mirror of
https://sourceware.org/git/binutils-gdb.git
synced 2024-11-27 03:51:15 +08:00
151e7820c7
window.
2095 lines
54 KiB
C
2095 lines
54 KiB
C
/* Remote debugging interface for boot monitors, for GDB.
|
|
Copyright 1990, 1991, 1992, 1993 Free Software Foundation, Inc.
|
|
Contributed by Cygnus Support. Written by Rob Savoye for Cygnus.
|
|
|
|
This file is part of GDB.
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
|
|
|
|
/* This file was derived from various remote-* modules. It is a collection
|
|
of generic support functions so GDB can talk directly to a ROM based
|
|
monitor. This saves use from having to hack an exception based handler
|
|
into existance, and makes for quick porting.
|
|
|
|
This module talks to a debug monitor called 'MONITOR', which
|
|
We communicate with MONITOR via either a direct serial line, or a TCP
|
|
(or possibly TELNET) stream to a terminal multiplexor,
|
|
which in turn talks to the target board.
|
|
*/
|
|
|
|
#include "defs.h"
|
|
#include "gdbcore.h"
|
|
#include "target.h"
|
|
#include "wait.h"
|
|
#include <varargs.h>
|
|
#include <signal.h>
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
#include "command.h"
|
|
#include "serial.h"
|
|
#include "monitor.h"
|
|
#include "remote-utils.h"
|
|
|
|
#if !defined (HAVE_TERMIOS) && !defined (HAVE_TERMIO) && !defined (HAVE_SGTTY)
|
|
#define HAVE_SGTTY
|
|
#endif
|
|
|
|
#ifdef HAVE_TERMIOS
|
|
#include <termio.h>
|
|
#include <termios.h>
|
|
# define TERMINAL struct termios
|
|
#else
|
|
#include <fcntl.h>
|
|
# define TERMINAL struct sgttyb
|
|
#endif
|
|
#include "terminal.h"
|
|
#ifndef CSTOPB
|
|
#define CSTOPB 0x00000040
|
|
#endif
|
|
|
|
static const char hexchars[]="0123456789abcdef";
|
|
static char *hex2mem();
|
|
|
|
#define SWAP_TARGET_AND_HOST(buffer,len) \
|
|
do \
|
|
{ \
|
|
if (TARGET_BYTE_ORDER != HOST_BYTE_ORDER) \
|
|
{ \
|
|
char tmp; \
|
|
char *p = (char *)(buffer); \
|
|
char *q = ((char *)(buffer)) + len - 1; \
|
|
for (; p < q; p++, q--) \
|
|
{ \
|
|
tmp = *q; \
|
|
*q = *p; \
|
|
*p = tmp; \
|
|
} \
|
|
} \
|
|
} \
|
|
while (0)
|
|
|
|
static void make_xmodem_packet();
|
|
static void print_xmodem_packet();
|
|
static void make_gdb_packet();
|
|
static unsigned long ascii2hexword();
|
|
static char *hexword2ascii();
|
|
static int tohex();
|
|
static int to_hex();
|
|
static int from_hex();
|
|
|
|
struct monitor_ops *current_monitor;
|
|
extern struct cmd_list_element *setlist;
|
|
extern struct cmd_list_element *unsetlist;
|
|
struct cmd_list_element *showlist;
|
|
extern char *version;
|
|
extern char *host_name;
|
|
extern char *target_name;
|
|
|
|
static int hashmark; /* flag set by "set hash" */
|
|
|
|
#define LOG_FILE "monitor.log"
|
|
#if defined (LOG_FILE)
|
|
FILE *log_file;
|
|
#endif
|
|
|
|
static int timeout = 30;
|
|
/* Having this larger than 400 causes us to be incompatible with m68k-stub.c
|
|
and i386-stub.c. Normally, no one would notice because it only matters
|
|
for writing large chunks of memory (e.g. in downloads). Also, this needs
|
|
to be more than 400 if required to hold the registers (see below, where
|
|
we round it up based on REGISTER_BYTES). */
|
|
#define PBUFSIZ 400
|
|
|
|
/*
|
|
* Descriptor for I/O to remote machine. Initialize it to NULL so that
|
|
* monitor_open knows that we don't have a file open when the program starts.
|
|
*/
|
|
serial_t monitor_desc = NULL;
|
|
|
|
/* sets the download protocol, choices are srec, generic, boot */
|
|
char *loadtype;
|
|
static char *loadtype_str;
|
|
static char *loadproto_str;
|
|
static void set_loadtype_command();
|
|
static void set_loadproto_command();
|
|
static void monitor_load_srec();
|
|
static int monitor_write_srec();
|
|
|
|
/*
|
|
* these definitions are for xmodem protocol
|
|
*/
|
|
#define SOH 0x01
|
|
#define ACK 0x06
|
|
#define NAK 0x15
|
|
#define EOT 0x04
|
|
#define CANCEL 0x18
|
|
#define GETACK getacknak(ACK)
|
|
#define GETNAK getacknak(NAK)
|
|
#define XMODEM_DATASIZE 128 /* the data size is ALWAYS 128 */
|
|
#define XMODEM_PACKETSIZE 131 /* the packet size is ALWAYS 132 (zero based) */
|
|
#define XMODEM 1
|
|
|
|
/*
|
|
* set_loadtype_command -- set the type for downloading. Check to make
|
|
* sure you have a support protocol for this target.
|
|
*/
|
|
static void
|
|
set_loadtype_command (ignore, from_tty, c)
|
|
char *ignore;
|
|
int from_tty;
|
|
struct cmd_list_element *c;
|
|
{
|
|
char *tmp;
|
|
char *type;
|
|
|
|
if (current_monitor == 0x0)
|
|
return;
|
|
|
|
if (STREQ (LOADTYPES, "")) {
|
|
error ("No loadtype set");
|
|
return;
|
|
}
|
|
|
|
tmp = savestring (LOADTYPES, strlen(LOADTYPES));
|
|
type = strtok(tmp, ",");
|
|
if (STREQ (type, (*(char **) c->var))) {
|
|
loadtype_str = savestring (*(char **) c->var, strlen (*(char **) c->var));
|
|
return;
|
|
}
|
|
|
|
while ((type = strtok (NULL, ",")) != (char *)NULL) {
|
|
if (STREQ (type, (*(char **) c->var)))
|
|
loadtype_str = savestring (*(char **) c->var, strlen (*(char **) c->var));
|
|
return;
|
|
}
|
|
free (tmp);
|
|
error ("Loadtype \"%s\" does not exist.", (*(char **) c->var));
|
|
}
|
|
/*
|
|
* set_loadproto_command -- set the protocol for downloading. Check to make
|
|
* sure you have a supported protocol for this target.
|
|
*/
|
|
static void
|
|
set_loadproto_command (ignore, from_tty, c)
|
|
char *ignore;
|
|
int from_tty;
|
|
struct cmd_list_element *c;
|
|
{
|
|
char *tmp;
|
|
char *type;
|
|
|
|
if (current_monitor == 0x0)
|
|
return;
|
|
|
|
if (STREQ (LOADPROTOS, "")) {
|
|
error ("No load protocols set");
|
|
return;
|
|
}
|
|
|
|
tmp = savestring (LOADPROTOS, strlen(LOADPROTOS));
|
|
type = strtok(tmp, ",");
|
|
if (STREQ (type, (*(char **) c->var))) {
|
|
loadproto_str = savestring (*(char **) c->var, strlen (*(char **) c->var));
|
|
return;
|
|
}
|
|
|
|
while ((type = strtok (NULL, ",")) != (char *)NULL) {
|
|
if (STREQ (type, (*(char **) c->var)))
|
|
loadproto_str = savestring (*(char **) c->var, strlen (*(char **) c->var));
|
|
return;
|
|
}
|
|
free (tmp);
|
|
error ("Load protocol \"%s\" does not exist.", (*(char **) c->var));
|
|
}
|
|
|
|
/*
|
|
* printf_monitor -- send data to monitor. Works just like printf.
|
|
*/
|
|
static void
|
|
printf_monitor(va_alist)
|
|
va_dcl
|
|
{
|
|
va_list args;
|
|
char *pattern;
|
|
char buf[PBUFSIZ];
|
|
int i;
|
|
|
|
va_start(args);
|
|
|
|
pattern = va_arg(args, char *);
|
|
|
|
vsprintf(buf, pattern, args);
|
|
|
|
debuglogs (1, "printf_monitor(), Sending: \"%s\".", buf);
|
|
|
|
if (strlen(buf) > PBUFSIZ)
|
|
error ("printf_monitor(): string too long");
|
|
if (SERIAL_WRITE(monitor_desc, buf, strlen(buf)))
|
|
fprintf(stderr, "SERIAL_WRITE failed: %s\n", safe_strerror(errno));
|
|
}
|
|
/*
|
|
* write_monitor -- send raw data to monitor.
|
|
*/
|
|
static void
|
|
write_monitor(data, len)
|
|
char data[];
|
|
int len;
|
|
{
|
|
if (SERIAL_WRITE(monitor_desc, data, len))
|
|
fprintf(stderr, "SERIAL_WRITE failed: %s\n", safe_strerror(errno));
|
|
|
|
*(data + len+1) = '\0';
|
|
debuglogs (1, "write_monitor(), Sending: \"%s\".", data);
|
|
|
|
}
|
|
|
|
/*
|
|
* debuglogs -- deal with debugging info to multiple sources. This takes
|
|
* two real args, the first one is the level to be compared against
|
|
* the sr_get_debug() value, the second arg is a printf buffer and args
|
|
* to be formatted and printed. A CR is added after each string is printed.
