1 /* Remote target communications for serial-line targets in custom GDB protocol
3 Copyright (C) 1988-2021 Free Software Foundation, Inc.
5 This file is part of GDB.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
20 /* See the GDB User Guide for details of the GDB remote protocol. */
30 #include "process-stratum-target.h"
33 #include "gdb-stabs.h"
34 #include "gdbthread.h"
36 #include "remote-notif.h"
39 #include "observable.h"
41 #include "cli/cli-decode.h"
42 #include "cli/cli-setshow.h"
43 #include "target-descriptions.h"
45 #include "gdbsupport/filestuff.h"
46 #include "gdbsupport/rsp-low.h"
50 #include "gdbsupport/gdb_sys_time.h"
52 #include "gdbsupport/event-loop.h"
53 #include "event-top.h"
61 #include "remote-fileio.h"
62 #include "gdb/fileio.h"
64 #include "xml-support.h"
66 #include "memory-map.h"
68 #include "tracepoint.h"
71 #include "gdbsupport/agent.h"
73 #include "record-btrace.h"
75 #include "gdbsupport/scoped_restore.h"
76 #include "gdbsupport/environ.h"
77 #include "gdbsupport/byte-vector.h"
78 #include "gdbsupport/search.h"
80 #include <unordered_map>
81 #include "async-event.h"
82 #include "gdbsupport/selftest.h"
84 /* The remote target. */
86 static const char remote_doc
[] = N_("\
87 Use a remote computer via a serial line, using a gdb-specific protocol.\n\
88 Specify the serial device it is connected to\n\
89 (e.g. /dev/ttyS0, /dev/ttya, COM1, etc.).");
93 bool remote_debug
= false;
95 #define OPAQUETHREADBYTES 8
97 /* a 64 bit opaque identifier */
98 typedef unsigned char threadref
[OPAQUETHREADBYTES
];
100 struct gdb_ext_thread_info
;
101 struct threads_listing_context
;
102 typedef int (*rmt_thread_action
) (threadref
*ref
, void *context
);
103 struct protocol_feature
;
107 typedef std::unique_ptr
<stop_reply
> stop_reply_up
;
109 /* Generic configuration support for packets the stub optionally
110 supports. Allows the user to specify the use of the packet as well
111 as allowing GDB to auto-detect support in the remote stub. */
115 PACKET_SUPPORT_UNKNOWN
= 0,
120 /* Analyze a packet's return value and update the packet config
130 struct threads_listing_context
;
132 /* Stub vCont actions support.
134 Each field is a boolean flag indicating whether the stub reports
135 support for the corresponding action. */
137 struct vCont_action_support
152 /* About this many threadids fit in a packet. */
154 #define MAXTHREADLISTRESULTS 32
156 /* Data for the vFile:pread readahead cache. */
158 struct readahead_cache
160 /* Invalidate the readahead cache. */
163 /* Invalidate the readahead cache if it is holding data for FD. */
164 void invalidate_fd (int fd
);
166 /* Serve pread from the readahead cache. Returns number of bytes
167 read, or 0 if the request can't be served from the cache. */
168 int pread (int fd
, gdb_byte
*read_buf
, size_t len
, ULONGEST offset
);
170 /* The file descriptor for the file that is being cached. -1 if the
174 /* The offset into the file that the cache buffer corresponds
178 /* The buffer holding the cache contents. */
179 gdb_byte
*buf
= nullptr;
180 /* The buffer's size. We try to read as much as fits into a packet
184 /* Cache hit and miss counters. */
185 ULONGEST hit_count
= 0;
186 ULONGEST miss_count
= 0;
189 /* Description of the remote protocol for a given architecture. */
193 long offset
; /* Offset into G packet. */
194 long regnum
; /* GDB's internal register number. */
195 LONGEST pnum
; /* Remote protocol register number. */
196 int in_g_packet
; /* Always part of G packet. */
197 /* long size in bytes; == register_size (target_gdbarch (), regnum);
199 /* char *name; == gdbarch_register_name (target_gdbarch (), regnum);
203 struct remote_arch_state
205 explicit remote_arch_state (struct gdbarch
*gdbarch
);
207 /* Description of the remote protocol registers. */
208 long sizeof_g_packet
;
210 /* Description of the remote protocol registers indexed by REGNUM
211 (making an array gdbarch_num_regs in size). */
212 std::unique_ptr
<packet_reg
[]> regs
;
214 /* This is the size (in chars) of the first response to the ``g''
215 packet. It is used as a heuristic when determining the maximum
216 size of memory-read and memory-write packets. A target will
217 typically only reserve a buffer large enough to hold the ``g''
218 packet. The size does not include packet overhead (headers and
220 long actual_register_packet_size
;
222 /* This is the maximum size (in chars) of a non read/write packet.
223 It is also used as a cap on the size of read/write packets. */
224 long remote_packet_size
;
227 /* Description of the remote protocol state for the currently
228 connected target. This is per-target state, and independent of the
229 selected architecture. */
238 /* Get the remote arch state for GDBARCH. */
239 struct remote_arch_state
*get_remote_arch_state (struct gdbarch
*gdbarch
);
243 /* A buffer to use for incoming packets, and its current size. The
244 buffer is grown dynamically for larger incoming packets.
245 Outgoing packets may also be constructed in this buffer.
246 The size of the buffer is always at least REMOTE_PACKET_SIZE;
247 REMOTE_PACKET_SIZE should be used to limit the length of outgoing
249 gdb::char_vector buf
;
251 /* True if we're going through initial connection setup (finding out
252 about the remote side's threads, relocating symbols, etc.). */
253 bool starting_up
= false;
255 /* If we negotiated packet size explicitly (and thus can bypass
256 heuristics for the largest packet size that will not overflow
257 a buffer in the stub), this will be set to that packet size.
258 Otherwise zero, meaning to use the guessed size. */
259 long explicit_packet_size
= 0;
261 /* remote_wait is normally called when the target is running and
262 waits for a stop reply packet. But sometimes we need to call it
263 when the target is already stopped. We can send a "?" packet
264 and have remote_wait read the response. Or, if we already have
265 the response, we can stash it in BUF and tell remote_wait to
266 skip calling getpkt. This flag is set when BUF contains a
267 stop reply packet and the target is not waiting. */
268 int cached_wait_status
= 0;
270 /* True, if in no ack mode. That is, neither GDB nor the stub will
271 expect acks from each other. The connection is assumed to be
273 bool noack_mode
= false;
275 /* True if we're connected in extended remote mode. */
276 bool extended
= false;
278 /* True if we resumed the target and we're waiting for the target to
279 stop. In the mean time, we can't start another command/query.
280 The remote server wouldn't be ready to process it, so we'd
281 timeout waiting for a reply that would never come and eventually
282 we'd close the connection. This can happen in asynchronous mode
283 because we allow GDB commands while the target is running. */
284 bool waiting_for_stop_reply
= false;
286 /* The status of the stub support for the various vCont actions. */
287 vCont_action_support supports_vCont
;
288 /* Whether vCont support was probed already. This is a workaround
289 until packet_support is per-connection. */
290 bool supports_vCont_probed
;
292 /* True if the user has pressed Ctrl-C, but the target hasn't
293 responded to that. */
294 bool ctrlc_pending_p
= false;
296 /* True if we saw a Ctrl-C while reading or writing from/to the
297 remote descriptor. At that point it is not safe to send a remote
298 interrupt packet, so we instead remember we saw the Ctrl-C and
299 process it once we're done with sending/receiving the current
300 packet, which should be shortly. If however that takes too long,
301 and the user presses Ctrl-C again, we offer to disconnect. */
302 bool got_ctrlc_during_io
= false;
304 /* Descriptor for I/O to remote machine. Initialize it to NULL so that
305 remote_open knows that we don't have a file open when the program
307 struct serial
*remote_desc
= nullptr;
309 /* These are the threads which we last sent to the remote system. The
310 TID member will be -1 for all or -2 for not sent yet. */
311 ptid_t general_thread
= null_ptid
;
312 ptid_t continue_thread
= null_ptid
;
314 /* This is the traceframe which we last selected on the remote system.
315 It will be -1 if no traceframe is selected. */
316 int remote_traceframe_number
= -1;
318 char *last_pass_packet
= nullptr;
320 /* The last QProgramSignals packet sent to the target. We bypass
321 sending a new program signals list down to the target if the new
322 packet is exactly the same as the last we sent. IOW, we only let
323 the target know about program signals list changes. */
324 char *last_program_signals_packet
= nullptr;
326 gdb_signal last_sent_signal
= GDB_SIGNAL_0
;
328 bool last_sent_step
= false;
330 /* The execution direction of the last resume we got. */
331 exec_direction_kind last_resume_exec_dir
= EXEC_FORWARD
;
333 char *finished_object
= nullptr;
334 char *finished_annex
= nullptr;
335 ULONGEST finished_offset
= 0;
337 /* Should we try the 'ThreadInfo' query packet?
339 This variable (NOT available to the user: auto-detect only!)
340 determines whether GDB will use the new, simpler "ThreadInfo"
341 query or the older, more complex syntax for thread queries.
342 This is an auto-detect variable (set to true at each connect,
343 and set to false when the target fails to recognize it). */
344 bool use_threadinfo_query
= false;
345 bool use_threadextra_query
= false;
347 threadref echo_nextthread
{};
348 threadref nextthread
{};
349 threadref resultthreadlist
[MAXTHREADLISTRESULTS
] {};
351 /* The state of remote notification. */
352 struct remote_notif_state
*notif_state
= nullptr;
354 /* The branch trace configuration. */
355 struct btrace_config btrace_config
{};
357 /* The argument to the last "vFile:setfs:" packet we sent, used
358 to avoid sending repeated unnecessary "vFile:setfs:" packets.
359 Initialized to -1 to indicate that no "vFile:setfs:" packet
360 has yet been sent. */
363 /* A readahead cache for vFile:pread. Often, reading a binary
364 involves a sequence of small reads. E.g., when parsing an ELF
365 file. A readahead cache helps mostly the case of remote
366 debugging on a connection with higher latency, due to the
367 request/reply nature of the RSP. We only cache data for a single
368 file descriptor at a time. */
369 struct readahead_cache readahead_cache
;
371 /* The list of already fetched and acknowledged stop events. This
372 queue is used for notification Stop, and other notifications
373 don't need queue for their events, because the notification
374 events of Stop can't be consumed immediately, so that events
375 should be queued first, and be consumed by remote_wait_{ns,as}
376 one per time. Other notifications can consume their events
377 immediately, so queue is not needed for them. */
378 std::vector
<stop_reply_up
> stop_reply_queue
;
380 /* Asynchronous signal handle registered as event loop source for
381 when we have pending events ready to be passed to the core. */
382 struct async_event_handler
*remote_async_inferior_event_token
= nullptr;
384 /* FIXME: cagney/1999-09-23: Even though getpkt was called with
385 ``forever'' still use the normal timeout mechanism. This is
386 currently used by the ASYNC code to guarentee that target reads
387 during the initial connect always time-out. Once getpkt has been
388 modified to return a timeout indication and, in turn
389 remote_wait()/wait_for_inferior() have gained a timeout parameter
391 int wait_forever_enabled_p
= 1;
394 /* Mapping of remote protocol data for each gdbarch. Usually there
395 is only one entry here, though we may see more with stubs that
396 support multi-process. */
397 std::unordered_map
<struct gdbarch
*, remote_arch_state
>
401 static const target_info remote_target_info
= {
403 N_("Remote serial target in gdb-specific protocol"),
407 class remote_target
: public process_stratum_target
410 remote_target () = default;
411 ~remote_target () override
;
413 const target_info
&info () const override
414 { return remote_target_info
; }
416 const char *connection_string () override
;
418 thread_control_capabilities
get_thread_control_capabilities () override
419 { return tc_schedlock
; }
421 /* Open a remote connection. */
422 static void open (const char *, int);
424 void close () override
;
426 void detach (inferior
*, int) override
;
427 void disconnect (const char *, int) override
;
429 void commit_resumed () override
;
430 void resume (ptid_t
, int, enum gdb_signal
) override
;
431 ptid_t
wait (ptid_t
, struct target_waitstatus
*, target_wait_flags
) override
;
432 bool has_pending_events () override
;
434 void fetch_registers (struct regcache
*, int) override
;
435 void store_registers (struct regcache
*, int) override
;
436 void prepare_to_store (struct regcache
*) override
;
438 void files_info () override
;
440 int insert_breakpoint (struct gdbarch
*, struct bp_target_info
*) override
;
442 int remove_breakpoint (struct gdbarch
*, struct bp_target_info
*,
443 enum remove_bp_reason
) override
;
446 bool stopped_by_sw_breakpoint () override
;
447 bool supports_stopped_by_sw_breakpoint () override
;
449 bool stopped_by_hw_breakpoint () override
;
451 bool supports_stopped_by_hw_breakpoint () override
;
453 bool stopped_by_watchpoint () override
;
455 bool stopped_data_address (CORE_ADDR
*) override
;
457 bool watchpoint_addr_within_range (CORE_ADDR
, CORE_ADDR
, int) override
;
459 int can_use_hw_breakpoint (enum bptype
, int, int) override
;
461 int insert_hw_breakpoint (struct gdbarch
*, struct bp_target_info
*) override
;
463 int remove_hw_breakpoint (struct gdbarch
*, struct bp_target_info
*) override
;
465 int region_ok_for_hw_watchpoint (CORE_ADDR
, int) override
;
467 int insert_watchpoint (CORE_ADDR
, int, enum target_hw_bp_type
,
468 struct expression
*) override
;
470 int remove_watchpoint (CORE_ADDR
, int, enum target_hw_bp_type
,
471 struct expression
*) override
;
473 void kill () override
;
475 void load (const char *, int) override
;
477 void mourn_inferior () override
;
479 void pass_signals (gdb::array_view
<const unsigned char>) override
;
481 int set_syscall_catchpoint (int, bool, int,
482 gdb::array_view
<const int>) override
;
484 void program_signals (gdb::array_view
<const unsigned char>) override
;
486 bool thread_alive (ptid_t ptid
) override
;
488 const char *thread_name (struct thread_info
*) override
;
490 void update_thread_list () override
;
492 std::string
pid_to_str (ptid_t
) override
;
494 const char *extra_thread_info (struct thread_info
*) override
;
496 ptid_t
get_ada_task_ptid (long lwp
, ULONGEST thread
) override
;
498 thread_info
*thread_handle_to_thread_info (const gdb_byte
*thread_handle
,
500 inferior
*inf
) override
;
502 gdb::byte_vector
thread_info_to_thread_handle (struct thread_info
*tp
)
505 void stop (ptid_t
) override
;
507 void interrupt () override
;
509 void pass_ctrlc () override
;
511 enum target_xfer_status
xfer_partial (enum target_object object
,
514 const gdb_byte
*writebuf
,
515 ULONGEST offset
, ULONGEST len
,
516 ULONGEST
*xfered_len
) override
;
518 ULONGEST
get_memory_xfer_limit () override
;
520 void rcmd (const char *command
, struct ui_file
*output
) override
;
522 char *pid_to_exec_file (int pid
) override
;
524 void log_command (const char *cmd
) override
526 serial_log_command (this, cmd
);
529 CORE_ADDR
get_thread_local_address (ptid_t ptid
,
530 CORE_ADDR load_module_addr
,
531 CORE_ADDR offset
) override
;
533 bool can_execute_reverse () override
;
535 std::vector
<mem_region
> memory_map () override
;
537 void flash_erase (ULONGEST address
, LONGEST length
) override
;
539 void flash_done () override
;
541 const struct target_desc
*read_description () override
;
543 int search_memory (CORE_ADDR start_addr
, ULONGEST search_space_len
,
544 const gdb_byte
*pattern
, ULONGEST pattern_len
,
545 CORE_ADDR
*found_addrp
) override
;
547 bool can_async_p () override
;
549 bool is_async_p () override
;
551 void async (int) override
;
553 int async_wait_fd () override
;
555 void thread_events (int) override
;
557 int can_do_single_step () override
;
559 void terminal_inferior () override
;
561 void terminal_ours () override
;
563 bool supports_non_stop () override
;
565 bool supports_multi_process () override
;
567 bool supports_disable_randomization () override
;
569 bool filesystem_is_local () override
;
572 int fileio_open (struct inferior
*inf
, const char *filename
,
573 int flags
, int mode
, int warn_if_slow
,
574 int *target_errno
) override
;
576 int fileio_pwrite (int fd
, const gdb_byte
*write_buf
, int len
,
577 ULONGEST offset
, int *target_errno
) override
;
579 int fileio_pread (int fd
, gdb_byte
*read_buf
, int len
,
580 ULONGEST offset
, int *target_errno
) override
;
582 int fileio_fstat (int fd
, struct stat
*sb
, int *target_errno
) override
;
584 int fileio_close (int fd
, int *target_errno
) override
;
586 int fileio_unlink (struct inferior
*inf
,
587 const char *filename
,
588 int *target_errno
) override
;
590 gdb::optional
<std::string
>
591 fileio_readlink (struct inferior
*inf
,
592 const char *filename
,
593 int *target_errno
) override
;
595 bool supports_enable_disable_tracepoint () override
;
597 bool supports_string_tracing () override
;
599 bool supports_evaluation_of_breakpoint_conditions () override
;
601 bool can_run_breakpoint_commands () override
;
603 void trace_init () override
;
605 void download_tracepoint (struct bp_location
*location
) override
;
607 bool can_download_tracepoint () override
;
609 void download_trace_state_variable (const trace_state_variable
&tsv
) override
;
611 void enable_tracepoint (struct bp_location
*location
) override
;
613 void disable_tracepoint (struct bp_location
*location
) override
;
615 void trace_set_readonly_regions () override
;
617 void trace_start () override
;
619 int get_trace_status (struct trace_status
*ts
) override
;
621 void get_tracepoint_status (struct breakpoint
*tp
, struct uploaded_tp
*utp
)
624 void trace_stop () override
;
626 int trace_find (enum trace_find_type type
, int num
,
627 CORE_ADDR addr1
, CORE_ADDR addr2
, int *tpp
) override
;
629 bool get_trace_state_variable_value (int tsv
, LONGEST
*val
) override
;
631 int save_trace_data (const char *filename
) override
;
633 int upload_tracepoints (struct uploaded_tp
**utpp
) override
;
635 int upload_trace_state_variables (struct uploaded_tsv
**utsvp
) override
;
637 LONGEST
get_raw_trace_data (gdb_byte
*buf
, ULONGEST offset
, LONGEST len
) override
;
639 int get_min_fast_tracepoint_insn_len () override
;
641 void set_disconnected_tracing (int val
) override
;
643 void set_circular_trace_buffer (int val
) override
;
645 void set_trace_buffer_size (LONGEST val
) override
;
647 bool set_trace_notes (const char *user
, const char *notes
,
648 const char *stopnotes
) override
;
650 int core_of_thread (ptid_t ptid
) override
;
652 int verify_memory (const gdb_byte
*data
,
653 CORE_ADDR memaddr
, ULONGEST size
) override
;
656 bool get_tib_address (ptid_t ptid
, CORE_ADDR
*addr
) override
;
658 void set_permissions () override
;
660 bool static_tracepoint_marker_at (CORE_ADDR
,
661 struct static_tracepoint_marker
*marker
)
664 std::vector
<static_tracepoint_marker
>
665 static_tracepoint_markers_by_strid (const char *id
) override
;
667 traceframe_info_up
traceframe_info () override
;
669 bool use_agent (bool use
) override
;
670 bool can_use_agent () override
;
672 struct btrace_target_info
*enable_btrace (ptid_t ptid
,
673 const struct btrace_config
*conf
) override
;
675 void disable_btrace (struct btrace_target_info
*tinfo
) override
;
677 void teardown_btrace (struct btrace_target_info
*tinfo
) override
;
679 enum btrace_error
read_btrace (struct btrace_data
*data
,
680 struct btrace_target_info
*btinfo
,
681 enum btrace_read_type type
) override
;
683 const struct btrace_config
*btrace_conf (const struct btrace_target_info
*) override
;
684 bool augmented_libraries_svr4_read () override
;
685 void follow_fork (inferior
*, ptid_t
, target_waitkind
, bool, bool) override
;
686 void follow_exec (inferior
*, ptid_t
, const char *) override
;
687 int insert_fork_catchpoint (int) override
;
688 int remove_fork_catchpoint (int) override
;
689 int insert_vfork_catchpoint (int) override
;
690 int remove_vfork_catchpoint (int) override
;
691 int insert_exec_catchpoint (int) override
;
692 int remove_exec_catchpoint (int) override
;
693 enum exec_direction_kind
execution_direction () override
;
695 bool supports_memory_tagging () override
;
697 bool fetch_memtags (CORE_ADDR address
, size_t len
,
698 gdb::byte_vector
&tags
, int type
) override
;
700 bool store_memtags (CORE_ADDR address
, size_t len
,
701 const gdb::byte_vector
&tags
, int type
) override
;
703 public: /* Remote specific methods. */
705 void remote_download_command_source (int num
, ULONGEST addr
,
706 struct command_line
*cmds
);
708 void remote_file_put (const char *local_file
, const char *remote_file
,
710 void remote_file_get (const char *remote_file
, const char *local_file
,
712 void remote_file_delete (const char *remote_file
, int from_tty
);
714 int remote_hostio_pread (int fd
, gdb_byte
*read_buf
, int len
,
715 ULONGEST offset
, int *remote_errno
);
716 int remote_hostio_pwrite (int fd
, const gdb_byte
*write_buf
, int len
,
717 ULONGEST offset
, int *remote_errno
);
718 int remote_hostio_pread_vFile (int fd
, gdb_byte
*read_buf
, int len
,
719 ULONGEST offset
, int *remote_errno
);
721 int remote_hostio_send_command (int command_bytes
, int which_packet
,
722 int *remote_errno
, const char **attachment
,
723 int *attachment_len
);
724 int remote_hostio_set_filesystem (struct inferior
*inf
,
726 /* We should get rid of this and use fileio_open directly. */
727 int remote_hostio_open (struct inferior
*inf
, const char *filename
,
728 int flags
, int mode
, int warn_if_slow
,
730 int remote_hostio_close (int fd
, int *remote_errno
);
732 int remote_hostio_unlink (inferior
*inf
, const char *filename
,
735 struct remote_state
*get_remote_state ();
737 long get_remote_packet_size (void);
738 long get_memory_packet_size (struct memory_packet_config
*config
);
740 long get_memory_write_packet_size ();
741 long get_memory_read_packet_size ();
743 char *append_pending_thread_resumptions (char *p
, char *endp
,
745 static void open_1 (const char *name
, int from_tty
, int extended_p
);
746 void start_remote (int from_tty
, int extended_p
);
747 void remote_detach_1 (struct inferior
*inf
, int from_tty
);
749 char *append_resumption (char *p
, char *endp
,
750 ptid_t ptid
, int step
, gdb_signal siggnal
);
751 int remote_resume_with_vcont (ptid_t ptid
, int step
,
754 thread_info
*add_current_inferior_and_thread (const char *wait_status
);
756 ptid_t
wait_ns (ptid_t ptid
, struct target_waitstatus
*status
,
757 target_wait_flags options
);
758 ptid_t
wait_as (ptid_t ptid
, target_waitstatus
*status
,
759 target_wait_flags options
);
761 ptid_t
process_stop_reply (struct stop_reply
*stop_reply
,
762 target_waitstatus
*status
);
764 ptid_t select_thread_for_ambiguous_stop_reply
765 (const struct target_waitstatus
*status
);
767 void remote_notice_new_inferior (ptid_t currthread
, bool executing
);
769 void print_one_stopped_thread (thread_info
*thread
);
770 void process_initial_stop_replies (int from_tty
);
772 thread_info
*remote_add_thread (ptid_t ptid
, bool running
, bool executing
);
774 void btrace_sync_conf (const btrace_config
*conf
);
776 void remote_btrace_maybe_reopen ();
778 void remove_new_fork_children (threads_listing_context
*context
);
779 void kill_new_fork_children (int pid
);
780 void discard_pending_stop_replies (struct inferior
*inf
);
781 int stop_reply_queue_length ();
783 void check_pending_events_prevent_wildcard_vcont
784 (bool *may_global_wildcard_vcont
);
786 void discard_pending_stop_replies_in_queue ();
787 struct stop_reply
*remote_notif_remove_queued_reply (ptid_t ptid
);
788 struct stop_reply
*queued_stop_reply (ptid_t ptid
);
789 int peek_stop_reply (ptid_t ptid
);
790 void remote_parse_stop_reply (const char *buf
, stop_reply
*event
);
792 void remote_stop_ns (ptid_t ptid
);
793 void remote_interrupt_as ();
794 void remote_interrupt_ns ();
796 char *remote_get_noisy_reply ();
797 int remote_query_attached (int pid
);
798 inferior
*remote_add_inferior (bool fake_pid_p
, int pid
, int attached
,
801 ptid_t
remote_current_thread (ptid_t oldpid
);
802 ptid_t
get_current_thread (const char *wait_status
);
804 void set_thread (ptid_t ptid
, int gen
);
805 void set_general_thread (ptid_t ptid
);
806 void set_continue_thread (ptid_t ptid
);
807 void set_general_process ();
809 char *write_ptid (char *buf
, const char *endbuf
, ptid_t ptid
);
811 int remote_unpack_thread_info_response (const char *pkt
, threadref
*expectedref
,
812 gdb_ext_thread_info
*info
);
813 int remote_get_threadinfo (threadref
*threadid
, int fieldset
,
814 gdb_ext_thread_info
*info
);
816 int parse_threadlist_response (const char *pkt
, int result_limit
,
817 threadref
*original_echo
,
818 threadref
*resultlist
,
820 int remote_get_threadlist (int startflag
, threadref
*nextthread
,
821 int result_limit
, int *done
, int *result_count
,
822 threadref
*threadlist
);
824 int remote_threadlist_iterator (rmt_thread_action stepfunction
,
825 void *context
, int looplimit
);
827 int remote_get_threads_with_ql (threads_listing_context
*context
);
828 int remote_get_threads_with_qxfer (threads_listing_context
*context
);
829 int remote_get_threads_with_qthreadinfo (threads_listing_context
*context
);
831 void extended_remote_restart ();
835 void remote_check_symbols ();
837 void remote_supported_packet (const struct protocol_feature
*feature
,
838 enum packet_support support
,
839 const char *argument
);
841 void remote_query_supported ();
843 void remote_packet_size (const protocol_feature
*feature
,
844 packet_support support
, const char *value
);
846 void remote_serial_quit_handler ();
848 void remote_detach_pid (int pid
);
850 void remote_vcont_probe ();
852 void remote_resume_with_hc (ptid_t ptid
, int step
,
855 void send_interrupt_sequence ();
856 void interrupt_query ();
858 void remote_notif_get_pending_events (notif_client
*nc
);
860 int fetch_register_using_p (struct regcache
*regcache
,
862 int send_g_packet ();
863 void process_g_packet (struct regcache
*regcache
);
864 void fetch_registers_using_g (struct regcache
*regcache
);
865 int store_register_using_P (const struct regcache
*regcache
,
867 void store_registers_using_G (const struct regcache
*regcache
);
869 void set_remote_traceframe ();
871 void check_binary_download (CORE_ADDR addr
);
873 target_xfer_status
remote_write_bytes_aux (const char *header
,
875 const gdb_byte
*myaddr
,
878 ULONGEST
*xfered_len_units
,
882 target_xfer_status
remote_write_bytes (CORE_ADDR memaddr
,
883 const gdb_byte
*myaddr
, ULONGEST len
,
884 int unit_size
, ULONGEST
*xfered_len
);
886 target_xfer_status
remote_read_bytes_1 (CORE_ADDR memaddr
, gdb_byte
*myaddr
,
888 int unit_size
, ULONGEST
*xfered_len_units
);
890 target_xfer_status
remote_xfer_live_readonly_partial (gdb_byte
*readbuf
,
894 ULONGEST
*xfered_len
);
896 target_xfer_status
remote_read_bytes (CORE_ADDR memaddr
,
897 gdb_byte
*myaddr
, ULONGEST len
,
899 ULONGEST
*xfered_len
);
901 packet_result
remote_send_printf (const char *format
, ...)
902 ATTRIBUTE_PRINTF (2, 3);
904 target_xfer_status
remote_flash_write (ULONGEST address
,
905 ULONGEST length
, ULONGEST
*xfered_len
,
906 const gdb_byte
*data
);
908 int readchar (int timeout
);
910 void remote_serial_write (const char *str
, int len
);
912 int putpkt (const char *buf
);
913 int putpkt_binary (const char *buf
, int cnt
);
915 int putpkt (const gdb::char_vector
&buf
)
917 return putpkt (buf
.data ());
921 long read_frame (gdb::char_vector
*buf_p
);
922 void getpkt (gdb::char_vector
*buf
, int forever
);
923 int getpkt_or_notif_sane_1 (gdb::char_vector
*buf
, int forever
,
924 int expecting_notif
, int *is_notif
);
925 int getpkt_sane (gdb::char_vector
*buf
, int forever
);
926 int getpkt_or_notif_sane (gdb::char_vector
*buf
, int forever
,
928 int remote_vkill (int pid
);
929 void remote_kill_k ();
931 void extended_remote_disable_randomization (int val
);
932 int extended_remote_run (const std::string
&args
);
934 void send_environment_packet (const char *action
,
938 void extended_remote_environment_support ();
939 void extended_remote_set_inferior_cwd ();
941 target_xfer_status
remote_write_qxfer (const char *object_name
,
943 const gdb_byte
*writebuf
,
944 ULONGEST offset
, LONGEST len
,
945 ULONGEST
*xfered_len
,
946 struct packet_config
*packet
);
948 target_xfer_status
remote_read_qxfer (const char *object_name
,
950 gdb_byte
*readbuf
, ULONGEST offset
,
952 ULONGEST
*xfered_len
,
953 struct packet_config
*packet
);
955 void push_stop_reply (struct stop_reply
*new_event
);
957 bool vcont_r_supported ();
959 void packet_command (const char *args
, int from_tty
);
961 private: /* data fields */
963 /* The remote state. Don't reference this directly. Use the
964 get_remote_state method instead. */
965 remote_state m_remote_state
;
968 static const target_info extended_remote_target_info
= {
970 N_("Extended remote serial target in gdb-specific protocol"),
974 /* Set up the extended remote target by extending the standard remote
975 target and adding to it. */
977 class extended_remote_target final
: public remote_target
980 const target_info
&info () const override
981 { return extended_remote_target_info
; }
983 /* Open an extended-remote connection. */
984 static void open (const char *, int);
986 bool can_create_inferior () override
{ return true; }
987 void create_inferior (const char *, const std::string
&,
988 char **, int) override
;
990 void detach (inferior
*, int) override
;
992 bool can_attach () override
{ return true; }
993 void attach (const char *, int) override
;
995 void post_attach (int) override
;
996 bool supports_disable_randomization () override
;
999 /* Per-program-space data key. */
1000 static const struct program_space_key
<char, gdb::xfree_deleter
<char>>
1003 /* The variable registered as the control variable used by the
1004 remote exec-file commands. While the remote exec-file setting is
1005 per-program-space, the set/show machinery uses this as the
1006 location of the remote exec-file value. */
1007 static char *remote_exec_file_var
;
1009 /* The size to align memory write packets, when practical. The protocol
1010 does not guarantee any alignment, and gdb will generate short
1011 writes and unaligned writes, but even as a best-effort attempt this
1012 can improve bulk transfers. For instance, if a write is misaligned
1013 relative to the target's data bus, the stub may need to make an extra
1014 round trip fetching data from the target. This doesn't make a
1015 huge difference, but it's easy to do, so we try to be helpful.
