b 6361 extended_async_remote_ops.to_longname =
43ff13b4 6362 "Extended remote serial target in async gdb-specific protocol";
c5aa993b 6363 extended_async_remote_ops.to_doc =
43ff13b4
JM
6364 "Use a remote computer via a serial line, using an async gdb-specific protocol.\n\
6365Specify the serial device it is connected to (e.g. /dev/ttya).",
c5aa993b 6366 extended_async_remote_ops.to_open = extended_remote_async_open;
43ff13b4
JM
6367 extended_async_remote_ops.to_create_inferior = extended_remote_async_create_inferior;
6368 extended_async_remote_ops.to_mourn_inferior = extended_remote_mourn;
6369}
6370
5a2468f5 6371static void
c2d11a7d 6372set_remote_cmd (char *args, int from_tty)
5a2468f5 6373{
427c3a89 6374 help_list (remote_set_cmdlist, "set remote ", -1, gdb_stdout);
5a2468f5
JM
6375}
6376
d471ea57
AC
6377static void
6378show_remote_cmd (char *args, int from_tty)
6379{
37a105a1 6380 /* We can't just use cmd_show_list here, because we want to skip
427c3a89 6381 the redundant "show remote Z-packet" and the legacy aliases. */
37a105a1
DJ
6382 struct cleanup *showlist_chain;
6383 struct cmd_list_element *list = remote_show_cmdlist;
6384
6385 showlist_chain = make_cleanup_ui_out_tuple_begin_end (uiout, "showlist");
6386 for (; list != NULL; list = list->next)
6387 if (strcmp (list->name, "Z-packet") == 0)
6388 continue;
427c3a89
DJ
6389 else if (list->type == not_set_cmd)
6390 /* Alias commands are exactly like the original, except they
6391 don't have the normal type. */
6392 continue;
6393 else
37a105a1
DJ
6394 {
6395 struct cleanup *option_chain
6396 = make_cleanup_ui_out_tuple_begin_end (uiout, "option");
6397 ui_out_field_string (uiout, "name", list->name);
6398 ui_out_text (uiout, ": ");
427c3a89
DJ
6399 if (list->type == show_cmd)
6400 do_setshow_command ((char *) NULL, from_tty, list);
6401 else
6402 cmd_func (list, NULL, from_tty);
37a105a1
DJ
6403 /* Close the tuple. */
6404 do_cleanups (option_chain);
6405 }
427c3a89
DJ
6406
6407 /* Close the tuple. */
6408 do_cleanups (showlist_chain);
d471ea57 6409}
5a2468f5 6410
0f71a2f6 6411static void
fba45db2 6412build_remote_gdbarch_data (void)
0f71a2f6 6413{
17a912b6 6414 remote_address_size = gdbarch_addr_bit (current_gdbarch);
0f71a2f6
JM
6415}
6416
23860348 6417/* Function to be called whenever a new objfile (shlib) is detected. */
dc8acb97
MS
6418static void
6419remote_new_objfile (struct objfile *objfile)
6420{
23860348 6421 if (remote_desc != 0) /* Have a remote connection. */
06d3b283 6422 remote_check_symbols (objfile);
dc8acb97
MS
6423}
6424
c906108c 6425void
fba45db2 6426_initialize_remote (void)
c906108c 6427{
ea9c271d
DJ
6428 struct remote_state *rs;
6429
0f71a2f6 6430 /* architecture specific data */
2bc416ba 6431 remote_gdbarch_data_handle =
23860348 6432 gdbarch_data_register_post_init (init_remote_state);
29709017
DJ
6433 remote_g_packet_data_handle =
6434 gdbarch_data_register_pre_init (remote_g_packet_data_init);
d01949b6
AC
6435
6436 /* Old tacky stuff. NOTE: This comes after the remote protocol so
6437 that the remote protocol has been initialized. */
046a4708
AC
6438 DEPRECATED_REGISTER_GDBARCH_SWAP (remote_address_size);