|
|
*/
|
|
void
|
|
debuglogs(va_alist)
|
|
va_dcl
|
|
{
|
|
va_list args;
|
|
char *pattern, *p;
|
|
unsigned char buf[PBUFSIZ];
|
|
char newbuf[PBUFSIZ];
|
|
int level, i;
|
|
|
|
va_start(args);
|
|
|
|
level = va_arg(args, int); /* get the debug level */
|
|
if ((level <0) || (level > 100)) {
|
|
error ("Bad argument passed to debuglogs(), needs debug level");
|
|
return;
|
|
}
|
|
|
|
pattern = va_arg(args, char *); /* get the printf style pattern */
|
|
|
|
vsprintf(buf, pattern, args); /* format the string */
|
|
|
|
/* convert some characters so it'll look right in the log */
|
|
p = newbuf;
|
|
for (i = 0 ; buf[i] != '\0'; i++) {
|
|
if (i > PBUFSIZ)
|
|
error ("Debug message too long");
|
|
switch (buf[i]) {
|
|
case '\n': /* newlines */
|
|
*p++ = '\\';
|
|
*p++ = 'n';
|
|
continue;
|
|
case '\r': /* carriage returns */
|
|
*p++ = '\\';
|
|
*p++ = 'r';
|
|
continue;
|
|
case '\033': /* escape */
|
|
*p++ = '\\';
|
|
*p++ = 'e';
|
|
continue;
|
|
case '\t': /* tab */
|
|
*p++ = '\\';
|
|
*p++ = 't';
|
|
continue;
|
|
case '\b': /* backspace */
|
|
*p++ = '\\';
|
|
*p++ = 'b';
|
|
continue;
|
|
default: /* no change */
|
|
*p++ = buf[i];
|
|
}
|
|
|
|
if (buf[i] < 26) { /* modify control characters */
|
|
*p++ = '^';
|
|
*p++ = buf[i] + 'A';
|
|
continue;
|
|
}
|
|
if (buf[i] >= 128) { /* modify control characters */
|
|
*p++ = '!';
|
|
*p++ = buf[i] + 'A';
|
|
continue;
|
|
}
|
|
}
|
|
*p = '\0'; /* terminate the string */
|
|
|
|
if (sr_get_debug() > level)
|
|
printf_unfiltered ("%s\n", newbuf);
|
|
|
|
#ifdef LOG_FILE /* write to the monitor log */
|
|
if (log_file != 0x0) {
|
|
fputs (newbuf, log_file);
|
|
fputc ('\n', log_file);
|
|
fflush (log_file);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
/* readchar -- read a character from the remote system, doing all the fancy
|
|
* timeout stuff.
|
|
*/
|
|
static int
|
|
readchar(timeout)
|
|
int timeout;
|
|
{
|
|
int c;
|
|
|
|
c = SERIAL_READCHAR(monitor_desc, timeout);
|
|
|
|
if (sr_get_debug() > 5) {
|
|
putchar(c & 0x7f);
|
|
debuglogs (5, "readchar: timeout = %d\n", timeout);
|
|
}
|
|
|
|
#ifdef LOG_FILE
|
|
if (isascii (c))
|
|
putc(c & 0x7f, log_file);
|
|
#endif
|
|
|
|
if (c >= 0)
|
|
return c & 0x7f;
|
|
|
|
if (c == SERIAL_TIMEOUT) {
|
|
if (timeout == 0)
|
|
return c; /* Polls shouldn't generate timeout errors */
|
|
error("Timeout reading from remote system.");
|
|
#ifdef LOG_FILE
|
|
fputs ("ERROR: Timeout reading from remote system", log_file);
|
|
#endif
|
|
}
|
|
perror_with_name("remote-monitor");
|
|
}
|
|
|
|
/*
|
|
* expect -- scan input from the remote system, until STRING is found.
|
|
* If DISCARD is non-zero, then discard non-matching input, else print
|
|
* it out. Let the user break out immediately.
|
|
*/
|
|
static void
|
|
expect (string, discard)
|
|
char *string;
|
|
int discard;
|
|
{
|
|
char *p = string;
|
|
int c;
|
|
|
|
|
|
debuglogs (1, "Expecting \"%s\".", string);
|
|
|
|
immediate_quit = 1;
|
|
while (1) {
|
|
c = readchar(timeout);
|
|
if (!isascii (c))
|
|
continue;
|
|
if (c == *p++) {
|
|
if (*p == '\0') {
|
|
immediate_quit = 0;
|
|
debuglogs (4, "Matched");
|
|
return;
|
|
}
|
|
} else {
|
|
if (!discard) {
|
|
putc_unfiltered (c);
|
|
#if 0
|
|
fwrite(string, 1, (p - 1) - string, stdout);
|
|
putchar((char)c);
|
|
fflush(stdout);
|
|
#endif
|
|
}
|
|
p = string;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Keep discarding input until we see the MONITOR prompt.
|
|
|
|
The convention for dealing with the prompt is that you
|
|
o give your command
|
|
o *then* wait for the prompt.
|
|
|
|
Thus the last thing that a procedure does with the serial line
|
|
will be an expect_prompt(). Exception: monitor_resume does not
|
|
wait for the prompt, because the terminal is being handed over
|
|
to the inferior. However, the next thing which happens after that
|
|
is a monitor_wait which does wait for the prompt.
|
|
Note that this includes abnormal exit, e.g. error(). This is
|
|
necessary to prevent getting into states from which we can't
|
|
recover. */
|
|
static void
|
|
expect_prompt(discard)
|
|
int discard;
|
|
{
|
|
expect (PROMPT, discard);
|
|
}
|
|
|
|
/*
|
|
* junk -- ignore junk characters. Returns a 1 if junk, 0 otherwise
|
|
*/
|
|
static int
|
|
junk(ch)
|
|
char ch;
|
|
{
|
|
switch (ch) {
|
|
case '\0':
|
|
case ' ':
|
|
case '-':
|
|
case '\t':
|
|
case '\r':
|
|
case '\n':
|
|
if (sr_get_debug() > 5)
|
|
debuglogs (5, "Ignoring \'%c\'.", ch);
|
|
return 1;
|
|
default:
|
|
if (sr_get_debug() > 5)
|
|
debuglogs (5, "Accepting \'%c\'.", ch);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* get_hex_digit -- Get a hex digit from the remote system & return its value.
|
|
* If ignore is nonzero, ignore spaces, newline & tabs.
|
|
*/
|
|
static int
|
|
get_hex_digit(ignore)
|
|
int ignore;
|
|
{
|
|
static int ch;
|
|
while (1) {
|
|
ch = readchar(timeout);
|
|
if (junk(ch))
|
|
continue;
|
|
if (sr_get_debug() > 4) {
|
|
debuglogs (4, "get_hex_digit() got a 0x%x(%c)", ch, ch);
|
|
} else {
|
|
#ifdef LOG_FILE /* write to the monitor log */
|
|
if (log_file != 0x0) {
|
|
fputs ("get_hex_digit() got a 0x", log_file);
|
|
fputc (ch, log_file);
|
|
fputc ('\n', log_file);
|
|
fflush (log_file);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
if (ch >= '0' && ch <= '9')
|
|
return ch - '0';
|
|
else if (ch >= 'A' && ch <= 'F')
|
|
return ch - 'A' + 10;
|
|
else if (ch >= 'a' && ch <= 'f')
|
|
return ch - 'a' + 10;
|
|
else if (ch == ' ' && ignore)
|
|
;
|
|
else {
|
|
expect_prompt(1);
|
|
debuglogs (4, "Invalid hex digit from remote system. (0x%x)", ch);
|
|
error("Invalid hex digit from remote system. (0x%x)", ch);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* get_hex_byte -- Get a byte from monitor and put it in *BYT.
|
|
* Accept any number leading spaces.
|
|
*/
|
|
static void
|
|
get_hex_byte (byt)
|
|
char *byt;
|
|
{
|
|
int val;
|
|
|
|
val = get_hex_digit (1) << 4;
|
|
debuglogs (4, "get_hex_byte() -- Read first nibble 0x%x", val);
|
|
|
|
val |= get_hex_digit (0);
|
|
debuglogs (4, "get_hex_byte() -- Read second nibble 0x%x", val);
|
|
*byt = val;
|
|
|
|
debuglogs (4, "get_hex_byte() -- Read a 0x%x", val);
|
|
}
|
|
|
|
/*
|
|
* get_hex_word -- Get N 32-bit words from remote, each preceded by a space,
|
|
* and put them in registers starting at REGNO.
|
|
*/
|
|
static int
|
|
get_hex_word ()
|
|
{
|
|
long val, newval;
|
|
int i;
|
|
|
|
val = 0;
|
|
|
|
#if 0
|
|
if (HOST_BYTE_ORDER == BIG_ENDIAN) {
|
|
#endif
|
|
for (i = 0; i < 8; i++)
|
|
val = (val << 4) + get_hex_digit (i == 0);
|
|
#if 0
|
|
} else {
|
|
for (i = 7; i >= 0; i--)
|
|
val = (val << 4) + get_hex_digit (i == 0);
|
|
}
|
|
#endif
|
|
|
|
debuglogs (4, "get_hex_word() got a 0x%x for a %s host.", val, (HOST_BYTE_ORDER == BIG_ENDIAN) ? "big endian" : "little endian");
|
|
|
|
return val;
|
|
}
|
|
|
|
/* This is called not only when we first attach, but also when the
|
|
user types "run" after having attached. */
|
|
void
|
|
monitor_create_inferior (execfile, args, env)
|
|
char *execfile;
|
|
char *args;
|
|
char **env;
|
|
{
|
|
int entry_pt;
|
|
|
|
if (args && *args)
|
|
error("Can't pass arguments to remote MONITOR process");
|
|
|
|
if (execfile == 0 || exec_bfd == 0)
|
|
error("No exec file specified");
|
|
|
|
entry_pt = (int) bfd_get_start_address (exec_bfd);
|
|
|
|
/* The "process" (board) is already stopped awaiting our commands, and
|
|
the program is already downloaded. We just set its PC and go. */
|
|
|
|
clear_proceed_status ();
|
|
|
|
/* Tell wait_for_inferior that we've started a new process. */
|
|
init_wait_for_inferior ();
|
|
|
|
/* Set up the "saved terminal modes" of the inferior
|
|
based on what modes we are starting it with. */
|
|
target_terminal_init ();
|
|
|
|
/* Install inferior's terminal modes. */
|
|
target_terminal_inferior ();
|
|
|
|
/* insert_step_breakpoint (); FIXME, do we need this? */
|
|
|
|
/* Let 'er rip... */
|
|
proceed ((CORE_ADDR)entry_pt, TARGET_SIGNAL_DEFAULT, 0);
|
|
}
|
|
|
|
/*
|
|
* monitor_open -- open a connection to a remote debugger.