1017 The alignment chosen is arbitrary; usually data bus width is
1018 important here, not the possibly larger cache line size. */
1019 enum { REMOTE_ALIGN_WRITES
= 16 };
1021 /* Prototypes for local functions. */
1023 static int hexnumlen (ULONGEST num
);
1025 static int stubhex (int ch
);
1027 static int hexnumstr (char *, ULONGEST
);
1029 static int hexnumnstr (char *, ULONGEST
, int);
1031 static CORE_ADDR
remote_address_masked (CORE_ADDR
);
1033 static void print_packet (const char *);
1035 static int stub_unpack_int (const char *buff
, int fieldlength
);
1037 struct packet_config
;
1039 static void show_packet_config_cmd (struct packet_config
*config
);
1041 static void show_remote_protocol_packet_cmd (struct ui_file
*file
,
1043 struct cmd_list_element
*c
,
1046 static ptid_t
read_ptid (const char *buf
, const char **obuf
);
1048 static void remote_async_inferior_event_handler (gdb_client_data
);
1050 static bool remote_read_description_p (struct target_ops
*target
);
1052 static void remote_console_output (const char *msg
);
1054 static void remote_btrace_reset (remote_state
*rs
);
1056 static void remote_unpush_and_throw (remote_target
*target
);
1060 static struct cmd_list_element
*remote_cmdlist
;
1062 /* For "set remote" and "show remote". */
1064 static struct cmd_list_element
*remote_set_cmdlist
;
1065 static struct cmd_list_element
*remote_show_cmdlist
;
1067 /* Controls whether GDB is willing to use range stepping. */
1069 static bool use_range_stepping
= true;
1071 /* From the remote target's point of view, each thread is in one of these three
1073 enum class resume_state
1075 /* Not resumed - we haven't been asked to resume this thread. */
1078 /* We have been asked to resume this thread, but haven't sent a vCont action
1079 for it yet. We'll need to consider it next time commit_resume is
1081 RESUMED_PENDING_VCONT
,
1083 /* We have been asked to resume this thread, and we have sent a vCont action
1088 /* Information about a thread's pending vCont-resume. Used when a thread is in
1089 the remote_resume_state::RESUMED_PENDING_VCONT state. remote_target::resume
1090 stores this information which is then picked up by
1091 remote_target::commit_resume to know which is the proper action for this
1092 thread to include in the vCont packet. */
1093 struct resumed_pending_vcont_info
1095 /* True if the last resume call for this thread was a step request, false
1096 if a continue request. */
1099 /* The signal specified in the last resume call for this thread. */
1103 /* Private data that we'll store in (struct thread_info)->priv. */
1104 struct remote_thread_info
: public private_thread_info
1110 /* Thread handle, perhaps a pthread_t or thread_t value, stored as a
1111 sequence of bytes. */
1112 gdb::byte_vector thread_handle
;
1114 /* Whether the target stopped for a breakpoint/watchpoint. */
1115 enum target_stop_reason stop_reason
= TARGET_STOPPED_BY_NO_REASON
;
1117 /* This is set to the data address of the access causing the target
1118 to stop for a watchpoint. */
1119 CORE_ADDR watch_data_address
= 0;
1121 /* Get the thread's resume state. */
1122 enum resume_state
get_resume_state () const
1124 return m_resume_state
;
1127 /* Put the thread in the NOT_RESUMED state. */
1128 void set_not_resumed ()
1130 m_resume_state
= resume_state::NOT_RESUMED
;
1133 /* Put the thread in the RESUMED_PENDING_VCONT state. */
1134 void set_resumed_pending_vcont (bool step
, gdb_signal sig
)
1136 m_resume_state
= resume_state::RESUMED_PENDING_VCONT
;
1137 m_resumed_pending_vcont_info
.step
= step
;
1138 m_resumed_pending_vcont_info
.sig
= sig
;
1141 /* Get the information this thread's pending vCont-resumption.
1143 Must only be called if the thread is in the RESUMED_PENDING_VCONT resume
1145 const struct resumed_pending_vcont_info
&resumed_pending_vcont_info () const
1147 gdb_assert (m_resume_state
== resume_state::RESUMED_PENDING_VCONT
);
1149 return m_resumed_pending_vcont_info
;
1152 /* Put the thread in the VCONT_RESUMED state. */
1155 m_resume_state
= resume_state::RESUMED
;
1159 /* Resume state for this thread. This is used to implement vCont action
1160 coalescing (only when the target operates in non-stop mode).
1162 remote_target::resume moves the thread to the RESUMED_PENDING_VCONT state,
1163 which notes that this thread must be considered in the next commit_resume
1166 remote_target::commit_resume sends a vCont packet with actions for the
1167 threads in the RESUMED_PENDING_VCONT state and moves them to the
1168 VCONT_RESUMED state.
1170 When reporting a stop to the core for a thread, that thread is moved back
1171 to the NOT_RESUMED state. */
1172 enum resume_state m_resume_state
= resume_state::NOT_RESUMED
;
1174 /* Extra info used if the thread is in the RESUMED_PENDING_VCONT state. */
1175 struct resumed_pending_vcont_info m_resumed_pending_vcont_info
;
1178 remote_state::remote_state ()
1183 remote_state::~remote_state ()
1185 xfree (this->last_pass_packet
);
1186 xfree (this->last_program_signals_packet
);
1187 xfree (this->finished_object
);
1188 xfree (this->finished_annex
);
1191 /* Utility: generate error from an incoming stub packet. */
1193 trace_error (char *buf
)
1196 return; /* not an error msg */
1199 case '1': /* malformed packet error */
1200 if (*++buf
== '0') /* general case: */
1201 error (_("remote.c: error in outgoing packet."));
1203 error (_("remote.c: error in outgoing packet at field #%ld."),
1204 strtol (buf
, NULL
, 16));
1206 error (_("Target returns error code '%s'."), buf
);
1210 /* Utility: wait for reply from stub, while accepting "O" packets. */
1213 remote_target::remote_get_noisy_reply ()
1215 struct remote_state
*rs
= get_remote_state ();
1217 do /* Loop on reply from remote stub. */
1221 QUIT
; /* Allow user to bail out with ^C. */
1222 getpkt (&rs
->buf
, 0);
1223 buf
= rs
->buf
.data ();
1226 else if (startswith (buf
, "qRelocInsn:"))
1229 CORE_ADDR from
, to
, org_to
;
1231 int adjusted_size
= 0;
1234 p
= buf
+ strlen ("qRelocInsn:");
1235 pp
= unpack_varlen_hex (p
, &ul
);
1237 error (_("invalid qRelocInsn packet: %s"), buf
);
1241 unpack_varlen_hex (p
, &ul
);
1248 gdbarch_relocate_instruction (target_gdbarch (), &to
, from
);
1251 catch (const gdb_exception
&ex
)
1253 if (ex
.error
== MEMORY_ERROR
)
1255 /* Propagate memory errors silently back to the
1256 target. The stub may have limited the range of
1257 addresses we can write to, for example. */
1261 /* Something unexpectedly bad happened. Be verbose
1262 so we can tell what, and propagate the error back
1263 to the stub, so it doesn't get stuck waiting for
1265 exception_fprintf (gdb_stderr
, ex
,
1266 _("warning: relocating instruction: "));
1273 adjusted_size
= to
- org_to
;
1275 xsnprintf (buf
, rs
->buf
.size (), "qRelocInsn:%x", adjusted_size
);
1279 else if (buf
[0] == 'O' && buf
[1] != 'K')
1280 remote_console_output (buf
+ 1); /* 'O' message from stub */
1282 return buf
; /* Here's the actual reply. */
1287 struct remote_arch_state
*
1288 remote_state::get_remote_arch_state (struct gdbarch
*gdbarch
)
1290 remote_arch_state
*rsa
;
1292 auto it
= this->m_arch_states
.find (gdbarch
);
1293 if (it
== this->m_arch_states
.end ())
1295 auto p
= this->m_arch_states
.emplace (std::piecewise_construct
,
1296 std::forward_as_tuple (gdbarch
),
1297 std::forward_as_tuple (gdbarch
));
1298 rsa
= &p
.first
->second
;
1300 /* Make sure that the packet buffer is plenty big enough for
1301 this architecture. */
1302 if (this->buf
.size () < rsa
->remote_packet_size
)
1303 this->buf
.resize (2 * rsa
->remote_packet_size
);
1311 /* Fetch the global remote target state. */
1314 remote_target::get_remote_state ()
1316 /* Make sure that the remote architecture state has been
1317 initialized, because doing so might reallocate rs->buf. Any
1318 function which calls getpkt also needs to be mindful of changes
1319 to rs->buf, but this call limits the number of places which run
1321 m_remote_state
.get_remote_arch_state (target_gdbarch ());
1323 return &m_remote_state
;
1326 /* Fetch the remote exec-file from the current program space. */
1329 get_remote_exec_file (void)
1331 char *remote_exec_file
;
1333 remote_exec_file
= remote_pspace_data
.get (current_program_space
);
1334 if (remote_exec_file
== NULL
)
1337 return remote_exec_file
;
1340 /* Set the remote exec file for PSPACE. */
1343 set_pspace_remote_exec_file (struct program_space
*pspace
,
1344 const char *remote_exec_file
)
1346 char *old_file
= remote_pspace_data
.get (pspace
);
1349 remote_pspace_data
.set (pspace
, xstrdup (remote_exec_file
));
1352 /* The "set/show remote exec-file" set command hook. */
1355 set_remote_exec_file (const char *ignored
, int from_tty
,
1356 struct cmd_list_element
*c
)
1358 gdb_assert (remote_exec_file_var
!= NULL
);
1359 set_pspace_remote_exec_file (current_program_space
, remote_exec_file_var
);
1362 /* The "set/show remote exec-file" show command hook. */
1365 show_remote_exec_file (struct ui_file
*file
, int from_tty
,
1366 struct cmd_list_element
*cmd
, const char *value
)
1368 fprintf_filtered (file
, "%s\n", get_remote_exec_file ());
1372 map_regcache_remote_table (struct gdbarch
*gdbarch
, struct packet_reg
*regs
)
1374 int regnum
, num_remote_regs
, offset
;
1375 struct packet_reg
**remote_regs
;
1377 for (regnum
= 0; regnum
< gdbarch_num_regs (gdbarch
); regnum
++)
1379 struct packet_reg
*r
= ®s
[regnum
];
1381 if (register_size (gdbarch
, regnum
) == 0)
1382 /* Do not try to fetch zero-sized (placeholder) registers. */
1385 r
->pnum
= gdbarch_remote_register_number (gdbarch
, regnum
);
1390 /* Define the g/G packet format as the contents of each register
1391 with a remote protocol number, in order of ascending protocol
1394 remote_regs
= XALLOCAVEC (struct packet_reg
*, gdbarch_num_regs (gdbarch
));
1395 for (num_remote_regs
= 0, regnum
= 0;
1396 regnum
< gdbarch_num_regs (gdbarch
);
1398 if (regs
[regnum
].pnum
!= -1)
1399 remote_regs
[num_remote_regs
++] = ®s
[regnum
];
1401 std::sort (remote_regs
, remote_regs
+ num_remote_regs
,
1402 [] (const packet_reg
*a
, const packet_reg
*b
)
1403 { return a
->pnum
< b
->pnum
; });
1405 for (regnum
= 0, offset
= 0; regnum
< num_remote_regs
; regnum
++)
1407 remote_regs
[regnum
]->in_g_packet
= 1;
1408 remote_regs
[regnum
]->offset
= offset
;
1409 offset
+= register_size (gdbarch
, remote_regs
[regnum
]->regnum
);
1415 /* Given the architecture described by GDBARCH, return the remote
1416 protocol register's number and the register's offset in the g/G
1417 packets of GDB register REGNUM, in PNUM and POFFSET respectively.
1418 If the target does not have a mapping for REGNUM, return false,
1419 otherwise, return true. */
1422 remote_register_number_and_offset (struct gdbarch
*gdbarch
, int regnum
,
1423 int *pnum
, int *poffset
)
1425 gdb_assert (regnum
< gdbarch_num_regs (gdbarch
));
1427 std::vector
<packet_reg
> regs (gdbarch_num_regs (gdbarch
));
1429 map_regcache_remote_table (gdbarch
, regs
.data ());
1431 *pnum
= regs
[regnum
].pnum
;
1432 *poffset
= regs
[regnum
].offset
;
1437 remote_arch_state::remote_arch_state (struct gdbarch
*gdbarch
)
1439 /* Use the architecture to build a regnum<->pnum table, which will be
1440 1:1 unless a feature set specifies otherwise. */
1441 this->regs
.reset (new packet_reg
[gdbarch_num_regs (gdbarch
)] ());
1443 /* Record the maximum possible size of the g packet - it may turn out
1445 this->sizeof_g_packet
1446 = map_regcache_remote_table (gdbarch
, this->regs
.get ());
1448 /* Default maximum number of characters in a packet body. Many
1449 remote stubs have a hardwired buffer size of 400 bytes
1450 (c.f. BUFMAX in m68k-stub.c and i386-stub.c). BUFMAX-1 is used
1451 as the maximum packet-size to ensure that the packet and an extra
1452 NUL character can always fit in the buffer. This stops GDB
1453 trashing stubs that try to squeeze an extra NUL into what is
1454 already a full buffer (As of 1999-12-04 that was most stubs). */
1455 this->remote_packet_size
= 400 - 1;
1457 /* This one is filled in when a ``g'' packet is received. */
1458 this->actual_register_packet_size
= 0;
1460 /* Should rsa->sizeof_g_packet needs more space than the
1461 default, adjust the size accordingly. Remember that each byte is
1462 encoded as two characters. 32 is the overhead for the packet
1463 header / footer. NOTE: cagney/1999-10-26: I suspect that 8
1464 (``$NN:G...#NN'') is a better guess, the below has been padded a
1466 if (this->sizeof_g_packet
> ((this->remote_packet_size
- 32) / 2))
1467 this->remote_packet_size
= (this->sizeof_g_packet
* 2 + 32);
1470 /* Get a pointer to the current remote target. If not connected to a
1471 remote target, return NULL. */
1473 static remote_target
*
1474 get_current_remote_target ()
1476 target_ops
*proc_target
= current_inferior ()->process_target ();
1477 return dynamic_cast<remote_target
*> (proc_target
);
1480 /* Return the current allowed size of a remote packet. This is
1481 inferred from the current architecture, and should be used to
1482 limit the length of outgoing packets. */
1484 remote_target::get_remote_packet_size ()
1486 struct remote_state
*rs
= get_remote_state ();
1487 remote_arch_state
*rsa
= rs
->get_remote_arch_state (target_gdbarch ());
1489 if (rs
->explicit_packet_size
)
1490 return rs
->explicit_packet_size
;
1492 return rsa
->remote_packet_size
;
1495 static struct packet_reg
*
1496 packet_reg_from_regnum (struct gdbarch
*gdbarch
, struct remote_arch_state
*rsa
,
1499 if (regnum
< 0 && regnum
>= gdbarch_num_regs (gdbarch
))
1503 struct packet_reg
*r
= &rsa
->regs
[regnum
];
1505 gdb_assert (r
->regnum
== regnum
);
1510 static struct packet_reg
*
1511 packet_reg_from_pnum (struct gdbarch
*gdbarch
, struct remote_arch_state
*rsa
,
1516 for (i
= 0; i
< gdbarch_num_regs (gdbarch
); i
++)
1518 struct packet_reg
*r
= &rsa
->regs
[i
];
1520 if (r
->pnum
== pnum
)
1526 /* Allow the user to specify what sequence to send to the remote
1527 when he requests a program interruption: Although ^C is usually
1528 what remote systems expect (this is the default, here), it is
1529 sometimes preferable to send a break. On other systems such
1530 as the Linux kernel, a break followed by g, which is Magic SysRq g
1531 is required in order to interrupt the execution. */
1532 const char interrupt_sequence_control_c
[] = "Ctrl-C";
1533 const char interrupt_sequence_break
[] = "BREAK";
1534 const char interrupt_sequence_break_g
[] = "BREAK-g";
1535 static const char *const interrupt_sequence_modes
[] =
1537 interrupt_sequence_control_c
,
1538 interrupt_sequence_break
,
1539 interrupt_sequence_break_g
,
1542 static const char *interrupt_sequence_mode
= interrupt_sequence_control_c
;
1545 show_interrupt_sequence (struct ui_file
*file
, int from_tty
,
1546 struct cmd_list_element
*c
,
1549 if (interrupt_sequence_mode
== interrupt_sequence_control_c
)
1550 fprintf_filtered (file
,
1551 _("Send the ASCII ETX character (Ctrl-c) "
1552 "to the remote target to interrupt the "
1553 "execution of the program.\n"));
1554 else if (interrupt_sequence_mode
== interrupt_sequence_break
)
1555 fprintf_filtered (file
,
1556 _("send a break signal to the remote target "
1557 "to interrupt the execution of the program.\n"));
1558 else if (interrupt_sequence_mode
== interrupt_sequence_break_g
)
1559 fprintf_filtered (file
,
1560 _("Send a break signal and 'g' a.k.a. Magic SysRq g to "
1561 "the remote target to interrupt the execution "
1562 "of Linux kernel.\n"));
1564 internal_error (__FILE__
, __LINE__
,
1565 _("Invalid value for interrupt_sequence_mode: %s."),
1566 interrupt_sequence_mode
);
1569 /* This boolean variable specifies whether interrupt_sequence is sent
1570 to the remote target when gdb connects to it.
1571 This is mostly needed when you debug the Linux kernel: The Linux kernel
1572 expects BREAK g which is Magic SysRq g for connecting gdb. */
1573 static bool interrupt_on_connect
= false;
1575 /* This variable is used to implement the "set/show remotebreak" commands.
1576 Since these commands are now deprecated in favor of "set/show remote
1577 interrupt-sequence", it no longer has any effect on the code. */
1578 static bool remote_break
;
1581 set_remotebreak (const char *args
, int from_tty
, struct cmd_list_element
*c
)
1584 interrupt_sequence_mode
= interrupt_sequence_break
;
1586 interrupt_sequence_mode
= interrupt_sequence_control_c
;
1590 show_remotebreak (struct ui_file
*file
, int from_tty
,
1591 struct cmd_list_element
*c
,
1596 /* This variable sets the number of bits in an address that are to be
1597 sent in a memory ("M" or "m") packet. Normally, after stripping
1598 leading zeros, the entire address would be sent. This variable
1599 restricts the address to REMOTE_ADDRESS_SIZE bits. HISTORY: The
1600 initial implementation of remote.c restricted the address sent in
1601 memory packets to ``host::sizeof long'' bytes - (typically 32
1602 bits). Consequently, for 64 bit targets, the upper 32 bits of an
1603 address was never sent. Since fixing this bug may cause a break in
1604 some remote targets this variable is principally provided to
1605 facilitate backward compatibility. */
1607 static unsigned int remote_address_size
;
1610 /* User configurable variables for the number of characters in a
1611 memory read/write packet. MIN (rsa->remote_packet_size,
1612 rsa->sizeof_g_packet) is the default. Some targets need smaller
1613 values (fifo overruns, et.al.) and some users need larger values
1614 (speed up transfers). The variables ``preferred_*'' (the user
1615 request), ``current_*'' (what was actually set) and ``forced_*''
1616 (Positive - a soft limit, negative - a hard limit). */
1618 struct memory_packet_config
1625 /* The default max memory-write-packet-size, when the setting is
1626 "fixed". The 16k is historical. (It came from older GDB's using
1627 alloca for buffers and the knowledge (folklore?) that some hosts
1628 don't cope very well with large alloca calls.) */
1629 #define DEFAULT_MAX_MEMORY_PACKET_SIZE_FIXED 16384
1631 /* The minimum remote packet size for memory transfers. Ensures we
1632 can write at least one byte. */
1633 #define MIN_MEMORY_PACKET_SIZE 20
1635 /* Get the memory packet size, assuming it is fixed. */
1638 get_fixed_memory_packet_size (struct memory_packet_config
*config
)
1640 gdb_assert (config
->fixed_p
);
1642 if (config
->size
<= 0)
1643 return DEFAULT_MAX_MEMORY_PACKET_SIZE_FIXED
;
1645 return config
->size
;
1648 /* Compute the current size of a read/write packet. Since this makes
1649 use of ``actual_register_packet_size'' the computation is dynamic. */
1652 remote_target::get_memory_packet_size (struct memory_packet_config
*config
)
1654 struct remote_state
*rs
= get_remote_state ();
1655 remote_arch_state
*rsa
= rs
->get_remote_arch_state (target_gdbarch ());
1658 if (config
->fixed_p
)
1659 what_they_get
= get_fixed_memory_packet_size (config
);
1662 what_they_get
= get_remote_packet_size ();
1663 /* Limit the packet to the size specified by the user. */
1664 if (config
->size
> 0
1665 && what_they_get
> config
->size
)
1666 what_they_get
= config
->size
;
1668 /* Limit it to the size of the targets ``g'' response unless we have
1669 permission from the stub to use a larger packet size. */
1670 if (rs
->explicit_packet_size
== 0
1671 && rsa
->actual_register_packet_size
> 0
1672 && what_they_get
> rsa
->actual_register_packet_size
)
1673 what_they_get
= rsa
->actual_register_packet_size
;
1675 if (what_they_get
< MIN_MEMORY_PACKET_SIZE
)
1676 what_they_get
= MIN_MEMORY_PACKET_SIZE
;
1678 /* Make sure there is room in the global buffer for this packet
1679 (including its trailing NUL byte). */
1680 if (rs
->buf
.size () < what_they_get
+ 1)
1681 rs
->buf
.resize (2 * what_they_get
);
1683 return what_they_get
;
1686 /* Update the size of a read/write packet. If they user wants
1687 something really big then do a sanity check. */
1690 set_memory_packet_size (const char *args
, struct memory_packet_config
*config
)
1692 int fixed_p
= config
->fixed_p
;
1693 long size
= config
->size
;
1696 error (_("Argument required (integer, `fixed' or `limited')."));
1697 else if (strcmp (args
, "hard") == 0
1698 || strcmp (args
, "fixed") == 0)
1700 else if (strcmp (args
, "soft") == 0
1701 || strcmp (args
, "limit") == 0)
1707 size
= strtoul (args
, &end
, 0);
1709 error (_("Invalid %s (bad syntax)."), config
->name
);
1711 /* Instead of explicitly capping the size of a packet to or
1712 disallowing it, the user is allowed to set the size to
1713 something arbitrarily large. */
1717 if (fixed_p
&& !config
->fixed_p
)
1719 /* So that the query shows the correct value. */
1720 long query_size
= (size
<= 0
1721 ? DEFAULT_MAX_MEMORY_PACKET_SIZE_FIXED
1724 if (! query (_("The target may not be able to correctly handle a %s\n"
1725 "of %ld bytes. Change the packet size? "),
1726 config
->name
, query_size
))
1727 error (_("Packet size not changed."));
1729 /* Update the config. */
1730 config
->fixed_p
= fixed_p
;
1731 config
->size
= size
;
1735 show_memory_packet_size (struct memory_packet_config
*config
)
1737 if (config
->size
== 0)
1738 printf_filtered (_("The %s is 0 (default). "), config
->name
);
1740 printf_filtered (_("The %s is %ld. "), config
->name
, config
->size
);
1741 if (config
->fixed_p
)
1742 printf_filtered (_("Packets are fixed at %ld bytes.\n"),
1743 get_fixed_memory_packet_size (config
));
1746 remote_target
*remote
= get_current_remote_target ();
1749 printf_filtered (_("Packets are limited to %ld bytes.\n"),
1750 remote
->get_memory_packet_size (config
));
1752 puts_filtered ("The actual limit will be further reduced "
1753 "dependent on the target.\n");
1757 /* FIXME: needs to be per-remote-target. */
1758 static struct memory_packet_config memory_write_packet_config
=
1760 "memory-write-packet-size",
1764 set_memory_write_packet_size (const char *args
, int from_tty
)
1766 set_memory_packet_size (args
, &memory_write_packet_config
);
1770 show_memory_write_packet_size (const char *args
, int from_tty
)
1772 show_memory_packet_size (&memory_write_packet_config
);
1775 /* Show the number of hardware watchpoints that can be used. */
1778 show_hardware_watchpoint_limit (struct ui_file
*file
, int from_tty
,
1779 struct cmd_list_element
*c
,
1782 fprintf_filtered (file
, _("The maximum number of target hardware "
1783 "watchpoints is %s.\n"), value
);
1786 /* Show the length limit (in bytes) for hardware watchpoints. */
1789 show_hardware_watchpoint_length_limit (struct ui_file
*file
, int from_tty
,
1790 struct cmd_list_element
*c
,
1793 fprintf_filtered (file
, _("The maximum length (in bytes) of a target "
1794 "hardware watchpoint is %s.\n"), value
);
1797 /* Show the number of hardware breakpoints that can be used. */
1800 show_hardware_breakpoint_limit (struct ui_file
*file
, int from_tty
,
1801 struct cmd_list_element
*c
,
1804 fprintf_filtered (file
, _("The maximum number of target hardware "
1805 "breakpoints is %s.\n"), value
);
1808 /* Controls the maximum number of characters to display in the debug output
1809 for each remote packet. The remaining characters are omitted. */
1811 static int remote_packet_max_chars
= 512;
1813 /* Show the maximum number of characters to display for each remote packet
1814 when remote debugging is enabled. */
1817 show_remote_packet_max_chars (struct ui_file
*file
, int from_tty
,
1818 struct cmd_list_element
*c
,
1821 fprintf_filtered (file
, _("Number of remote packet characters to "
1822 "display is %s.\n"), value
);
1826 remote_target::get_memory_write_packet_size ()
1828 return get_memory_packet_size (&memory_write_packet_config
);
1831 /* FIXME: needs to be per-remote-target. */
1832 static struct memory_packet_config memory_read_packet_config
=
1834 "memory-read-packet-size",
1838 set_memory_read_packet_size (const char *args
, int from_tty
)
1840 set_memory_packet_size (args
, &memory_read_packet_config
);
1844 show_memory_read_packet_size (const char *args
, int from_tty
)
1846 show_memory_packet_size (&memory_read_packet_config
);
1850 remote_target::get_memory_read_packet_size ()
1852 long size
= get_memory_packet_size (&memory_read_packet_config
);
1854 /* FIXME: cagney/1999-11-07: Functions like getpkt() need to get an
1855 extra buffer size argument before the memory read size can be
1856 increased beyond this. */
1857 if (size
> get_remote_packet_size ())
1858 size
= get_remote_packet_size ();
1864 struct packet_config
1869 /* If auto, GDB auto-detects support for this packet or feature,
1870 either through qSupported, or by trying the packet and looking
1871 at the response. If true, GDB assumes the target supports this
1872 packet. If false, the packet is disabled. Configs that don't
1873 have an associated command always have this set to auto. */
1874 enum auto_boolean detect
;
1876 /* Does the target support this packet? */
1877 enum packet_support support
;
1880 static enum packet_support
packet_config_support (struct packet_config
*config
);
1881 static enum packet_support
packet_support (int packet
);
1884 show_packet_config_cmd (struct packet_config
*config
)
1886 const char *support
= "internal-error";
1888 switch (packet_config_support (config
))
1891 support
= "enabled";
1893 case PACKET_DISABLE
:
1894 support
= "disabled";
1896 case PACKET_SUPPORT_UNKNOWN
:
1897 support
= "unknown";
1900 switch (config
->detect
)
1902 case AUTO_BOOLEAN_AUTO
:
1903 printf_filtered (_("Support for the `%s' packet "
1904 "is auto-detected, currently %s.\n"),
1905 config
->name
, support
);
1907 case AUTO_BOOLEAN_TRUE
:
1908 case AUTO_BOOLEAN_FALSE
:
1909 printf_filtered (_("Support for the `%s' packet is currently %s.\n"),
1910 config
->name
, support
);
1916 add_packet_config_cmd (struct packet_config
*config
, const char *name
,
1917 const char *title
, int legacy
)
1923 config
->name
= name
;
1924 config
->title
= title
;
1925 set_doc
= xstrprintf ("Set use of remote protocol `%s' (%s) packet.",
1927 show_doc
= xstrprintf ("Show current use of remote "
1928 "protocol `%s' (%s) packet.",
1930 /* set/show TITLE-packet {auto,on,off} */
1931 cmd_name
= xstrprintf ("%s-packet", title
);
1932 set_show_commands cmds
1933 = add_setshow_auto_boolean_cmd (cmd_name
, class_obscure
,
1934 &config
->detect
, set_doc
,
1935 show_doc
, NULL
, /* help_doc */
1937 show_remote_protocol_packet_cmd
,
1938 &remote_set_cmdlist
, &remote_show_cmdlist
);
1940 /* The command code copies the documentation strings. */
1944 /* set/show remote NAME-packet {auto,on,off} -- legacy. */
1949 legacy_name
= xstrprintf ("%s-packet", name
);
1950 add_alias_cmd (legacy_name
, cmds
.set
, class_obscure
, 0,
1951 &remote_set_cmdlist
);
1952 add_alias_cmd (legacy_name
, cmds
.show
, class_obscure
, 0,
1953 &remote_show_cmdlist
);
1957 static enum packet_result
1958 packet_check_result (const char *buf
)
1962 /* The stub recognized the packet request. Check that the
1963 operation succeeded. */
1965 && isxdigit (buf
[1]) && isxdigit (buf
[2])
1967 /* "Enn" - definitely an error. */
1968 return PACKET_ERROR
;
1970 /* Always treat "E." as an error. This will be used for
1971 more verbose error messages, such as E.memtypes. */
1972 if (buf
[0] == 'E' && buf
[1] == '.')
