1 /* i386-nlmstub.c -- NLM debugging stub for the i386.
3 This is originally based on an m68k software stub written by Glenn
4 Engel at HP, but has changed quite a bit. It was modified for the
5 i386 by Jim Kingdon, Cygnus Support. It was modified to run under
6 NetWare by Ian Lance Taylor, Cygnus Support.
8 This code is intended to produce an NLM (a NetWare Loadable Module)
9 to run under NetWare on an i386 platform. To create the NLM,
10 compile this code into an object file using the NLM SDK on any i386
11 host, and use the nlmconv program (available in the GNU binutils)
12 to transform the resulting object file into an NLM. */
14 /****************************************************************************
16 THIS SOFTWARE IS NOT COPYRIGHTED
18 HP offers the following for use in the public domain. HP makes no
19 warranty with regard to the software or it's performance and the
20 user accepts the software "AS IS" with all faults.
22 HP DISCLAIMS ANY WARRANTIES, EXPRESS OR IMPLIED, WITH REGARD
23 TO THIS SOFTWARE INCLUDING BUT NOT LIMITED TO THE WARRANTIES
24 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
26 ****************************************************************************/
28 /****************************************************************************
30 * The following gdb commands are supported:
32 * command function Return value
34 * g return the value of the CPU registers hex data or ENN
35 * G set the value of the CPU registers OK or ENN
37 * mAA..AA,LLLL Read LLLL bytes at address AA..AA hex data or ENN
38 * MAA..AA,LLLL: Write LLLL bytes at address AA.AA OK or ENN
40 * c Resume at current address SNN ( signal NN)
41 * cAA..AA Continue at address AA..AA SNN
43 * s Step one instruction SNN
44 * sAA..AA Step one instruction from AA..AA SNN
48 * ? What was the last sigval ? SNN (signal NN)
50 * All commands and responses are sent with a packet which includes a
51 * checksum. A packet consists of
53 * $<packet info>#<checksum>.
56 * <packet info> :: <characters representing the command or response>
57 * <checksum> :: < two hex digits computed as modulo 256 sum of <packetinfo>>
59 * When a packet is received, it is first acknowledged with either '+' or '-'.
60 * '+' indicates a successful transfer. '-' indicates a failed transfer.
65 * $m0,10#2a +$00010203040506070809101112131415#42
67 ****************************************************************************/
81 /************************************************************************/
82 /*****************************************************************************
84 * (C) Copyright 1988-1993 Novell, Inc.
85 * All Rights Reserved.
87 * This program is an unpublished copyrighted work which is proprietary
88 * to Novell, Inc. and contains confidential information that is not
89 * to be reproduced or disclosed to any other person or entity without
90 * prior written consent from Novell, Inc. in each and every instance.
92 * WARNING: Unauthorized reproduction of this program as well as
93 * unauthorized preparation of derivative works based upon the
94 * program or distribution of copies by sale, rental, lease or
95 * lending are violations of federal copyright laws and state trade
96 * secret laws, punishable by civil and criminal penalties.
99 * $modname: loadstuff.h$
101 * $date: Fri, Jan 15, 1993$
103 ****************************************************************************/
106 /* WARNING: THIS IS NOT A COMPLETE OS HEADER FILE - DON'T GET CONFUSED
107 ***********************************************************************
108 * The information is this file is a subset of the OS LOADER.H.
109 * This file was created to reveal the LoadDefinitionStrucutre and some
110 * associated information to Cygnus Support to assist them in their
111 * efforts to develop GNU netware utilities. Don't confuse this file
112 * with LOADER.H or any other actually supported NetWare header.