|
|
* NAME is the filename used for communication.
|
|
*/
|
|
static int baudrate = 9600;
|
|
static char dev_name[100];
|
|
|
|
void
|
|
monitor_open(args, name, from_tty)
|
|
char *args;
|
|
char *name;
|
|
int from_tty;
|
|
{
|
|
TERMINAL *temptempio;
|
|
|
|
if (args == NULL)
|
|
error ("Use `target %s DEVICE-NAME' to use a serial port, or \n\
|
|
`target %s HOST-NAME:PORT-NUMBER' to use a network connection.", name, name);
|
|
|
|
/* if (is_open) */
|
|
monitor_close(0);
|
|
|
|
strcpy(dev_name, args);
|
|
monitor_desc = SERIAL_OPEN(dev_name);
|
|
|
|
if (monitor_desc == NULL)
|
|
perror_with_name(dev_name);
|
|
|
|
if (baud_rate != -1) {
|
|
if (SERIAL_SETBAUDRATE (monitor_desc, baud_rate)) {
|
|
SERIAL_CLOSE (monitor_desc);
|
|
perror_with_name (name);
|
|
}
|
|
}
|
|
|
|
SERIAL_RAW(monitor_desc);
|
|
|
|
/* some systems only work with 2 stop bits */
|
|
#if !defined(__GO32__) && !defined(GDB_TARGET_IS_PA_ELF)
|
|
if (STOPBITS == 2) {
|
|
if (!strchr (dev_name, ':')) { /* don't set for a tcp connection */
|
|
temptempio = (TERMINAL *)SERIAL_GET_TTY_STATE(monitor_desc);
|
|
#ifdef HAVE_SGTTY
|
|
temptempio->sg_cflag |= baud_rate | CSTOPB;
|
|
#else
|
|
temptempio->c_cflag |= baud_rate | CSTOPB;
|
|
#endif
|
|
SERIAL_SET_TTY_STATE(monitor_desc, temptempio);
|
|
debuglogs (4, "Set serial port to 2 stop bits");
|
|
}
|
|
}
|
|
#endif /* __GO32__ */
|
|
|
|
#if defined (LOG_FILE)
|
|
log_file = fopen (LOG_FILE, "w");
|
|
if (log_file == NULL)
|
|
perror_with_name (LOG_FILE);
|
|
fprintf_filtered (log_file, "GDB %s (%s", version, host_name);
|
|
fprintf_filtered (log_file, " --target %s)\n", target_name);
|
|
fprintf_filtered (log_file, "Remote target %s connected to %s\n\n", TARGET_NAME, dev_name);
|
|
#endif
|
|
|
|
/* see if the target is alive. For a ROM monitor, we can just try to force the
|
|
prompt to print a few times. FOr the GDB remote protocol, the application
|
|
being debugged is sitting at a breakpoint and waiting for GDB to initialize
|
|
the connection. We force it to give us an empty packet to see if it's alive.
|
|
*/
|
|
if (GDBPROTO) {
|
|
debuglogs (3, "Trying to ACK the target's debug stub");
|
|
printf_monitor (INIT_CMD); /* ask for the last signal */
|
|
expect ("$S05#b8",0); /* look for a response */
|
|
printf_monitor ("+"); /* ask for the last signal */
|
|
expect_prompt(1); /* See if we get a prompt */
|
|
} else {
|
|
/* wake up the monitor and see if it's alive */
|
|
printf_monitor(INIT_CMD);
|
|
expect_prompt(1); /* See if we get a prompt */
|
|
|
|
/* try again to be sure */
|
|
printf_monitor(INIT_CMD);
|
|
expect_prompt(1); /* See if we get a prompt */
|
|
}
|
|
|
|
if (from_tty)
|
|
printf("Remote target %s connected to %s\n", TARGET_NAME, dev_name);
|
|
}
|
|
|
|
/*
|
|
* monitor_close -- Close out all files and local state before this
|
|
* target loses control.
|
|
*/
|
|
|
|
void
|
|
monitor_close (quitting)
|
|
int quitting;
|
|
{
|
|
SERIAL_CLOSE(monitor_desc);
|
|
monitor_desc = NULL;
|
|
|
|
debuglogs (1, "monitor_close (quitting=%d)", quitting);
|
|
|
|
#if defined (LOG_FILE)
|
|
if (log_file) {
|
|
if (ferror(log_file))
|
|
fprintf(stderr, "Error writing log file.\n");
|
|
if (fclose(log_file) != 0)
|
|
fprintf(stderr, "Error closing log file.\n");
|
|
}
|
|
#endif
|
|
}
|
|
|
|
/*
|
|
* monitor_detach -- terminate the open connection to the remote
|
|
* debugger. Use this when you want to detach and do something
|
|
* else with your gdb.
|
|
*/
|
|
void
|
|
monitor_detach (from_tty)
|
|
int from_tty;
|
|
{
|
|
|
|
debuglogs (1, "monitor_detach ()");
|
|
|
|
pop_target(); /* calls monitor_close to do the real work */
|
|
if (from_tty)
|
|
printf ("Ending remote %s debugging\n", target_shortname);
|
|
}
|
|
|
|
/*
|
|
* monitor_attach -- attach GDB to the target.
|
|
*/
|
|
void
|
|
monitor_attach (args, from_tty)
|
|
char *args;
|
|
int from_tty;
|
|
{
|
|
if (from_tty)
|
|
printf ("Starting remote %s debugging\n", target_shortname);
|
|
|
|
debuglogs (1, "monitor_attach (args=%s)", args);
|
|
|
|
printf_monitor (GO_CMD);
|
|
/* swallow the echo. */
|
|
expect (GO_CMD, 1);
|
|
}
|
|
|
|
/*
|
|
* monitor_resume -- Tell the remote machine to resume.
|
|
*/
|
|
void
|
|
monitor_resume (pid, step, sig)
|
|
int pid, step;
|
|
enum target_signal sig;
|
|
{
|
|
debuglogs (1, "monitor_resume (step=%d, sig=%d)", step, sig);
|
|
|
|
if (step) {
|
|
printf_monitor (STEP_CMD);
|
|
} else {
|
|
printf_monitor (CONT_CMD);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* monitor_wait -- Wait until the remote machine stops, then return,
|
|
* storing status in status just as `wait' would.
|
|
*/
|
|
int
|
|
monitor_wait (pid, status)
|
|
int pid;
|
|
struct target_waitstatus *status;
|
|
{
|
|
int old_timeout = timeout;
|
|
|
|
debuglogs(1, "monitor_wait (), printing extraneous text.");
|
|
|
|
status->kind = TARGET_WAITKIND_EXITED;
|
|
status->value.integer = 0;
|
|
|
|
timeout = 0; /* Don't time out -- user program is running. */
|
|
|
|
expect_prompt(0); /* Wait for prompt, outputting extraneous text */
|
|
debuglogs (4, "monitor_wait(), got the prompt.");
|
|
|
|
status->kind = TARGET_WAITKIND_STOPPED;
|
|
status->value.sig = TARGET_SIGNAL_TRAP;
|
|
|
|
|
|
|
|
timeout = old_timeout;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Return the name of register number regno in the form input and output by
|
|
monitor. Currently, register_names just happens to contain exactly what
|
|
monitor wants. Lets take advantage of that just as long as possible! */
|
|
|
|
static char *
|
|
get_reg_name (regno)
|
|
int regno;
|
|
{
|
|
static char buf[50];
|
|
const char *p;
|
|
char *b;
|
|
|
|
b = buf;
|
|
|
|
if (regno < 0)
|
|
return ("");
|
|
|
|
for (p = REGNAMES(regno); *p; p++)
|
|
*b++ = tolower(*p);
|
|
|
|
*b = '\000';
|
|
|
|
debuglogs (5, "Got name \"%s\" from regno #%d.", buf, regno);
|
|
|
|
return buf;
|
|
}
|
|
|
|
/*
|
|
* monitor_fetch_registers -- read the remote registers into the
|
|
* block regs.