1973 return PACKET_ERROR
;
1975 /* The packet may or may not be OK. Just assume it is. */
1979 /* The stub does not support the packet. */
1980 return PACKET_UNKNOWN
;
1983 static enum packet_result
1984 packet_check_result (const gdb::char_vector
&buf
)
1986 return packet_check_result (buf
.data ());
1989 static enum packet_result
1990 packet_ok (const char *buf
, struct packet_config
*config
)
1992 enum packet_result result
;
1994 if (config
->detect
!= AUTO_BOOLEAN_TRUE
1995 && config
->support
== PACKET_DISABLE
)
1996 internal_error (__FILE__
, __LINE__
,
1997 _("packet_ok: attempt to use a disabled packet"));
1999 result
= packet_check_result (buf
);
2004 /* The stub recognized the packet request. */
2005 if (config
->support
== PACKET_SUPPORT_UNKNOWN
)
2007 remote_debug_printf ("Packet %s (%s) is supported",
2008 config
->name
, config
->title
);
2009 config
->support
= PACKET_ENABLE
;
2012 case PACKET_UNKNOWN
:
2013 /* The stub does not support the packet. */
2014 if (config
->detect
== AUTO_BOOLEAN_AUTO
2015 && config
->support
== PACKET_ENABLE
)
2017 /* If the stub previously indicated that the packet was
2018 supported then there is a protocol error. */
2019 error (_("Protocol error: %s (%s) conflicting enabled responses."),
2020 config
->name
, config
->title
);
2022 else if (config
->detect
== AUTO_BOOLEAN_TRUE
)
2024 /* The user set it wrong. */
2025 error (_("Enabled packet %s (%s) not recognized by stub"),
2026 config
->name
, config
->title
);
2029 remote_debug_printf ("Packet %s (%s) is NOT supported",
2030 config
->name
, config
->title
);
2031 config
->support
= PACKET_DISABLE
;
2038 static enum packet_result
2039 packet_ok (const gdb::char_vector
&buf
, struct packet_config
*config
)
2041 return packet_ok (buf
.data (), config
);
2058 PACKET_vFile_pwrite
,
2060 PACKET_vFile_unlink
,
2061 PACKET_vFile_readlink
,
2064 PACKET_qXfer_features
,
2065 PACKET_qXfer_exec_file
,
2066 PACKET_qXfer_libraries
,
2067 PACKET_qXfer_libraries_svr4
,
2068 PACKET_qXfer_memory_map
,
2069 PACKET_qXfer_osdata
,
2070 PACKET_qXfer_threads
,
2071 PACKET_qXfer_statictrace_read
,
2072 PACKET_qXfer_traceframe_info
,
2078 PACKET_QPassSignals
,
2079 PACKET_QCatchSyscalls
,
2080 PACKET_QProgramSignals
,
2081 PACKET_QSetWorkingDir
,
2082 PACKET_QStartupWithShell
,
2083 PACKET_QEnvironmentHexEncoded
,
2084 PACKET_QEnvironmentReset
,
2085 PACKET_QEnvironmentUnset
,
2087 PACKET_qSearch_memory
,
2090 PACKET_QStartNoAckMode
,
2092 PACKET_qXfer_siginfo_read
,
2093 PACKET_qXfer_siginfo_write
,
2096 /* Support for conditional tracepoints. */
2097 PACKET_ConditionalTracepoints
,
2099 /* Support for target-side breakpoint conditions. */
2100 PACKET_ConditionalBreakpoints
,
2102 /* Support for target-side breakpoint commands. */
2103 PACKET_BreakpointCommands
,
2105 /* Support for fast tracepoints. */
2106 PACKET_FastTracepoints
,
2108 /* Support for static tracepoints. */
2109 PACKET_StaticTracepoints
,
2111 /* Support for installing tracepoints while a trace experiment is
2113 PACKET_InstallInTrace
,
2117 PACKET_TracepointSource
,
2120 PACKET_QDisableRandomization
,
2122 PACKET_QTBuffer_size
,
2126 PACKET_qXfer_btrace
,
2128 /* Support for the QNonStop packet. */
2131 /* Support for the QThreadEvents packet. */
2132 PACKET_QThreadEvents
,
2134 /* Support for multi-process extensions. */
2135 PACKET_multiprocess_feature
,
2137 /* Support for enabling and disabling tracepoints while a trace
2138 experiment is running. */
2139 PACKET_EnableDisableTracepoints_feature
,
2141 /* Support for collecting strings using the tracenz bytecode. */
2142 PACKET_tracenz_feature
,
2144 /* Support for continuing to run a trace experiment while GDB is
2146 PACKET_DisconnectedTracing_feature
,
2148 /* Support for qXfer:libraries-svr4:read with a non-empty annex. */
2149 PACKET_augmented_libraries_svr4_read_feature
,
2151 /* Support for the qXfer:btrace-conf:read packet. */
2152 PACKET_qXfer_btrace_conf
,
2154 /* Support for the Qbtrace-conf:bts:size packet. */
2155 PACKET_Qbtrace_conf_bts_size
,
2157 /* Support for swbreak+ feature. */
2158 PACKET_swbreak_feature
,
2160 /* Support for hwbreak+ feature. */
2161 PACKET_hwbreak_feature
,
2163 /* Support for fork events. */
2164 PACKET_fork_event_feature
,
2166 /* Support for vfork events. */
2167 PACKET_vfork_event_feature
,
2169 /* Support for the Qbtrace-conf:pt:size packet. */
2170 PACKET_Qbtrace_conf_pt_size
,
2172 /* Support for exec events. */
2173 PACKET_exec_event_feature
,
2175 /* Support for query supported vCont actions. */
2176 PACKET_vContSupported
,
2178 /* Support remote CTRL-C. */
2181 /* Support TARGET_WAITKIND_NO_RESUMED. */
2184 /* Support for memory tagging, allocation tag fetch/store
2185 packets and the tag violation stop replies. */
2186 PACKET_memory_tagging_feature
,
2191 /* FIXME: needs to be per-remote-target. Ignoring this for now,
2192 assuming all remote targets are the same server (thus all support
2193 the same packets). */
2194 static struct packet_config remote_protocol_packets
[PACKET_MAX
];
2196 /* Returns the packet's corresponding "set remote foo-packet" command
2197 state. See struct packet_config for more details. */
2199 static enum auto_boolean
2200 packet_set_cmd_state (int packet
)
2202 return remote_protocol_packets
[packet
].detect
;
2205 /* Returns whether a given packet or feature is supported. This takes
2206 into account the state of the corresponding "set remote foo-packet"
2207 command, which may be used to bypass auto-detection. */
2209 static enum packet_support
2210 packet_config_support (struct packet_config
*config
)
2212 switch (config
->detect
)
2214 case AUTO_BOOLEAN_TRUE
:
2215 return PACKET_ENABLE
;
2216 case AUTO_BOOLEAN_FALSE
:
2217 return PACKET_DISABLE
;
2218 case AUTO_BOOLEAN_AUTO
:
2219 return config
->support
;
2221 gdb_assert_not_reached (_("bad switch"));
2225 /* Same as packet_config_support, but takes the packet's enum value as
2228 static enum packet_support
2229 packet_support (int packet
)
2231 struct packet_config
*config
= &remote_protocol_packets
[packet
];
2233 return packet_config_support (config
);
2237 show_remote_protocol_packet_cmd (struct ui_file
*file
, int from_tty
,
2238 struct cmd_list_element
*c
,
2241 struct packet_config
*packet
;
2243 for (packet
= remote_protocol_packets
;
2244 packet
< &remote_protocol_packets
[PACKET_MAX
];
2247 if (&packet
->detect
== c
->var
)
2249 show_packet_config_cmd (packet
);
2253 internal_error (__FILE__
, __LINE__
, _("Could not find config for %s"),
2257 /* Should we try one of the 'Z' requests? */
2261 Z_PACKET_SOFTWARE_BP
,
2262 Z_PACKET_HARDWARE_BP
,
2269 /* For compatibility with older distributions. Provide a ``set remote
2270 Z-packet ...'' command that updates all the Z packet types. */
2272 static enum auto_boolean remote_Z_packet_detect
;
2275 set_remote_protocol_Z_packet_cmd (const char *args
, int from_tty
,
2276 struct cmd_list_element
*c
)
2280 for (i
= 0; i
< NR_Z_PACKET_TYPES
; i
++)
2281 remote_protocol_packets
[PACKET_Z0
+ i
].detect
= remote_Z_packet_detect
;
2285 show_remote_protocol_Z_packet_cmd (struct ui_file
*file
, int from_tty
,
2286 struct cmd_list_element
*c
,
2291 for (i
= 0; i
< NR_Z_PACKET_TYPES
; i
++)
2293 show_packet_config_cmd (&remote_protocol_packets
[PACKET_Z0
+ i
]);
2297 /* Returns true if the multi-process extensions are in effect. */
2300 remote_multi_process_p (struct remote_state
*rs
)
2302 return packet_support (PACKET_multiprocess_feature
) == PACKET_ENABLE
;
2305 /* Returns true if fork events are supported. */
2308 remote_fork_event_p (struct remote_state
*rs
)
2310 return packet_support (PACKET_fork_event_feature
) == PACKET_ENABLE
;
2313 /* Returns true if vfork events are supported. */
2316 remote_vfork_event_p (struct remote_state
*rs
)
2318 return packet_support (PACKET_vfork_event_feature
) == PACKET_ENABLE
;
2321 /* Returns true if exec events are supported. */
2324 remote_exec_event_p (struct remote_state
*rs
)
2326 return packet_support (PACKET_exec_event_feature
) == PACKET_ENABLE
;
2329 /* Returns true if memory tagging is supported, false otherwise. */
2332 remote_memory_tagging_p ()
2334 return packet_support (PACKET_memory_tagging_feature
) == PACKET_ENABLE
;
2337 /* Insert fork catchpoint target routine. If fork events are enabled
2338 then return success, nothing more to do. */
2341 remote_target::insert_fork_catchpoint (int pid
)
2343 struct remote_state
*rs
= get_remote_state ();
2345 return !remote_fork_event_p (rs
);
2348 /* Remove fork catchpoint target routine. Nothing to do, just
2352 remote_target::remove_fork_catchpoint (int pid
)
2357 /* Insert vfork catchpoint target routine. If vfork events are enabled
2358 then return success, nothing more to do. */
2361 remote_target::insert_vfork_catchpoint (int pid
)
2363 struct remote_state
*rs
= get_remote_state ();
2365 return !remote_vfork_event_p (rs
);
2368 /* Remove vfork catchpoint target routine. Nothing to do, just
2372 remote_target::remove_vfork_catchpoint (int pid
)
2377 /* Insert exec catchpoint target routine. If exec events are
2378 enabled, just return success. */
2381 remote_target::insert_exec_catchpoint (int pid
)
2383 struct remote_state
*rs
= get_remote_state ();
2385 return !remote_exec_event_p (rs
);
2388 /* Remove exec catchpoint target routine. Nothing to do, just
2392 remote_target::remove_exec_catchpoint (int pid
)
2399 /* Take advantage of the fact that the TID field is not used, to tag
2400 special ptids with it set to != 0. */
2401 static const ptid_t
magic_null_ptid (42000, -1, 1);
2402 static const ptid_t
not_sent_ptid (42000, -2, 1);
2403 static const ptid_t
any_thread_ptid (42000, 0, 1);
2405 /* Find out if the stub attached to PID (and hence GDB should offer to
2406 detach instead of killing it when bailing out). */
2409 remote_target::remote_query_attached (int pid
)
2411 struct remote_state
*rs
= get_remote_state ();
2412 size_t size
= get_remote_packet_size ();
2414 if (packet_support (PACKET_qAttached
) == PACKET_DISABLE
)
2417 if (remote_multi_process_p (rs
))
2418 xsnprintf (rs
->buf
.data (), size
, "qAttached:%x", pid
);
2420 xsnprintf (rs
->buf
.data (), size
, "qAttached");
2423 getpkt (&rs
->buf
, 0);
2425 switch (packet_ok (rs
->buf
,
2426 &remote_protocol_packets
[PACKET_qAttached
]))
2429 if (strcmp (rs
->buf
.data (), "1") == 0)
2433 warning (_("Remote failure reply: %s"), rs
->buf
.data ());
2435 case PACKET_UNKNOWN
:
2442 /* Add PID to GDB's inferior table. If FAKE_PID_P is true, then PID
2443 has been invented by GDB, instead of reported by the target. Since
2444 we can be connected to a remote system before before knowing about
2445 any inferior, mark the target with execution when we find the first
2446 inferior. If ATTACHED is 1, then we had just attached to this
2447 inferior. If it is 0, then we just created this inferior. If it
2448 is -1, then try querying the remote stub to find out if it had
2449 attached to the inferior or not. If TRY_OPEN_EXEC is true then
2450 attempt to open this inferior's executable as the main executable
2451 if no main executable is open already. */
2454 remote_target::remote_add_inferior (bool fake_pid_p
, int pid
, int attached
,
2457 struct inferior
*inf
;
2459 /* Check whether this process we're learning about is to be
2460 considered attached, or if is to be considered to have been
2461 spawned by the stub. */
2463 attached
= remote_query_attached (pid
);
2465 if (gdbarch_has_global_solist (target_gdbarch ()))
2467 /* If the target shares code across all inferiors, then every
2468 attach adds a new inferior. */
2469 inf
= add_inferior (pid
);
2471 /* ... and every inferior is bound to the same program space.
2472 However, each inferior may still have its own address
2474 inf
->aspace
= maybe_new_address_space ();
2475 inf
->pspace
= current_program_space
;
2479 /* In the traditional debugging scenario, there's a 1-1 match
2480 between program/address spaces. We simply bind the inferior
2481 to the program space's address space. */
2482 inf
= current_inferior ();
2484 /* However, if the current inferior is already bound to a
2485 process, find some other empty inferior. */
2489 for (inferior
*it
: all_inferiors ())
2498 /* Since all inferiors were already bound to a process, add
2500 inf
= add_inferior_with_spaces ();
2502 switch_to_inferior_no_thread (inf
);
2503 inf
->push_target (this);
2504 inferior_appeared (inf
, pid
);
2507 inf
->attach_flag
= attached
;
2508 inf
->fake_pid_p
= fake_pid_p
;
2510 /* If no main executable is currently open then attempt to
2511 open the file that was executed to create this inferior. */
2512 if (try_open_exec
&& get_exec_file (0) == NULL
)
2513 exec_file_locate_attach (pid
, 0, 1);
2515 /* Check for exec file mismatch, and let the user solve it. */
2516 validate_exec_file (1);
2521 static remote_thread_info
*get_remote_thread_info (thread_info
*thread
);
2522 static remote_thread_info
*get_remote_thread_info (remote_target
*target
,
2525 /* Add thread PTID to GDB's thread list. Tag it as executing/running
2526 according to RUNNING. */
2529 remote_target::remote_add_thread (ptid_t ptid
, bool running
, bool executing
)
2531 struct remote_state
*rs
= get_remote_state ();
2532 struct thread_info
*thread
;
2534 /* GDB historically didn't pull threads in the initial connection
2535 setup. If the remote target doesn't even have a concept of
2536 threads (e.g., a bare-metal target), even if internally we
2537 consider that a single-threaded target, mentioning a new thread
2538 might be confusing to the user. Be silent then, preserving the
2539 age old behavior. */
2540 if (rs
->starting_up
)
2541 thread
= add_thread_silent (this, ptid
);
2543 thread
= add_thread (this, ptid
);
2545 /* We start by assuming threads are resumed. That state then gets updated
2546 when we process a matching stop reply. */
2547 get_remote_thread_info (thread
)->set_resumed ();
2549 set_executing (this, ptid
, executing
);
2550 set_running (this, ptid
, running
);
2555 /* Come here when we learn about a thread id from the remote target.
2556 It may be the first time we hear about such thread, so take the
2557 opportunity to add it to GDB's thread list. In case this is the
2558 first time we're noticing its corresponding inferior, add it to
2559 GDB's inferior list as well. EXECUTING indicates whether the
2560 thread is (internally) executing or stopped. */
2563 remote_target::remote_notice_new_inferior (ptid_t currthread
, bool executing
)
2565 /* In non-stop mode, we assume new found threads are (externally)
2566 running until proven otherwise with a stop reply. In all-stop,
2567 we can only get here if all threads are stopped. */
2568 bool running
= target_is_non_stop_p ();
2570 /* If this is a new thread, add it to GDB's thread list.
2571 If we leave it up to WFI to do this, bad things will happen. */
2573 thread_info
*tp
= find_thread_ptid (this, currthread
);
2574 if (tp
!= NULL
&& tp
->state
== THREAD_EXITED
)
2576 /* We're seeing an event on a thread id we knew had exited.
2577 This has to be a new thread reusing the old id. Add it. */
2578 remote_add_thread (currthread
, running
, executing
);
2582 if (!in_thread_list (this, currthread
))
2584 struct inferior
*inf
= NULL
;
2585 int pid
= currthread
.pid ();
2587 if (inferior_ptid
.is_pid ()
2588 && pid
== inferior_ptid
.pid ())
2590 /* inferior_ptid has no thread member yet. This can happen
2591 with the vAttach -> remote_wait,"TAAthread:" path if the
2592 stub doesn't support qC. This is the first stop reported
2593 after an attach, so this is the main thread. Update the
2594 ptid in the thread list. */
2595 if (in_thread_list (this, ptid_t (pid
)))
2596 thread_change_ptid (this, inferior_ptid
, currthread
);
2600 = remote_add_thread (currthread
, running
, executing
);
2601 switch_to_thread (thr
);
2606 if (magic_null_ptid
== inferior_ptid
)
2608 /* inferior_ptid is not set yet. This can happen with the
2609 vRun -> remote_wait,"TAAthread:" path if the stub
2610 doesn't support qC. This is the first stop reported
2611 after an attach, so this is the main thread. Update the
2612 ptid in the thread list. */
2613 thread_change_ptid (this, inferior_ptid
, currthread
);
2617 /* When connecting to a target remote, or to a target
2618 extended-remote which already was debugging an inferior, we
2619 may not know about it yet. Add it before adding its child
2620 thread, so notifications are emitted in a sensible order. */
2621 if (find_inferior_pid (this, currthread
.pid ()) == NULL
)
2623 struct remote_state
*rs
= get_remote_state ();
2624 bool fake_pid_p
= !remote_multi_process_p (rs
);
2626 inf
= remote_add_inferior (fake_pid_p
,
2627 currthread
.pid (), -1, 1);
2630 /* This is really a new thread. Add it. */
2631 thread_info
*new_thr
2632 = remote_add_thread (currthread
, running
, executing
);
2634 /* If we found a new inferior, let the common code do whatever
2635 it needs to with it (e.g., read shared libraries, insert
2636 breakpoints), unless we're just setting up an all-stop
2640 struct remote_state
*rs
= get_remote_state ();
2642 if (!rs
->starting_up
)
2643 notice_new_inferior (new_thr
, executing
, 0);
2648 /* Return THREAD's private thread data, creating it if necessary. */
2650 static remote_thread_info
*
2651 get_remote_thread_info (thread_info
*thread
)
2653 gdb_assert (thread
!= NULL
);
2655 if (thread
->priv
== NULL
)
2656 thread
->priv
.reset (new remote_thread_info
);
2658 return static_cast<remote_thread_info
*> (thread
->priv
.get ());
2661 /* Return PTID's private thread data, creating it if necessary. */
2663 static remote_thread_info
*
2664 get_remote_thread_info (remote_target
*target
, ptid_t ptid
)
2666 thread_info
*thr
= find_thread_ptid (target
, ptid
);
2667 return get_remote_thread_info (thr
);
2670 /* Call this function as a result of
2671 1) A halt indication (T packet) containing a thread id
2672 2) A direct query of currthread
2673 3) Successful execution of set thread */
2676 record_currthread (struct remote_state
*rs
, ptid_t currthread
)
2678 rs
->general_thread
= currthread
;
2681 /* If 'QPassSignals' is supported, tell the remote stub what signals
2682 it can simply pass through to the inferior without reporting. */
2685 remote_target::pass_signals (gdb::array_view
<const unsigned char> pass_signals
)
2687 if (packet_support (PACKET_QPassSignals
) != PACKET_DISABLE
)
2689 char *pass_packet
, *p
;
2691 struct remote_state
*rs
= get_remote_state ();
2693 gdb_assert (pass_signals
.size () < 256);
2694 for (size_t i
= 0; i
< pass_signals
.size (); i
++)
2696 if (pass_signals
[i
])
2699 pass_packet
= (char *) xmalloc (count
* 3 + strlen ("QPassSignals:") + 1);
2700 strcpy (pass_packet
, "QPassSignals:");
2701 p
= pass_packet
+ strlen (pass_packet
);
2702 for (size_t i
= 0; i
< pass_signals
.size (); i
++)
2704 if (pass_signals
[i
])
2707 *p
++ = tohex (i
>> 4);
2708 *p
++ = tohex (i
& 15);
2717 if (!rs
->last_pass_packet
|| strcmp (rs
->last_pass_packet
, pass_packet
))
2719 putpkt (pass_packet
);
2720 getpkt (&rs
->buf
, 0);
2721 packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_QPassSignals
]);
2722 xfree (rs
->last_pass_packet
);
2723 rs
->last_pass_packet
= pass_packet
;
2726 xfree (pass_packet
);
2730 /* If 'QCatchSyscalls' is supported, tell the remote stub
2731 to report syscalls to GDB. */
2734 remote_target::set_syscall_catchpoint (int pid
, bool needed
, int any_count
,
2735 gdb::array_view
<const int> syscall_counts
)
2737 const char *catch_packet
;
2738 enum packet_result result
;
2741 if (packet_support (PACKET_QCatchSyscalls
) == PACKET_DISABLE
)
2743 /* Not supported. */
2747 if (needed
&& any_count
== 0)
2749 /* Count how many syscalls are to be caught. */
2750 for (size_t i
= 0; i
< syscall_counts
.size (); i
++)
2752 if (syscall_counts
[i
] != 0)
2757 remote_debug_printf ("pid %d needed %d any_count %d n_sysno %d",
2758 pid
, needed
, any_count
, n_sysno
);
2760 std::string built_packet
;
2763 /* Prepare a packet with the sysno list, assuming max 8+1
2764 characters for a sysno. If the resulting packet size is too
2765 big, fallback on the non-selective packet. */
2766 const int maxpktsz
= strlen ("QCatchSyscalls:1") + n_sysno
* 9 + 1;
2767 built_packet
.reserve (maxpktsz
);
2768 built_packet
= "QCatchSyscalls:1";
2771 /* Add in each syscall to be caught. */
2772 for (size_t i
= 0; i
< syscall_counts
.size (); i
++)
2774 if (syscall_counts
[i
] != 0)
2775 string_appendf (built_packet
, ";%zx", i
);
2778 if (built_packet
.size () > get_remote_packet_size ())
2780 /* catch_packet too big. Fallback to less efficient
2781 non selective mode, with GDB doing the filtering. */
2782 catch_packet
= "QCatchSyscalls:1";
2785 catch_packet
= built_packet
.c_str ();
2788 catch_packet
= "QCatchSyscalls:0";
2790 struct remote_state
*rs
= get_remote_state ();
2792 putpkt (catch_packet
);
2793 getpkt (&rs
->buf
, 0);
2794 result
= packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_QCatchSyscalls
]);
2795 if (result
== PACKET_OK
)
2801 /* If 'QProgramSignals' is supported, tell the remote stub what
2802 signals it should pass through to the inferior when detaching. */
2805 remote_target::program_signals (gdb::array_view
<const unsigned char> signals
)
2807 if (packet_support (PACKET_QProgramSignals
) != PACKET_DISABLE
)
2811 struct remote_state
*rs
= get_remote_state ();
2813 gdb_assert (signals
.size () < 256);
2814 for (size_t i
= 0; i
< signals
.size (); i
++)
2819 packet
= (char *) xmalloc (count
* 3 + strlen ("QProgramSignals:") + 1);
2820 strcpy (packet
, "QProgramSignals:");
2821 p
= packet
+ strlen (packet
);
2822 for (size_t i
= 0; i
< signals
.size (); i
++)
2824 if (signal_pass_state (i
))
2827 *p
++ = tohex (i
>> 4);
2828 *p
++ = tohex (i
& 15);
2837 if (!rs
->last_program_signals_packet
2838 || strcmp (rs
->last_program_signals_packet
, packet
) != 0)
2841 getpkt (&rs
->buf
, 0);
2842 packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_QProgramSignals
]);
2843 xfree (rs
->last_program_signals_packet
);
2844 rs
->last_program_signals_packet
= packet
;
2851 /* If PTID is MAGIC_NULL_PTID, don't set any thread. If PTID is
2852 MINUS_ONE_PTID, set the thread to -1, so the stub returns the
2853 thread. If GEN is set, set the general thread, if not, then set
2854 the step/continue thread. */
2856 remote_target::set_thread (ptid_t ptid
, int gen
)
2858 struct remote_state
*rs
= get_remote_state ();
2859 ptid_t state
= gen
? rs
->general_thread
: rs
->continue_thread
;
2860 char *buf
= rs
->buf
.data ();
2861 char *endbuf
= buf
+ get_remote_packet_size ();
2867 *buf
++ = gen
? 'g' : 'c';
2868 if (ptid
== magic_null_ptid
)
2869 xsnprintf (buf
, endbuf
- buf
, "0");
2870 else if (ptid
== any_thread_ptid
)
2871 xsnprintf (buf
, endbuf
- buf
, "0");
2872 else if (ptid
== minus_one_ptid
)
2873 xsnprintf (buf
, endbuf
- buf
, "-1");
2875 write_ptid (buf
, endbuf
, ptid
);
2877 getpkt (&rs
->buf
, 0);
2879 rs
->general_thread
= ptid
;
2881 rs
->continue_thread
= ptid
;
2885 remote_target::set_general_thread (ptid_t ptid
)
2887 set_thread (ptid
, 1);
2891 remote_target::set_continue_thread (ptid_t ptid
)
2893 set_thread (ptid
, 0);
2896 /* Change the remote current process. Which thread within the process
2897 ends up selected isn't important, as long as it is the same process
2898 as what INFERIOR_PTID points to.
2900 This comes from that fact that there is no explicit notion of
2901 "selected process" in the protocol. The selected process for
2902 general operations is the process the selected general thread
2906 remote_target::set_general_process ()
2908 struct remote_state
*rs
= get_remote_state ();
2910 /* If the remote can't handle multiple processes, don't bother. */
2911 if (!remote_multi_process_p (rs
))
2914 /* We only need to change the remote current thread if it's pointing
2915 at some other process. */
2916 if (rs
->general_thread
.pid () != inferior_ptid
.pid ())
2917 set_general_thread (inferior_ptid
);
2921 /* Return nonzero if this is the main thread that we made up ourselves
2922 to model non-threaded targets as single-threaded. */
2925 remote_thread_always_alive (ptid_t ptid
)
2927 if (ptid
== magic_null_ptid
)
2928 /* The main thread is always alive. */
2931 if (ptid
.pid () != 0 && ptid
.lwp () == 0)
2932 /* The main thread is always alive. This can happen after a
2933 vAttach, if the remote side doesn't support
2940 /* Return nonzero if the thread PTID is still alive on the remote
2944 remote_target::thread_alive (ptid_t ptid
)
2946 struct remote_state
*rs
= get_remote_state ();
2949 /* Check if this is a thread that we made up ourselves to model
2950 non-threaded targets as single-threaded. */
2951 if (remote_thread_always_alive (ptid
))
2954 p
= rs
->buf
.data ();
2955 endp
= p
+ get_remote_packet_size ();
2958 write_ptid (p
, endp
, ptid
);
2961 getpkt (&rs
->buf
, 0);
2962 return (rs
->buf
[0] == 'O' && rs
->buf
[1] == 'K');
2965 /* Return a pointer to a thread name if we know it and NULL otherwise.
2966 The thread_info object owns the memory for the name. */
2969 remote_target::thread_name (struct thread_info
*info
)
2971 if (info
->priv
!= NULL
)
2973 const std::string
&name
= get_remote_thread_info (info
)->name
;
2974 return !name
.empty () ? name
.c_str () : NULL
;
2980 /* About these extended threadlist and threadinfo packets. They are
2981 variable length packets but, the fields within them are often fixed
2982 length. They are redundant enough to send over UDP as is the
2983 remote protocol in general. There is a matching unit test module
2986 /* WARNING: This threadref data structure comes from the remote O.S.,
2987 libstub protocol encoding, and remote.c. It is not particularly
2990 /* Right now, the internal structure is int. We want it to be bigger.
2991 Plan to fix this. */
2993 typedef int gdb_threadref
; /* Internal GDB thread reference. */
2995 /* gdb_ext_thread_info is an internal GDB data structure which is
2996 equivalent to the reply of the remote threadinfo packet. */
2998 struct gdb_ext_thread_info
3000 threadref threadid
; /* External form of thread reference. */
3001 int active
; /* Has state interesting to GDB?
3003 char display
[256]; /* Brief state display, name,
3004 blocked/suspended. */
3005 char shortname
[32]; /* To be used to name threads. */
3006 char more_display
[256]; /* Long info, statistics, queue depth,
3010 /* The volume of remote transfers can be limited by submitting
3011 a mask containing bits specifying the desired information.