114 ************************************************************************/
116 struct LoadDefinitionStructure
118 struct LoadDefinitionStructure
*LDLink
;
119 struct LoadDefinitionStructure
*LDKillLink
;
120 struct LoadDefinitionStructure
*LDScanLink
;
121 struct ResourceTagStructure
*LDResourceList
;
122 LONG LDIdentificationNumber
;
123 LONG LDCodeImageOffset
;
124 LONG LDCodeImageLength
;
125 LONG LDDataImageOffset
;
126 LONG LDDataImageLength
;
127 LONG LDUninitializedDataLength
;
128 LONG LDCustomDataOffset
;
129 LONG LDCustomDataSize
;
132 LONG (*LDInitializationProcedure
)(
133 struct LoadDefinitionStructure
*LoadRecord
,
134 struct ScreenStruct
*screenID
,
136 BYTE
*loadDirectoryPath
,
137 LONG uninitializedDataLength
,
144 LONG customDataOffset
,
145 LONG customDataSize
);
146 void (*LDExitProcedure
)(void);
147 LONG (*LDCheckUnloadProcedure
)(
148 struct ScreenStruct
*screenID
);
149 struct ExternalPublicDefinitionStructure
*LDPublics
;
152 LONG
*LDCLIBLoadStructure
;
155 LONG LDReservedForCLIB
;
158 void *LDModuleObjectHandle
; /* If Instrumented BEW 10/16/90 */
166 LONG LDAllocAvailBytes
;
167 LONG LDAllocFreeCount
;
168 LONG LDLastGarbCollect
;
169 LONG LDAlloc16Lists
[64];
170 LONG LDAlloc256Lists
[12];
172 struct DomainStructure
*LDDomainID
; /* This must be non-zero for the Alloc Hunt code to work right. */
173 /* It also points to the domain structure. */
174 struct LoadDefinitionStructure
*LDEnvLink
;
175 void *LDAllocPagesListHead
;
176 struct ExternalPublicDefinitionStructure
*LDTempPublicList
;
177 LONG LDMessageLanguage
; /* for enabling */
178 BYTE
**LDMessages
; /* for enabling */
179 LONG LDMessageCount
; /* for enabling */
180 BYTE
*LDHelpFile
; /* for enabling */
181 LONG LDMessageBufferSize
; /* for enabling */
182 LONG LDHelpBufferSize
; /* for enabling */
183 LONG LDSharedCodeOffset
; /* for protection */
184 LONG LDSharedCodeLength
; /* for protection */
185 LONG LDSharedDataOffset
; /* for protection */
186 LONG LDSharedDataLength
; /* for protection */
187 LONG (*LDSharedInitProcedure
)(
188 struct LoadDefinitionStructure
*LoadRecord
,
189 struct ScreenStruct
*screenID
,
191 void (*LDSharedExitProcedure
)(void);
193 LONG LDRealRPCDataTable
;
194 LONG LDRPCDataTableSize
;
195 LONG LDNumberOfReferencedPublics
;
196 struct ExternalPublicDefinitionStructure
**LDReferencedPublics
;
197 LONG LDNumberOfReferencedExports
;
201 /* define the LDFlags. */
203 #define LDModuleIsReEntrantBit 0x00000001
204 #define LDModuleCanBeMultiplyLoadedBit 0x00000002
205 #define LDSynchronizeStart 0x00000004
206 #define LDPseudoPreemptionBit 0x00000008
207 #define LDLoadInOSDomain 0x00000010
208 #define LDDontUnloadBit 0x20000000
209 #define LDModuleIsBeingDebugged 0x40000000
210 #define LDMemoryOn4KBoundriesBit 0x80000000
212 /* LoadModule load options */
213 #define LO_NORMAL 0x0000
214 #define LO_STARTUP 0x0001
215 #define LO_PROTECT 0x0002
216 #define LO_DEBUG 0x0004
217 #define LO_AUTO_LOAD 0x0008
218 #define LO_DONT_PROMPT 0x0010
219 #define LO_LOAD_LOW 0x0020
220 #define LO_RETURN_HANDLE 0x0040
221 #define LO_LOAD_SILENT 0x0080
223 /* Loader returned error codes */
224 #define LOAD_COULD_NOT_FIND_FILE 1
225 #define LOAD_ERROR_READING_FILE 2
226 #define LOAD_NOT_NLM_FILE_FORMAT 3
227 #define LOAD_WRONG_NLM_FILE_VERSION 4
228 #define LOAD_REENTRANT_INITIALIZE_FAILURE 5
229 #define LOAD_CAN_NOT_LOAD_MULTIPLE_COPIES 6
230 #define LOAD_ALREADY_IN_PROGRESS 7