|
|
*/
|
|
void
|
|
monitor_fetch_registers (ignored)
|
|
int ignored;
|
|
{
|
|
int regno, i;
|
|
char *p;
|
|
unsigned char packet[PBUFSIZ];
|
|
char regs[REGISTER_BYTES];
|
|
|
|
debuglogs (1, "monitor_fetch_registers (ignored=%d)\n", ignored);
|
|
|
|
memset (packet, 0, PBUFSIZ);
|
|
if (GDBPROTO) {
|
|
/* Unimplemented registers read as all bits zero. */
|
|
memset (regs, 0, REGISTER_BYTES);
|
|
make_gdb_packet (packet, "g");
|
|
if (monitor_send_packet (packet) == 0)
|
|
error ("Couldn't transmit packet\n");
|
|
if (monitor_get_packet (packet) == 0)
|
|
error ("Couldn't receive packet\n");
|
|
/* FIXME: read bytes from packet */
|
|
debuglogs (4, "monitor_fetch_registers: Got a \"%s\" back\n", packet);
|
|
for (regno = 0; regno <= PC_REGNUM+4; regno++) {
|
|
/* supply register stores in target byte order, so swap here */
|
|
/* FIXME: convert from ASCII hex to raw bytes */
|
|
i = ascii2hexword (packet + (regno * 8));
|
|
debuglogs (5, "Adding register %d = %x\n", regno, i);
|
|
SWAP_TARGET_AND_HOST (&i, 4);
|
|
supply_register (regno, (char *)&i);
|
|
}
|
|
} else {
|
|
for (regno = 0; regno <= PC_REGNUM; regno++)
|
|
monitor_fetch_register(regno);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* monitor_fetch_register -- fetch register REGNO, or all registers if REGNO
|
|
* is -1. Returns errno value.
|
|
*/
|
|
void
|
|
monitor_fetch_register (regno)
|
|
int regno;
|
|
{
|
|
int newval, val, j;
|
|
|
|
debuglogs (1, "monitor_fetch_register (reg=%s)", get_reg_name (regno));
|
|
|
|
if (regno < 0) {
|
|
monitor_fetch_registers ();
|
|
} else {
|
|
char *name = get_reg_name (regno);
|
|
if (STREQ(name, ""))
|
|
return;
|
|
printf_monitor (ROMCMD(GET_REG), name); /* send the command */
|
|
expect (name, 1); /* then strip the leading garbage */
|
|
if (*ROMDELIM(GET_REG) != 0) { /* if there's a delimiter */
|
|
expect (ROMDELIM(GET_REG), 1);
|
|
}
|
|
|
|
val = get_hex_word(); /* get the value, ignore junk */
|
|
|
|
|
|
/* supply register stores in target byte order, so swap here */
|
|
SWAP_TARGET_AND_HOST (&val, 4);
|
|
supply_register (regno, (char *) &val);
|
|
|
|
if (*ROMDELIM(GET_REG) != 0) {
|
|
/*** expect (ROMRES(GET_REG)); ***/
|
|
printf_monitor (CMD_END);
|
|
}
|
|
expect_prompt (1);
|
|
}
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* monitor_store_registers - store the remote registers.
|
|
*/
|
|
void
|
|
monitor_store_registers (ignored)
|
|
int ignored;
|
|
{
|
|
int regno;
|
|
unsigned long i;
|
|
char packet[PBUFSIZ];
|
|
char buf[PBUFSIZ];
|
|
char num[9];
|
|
|
|
debuglogs (1, "monitor_store_registers()");
|
|
|
|
if (GDBPROTO) {
|
|
memset (packet, 0, PBUFSIZ);
|
|
memset (buf, 0, PBUFSIZ);
|
|
buf[0] = 'G';
|
|
|
|
/* Unimplemented registers read as all bits zero. */
|
|
/* FIXME: read bytes from packet */
|
|
for (regno = 0; regno < 41; regno++) { /* FIXME */
|
|
/* supply register stores in target byte order, so swap here */
|
|
/* FIXME: convert from ASCII hex to raw bytes */
|
|
i = (unsigned long)read_register (regno);
|
|
#if 0
|
|
SWAP_TARGET_AND_HOST (&i, 4);
|
|
#endif
|
|
hexword2ascii (num, i);
|
|
strcpy (buf+(regno * 8)+1, num);
|
|
}
|
|
*(buf + (regno * 8) + 2) = 0;
|
|
make_gdb_packet (packet, buf);
|
|
if (monitor_send_packet (packet) == 0)
|
|
error ("Couldn't transmit packet\n");
|
|
if (monitor_get_packet (packet) == 0)
|
|
error ("Couldn't receive packet\n");
|
|
} else {
|
|
for (regno = 0; regno <= PC_REGNUM; regno++)
|
|
monitor_store_register(regno);
|
|
}
|
|
|
|
registers_changed ();
|
|
}
|
|
|
|
/*
|
|
* monitor_store_register -- store register REGNO, or all if REGNO == 0.
|
|
* return errno value.
|
|
*/
|
|
void
|
|
monitor_store_register (regno)
|
|
int regno;
|
|
{
|
|
char *name;
|
|
int i;
|
|
|
|
i = read_register(regno);
|
|
|
|
debuglogs (1, "monitor_store_register (regno=%d)", regno);
|
|
|
|
if (regno < 0)
|
|
monitor_store_registers ();
|
|
else {
|
|
debuglogs (3, "Setting register %s to 0x%x", get_reg_name (regno), read_register (regno));
|
|
|
|
name = get_reg_name (regno);
|
|
if (STREQ(name, ""))
|
|
return;
|
|
printf_monitor (ROMCMD(SET_REG), name, read_register(regno));
|
|
expect (name, 1); /* strip the leading garbage */
|
|
if (*ROMDELIM(SET_REG) != 0) { /* if there's a delimiter */
|
|
expect (ROMDELIM(SET_REG), 1);
|
|
get_hex_word(1);
|
|
printf_monitor ("%d%s\n", i, CMD_END);
|
|
}
|
|
expect_prompt (1);
|
|
}
|
|
return;
|
|
|
|
#if 0
|
|
printf_monitor (SET_REG, get_reg_name (regno),
|
|
read_register (regno));
|
|
expect_prompt (1);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
/* Get ready to modify the registers array. On machines which store
|
|
individual registers, this doesn't need to do anything. On machines
|
|
which store all the registers in one fell swoop, this makes sure
|
|
that registers contains all the registers from the program being
|
|
debugged. */
|
|
|
|
void
|
|
monitor_prepare_to_store ()
|
|
{
|
|
/* Do nothing, since we can store individual regs */
|
|
}
|
|
|
|
void
|
|
monitor_files_info ()
|
|
{
|
|
printf ("\tAttached to %s at %d baud.\n",
|
|
dev_name, baudrate);
|
|
}
|
|
|
|
/*
|
|
* monitor_write_inferior_memory -- Copy LEN bytes of data from debugger
|
|
* memory at MYADDR to inferior's memory at MEMADDR. Returns length moved.
|
|
*/
|
|
int
|
|
monitor_write_inferior_memory (memaddr, myaddr, len)
|
|
CORE_ADDR memaddr;
|
|
unsigned char *myaddr;
|
|
int len;
|
|
{
|
|
unsigned long i;
|
|
int j;
|
|
char packet[PBUFSIZ];
|
|
char buf[PBUFSIZ];
|
|
char num[9];
|
|
char *p;
|
|
|
|
debuglogs (1, "monitor_write_inferior_memory (memaddr=0x%x, myaddr=0x%x, len=%d)", memaddr, myaddr, len);
|
|
memset (buf, '\0', PBUFSIZ); /* this also sets the string terminator */
|
|
p = buf;
|
|
|
|
if (GDBPROTO) {
|
|
*p++ = 'M'; /* The command to write memory */
|
|
hexword2ascii (num, memaddr); /* convert the address */
|
|
strcpy (p, num); /* copy the address */
|
|
p += 8;
|
|
*p++ = ','; /* add comma delimeter */
|
|
hexword2ascii (num, len); /* Get the length as a 4 digit number */
|
|
*p++ = num[4];
|
|
*p++ = num[5];
|
|
*p++ = num[6];
|
|
*p++ = num[7];
|
|
*p++ = ':'; /* add the colon delimeter */
|
|
for (j = 0; j < len; j++) { /* copy the data in after converting it */
|
|
*p++ = tohex ((myaddr[j] >> 4) & 0xf);
|
|
*p++ = tohex (myaddr[j] & 0xf);
|
|
}
|
|
|
|
make_gdb_packet (packet, buf);
|
|
if (monitor_send_packet (packet) == 0)
|
|
error ("Couldn't transmit packet\n");
|
|
if (monitor_get_packet (packet) == 0)
|
|
error ("Couldn't receive packet\n");
|
|
} else {
|
|
for (i = 0; i < len; i++) {
|
|
printf_monitor (ROMCMD(SET_MEM), memaddr + i, myaddr[i] );
|
|
if (*ROMDELIM(SET_MEM) != 0) { /* if there's a delimiter */
|
|
expect (ROMDELIM(SET_MEM), 1);
|
|
expect (CMD_DELIM);
|
|
printf_monitor ("%x", myaddr[i]);
|
|
}
|
|
/*** printf_monitor ("%x", myaddr[i]); ***/
|
|
if (sr_get_debug() > 1)
|
|
printf ("\nSet 0x%x to 0x%x\n", memaddr + i, myaddr[i]);
|
|
if (*ROMDELIM(SET_MEM) != 0) {
|
|
expect (CMD_DELIM);
|
|
printf_monitor (CMD_END);
|
|
}
|
|
expect_prompt (1);
|
|
}
|
|
}
|
|
return len;
|
|
}
|
|
|
|
/*
|
|
* monitor_read_inferior_memory -- read LEN bytes from inferior memory
|
|
* at MEMADDR. Put the result at debugger address MYADDR. Returns
|
|
* length moved.