3012 Use a union of these values as the 'selection' parameter to
3013 get_thread_info. FIXME: Make these TAG names more thread specific. */
3015 #define TAG_THREADID 1
3016 #define TAG_EXISTS 2
3017 #define TAG_DISPLAY 4
3018 #define TAG_THREADNAME 8
3019 #define TAG_MOREDISPLAY 16
3021 #define BUF_THREAD_ID_SIZE (OPAQUETHREADBYTES * 2)
3023 static const char *unpack_nibble (const char *buf
, int *val
);
3025 static const char *unpack_byte (const char *buf
, int *value
);
3027 static char *pack_int (char *buf
, int value
);
3029 static const char *unpack_int (const char *buf
, int *value
);
3031 static const char *unpack_string (const char *src
, char *dest
, int length
);
3033 static char *pack_threadid (char *pkt
, threadref
*id
);
3035 static const char *unpack_threadid (const char *inbuf
, threadref
*id
);
3037 void int_to_threadref (threadref
*id
, int value
);
3039 static int threadref_to_int (threadref
*ref
);
3041 static void copy_threadref (threadref
*dest
, threadref
*src
);
3043 static int threadmatch (threadref
*dest
, threadref
*src
);
3045 static char *pack_threadinfo_request (char *pkt
, int mode
,
3048 static char *pack_threadlist_request (char *pkt
, int startflag
,
3050 threadref
*nextthread
);
3052 static int remote_newthread_step (threadref
*ref
, void *context
);
3055 /* Write a PTID to BUF. ENDBUF points to one-passed-the-end of the
3056 buffer we're allowed to write to. Returns
3057 BUF+CHARACTERS_WRITTEN. */
3060 remote_target::write_ptid (char *buf
, const char *endbuf
, ptid_t ptid
)
3063 struct remote_state
*rs
= get_remote_state ();
3065 if (remote_multi_process_p (rs
))
3069 buf
+= xsnprintf (buf
, endbuf
- buf
, "p-%x.", -pid
);
3071 buf
+= xsnprintf (buf
, endbuf
- buf
, "p%x.", pid
);
3075 buf
+= xsnprintf (buf
, endbuf
- buf
, "-%x", -tid
);
3077 buf
+= xsnprintf (buf
, endbuf
- buf
, "%x", tid
);
3082 /* Extract a PTID from BUF. If non-null, OBUF is set to one past the
3083 last parsed char. Returns null_ptid if no thread id is found, and
3084 throws an error if the thread id has an invalid format. */
3087 read_ptid (const char *buf
, const char **obuf
)
3089 const char *p
= buf
;
3091 ULONGEST pid
= 0, tid
= 0;
3095 /* Multi-process ptid. */
3096 pp
= unpack_varlen_hex (p
+ 1, &pid
);
3098 error (_("invalid remote ptid: %s"), p
);
3101 pp
= unpack_varlen_hex (p
+ 1, &tid
);
3104 return ptid_t (pid
, tid
);
3107 /* No multi-process. Just a tid. */
3108 pp
= unpack_varlen_hex (p
, &tid
);
3110 /* Return null_ptid when no thread id is found. */
3118 /* Since the stub is not sending a process id, then default to
3119 what's in inferior_ptid, unless it's null at this point. If so,
3120 then since there's no way to know the pid of the reported
3121 threads, use the magic number. */
3122 if (inferior_ptid
== null_ptid
)
3123 pid
= magic_null_ptid
.pid ();
3125 pid
= inferior_ptid
.pid ();
3129 return ptid_t (pid
, tid
);
3135 if (ch
>= 'a' && ch
<= 'f')
3136 return ch
- 'a' + 10;
3137 if (ch
>= '0' && ch
<= '9')
3139 if (ch
>= 'A' && ch
<= 'F')
3140 return ch
- 'A' + 10;
3145 stub_unpack_int (const char *buff
, int fieldlength
)
3152 nibble
= stubhex (*buff
++);
3156 retval
= retval
<< 4;
3162 unpack_nibble (const char *buf
, int *val
)
3164 *val
= fromhex (*buf
++);
3169 unpack_byte (const char *buf
, int *value
)
3171 *value
= stub_unpack_int (buf
, 2);
3176 pack_int (char *buf
, int value
)
3178 buf
= pack_hex_byte (buf
, (value
>> 24) & 0xff);
3179 buf
= pack_hex_byte (buf
, (value
>> 16) & 0xff);
3180 buf
= pack_hex_byte (buf
, (value
>> 8) & 0x0ff);
3181 buf
= pack_hex_byte (buf
, (value
& 0xff));
3186 unpack_int (const char *buf
, int *value
)
3188 *value
= stub_unpack_int (buf
, 8);
3192 #if 0 /* Currently unused, uncomment when needed. */
3193 static char *pack_string (char *pkt
, char *string
);
3196 pack_string (char *pkt
, char *string
)
3201 len
= strlen (string
);
3203 len
= 200; /* Bigger than most GDB packets, junk??? */
3204 pkt
= pack_hex_byte (pkt
, len
);
3208 if ((ch
== '\0') || (ch
== '#'))
3209 ch
= '*'; /* Protect encapsulation. */
3214 #endif /* 0 (unused) */
3217 unpack_string (const char *src
, char *dest
, int length
)
3226 pack_threadid (char *pkt
, threadref
*id
)
3229 unsigned char *altid
;
3231 altid
= (unsigned char *) id
;
3232 limit
= pkt
+ BUF_THREAD_ID_SIZE
;
3234 pkt
= pack_hex_byte (pkt
, *altid
++);
3240 unpack_threadid (const char *inbuf
, threadref
*id
)
3243 const char *limit
= inbuf
+ BUF_THREAD_ID_SIZE
;
3246 altref
= (char *) id
;
3248 while (inbuf
< limit
)
3250 x
= stubhex (*inbuf
++);
3251 y
= stubhex (*inbuf
++);
3252 *altref
++ = (x
<< 4) | y
;
3257 /* Externally, threadrefs are 64 bits but internally, they are still
3258 ints. This is due to a mismatch of specifications. We would like
3259 to use 64bit thread references internally. This is an adapter
3263 int_to_threadref (threadref
*id
, int value
)
3265 unsigned char *scan
;
3267 scan
= (unsigned char *) id
;
3273 *scan
++ = (value
>> 24) & 0xff;
3274 *scan
++ = (value
>> 16) & 0xff;
3275 *scan
++ = (value
>> 8) & 0xff;
3276 *scan
++ = (value
& 0xff);
3280 threadref_to_int (threadref
*ref
)
3283 unsigned char *scan
;
3289 value
= (value
<< 8) | ((*scan
++) & 0xff);
3294 copy_threadref (threadref
*dest
, threadref
*src
)
3297 unsigned char *csrc
, *cdest
;
3299 csrc
= (unsigned char *) src
;
3300 cdest
= (unsigned char *) dest
;
3307 threadmatch (threadref
*dest
, threadref
*src
)
3309 /* Things are broken right now, so just assume we got a match. */
3311 unsigned char *srcp
, *destp
;
3313 srcp
= (char *) src
;
3314 destp
= (char *) dest
;
3318 result
&= (*srcp
++ == *destp
++) ? 1 : 0;
3325 threadid:1, # always request threadid
3332 /* Encoding: 'Q':8,'P':8,mask:32,threadid:64 */
3335 pack_threadinfo_request (char *pkt
, int mode
, threadref
*id
)
3337 *pkt
++ = 'q'; /* Info Query */
3338 *pkt
++ = 'P'; /* process or thread info */
3339 pkt
= pack_int (pkt
, mode
); /* mode */
3340 pkt
= pack_threadid (pkt
, id
); /* threadid */
3341 *pkt
= '\0'; /* terminate */
3345 /* These values tag the fields in a thread info response packet. */
3346 /* Tagging the fields allows us to request specific fields and to
3347 add more fields as time goes by. */
3349 #define TAG_THREADID 1 /* Echo the thread identifier. */
3350 #define TAG_EXISTS 2 /* Is this process defined enough to
3351 fetch registers and its stack? */
3352 #define TAG_DISPLAY 4 /* A short thing maybe to put on a window */
3353 #define TAG_THREADNAME 8 /* string, maps 1-to-1 with a thread is. */
3354 #define TAG_MOREDISPLAY 16 /* Whatever the kernel wants to say about
3358 remote_target::remote_unpack_thread_info_response (const char *pkt
,
3359 threadref
*expectedref
,
3360 gdb_ext_thread_info
*info
)
3362 struct remote_state
*rs
= get_remote_state ();
3366 const char *limit
= pkt
+ rs
->buf
.size (); /* Plausible parsing limit. */
3369 /* info->threadid = 0; FIXME: implement zero_threadref. */
3371 info
->display
[0] = '\0';
3372 info
->shortname
[0] = '\0';
3373 info
->more_display
[0] = '\0';
3375 /* Assume the characters indicating the packet type have been
3377 pkt
= unpack_int (pkt
, &mask
); /* arg mask */
3378 pkt
= unpack_threadid (pkt
, &ref
);
3381 warning (_("Incomplete response to threadinfo request."));
3382 if (!threadmatch (&ref
, expectedref
))
3383 { /* This is an answer to a different request. */
3384 warning (_("ERROR RMT Thread info mismatch."));
3387 copy_threadref (&info
->threadid
, &ref
);
3389 /* Loop on tagged fields , try to bail if something goes wrong. */
3391 /* Packets are terminated with nulls. */
3392 while ((pkt
< limit
) && mask
&& *pkt
)
3394 pkt
= unpack_int (pkt
, &tag
); /* tag */
3395 pkt
= unpack_byte (pkt
, &length
); /* length */
3396 if (!(tag
& mask
)) /* Tags out of synch with mask. */
3398 warning (_("ERROR RMT: threadinfo tag mismatch."));
3402 if (tag
== TAG_THREADID
)
3406 warning (_("ERROR RMT: length of threadid is not 16."));
3410 pkt
= unpack_threadid (pkt
, &ref
);
3411 mask
= mask
& ~TAG_THREADID
;
3414 if (tag
== TAG_EXISTS
)
3416 info
->active
= stub_unpack_int (pkt
, length
);
3418 mask
= mask
& ~(TAG_EXISTS
);
3421 warning (_("ERROR RMT: 'exists' length too long."));
3427 if (tag
== TAG_THREADNAME
)
3429 pkt
= unpack_string (pkt
, &info
->shortname
[0], length
);
3430 mask
= mask
& ~TAG_THREADNAME
;
3433 if (tag
== TAG_DISPLAY
)
3435 pkt
= unpack_string (pkt
, &info
->display
[0], length
);
3436 mask
= mask
& ~TAG_DISPLAY
;
3439 if (tag
== TAG_MOREDISPLAY
)
3441 pkt
= unpack_string (pkt
, &info
->more_display
[0], length
);
3442 mask
= mask
& ~TAG_MOREDISPLAY
;
3445 warning (_("ERROR RMT: unknown thread info tag."));
3446 break; /* Not a tag we know about. */
3452 remote_target::remote_get_threadinfo (threadref
*threadid
,
3454 gdb_ext_thread_info
*info
)
3456 struct remote_state
*rs
= get_remote_state ();
3459 pack_threadinfo_request (rs
->buf
.data (), fieldset
, threadid
);
3461 getpkt (&rs
->buf
, 0);
3463 if (rs
->buf
[0] == '\0')
3466 result
= remote_unpack_thread_info_response (&rs
->buf
[2],
3471 /* Format: i'Q':8,i"L":8,initflag:8,batchsize:16,lastthreadid:32 */
3474 pack_threadlist_request (char *pkt
, int startflag
, int threadcount
,
3475 threadref
*nextthread
)
3477 *pkt
++ = 'q'; /* info query packet */
3478 *pkt
++ = 'L'; /* Process LIST or threadLIST request */
3479 pkt
= pack_nibble (pkt
, startflag
); /* initflag 1 bytes */
3480 pkt
= pack_hex_byte (pkt
, threadcount
); /* threadcount 2 bytes */
3481 pkt
= pack_threadid (pkt
, nextthread
); /* 64 bit thread identifier */
3486 /* Encoding: 'q':8,'M':8,count:16,done:8,argthreadid:64,(threadid:64)* */
3489 remote_target::parse_threadlist_response (const char *pkt
, int result_limit
,
3490 threadref
*original_echo
,
3491 threadref
*resultlist
,
3494 struct remote_state
*rs
= get_remote_state ();
3495 int count
, resultcount
, done
;
3498 /* Assume the 'q' and 'M chars have been stripped. */
3499 const char *limit
= pkt
+ (rs
->buf
.size () - BUF_THREAD_ID_SIZE
);
3500 /* done parse past here */
3501 pkt
= unpack_byte (pkt
, &count
); /* count field */
3502 pkt
= unpack_nibble (pkt
, &done
);
3503 /* The first threadid is the argument threadid. */
3504 pkt
= unpack_threadid (pkt
, original_echo
); /* should match query packet */
3505 while ((count
-- > 0) && (pkt
< limit
))
3507 pkt
= unpack_threadid (pkt
, resultlist
++);
3508 if (resultcount
++ >= result_limit
)
3516 /* Fetch the next batch of threads from the remote. Returns -1 if the
3517 qL packet is not supported, 0 on error and 1 on success. */
3520 remote_target::remote_get_threadlist (int startflag
, threadref
*nextthread
,
3521 int result_limit
, int *done
, int *result_count
,
3522 threadref
*threadlist
)
3524 struct remote_state
*rs
= get_remote_state ();
3527 /* Truncate result limit to be smaller than the packet size. */
3528 if ((((result_limit
+ 1) * BUF_THREAD_ID_SIZE
) + 10)
3529 >= get_remote_packet_size ())
3530 result_limit
= (get_remote_packet_size () / BUF_THREAD_ID_SIZE
) - 2;
3532 pack_threadlist_request (rs
->buf
.data (), startflag
, result_limit
,
3535 getpkt (&rs
->buf
, 0);
3536 if (rs
->buf
[0] == '\0')
3538 /* Packet not supported. */
3543 parse_threadlist_response (&rs
->buf
[2], result_limit
,
3544 &rs
->echo_nextthread
, threadlist
, done
);
3546 if (!threadmatch (&rs
->echo_nextthread
, nextthread
))
3548 /* FIXME: This is a good reason to drop the packet. */
3549 /* Possibly, there is a duplicate response. */
3551 retransmit immediatly - race conditions
3552 retransmit after timeout - yes
3554 wait for packet, then exit
3556 warning (_("HMM: threadlist did not echo arg thread, dropping it."));
3557 return 0; /* I choose simply exiting. */
3559 if (*result_count
<= 0)
3563 warning (_("RMT ERROR : failed to get remote thread list."));
3566 return result
; /* break; */
3568 if (*result_count
> result_limit
)
3571 warning (_("RMT ERROR: threadlist response longer than requested."));
3577 /* Fetch the list of remote threads, with the qL packet, and call
3578 STEPFUNCTION for each thread found. Stops iterating and returns 1
3579 if STEPFUNCTION returns true. Stops iterating and returns 0 if the
3580 STEPFUNCTION returns false. If the packet is not supported,
3584 remote_target::remote_threadlist_iterator (rmt_thread_action stepfunction
,
3585 void *context
, int looplimit
)
3587 struct remote_state
*rs
= get_remote_state ();
3588 int done
, i
, result_count
;
3596 if (loopcount
++ > looplimit
)
3599 warning (_("Remote fetch threadlist -infinite loop-."));
3602 result
= remote_get_threadlist (startflag
, &rs
->nextthread
,
3603 MAXTHREADLISTRESULTS
,
3604 &done
, &result_count
,
3605 rs
->resultthreadlist
);
3608 /* Clear for later iterations. */
3610 /* Setup to resume next batch of thread references, set nextthread. */
3611 if (result_count
>= 1)
3612 copy_threadref (&rs
->nextthread
,
3613 &rs
->resultthreadlist
[result_count
- 1]);
3615 while (result_count
--)
3617 if (!(*stepfunction
) (&rs
->resultthreadlist
[i
++], context
))
3627 /* A thread found on the remote target. */
3631 explicit thread_item (ptid_t ptid_
)
3635 thread_item (thread_item
&&other
) = default;
3636 thread_item
&operator= (thread_item
&&other
) = default;
3638 DISABLE_COPY_AND_ASSIGN (thread_item
);
3640 /* The thread's PTID. */
3643 /* The thread's extra info. */
3646 /* The thread's name. */
3649 /* The core the thread was running on. -1 if not known. */
3652 /* The thread handle associated with the thread. */
3653 gdb::byte_vector thread_handle
;
3656 /* Context passed around to the various methods listing remote
3657 threads. As new threads are found, they're added to the ITEMS
3660 struct threads_listing_context
3662 /* Return true if this object contains an entry for a thread with ptid
3665 bool contains_thread (ptid_t ptid
) const
3667 auto match_ptid
= [&] (const thread_item
&item
)
3669 return item
.ptid
== ptid
;
3672 auto it
= std::find_if (this->items
.begin (),
3676 return it
!= this->items
.end ();
3679 /* Remove the thread with ptid PTID. */
3681 void remove_thread (ptid_t ptid
)
3683 auto match_ptid
= [&] (const thread_item
&item
)
3685 return item
.ptid
== ptid
;
3688 auto it
= std::remove_if (this->items
.begin (),
3692 if (it
!= this->items
.end ())
3693 this->items
.erase (it
);
3696 /* The threads found on the remote target. */
3697 std::vector
<thread_item
> items
;
3701 remote_newthread_step (threadref
*ref
, void *data
)
3703 struct threads_listing_context
*context
3704 = (struct threads_listing_context
*) data
;
3705 int pid
= inferior_ptid
.pid ();
3706 int lwp
= threadref_to_int (ref
);
3707 ptid_t
ptid (pid
, lwp
);
3709 context
->items
.emplace_back (ptid
);
3711 return 1; /* continue iterator */
3714 #define CRAZY_MAX_THREADS 1000
3717 remote_target::remote_current_thread (ptid_t oldpid
)
3719 struct remote_state
*rs
= get_remote_state ();
3722 getpkt (&rs
->buf
, 0);
3723 if (rs
->buf
[0] == 'Q' && rs
->buf
[1] == 'C')
3728 result
= read_ptid (&rs
->buf
[2], &obuf
);
3730 remote_debug_printf ("warning: garbage in qC reply");
3738 /* List remote threads using the deprecated qL packet. */
3741 remote_target::remote_get_threads_with_ql (threads_listing_context
*context
)
3743 if (remote_threadlist_iterator (remote_newthread_step
, context
,
3744 CRAZY_MAX_THREADS
) >= 0)
3750 #if defined(HAVE_LIBEXPAT)
3753 start_thread (struct gdb_xml_parser
*parser
,
3754 const struct gdb_xml_element
*element
,
3756 std::vector
<gdb_xml_value
> &attributes
)
3758 struct threads_listing_context
*data
3759 = (struct threads_listing_context
*) user_data
;
3760 struct gdb_xml_value
*attr
;
3762 char *id
= (char *) xml_find_attribute (attributes
, "id")->value
.get ();
3763 ptid_t ptid
= read_ptid (id
, NULL
);
3765 data
->items
.emplace_back (ptid
);
3766 thread_item
&item
= data
->items
.back ();
3768 attr
= xml_find_attribute (attributes
, "core");
3770 item
.core
= *(ULONGEST
*) attr
->value
.get ();
3772 attr
= xml_find_attribute (attributes
, "name");
3774 item
.name
= (const char *) attr
->value
.get ();
3776 attr
= xml_find_attribute (attributes
, "handle");
3778 item
.thread_handle
= hex2bin ((const char *) attr
->value
.get ());
3782 end_thread (struct gdb_xml_parser
*parser
,
3783 const struct gdb_xml_element
*element
,
3784 void *user_data
, const char *body_text
)
3786 struct threads_listing_context
*data
3787 = (struct threads_listing_context
*) user_data
;
3789 if (body_text
!= NULL
&& *body_text
!= '\0')
3790 data
->items
.back ().extra
= body_text
;
3793 const struct gdb_xml_attribute thread_attributes
[] = {
3794 { "id", GDB_XML_AF_NONE
, NULL
, NULL
},
3795 { "core", GDB_XML_AF_OPTIONAL
, gdb_xml_parse_attr_ulongest
, NULL
},
3796 { "name", GDB_XML_AF_OPTIONAL
, NULL
, NULL
},
3797 { "handle", GDB_XML_AF_OPTIONAL
, NULL
, NULL
},
3798 { NULL
, GDB_XML_AF_NONE
, NULL
, NULL
}
3801 const struct gdb_xml_element thread_children
[] = {
3802 { NULL
, NULL
, NULL
, GDB_XML_EF_NONE
, NULL
, NULL
}
3805 const struct gdb_xml_element threads_children
[] = {
3806 { "thread", thread_attributes
, thread_children
,
3807 GDB_XML_EF_REPEATABLE
| GDB_XML_EF_OPTIONAL
,
3808 start_thread
, end_thread
},
3809 { NULL
, NULL
, NULL
, GDB_XML_EF_NONE
, NULL
, NULL
}
3812 const struct gdb_xml_element threads_elements
[] = {
3813 { "threads", NULL
, threads_children
,
3814 GDB_XML_EF_NONE
, NULL
, NULL
},
3815 { NULL
, NULL
, NULL
, GDB_XML_EF_NONE
, NULL
, NULL
}
3820 /* List remote threads using qXfer:threads:read. */
3823 remote_target::remote_get_threads_with_qxfer (threads_listing_context
*context
)
3825 #if defined(HAVE_LIBEXPAT)
3826 if (packet_support (PACKET_qXfer_threads
) == PACKET_ENABLE
)
3828 gdb::optional
<gdb::char_vector
> xml
3829 = target_read_stralloc (this, TARGET_OBJECT_THREADS
, NULL
);
3831 if (xml
&& (*xml
)[0] != '\0')
3833 gdb_xml_parse_quick (_("threads"), "threads.dtd",
3834 threads_elements
, xml
->data (), context
);
3844 /* List remote threads using qfThreadInfo/qsThreadInfo. */
3847 remote_target::remote_get_threads_with_qthreadinfo (threads_listing_context
*context
)
3849 struct remote_state
*rs
= get_remote_state ();
3851 if (rs
->use_threadinfo_query
)
3855 putpkt ("qfThreadInfo");
3856 getpkt (&rs
->buf
, 0);
3857 bufp
= rs
->buf
.data ();
3858 if (bufp
[0] != '\0') /* q packet recognized */
3860 while (*bufp
++ == 'm') /* reply contains one or more TID */
3864 ptid_t ptid
= read_ptid (bufp
, &bufp
);
3865 context
->items
.emplace_back (ptid
);
3867 while (*bufp
++ == ','); /* comma-separated list */
3868 putpkt ("qsThreadInfo");
3869 getpkt (&rs
->buf
, 0);
3870 bufp
= rs
->buf
.data ();
3876 /* Packet not recognized. */
3877 rs
->use_threadinfo_query
= 0;
3884 /* Return true if INF only has one non-exited thread. */
3887 has_single_non_exited_thread (inferior
*inf
)
3890 for (thread_info
*tp ATTRIBUTE_UNUSED
: inf
->non_exited_threads ())
3896 /* Implement the to_update_thread_list function for the remote
3900 remote_target::update_thread_list ()
3902 struct threads_listing_context context
;
3905 /* We have a few different mechanisms to fetch the thread list. Try
3906 them all, starting with the most preferred one first, falling
3907 back to older methods. */
3908 if (remote_get_threads_with_qxfer (&context
)
3909 || remote_get_threads_with_qthreadinfo (&context
)
3910 || remote_get_threads_with_ql (&context
))
3914 if (context
.items
.empty ()
3915 && remote_thread_always_alive (inferior_ptid
))
3917 /* Some targets don't really support threads, but still
3918 reply an (empty) thread list in response to the thread
3919 listing packets, instead of replying "packet not
3920 supported". Exit early so we don't delete the main
3925 /* CONTEXT now holds the current thread list on the remote
3926 target end. Delete GDB-side threads no longer found on the
3928 for (thread_info
*tp
: all_threads_safe ())
3930 if (tp
->inf
->process_target () != this)
3933 if (!context
.contains_thread (tp
->ptid
))
3935 /* Do not remove the thread if it is the last thread in
3936 the inferior. This situation happens when we have a
3937 pending exit process status to process. Otherwise we
3938 may end up with a seemingly live inferior (i.e. pid
3939 != 0) that has no threads. */
3940 if (has_single_non_exited_thread (tp
->inf
))
3948 /* Remove any unreported fork child threads from CONTEXT so
3949 that we don't interfere with follow fork, which is where
3950 creation of such threads is handled. */
3951 remove_new_fork_children (&context
);
3953 /* And now add threads we don't know about yet to our list. */
3954 for (thread_item
&item
: context
.items
)
3956 if (item
.ptid
!= null_ptid
)
3958 /* In non-stop mode, we assume new found threads are
3959 executing until proven otherwise with a stop reply.
3960 In all-stop, we can only get here if all threads are
3962 bool executing
= target_is_non_stop_p ();
3964 remote_notice_new_inferior (item
.ptid
, executing
);
3966 thread_info
*tp
= find_thread_ptid (this, item
.ptid
);
3967 remote_thread_info
*info
= get_remote_thread_info (tp
);
3968 info
->core
= item
.core
;
3969 info
->extra
= std::move (item
.extra
);
3970 info
->name
= std::move (item
.name
);
3971 info
->thread_handle
= std::move (item
.thread_handle
);
3978 /* If no thread listing method is supported, then query whether
3979 each known thread is alive, one by one, with the T packet.
3980 If the target doesn't support threads at all, then this is a
3981 no-op. See remote_thread_alive. */
3987 * Collect a descriptive string about the given thread.
3988 * The target may say anything it wants to about the thread
3989 * (typically info about its blocked / runnable state, name, etc.).
3990 * This string will appear in the info threads display.
3992 * Optional: targets are not required to implement this function.
3996 remote_target::extra_thread_info (thread_info
*tp
)
3998 struct remote_state
*rs
= get_remote_state ();
4001 struct gdb_ext_thread_info threadinfo
;
4003 if (rs
->remote_desc
== 0) /* paranoia */
4004 internal_error (__FILE__
, __LINE__
,
4005 _("remote_threads_extra_info"));
4007 if (tp
->ptid
== magic_null_ptid
4008 || (tp
->ptid
.pid () != 0 && tp
->ptid
.lwp () == 0))
4009 /* This is the main thread which was added by GDB. The remote
4010 server doesn't know about it. */
4013 std::string
&extra
= get_remote_thread_info (tp
)->extra
;
4015 /* If already have cached info, use it. */
4016 if (!extra
.empty ())
4017 return extra
.c_str ();
4019 if (packet_support (PACKET_qXfer_threads
) == PACKET_ENABLE
)
4021 /* If we're using qXfer:threads:read, then the extra info is
4022 included in the XML. So if we didn't have anything cached,
4023 it's because there's really no extra info. */
4027 if (rs
->use_threadextra_query
)
4029 char *b
= rs
->buf
.data ();
4030 char *endb
= b
+ get_remote_packet_size ();
4032 xsnprintf (b
, endb
- b
, "qThreadExtraInfo,");
4034 write_ptid (b
, endb
, tp
->ptid
);
4037 getpkt (&rs
->buf
, 0);
4038 if (rs
->buf
[0] != 0)
4040 extra
.resize (strlen (rs
->buf
.data ()) / 2);
4041 hex2bin (rs
->buf
.data (), (gdb_byte
*) &extra
[0], extra
.size ());
4042 return extra
.c_str ();
4046 /* If the above query fails, fall back to the old method. */
4047 rs
->use_threadextra_query
= 0;
4048 set
= TAG_THREADID
| TAG_EXISTS
| TAG_THREADNAME
4049 | TAG_MOREDISPLAY
| TAG_DISPLAY
;
4050 int_to_threadref (&id
, tp
->ptid
.lwp ());
4051 if (remote_get_threadinfo (&id
, set
, &threadinfo
))
4052 if (threadinfo
.active
)
4054 if (*threadinfo
.shortname
)
4055 string_appendf (extra
, " Name: %s", threadinfo
.shortname
);
4056 if (*threadinfo
.display
)
4058 if (!extra
.empty ())
4060 string_appendf (extra
, " State: %s", threadinfo
.display
);
4062 if (*threadinfo
.more_display
)
4064 if (!extra
.empty ())
4066 string_appendf (extra
, " Priority: %s", threadinfo
.more_display
);
4068 return extra
.c_str ();
4075 remote_target::static_tracepoint_marker_at (CORE_ADDR addr
,
4076 struct static_tracepoint_marker
*marker
)
4078 struct remote_state
*rs
= get_remote_state ();
4079 char *p
= rs
->buf
.data ();
4081 xsnprintf (p
, get_remote_packet_size (), "qTSTMat:");
4083 p
+= hexnumstr (p
, addr
);
4085 getpkt (&rs
->buf
, 0);
4086 p
= rs
->buf
.data ();
4089 error (_("Remote failure reply: %s"), p
);
4093 parse_static_tracepoint_marker_definition (p
, NULL
, marker
);
4100 std::vector
<static_tracepoint_marker
>
4101 remote_target::static_tracepoint_markers_by_strid (const char *strid
)
4103 struct remote_state
*rs
= get_remote_state ();
4104 std::vector
<static_tracepoint_marker
> markers
;
4106 static_tracepoint_marker marker
;
4108 /* Ask for a first packet of static tracepoint marker
4111 getpkt (&rs
->buf
, 0);
4112 p
= rs
->buf
.data ();
4114 error (_("Remote failure reply: %s"), p
);
4120 parse_static_tracepoint_marker_definition (p
, &p
, &marker
);
4122 if (strid
== NULL
|| marker
.str_id
== strid
)
4123 markers
.push_back (std::move (marker
));
4125 while (*p
++ == ','); /* comma-separated list */
4126 /* Ask for another packet of static tracepoint definition. */
4128 getpkt (&rs
->buf
, 0);
4129 p
= rs
->buf
.data ();
4136 /* Implement the to_get_ada_task_ptid function for the remote targets. */
4139 remote_target::get_ada_task_ptid (long lwp
, ULONGEST thread
)
4141 return ptid_t (inferior_ptid
.pid (), lwp
);
4145 /* Restart the remote side; this is an extended protocol operation. */
4148 remote_target::extended_remote_restart ()
4150 struct remote_state
*rs
= get_remote_state ();
4152 /* Send the restart command; for reasons I don't understand the
4153 remote side really expects a number after the "R". */
4154 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "R%x", 0);
4157 remote_fileio_reset ();
4160 /* Clean up connection to a remote debugger. */
4163 remote_target::close ()
4165 /* Make sure we leave stdin registered in the event loop. */
4168 trace_reset_local_state ();
4173 remote_target::~remote_target ()
4175 struct remote_state
*rs
= get_remote_state ();
4177 /* Check for NULL because we may get here with a partially
4178 constructed target/connection. */
4179 if (rs
->remote_desc
== nullptr)
4182 serial_close (rs
->remote_desc
);
4184 /* We are destroying the remote target, so we should discard
4185 everything of this target. */
4186 discard_pending_stop_replies_in_queue ();
4188 if (rs
->remote_async_inferior_event_token
)
4189 delete_async_event_handler (&rs
->remote_async_inferior_event_token
);
4191 delete rs
->notif_state
;
4194 /* Query the remote side for the text, data and bss offsets. */
4197 remote_target::get_offsets ()
4199 struct remote_state
*rs
= get_remote_state ();
4202 int lose
, num_segments
= 0, do_sections
, do_segments
;
4203 CORE_ADDR text_addr
, data_addr
, bss_addr
, segments
[2];
4205 if (current_program_space
->symfile_object_file
== NULL
)
4208 putpkt ("qOffsets");
4209 getpkt (&rs
->buf
, 0);
4210 buf
= rs
->buf
.data ();
4212 if (buf
[0] == '\000')
4213 return; /* Return silently. Stub doesn't support
4217 warning (_("Remote failure reply: %s"), buf
);
4221 /* Pick up each field in turn. This used to be done with scanf, but
4222 scanf will make trouble if CORE_ADDR size doesn't match
4223 conversion directives correctly. The following code will work
4224 with any size of CORE_ADDR. */
4225 text_addr
= data_addr
= bss_addr
= 0;
4229 if (startswith (ptr
, "Text="))
4232 /* Don't use strtol, could lose on big values. */
4233 while (*ptr
&& *ptr
!= ';')
4234 text_addr
= (text_addr
<< 4) + fromhex (*ptr
++);
4236 if (startswith (ptr
, ";Data="))
4239 while (*ptr
&& *ptr
!= ';')
4240 data_addr
= (data_addr
<< 4) + fromhex (*ptr
++);
4245 if (!lose
&& startswith (ptr
, ";Bss="))
4248 while (*ptr
&& *ptr
!= ';')
4249 bss_addr
= (bss_addr
<< 4) + fromhex (*ptr
++);
4251 if (bss_addr
!= data_addr
)
4252 warning (_("Target reported unsupported offsets: %s"), buf
);
4257 else if (startswith (ptr
, "TextSeg="))
4260 /* Don't use strtol, could lose on big values. */
4261 while (*ptr
&& *ptr
!= ';')
4262 text_addr
= (text_addr
<< 4) + fromhex (*ptr
++);
4265 if (startswith (ptr
, ";DataSeg="))
4268 while (*ptr
&& *ptr
!= ';')
4269 data_addr
= (data_addr
<< 4) + fromhex (*ptr
++);
4277 error (_("Malformed response to offset query, %s"), buf
);
4278 else if (*ptr
!= '\0')
4279 warning (_("Target reported unsupported offsets: %s"), buf
);
4281 objfile
*objf
= current_program_space
->symfile_object_file
;
4282 section_offsets offs
= objf
->section_offsets
;
4284 symfile_segment_data_up data
= get_symfile_segment_data (objf
->obfd
);
4285 do_segments
= (data
!= NULL
);
4286 do_sections
= num_segments
== 0;
4288 if (num_segments
> 0)
4290 segments
[0] = text_addr
;
4291 segments
[1] = data_addr
;
4293 /* If we have two segments, we can still try to relocate everything
4294 by assuming that the .text and .data offsets apply to the whole
4295 text and data segments. Convert the offsets given in the packet
4296 to base addresses for symfile_map_offsets_to_segments. */
4297 else if (data
!= nullptr && data
->segments
.size () == 2)
4299 segments
[0] = data
->segments
[0].base
+ text_addr
;
4300 segments
[1] = data
->segments
[1].base
+ data_addr
;
4303 /* If the object file has only one segment, assume that it is text
4304 rather than data; main programs with no writable data are rare,
4305 but programs with no code are useless. Of course the code might
4306 have ended up in the data segment... to detect that we would need
4307 the permissions here. */
4308 else if (data
&& data
->segments
.size () == 1)
4310 segments
[0] = data
->segments
[0].base
+ text_addr
;
4313 /* There's no way to relocate by segment. */
4319 int ret
= symfile_map_offsets_to_segments (objf
->obfd
,
4321 num_segments
, segments
);
4323 if (ret
== 0 && !do_sections
)
4324 error (_("Can not handle qOffsets TextSeg "
4325 "response with this symbol file"));
4333 offs
[SECT_OFF_TEXT (objf
)] = text_addr
;
4335 /* This is a temporary kludge to force data and bss to use the
4336 same offsets because that's what nlmconv does now. The real
4337 solution requires changes to the stub and remote.c that I
4338 don't have time to do right now. */
4340 offs
[SECT_OFF_DATA (objf
)] = data_addr
;
4341 offs
[SECT_OFF_BSS (objf
)] = data_addr
;
4344 objfile_relocate (objf
, offs
);
4347 /* Send interrupt_sequence to remote target. */
4350 remote_target::send_interrupt_sequence ()
4352 struct remote_state
*rs
= get_remote_state ();
4354 if (interrupt_sequence_mode
== interrupt_sequence_control_c
)
4355 remote_serial_write ("\x03", 1);
4356 else if (interrupt_sequence_mode
== interrupt_sequence_break
)
4357 serial_send_break (rs
->remote_desc
);
4358 else if (interrupt_sequence_mode
== interrupt_sequence_break_g
)
4360 serial_send_break (rs
->remote_desc
);
4361 remote_serial_write ("g", 1);
4364 internal_error (__FILE__
, __LINE__
,
4365 _("Invalid value for interrupt_sequence_mode: %s."),
4366 interrupt_sequence_mode
);
4370 /* If STOP_REPLY is a T stop reply, look for the "thread" register,
4371 and extract the PTID. Returns NULL_PTID if not found. */
4374 stop_reply_extract_thread (const char *stop_reply
)
4376 if (stop_reply
[0] == 'T' && strlen (stop_reply
) > 3)
4380 /* Txx r:val ; r:val (...) */
4383 /* Look for "register" named "thread". */
4388 p1
= strchr (p
, ':');
4392 if (strncmp (p
, "thread", p1
- p
) == 0)
4393 return read_ptid (++p1
, &p
);
4395 p1
= strchr (p
, ';');
4407 /* Determine the remote side's current thread. If we have a stop
4408 reply handy (in WAIT_STATUS), maybe it's a T stop reply with a
4409 "thread" register we can extract the current thread from. If not,
4410 ask the remote which is the current thread with qC. The former
4411 method avoids a roundtrip. */
4414 remote_target::get_current_thread (const char *wait_status
)
4416 ptid_t ptid
= null_ptid
;
4418 /* Note we don't use remote_parse_stop_reply as that makes use of
4419 the target architecture, which we haven't yet fully determined at
4421 if (wait_status
!= NULL
)
4422 ptid
= stop_reply_extract_thread (wait_status
);
4423 if (ptid
== null_ptid
)
4424 ptid
= remote_current_thread (inferior_ptid
);
4429 /* Query the remote target for which is the current thread/process,
4430 add it to our tables, and update INFERIOR_PTID. The caller is
4431 responsible for setting the state such that the remote end is ready
4432 to return the current thread.
4434 This function is called after handling the '?' or 'vRun' packets,
4435 whose response is a stop reply from which we can also try
4436 extracting the thread. If the target doesn't support the explicit
4437 qC query, we infer the current thread from that stop reply, passed
4438 in in WAIT_STATUS, which may be NULL.