231 #define LOAD_NOT_ENOUGH_MEMORY 8
232 #define LOAD_INITIALIZE_FAILURE 9
233 #define LOAD_INCONSISTENT_FILE_FORMAT 10
234 #define LOAD_CAN_NOT_LOAD_AT_STARTUP 11
235 #define LOAD_AUTO_LOAD_MODULES_NOT_LOADED 12
236 #define LOAD_UNRESOLVED_EXTERNAL 13
237 #define LOAD_PUBLIC_ALREADY_DEFINED 14
238 #define LOAD_XDC_DATA_ERROR 15
239 #define LOAD_NOT_OS_DOMAIN 16
241 /****************************************************************************/
243 /* The main thread ID. */
244 static int mainthread
;
246 /* The debug server thread ID. */
247 static int debugthread
;
249 /* The LoadDefinitionStructure of the NLM being debugged. */
250 static struct LoadDefinitionStructure
*handle
;
252 /* Whether we have connected to gdb. */
255 /* The actual first instruction in the program. */
256 static unsigned char first_insn
;
258 /* An error message for the main thread to print. */
259 static char *error_message
;
261 /* The AIO port handle. */
262 static int AIOhandle
;
264 /* The console screen. */
265 static int console_screen
;
267 /* BUFMAX defines the maximum number of characters in inbound/outbound
268 buffers. At least NUMREGBYTES*2 are needed for register packets */
271 /* remote_debug > 0 prints ill-formed commands in valid packets and
273 static int remote_debug
= 1;
275 static const char hexchars
[] = "0123456789abcdef";
277 /* Number of bytes of registers. */
278 #define NUMREGBYTES 64
279 enum regnames
{EAX
, ECX
, EDX
, EBX
, ESP
, EBP
, ESI
, EDI
,
280 PC
/* also known as eip */,
281 PS
/* also known as eflags */,
282 CS
, SS
, DS
, ES
, FS
, GS
};
284 /* Register values. */
285 static int registers
[NUMREGBYTES
/4];
287 /* Read a character from the serial port. This must busy wait, but
288 that's OK because we will be the only thread running anyhow. */
299 err
= AIOReadData (AIOhandle
, (char *) &ret
, 1, &got
);
302 error_message
= "AIOReadData failed";
303 ResumeThread (mainthread
);
312 /* Write a character to the serial port. Returns 0 on failure,
313 non-zero on success. */
322 err
= AIOWriteData (AIOhandle
, (char *) &c
, 1, &put
);
323 if (err
!= 0 || put
!= 1)
325 error_message
= "AIOWriteData failed";
326 ResumeThread (mainthread
);
332 /* Get the registers out of the frame information. */
335 frame_to_registers (frame
, regs
)
336 T_TSS_StackFrame
*frame
;
339 regs
[EAX
] = frame
->ExceptionEAX
;
340 regs
[ECX
] = frame
->ExceptionECX
;
341 regs
[EDX
] = frame
->ExceptionEDX
;
342 regs
[EBX
] = frame
->ExceptionEBX
;
343 regs
[ESP
] = frame
->ExceptionESP
;
344 regs
[EBP
] = frame
->ExceptionEBP
;
345 regs
[ESI
] = frame
->ExceptionESI
;
346 regs
[EDI
] = frame
->ExceptionEDI
;
347 regs
[PC
] = frame
->ExceptionEIP
;
348 regs
[PS
] = frame
->ExceptionSystemFlags
;
349 regs
[CS
] = frame
->ExceptionCS
[0];
350 regs
[SS
] = frame
->ExceptionSS
[0];
351 regs
[DS
] = frame
->ExceptionDS
[0];
352 regs
[ES
] = frame
->ExceptionES
[0];
353 regs
[FS
] = frame
->ExceptionFS
[0];
354 regs
[GS
] = frame
->ExceptionGS
[0];
357 /* Put the registers back into the frame information. */
360 registers_to_frame (regs
, frame
)
362 T_TSS_StackFrame
*frame
;
364 frame
->ExceptionEAX
= regs
[EAX
];
365 frame
->ExceptionECX
= regs
[ECX
];
366 frame
->ExceptionEDX
= regs
[EDX
];
367 frame
->ExceptionEBX
= regs
[EBX
];
368 frame
->ExceptionESP
= regs
[ESP
];
369 frame
->ExceptionEBP
= regs
[EBP
];
370 frame
->ExceptionESI
= regs
[ESI
];
371 frame
->ExceptionEDI
= regs
[EDI
];
372 frame