|
|
*/
|
|
int
|
|
monitor_read_inferior_memory(memaddr, myaddr, len)
|
|
CORE_ADDR memaddr;
|
|
char *myaddr;
|
|
int len;
|
|
{
|
|
int i, j;
|
|
char buf[20];
|
|
char packet[PBUFSIZ];
|
|
|
|
/* Number of bytes read so far. */
|
|
int count;
|
|
|
|
/* Starting address of this pass. */
|
|
unsigned long startaddr;
|
|
|
|
/* Starting address of this pass. */
|
|
unsigned long endaddr;
|
|
|
|
/* Number of bytes to read in this pass. */
|
|
int len_this_pass;
|
|
|
|
debuglogs (1, "monitor_read_inferior_memory (memaddr=0x%x, myaddr=0x%x, len=%d)", memaddr, myaddr, len);
|
|
|
|
/* Note that this code works correctly if startaddr is just less
|
|
than UINT_MAX (well, really CORE_ADDR_MAX if there was such a
|
|
thing). That is, something like
|
|
monitor_read_bytes (CORE_ADDR_MAX - 4, foo, 4)
|
|
works--it never adds len To memaddr and gets 0. */
|
|
/* However, something like
|
|
monitor_read_bytes (CORE_ADDR_MAX - 3, foo, 4)
|
|
doesn't need to work. Detect it and give up if there's an attempt
|
|
to do that. */
|
|
if (((memaddr - 1) + len) < memaddr) {
|
|
errno = EIO;
|
|
return 0;
|
|
}
|
|
|
|
startaddr = memaddr;
|
|
count = 0;
|
|
while (count < len) {
|
|
len_this_pass = 16;
|
|
if ((startaddr % 16) != 0)
|
|
len_this_pass -= startaddr % 16;
|
|
if (len_this_pass > (len - count))
|
|
len_this_pass = (len - count);
|
|
|
|
debuglogs (3, "Display %d bytes at %x for Big Endian host", len_this_pass, startaddr);
|
|
|
|
if (GDBPROTO) {
|
|
for (i = 0; i < len_this_pass; i++) {
|
|
sprintf (buf, "m%08x,%04x", startaddr, len_this_pass);
|
|
make_gdb_packet (packet, buf);
|
|
if (monitor_send_packet (packet) == 0)
|
|
error ("Couldn't transmit packet\n");
|
|
if (monitor_get_packet (packet) == 0)
|
|
error ("Couldn't receive packet\n");
|
|
debuglogs (4, "monitor_read_inferior: Got a \"%s\" back\n", packet);
|
|
for (j = 0; j < len_this_pass ; j++) { /* extract the byte values */
|
|
myaddr[count++] = from_hex (*(packet+(j*2))) * 16 + from_hex (*(packet+(j*2)+1));
|
|
debuglogs (5, "myaddr set to %x\n", myaddr[count-1]);
|
|
}
|
|
startaddr += 1;
|
|
}
|
|
} else {
|
|
for (i = 0; i < len_this_pass; i++) {
|
|
printf_monitor (ROMCMD(GET_MEM), startaddr, startaddr);
|
|
sprintf (buf, ROMCMD(GET_MEM), startaddr, startaddr);
|
|
if (*ROMDELIM(GET_MEM) != 0) { /* if there's a delimiter */
|
|
expect (ROMDELIM(GET_MEM), 1);
|
|
} else {
|
|
sprintf (buf, ROMCMD(GET_MEM), startaddr, startaddr);
|
|
expect (buf,1); /* get the command echo */
|
|
get_hex_word(1); /* strip away the address */
|
|
}
|
|
get_hex_byte (&myaddr[count++]); /* get the value at this address */
|
|
|
|
if (*ROMDELIM(GET_MEM) != 0) {
|
|
printf_monitor (CMD_END);
|
|
}
|
|
expect_prompt (1);
|
|
startaddr += 1;
|
|
}
|
|
}
|
|
}
|
|
return len;
|
|
}
|
|
|
|
/* FIXME-someday! merge these two. */
|
|
int
|
|
monitor_xfer_inferior_memory (memaddr, myaddr, len, write, target)
|
|
CORE_ADDR memaddr;
|
|
char *myaddr;
|
|
int len;
|
|
int write;
|
|
struct target_ops *target; /* ignored */
|
|
{
|
|
if (write)
|
|
return monitor_write_inferior_memory (memaddr, myaddr, len);
|
|
else
|
|
return monitor_read_inferior_memory (memaddr, myaddr, len);
|
|
}
|
|
|
|
void
|
|
monitor_kill (args, from_tty)
|
|
char *args;
|
|
int from_tty;
|
|
{
|
|
return; /* ignore attempts to kill target system */
|
|
}
|
|
|
|
/* Clean up when a program exits.
|
|
The program actually lives on in the remote processor's RAM, and may be
|
|
run again without a download. Don't leave it full of breakpoint
|
|
instructions. */
|
|
|
|
void
|
|
monitor_mourn_inferior ()
|
|
{
|
|
remove_breakpoints ();
|
|
generic_mourn_inferior (); /* Do all the proper things now */
|
|
}
|
|
|
|
#define MAX_MONITOR_BREAKPOINTS 16
|
|
|
|
extern int memory_breakpoint_size;
|
|
static CORE_ADDR breakaddr[MAX_MONITOR_BREAKPOINTS] = {0};
|
|
|
|
/*
|
|
* monitor_insert_breakpoint -- add a breakpoint
|
|
*/
|
|
int
|
|
monitor_insert_breakpoint (addr, shadow)
|
|
CORE_ADDR addr;
|
|
char *shadow;
|
|
{
|
|
int i;
|
|
|
|
debuglogs (1, "monitor_insert_breakpoint() addr = 0x%x", addr);
|
|
|
|
for (i = 0; i <= MAX_MONITOR_BREAKPOINTS; i++) {
|
|
if (breakaddr[i] == 0) {
|
|
breakaddr[i] = addr;
|
|
if (sr_get_debug() > 4)
|
|
printf ("Breakpoint at %x\n", addr);
|
|
monitor_read_inferior_memory(addr, shadow, memory_breakpoint_size);
|
|
printf_monitor(SET_BREAK_CMD, addr);
|
|
expect_prompt(1);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
fprintf(stderr, "Too many breakpoints (> 16) for monitor\n");
|
|
return 1;
|
|
}
|
|
|
|
/*
|
|
* _remove_breakpoint -- Tell the monitor to remove a breakpoint
|
|
*/
|
|
int
|
|
monitor_remove_breakpoint (addr, shadow)
|
|
CORE_ADDR addr;
|
|
char *shadow;
|
|
{
|
|
int i;
|
|
|
|
debuglogs (1, "monitor_remove_breakpoint() addr = 0x%x", addr);
|
|
|
|
for (i = 0; i < MAX_MONITOR_BREAKPOINTS; i++) {
|
|
if (breakaddr[i] == addr) {
|
|
breakaddr[i] = 0;
|
|
/* some monitors remove breakpoints based on the address */
|
|
if (CLR_BREAK_ADDR)
|
|
printf_monitor(CLR_BREAK_CMD, addr);
|
|
else
|
|
printf_monitor(CLR_BREAK_CMD, i);
|
|
expect_prompt(1);
|
|
return 0;
|
|
}
|
|
}
|
|
fprintf(stderr, "Can't find breakpoint associated with 0x%x\n", addr);
|
|
return 1;
|
|
}
|
|
|
|
/* monitor_load -- load a file. This file determines which of the
|
|
* supported formats to use. The current types are:
|
|
* FIXME: not all types supported yet.
|
|
* default - reads any file using bfd and writes it to memory. This
|
|
* is really slow.
|
|
* srec - reads binary file using bfd and writes it as an
|
|
* ascii srecord.
|
|
* xmodem-bin - reads a binary file using bfd, and downloads it
|
|
* using xmodem protocol.
|
|
* xmodem-srec - reads a binary file using bfd, and after converting
|
|
* it downloads it as an srecord using xmodem protocol.
|
|
* ascii-srec - reads a ascii srecord file and downloads it
|
|
* without a change.
|
|
* ascii-xmodem - reads a ascii file and downloads using xmodem
|
|
* protocol.
|
|
*/
|
|
void
|
|
monitor_load (file, fromtty)
|
|
char *file;
|
|
int fromtty;
|
|
{
|
|
FILE *download;
|
|
int i, bytes_read;
|
|
|
|
debuglogs (1, "Loading %s to monitor", file);
|
|
|
|
if (STREQ (loadtype_str, "default")) { /* default, load a binary */
|
|
gr_load_image (file, fromtty); /* by writing it into memory */
|
|
return;
|
|
}
|
|
|
|
/* load an srecord by converting */
|
|
if ((STREQ (loadtype_str, "srec")) && STREQ (loadproto_str, "xmodem")) {
|
|
monitor_load_srec(file, XMODEM);
|
|
return;
|
|
}
|
|
|
|
if (STREQ (loadtype_str, "srec")) { /* load an srecord by converting */
|
|
monitor_load_srec(file, 0); /* if from a binary */
|
|
return;
|
|
}
|
|
|
|
if (STREQ (loadtype_str, "none")) { /* load an srecord by converting */
|
|
error ("Unimplemented");
|
|
return;
|
|
}
|
|
|
|
if (STREQ (loadproto_str, "none")) { /* load an srecord file */
|
|
monitor_load_ascii_srec(file, fromtty); /* if from a binary */
|
|
return;
|
|
}
|
|
|
|
if (STREQ (loadproto_str, "xmodem")) { /* load an srecord using the */
|
|
monitor_load_srec(file, XMODEM);
|
|
return;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* monitor_load_ascii_srec -- download an ASCII srecord file.