4440 The function returns pointer to the main thread of the inferior. */
4443 remote_target::add_current_inferior_and_thread (const char *wait_status
)
4445 struct remote_state
*rs
= get_remote_state ();
4446 bool fake_pid_p
= false;
4448 switch_to_no_thread ();
4450 /* Now, if we have thread information, update the current thread's
4452 ptid_t curr_ptid
= get_current_thread (wait_status
);
4454 if (curr_ptid
!= null_ptid
)
4456 if (!remote_multi_process_p (rs
))
4461 /* Without this, some commands which require an active target
4462 (such as kill) won't work. This variable serves (at least)
4463 double duty as both the pid of the target process (if it has
4464 such), and as a flag indicating that a target is active. */
4465 curr_ptid
= magic_null_ptid
;
4469 remote_add_inferior (fake_pid_p
, curr_ptid
.pid (), -1, 1);
4471 /* Add the main thread and switch to it. Don't try reading
4472 registers yet, since we haven't fetched the target description
4474 thread_info
*tp
= add_thread_silent (this, curr_ptid
);
4475 switch_to_thread_no_regs (tp
);
4480 /* Print info about a thread that was found already stopped on
4484 remote_target::print_one_stopped_thread (thread_info
*thread
)
4486 target_waitstatus ws
;
4488 /* If there is a pending waitstatus, use it. If there isn't it's because
4489 the thread's stop was reported with TARGET_WAITKIND_STOPPED / GDB_SIGNAL_0
4490 and process_initial_stop_replies decided it wasn't interesting to save
4491 and report to the core. */
4492 if (thread
->has_pending_waitstatus ())
4494 ws
= thread
->pending_waitstatus ();
4495 thread
->clear_pending_waitstatus ();
4499 ws
.kind
= TARGET_WAITKIND_STOPPED
;
4500 ws
.value
.sig
= GDB_SIGNAL_0
;
4503 switch_to_thread (thread
);
4504 thread
->set_stop_pc (get_frame_pc (get_current_frame ()));
4505 set_current_sal_from_frame (get_current_frame ());
4507 /* For "info program". */
4508 set_last_target_status (this, thread
->ptid
, ws
);
4510 if (ws
.kind
== TARGET_WAITKIND_STOPPED
)
4512 enum gdb_signal sig
= ws
.value
.sig
;
4514 if (signal_print_state (sig
))
4515 gdb::observers::signal_received
.notify (sig
);
4517 gdb::observers::normal_stop
.notify (NULL
, 1);
4520 /* Process all initial stop replies the remote side sent in response
4521 to the ? packet. These indicate threads that were already stopped
4522 on initial connection. We mark these threads as stopped and print
4523 their current frame before giving the user the prompt. */
4526 remote_target::process_initial_stop_replies (int from_tty
)
4528 int pending_stop_replies
= stop_reply_queue_length ();
4529 struct thread_info
*selected
= NULL
;
4530 struct thread_info
*lowest_stopped
= NULL
;
4531 struct thread_info
*first
= NULL
;
4533 /* This is only used when the target is non-stop. */
4534 gdb_assert (target_is_non_stop_p ());
4536 /* Consume the initial pending events. */
4537 while (pending_stop_replies
-- > 0)
4539 ptid_t waiton_ptid
= minus_one_ptid
;
4541 struct target_waitstatus ws
;
4542 int ignore_event
= 0;
4544 memset (&ws
, 0, sizeof (ws
));
4545 event_ptid
= target_wait (waiton_ptid
, &ws
, TARGET_WNOHANG
);
4547 print_target_wait_results (waiton_ptid
, event_ptid
, &ws
);
4551 case TARGET_WAITKIND_IGNORE
:
4552 case TARGET_WAITKIND_NO_RESUMED
:
4553 case TARGET_WAITKIND_SIGNALLED
:
4554 case TARGET_WAITKIND_EXITED
:
4555 /* We shouldn't see these, but if we do, just ignore. */
4556 remote_debug_printf ("event ignored");
4560 case TARGET_WAITKIND_EXECD
:
4561 xfree (ws
.value
.execd_pathname
);
4570 thread_info
*evthread
= find_thread_ptid (this, event_ptid
);
4572 if (ws
.kind
== TARGET_WAITKIND_STOPPED
)
4574 enum gdb_signal sig
= ws
.value
.sig
;
4576 /* Stubs traditionally report SIGTRAP as initial signal,
4577 instead of signal 0. Suppress it. */
4578 if (sig
== GDB_SIGNAL_TRAP
)
4580 evthread
->set_stop_signal (sig
);
4584 if (ws
.kind
!= TARGET_WAITKIND_STOPPED
4585 || ws
.value
.sig
!= GDB_SIGNAL_0
)
4586 evthread
->set_pending_waitstatus (ws
);
4588 set_executing (this, event_ptid
, false);
4589 set_running (this, event_ptid
, false);
4590 get_remote_thread_info (evthread
)->set_not_resumed ();
4593 /* "Notice" the new inferiors before anything related to
4594 registers/memory. */
4595 for (inferior
*inf
: all_non_exited_inferiors (this))
4597 inf
->needs_setup
= 1;
4601 thread_info
*thread
= any_live_thread_of_inferior (inf
);
4602 notice_new_inferior (thread
, thread
->state
== THREAD_RUNNING
,
4607 /* If all-stop on top of non-stop, pause all threads. Note this
4608 records the threads' stop pc, so must be done after "noticing"
4612 stop_all_threads ();
4614 /* If all threads of an inferior were already stopped, we
4615 haven't setup the inferior yet. */
4616 for (inferior
*inf
: all_non_exited_inferiors (this))
4618 if (inf
->needs_setup
)
4620 thread_info
*thread
= any_live_thread_of_inferior (inf
);
4621 switch_to_thread_no_regs (thread
);
4627 /* Now go over all threads that are stopped, and print their current
4628 frame. If all-stop, then if there's a signalled thread, pick
4630 for (thread_info
*thread
: all_non_exited_threads (this))
4636 thread
->set_running (false);
4637 else if (thread
->state
!= THREAD_STOPPED
)
4640 if (selected
== nullptr && thread
->has_pending_waitstatus ())
4643 if (lowest_stopped
== NULL
4644 || thread
->inf
->num
< lowest_stopped
->inf
->num
4645 || thread
->per_inf_num
< lowest_stopped
->per_inf_num
)
4646 lowest_stopped
= thread
;
4649 print_one_stopped_thread (thread
);
4652 /* In all-stop, we only print the status of one thread, and leave
4653 others with their status pending. */
4656 thread_info
*thread
= selected
;
4658 thread
= lowest_stopped
;
4662 print_one_stopped_thread (thread
);
4666 /* Start the remote connection and sync state. */
4669 remote_target::start_remote (int from_tty
, int extended_p
)
4671 REMOTE_SCOPED_DEBUG_ENTER_EXIT
;
4673 struct remote_state
*rs
= get_remote_state ();
4674 struct packet_config
*noack_config
;
4676 /* Signal other parts that we're going through the initial setup,
4677 and so things may not be stable yet. E.g., we don't try to
4678 install tracepoints until we've relocated symbols. Also, a
4679 Ctrl-C before we're connected and synced up can't interrupt the
4680 target. Instead, it offers to drop the (potentially wedged)
4682 rs
->starting_up
= true;
4686 if (interrupt_on_connect
)
4687 send_interrupt_sequence ();
4689 /* Ack any packet which the remote side has already sent. */
4690 remote_serial_write ("+", 1);
4692 /* The first packet we send to the target is the optional "supported
4693 packets" request. If the target can answer this, it will tell us
4694 which later probes to skip. */
4695 remote_query_supported ();
4697 /* If the stub wants to get a QAllow, compose one and send it. */
4698 if (packet_support (PACKET_QAllow
) != PACKET_DISABLE
)
4701 /* gdbserver < 7.7 (before its fix from 2013-12-11) did reply to any
4702 unknown 'v' packet with string "OK". "OK" gets interpreted by GDB
4703 as a reply to known packet. For packet "vFile:setfs:" it is an
4704 invalid reply and GDB would return error in
4705 remote_hostio_set_filesystem, making remote files access impossible.
4706 Disable "vFile:setfs:" in such case. Do not disable other 'v' packets as
4707 other "vFile" packets get correctly detected even on gdbserver < 7.7. */
4709 const char v_mustreplyempty
[] = "vMustReplyEmpty";
4711 putpkt (v_mustreplyempty
);
4712 getpkt (&rs
->buf
, 0);
4713 if (strcmp (rs
->buf
.data (), "OK") == 0)
4714 remote_protocol_packets
[PACKET_vFile_setfs
].support
= PACKET_DISABLE
;
4715 else if (strcmp (rs
->buf
.data (), "") != 0)
4716 error (_("Remote replied unexpectedly to '%s': %s"), v_mustreplyempty
,
4720 /* Next, we possibly activate noack mode.
4722 If the QStartNoAckMode packet configuration is set to AUTO,
4723 enable noack mode if the stub reported a wish for it with
4726 If set to TRUE, then enable noack mode even if the stub didn't
4727 report it in qSupported. If the stub doesn't reply OK, the
4728 session ends with an error.
4730 If FALSE, then don't activate noack mode, regardless of what the
4731 stub claimed should be the default with qSupported. */
4733 noack_config
= &remote_protocol_packets
[PACKET_QStartNoAckMode
];
4734 if (packet_config_support (noack_config
) != PACKET_DISABLE
)
4736 putpkt ("QStartNoAckMode");
4737 getpkt (&rs
->buf
, 0);
4738 if (packet_ok (rs
->buf
, noack_config
) == PACKET_OK
)
4744 /* Tell the remote that we are using the extended protocol. */
4746 getpkt (&rs
->buf
, 0);
4749 /* Let the target know which signals it is allowed to pass down to
4751 update_signals_program_target ();
4753 /* Next, if the target can specify a description, read it. We do
4754 this before anything involving memory or registers. */
4755 target_find_description ();
4757 /* Next, now that we know something about the target, update the
4758 address spaces in the program spaces. */
4759 update_address_spaces ();
4761 /* On OSs where the list of libraries is global to all
4762 processes, we fetch them early. */
4763 if (gdbarch_has_global_solist (target_gdbarch ()))
4764 solib_add (NULL
, from_tty
, auto_solib_add
);
4766 if (target_is_non_stop_p ())
4768 if (packet_support (PACKET_QNonStop
) != PACKET_ENABLE
)
4769 error (_("Non-stop mode requested, but remote "
4770 "does not support non-stop"));
4772 putpkt ("QNonStop:1");
4773 getpkt (&rs
->buf
, 0);
4775 if (strcmp (rs
->buf
.data (), "OK") != 0)
4776 error (_("Remote refused setting non-stop mode with: %s"),
4779 /* Find about threads and processes the stub is already
4780 controlling. We default to adding them in the running state.
4781 The '?' query below will then tell us about which threads are
4783 this->update_thread_list ();
4785 else if (packet_support (PACKET_QNonStop
) == PACKET_ENABLE
)
4787 /* Don't assume that the stub can operate in all-stop mode.
4788 Request it explicitly. */
4789 putpkt ("QNonStop:0");
4790 getpkt (&rs
->buf
, 0);
4792 if (strcmp (rs
->buf
.data (), "OK") != 0)
4793 error (_("Remote refused setting all-stop mode with: %s"),
4797 /* Upload TSVs regardless of whether the target is running or not. The
4798 remote stub, such as GDBserver, may have some predefined or builtin
4799 TSVs, even if the target is not running. */
4800 if (get_trace_status (current_trace_status ()) != -1)
4802 struct uploaded_tsv
*uploaded_tsvs
= NULL
;
4804 upload_trace_state_variables (&uploaded_tsvs
);
4805 merge_uploaded_trace_state_variables (&uploaded_tsvs
);
4808 /* Check whether the target is running now. */
4810 getpkt (&rs
->buf
, 0);
4812 if (!target_is_non_stop_p ())
4814 char *wait_status
= NULL
;
4816 if (rs
->buf
[0] == 'W' || rs
->buf
[0] == 'X')
4819 error (_("The target is not running (try extended-remote?)"));
4821 /* We're connected, but not running. Drop out before we
4822 call start_remote. */
4823 rs
->starting_up
= false;
4828 /* Save the reply for later. */
4829 wait_status
= (char *) alloca (strlen (rs
->buf
.data ()) + 1);
4830 strcpy (wait_status
, rs
->buf
.data ());
4833 /* Fetch thread list. */
4834 target_update_thread_list ();
4836 /* Let the stub know that we want it to return the thread. */
4837 set_continue_thread (minus_one_ptid
);
4839 if (thread_count (this) == 0)
4841 /* Target has no concept of threads at all. GDB treats
4842 non-threaded target as single-threaded; add a main
4844 thread_info
*tp
= add_current_inferior_and_thread (wait_status
);
4845 get_remote_thread_info (tp
)->set_resumed ();
4849 /* We have thread information; select the thread the target
4850 says should be current. If we're reconnecting to a
4851 multi-threaded program, this will ideally be the thread
4852 that last reported an event before GDB disconnected. */
4853 ptid_t curr_thread
= get_current_thread (wait_status
);
4854 if (curr_thread
== null_ptid
)
4856 /* Odd... The target was able to list threads, but not
4857 tell us which thread was current (no "thread"
4858 register in T stop reply?). Just pick the first
4859 thread in the thread list then. */
4861 remote_debug_printf ("warning: couldn't determine remote "
4862 "current thread; picking first in list.");
4864 for (thread_info
*tp
: all_non_exited_threads (this,
4867 switch_to_thread (tp
);
4872 switch_to_thread (find_thread_ptid (this, curr_thread
));
4875 /* init_wait_for_inferior should be called before get_offsets in order
4876 to manage `inserted' flag in bp loc in a correct state.
4877 breakpoint_init_inferior, called from init_wait_for_inferior, set
4878 `inserted' flag to 0, while before breakpoint_re_set, called from
4879 start_remote, set `inserted' flag to 1. In the initialization of
4880 inferior, breakpoint_init_inferior should be called first, and then
4881 breakpoint_re_set can be called. If this order is broken, state of
4882 `inserted' flag is wrong, and cause some problems on breakpoint
4884 init_wait_for_inferior ();
4886 get_offsets (); /* Get text, data & bss offsets. */
4888 /* If we could not find a description using qXfer, and we know
4889 how to do it some other way, try again. This is not
4890 supported for non-stop; it could be, but it is tricky if
4891 there are no stopped threads when we connect. */
4892 if (remote_read_description_p (this)
4893 && gdbarch_target_desc (target_gdbarch ()) == NULL
)
4895 target_clear_description ();
4896 target_find_description ();
4899 /* Use the previously fetched status. */
4900 gdb_assert (wait_status
!= NULL
);
4901 strcpy (rs
->buf
.data (), wait_status
);
4902 rs
->cached_wait_status
= 1;
4904 ::start_remote (from_tty
); /* Initialize gdb process mechanisms. */
4908 /* Clear WFI global state. Do this before finding about new
4909 threads and inferiors, and setting the current inferior.
4910 Otherwise we would clear the proceed status of the current
4911 inferior when we want its stop_soon state to be preserved
4912 (see notice_new_inferior). */
4913 init_wait_for_inferior ();
4915 /* In non-stop, we will either get an "OK", meaning that there
4916 are no stopped threads at this time; or, a regular stop
4917 reply. In the latter case, there may be more than one thread
4918 stopped --- we pull them all out using the vStopped
4920 if (strcmp (rs
->buf
.data (), "OK") != 0)
4922 struct notif_client
*notif
= ¬if_client_stop
;
4924 /* remote_notif_get_pending_replies acks this one, and gets
4926 rs
->notif_state
->pending_event
[notif_client_stop
.id
]
4927 = remote_notif_parse (this, notif
, rs
->buf
.data ());
4928 remote_notif_get_pending_events (notif
);
4931 if (thread_count (this) == 0)
4934 error (_("The target is not running (try extended-remote?)"));
4936 /* We're connected, but not running. Drop out before we
4937 call start_remote. */
4938 rs
->starting_up
= false;
4942 /* Report all signals during attach/startup. */
4945 /* If there are already stopped threads, mark them stopped and
4946 report their stops before giving the prompt to the user. */
4947 process_initial_stop_replies (from_tty
);
4949 if (target_can_async_p ())
4953 /* If we connected to a live target, do some additional setup. */
4954 if (target_has_execution ())
4956 /* No use without a symbol-file. */
4957 if (current_program_space
->symfile_object_file
)
4958 remote_check_symbols ();
4961 /* Possibly the target has been engaged in a trace run started
4962 previously; find out where things are at. */
4963 if (get_trace_status (current_trace_status ()) != -1)
4965 struct uploaded_tp
*uploaded_tps
= NULL
;
4967 if (current_trace_status ()->running
)
4968 printf_filtered (_("Trace is already running on the target.\n"));
4970 upload_tracepoints (&uploaded_tps
);
4972 merge_uploaded_tracepoints (&uploaded_tps
);
4975 /* Possibly the target has been engaged in a btrace record started
4976 previously; find out where things are at. */
4977 remote_btrace_maybe_reopen ();
4979 /* The thread and inferior lists are now synchronized with the
4980 target, our symbols have been relocated, and we're merged the
4981 target's tracepoints with ours. We're done with basic start
4983 rs
->starting_up
= false;
4985 /* Maybe breakpoints are global and need to be inserted now. */
4986 if (breakpoints_should_be_inserted_now ())
4987 insert_breakpoints ();
4991 remote_target::connection_string ()
4993 remote_state
*rs
= get_remote_state ();
4995 if (rs
->remote_desc
->name
!= NULL
)
4996 return rs
->remote_desc
->name
;
5001 /* Open a connection to a remote debugger.
5002 NAME is the filename used for communication. */
5005 remote_target::open (const char *name
, int from_tty
)
5007 open_1 (name
, from_tty
, 0);
5010 /* Open a connection to a remote debugger using the extended
5011 remote gdb protocol. NAME is the filename used for communication. */
5014 extended_remote_target::open (const char *name
, int from_tty
)
5016 open_1 (name
, from_tty
, 1 /*extended_p */);
5019 /* Reset all packets back to "unknown support". Called when opening a
5020 new connection to a remote target. */
5023 reset_all_packet_configs_support (void)
5027 for (i
= 0; i
< PACKET_MAX
; i
++)
5028 remote_protocol_packets
[i
].support
= PACKET_SUPPORT_UNKNOWN
;
5031 /* Initialize all packet configs. */
5034 init_all_packet_configs (void)
5038 for (i
= 0; i
< PACKET_MAX
; i
++)
5040 remote_protocol_packets
[i
].detect
= AUTO_BOOLEAN_AUTO
;
5041 remote_protocol_packets
[i
].support
= PACKET_SUPPORT_UNKNOWN
;
5045 /* Symbol look-up. */
5048 remote_target::remote_check_symbols ()
5053 /* The remote side has no concept of inferiors that aren't running
5054 yet, it only knows about running processes. If we're connected
5055 but our current inferior is not running, we should not invite the
5056 remote target to request symbol lookups related to its
5057 (unrelated) current process. */
5058 if (!target_has_execution ())
5061 if (packet_support (PACKET_qSymbol
) == PACKET_DISABLE
)
5064 /* Make sure the remote is pointing at the right process. Note
5065 there's no way to select "no process". */
5066 set_general_process ();
5068 /* Allocate a message buffer. We can't reuse the input buffer in RS,
5069 because we need both at the same time. */
5070 gdb::char_vector
msg (get_remote_packet_size ());
5071 gdb::char_vector
reply (get_remote_packet_size ());
5073 /* Invite target to request symbol lookups. */
5075 putpkt ("qSymbol::");
5077 packet_ok (reply
, &remote_protocol_packets
[PACKET_qSymbol
]);
5079 while (startswith (reply
.data (), "qSymbol:"))
5081 struct bound_minimal_symbol sym
;
5084 end
= hex2bin (tmp
, reinterpret_cast <gdb_byte
*> (msg
.data ()),
5087 sym
= lookup_minimal_symbol (msg
.data (), NULL
, NULL
);
5088 if (sym
.minsym
== NULL
)
5089 xsnprintf (msg
.data (), get_remote_packet_size (), "qSymbol::%s",
5093 int addr_size
= gdbarch_addr_bit (target_gdbarch ()) / 8;
5094 CORE_ADDR sym_addr
= BMSYMBOL_VALUE_ADDRESS (sym
);
5096 /* If this is a function address, return the start of code
5097 instead of any data function descriptor. */
5098 sym_addr
= gdbarch_convert_from_func_ptr_addr
5099 (target_gdbarch (), sym_addr
, current_inferior ()->top_target ());
5101 xsnprintf (msg
.data (), get_remote_packet_size (), "qSymbol:%s:%s",
5102 phex_nz (sym_addr
, addr_size
), &reply
[8]);
5105 putpkt (msg
.data ());
5110 static struct serial
*
5111 remote_serial_open (const char *name
)
5113 static int udp_warning
= 0;
5115 /* FIXME: Parsing NAME here is a hack. But we want to warn here instead
5116 of in ser-tcp.c, because it is the remote protocol assuming that the
5117 serial connection is reliable and not the serial connection promising
5119 if (!udp_warning
&& startswith (name
, "udp:"))
5121 warning (_("The remote protocol may be unreliable over UDP.\n"
5122 "Some events may be lost, rendering further debugging "
5127 return serial_open (name
);
5130 /* Inform the target of our permission settings. The permission flags
5131 work without this, but if the target knows the settings, it can do
5132 a couple things. First, it can add its own check, to catch cases
5133 that somehow manage to get by the permissions checks in target
5134 methods. Second, if the target is wired to disallow particular
5135 settings (for instance, a system in the field that is not set up to
5136 be able to stop at a breakpoint), it can object to any unavailable
5140 remote_target::set_permissions ()
5142 struct remote_state
*rs
= get_remote_state ();
5144 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "QAllow:"
5145 "WriteReg:%x;WriteMem:%x;"
5146 "InsertBreak:%x;InsertTrace:%x;"
5147 "InsertFastTrace:%x;Stop:%x",
5148 may_write_registers
, may_write_memory
,
5149 may_insert_breakpoints
, may_insert_tracepoints
,
5150 may_insert_fast_tracepoints
, may_stop
);
5152 getpkt (&rs
->buf
, 0);
5154 /* If the target didn't like the packet, warn the user. Do not try
5155 to undo the user's settings, that would just be maddening. */
5156 if (strcmp (rs
->buf
.data (), "OK") != 0)
5157 warning (_("Remote refused setting permissions with: %s"),
5161 /* This type describes each known response to the qSupported
5163 struct protocol_feature
5165 /* The name of this protocol feature. */
5168 /* The default for this protocol feature. */
5169 enum packet_support default_support
;
5171 /* The function to call when this feature is reported, or after
5172 qSupported processing if the feature is not supported.
5173 The first argument points to this structure. The second
5174 argument indicates whether the packet requested support be
5175 enabled, disabled, or probed (or the default, if this function
5176 is being called at the end of processing and this feature was
5177 not reported). The third argument may be NULL; if not NULL, it
5178 is a NUL-terminated string taken from the packet following
5179 this feature's name and an equals sign. */
5180 void (*func
) (remote_target
*remote
, const struct protocol_feature
*,
5181 enum packet_support
, const char *);
5183 /* The corresponding packet for this feature. Only used if
5184 FUNC is remote_supported_packet. */
5189 remote_supported_packet (remote_target
*remote
,
5190 const struct protocol_feature
*feature
,
5191 enum packet_support support
,
5192 const char *argument
)
5196 warning (_("Remote qSupported response supplied an unexpected value for"
5197 " \"%s\"."), feature
->name
);
5201 remote_protocol_packets
[feature
->packet
].support
= support
;
5205 remote_target::remote_packet_size (const protocol_feature
*feature
,
5206 enum packet_support support
, const char *value
)
5208 struct remote_state
*rs
= get_remote_state ();
5213 if (support
!= PACKET_ENABLE
)
5216 if (value
== NULL
|| *value
== '\0')
5218 warning (_("Remote target reported \"%s\" without a size."),
5224 packet_size
= strtol (value
, &value_end
, 16);
5225 if (errno
!= 0 || *value_end
!= '\0' || packet_size
< 0)
5227 warning (_("Remote target reported \"%s\" with a bad size: \"%s\"."),
5228 feature
->name
, value
);
5232 /* Record the new maximum packet size. */
5233 rs
->explicit_packet_size
= packet_size
;
5237 remote_packet_size (remote_target
*remote
, const protocol_feature
*feature
,
5238 enum packet_support support
, const char *value
)
5240 remote
->remote_packet_size (feature
, support
, value
);
5243 static const struct protocol_feature remote_protocol_features
[] = {
5244 { "PacketSize", PACKET_DISABLE
, remote_packet_size
, -1 },
5245 { "qXfer:auxv:read", PACKET_DISABLE
, remote_supported_packet
,
5246 PACKET_qXfer_auxv
},
5247 { "qXfer:exec-file:read", PACKET_DISABLE
, remote_supported_packet
,
5248 PACKET_qXfer_exec_file
},
5249 { "qXfer:features:read", PACKET_DISABLE
, remote_supported_packet
,
5250 PACKET_qXfer_features
},
5251 { "qXfer:libraries:read", PACKET_DISABLE
, remote_supported_packet
,
5252 PACKET_qXfer_libraries
},
5253 { "qXfer:libraries-svr4:read", PACKET_DISABLE
, remote_supported_packet
,
5254 PACKET_qXfer_libraries_svr4
},
5255 { "augmented-libraries-svr4-read", PACKET_DISABLE
,
5256 remote_supported_packet
, PACKET_augmented_libraries_svr4_read_feature
},
5257 { "qXfer:memory-map:read", PACKET_DISABLE
, remote_supported_packet
,
5258 PACKET_qXfer_memory_map
},
5259 { "qXfer:osdata:read", PACKET_DISABLE
, remote_supported_packet
,
5260 PACKET_qXfer_osdata
},
5261 { "qXfer:threads:read", PACKET_DISABLE
, remote_supported_packet
,
5262 PACKET_qXfer_threads
},
5263 { "qXfer:traceframe-info:read", PACKET_DISABLE
, remote_supported_packet
,
5264 PACKET_qXfer_traceframe_info
},
5265 { "QPassSignals", PACKET_DISABLE
, remote_supported_packet
,
5266 PACKET_QPassSignals
},
5267 { "QCatchSyscalls", PACKET_DISABLE
, remote_supported_packet
,
5268 PACKET_QCatchSyscalls
},
5269 { "QProgramSignals", PACKET_DISABLE
, remote_supported_packet
,
5270 PACKET_QProgramSignals
},
5271 { "QSetWorkingDir", PACKET_DISABLE
, remote_supported_packet
,
5272 PACKET_QSetWorkingDir
},
5273 { "QStartupWithShell", PACKET_DISABLE
, remote_supported_packet
,
5274 PACKET_QStartupWithShell
},
5275 { "QEnvironmentHexEncoded", PACKET_DISABLE
, remote_supported_packet
,
5276 PACKET_QEnvironmentHexEncoded
},
5277 { "QEnvironmentReset", PACKET_DISABLE
, remote_supported_packet
,
5278 PACKET_QEnvironmentReset
},
5279 { "QEnvironmentUnset", PACKET_DISABLE
, remote_supported_packet
,
5280 PACKET_QEnvironmentUnset
},
5281 { "QStartNoAckMode", PACKET_DISABLE
, remote_supported_packet
,
5282 PACKET_QStartNoAckMode
},
5283 { "multiprocess", PACKET_DISABLE
, remote_supported_packet
,
5284 PACKET_multiprocess_feature
},
5285 { "QNonStop", PACKET_DISABLE
, remote_supported_packet
, PACKET_QNonStop
},
5286 { "qXfer:siginfo:read", PACKET_DISABLE
, remote_supported_packet
,
5287 PACKET_qXfer_siginfo_read
},
5288 { "qXfer:siginfo:write", PACKET_DISABLE
, remote_supported_packet
,
5289 PACKET_qXfer_siginfo_write
},
5290 { "ConditionalTracepoints", PACKET_DISABLE
, remote_supported_packet
,
5291 PACKET_ConditionalTracepoints
},
5292 { "ConditionalBreakpoints", PACKET_DISABLE
, remote_supported_packet
,
5293 PACKET_ConditionalBreakpoints
},
5294 { "BreakpointCommands", PACKET_DISABLE
, remote_supported_packet
,
5295 PACKET_BreakpointCommands
},
5296 { "FastTracepoints", PACKET_DISABLE
, remote_supported_packet
,
5297 PACKET_FastTracepoints
},
5298 { "StaticTracepoints", PACKET_DISABLE
, remote_supported_packet
,
5299 PACKET_StaticTracepoints
},
5300 {"InstallInTrace", PACKET_DISABLE
, remote_supported_packet
,
5301 PACKET_InstallInTrace
},
5302 { "DisconnectedTracing", PACKET_DISABLE
, remote_supported_packet
,
5303 PACKET_DisconnectedTracing_feature
},
5304 { "ReverseContinue", PACKET_DISABLE
, remote_supported_packet
,
5306 { "ReverseStep", PACKET_DISABLE
, remote_supported_packet
,
5308 { "TracepointSource", PACKET_DISABLE
, remote_supported_packet
,
5309 PACKET_TracepointSource
},
5310 { "QAllow", PACKET_DISABLE
, remote_supported_packet
,
5312 { "EnableDisableTracepoints", PACKET_DISABLE
, remote_supported_packet
,
5313 PACKET_EnableDisableTracepoints_feature
},
5314 { "qXfer:fdpic:read", PACKET_DISABLE
, remote_supported_packet
,
5315 PACKET_qXfer_fdpic
},
5316 { "qXfer:uib:read", PACKET_DISABLE
, remote_supported_packet
,
5318 { "QDisableRandomization", PACKET_DISABLE
, remote_supported_packet
,
5319 PACKET_QDisableRandomization
},
5320 { "QAgent", PACKET_DISABLE
, remote_supported_packet
, PACKET_QAgent
},
5321 { "QTBuffer:size", PACKET_DISABLE
,
5322 remote_supported_packet
, PACKET_QTBuffer_size
},
5323 { "tracenz", PACKET_DISABLE
, remote_supported_packet
, PACKET_tracenz_feature
},
5324 { "Qbtrace:off", PACKET_DISABLE
, remote_supported_packet
, PACKET_Qbtrace_off
},
5325 { "Qbtrace:bts", PACKET_DISABLE
, remote_supported_packet
, PACKET_Qbtrace_bts
},
5326 { "Qbtrace:pt", PACKET_DISABLE
, remote_supported_packet
, PACKET_Qbtrace_pt
},
5327 { "qXfer:btrace:read", PACKET_DISABLE
, remote_supported_packet
,
5328 PACKET_qXfer_btrace
},
5329 { "qXfer:btrace-conf:read", PACKET_DISABLE
, remote_supported_packet
,
5330 PACKET_qXfer_btrace_conf
},
5331 { "Qbtrace-conf:bts:size", PACKET_DISABLE
, remote_supported_packet
,
5332 PACKET_Qbtrace_conf_bts_size
},
5333 { "swbreak", PACKET_DISABLE
, remote_supported_packet
, PACKET_swbreak_feature
},
5334 { "hwbreak", PACKET_DISABLE
, remote_supported_packet
, PACKET_hwbreak_feature
},
5335 { "fork-events", PACKET_DISABLE
, remote_supported_packet
,
5336 PACKET_fork_event_feature
},
5337 { "vfork-events", PACKET_DISABLE
, remote_supported_packet
,
5338 PACKET_vfork_event_feature
},
5339 { "exec-events", PACKET_DISABLE
, remote_supported_packet
,
5340 PACKET_exec_event_feature
},
5341 { "Qbtrace-conf:pt:size", PACKET_DISABLE
, remote_supported_packet
,
5342 PACKET_Qbtrace_conf_pt_size
},
5343 { "vContSupported", PACKET_DISABLE
, remote_supported_packet
, PACKET_vContSupported
},
5344 { "QThreadEvents", PACKET_DISABLE
, remote_supported_packet
, PACKET_QThreadEvents
},
5345 { "no-resumed", PACKET_DISABLE
, remote_supported_packet
, PACKET_no_resumed
},
5346 { "memory-tagging", PACKET_DISABLE
, remote_supported_packet
,
5347 PACKET_memory_tagging_feature
},
5350 static char *remote_support_xml
;
5352 /* Register string appended to "xmlRegisters=" in qSupported query. */
5355 register_remote_support_xml (const char *xml
)
5357 #if defined(HAVE_LIBEXPAT)
5358 if (remote_support_xml
== NULL
)
5359 remote_support_xml
= concat ("xmlRegisters=", xml
, (char *) NULL
);
5362 char *copy
= xstrdup (remote_support_xml
+ 13);
5364 char *p
= strtok_r (copy
, ",", &saveptr
);
5368 if (strcmp (p
, xml
) == 0)
5375 while ((p
= strtok_r (NULL
, ",", &saveptr
)) != NULL
);
5378 remote_support_xml
= reconcat (remote_support_xml
,
5379 remote_support_xml
, ",", xml
,
5386 remote_query_supported_append (std::string
*msg
, const char *append
)
5390 msg
->append (append
);
5394 remote_target::remote_query_supported ()
5396 struct remote_state
*rs
= get_remote_state ();
5399 unsigned char seen
[ARRAY_SIZE (remote_protocol_features
)];
5401 /* The packet support flags are handled differently for this packet
5402 than for most others. We treat an error, a disabled packet, and
5403 an empty response identically: any features which must be reported
5404 to be used will be automatically disabled. An empty buffer
5405 accomplishes this, since that is also the representation for a list
5406 containing no features. */
5409 if (packet_support (PACKET_qSupported
) != PACKET_DISABLE
)
5413 if (packet_set_cmd_state (PACKET_multiprocess_feature
) != AUTO_BOOLEAN_FALSE
)
5414 remote_query_supported_append (&q
, "multiprocess+");
5416 if (packet_set_cmd_state (PACKET_swbreak_feature
) != AUTO_BOOLEAN_FALSE
)
5417 remote_query_supported_append (&q
, "swbreak+");
5418 if (packet_set_cmd_state (PACKET_hwbreak_feature
) != AUTO_BOOLEAN_FALSE
)
5419 remote_query_supported_append (&q
, "hwbreak+");
5421 remote_query_supported_append (&q
, "qRelocInsn+");
5423 if (packet_set_cmd_state (PACKET_fork_event_feature
)
5424 != AUTO_BOOLEAN_FALSE
)
5425 remote_query_supported_append (&q
, "fork-events+");
5426 if (packet_set_cmd_state (PACKET_vfork_event_feature
)
5427 != AUTO_BOOLEAN_FALSE
)
5428 remote_query_supported_append (&q
, "vfork-events+");
5429 if (packet_set_cmd_state (PACKET_exec_event_feature
)
5430 != AUTO_BOOLEAN_FALSE
)
5431 remote_query_supported_append (&q
, "exec-events+");
5433 if (packet_set_cmd_state (PACKET_vContSupported
) != AUTO_BOOLEAN_FALSE
)
5434 remote_query_supported_append (&q
, "vContSupported+");
5436 if (packet_set_cmd_state (PACKET_QThreadEvents
) != AUTO_BOOLEAN_FALSE
)
5437 remote_query_supported_append (&q
, "QThreadEvents+");
5439 if (packet_set_cmd_state (PACKET_no_resumed
) != AUTO_BOOLEAN_FALSE
)
5440 remote_query_supported_append (&q
, "no-resumed+");
5442 if (packet_set_cmd_state (PACKET_memory_tagging_feature
)
5443 != AUTO_BOOLEAN_FALSE
)
5444 remote_query_supported_append (&q
, "memory-tagging+");
5446 /* Keep this one last to work around a gdbserver <= 7.10 bug in
5447 the qSupported:xmlRegisters=i386 handling. */
5448 if (remote_support_xml
!= NULL
5449 && packet_support (PACKET_qXfer_features
) != PACKET_DISABLE
)
5450 remote_query_supported_append (&q
, remote_support_xml
);
5452 q
= "qSupported:" + q
;
5453 putpkt (q
.c_str ());
5455 getpkt (&rs
->buf
, 0);
5457 /* If an error occured, warn, but do not return - just reset the
5458 buffer to empty and go on to disable features. */
5459 if (packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_qSupported
])
5462 warning (_("Remote failure reply: %s"), rs
->buf
.data ());
5467 memset (seen
, 0, sizeof (seen
));
5469 next
= rs
->buf
.data ();
5472 enum packet_support is_supported
;
5473 char *p
, *end
, *name_end
, *value
;
5475 /* First separate out this item from the rest of the packet. If
5476 there's another item after this, we overwrite the separator
5477 (terminated strings are much easier to work with). */
5479 end
= strchr (p
, ';');
5482 end
= p
+ strlen (p
);
5492 warning (_("empty item in \"qSupported\" response"));
5497 name_end
= strchr (p
, '=');
5500 /* This is a name=value entry. */
5501 is_supported
= PACKET_ENABLE
;
5502 value
= name_end
+ 1;
5511 is_supported
= PACKET_ENABLE
;
5515 is_supported
= PACKET_DISABLE
;
5519 is_supported
= PACKET_SUPPORT_UNKNOWN
;
5523 warning (_("unrecognized item \"%s\" "
5524 "in \"qSupported\" response"), p
);
5530 for (i
= 0; i
< ARRAY_SIZE (remote_protocol_features
); i
++)
5531 if (strcmp (remote_protocol_features
[i
].name
, p
) == 0)
5533 const struct protocol_feature
*feature
;
5536 feature
= &remote_protocol_features
[i
];
5537 feature
->func (this, feature
, is_supported
, value
);
5542 /* If we increased the packet size, make sure to increase the global
5543 buffer size also. We delay this until after parsing the entire
5544 qSupported packet, because this is the same buffer we were
5546 if (rs
->buf
.size () < rs
->explicit_packet_size
)
5547 rs
->buf
.resize (rs
->explicit_packet_size
);
5549 /* Handle the defaults for unmentioned features. */
5550 for (i
= 0; i
< ARRAY_SIZE (remote_protocol_features
); i
++)
5553 const struct protocol_feature
*feature
;
5555 feature
= &remote_protocol_features
[i
];
5556 feature
->func (this, feature
, feature
->default_support
, NULL
);
5560 /* Serial QUIT handler for the remote serial descriptor.