->ExceptionEIP
= regs
[PC
];
373 frame
->ExceptionSystemFlags
= regs
[PS
];
374 frame
->ExceptionCS
[0] = regs
[CS
];
375 frame
->ExceptionSS
[0] = regs
[SS
];
376 frame
->ExceptionDS
[0] = regs
[DS
];
377 frame
->ExceptionES
[0] = regs
[ES
];
378 frame
->ExceptionFS
[0] = regs
[FS
];
379 frame
->ExceptionGS
[0] = regs
[GS
];
382 /* Turn a hex character into a number. */
388 if ((ch
>= 'a') && (ch
<= 'f'))
390 if ((ch
>= '0') && (ch
<= '9'))
392 if ((ch
>= 'A') && (ch
<= 'F'))
397 /* Scan for the sequence $<data>#<checksum>. Returns 0 on failure,
398 non-zero on success. */
404 unsigned char checksum
;
405 unsigned char xmitcsum
;
412 /* wait around for the start character, ignore all other characters */
413 while ((ch
= getDebugChar()) != '$')
421 /* now, read until a # or end of buffer is found */
422 while (count
< BUFMAX
)
429 checksum
= checksum
+ ch
;
437 ch
= getDebugChar ();
440 xmitcsum
= hex(ch
) << 4;
441 ch
= getDebugChar ();
445 if ((remote_debug
) && (checksum
!= xmitcsum
))
447 fprintf(stderr
,"bad checksum. My count = 0x%x, sent=0x%x. buf=%s\n",
448 checksum
,xmitcsum
,buffer
);
451 if (checksum
!= xmitcsum
)
453 /* failed checksum */
454 if (! putDebugChar('-'))
459 /* successful transfer */
460 if (! putDebugChar('+'))
462 /* if a sequence char is present, reply the sequence ID */
463 if (buffer
[2] == ':')
465 if (! putDebugChar (buffer
[0])
466 || ! putDebugChar (buffer
[1]))
468 /* remove sequence chars from buffer */
469 count
= strlen(buffer
);
470 for (i
=3; i
<= count
; i
++)
471 buffer
[i
-3] = buffer
[i
];
476 while (checksum
!= xmitcsum
);
481 /* Send the packet in buffer. Returns 0 on failure, non-zero on
488 unsigned char checksum
;
492 /* $<packet info>#<checksum>. */
495 if (! putDebugChar('$'))
500 while (ch
=buffer
[count
])
502 if (! putDebugChar(ch
))
508 if (! putDebugChar('#')
509 || ! putDebugChar(hexchars
[checksum
>> 4])
510 || ! putDebugChar(hexchars
[checksum
% 16]))
513 ch
= getDebugChar ();
522 static char remcomInBuffer
[BUFMAX
];
523 static char remcomOutBuffer
[BUFMAX
];
527 debug_error (format
, parm
)
532 fprintf (stderr
, format
, parm
);
535 /* Address of a routine to RTE to if we get a memory fault. */
536 static volatile void (*mem_fault_routine
)() = NULL
;
538 /* Indicate to caller of mem2hex or hex2mem that there has been an
540 static volatile int mem_err
= 0;
548 /* These are separate functions so that they are so short and sweet
549 that the compiler won't save any registers (if there is a fault
550 to mem_fault, they won't get restored, so there better not be any
568 /* convert the memory pointed to by mem into hex, placing result in buf */
569 /* return a pointer to the last char put in buf (null) */
570 /* If MAY_FAULT is non-zero, then we should set mem_err in response to
571 a fault; if zero treat a fault like any other fault in the stub. */
574 mem2hex (mem
, buf
, count
, may_fault
)
584 mem_fault_routine
= set_mem_err
;
585 for (i
= 0; i
< count
; i
++)
587 ch
= get_char (mem
++);
588 if (may_fault
&& mem_err
)
590 *buf
++ = hexchars
[ch
>> 4];
591 *buf
++ = hexchars
[ch
% 16];
595 mem_fault_routine
= NULL
;
599 /* convert the hex array pointed to by buf into binary to be placed in mem */
600 /* return a pointer to the character AFTER the last byte written */
603 hex2mem (buf
, mem
, count
, may_fault
)
613 mem_fault_routine
= set_mem_err
;
614 for (i
=0;i
<count
;i
++)
616 ch
= hex(*buf
++) << 4;