|
|
*/
|
|
#define DOWNLOAD_LINE_SIZE 100
|
|
int
|
|
monitor_load_ascii_srec (file, fromtty)
|
|
char *file;
|
|
int fromtty;
|
|
{
|
|
FILE *download;
|
|
char buf[DOWNLOAD_LINE_SIZE];
|
|
int i, bytes_read;
|
|
|
|
debuglogs (1, "Loading an ASCII srecord file, %s.", file);
|
|
|
|
download = fopen (file, "r");
|
|
if (download == NULL) {
|
|
error ("%s Does not exist", file);
|
|
return;
|
|
}
|
|
|
|
printf_monitor (LOAD_CMD);
|
|
sleep(1);
|
|
while (!feof (download)) {
|
|
bytes_read = fread (buf, sizeof (char), DOWNLOAD_LINE_SIZE, download);
|
|
if (hashmark) {
|
|
putchar ('.');
|
|
fflush (stdout);
|
|
}
|
|
if (SERIAL_WRITE(monitor_desc, buf, bytes_read)) {
|
|
fprintf(stderr, "SERIAL_WRITE failed: (while downloading) %s\n", safe_strerror(errno));
|
|
break;
|
|
}
|
|
i = 0;
|
|
while (i++ <=200) {} ; /* Ugly HACK, probably needs flow control */
|
|
if (bytes_read < DOWNLOAD_LINE_SIZE) {
|
|
if (!feof (download))
|
|
error ("Only read %d bytes\n", bytes_read);
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (hashmark) {
|
|
putchar ('\n');
|
|
}
|
|
if (!feof (download))
|
|
error ("Never got EOF while downloading");
|
|
expect_prompt(1);
|
|
fclose (download);
|
|
}
|
|
|
|
/*
|
|
* monitor_command -- put a command string, in args, out to MONITOR.
|
|
* Output from MONITOR is placed on the users terminal until the
|
|
* prompt is seen. FIXME: We read the charcters ourseleves here
|
|
* cause of a nasty echo.
|
|
*/
|
|
void
|
|
monitor_command (args, fromtty)
|
|
char *args;
|
|
int fromtty;
|
|
{
|
|
|
|
char *p;
|
|
char c, cp;
|
|
p = PROMPT;
|
|
|
|
debuglogs (1, "monitor_command (args=%s)", args);
|
|
|
|
if (monitor_desc == NULL)
|
|
error("monitor target not open.");
|
|
|
|
if (!args)
|
|
error("Missing command.");
|
|
|
|
printf_monitor ("%s\n", args);
|
|
|
|
expect_prompt(0);
|
|
}
|
|
|
|
/*
|
|
* monitor_load_srec -- download a binary file by converting it to srecords. This
|
|
* will also use xmodem to download the resulting file.
|
|
*
|
|
* A download goes like this when using xmodem:
|
|
* Receiver: Sender
|
|
* NAK ---------->
|
|
* <-------- (packet) [SOH|1|1|data|SUM]
|
|
* ACK ---------->
|
|
* <-------- (packet) [SOH|2|2|data|SUM]
|
|
* ACK ---------->
|
|
* <-------- EOT
|
|
* ACK ---------->
|
|
*
|
|
* ACK = 0x06
|
|
* NAK = 0x15
|
|
* EOT = 0x04
|
|
*
|
|
*/
|
|
static void
|
|
monitor_load_srec (args, protocol)
|
|
char *args;
|
|
int protocol;
|
|
{
|
|
bfd *abfd;
|
|
asection *s;
|
|
char buffer[1024];
|
|
char srec[1024];
|
|
char packet[XMODEM_PACKETSIZE];
|
|
int i;
|
|
int retries;
|
|
int type = 0; /* default to a type 0, header record */
|
|
int srec_frame = 57; /* FIXME: this must be 57 There is 12 bytes
|
|
of header, and 2 bytes of checksum at the end.
|
|
The problem is an xmodem packet holds exactly
|
|
128 bytes. */
|
|
|
|
abfd = bfd_openr (args, 0);
|
|
if (!abfd) {
|
|
printf_filtered ("Unable to open file %s\n", args);
|
|
return;
|
|
}
|
|
|
|
if (bfd_check_format (abfd, bfd_object) == 0) {
|
|
printf_filtered ("File is not an object file\n");
|
|
return;
|
|
}
|
|
|
|
printf_monitor (LOAD_CMD); /* tell the monitor to load */
|
|
if (protocol == XMODEM) { /* get the NAK from the target */
|
|
if (GETNAK) {
|
|
debuglogs (3, "Got the NAK to start loading");
|
|
} else {
|
|
printf_monitor ("%c", EOT);
|
|
debuglogs (3, "Never got the NAK to start loading");
|
|
error ("Never got the NAK to start loading");
|
|
}
|
|
}
|
|
|
|
s = abfd->sections;
|
|
while (s != (asection *) NULL) {
|
|
if (s->flags & SEC_LOAD) {
|
|
char *buffer = xmalloc (srec_frame);
|
|
printf_filtered ("%s\t: 0x%4x .. 0x%4x ", s->name, s->vma, s->vma + s->_raw_size);
|
|
fflush (stdout);
|
|
for (i = 0; i < s->_raw_size; i += srec_frame) {
|
|
if (srec_frame > s->_raw_size - i)
|
|
srec_frame = s->_raw_size - i;
|
|
|
|
bfd_get_section_contents (abfd, s, buffer, i, srec_frame);
|
|
monitor_make_srec (srec, type, s->vma + i, buffer, srec_frame);
|
|
if (protocol == XMODEM) { /* send a packet using xmodem */
|
|
make_xmodem_packet (packet, srec, XMODEM_DATASIZE);
|
|
write_monitor (packet, XMODEM_PACKETSIZE+1);
|
|
retries = 0;
|
|
while (retries++ <= 3) {
|
|
if (GETNAK) { /* Resend packet */
|
|
debuglogs (3, "Got a NAK, resending packet");
|
|
sleep(1);
|
|
write_monitor (packet, XMODEM_PACKETSIZE+1); /* send it again */
|
|
if (GETACK) /* ACKnowledged, get next data chunk */
|
|
break;
|
|
} else { /* assume we got an ACK */
|
|
if (hashmark) {
|
|
putc_unfiltered ('#');
|
|
fflush (gdb_stdout);
|
|
}
|
|
debuglogs (3, "Got an ACK, sending next packet");
|
|
break;
|
|
}
|
|
}
|
|
if (retries >= 4) { /* too many tries, must be hosed */
|
|
printf_monitor ("%c", EOT);
|
|
error ("Never got a ACK after sending an xmodem packet");
|
|
}
|
|
} else { /* no protocols at all */
|
|
printf_monitor ("%s\n", srec);
|
|
}
|
|
if (hashmark) {
|
|
putc_unfiltered ('#');
|
|
fflush (gdb_stdout);
|
|
}
|
|
type = 3; /* switch to a 4 byte address record */
|
|
fflush (gdb_stdout);
|
|
}
|
|
free (buffer);
|
|
} else {
|
|
debuglogs (3, "%s doesn't need to be loaded", s->name);
|
|
}
|
|
s = s->next;
|
|
}
|
|
putc_unfiltered ('\n');
|
|
|
|
/*
|
|
write a type 7 terminator record. no data for a type 7,
|
|
and there is no data, so len is 0.
|
|
*/
|
|
if (protocol == XMODEM) { /* send a packet using xmodem */
|
|
monitor_make_srec (srec, 7, abfd->start_address, "", 0);
|
|
make_xmodem_packet (packet, srec, XMODEM_DATASIZE);
|
|
write_monitor (packet, XMODEM_PACKETSIZE+1);
|
|
} else {
|
|
monitor_make_srec (srec, 7, abfd->start_address, "", 0);
|
|
printf_monitor ("%s\n", srec);
|
|
}
|
|
if (protocol == XMODEM) {
|
|
printf_monitor ("%c", EOT);
|
|
if (!GETACK)
|
|
error ("Never got ACK after sending EOT");
|
|
}
|
|
|
|
if (hashmark)
|
|
putc_unfiltered ('\n');
|
|
|
|
expect_prompt ();
|
|
}
|
|
|
|
/*
|
|
* getacknak -- get an ACK or a NAK from the target.
|
|
* returns 1 (true) or 0 (false) This is
|
|
* for xmodem. ANy string starting with "***"
|
|
* is an error message from the target.
|
|
* Here's a few from the WinBond w89k "Cougar" PA board.
|
|
* *** Too many errors found.
|
|
* *** Bad command
|
|
* *** Command syntax error
|
|
*/
|
|
int
|
|
getacknak (byte)
|
|
int byte;
|
|
{
|
|
char character;
|
|
int i;
|
|
|
|
i = 0;
|
|
while (i++ < 60) {
|
|
character = (char)readchar (0);
|
|
if ((character == 0xfffffffe) || (character == 0x7f)) { /* empty uart */
|
|
if (sr_get_debug() > 3)
|
|
putchar ('.');
|
|
fflush (stdout);
|
|
sleep (1);
|
|
continue;
|
|
}
|
|
if (character == CANCEL) { /* target aborted load */
|
|
expect_prompt (0);
|
|
error ("Got a CANCEL from the target.");
|
|
}
|
|
if (character == '*') { /* look for missed error message */
|
|
expect_prompt (0);
|
|
error ("Got an error message from the target");
|
|
}
|
|
debuglogs (3, "Got a %s (0x%x or \'%c\'), expecting a %s.\n",
|
|
(character == ACK) ? "ACK" : (character == NAK) ? "NAK" : "BOGUS",
|
|
character, character, (byte == ACK) ? "ACK" : "NAK");
|
|
if (character == byte) /* got what we wanted */
|
|
return 1;
|
|
if (character == ((byte == ACK) ? NAK : ACK)) { /* got the opposite */
|
|
debuglogs (3, "Got the opposite, wanted 0x%x, got a 0x%x", byte, character);
|
|
return 0;
|
|
}
|
|
sleep (1);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* monitor_make_srec -- make an srecord. This writes each line, one at a
|
|
* time, each with it's own header and trailer line.