5562 Defers handling a Ctrl-C until we're done with the current
5563 command/response packet sequence, unless:
5565 - We're setting up the connection. Don't send a remote interrupt
5566 request, as we're not fully synced yet. Quit immediately
5569 - The target has been resumed in the foreground
5570 (target_terminal::is_ours is false) with a synchronous resume
5571 packet, and we're blocked waiting for the stop reply, thus a
5572 Ctrl-C should be immediately sent to the target.
5574 - We get a second Ctrl-C while still within the same serial read or
5575 write. In that case the serial is seemingly wedged --- offer to
5578 - We see a second Ctrl-C without target response, after having
5579 previously interrupted the target. In that case the target/stub
5580 is probably wedged --- offer to quit/disconnect.
5584 remote_target::remote_serial_quit_handler ()
5586 struct remote_state
*rs
= get_remote_state ();
5588 if (check_quit_flag ())
5590 /* If we're starting up, we're not fully synced yet. Quit
5592 if (rs
->starting_up
)
5594 else if (rs
->got_ctrlc_during_io
)
5596 if (query (_("The target is not responding to GDB commands.\n"
5597 "Stop debugging it? ")))
5598 remote_unpush_and_throw (this);
5600 /* If ^C has already been sent once, offer to disconnect. */
5601 else if (!target_terminal::is_ours () && rs
->ctrlc_pending_p
)
5603 /* All-stop protocol, and blocked waiting for stop reply. Send
5604 an interrupt request. */
5605 else if (!target_terminal::is_ours () && rs
->waiting_for_stop_reply
)
5606 target_interrupt ();
5608 rs
->got_ctrlc_during_io
= 1;
5612 /* The remote_target that is current while the quit handler is
5613 overridden with remote_serial_quit_handler. */
5614 static remote_target
*curr_quit_handler_target
;
5617 remote_serial_quit_handler ()
5619 curr_quit_handler_target
->remote_serial_quit_handler ();
5622 /* Remove the remote target from the target stack of each inferior
5623 that is using it. Upper targets depend on it so remove them
5627 remote_unpush_target (remote_target
*target
)
5629 /* We have to unpush the target from all inferiors, even those that
5631 scoped_restore_current_inferior restore_current_inferior
;
5633 for (inferior
*inf
: all_inferiors (target
))
5635 switch_to_inferior_no_thread (inf
);
5636 pop_all_targets_at_and_above (process_stratum
);
5637 generic_mourn_inferior ();
5640 /* Don't rely on target_close doing this when the target is popped
5641 from the last remote inferior above, because something may be
5642 holding a reference to the target higher up on the stack, meaning
5643 target_close won't be called yet. We lost the connection to the
5644 target, so clear these now, otherwise we may later throw
5645 TARGET_CLOSE_ERROR while trying to tell the remote target to
5647 fileio_handles_invalidate_target (target
);
5651 remote_unpush_and_throw (remote_target
*target
)
5653 remote_unpush_target (target
);
5654 throw_error (TARGET_CLOSE_ERROR
, _("Disconnected from target."));
5658 remote_target::open_1 (const char *name
, int from_tty
, int extended_p
)
5660 remote_target
*curr_remote
= get_current_remote_target ();
5663 error (_("To open a remote debug connection, you need to specify what\n"
5664 "serial device is attached to the remote system\n"
5665 "(e.g. /dev/ttyS0, /dev/ttya, COM1, etc.)."));
5667 /* If we're connected to a running target, target_preopen will kill it.
5668 Ask this question first, before target_preopen has a chance to kill
5670 if (curr_remote
!= NULL
&& !target_has_execution ())
5673 && !query (_("Already connected to a remote target. Disconnect? ")))
5674 error (_("Still connected."));
5677 /* Here the possibly existing remote target gets unpushed. */
5678 target_preopen (from_tty
);
5680 remote_fileio_reset ();
5681 reopen_exec_file ();
5684 remote_target
*remote
5685 = (extended_p
? new extended_remote_target () : new remote_target ());
5686 target_ops_up
target_holder (remote
);
5688 remote_state
*rs
= remote
->get_remote_state ();
5690 /* See FIXME above. */
5691 if (!target_async_permitted
)
5692 rs
->wait_forever_enabled_p
= 1;
5694 rs
->remote_desc
= remote_serial_open (name
);
5695 if (!rs
->remote_desc
)
5696 perror_with_name (name
);
5698 if (baud_rate
!= -1)
5700 if (serial_setbaudrate (rs
->remote_desc
, baud_rate
))
5702 /* The requested speed could not be set. Error out to
5703 top level after closing remote_desc. Take care to
5704 set remote_desc to NULL to avoid closing remote_desc
5706 serial_close (rs
->remote_desc
);
5707 rs
->remote_desc
= NULL
;
5708 perror_with_name (name
);
5712 serial_setparity (rs
->remote_desc
, serial_parity
);
5713 serial_raw (rs
->remote_desc
);
5715 /* If there is something sitting in the buffer we might take it as a
5716 response to a command, which would be bad. */
5717 serial_flush_input (rs
->remote_desc
);
5721 puts_filtered ("Remote debugging using ");
5722 puts_filtered (name
);
5723 puts_filtered ("\n");
5726 /* Switch to using the remote target now. */
5727 current_inferior ()->push_target (std::move (target_holder
));
5729 /* Register extra event sources in the event loop. */
5730 rs
->remote_async_inferior_event_token
5731 = create_async_event_handler (remote_async_inferior_event_handler
, nullptr,
5733 rs
->notif_state
= remote_notif_state_allocate (remote
);
5735 /* Reset the target state; these things will be queried either by
5736 remote_query_supported or as they are needed. */
5737 reset_all_packet_configs_support ();
5738 rs
->cached_wait_status
= 0;
5739 rs
->explicit_packet_size
= 0;
5741 rs
->extended
= extended_p
;
5742 rs
->waiting_for_stop_reply
= 0;
5743 rs
->ctrlc_pending_p
= 0;
5744 rs
->got_ctrlc_during_io
= 0;
5746 rs
->general_thread
= not_sent_ptid
;
5747 rs
->continue_thread
= not_sent_ptid
;
5748 rs
->remote_traceframe_number
= -1;
5750 rs
->last_resume_exec_dir
= EXEC_FORWARD
;
5752 /* Probe for ability to use "ThreadInfo" query, as required. */
5753 rs
->use_threadinfo_query
= 1;
5754 rs
->use_threadextra_query
= 1;
5756 rs
->readahead_cache
.invalidate ();
5758 if (target_async_permitted
)
5760 /* FIXME: cagney/1999-09-23: During the initial connection it is
5761 assumed that the target is already ready and able to respond to
5762 requests. Unfortunately remote_start_remote() eventually calls
5763 wait_for_inferior() with no timeout. wait_forever_enabled_p gets
5764 around this. Eventually a mechanism that allows
5765 wait_for_inferior() to expect/get timeouts will be
5767 rs
->wait_forever_enabled_p
= 0;
5770 /* First delete any symbols previously loaded from shared libraries. */
5771 no_shared_libraries (NULL
, 0);
5773 /* Start the remote connection. If error() or QUIT, discard this
5774 target (we'd otherwise be in an inconsistent state) and then
5775 propogate the error on up the exception chain. This ensures that
5776 the caller doesn't stumble along blindly assuming that the
5777 function succeeded. The CLI doesn't have this problem but other
5778 UI's, such as MI do.
5780 FIXME: cagney/2002-05-19: Instead of re-throwing the exception,
5781 this function should return an error indication letting the
5782 caller restore the previous state. Unfortunately the command
5783 ``target remote'' is directly wired to this function making that
5784 impossible. On a positive note, the CLI side of this problem has
5785 been fixed - the function set_cmd_context() makes it possible for
5786 all the ``target ....'' commands to share a common callback
5787 function. See cli-dump.c. */
5792 remote
->start_remote (from_tty
, extended_p
);
5794 catch (const gdb_exception
&ex
)
5796 /* Pop the partially set up target - unless something else did
5797 already before throwing the exception. */
5798 if (ex
.error
!= TARGET_CLOSE_ERROR
)
5799 remote_unpush_target (remote
);
5804 remote_btrace_reset (rs
);
5806 if (target_async_permitted
)
5807 rs
->wait_forever_enabled_p
= 1;
5810 /* Detach the specified process. */
5813 remote_target::remote_detach_pid (int pid
)
5815 struct remote_state
*rs
= get_remote_state ();
5817 /* This should not be necessary, but the handling for D;PID in
5818 GDBserver versions prior to 8.2 incorrectly assumes that the
5819 selected process points to the same process we're detaching,
5820 leading to misbehavior (and possibly GDBserver crashing) when it
5821 does not. Since it's easy and cheap, work around it by forcing
5822 GDBserver to select GDB's current process. */
5823 set_general_process ();
5825 if (remote_multi_process_p (rs
))
5826 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "D;%x", pid
);
5828 strcpy (rs
->buf
.data (), "D");
5831 getpkt (&rs
->buf
, 0);
5833 if (rs
->buf
[0] == 'O' && rs
->buf
[1] == 'K')
5835 else if (rs
->buf
[0] == '\0')
5836 error (_("Remote doesn't know how to detach"));
5838 error (_("Can't detach process."));
5841 /* This detaches a program to which we previously attached, using
5842 inferior_ptid to identify the process. After this is done, GDB
5843 can be used to debug some other program. We better not have left
5844 any breakpoints in the target program or it'll die when it hits
5848 remote_target::remote_detach_1 (inferior
*inf
, int from_tty
)
5850 int pid
= inferior_ptid
.pid ();
5851 struct remote_state
*rs
= get_remote_state ();
5854 if (!target_has_execution ())
5855 error (_("No process to detach from."));
5857 target_announce_detach (from_tty
);
5859 if (!gdbarch_has_global_breakpoints (target_gdbarch ()))
5861 /* If we're in breakpoints-always-inserted mode, or the inferior
5862 is running, we have to remove breakpoints before detaching.
5863 We don't do this in common code instead because not all
5864 targets support removing breakpoints while the target is
5865 running. The remote target / gdbserver does, though. */
5866 remove_breakpoints_inf (current_inferior ());
5869 /* Tell the remote target to detach. */
5870 remote_detach_pid (pid
);
5872 /* Exit only if this is the only active inferior. */
5873 if (from_tty
&& !rs
->extended
&& number_of_live_inferiors (this) == 1)
5874 puts_filtered (_("Ending remote debugging.\n"));
5876 thread_info
*tp
= find_thread_ptid (this, inferior_ptid
);
5878 /* Check to see if we are detaching a fork parent. Note that if we
5879 are detaching a fork child, tp == NULL. */
5880 is_fork_parent
= (tp
!= NULL
5881 && tp
->pending_follow
.kind
== TARGET_WAITKIND_FORKED
);
5883 /* If doing detach-on-fork, we don't mourn, because that will delete
5884 breakpoints that should be available for the followed inferior. */
5885 if (!is_fork_parent
)
5887 /* Save the pid as a string before mourning, since that will
5888 unpush the remote target, and we need the string after. */
5889 std::string infpid
= target_pid_to_str (ptid_t (pid
));
5891 target_mourn_inferior (inferior_ptid
);
5892 if (print_inferior_events
)
5893 printf_unfiltered (_("[Inferior %d (%s) detached]\n"),
5894 inf
->num
, infpid
.c_str ());
5898 switch_to_no_thread ();
5899 detach_inferior (current_inferior ());
5904 remote_target::detach (inferior
*inf
, int from_tty
)
5906 remote_detach_1 (inf
, from_tty
);
5910 extended_remote_target::detach (inferior
*inf
, int from_tty
)
5912 remote_detach_1 (inf
, from_tty
);
5915 /* Target follow-fork function for remote targets. On entry, and
5916 at return, the current inferior is the fork parent.
5918 Note that although this is currently only used for extended-remote,
5919 it is named remote_follow_fork in anticipation of using it for the
5920 remote target as well. */
5923 remote_target::follow_fork (inferior
*child_inf
, ptid_t child_ptid
,
5924 target_waitkind fork_kind
, bool follow_child
,
5927 process_stratum_target::follow_fork (child_inf
, child_ptid
,
5928 fork_kind
, follow_child
, detach_fork
);
5930 struct remote_state
*rs
= get_remote_state ();
5932 if ((fork_kind
== TARGET_WAITKIND_FORKED
&& remote_fork_event_p (rs
))
5933 || (fork_kind
== TARGET_WAITKIND_VFORKED
&& remote_vfork_event_p (rs
)))
5935 /* When following the parent and detaching the child, we detach
5936 the child here. For the case of following the child and
5937 detaching the parent, the detach is done in the target-
5938 independent follow fork code in infrun.c. We can't use
5939 target_detach when detaching an unfollowed child because
5940 the client side doesn't know anything about the child. */
5941 if (detach_fork
&& !follow_child
)
5943 /* Detach the fork child. */
5944 remote_detach_pid (child_ptid
.pid ());
5949 /* Target follow-exec function for remote targets. Save EXECD_PATHNAME
5950 in the program space of the new inferior. */
5953 remote_target::follow_exec (inferior
*follow_inf
, ptid_t ptid
,
5954 const char *execd_pathname
)
5956 process_stratum_target::follow_exec (follow_inf
, ptid
, execd_pathname
);
5958 /* We know that this is a target file name, so if it has the "target:"
5959 prefix we strip it off before saving it in the program space. */
5960 if (is_target_filename (execd_pathname
))
5961 execd_pathname
+= strlen (TARGET_SYSROOT_PREFIX
);
5963 set_pspace_remote_exec_file (follow_inf
->pspace
, execd_pathname
);
5966 /* Same as remote_detach, but don't send the "D" packet; just disconnect. */
5969 remote_target::disconnect (const char *args
, int from_tty
)
5972 error (_("Argument given to \"disconnect\" when remotely debugging."));
5974 /* Make sure we unpush even the extended remote targets. Calling
5975 target_mourn_inferior won't unpush, and
5976 remote_target::mourn_inferior won't unpush if there is more than
5977 one inferior left. */
5978 remote_unpush_target (this);
5981 puts_filtered ("Ending remote debugging.\n");
5984 /* Attach to the process specified by ARGS. If FROM_TTY is non-zero,
5985 be chatty about it. */
5988 extended_remote_target::attach (const char *args
, int from_tty
)
5990 struct remote_state
*rs
= get_remote_state ();
5992 char *wait_status
= NULL
;
5994 pid
= parse_pid_to_attach (args
);
5996 /* Remote PID can be freely equal to getpid, do not check it here the same
5997 way as in other targets. */
5999 if (packet_support (PACKET_vAttach
) == PACKET_DISABLE
)
6000 error (_("This target does not support attaching to a process"));
6004 const char *exec_file
= get_exec_file (0);
6007 printf_unfiltered (_("Attaching to program: %s, %s\n"), exec_file
,
6008 target_pid_to_str (ptid_t (pid
)).c_str ());
6010 printf_unfiltered (_("Attaching to %s\n"),
6011 target_pid_to_str (ptid_t (pid
)).c_str ());
6014 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "vAttach;%x", pid
);
6016 getpkt (&rs
->buf
, 0);
6018 switch (packet_ok (rs
->buf
,
6019 &remote_protocol_packets
[PACKET_vAttach
]))
6022 if (!target_is_non_stop_p ())
6024 /* Save the reply for later. */
6025 wait_status
= (char *) alloca (strlen (rs
->buf
.data ()) + 1);
6026 strcpy (wait_status
, rs
->buf
.data ());
6028 else if (strcmp (rs
->buf
.data (), "OK") != 0)
6029 error (_("Attaching to %s failed with: %s"),
6030 target_pid_to_str (ptid_t (pid
)).c_str (),
6033 case PACKET_UNKNOWN
:
6034 error (_("This target does not support attaching to a process"));
6036 error (_("Attaching to %s failed"),
6037 target_pid_to_str (ptid_t (pid
)).c_str ());
6040 switch_to_inferior_no_thread (remote_add_inferior (false, pid
, 1, 0));
6042 inferior_ptid
= ptid_t (pid
);
6044 if (target_is_non_stop_p ())
6046 /* Get list of threads. */
6047 update_thread_list ();
6049 thread_info
*thread
= first_thread_of_inferior (current_inferior ());
6050 if (thread
!= nullptr)
6051 switch_to_thread (thread
);
6053 /* Invalidate our notion of the remote current thread. */
6054 record_currthread (rs
, minus_one_ptid
);
6058 /* Now, if we have thread information, update the main thread's
6060 ptid_t curr_ptid
= remote_current_thread (ptid_t (pid
));
6062 /* Add the main thread to the thread list. */
6063 thread_info
*thr
= add_thread_silent (this, curr_ptid
);
6065 switch_to_thread (thr
);
6067 /* Don't consider the thread stopped until we've processed the
6068 saved stop reply. */
6069 set_executing (this, thr
->ptid
, true);
6072 /* Next, if the target can specify a description, read it. We do
6073 this before anything involving memory or registers. */
6074 target_find_description ();
6076 if (!target_is_non_stop_p ())
6078 /* Use the previously fetched status. */
6079 gdb_assert (wait_status
!= NULL
);
6081 if (target_can_async_p ())
6083 struct notif_event
*reply
6084 = remote_notif_parse (this, ¬if_client_stop
, wait_status
);
6086 push_stop_reply ((struct stop_reply
*) reply
);
6092 gdb_assert (wait_status
!= NULL
);
6093 strcpy (rs
->buf
.data (), wait_status
);
6094 rs
->cached_wait_status
= 1;
6099 gdb_assert (wait_status
== NULL
);
6101 gdb_assert (target_can_async_p ());
6106 /* Implementation of the to_post_attach method. */
6109 extended_remote_target::post_attach (int pid
)
6111 /* Get text, data & bss offsets. */
6114 /* In certain cases GDB might not have had the chance to start
6115 symbol lookup up until now. This could happen if the debugged
6116 binary is not using shared libraries, the vsyscall page is not
6117 present (on Linux) and the binary itself hadn't changed since the
6118 debugging process was started. */
6119 if (current_program_space
->symfile_object_file
!= NULL
)
6120 remote_check_symbols();
6124 /* Check for the availability of vCont. This function should also check
6128 remote_target::remote_vcont_probe ()
6130 remote_state
*rs
= get_remote_state ();
6133 strcpy (rs
->buf
.data (), "vCont?");
6135 getpkt (&rs
->buf
, 0);
6136 buf
= rs
->buf
.data ();
6138 /* Make sure that the features we assume are supported. */
6139 if (startswith (buf
, "vCont"))
6142 int support_c
, support_C
;
6144 rs
->supports_vCont
.s
= 0;
6145 rs
->supports_vCont
.S
= 0;
6148 rs
->supports_vCont
.t
= 0;
6149 rs
->supports_vCont
.r
= 0;
6150 while (p
&& *p
== ';')
6153 if (*p
== 's' && (*(p
+ 1) == ';' || *(p
+ 1) == 0))
6154 rs
->supports_vCont
.s
= 1;
6155 else if (*p
== 'S' && (*(p
+ 1) == ';' || *(p
+ 1) == 0))
6156 rs
->supports_vCont
.S
= 1;
6157 else if (*p
== 'c' && (*(p
+ 1) == ';' || *(p
+ 1) == 0))
6159 else if (*p
== 'C' && (*(p
+ 1) == ';' || *(p
+ 1) == 0))
6161 else if (*p
== 't' && (*(p
+ 1) == ';' || *(p
+ 1) == 0))
6162 rs
->supports_vCont
.t
= 1;
6163 else if (*p
== 'r' && (*(p
+ 1) == ';' || *(p
+ 1) == 0))
6164 rs
->supports_vCont
.r
= 1;
6166 p
= strchr (p
, ';');
6169 /* If c, and C are not all supported, we can't use vCont. Clearing
6170 BUF will make packet_ok disable the packet. */
6171 if (!support_c
|| !support_C
)
6175 packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_vCont
]);
6176 rs
->supports_vCont_probed
= true;
6179 /* Helper function for building "vCont" resumptions. Write a
6180 resumption to P. ENDP points to one-passed-the-end of the buffer
6181 we're allowed to write to. Returns BUF+CHARACTERS_WRITTEN. The
6182 thread to be resumed is PTID; STEP and SIGGNAL indicate whether the
6183 resumed thread should be single-stepped and/or signalled. If PTID
6184 equals minus_one_ptid, then all threads are resumed; if PTID
6185 represents a process, then all threads of the process are resumed;
6186 the thread to be stepped and/or signalled is given in the global
6190 remote_target::append_resumption (char *p
, char *endp
,
6191 ptid_t ptid
, int step
, gdb_signal siggnal
)
6193 struct remote_state
*rs
= get_remote_state ();
6195 if (step
&& siggnal
!= GDB_SIGNAL_0
)
6196 p
+= xsnprintf (p
, endp
- p
, ";S%02x", siggnal
);
6198 /* GDB is willing to range step. */
6199 && use_range_stepping
6200 /* Target supports range stepping. */
6201 && rs
->supports_vCont
.r
6202 /* We don't currently support range stepping multiple
6203 threads with a wildcard (though the protocol allows it,
6204 so stubs shouldn't make an active effort to forbid
6206 && !(remote_multi_process_p (rs
) && ptid
.is_pid ()))
6208 struct thread_info
*tp
;
6210 if (ptid
== minus_one_ptid
)
6212 /* If we don't know about the target thread's tid, then
6213 we're resuming magic_null_ptid (see caller). */
6214 tp
= find_thread_ptid (this, magic_null_ptid
);
6217 tp
= find_thread_ptid (this, ptid
);
6218 gdb_assert (tp
!= NULL
);
6220 if (tp
->control
.may_range_step
)
6222 int addr_size
= gdbarch_addr_bit (target_gdbarch ()) / 8;
6224 p
+= xsnprintf (p
, endp
- p
, ";r%s,%s",
6225 phex_nz (tp
->control
.step_range_start
,
6227 phex_nz (tp
->control
.step_range_end
,
6231 p
+= xsnprintf (p
, endp
- p
, ";s");
6234 p
+= xsnprintf (p
, endp
- p
, ";s");
6235 else if (siggnal
!= GDB_SIGNAL_0
)
6236 p
+= xsnprintf (p
, endp
- p
, ";C%02x", siggnal
);
6238 p
+= xsnprintf (p
, endp
- p
, ";c");
6240 if (remote_multi_process_p (rs
) && ptid
.is_pid ())
6244 /* All (-1) threads of process. */
6245 nptid
= ptid_t (ptid
.pid (), -1);
6247 p
+= xsnprintf (p
, endp
- p
, ":");
6248 p
= write_ptid (p
, endp
, nptid
);
6250 else if (ptid
!= minus_one_ptid
)
6252 p
+= xsnprintf (p
, endp
- p
, ":");
6253 p
= write_ptid (p
, endp
, ptid
);
6259 /* Clear the thread's private info on resume. */
6262 resume_clear_thread_private_info (struct thread_info
*thread
)
6264 if (thread
->priv
!= NULL
)
6266 remote_thread_info
*priv
= get_remote_thread_info (thread
);
6268 priv
->stop_reason
= TARGET_STOPPED_BY_NO_REASON
;
6269 priv
->watch_data_address
= 0;
6273 /* Append a vCont continue-with-signal action for threads that have a
6274 non-zero stop signal. */
6277 remote_target::append_pending_thread_resumptions (char *p
, char *endp
,
6280 for (thread_info
*thread
: all_non_exited_threads (this, ptid
))
6281 if (inferior_ptid
!= thread
->ptid
6282 && thread
->stop_signal () != GDB_SIGNAL_0
)
6284 p
= append_resumption (p
, endp
, thread
->ptid
,
6285 0, thread
->stop_signal ());
6286 thread
->set_stop_signal (GDB_SIGNAL_0
);
6287 resume_clear_thread_private_info (thread
);
6293 /* Set the target running, using the packets that use Hc
6297 remote_target::remote_resume_with_hc (ptid_t ptid
, int step
,
6300 struct remote_state
*rs
= get_remote_state ();
6303 rs
->last_sent_signal
= siggnal
;
6304 rs
->last_sent_step
= step
;
6306 /* The c/s/C/S resume packets use Hc, so set the continue
6308 if (ptid
== minus_one_ptid
)
6309 set_continue_thread (any_thread_ptid
);
6311 set_continue_thread (ptid
);
6313 for (thread_info
*thread
: all_non_exited_threads (this))
6314 resume_clear_thread_private_info (thread
);
6316 buf
= rs
->buf
.data ();
6317 if (::execution_direction
== EXEC_REVERSE
)
6319 /* We don't pass signals to the target in reverse exec mode. */
6320 if (info_verbose
&& siggnal
!= GDB_SIGNAL_0
)
6321 warning (_(" - Can't pass signal %d to target in reverse: ignored."),
6324 if (step
&& packet_support (PACKET_bs
) == PACKET_DISABLE
)
6325 error (_("Remote reverse-step not supported."));
6326 if (!step
&& packet_support (PACKET_bc
) == PACKET_DISABLE
)
6327 error (_("Remote reverse-continue not supported."));
6329 strcpy (buf
, step
? "bs" : "bc");
6331 else if (siggnal
!= GDB_SIGNAL_0
)
6333 buf
[0] = step
? 'S' : 'C';
6334 buf
[1] = tohex (((int) siggnal
>> 4) & 0xf);
6335 buf
[2] = tohex (((int) siggnal
) & 0xf);
6339 strcpy (buf
, step
? "s" : "c");
6344 /* Resume the remote inferior by using a "vCont" packet. The thread
6345 to be resumed is PTID; STEP and SIGGNAL indicate whether the
6346 resumed thread should be single-stepped and/or signalled. If PTID
6347 equals minus_one_ptid, then all threads are resumed; the thread to
6348 be stepped and/or signalled is given in the global INFERIOR_PTID.