617 ch
= ch
+ hex(*buf
++);
618 set_char (mem
++, ch
);
619 if (may_fault
&& mem_err
)
623 mem_fault_routine
= NULL
;
627 /* This function takes the 386 exception vector and attempts to
628 translate this number into a unix compatible signal value. */
631 computeSignal (exceptionVector
)
635 switch (exceptionVector
)
637 case 0 : sigval
= 8; break; /* divide by zero */
638 case 1 : sigval
= 5; break; /* debug exception */
639 case 3 : sigval
= 5; break; /* breakpoint */
640 case 4 : sigval
= 16; break; /* into instruction (overflow) */
641 case 5 : sigval
= 16; break; /* bound instruction */
642 case 6 : sigval
= 4; break; /* Invalid opcode */
643 case 7 : sigval
= 8; break; /* coprocessor not available */
644 case 8 : sigval
= 7; break; /* double fault */
645 case 9 : sigval
= 11; break; /* coprocessor segment overrun */
646 case 10 : sigval
= 11; break; /* Invalid TSS */
647 case 11 : sigval
= 11; break; /* Segment not present */
648 case 12 : sigval
= 11; break; /* stack exception */
649 case 13 : sigval
= 11; break; /* general protection */
650 case 14 : sigval
= 11; break; /* page fault */
651 case 16 : sigval
= 7; break; /* coprocessor error */
653 sigval
= 7; /* "software generated"*/
658 /**********************************************/
659 /* WHILE WE FIND NICE HEX CHARS, BUILD AN INT */
660 /* RETURN NUMBER OF CHARS PROCESSED */
661 /**********************************************/
663 hexToInt(ptr
, intValue
)
674 hexValue
= hex(**ptr
);
677 *intValue
= (*intValue
<<4) | hexValue
;
689 /* This function does all command processing for interfacing to gdb.
690 It is called whenever an exception occurs in the module being
694 handle_exception (T_StackFrame
*old_frame
)
696 T_TSS_StackFrame
*frame
= (T_TSS_StackFrame
*) old_frame
;
703 /* Apparently the bell can sometimes be ringing at this point, and
704 should be stopped. */
709 ConsolePrintf ("vector=%d: %s, sr=0x%x, pc=0x%x, thread=%d\r\n",
710 frame
->ExceptionNumber
,
711 frame
->ExceptionDescription
,
712 frame
->ExceptionSystemFlags
,
717 /* If the NLM just started, we record the module load information
718 and the thread ID, and set a breakpoint at the first instruction
720 if (frame
->ExceptionNumber
== START_NLM_EVENT
723 debugthread
= GetThreadID ();
724 handle
= (struct LoadDefinitionStructure
*) frame
->ExceptionErrorCode
;
725 first_insn
= *(char *) handle
->LDInitializationProcedure
;
726 *(unsigned char *) handle
->LDInitializationProcedure
= 0xcc;
727 return RETURN_TO_PROGRAM
;
730 /* At the moment, we don't care about most of the unusual NetWare
732 if (frame
->ExceptionNumber
!= TERMINATE_NLM_EVENT
733 && frame
->ExceptionNumber
> 31)
734 return RETURN_TO_PROGRAM
;
736 /* Reset the initial breakpoint if necessary. */
737 if (frame
->ExceptionNumber
== 3
738 && frame
->ExceptionEIP
== (LONG
) handle
->LDInitializationProcedure
+ 1
739 && *(unsigned char *) handle
->LDInitializationProcedure
== 0xcc)
741 *(char *) handle
->LDInitializationProcedure
= first_insn
;
742 frame
->ExceptionEIP
= (LONG
) handle
->LDInitializationProcedure
;
746 /* FIXME: How do we know that this exception has anything to do with
747 the program we are debugging? We can check whether the PC is in
748 the range of the module we are debugging, but that doesn't help
749 much since an error could occur in a library routine. */
751 frame_to_registers (frame
, registers
);
753 /* reply to host that an exception has occurred */