6439 deprecated_register_gdbarch_swap (NULL, 0, build_remote_gdbarch_data);
0f71a2f6 6440
ea9c271d
DJ
6441 /* Initialize the per-target state. At the moment there is only one
6442 of these, not one per target. Only one target is active at a
6443 time. The default buffer size is unimportant; it will be expanded
6444 whenever a larger buffer is needed. */
0b83947e 6445 rs = get_remote_state_raw ();
ea9c271d
DJ
6446 rs->buf_size = 400;
6447 rs->buf = xmalloc (rs->buf_size);
6448
c906108c
SS
6449 init_remote_ops ();
6450 add_target (&remote_ops);
6451
6452 init_extended_remote_ops ();
6453 add_target (&extended_remote_ops);
cce74817 6454
43ff13b4
JM
6455 init_remote_async_ops ();
6456 add_target (&remote_async_ops);
6457
6458 init_extended_async_remote_ops ();
6459 add_target (&extended_async_remote_ops);
6460
dc8acb97 6461 /* Hook into new objfile notification. */
06d3b283 6462 observer_attach_new_objfile (remote_new_objfile);
dc8acb97 6463
c906108c
SS
6464#if 0
6465 init_remote_threadtests ();
6466#endif
6467
23860348 6468 /* set/show remote ... */
d471ea57 6469
1bedd215 6470 add_prefix_cmd ("remote", class_maintenance, set_remote_cmd, _("\
5a2468f5
JM
6471Remote protocol specific variables\n\
6472Configure various remote-protocol specific variables such as\n\
1bedd215 6473the packets being used"),
cff3e48b 6474 &remote_set_cmdlist, "set remote ",
23860348 6475 0 /* allow-unknown */, &setlist);
1bedd215 6476 add_prefix_cmd ("remote", class_maintenance, show_remote_cmd, _("\
5a2468f5
JM
6477Remote protocol specific variables\n\
6478Configure various remote-protocol specific variables such as\n\
1bedd215 6479the packets being used"),
cff3e48b 6480 &remote_show_cmdlist, "show remote ",
23860348 6481 0 /* allow-unknown */, &showlist);
5a2468f5 6482
1a966eab
AC
6483 add_cmd ("compare-sections", class_obscure, compare_sections_command, _("\
6484Compare section data on target to the exec file.\n\
6485Argument is a single section name (default: all loaded sections)."),
c906108c
SS
6486 &cmdlist);
6487
1a966eab
AC
6488 add_cmd ("packet", class_maintenance, packet_command, _("\
6489Send an arbitrary packet to a remote target.\n\
c906108c
SS
6490 maintenance packet TEXT\n\
6491If GDB is talking to an inferior via the GDB serial protocol, then\n\
6492this command sends the string TEXT to the inferior, and displays the\n\
6493response packet. GDB supplies the initial `$' character, and the\n\
1a966eab 6494terminating `#' character and checksum."),
c906108c
SS
6495 &maintenancelist);
6496
7915a72c
AC
6497 add_setshow_boolean_cmd ("remotebreak", no_class, &remote_break, _("\
6498Set whether to send break if interrupted."), _("\
6499Show whether to send break if interrupted."), _("\
6500If set, a break, instead of a cntrl-c, is sent to the remote target."),
2c5b56ce 6501 NULL, NULL, /* FIXME: i18n: Whether to send break if interrupted is %s. */
e707bbc2 6502 &setlist, &showlist);
c906108c 6503
23860348 6504 /* Install commands for configuring memory read/write packets. */
11cf8741 6505
1a966eab
AC
6506 add_cmd ("remotewritesize", no_class, set_memory_write_packet_size, _("\
6507Set the maximum number of bytes per memory write packet (deprecated)."),
11cf8741 6508 &setlist);