6349 This function returns non-zero iff it resumes the inferior.
6351 This function issues a strict subset of all possible vCont commands
6355 remote_target::remote_resume_with_vcont (ptid_t ptid
, int step
,
6356 enum gdb_signal siggnal
)
6358 struct remote_state
*rs
= get_remote_state ();
6362 /* No reverse execution actions defined for vCont. */
6363 if (::execution_direction
== EXEC_REVERSE
)
6366 if (packet_support (PACKET_vCont
) == PACKET_SUPPORT_UNKNOWN
)
6367 remote_vcont_probe ();
6369 if (packet_support (PACKET_vCont
) == PACKET_DISABLE
)
6372 p
= rs
->buf
.data ();
6373 endp
= p
+ get_remote_packet_size ();
6375 /* If we could generate a wider range of packets, we'd have to worry
6376 about overflowing BUF. Should there be a generic
6377 "multi-part-packet" packet? */
6379 p
+= xsnprintf (p
, endp
- p
, "vCont");
6381 if (ptid
== magic_null_ptid
)
6383 /* MAGIC_NULL_PTID means that we don't have any active threads,
6384 so we don't have any TID numbers the inferior will
6385 understand. Make sure to only send forms that do not specify
6387 append_resumption (p
, endp
, minus_one_ptid
, step
, siggnal
);
6389 else if (ptid
== minus_one_ptid
|| ptid
.is_pid ())
6391 /* Resume all threads (of all processes, or of a single
6392 process), with preference for INFERIOR_PTID. This assumes
6393 inferior_ptid belongs to the set of all threads we are about
6395 if (step
|| siggnal
!= GDB_SIGNAL_0
)
6397 /* Step inferior_ptid, with or without signal. */
6398 p
= append_resumption (p
, endp
, inferior_ptid
, step
, siggnal
);
6401 /* Also pass down any pending signaled resumption for other
6402 threads not the current. */
6403 p
= append_pending_thread_resumptions (p
, endp
, ptid
);
6405 /* And continue others without a signal. */
6406 append_resumption (p
, endp
, ptid
, /*step=*/ 0, GDB_SIGNAL_0
);
6410 /* Scheduler locking; resume only PTID. */
6411 append_resumption (p
, endp
, ptid
, step
, siggnal
);
6414 gdb_assert (strlen (rs
->buf
.data ()) < get_remote_packet_size ());
6417 if (target_is_non_stop_p ())
6419 /* In non-stop, the stub replies to vCont with "OK". The stop
6420 reply will be reported asynchronously by means of a `%Stop'
6422 getpkt (&rs
->buf
, 0);
6423 if (strcmp (rs
->buf
.data (), "OK") != 0)
6424 error (_("Unexpected vCont reply in non-stop mode: %s"),
6431 /* Tell the remote machine to resume. */
6434 remote_target::resume (ptid_t ptid
, int step
, enum gdb_signal siggnal
)
6436 struct remote_state
*rs
= get_remote_state ();
6438 /* When connected in non-stop mode, the core resumes threads
6439 individually. Resuming remote threads directly in target_resume
6440 would thus result in sending one packet per thread. Instead, to
6441 minimize roundtrip latency, here we just store the resume
6442 request (put the thread in RESUMED_PENDING_VCONT state); the actual remote
6443 resumption will be done in remote_target::commit_resume, where we'll be
6444 able to do vCont action coalescing. */
6445 if (target_is_non_stop_p () && ::execution_direction
!= EXEC_REVERSE
)
6447 remote_thread_info
*remote_thr
;
6449 if (minus_one_ptid
== ptid
|| ptid
.is_pid ())
6450 remote_thr
= get_remote_thread_info (this, inferior_ptid
);
6452 remote_thr
= get_remote_thread_info (this, ptid
);
6454 /* We don't expect the core to ask to resume an already resumed (from
6455 its point of view) thread. */
6456 gdb_assert (remote_thr
->get_resume_state () == resume_state::NOT_RESUMED
);
6458 remote_thr
->set_resumed_pending_vcont (step
, siggnal
);
6462 /* In all-stop, we can't mark REMOTE_ASYNC_GET_PENDING_EVENTS_TOKEN
6463 (explained in remote-notif.c:handle_notification) so
6464 remote_notif_process is not called. We need find a place where
6465 it is safe to start a 'vNotif' sequence. It is good to do it
6466 before resuming inferior, because inferior was stopped and no RSP
6467 traffic at that moment. */
6468 if (!target_is_non_stop_p ())
6469 remote_notif_process (rs
->notif_state
, ¬if_client_stop
);
6471 rs
->last_resume_exec_dir
= ::execution_direction
;
6473 /* Prefer vCont, and fallback to s/c/S/C, which use Hc. */
6474 if (!remote_resume_with_vcont (ptid
, step
, siggnal
))
6475 remote_resume_with_hc (ptid
, step
, siggnal
);
6477 /* Update resumed state tracked by the remote target. */
6478 for (thread_info
*tp
: all_non_exited_threads (this, ptid
))
6479 get_remote_thread_info (tp
)->set_resumed ();
6481 /* We are about to start executing the inferior, let's register it
6482 with the event loop. NOTE: this is the one place where all the
6483 execution commands end up. We could alternatively do this in each
6484 of the execution commands in infcmd.c. */
6485 /* FIXME: ezannoni 1999-09-28: We may need to move this out of here
6486 into infcmd.c in order to allow inferior function calls to work
6487 NOT asynchronously. */
6488 if (target_can_async_p ())
6491 /* We've just told the target to resume. The remote server will
6492 wait for the inferior to stop, and then send a stop reply. In
6493 the mean time, we can't start another command/query ourselves
6494 because the stub wouldn't be ready to process it. This applies
6495 only to the base all-stop protocol, however. In non-stop (which
6496 only supports vCont), the stub replies with an "OK", and is
6497 immediate able to process further serial input. */
6498 if (!target_is_non_stop_p ())
6499 rs
->waiting_for_stop_reply
= 1;
6502 static int is_pending_fork_parent_thread (struct thread_info
*thread
);
6504 /* Private per-inferior info for target remote processes. */
6506 struct remote_inferior
: public private_inferior
6508 /* Whether we can send a wildcard vCont for this process. */
6509 bool may_wildcard_vcont
= true;
6512 /* Get the remote private inferior data associated to INF. */
6514 static remote_inferior
*
6515 get_remote_inferior (inferior
*inf
)
6517 if (inf
->priv
== NULL
)
6518 inf
->priv
.reset (new remote_inferior
);
6520 return static_cast<remote_inferior
*> (inf
->priv
.get ());
6523 struct stop_reply
: public notif_event
6527 /* The identifier of the thread about this event */
6530 /* The remote state this event is associated with. When the remote
6531 connection, represented by a remote_state object, is closed,
6532 all the associated stop_reply events should be released. */
6533 struct remote_state
*rs
;
6535 struct target_waitstatus ws
;
6537 /* The architecture associated with the expedited registers. */
6540 /* Expedited registers. This makes remote debugging a bit more
6541 efficient for those targets that provide critical registers as
6542 part of their normal status mechanism (as another roundtrip to
6543 fetch them is avoided). */
6544 std::vector
<cached_reg_t
> regcache
;
6546 enum target_stop_reason stop_reason
;
6548 CORE_ADDR watch_data_address
;
6553 /* Class used to track the construction of a vCont packet in the
6554 outgoing packet buffer. This is used to send multiple vCont
6555 packets if we have more actions than would fit a single packet. */
6560 explicit vcont_builder (remote_target
*remote
)
6567 void push_action (ptid_t ptid
, bool step
, gdb_signal siggnal
);
6572 /* The remote target. */
6573 remote_target
*m_remote
;
6575 /* Pointer to the first action. P points here if no action has been
6577 char *m_first_action
;
6579 /* Where the next action will be appended. */
6582 /* The end of the buffer. Must never write past this. */
6586 /* Prepare the outgoing buffer for a new vCont packet. */
6589 vcont_builder::restart ()
6591 struct remote_state
*rs
= m_remote
->get_remote_state ();
6593 m_p
= rs
->buf
.data ();
6594 m_endp
= m_p
+ m_remote
->get_remote_packet_size ();
6595 m_p
+= xsnprintf (m_p
, m_endp
- m_p
, "vCont");
6596 m_first_action
= m_p
;
6599 /* If the vCont packet being built has any action, send it to the
6603 vcont_builder::flush ()
6605 struct remote_state
*rs
;
6607 if (m_p
== m_first_action
)
6610 rs
= m_remote
->get_remote_state ();
6611 m_remote
->putpkt (rs
->buf
);
6612 m_remote
->getpkt (&rs
->buf
, 0);
6613 if (strcmp (rs
->buf
.data (), "OK") != 0)
6614 error (_("Unexpected vCont reply in non-stop mode: %s"), rs
->buf
.data ());
6617 /* The largest action is range-stepping, with its two addresses. This
6618 is more than sufficient. If a new, bigger action is created, it'll
6619 quickly trigger a failed assertion in append_resumption (and we'll
6621 #define MAX_ACTION_SIZE 200
6623 /* Append a new vCont action in the outgoing packet being built. If
6624 the action doesn't fit the packet along with previous actions, push
6625 what we've got so far to the remote end and start over a new vCont
6626 packet (with the new action). */
6629 vcont_builder::push_action (ptid_t ptid
, bool step
, gdb_signal siggnal
)
6631 char buf
[MAX_ACTION_SIZE
+ 1];
6633 char *endp
= m_remote
->append_resumption (buf
, buf
+ sizeof (buf
),
6634 ptid
, step
, siggnal
);
6636 /* Check whether this new action would fit in the vCont packet along
6637 with previous actions. If not, send what we've got so far and
6638 start a new vCont packet. */
6639 size_t rsize
= endp
- buf
;
6640 if (rsize
> m_endp
- m_p
)
6645 /* Should now fit. */
6646 gdb_assert (rsize
<= m_endp
- m_p
);
6649 memcpy (m_p
, buf
, rsize
);
6654 /* to_commit_resume implementation. */
6657 remote_target::commit_resumed ()
6659 /* If connected in all-stop mode, we'd send the remote resume
6660 request directly from remote_resume. Likewise if
6661 reverse-debugging, as there are no defined vCont actions for
6662 reverse execution. */
6663 if (!target_is_non_stop_p () || ::execution_direction
== EXEC_REVERSE
)
6666 /* Try to send wildcard actions ("vCont;c" or "vCont;c:pPID.-1")
6667 instead of resuming all threads of each process individually.
6668 However, if any thread of a process must remain halted, we can't
6669 send wildcard resumes and must send one action per thread.
6671 Care must be taken to not resume threads/processes the server
6672 side already told us are stopped, but the core doesn't know about
6673 yet, because the events are still in the vStopped notification
6676 #1 => vCont s:p1.1;c
6678 #3 <= %Stopped T05 p1.1
6683 #8 (infrun handles the stop for p1.1 and continues stepping)
6684 #9 => vCont s:p1.1;c
6686 The last vCont above would resume thread p1.2 by mistake, because
6687 the server has no idea that the event for p1.2 had not been
6690 The server side must similarly ignore resume actions for the
6691 thread that has a pending %Stopped notification (and any other
6692 threads with events pending), until GDB acks the notification
6693 with vStopped. Otherwise, e.g., the following case is
6696 #1 => g (or any other packet)
6698 #3 <= %Stopped T05 p1.2
6699 #4 => vCont s:p1.1;c
6702 Above, the server must not resume thread p1.2. GDB can't know
6703 that p1.2 stopped until it acks the %Stopped notification, and
6704 since from GDB's perspective all threads should be running, it
6707 Finally, special care must also be given to handling fork/vfork
6708 events. A (v)fork event actually tells us that two processes
6709 stopped -- the parent and the child. Until we follow the fork,
6710 we must not resume the child. Therefore, if we have a pending
6711 fork follow, we must not send a global wildcard resume action
6712 (vCont;c). We can still send process-wide wildcards though. */
6714 /* Start by assuming a global wildcard (vCont;c) is possible. */
6715 bool may_global_wildcard_vcont
= true;
6717 /* And assume every process is individually wildcard-able too. */
6718 for (inferior
*inf
: all_non_exited_inferiors (this))
6720 remote_inferior
*priv
= get_remote_inferior (inf
);
6722 priv
->may_wildcard_vcont
= true;
6725 /* Check for any pending events (not reported or processed yet) and
6726 disable process and global wildcard resumes appropriately. */
6727 check_pending_events_prevent_wildcard_vcont (&may_global_wildcard_vcont
);
6729 bool any_pending_vcont_resume
= false;
6731 for (thread_info
*tp
: all_non_exited_threads (this))
6733 remote_thread_info
*priv
= get_remote_thread_info (tp
);
6735 /* If a thread of a process is not meant to be resumed, then we
6736 can't wildcard that process. */
6737 if (priv
->get_resume_state () == resume_state::NOT_RESUMED
)
6739 get_remote_inferior (tp
->inf
)->may_wildcard_vcont
= false;
6741 /* And if we can't wildcard a process, we can't wildcard
6742 everything either. */
6743 may_global_wildcard_vcont
= false;
6747 if (priv
->get_resume_state () == resume_state::RESUMED_PENDING_VCONT
)
6748 any_pending_vcont_resume
= true;
6750 /* If a thread is the parent of an unfollowed fork, then we
6751 can't do a global wildcard, as that would resume the fork
6753 if (is_pending_fork_parent_thread (tp
))
6754 may_global_wildcard_vcont
= false;
6757 /* We didn't have any resumed thread pending a vCont resume, so nothing to
6759 if (!any_pending_vcont_resume
)
6762 /* Now let's build the vCont packet(s). Actions must be appended
6763 from narrower to wider scopes (thread -> process -> global). If
6764 we end up with too many actions for a single packet vcont_builder
6765 flushes the current vCont packet to the remote side and starts a
6767 struct vcont_builder
vcont_builder (this);
6769 /* Threads first. */
6770 for (thread_info
*tp
: all_non_exited_threads (this))
6772 remote_thread_info
*remote_thr
= get_remote_thread_info (tp
);
6774 /* If the thread was previously vCont-resumed, no need to send a specific
6775 action for it. If we didn't receive a resume request for it, don't
6776 send an action for it either. */
6777 if (remote_thr
->get_resume_state () != resume_state::RESUMED_PENDING_VCONT
)
6780 gdb_assert (!thread_is_in_step_over_chain (tp
));
6782 /* We should never be commit-resuming a thread that has a stop reply.
6783 Otherwise, we would end up reporting a stop event for a thread while
6784 it is running on the remote target. */
6785 remote_state
*rs
= get_remote_state ();
6786 for (const auto &stop_reply
: rs
->stop_reply_queue
)
6787 gdb_assert (stop_reply
->ptid
!= tp
->ptid
);
6789 const resumed_pending_vcont_info
&info
6790 = remote_thr
->resumed_pending_vcont_info ();
6792 /* Check if we need to send a specific action for this thread. If not,
6793 it will be included in a wildcard resume instead. */
6794 if (info
.step
|| info
.sig
!= GDB_SIGNAL_0
6795 || !get_remote_inferior (tp
->inf
)->may_wildcard_vcont
)
6796 vcont_builder
.push_action (tp
->ptid
, info
.step
, info
.sig
);
6798 remote_thr
->set_resumed ();
6801 /* Now check whether we can send any process-wide wildcard. This is
6802 to avoid sending a global wildcard in the case nothing is
6803 supposed to be resumed. */
6804 bool any_process_wildcard
= false;
6806 for (inferior
*inf
: all_non_exited_inferiors (this))
6808 if (get_remote_inferior (inf
)->may_wildcard_vcont
)
6810 any_process_wildcard
= true;
6815 if (any_process_wildcard
)
6817 /* If all processes are wildcard-able, then send a single "c"
6818 action, otherwise, send an "all (-1) threads of process"
6819 continue action for each running process, if any. */
6820 if (may_global_wildcard_vcont
)
6822 vcont_builder
.push_action (minus_one_ptid
,
6823 false, GDB_SIGNAL_0
);
6827 for (inferior
*inf
: all_non_exited_inferiors (this))
6829 if (get_remote_inferior (inf
)->may_wildcard_vcont
)
6831 vcont_builder
.push_action (ptid_t (inf
->pid
),
6832 false, GDB_SIGNAL_0
);
6838 vcont_builder
.flush ();
6841 /* Implementation of target_has_pending_events. */
6844 remote_target::has_pending_events ()
6846 if (target_can_async_p ())
6848 remote_state
*rs
= get_remote_state ();
6850 if (async_event_handler_marked (rs
->remote_async_inferior_event_token
))
6853 /* Note that BUFCNT can be negative, indicating sticky
6855 if (rs
->remote_desc
->bufcnt
!= 0)
6863 /* Non-stop version of target_stop. Uses `vCont;t' to stop a remote
6864 thread, all threads of a remote process, or all threads of all
6868 remote_target::remote_stop_ns (ptid_t ptid
)
6870 struct remote_state
*rs
= get_remote_state ();
6871 char *p
= rs
->buf
.data ();
6872 char *endp
= p
+ get_remote_packet_size ();
6874 /* If any thread that needs to stop was resumed but pending a vCont
6875 resume, generate a phony stop_reply. However, first check
6876 whether the thread wasn't resumed with a signal. Generating a
6877 phony stop in that case would result in losing the signal. */
6878 bool needs_commit
= false;
6879 for (thread_info
*tp
: all_non_exited_threads (this, ptid
))
6881 remote_thread_info
*remote_thr
= get_remote_thread_info (tp
);
6883 if (remote_thr
->get_resume_state ()
6884 == resume_state::RESUMED_PENDING_VCONT
)
6886 const resumed_pending_vcont_info
&info
6887 = remote_thr
->resumed_pending_vcont_info ();
6888 if (info
.sig
!= GDB_SIGNAL_0
)
6890 /* This signal must be forwarded to the inferior. We
6891 could commit-resume just this thread, but its simpler
6892 to just commit-resume everything. */
6893 needs_commit
= true;
6902 for (thread_info
*tp
: all_non_exited_threads (this, ptid
))
6904 remote_thread_info
*remote_thr
= get_remote_thread_info (tp
);
6906 if (remote_thr
->get_resume_state ()
6907 == resume_state::RESUMED_PENDING_VCONT
)
6909 remote_debug_printf ("Enqueueing phony stop reply for thread pending "
6910 "vCont-resume (%d, %ld, %s)", tp
->ptid
.pid(),
6912 pulongest (tp
->ptid
.tid ()));
6914 /* Check that the thread wasn't resumed with a signal.
6915 Generating a phony stop would result in losing the
6917 const resumed_pending_vcont_info
&info
6918 = remote_thr
->resumed_pending_vcont_info ();
6919 gdb_assert (info
.sig
== GDB_SIGNAL_0
);
6921 stop_reply
*sr
= new stop_reply ();
6922 sr
->ptid
= tp
->ptid
;
6924 sr
->ws
.kind
= TARGET_WAITKIND_STOPPED
;
6925 sr
->ws
.value
.sig
= GDB_SIGNAL_0
;
6926 sr
->arch
= tp
->inf
->gdbarch
;
6927 sr
->stop_reason
= TARGET_STOPPED_BY_NO_REASON
;
6928 sr
->watch_data_address
= 0;
6930 this->push_stop_reply (sr
);
6932 /* Pretend that this thread was actually resumed on the
6933 remote target, then stopped. If we leave it in the
6934 RESUMED_PENDING_VCONT state and the commit_resumed
6935 method is called while the stop reply is still in the
6936 queue, we'll end up reporting a stop event to the core
6937 for that thread while it is running on the remote
6938 target... that would be bad. */
6939 remote_thr
->set_resumed ();
6943 /* FIXME: This supports_vCont_probed check is a workaround until
6944 packet_support is per-connection. */
6945 if (packet_support (PACKET_vCont
) == PACKET_SUPPORT_UNKNOWN
6946 || !rs
->supports_vCont_probed
)
6947 remote_vcont_probe ();
6949 if (!rs
->supports_vCont
.t
)
6950 error (_("Remote server does not support stopping threads"));
6952 if (ptid
== minus_one_ptid
6953 || (!remote_multi_process_p (rs
) && ptid
.is_pid ()))
6954 p
+= xsnprintf (p
, endp
- p
, "vCont;t");
6959 p
+= xsnprintf (p
, endp
- p
, "vCont;t:");
6962 /* All (-1) threads of process. */
6963 nptid
= ptid_t (ptid
.pid (), -1);
6966 /* Small optimization: if we already have a stop reply for
6967 this thread, no use in telling the stub we want this
6969 if (peek_stop_reply (ptid
))
6975 write_ptid (p
, endp
, nptid
);
6978 /* In non-stop, we get an immediate OK reply. The stop reply will
6979 come in asynchronously by notification. */
6981 getpkt (&rs
->buf
, 0);
6982 if (strcmp (rs
->buf
.data (), "OK") != 0)
6983 error (_("Stopping %s failed: %s"), target_pid_to_str (ptid
).c_str (),
6987 /* All-stop version of target_interrupt. Sends a break or a ^C to
6988 interrupt the remote target. It is undefined which thread of which
6989 process reports the interrupt. */
6992 remote_target::remote_interrupt_as ()
6994 struct remote_state
*rs
= get_remote_state ();
6996 rs
->ctrlc_pending_p
= 1;
6998 /* If the inferior is stopped already, but the core didn't know
6999 about it yet, just ignore the request. The cached wait status
7000 will be collected in remote_wait. */
7001 if (rs
->cached_wait_status
)
7004 /* Send interrupt_sequence to remote target. */
7005 send_interrupt_sequence ();
7008 /* Non-stop version of target_interrupt. Uses `vCtrlC' to interrupt
7009 the remote target. It is undefined which thread of which process
7010 reports the interrupt. Throws an error if the packet is not
7011 supported by the server. */
7014 remote_target::remote_interrupt_ns ()
7016 struct remote_state
*rs
= get_remote_state ();
7017 char *p
= rs
->buf
.data ();
7018 char *endp
= p
+ get_remote_packet_size ();
7020 xsnprintf (p
, endp
- p
, "vCtrlC");
7022 /* In non-stop, we get an immediate OK reply. The stop reply will
7023 come in asynchronously by notification. */
7025 getpkt (&rs
->buf
, 0);
7027 switch (packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_vCtrlC
]))
7031 case PACKET_UNKNOWN
:
7032 error (_("No support for interrupting the remote target."));
7034 error (_("Interrupting target failed: %s"), rs
->buf
.data ());
7038 /* Implement the to_stop function for the remote targets. */
7041 remote_target::stop (ptid_t ptid
)
7043 REMOTE_SCOPED_DEBUG_ENTER_EXIT
;
7045 if (target_is_non_stop_p ())
7046 remote_stop_ns (ptid
);
7049 /* We don't currently have a way to transparently pause the
7050 remote target in all-stop mode. Interrupt it instead. */
7051 remote_interrupt_as ();
7055 /* Implement the to_interrupt function for the remote targets. */
7058 remote_target::interrupt ()
7060 REMOTE_SCOPED_DEBUG_ENTER_EXIT
;
7062 if (target_is_non_stop_p ())
7063 remote_interrupt_ns ();
7065 remote_interrupt_as ();
7068 /* Implement the to_pass_ctrlc function for the remote targets. */
7071 remote_target::pass_ctrlc ()
7073 REMOTE_SCOPED_DEBUG_ENTER_EXIT
;
7075 struct remote_state
*rs
= get_remote_state ();
7077 /* If we're starting up, we're not fully synced yet. Quit
7079 if (rs
->starting_up
)
7081 /* If ^C has already been sent once, offer to disconnect. */
7082 else if (rs
->ctrlc_pending_p
)
7085 target_interrupt ();
7088 /* Ask the user what to do when an interrupt is received. */
7091 remote_target::interrupt_query ()
7093 struct remote_state
*rs
= get_remote_state ();
7095 if (rs
->waiting_for_stop_reply
&& rs
->ctrlc_pending_p
)
7097 if (query (_("The target is not responding to interrupt requests.\n"
7098 "Stop debugging it? ")))
7100 remote_unpush_target (this);
7101 throw_error (TARGET_CLOSE_ERROR
, _("Disconnected from target."));
7106 if (query (_("Interrupted while waiting for the program.\n"
7107 "Give up waiting? ")))
7112 /* Enable/disable target terminal ownership. Most targets can use
7113 terminal groups to control terminal ownership. Remote targets are
7114 different in that explicit transfer of ownership to/from GDB/target
7118 remote_target::terminal_inferior ()
7120 /* NOTE: At this point we could also register our selves as the
7121 recipient of all input. Any characters typed could then be
7122 passed on down to the target. */
7126 remote_target::terminal_ours ()
7131 remote_console_output (const char *msg
)
7135 for (p
= msg
; p
[0] && p
[1]; p
+= 2)
7138 char c
= fromhex (p
[0]) * 16 + fromhex (p
[1]);
7142 gdb_stdtarg
->puts (tb
);
7144 gdb_stdtarg
->flush ();
7147 /* Return the length of the stop reply queue. */
7150 remote_target::stop_reply_queue_length ()
7152 remote_state
*rs
= get_remote_state ();
7153 return rs
->stop_reply_queue
.size ();
7157 remote_notif_stop_parse (remote_target
*remote
,
7158 struct notif_client
*self
, const char *buf
,
7159 struct notif_event
*event
)
7161 remote
->remote_parse_stop_reply (buf
, (struct stop_reply
*) event
);
7165 remote_notif_stop_ack (remote_target
*remote
,
7166 struct notif_client
*self
, const char *buf
,
7167 struct notif_event
*event
)
7169 struct stop_reply
*stop_reply
= (struct stop_reply
*) event
;
7172 putpkt (remote
, self
->ack_command
);
7174 /* Kind can be TARGET_WAITKIND_IGNORE if we have meanwhile discarded
7175 the notification. It was left in the queue because we need to
7176 acknowledge it and pull the rest of the notifications out. */
7177 if (stop_reply
->ws
.kind
!= TARGET_WAITKIND_IGNORE
)
7178 remote
->push_stop_reply (stop_reply
);
7182 remote_notif_stop_can_get_pending_events (remote_target
*remote
,
7183 struct notif_client
*self
)
7185 /* We can't get pending events in remote_notif_process for
7186 notification stop, and we have to do this in remote_wait_ns
7187 instead. If we fetch all queued events from stub, remote stub
7188 may exit and we have no chance to process them back in
7190 remote_state
*rs
= remote
->get_remote_state ();
7191 mark_async_event_handler (rs
->remote_async_inferior_event_token
);
7195 stop_reply::~stop_reply ()
7197 for (cached_reg_t
®
: regcache
)
7201 static notif_event_up
7202 remote_notif_stop_alloc_reply ()
7204 return notif_event_up (new struct stop_reply ());
7207 /* A client of notification Stop. */
7209 struct notif_client notif_client_stop
=
7213 remote_notif_stop_parse
,
7214 remote_notif_stop_ack
,
7215 remote_notif_stop_can_get_pending_events
,
7216 remote_notif_stop_alloc_reply
,
7220 /* Determine if THREAD_PTID is a pending fork parent thread. ARG contains
7221 the pid of the process that owns the threads we want to check, or
7222 -1 if we want to check all threads. */
7225 is_pending_fork_parent (const target_waitstatus
*ws
, int event_pid
,
7228 if (ws
->kind
== TARGET_WAITKIND_FORKED
7229 || ws
->kind
== TARGET_WAITKIND_VFORKED
)
7231 if (event_pid
== -1 || event_pid
== thread_ptid
.pid ())
7238 /* Return the thread's pending status used to determine whether the
7239 thread is a fork parent stopped at a fork event. */
7241 static const target_waitstatus
*
7242 thread_pending_fork_status (struct thread_info
*thread
)
7244 if (thread
->has_pending_waitstatus ())
7245 return &thread
->pending_waitstatus ();
7247 return &thread
->pending_follow
;
7250 /* Determine if THREAD is a pending fork parent thread. */
7253 is_pending_fork_parent_thread (struct thread_info
*thread
)
7255 const target_waitstatus
*ws
= thread_pending_fork_status (thread
);
7258 return is_pending_fork_parent (ws
, pid
, thread
->ptid
);
7261 /* If CONTEXT contains any fork child threads that have not been
7262 reported yet, remove them from the CONTEXT list. If such a
7263 thread exists it is because we are stopped at a fork catchpoint
7264 and have not yet called follow_fork, which will set up the
7265 host-side data structures for the new process. */
7268 remote_target::remove_new_fork_children (threads_listing_context
*context
)
7271 struct notif_client
*notif
= ¬if_client_stop
;
7273 /* For any threads stopped at a fork event, remove the corresponding
7274 fork child threads from the CONTEXT list. */
7275 for (thread_info
*thread
: all_non_exited_threads (this))
7277 const target_waitstatus
*ws
= thread_pending_fork_status (thread
);
7279 if (is_pending_fork_parent (ws
, pid
, thread
->ptid
))
7280 context
->remove_thread (ws
->value
.related_pid
);
7283 /* Check for any pending fork events (not reported or processed yet)
7284 in process PID and remove those fork child threads from the
7285 CONTEXT list as well. */
7286 remote_notif_get_pending_events (notif
);
7287 for (auto &event
: get_remote_state ()->stop_reply_queue
)
7288 if (event
->ws
.kind
== TARGET_WAITKIND_FORKED
7289 || event
->ws
.kind
== TARGET_WAITKIND_VFORKED
7290 || event
->ws
.kind
== TARGET_WAITKIND_THREAD_EXITED
)
7291 context
->remove_thread (event
->ws
.value
.related_pid
);
7294 /* Check whether any event pending in the vStopped queue would prevent a
7295 global or process wildcard vCont action. Set *may_global_wildcard to
7296 false if we can't do a global wildcard (vCont;c), and clear the event
7297 inferior's may_wildcard_vcont flag if we can't do a process-wide
7298 wildcard resume (vCont;c:pPID.-1). */
7301 remote_target::check_pending_events_prevent_wildcard_vcont
7302 (bool *may_global_wildcard
)
7304 struct notif_client
*notif
= ¬if_client_stop
;
7306 remote_notif_get_pending_events (notif
);
7307 for (auto &event
: get_remote_state ()->stop_reply_queue
)
7309 if (event
->ws
.kind
== TARGET_WAITKIND_NO_RESUMED
7310 || event
->ws
.kind
== TARGET_WAITKIND_NO_HISTORY
)
7313 if (event
->ws
.kind
== TARGET_WAITKIND_FORKED
7314 || event
->ws
.kind
== TARGET_WAITKIND_VFORKED
)
7315 *may_global_wildcard
= false;
7317 /* This may be the first time we heard about this process.