754 if (frame
->ExceptionNumber
== TERMINATE_NLM_EVENT
)
756 /* There is no way to get the exit status. */
757 remcomOutBuffer
[0] = 'W';
758 remcomOutBuffer
[1] = hexchars
[0];
759 remcomOutBuffer
[2] = hexchars
[0];
760 remcomOutBuffer
[3] = 0;
764 sigval
= computeSignal (frame
->ExceptionNumber
);
765 remcomOutBuffer
[0] = 'S';
766 remcomOutBuffer
[1] = hexchars
[sigval
>> 4];
767 remcomOutBuffer
[2] = hexchars
[sigval
% 16];
768 remcomOutBuffer
[3] = 0;
771 remcomOutBuffer
[0] = 'N';
772 sprintf (remcomOutBuffer
+ 3, "0x%x;0x%x;0x%x",
773 handle
->LDCodeImageOffset
,
774 handle
->LDDataImageOffset
,
775 handle
->LDDataImageOffset
+ handle
->LDDataImageLength
);
779 if (! putpacket(remcomOutBuffer
))
780 return RETURN_TO_NEXT_DEBUGGER
;
782 if (frame
->ExceptionNumber
== TERMINATE_NLM_EVENT
)
784 ResumeThread (mainthread
);
785 return RETURN_TO_PROGRAM
;
791 remcomOutBuffer
[0] = 0;
792 if (! getpacket (remcomInBuffer
))
793 return RETURN_TO_NEXT_DEBUGGER
;
795 switch (remcomInBuffer
[0])
798 sigval
= computeSignal (frame
->ExceptionNumber
);
799 remcomOutBuffer
[0] = 'S';
800 remcomOutBuffer
[1] = hexchars
[sigval
>> 4];
801 remcomOutBuffer
[2] = hexchars
[sigval
% 16];
802 remcomOutBuffer
[3] = 0;
805 remcomOutBuffer
[0] = 'N';
806 sprintf (remcomOutBuffer
+ 3, "0x%x;0x%x;0x%x",
807 handle
->LDCodeImageOffset
,
808 handle
->LDDataImageOffset
,
809 (handle
->LDDataImageOffset
810 + handle
->LDDataImageLength
));
814 remote_debug
= !(remote_debug
); /* toggle debug flag */
817 /* return the value of the CPU registers */
818 mem2hex((char*) registers
, remcomOutBuffer
, NUMREGBYTES
, 0);
821 /* set the value of the CPU registers - return OK */
822 hex2mem(&remcomInBuffer
[1], (char*) registers
, NUMREGBYTES
, 0);
823 strcpy(remcomOutBuffer
,"OK");
827 /* mAA..AA,LLLL Read LLLL bytes at address AA..AA */
828 /* TRY TO READ %x,%x. IF SUCCEED, SET PTR = 0 */
829 ptr
= &remcomInBuffer
[1];
830 if (hexToInt(&ptr
,&addr
))
832 if (hexToInt(&ptr
,&length
))
836 mem2hex((char*) addr
, remcomOutBuffer
, length
, 1);
839 strcpy (remcomOutBuffer
, "E03");
840 debug_error ("memory fault");
846 strcpy(remcomOutBuffer
,"E01");
847 debug_error("malformed read memory command: %s",remcomInBuffer
);
852 /* MAA..AA,LLLL: Write LLLL bytes at address AA.AA return OK */
853 /* TRY TO READ '%x,%x:'. IF SUCCEED, SET PTR = 0 */
854 ptr
= &remcomInBuffer
[1];
855 if (hexToInt(&ptr
,&addr
))
857 if (hexToInt(&ptr
,&length
))
861 hex2mem(ptr
, (char*) addr
, length
, 1);
865 strcpy (remcomOutBuffer
, "E03");
866 debug_error ("memory fault");
870 strcpy(remcomOutBuffer
,"OK");
877 strcpy(remcomOutBuffer
,"E02");
878 debug_error("malformed write memory command: %s",remcomInBuffer
);
884 /* cAA..AA Continue at address AA..AA(optional) */
885 /* sAA..AA Step one instruction from AA..AA(optional) */
886 /* try to read optional parameter, pc unchanged if no parm */
887 ptr
= &remcomInBuffer
[1];
888 if (hexToInt(&ptr
,&addr
))
889 registers
[ PC
] = addr
;
891 newPC
= registers
[ PC
];
893 /* clear the trace bit */
894 registers
[ PS
] &= 0xfffffeff;
896 /* set the trace bit if we're stepping */
897 if (remcomInBuffer
[0] == 's') registers
[ PS
] |= 0x100;
899 registers_to_frame (registers
, frame
);
900 return RETURN_TO_PROGRAM
;
903 /* kill the program */
905 ResumeThread (mainthread
);
906 return RETURN_TO_PROGRAM
;
909 /* reply to the request */
910 if (! putpacket(remcomOutBuffer
))
911 return RETURN_TO_NEXT_DEBUGGER