1a966eab
AC
6509 add_cmd ("remotewritesize", no_class, show_memory_write_packet_size, _("\
6510Show the maximum number of bytes per memory write packet (deprecated)."),
11cf8741
JM
6511 &showlist);
6512 add_cmd ("memory-write-packet-size", no_class,
1a966eab
AC
6513 set_memory_write_packet_size, _("\
6514Set the maximum number of bytes per memory-write packet.\n\
6515Specify the number of bytes in a packet or 0 (zero) for the\n\
6516default packet size. The actual limit is further reduced\n\
6517dependent on the target. Specify ``fixed'' to disable the\n\
6518further restriction and ``limit'' to enable that restriction."),
11cf8741
JM
6519 &remote_set_cmdlist);
6520 add_cmd ("memory-read-packet-size", no_class,
1a966eab
AC
6521 set_memory_read_packet_size, _("\
6522Set the maximum number of bytes per memory-read packet.\n\
6523Specify the number of bytes in a packet or 0 (zero) for the\n\
6524default packet size. The actual limit is further reduced\n\
6525dependent on the target. Specify ``fixed'' to disable the\n\
6526further restriction and ``limit'' to enable that restriction."),
11cf8741
JM
6527 &remote_set_cmdlist);
6528 add_cmd ("memory-write-packet-size", no_class,
6529 show_memory_write_packet_size,
1a966eab 6530 _("Show the maximum number of bytes per memory-write packet."),
11cf8741
JM
6531 &remote_show_cmdlist);
6532 add_cmd ("memory-read-packet-size", no_class,
6533 show_memory_read_packet_size,
1a966eab 6534 _("Show the maximum number of bytes per memory-read packet."),
11cf8741 6535 &remote_show_cmdlist);
c906108c 6536
b3f42336 6537 add_setshow_zinteger_cmd ("hardware-watchpoint-limit", no_class,
7915a72c
AC
6538 &remote_hw_watchpoint_limit, _("\
6539Set the maximum number of target hardware watchpoints."), _("\
6540Show the maximum number of target hardware watchpoints."), _("\
6541Specify a negative limit for unlimited."),
2c5b56ce 6542 NULL, NULL, /* FIXME: i18n: The maximum number of target hardware watchpoints is %s. */
b3f42336
AC
6543 &remote_set_cmdlist, &remote_show_cmdlist);
6544 add_setshow_zinteger_cmd ("hardware-breakpoint-limit", no_class,
7915a72c
AC
6545 &remote_hw_breakpoint_limit, _("\
6546Set the maximum number of target hardware breakpoints."), _("\
6547Show the maximum number of target hardware breakpoints."), _("\
6548Specify a negative limit for unlimited."),
2c5b56ce 6549 NULL, NULL, /* FIXME: i18n: The maximum number of target hardware breakpoints is %s. */
b3f42336 6550 &remote_set_cmdlist, &remote_show_cmdlist);
501eef12 6551
4d28ad1e
AC
6552 add_setshow_integer_cmd ("remoteaddresssize", class_obscure,
6553 &remote_address_size, _("\
6554Set the maximum size of the address (in bits) in a memory packet."), _("\
6555Show the maximum size of the address (in bits) in a memory packet."), NULL,
6556 NULL,
6557 NULL, /* FIXME: i18n: */
6558 &setlist, &showlist);
c906108c 6559
444abaca 6560 add_packet_config_cmd (&remote_protocol_packets[PACKET_X],
bb572ddd 6561 "X", "binary-download", 1);
0f71a2f6 6562
444abaca 6563 add_packet_config_cmd (&remote_protocol_packets[PACKET_vCont],
bb572ddd 6564 "vCont", "verbose-resume", 0);
506fb367 6565
89be2091
DJ