|
|
* An srecord looks like this:
|
|
*
|
|
* byte count-+ address
|
|
* start ---+ | | data +- checksum
|
|
* | | | |
|
|
* S01000006F6B692D746573742E73726563E4
|
|
* S315000448600000000000000000FC00005900000000E9
|
|
* S31A0004000023C1400037DE00F023604000377B009020825000348D
|
|
* S30B0004485A0000000000004E
|
|
* S70500040000F6
|
|
*
|
|
* S<type><length><address><data><checksum>
|
|
*
|
|
* Where
|
|
* - length
|
|
* is the number of bytes following upto the checksum. Note that
|
|
* this is not the number of chars following, since it takes two
|
|
* chars to represent a byte.
|
|
* - type
|
|
* is one of:
|
|
* 0) header record
|
|
* 1) two byte address data record
|
|
* 2) three byte address data record
|
|
* 3) four byte address data record
|
|
* 7) four byte address termination record
|
|
* 8) three byte address termination record
|
|
* 9) two byte address termination record
|
|
*
|
|
* - address
|
|
* is the start address of the data following, or in the case of
|
|
* a termination record, the start address of the image
|
|
* - data
|
|
* is the data.
|
|
* - checksum
|
|
* is the sum of all the raw byte data in the record, from the length
|
|
* upwards, modulo 256 and subtracted from 255.
|
|
*/
|
|
int
|
|
monitor_make_srec (buffer, type, memaddr, myaddr, len)
|
|
char *buffer;
|
|
int type;
|
|
CORE_ADDR memaddr;
|
|
unsigned char *myaddr;
|
|
int len;
|
|
{
|
|
int checksum;
|
|
int i;
|
|
char *buf;
|
|
|
|
buf = buffer;
|
|
debuglogs (4, "monitor_make_srec (buffer=0x%x, type=%d, memaddr=0x%x, len=%d",
|
|
buffer, type, memaddr, len);
|
|
checksum = 0;
|
|
|
|
/*
|
|
create the header for the srec. 4 is the number of bytes in the address,
|
|
and 1 is the number of bytes in the count.
|
|
*/
|
|
if (type == 0) /* FIXME: type 0 is optional */
|
|
type = 3; /* so use data as it works */
|
|
sprintf (buf, "S%d%02X%08X", type, len + 4 + 1, memaddr);
|
|
buf += 12;
|
|
|
|
checksum += (len + 4 + 1 /* calculate the checksum */
|
|
+ (memaddr & 0xff)
|
|
+ ((memaddr >> 8) & 0xff)
|
|
+ ((memaddr >> 16) & 0xff)
|
|
+ ((memaddr >> 24) & 0xff));
|
|
|
|
for (i = 0; i < len; i++) { /* build the srecord */
|
|
sprintf (buf, "%02X", myaddr[i]);
|
|
checksum += myaddr[i];
|
|
buf += 2;
|
|
}
|
|
|
|
sprintf(buf, "%02X", ~checksum & 0xff); /* add the checksum */
|
|
debuglogs (3, "srec is \"%s\"", buffer);
|
|
|
|
return(0);
|
|
}
|
|
|
|
/*
|
|
* make_xmodem_packet -- this takes a 128 bytes of data and makes a packet
|
|
* out of it.
|
|
*
|
|
* Each packet looks like this:
|
|
* +-----+-------+-------+------+-----+
|
|
* | SOH | Seq1. | Seq2. | data | SUM |
|
|
* +-----+-------+-------+------+-----+
|
|
* SOH = 0x01
|
|
* Seq1 = The sequence number.
|
|
* Seq2 = The complement of the sequence number.
|
|
* Data = A 128 bytes of data.
|
|
* SUM = Add the contents of the 128 bytes and use the low-order
|
|
* 8 bits of the result.
|
|
*/
|
|
static void
|
|
make_xmodem_packet (packet, data, len)
|
|
unsigned char packet[];
|
|
unsigned char *data;
|
|
int len;
|
|
{
|
|
static int sequence = 1;
|
|
int i, sum;
|
|
unsigned char *buf;
|
|
|
|
buf = data;
|
|
/* build the packet header */
|
|
packet[0] = SOH;
|
|
packet[1] = sequence;
|
|
packet[2] = 255 - sequence;
|
|
sequence++;
|
|
#if 0
|
|
packet[2] = ~sequence++; /* the complement is the sequence checksum */
|
|
#endif
|
|
|
|
sum = 0; /* calculate the data checksum */
|
|
for (i = 3; i <= len + 2; i++) {
|
|
packet[i] = *buf;
|
|
sum += *buf;
|
|
buf++;
|
|
}
|
|
|
|
for (i = len+1 ; i <= XMODEM_DATASIZE ; i++) { /* add padding for the rest of the packet */
|
|
packet[i] = '0';
|
|
}
|
|
|
|
packet[XMODEM_PACKETSIZE] = sum & 0xff; /* add the checksum */
|
|
|
|
if (sr_get_debug() > 4) {
|
|
debuglogs (4, "The xmodem checksum is %d (0x%x)\n", sum & 0xff, sum & 0xff);
|
|
print_xmodem_packet (packet);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* print_xmodem_packet -- print the packet as a debug check
|
|
*/
|
|
static void
|
|
print_xmodem_packet(packet)
|
|
char packet[];
|
|
{
|
|
int i;
|
|
static int lastseq;
|
|
int sum;
|
|
|
|
/* take apart the packet header the packet header */
|
|
if (packet[0] == SOH) {
|
|
("SOH");
|
|
} else {
|
|
error ("xmodem: SOH is wrong");
|
|
}
|
|
|
|
/* check the sequence */
|
|
if (packet[1] != 0) {
|
|
lastseq = packet[1];
|
|
if (packet[2] != ~lastseq)
|
|
error ("xmodem: Sequence checksum is wrong");
|
|
else
|
|
printf_filtered (" %d %d", lastseq, ~lastseq);
|
|
}
|
|
|
|
/* check the data checksum */
|
|
sum = 0;
|
|
for (i = 3; i <= XMODEM_DATASIZE; i++) {
|
|
sum += packet[i];
|
|
}
|
|
|
|
/* ignore the data */
|
|
#if 0
|
|
printf (" [128 bytes of data] %d\n", sum & 0xff);
|
|
#endif
|
|
printf_filtered (" [%s] %d\n", packet, sum & 0xff);
|
|
|
|
if ((packet[XMODEM_PACKETSIZE] & 0xff) != (sum & 0xff)) {
|
|
debuglogs (4, "xmodem: data checksum wrong, got a %d", packet[XMODEM_PACKETSIZE] & 0xff);
|
|
}
|
|
putchar ('\n');
|
|
}
|
|
|
|
/*
|
|
* make_gdb_packet -- make a GDB packet. The data is always ASCII.
|
|
* A debug packet whose contents are <data>
|
|
* is encapsulated for transmission in the form:
|
|
*
|
|
* $ <data> # CSUM1 CSUM2
|
|
*
|
|
* <data> must be ASCII alphanumeric and cannot include characters
|
|
* '$' or '#'. If <data> starts with two characters followed by
|
|
* ':', then the existing stubs interpret this as a sequence number.
|
|
*
|
|
* CSUM1 and CSUM2 are ascii hex representation of an 8-bit
|
|
* checksum of <data>, the most significant nibble is sent first.
|
|
* the hex digits 0-9,a-f are used.
|
|
*
|
|
*/
|
|
static void
|
|
make_gdb_packet (buf, data)
|
|
char *buf, *data;
|
|
{
|
|
int i;
|
|
unsigned char csum = 0;
|
|
int cnt;
|
|
char *p;
|
|
|
|
debuglogs (3, "make_gdb_packet(%s)\n", data);
|
|
cnt = strlen (data);
|
|
if (cnt > PBUFSIZ)
|
|
error ("make_gdb_packet(): to much data\n");
|
|
|
|
/* start with the packet header */
|
|
p = buf;
|
|
*p++ = '$';
|
|
|
|
/* calculate the checksum */
|
|
for (i = 0; i < cnt; i++) {
|
|
csum += data[i];
|
|
*p++ = data[i];
|
|
}
|
|
|
|
/* terminate the data with a '#' */
|
|
*p++ = '#';
|
|
|
|
/* add the checksum as two ascii digits */
|
|
*p++ = tohex ((csum >> 4) & 0xf);
|
|
*p++ = tohex (csum & 0xf);
|
|
*p = 0x0; /* Null terminator on string */
|
|
}
|
|
|
|
/*
|
|
* monitor_send_packet -- send a GDB packet to the target with error handling. We
|
|
* get a '+' (ACK) back if the packet is received and the checksum
|
|
* matches. Otherwise a '-' (NAK) is returned. It returns a 1 for a
|
|
* successful transmition, or a 0 for a failure.
|
|
*/
|
|
int
|
|
monitor_send_packet (packet)
|
|
char *packet;
|
|
{
|
|
int c, retries, i;
|
|
char junk[PBUFSIZ];
|
|
|
|
retries = 0;
|
|
|
|
#if 0
|
|
/* scan the packet to make sure it only contains valid characters.
|
|
this may sound silly, but sometimes a garbled packet will hang
|
|
the target board. We scan the whole thing, then print the error
|
|
message.