;
915 /* Start up. The main thread opens the named serial I/O port, loads
916 the named NLM module and then goes to sleep. The serial I/O port
917 is named as a board number and a port number. It would be more DOS
918 like to provide a menu of available serial ports, but I don't want
919 to have to figure out how to do that. */
926 int hardware
, board
, port
;
928 struct debuggerStructure s
;
932 /* Create a screen for the debugger. */
933 console_screen
= CreateScreen ("System Console", 0);
934 if (DisplayScreen (console_screen
) != ESUCCESS
)
935 fprintf (stderr
, "DisplayScreen failed\n");
940 "Usage: load gdbserver board port program [arguments]\n");
945 board
= strtol (argv
[1], (char **) NULL
, 0);
946 port
= strtol (argv
[2], (char **) NULL
, 0);
948 err
= AIOAcquirePort (&hardware
, &board
, &port
, &AIOhandle
);
949 if (err
!= AIO_SUCCESS
)
953 case AIO_PORT_NOT_AVAILABLE
:
954 fprintf (stderr
, "Port not available\n");
957 case AIO_BOARD_NUMBER_INVALID
:
958 case AIO_PORT_NUMBER_INVALID
:
959 fprintf (stderr
, "No such port\n");
963 fprintf (stderr
, "Could not open port: %d\n", err
);
970 err
= AIOConfigurePort (AIOhandle
, AIO_BAUD_9600
, AIO_DATA_BITS_8
,
971 AIO_STOP_BITS_1
, AIO_PARITY_NONE
,
972 AIO_HARDWARE_FLOW_CONTROL_OFF
);
973 if (err
!= AIO_SUCCESS
)
975 fprintf (stderr
, "Could not configure port: %d\n", err
);
976 AIOReleasePort (AIOhandle
);
980 /* Register ourselves as an alternate debugger. */
981 memset (&s
, 0, sizeof s
);
982 s
.DDSResourceTag
= ((struct ResourceTagStructure
*)
983 AllocateResourceTag (GetNLMHandle (),
986 if (s
.DDSResourceTag
== 0)
988 fprintf (stderr
, "AllocateResourceTag failed\n");
989 AIOReleasePort (AIOhandle
);
992 s
.DDSdebuggerEntry
= handle_exception
;
993 s
.DDSFlags
= TSS_FRAME_BIT
;
995 err
= RegisterDebuggerRTag (&s
, AT_FIRST
);
998 fprintf (stderr
, "RegisterDebuggerRTag failed\n");
999 AIOReleasePort (AIOhandle
);
1003 /* Get the command line we were invoked with, and advance it past
1004 our name and the board and port arguments. */
1005 cmdlin
= getcmd ((char *) NULL
);
1006 for (i
= 0; i
< 2; i
++)
1008 while (! isspace (*cmdlin
))
1010 while (isspace (*cmdlin
))
1014 /* In case GDB is started before us, ack any packets (presumably
1015 "$?#xx") sitting there. */
1016 if (! putDebugChar ('+'))
1018 fprintf (stderr
, "putDebugChar failed\n");
1019 UnRegisterDebugger (&s
);
1020 AIOReleasePort (AIOhandle
);
1024 mainthread
= GetThreadID ();
1028 if (remote_debug
> 0)
1029 ConsolePrintf ("About to call LoadModule with \"%s\" %d %d\r\n",
1030 cmdlin
, console_screen
, __GetScreenID (console_screen
));
1032 /* Start up the module to be debugged. */
1033 err
= LoadModule ((struct ScreenStruct
*) __GetScreenID (console_screen
),
1037 fprintf (stderr
, "LoadModule failed: %d\n", err
);
1038 UnRegisterDebugger (&s
);
1039 AIOReleasePort (AIOhandle
);
1043 /* By the time we reach this point in the code the debugger thread
1044 should have received a START_NLM_EVENT and gone to sleep. */
1045 if (remote_debug
> 0)
1046 ConsolePrintf ("Resuming %d, suspending %d\r\n", debugthread
, mainthread
);
1047 ResumeThread (debugthread
);
1048 SuspendThread (mainthread
);
1050 /* If we are woken up, print an optional error message, deregister
1051 ourselves and exit. */
1052 if (error_message
!= NULL
)
1053 fprintf (stderr
, "%s\n", error_message
);
1054 UnRegisterDebugger (&s
);
1055 AIOReleasePort (AIOhandle
);