6566 add_packet_config_cmd (&remote_protocol_packets[PACKET_QPassSignals],
6567 "QPassSignals", "pass-signals", 0);
6568
444abaca 6569 add_packet_config_cmd (&remote_protocol_packets[PACKET_qSymbol],
bb572ddd 6570 "qSymbol", "symbol-lookup", 0);
dc8acb97 6571
444abaca 6572 add_packet_config_cmd (&remote_protocol_packets[PACKET_P],
bb572ddd 6573 "P", "set-register", 1);
d471ea57 6574
444abaca 6575 add_packet_config_cmd (&remote_protocol_packets[PACKET_p],
bb572ddd 6576 "p", "fetch-register", 1);
b96ec7ac 6577
444abaca 6578 add_packet_config_cmd (&remote_protocol_packets[PACKET_Z0],
bb572ddd 6579 "Z0", "software-breakpoint", 0);
d471ea57 6580
444abaca 6581 add_packet_config_cmd (&remote_protocol_packets[PACKET_Z1],
bb572ddd 6582 "Z1", "hardware-breakpoint", 0);
d471ea57 6583
444abaca 6584 add_packet_config_cmd (&remote_protocol_packets[PACKET_Z2],
bb572ddd 6585 "Z2", "write-watchpoint", 0);
d471ea57 6586
444abaca 6587 add_packet_config_cmd (&remote_protocol_packets[PACKET_Z3],
bb572ddd 6588 "Z3", "read-watchpoint", 0);
d471ea57 6589
444abaca 6590 add_packet_config_cmd (&remote_protocol_packets[PACKET_Z4],
bb572ddd 6591 "Z4", "access-watchpoint", 0);
d471ea57 6592
0876f84a
DJ
6593 add_packet_config_cmd (&remote_protocol_packets[PACKET_qXfer_auxv],
6594 "qXfer:auxv:read", "read-aux-vector", 0);
802188a7 6595
23181151
DJ
6596 add_packet_config_cmd (&remote_protocol_packets[PACKET_qXfer_features],
6597 "qXfer:features:read", "target-features", 0);
6598
fd79ecee
DJ
6599 add_packet_config_cmd (&remote_protocol_packets[PACKET_qXfer_memory_map],
6600 "qXfer:memory-map:read", "memory-map", 0);
6601
0e7f50da
UW
6602 add_packet_config_cmd (&remote_protocol_packets[PACKET_qXfer_spu_read],
6603 "qXfer:spu:read", "read-spu-object", 0);
6604
6605 add_packet_config_cmd (&remote_protocol_packets[PACKET_qXfer_spu_write],
6606 "qXfer:spu:write", "write-spu-object", 0);
6607
444abaca 6608 add_packet_config_cmd (&remote_protocol_packets[PACKET_qGetTLSAddr],
38691318 6609 "qGetTLSAddr", "get-thread-local-storage-address",
38691318
KB
6610 0);
6611
be2a5f71
DJ
6612 add_packet_config_cmd (&remote_protocol_packets[PACKET_qSupported],
6613 "qSupported", "supported-packets", 0);
6614
37a105a1
DJ
6615 /* Keep the old ``set remote Z-packet ...'' working. Each individual
6616 Z sub-packet has its own set and show commands, but users may
6617 have sets to this variable in their .gdbinit files (or in their
6618 documentation). */
e9e68a56 6619 add_setshow_auto_boolean_cmd ("Z-packet", class_obscure,
7915a72c
AC
6620 &remote_Z_packet_detect, _("\
6621Set use of remote protocol `Z' packets"), _("\
6622Show use of remote protocol `Z' packets "), _("\
3b64bf98 6623When set, GDB will attempt to use the remote breakpoint and watchpoint\n\
7915a72c 6624packets."),
e9e68a56 6625 set_remote_protocol_Z_packet_cmd,
2c5b56ce 6626 show_remote_protocol_Z_packet_cmd, /* FIXME: i18n: Use of remote protocol `Z' packets is %s. */
e9e68a56 6627 &remote_set_cmdlist, &remote_show_cmdlist);
449092f6
CV
6628
6629 /* Eventually initialize fileio. See fileio.c */
6630 initialize_remote_fileio (remote_set_cmdlist, remote_show_cmdlist);
c906108c 6631}
This page took 1.19389 seconds and 4 git commands to generate.