|
|
*/
|
|
for (i = 0; i < strlen(packet); i++) {
|
|
debuglogs (5, "monitor_send_packet(): Scanning \'%c\'\n", packet[i]);
|
|
/* legit hex numbers or command */
|
|
if ((isxdigit(packet[i])) || (isalpha(packet[i])))
|
|
continue;
|
|
switch (packet[i]) {
|
|
case '+': /* ACK */
|
|
case '-': /* NAK */
|
|
case '#': /* end of packet */
|
|
case '$': /* start of packet */
|
|
continue;
|
|
default: /* bogus character */
|
|
retries++;
|
|
debuglogs (4, "monitor_send_packet(): Found a non-ascii digit \'%c\' in the packet.\n", packet[i]);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
if (retries > 0)
|
|
error ("Can't send packet, found %d non-ascii characters", retries);
|
|
|
|
/* ok, try to send the packet */
|
|
retries = 0;
|
|
while (retries <= 10) {
|
|
printf_monitor ("%s", packet);
|
|
|
|
/* read until either a timeout occurs (-2) or '+' is read */
|
|
while (retries <= 10) {
|
|
c = readchar (timeout);
|
|
debuglogs (3, "Reading a GDB protocol packet... Got a '%c'\n", c);
|
|
switch (c) {
|
|
case '+':
|
|
debuglogs (3, "Got Ack\n");
|
|
return 1;
|
|
case SERIAL_TIMEOUT:
|
|
debuglogs (3, "Timed out reading serial port\n");
|
|
break; /* Retransmit buffer */
|
|
case '-':
|
|
debuglogs (3, "Got NAK\n");
|
|
break; /* FIXME: (maybe) was a continue */
|
|
case '$':
|
|
/* it's probably an old response, or the echo of our command.
|
|
* just gobble up the packet and ignore it.
|
|
*/
|
|
debuglogs (3, "Got a junk packet\n");
|
|
do {
|
|
c = readchar (timeout);
|
|
junk[i++] = c;
|
|
} while (c != '#');
|
|
c = readchar (timeout);
|
|
junk[i++] = c;
|
|
c = readchar (timeout);
|
|
junk[i++] = c;
|
|
junk[i++] = '\0';
|
|
debuglogs (3, "Reading a junk packet, got a \"%s\"\n", junk);
|
|
continue; /* Now, go look for next packet */
|
|
default:
|
|
continue;
|
|
}
|
|
retries++;
|
|
debuglogs (3, "Retransmitting packet \"%s\"\n", packet);
|
|
break; /* Here to retransmit */
|
|
}
|
|
} /* outer while */
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* monitor_get_packet -- get a GDB packet from the target. Basically we read till we
|
|
* see a '#', then check the checksum. It returns a 1 if it's gotten a
|
|
* packet, or a 0 it the packet wasn't transmitted correctly.
|
|
*/
|
|
int
|
|
monitor_get_packet (packet)
|
|
char *packet;
|
|
{
|
|
int c;
|
|
int retries;
|
|
unsigned char csum;
|
|
unsigned char pktcsum;
|
|
char *bp;
|
|
|
|
csum = 0;
|
|
bp = packet;
|
|
|
|
memset (packet, 1, PBUFSIZ);
|
|
retries = 0;
|
|
while (retries <= 10) {
|
|
do {
|
|
c = readchar (timeout);
|
|
if (c == SERIAL_TIMEOUT) {
|
|
debuglogs (3, "monitor_get_packet: got time out from serial port.\n");
|
|
}
|
|
debuglogs (3, "Waiting for a '$', got a %c\n", c);
|
|
} while (c != '$');
|
|
|
|
retries = 0;
|
|
while (retries <= 10) {
|
|
c = readchar (timeout);
|
|
debuglogs (3, "monitor_get_packet: got a '%c'\n", c);
|
|
switch (c) {
|
|
case SERIAL_TIMEOUT:
|
|
debuglogs (3, "Timeout in mid-packet, retrying\n");
|
|
return 0;
|
|
case '$':
|
|
debuglogs (3, "Saw new packet start in middle of old one\n");
|
|
return 0; /* Start a new packet, count retries */
|
|
case '#':
|
|
*bp = '\0';
|
|
pktcsum = from_hex (readchar (timeout)) << 4;
|
|
pktcsum |= from_hex (readchar (timeout));
|
|
if (csum == pktcsum) {
|
|
debuglogs (3, "\nGDB packet checksum correct, packet data is \"%s\",\n", packet);
|
|
printf_monitor ("+");
|
|
expect_prompt (1);
|
|
return 1;
|
|
}
|
|
debuglogs (3, "Bad checksum, sentsum=0x%x, csum=0x%x\n", pktcsum, csum);
|
|
return 0;
|
|
case '*': /* Run length encoding */
|
|
debuglogs (5, "Run length encoding in packet\n");
|
|
csum += c;
|
|
c = readchar (timeout);
|
|
csum += c;
|
|
c = c - ' ' + 3; /* Compute repeat count */
|
|
|
|
if (c > 0 && c < 255 && bp + c - 1 < packet + PBUFSIZ - 1) {
|
|
memset (bp, *(bp - 1), c);
|
|
bp += c;
|
|
continue;
|
|
}
|
|
*bp = '\0';
|
|
printf_filtered ("Repeat count %d too large for buffer.\n", c);
|
|
return 0;
|
|
|
|
default:
|
|
if ((!isxdigit(c)) && (!ispunct(c)))
|
|
debuglogs (4, "Got a non-ascii digit \'%c\'.\\n", c);
|
|
if (bp < packet + PBUFSIZ - 1) {
|
|
*bp++ = c;
|
|
csum += c;
|
|
continue;
|
|
}
|
|
|
|
*bp = '\0';
|
|
puts_filtered ("Remote packet too long.\n");
|
|
return 0;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
* ascii2hexword -- convert an ascii number represented by 8 digits to a hex value.
|
|
*/
|
|
static unsigned long
|
|
ascii2hexword (mem)
|
|
unsigned char *mem;
|
|
{
|
|
unsigned long val;
|
|
int i;
|
|
char buf[9];
|
|
|
|
val = 0;
|
|
for (i = 0; i < 8; i++) {
|
|
val <<= 4;
|
|
if (mem[i] >= 'A' && mem[i] <= 'F')
|
|
val = val + mem[i] - 'A' + 10;
|
|
if (mem[i] >= 'a' && mem[i] <= 'f')
|
|
val = val + mem[i] - 'a' + 10;
|
|
if (mem[i] >= '0' && mem[i] <= '9')
|
|
val = val + mem[i] - '0';
|
|
buf[i] = mem[i];
|
|
}
|
|
buf[8] = '\0';
|
|
debuglogs (4, "ascii2hexword() got a 0x%x from %s(%x).\n", val, buf, mem);
|
|
return val;
|
|
}
|
|
|
|
/*
|
|
* ascii2hexword -- convert a hex value to an ascii number represented by 8
|
|
* digits.
|
|
*/
|
|
static char*
|
|
hexword2ascii (mem, num)
|
|
unsigned char *mem;
|
|
unsigned long num;
|
|
{
|
|
int i;
|
|
unsigned char ch;
|
|
|
|
debuglogs (4, "hexword2ascii() converting %x ", num);
|
|
for (i = 7; i >= 0; i--) {
|
|
mem[i] = tohex ((num >> 4) & 0xf);
|
|
mem[i] = tohex (num & 0xf);
|
|
num = num >> 4;
|
|
}
|
|
mem[8] = '\0';
|
|
debuglogs (4, "\tto a %s", mem);
|
|
}
|
|
|
|
/* Convert hex digit A to a number. */
|
|
static int
|
|
from_hex (a)
|
|
int a;
|
|
{
|
|
if (a == 0)
|
|
return 0;
|
|
|
|
debuglogs (4, "from_hex got a 0x%x(%c)\n",a,a);
|
|
if (a >= '0' && a <= '9')
|
|
return a - '0';
|
|
if (a >= 'a' && a <= 'f')
|
|
return a - 'a' + 10;
|
|
if (a >= 'A' && a <= 'F')
|
|
return a - 'A' + 10;
|
|
else {
|
|
error ("Reply contains invalid hex digit 0x%x", a);
|
|
}
|
|
}
|
|
|
|
/* Convert number NIB to a hex digit. */
|
|
static int
|
|
tohex (nib)
|
|
int nib;
|
|
{
|
|
if (nib < 10)
|
|
return '0'+nib;
|
|
else
|
|
return 'a'+nib-10;
|
|
}
|
|
|
|
/*
|
|
* _initialize_remote_monitors -- setup a few addtitional commands that
|
|
* are usually only used by monitors.
|
|
*/
|
|
void
|
|
_initialize_remote_monitors ()
|
|
{
|
|
struct cmd_list_element *c;
|
|
|
|
/* this sets the type of download protocol */
|
|
c = add_set_cmd ("remoteloadprotocol", no_class, var_string, (char *)&loadproto_str,
|
|
"Set the type of the remote load protocol.\n", &setlist);
|
|
c->function.sfunc = set_loadproto_command;
|
|
add_show_from_set (c, &showlist);
|
|
loadproto_str = savestring ("none", 5);
|
|
|
|
/* this sets the conversion type when loading */
|
|
c = add_set_cmd ("remoteloadtype", no_class, var_string, (char *)&loadtype_str,
|
|
"Set the type of the remote load protocol.\n", &setlist);
|
|
c->function.sfunc = set_loadtype_command;
|
|
add_show_from_set (c, &showlist);
|
|
loadtype_str = savestring ("srec", 5);
|
|
|
|
add_show_from_set (add_set_cmd ("hash", no_class, var_boolean,
|
|
(char *)&hashmark,
|
|
"Set display of activity while downloading a file.\n\
|
|
When enabled, a period \'.\' is displayed.",
|
|
&setlist),
|
|
&showlist);
|
|
|
|
/* generic monitor command */
|
|
add_com ("monitor", class_obscure, monitor_command,
|
|
"Send a command to the debug monitor.");
|
|
}
|