7318 Regardless, we must not do a global wildcard resume, otherwise
7319 we'd resume this process too. */
7320 *may_global_wildcard
= false;
7321 if (event
->ptid
!= null_ptid
)
7323 inferior
*inf
= find_inferior_ptid (this, event
->ptid
);
7325 get_remote_inferior (inf
)->may_wildcard_vcont
= false;
7330 /* Discard all pending stop replies of inferior INF. */
7333 remote_target::discard_pending_stop_replies (struct inferior
*inf
)
7335 struct stop_reply
*reply
;
7336 struct remote_state
*rs
= get_remote_state ();
7337 struct remote_notif_state
*rns
= rs
->notif_state
;
7339 /* This function can be notified when an inferior exists. When the
7340 target is not remote, the notification state is NULL. */
7341 if (rs
->remote_desc
== NULL
)
7344 reply
= (struct stop_reply
*) rns
->pending_event
[notif_client_stop
.id
];
7346 /* Discard the in-flight notification. */
7347 if (reply
!= NULL
&& reply
->ptid
.pid () == inf
->pid
)
7349 /* Leave the notification pending, since the server expects that
7350 we acknowledge it with vStopped. But clear its contents, so
7351 that later on when we acknowledge it, we also discard it. */
7352 reply
->ws
.kind
= TARGET_WAITKIND_IGNORE
;
7355 fprintf_unfiltered (gdb_stdlog
,
7356 "discarded in-flight notification\n");
7359 /* Discard the stop replies we have already pulled with
7361 auto iter
= std::remove_if (rs
->stop_reply_queue
.begin (),
7362 rs
->stop_reply_queue
.end (),
7363 [=] (const stop_reply_up
&event
)
7365 return event
->ptid
.pid () == inf
->pid
;
7367 rs
->stop_reply_queue
.erase (iter
, rs
->stop_reply_queue
.end ());
7370 /* Discard the stop replies for RS in stop_reply_queue. */
7373 remote_target::discard_pending_stop_replies_in_queue ()
7375 remote_state
*rs
= get_remote_state ();
7377 /* Discard the stop replies we have already pulled with
7379 auto iter
= std::remove_if (rs
->stop_reply_queue
.begin (),
7380 rs
->stop_reply_queue
.end (),
7381 [=] (const stop_reply_up
&event
)
7383 return event
->rs
== rs
;
7385 rs
->stop_reply_queue
.erase (iter
, rs
->stop_reply_queue
.end ());
7388 /* Remove the first reply in 'stop_reply_queue' which matches
7392 remote_target::remote_notif_remove_queued_reply (ptid_t ptid
)
7394 remote_state
*rs
= get_remote_state ();
7396 auto iter
= std::find_if (rs
->stop_reply_queue
.begin (),
7397 rs
->stop_reply_queue
.end (),
7398 [=] (const stop_reply_up
&event
)
7400 return event
->ptid
.matches (ptid
);
7402 struct stop_reply
*result
;
7403 if (iter
== rs
->stop_reply_queue
.end ())
7407 result
= iter
->release ();
7408 rs
->stop_reply_queue
.erase (iter
);
7412 fprintf_unfiltered (gdb_stdlog
,
7413 "notif: discard queued event: 'Stop' in %s\n",
7414 target_pid_to_str (ptid
).c_str ());
7419 /* Look for a queued stop reply belonging to PTID. If one is found,
7420 remove it from the queue, and return it. Returns NULL if none is
7421 found. If there are still queued events left to process, tell the
7422 event loop to get back to target_wait soon. */
7425 remote_target::queued_stop_reply (ptid_t ptid
)
7427 remote_state
*rs
= get_remote_state ();
7428 struct stop_reply
*r
= remote_notif_remove_queued_reply (ptid
);
7430 if (!rs
->stop_reply_queue
.empty ())
7432 /* There's still at least an event left. */
7433 mark_async_event_handler (rs
->remote_async_inferior_event_token
);
7439 /* Push a fully parsed stop reply in the stop reply queue. Since we
7440 know that we now have at least one queued event left to pass to the
7441 core side, tell the event loop to get back to target_wait soon. */
7444 remote_target::push_stop_reply (struct stop_reply
*new_event
)
7446 remote_state
*rs
= get_remote_state ();
7447 rs
->stop_reply_queue
.push_back (stop_reply_up (new_event
));
7450 fprintf_unfiltered (gdb_stdlog
,
7451 "notif: push 'Stop' %s to queue %d\n",
7452 target_pid_to_str (new_event
->ptid
).c_str (),
7453 int (rs
->stop_reply_queue
.size ()));
7455 mark_async_event_handler (rs
->remote_async_inferior_event_token
);
7458 /* Returns true if we have a stop reply for PTID. */
7461 remote_target::peek_stop_reply (ptid_t ptid
)
7463 remote_state
*rs
= get_remote_state ();
7464 for (auto &event
: rs
->stop_reply_queue
)
7465 if (ptid
== event
->ptid
7466 && event
->ws
.kind
== TARGET_WAITKIND_STOPPED
)
7471 /* Helper for remote_parse_stop_reply. Return nonzero if the substring
7472 starting with P and ending with PEND matches PREFIX. */
7475 strprefix (const char *p
, const char *pend
, const char *prefix
)
7477 for ( ; p
< pend
; p
++, prefix
++)
7480 return *prefix
== '\0';
7483 /* Parse the stop reply in BUF. Either the function succeeds, and the
7484 result is stored in EVENT, or throws an error. */
7487 remote_target::remote_parse_stop_reply (const char *buf
, stop_reply
*event
)
7489 remote_arch_state
*rsa
= NULL
;
7494 event
->ptid
= null_ptid
;
7495 event
->rs
= get_remote_state ();
7496 event
->ws
.kind
= TARGET_WAITKIND_IGNORE
;
7497 event
->ws
.value
.integer
= 0;
7498 event
->stop_reason
= TARGET_STOPPED_BY_NO_REASON
;
7499 event
->regcache
.clear ();
7504 case 'T': /* Status with PC, SP, FP, ... */
7505 /* Expedited reply, containing Signal, {regno, reg} repeat. */
7506 /* format is: 'Tssn...:r...;n...:r...;n...:r...;#cc', where
7508 n... = register number
7509 r... = register contents
7512 p
= &buf
[3]; /* after Txx */
7518 p1
= strchr (p
, ':');
7520 error (_("Malformed packet(a) (missing colon): %s\n\
7524 error (_("Malformed packet(a) (missing register number): %s\n\
7528 /* Some "registers" are actually extended stop information.
7529 Note if you're adding a new entry here: GDB 7.9 and
7530 earlier assume that all register "numbers" that start
7531 with an hex digit are real register numbers. Make sure
7532 the server only sends such a packet if it knows the
7533 client understands it. */
7535 if (strprefix (p
, p1
, "thread"))
7536 event
->ptid
= read_ptid (++p1
, &p
);
7537 else if (strprefix (p
, p1
, "syscall_entry"))
7541 event
->ws
.kind
= TARGET_WAITKIND_SYSCALL_ENTRY
;
7542 p
= unpack_varlen_hex (++p1
, &sysno
);
7543 event
->ws
.value
.syscall_number
= (int) sysno
;
7545 else if (strprefix (p
, p1
, "syscall_return"))
7549 event
->ws
.kind
= TARGET_WAITKIND_SYSCALL_RETURN
;
7550 p
= unpack_varlen_hex (++p1
, &sysno
);
7551 event
->ws
.value
.syscall_number
= (int) sysno
;
7553 else if (strprefix (p
, p1
, "watch")
7554 || strprefix (p
, p1
, "rwatch")
7555 || strprefix (p
, p1
, "awatch"))
7557 event
->stop_reason
= TARGET_STOPPED_BY_WATCHPOINT
;
7558 p
= unpack_varlen_hex (++p1
, &addr
);
7559 event
->watch_data_address
= (CORE_ADDR
) addr
;
7561 else if (strprefix (p
, p1
, "swbreak"))
7563 event
->stop_reason
= TARGET_STOPPED_BY_SW_BREAKPOINT
;
7565 /* Make sure the stub doesn't forget to indicate support
7567 if (packet_support (PACKET_swbreak_feature
) != PACKET_ENABLE
)
7568 error (_("Unexpected swbreak stop reason"));
7570 /* The value part is documented as "must be empty",
7571 though we ignore it, in case we ever decide to make
7572 use of it in a backward compatible way. */
7573 p
= strchrnul (p1
+ 1, ';');
7575 else if (strprefix (p
, p1
, "hwbreak"))
7577 event
->stop_reason
= TARGET_STOPPED_BY_HW_BREAKPOINT
;
7579 /* Make sure the stub doesn't forget to indicate support
7581 if (packet_support (PACKET_hwbreak_feature
) != PACKET_ENABLE
)
7582 error (_("Unexpected hwbreak stop reason"));
7585 p
= strchrnul (p1
+ 1, ';');
7587 else if (strprefix (p
, p1
, "library"))
7589 event
->ws
.kind
= TARGET_WAITKIND_LOADED
;
7590 p
= strchrnul (p1
+ 1, ';');
7592 else if (strprefix (p
, p1
, "replaylog"))
7594 event
->ws
.kind
= TARGET_WAITKIND_NO_HISTORY
;
7595 /* p1 will indicate "begin" or "end", but it makes
7596 no difference for now, so ignore it. */
7597 p
= strchrnul (p1
+ 1, ';');
7599 else if (strprefix (p
, p1
, "core"))
7603 p
= unpack_varlen_hex (++p1
, &c
);
7606 else if (strprefix (p
, p1
, "fork"))
7608 event
->ws
.value
.related_pid
= read_ptid (++p1
, &p
);
7609 event
->ws
.kind
= TARGET_WAITKIND_FORKED
;
7611 else if (strprefix (p
, p1
, "vfork"))
7613 event
->ws
.value
.related_pid
= read_ptid (++p1
, &p
);
7614 event
->ws
.kind
= TARGET_WAITKIND_VFORKED
;
7616 else if (strprefix (p
, p1
, "vforkdone"))
7618 event
->ws
.kind
= TARGET_WAITKIND_VFORK_DONE
;
7619 p
= strchrnul (p1
+ 1, ';');
7621 else if (strprefix (p
, p1
, "exec"))
7626 /* Determine the length of the execd pathname. */
7627 p
= unpack_varlen_hex (++p1
, &ignored
);
7628 pathlen
= (p
- p1
) / 2;
7630 /* Save the pathname for event reporting and for
7631 the next run command. */
7632 gdb::unique_xmalloc_ptr
<char[]> pathname
7633 ((char *) xmalloc (pathlen
+ 1));
7634 hex2bin (p1
, (gdb_byte
*) pathname
.get (), pathlen
);
7635 pathname
[pathlen
] = '\0';
7637 /* This is freed during event handling. */
7638 event
->ws
.value
.execd_pathname
= pathname
.release ();
7639 event
->ws
.kind
= TARGET_WAITKIND_EXECD
;
7641 /* Skip the registers included in this packet, since
7642 they may be for an architecture different from the
7643 one used by the original program. */
7646 else if (strprefix (p
, p1
, "create"))
7648 event
->ws
.kind
= TARGET_WAITKIND_THREAD_CREATED
;
7649 p
= strchrnul (p1
+ 1, ';');
7658 p
= strchrnul (p1
+ 1, ';');
7663 /* Maybe a real ``P'' register number. */
7664 p_temp
= unpack_varlen_hex (p
, &pnum
);
7665 /* If the first invalid character is the colon, we got a
7666 register number. Otherwise, it's an unknown stop
7670 /* If we haven't parsed the event's thread yet, find
7671 it now, in order to find the architecture of the
7672 reported expedited registers. */
7673 if (event
->ptid
== null_ptid
)
7675 /* If there is no thread-id information then leave
7676 the event->ptid as null_ptid. Later in
7677 process_stop_reply we will pick a suitable
7679 const char *thr
= strstr (p1
+ 1, ";thread:");
7681 event
->ptid
= read_ptid (thr
+ strlen (";thread:"),
7688 = (event
->ptid
== null_ptid
7690 : find_inferior_ptid (this, event
->ptid
));
7691 /* If this is the first time we learn anything
7692 about this process, skip the registers
7693 included in this packet, since we don't yet
7694 know which architecture to use to parse them.
7695 We'll determine the architecture later when
7696 we process the stop reply and retrieve the
7697 target description, via
7698 remote_notice_new_inferior ->
7699 post_create_inferior. */
7702 p
= strchrnul (p1
+ 1, ';');
7707 event
->arch
= inf
->gdbarch
;
7708 rsa
= event
->rs
->get_remote_arch_state (event
->arch
);
7712 = packet_reg_from_pnum (event
->arch
, rsa
, pnum
);
7713 cached_reg_t cached_reg
;
7716 error (_("Remote sent bad register number %s: %s\n\
7718 hex_string (pnum
), p
, buf
);
7720 cached_reg
.num
= reg
->regnum
;
7721 cached_reg
.data
= (gdb_byte
*)
7722 xmalloc (register_size (event
->arch
, reg
->regnum
));
7725 fieldsize
= hex2bin (p
, cached_reg
.data
,
7726 register_size (event
->arch
, reg
->regnum
));
7728 if (fieldsize
< register_size (event
->arch
, reg
->regnum
))
7729 warning (_("Remote reply is too short: %s"), buf
);
7731 event
->regcache
.push_back (cached_reg
);
7735 /* Not a number. Silently skip unknown optional
7737 p
= strchrnul (p1
+ 1, ';');
7742 error (_("Remote register badly formatted: %s\nhere: %s"),
7747 if (event
->ws
.kind
!= TARGET_WAITKIND_IGNORE
)
7751 case 'S': /* Old style status, just signal only. */
7755 event
->ws
.kind
= TARGET_WAITKIND_STOPPED
;
7756 sig
= (fromhex (buf
[1]) << 4) + fromhex (buf
[2]);
7757 if (GDB_SIGNAL_FIRST
<= sig
&& sig
< GDB_SIGNAL_LAST
)
7758 event
->ws
.value
.sig
= (enum gdb_signal
) sig
;
7760 event
->ws
.value
.sig
= GDB_SIGNAL_UNKNOWN
;
7763 case 'w': /* Thread exited. */
7767 event
->ws
.kind
= TARGET_WAITKIND_THREAD_EXITED
;
7768 p
= unpack_varlen_hex (&buf
[1], &value
);
7769 event
->ws
.value
.integer
= value
;
7771 error (_("stop reply packet badly formatted: %s"), buf
);
7772 event
->ptid
= read_ptid (++p
, NULL
);
7775 case 'W': /* Target exited. */
7780 /* GDB used to accept only 2 hex chars here. Stubs should
7781 only send more if they detect GDB supports multi-process
7783 p
= unpack_varlen_hex (&buf
[1], &value
);
7787 /* The remote process exited. */
7788 event
->ws
.kind
= TARGET_WAITKIND_EXITED
;
7789 event
->ws
.value
.integer
= value
;
7793 /* The remote process exited with a signal. */
7794 event
->ws
.kind
= TARGET_WAITKIND_SIGNALLED
;
7795 if (GDB_SIGNAL_FIRST
<= value
&& value
< GDB_SIGNAL_LAST
)
7796 event
->ws
.value
.sig
= (enum gdb_signal
) value
;
7798 event
->ws
.value
.sig
= GDB_SIGNAL_UNKNOWN
;
7801 /* If no process is specified, return null_ptid, and let the
7802 caller figure out the right process to use. */
7812 else if (startswith (p
, "process:"))
7816 p
+= sizeof ("process:") - 1;
7817 unpack_varlen_hex (p
, &upid
);
7821 error (_("unknown stop reply packet: %s"), buf
);
7824 error (_("unknown stop reply packet: %s"), buf
);
7825 event
->ptid
= ptid_t (pid
);
7829 event
->ws
.kind
= TARGET_WAITKIND_NO_RESUMED
;
7830 event
->ptid
= minus_one_ptid
;
7835 /* When the stub wants to tell GDB about a new notification reply, it
7836 sends a notification (%Stop, for example). Those can come it at
7837 any time, hence, we have to make sure that any pending
7838 putpkt/getpkt sequence we're making is finished, before querying
7839 the stub for more events with the corresponding ack command
7840 (vStopped, for example). E.g., if we started a vStopped sequence
7841 immediately upon receiving the notification, something like this
7849 1.6) <-- (registers reply to step #1.3)
7851 Obviously, the reply in step #1.6 would be unexpected to a vStopped
7854 To solve this, whenever we parse a %Stop notification successfully,
7855 we mark the REMOTE_ASYNC_GET_PENDING_EVENTS_TOKEN, and carry on
7856 doing whatever we were doing:
7862 <GDB marks the REMOTE_ASYNC_GET_PENDING_EVENTS_TOKEN>
7863 2.5) <-- (registers reply to step #2.3)
7865 Eventually after step #2.5, we return to the event loop, which
7866 notices there's an event on the
7867 REMOTE_ASYNC_GET_PENDING_EVENTS_TOKEN event and calls the
7868 associated callback --- the function below. At this point, we're
7869 always safe to start a vStopped sequence. :
7872 2.7) <-- T05 thread:2
7878 remote_target::remote_notif_get_pending_events (notif_client
*nc
)
7880 struct remote_state
*rs
= get_remote_state ();
7882 if (rs
->notif_state
->pending_event
[nc
->id
] != NULL
)
7885 fprintf_unfiltered (gdb_stdlog
,
7886 "notif: process: '%s' ack pending event\n",
7890 nc
->ack (this, nc
, rs
->buf
.data (),
7891 rs
->notif_state
->pending_event
[nc
->id
]);
7892 rs
->notif_state
->pending_event
[nc
->id
] = NULL
;
7896 getpkt (&rs
->buf
, 0);
7897 if (strcmp (rs
->buf
.data (), "OK") == 0)
7900 remote_notif_ack (this, nc
, rs
->buf
.data ());
7906 fprintf_unfiltered (gdb_stdlog
,
7907 "notif: process: '%s' no pending reply\n",
7912 /* Wrapper around remote_target::remote_notif_get_pending_events to
7913 avoid having to export the whole remote_target class. */
7916 remote_notif_get_pending_events (remote_target
*remote
, notif_client
*nc
)
7918 remote
->remote_notif_get_pending_events (nc
);
7921 /* Called from process_stop_reply when the stop packet we are responding
7922 to didn't include a process-id or thread-id. STATUS is the stop event
7923 we are responding to.
7925 It is the task of this function to select a suitable thread (or process)
7926 and return its ptid, this is the thread (or process) we will assume the
7927 stop event came from.
7929 In some cases there isn't really any choice about which thread (or
7930 process) is selected, a basic remote with a single process containing a
7931 single thread might choose not to send any process-id or thread-id in
7932 its stop packets, this function will select and return the one and only
7935 However, if a target supports multiple threads (or processes) and still
7936 doesn't include a thread-id (or process-id) in its stop packet then
7937 first, this is a badly behaving target, and second, we're going to have
7938 to select a thread (or process) at random and use that. This function
7939 will print a warning to the user if it detects that there is the
7940 possibility that GDB is guessing which thread (or process) to
7943 Note that this is called before GDB fetches the updated thread list from the
7944 target. So it's possible for the stop reply to be ambiguous and for GDB to
7945 not realize it. For example, if there's initially one thread, the target
7946 spawns a second thread, and then sends a stop reply without an id that
7947 concerns the first thread. GDB will assume the stop reply is about the
7948 first thread - the only thread it knows about - without printing a warning.
7949 Anyway, if the remote meant for the stop reply to be about the second thread,
7950 then it would be really broken, because GDB doesn't know about that thread
7954 remote_target::select_thread_for_ambiguous_stop_reply
7955 (const struct target_waitstatus
*status
)
7957 REMOTE_SCOPED_DEBUG_ENTER_EXIT
;
7959 /* Some stop events apply to all threads in an inferior, while others
7960 only apply to a single thread. */
7961 bool process_wide_stop
7962 = (status
->kind
== TARGET_WAITKIND_EXITED
7963 || status
->kind
== TARGET_WAITKIND_SIGNALLED
);
7965 remote_debug_printf ("process_wide_stop = %d", process_wide_stop
);
7967 thread_info
*first_resumed_thread
= nullptr;
7968 bool ambiguous
= false;
7970 /* Consider all non-exited threads of the target, find the first resumed
7972 for (thread_info
*thr
: all_non_exited_threads (this))
7974 remote_thread_info
*remote_thr
= get_remote_thread_info (thr
);
7976 if (remote_thr
->get_resume_state () != resume_state::RESUMED
)
7979 if (first_resumed_thread
== nullptr)
7980 first_resumed_thread
= thr
;
7981 else if (!process_wide_stop
7982 || first_resumed_thread
->ptid
.pid () != thr
->ptid
.pid ())
7986 remote_debug_printf ("first resumed thread is %s",
7987 pid_to_str (first_resumed_thread
->ptid
).c_str ());
7988 remote_debug_printf ("is this guess ambiguous? = %d", ambiguous
);
7990 gdb_assert (first_resumed_thread
!= nullptr);
7992 /* Warn if the remote target is sending ambiguous stop replies. */
7995 static bool warned
= false;
7999 /* If you are seeing this warning then the remote target has
8000 stopped without specifying a thread-id, but the target
8001 does have multiple threads (or inferiors), and so GDB is
8002 having to guess which thread stopped.
8004 Examples of what might cause this are the target sending
8005 and 'S' stop packet, or a 'T' stop packet and not
8006 including a thread-id.
8008 Additionally, the target might send a 'W' or 'X packet
8009 without including a process-id, when the target has
8010 multiple running inferiors. */
8011 if (process_wide_stop
)
8012 warning (_("multi-inferior target stopped without "
8013 "sending a process-id, using first "
8014 "non-exited inferior"));
8016 warning (_("multi-threaded target stopped without "
8017 "sending a thread-id, using first "
8018 "non-exited thread"));
8023 /* If this is a stop for all threads then don't use a particular threads
8024 ptid, instead create a new ptid where only the pid field is set. */
8025 if (process_wide_stop
)
8026 return ptid_t (first_resumed_thread
->ptid
.pid ());
8028 return first_resumed_thread
->ptid
;
8031 /* Called when it is decided that STOP_REPLY holds the info of the
8032 event that is to be returned to the core. This function always
8033 destroys STOP_REPLY. */
8036 remote_target::process_stop_reply (struct stop_reply
*stop_reply
,
8037 struct target_waitstatus
*status
)
8039 *status
= stop_reply
->ws
;
8040 ptid_t ptid
= stop_reply
->ptid
;
8042 /* If no thread/process was reported by the stub then select a suitable
8044 if (ptid
== null_ptid
)
8045 ptid
= select_thread_for_ambiguous_stop_reply (status
);
8046 gdb_assert (ptid
!= null_ptid
);
8048 if (status
->kind
!= TARGET_WAITKIND_EXITED
8049 && status
->kind
!= TARGET_WAITKIND_SIGNALLED
8050 && status
->kind
!= TARGET_WAITKIND_NO_RESUMED
)
8052 /* Expedited registers. */
8053 if (!stop_reply
->regcache
.empty ())
8055 struct regcache
*regcache
8056 = get_thread_arch_regcache (this, ptid
, stop_reply
->arch
);
8058 for (cached_reg_t
®
: stop_reply
->regcache
)
8060 regcache
->raw_supply (reg
.num
, reg
.data
);
8064 stop_reply
->regcache
.clear ();
8067 remote_notice_new_inferior (ptid
, false);
8068 remote_thread_info
*remote_thr
= get_remote_thread_info (this, ptid
);
8069 remote_thr
->core
= stop_reply
->core
;
8070 remote_thr
->stop_reason
= stop_reply
->stop_reason
;
8071 remote_thr
->watch_data_address
= stop_reply
->watch_data_address
;
8073 if (target_is_non_stop_p ())
8075 /* If the target works in non-stop mode, a stop-reply indicates that
8076 only this thread stopped. */
8077 remote_thr
->set_not_resumed ();
8081 /* If the target works in all-stop mode, a stop-reply indicates that
8082 all the target's threads stopped. */
8083 for (thread_info
*tp
: all_non_exited_threads (this))
8084 get_remote_thread_info (tp
)->set_not_resumed ();
8092 /* The non-stop mode version of target_wait. */
8095 remote_target::wait_ns (ptid_t ptid
, struct target_waitstatus
*status
,
8096 target_wait_flags options
)
8098 struct remote_state
*rs
= get_remote_state ();
8099 struct stop_reply
*stop_reply
;
8103 /* If in non-stop mode, get out of getpkt even if a
8104 notification is received. */
8106 ret
= getpkt_or_notif_sane (&rs
->buf
, 0 /* forever */, &is_notif
);
8109 if (ret
!= -1 && !is_notif
)
8112 case 'E': /* Error of some sort. */
8113 /* We're out of sync with the target now. Did it continue
8114 or not? We can't tell which thread it was in non-stop,
8115 so just ignore this. */
8116 warning (_("Remote failure reply: %s"), rs
->buf
.data ());
8118 case 'O': /* Console output. */
8119 remote_console_output (&rs
->buf
[1]);
8122 warning (_("Invalid remote reply: %s"), rs
->buf
.data ());
8126 /* Acknowledge a pending stop reply that may have arrived in the
8128 if (rs
->notif_state
->pending_event
[notif_client_stop
.id
] != NULL
)
8129 remote_notif_get_pending_events (¬if_client_stop
);
8131 /* If indeed we noticed a stop reply, we're done. */
8132 stop_reply
= queued_stop_reply (ptid
);
8133 if (stop_reply
!= NULL
)
8134 return process_stop_reply (stop_reply
, status
);
8136 /* Still no event. If we're just polling for an event, then
8137 return to the event loop. */
8138 if (options
& TARGET_WNOHANG
)
8140 status
->kind
= TARGET_WAITKIND_IGNORE
;
8141 return minus_one_ptid
;
8144 /* Otherwise do a blocking wait. */
8145 ret
= getpkt_or_notif_sane (&rs
->buf
, 1 /* forever */, &is_notif
);
8149 /* Return the first resumed thread. */
8152 first_remote_resumed_thread (remote_target
*target
)
8154 for (thread_info
*tp
: all_non_exited_threads (target
, minus_one_ptid
))
8160 /* Wait until the remote machine stops, then return, storing status in
8161 STATUS just as `wait' would. */
8164 remote_target::wait_as (ptid_t ptid
, target_waitstatus
*status
,
8165 target_wait_flags options
)
8167 struct remote_state
*rs
= get_remote_state ();
8168 ptid_t event_ptid
= null_ptid
;
8170 struct stop_reply
*stop_reply
;
8174 status
->kind
= TARGET_WAITKIND_IGNORE
;
8175 status
->value
.integer
= 0;
8177 stop_reply
= queued_stop_reply (ptid
);
8178 if (stop_reply
!= NULL
)
8179 return process_stop_reply (stop_reply
, status
);
8181 if (rs
->cached_wait_status
)
8182 /* Use the cached wait status, but only once. */
8183 rs
->cached_wait_status
= 0;
8188 int forever
= ((options
& TARGET_WNOHANG
) == 0
8189 && rs
->wait_forever_enabled_p
);
8191 if (!rs
->waiting_for_stop_reply
)
8193 status
->kind
= TARGET_WAITKIND_NO_RESUMED
;
8194 return minus_one_ptid
;
8197 /* FIXME: cagney/1999-09-27: If we're in async mode we should
8198 _never_ wait for ever -> test on target_is_async_p().
8199 However, before we do that we need to ensure that the caller
8200 knows how to take the target into/out of async mode. */
8201 ret
= getpkt_or_notif_sane (&rs
->buf
, forever
, &is_notif
);
8203 /* GDB gets a notification. Return to core as this event is
8205 if (ret
!= -1 && is_notif
)
8206 return minus_one_ptid
;
8208 if (ret
== -1 && (options
& TARGET_WNOHANG
) != 0)
8209 return minus_one_ptid
;
8212 buf
= rs
->buf
.data ();
8214 /* Assume that the target has acknowledged Ctrl-C unless we receive
8215 an 'F' or 'O' packet. */
8216 if (buf
[0] != 'F' && buf
[0] != 'O')
8217 rs
->ctrlc_pending_p
= 0;
8221 case 'E': /* Error of some sort. */
8222 /* We're out of sync with the target now. Did it continue or
8223 not? Not is more likely, so report a stop. */
8224 rs
->waiting_for_stop_reply
= 0;
8226 warning (_("Remote failure reply: %s"), buf
);
8227 status
->kind
= TARGET_WAITKIND_STOPPED
;
8228 status
->value
.sig
= GDB_SIGNAL_0
;
8230 case 'F': /* File-I/O request. */
8231 /* GDB may access the inferior memory while handling the File-I/O
8232 request, but we don't want GDB accessing memory while waiting
8233 for a stop reply. See the comments in putpkt_binary. Set
8234 waiting_for_stop_reply to 0 temporarily. */
8235 rs
->waiting_for_stop_reply
= 0;
8236 remote_fileio_request (this, buf
, rs
->ctrlc_pending_p
);
8237 rs
->ctrlc_pending_p
= 0;
8238 /* GDB handled the File-I/O request, and the target is running
8239 again. Keep waiting for events. */
8240 rs
->waiting_for_stop_reply
= 1;
8242 case 'N': case 'T': case 'S': case 'X': case 'W':
8244 /* There is a stop reply to handle. */
8245 rs
->waiting_for_stop_reply
= 0;
8248 = (struct stop_reply
*) remote_notif_parse (this,
8252 event_ptid
= process_stop_reply (stop_reply
, status
);
8255 case 'O': /* Console output. */
8256 remote_console_output (buf
+ 1);
8259 if (rs
->last_sent_signal
!= GDB_SIGNAL_0
)
8261 /* Zero length reply means that we tried 'S' or 'C' and the
8262 remote system doesn't support it. */
8263 target_terminal::ours_for_output ();
8265 ("Can't send signals to this remote system. %s not sent.\n",
8266 gdb_signal_to_name (rs
->last_sent_signal
));
8267 rs
->last_sent_signal
= GDB_SIGNAL_0
;
8268 target_terminal::inferior ();
8270 strcpy (buf
, rs
->last_sent_step
? "s" : "c");
8276 warning (_("Invalid remote reply: %s"), buf
);
8280 if (status
->kind
== TARGET_WAITKIND_NO_RESUMED
)
8281 return minus_one_ptid
;
8282 else if (status
->kind
== TARGET_WAITKIND_IGNORE
)
8284 /* Nothing interesting happened. If we're doing a non-blocking
8285 poll, we're done. Otherwise, go back to waiting. */
8286 if (options
& TARGET_WNOHANG
)
8287 return minus_one_ptid
;
8291 else if (status
->kind
!= TARGET_WAITKIND_EXITED
8292 && status
->kind
!= TARGET_WAITKIND_SIGNALLED
)
8294 if (event_ptid
!= null_ptid
)
8295 record_currthread (rs
, event_ptid
);
8297 event_ptid
= first_remote_resumed_thread (this);
8301 /* A process exit. Invalidate our notion of current thread. */
8302 record_currthread (rs
, minus_one_ptid
);
8303 /* It's possible that the packet did not include a pid. */
8304 if (event_ptid
== null_ptid
)
8305 event_ptid
= first_remote_resumed_thread (this);
8306 /* EVENT_PTID could still be NULL_PTID. Double-check. */
8307 if (event_ptid
== null_ptid
)
8308 event_ptid
= magic_null_ptid
;
8314 /* Wait until the remote machine stops, then return, storing status in
8315 STATUS just as `wait' would. */
8318 remote_target::wait (ptid_t ptid
, struct target_waitstatus
*status
,
8319 target_wait_flags options
)
8321 REMOTE_SCOPED_DEBUG_ENTER_EXIT
;
8323 remote_state
*rs
= get_remote_state ();
8325 /* Start by clearing the flag that asks for our wait method to be called,
8326 we'll mark it again at the end if needed. */
8327 if (target_is_async_p ())
8328 clear_async_event_handler (rs
->remote_async_inferior_event_token
);
8332 if (target_is_non_stop_p ())
8333 event_ptid
= wait_ns (ptid
, status
, options
);
8335 event_ptid
= wait_as (ptid
, status
, options
);
8337 if (target_is_async_p ())
8339 /* If there are events left in the queue, or unacknowledged
8340 notifications, then tell the event loop to call us again. */
8341 if (!rs
->stop_reply_queue
.empty ()
8342 || rs
->notif_state
->pending_event
[notif_client_stop
.id
] != nullptr)
8343 mark_async_event_handler (rs
->remote_async_inferior_event_token
);
8349 /* Fetch a single register using a 'p' packet. */
8352 remote_target::fetch_register_using_p (struct regcache
*regcache
,
8355 struct gdbarch
*gdbarch
= regcache
->arch ();
8356 struct remote_state
*rs
= get_remote_state ();
8358 gdb_byte
*regp
= (gdb_byte
*) alloca (register_size (gdbarch
, reg
->regnum
));
8361 if (packet_support (PACKET_p
) == PACKET_DISABLE
)
8364 if (reg
->pnum
== -1)
8367 p
= rs
->buf
.data ();
8369 p
+= hexnumstr (p
, reg
->pnum
);
8372 getpkt (&rs
->buf
, 0);
8374 buf
= rs
->buf
.data ();
8376 switch (packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_p
]))
8380 case PACKET_UNKNOWN
:
8383 error (_("Could not fetch register \"%s\"; remote failure reply '%s'"),
8384 gdbarch_register_name (regcache
->arch (),
8389 /* If this register is unfetchable, tell the regcache. */
8392 regcache
->raw_supply (reg
->regnum
, NULL
);
8396 /* Otherwise, parse and supply the value. */
8402 error (_("fetch_register_using_p: early buf termination"));
8404 regp
[i
++] = fromhex (p
[0]) * 16 + fromhex (p
[1]);
8407 regcache
->raw_supply (reg
->regnum
, regp
);
8411 /* Fetch the registers included in the target's 'g' packet. */
8414 remote_target::send_g_packet ()
8416 struct remote_state
*rs
= get_remote_state ();
8419 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "g");
8421 getpkt (&rs
->buf
, 0);
8422 if (packet_check_result (rs
->buf
) == PACKET_ERROR
)
8423 error (_("Could not read registers; remote failure reply '%s'"),
8426 /* We can get out of synch in various cases. If the first character
8427 in the buffer is not a hex character, assume that has happened
8428 and try to fetch another packet to read. */
8429 while ((rs
->buf
[0] < '0' || rs
->buf
[0] > '9')
8430 && (rs
->buf
[0] < 'A' || rs
->buf
[0] > 'F')
8431 && (rs
->buf
[0] < 'a' || rs
->buf
[0] > 'f')
8432 && rs
->buf
[0] != 'x') /* New: unavailable register value. */
8434 remote_debug_printf ("Bad register packet; fetching a new packet");
8435 getpkt (&rs
->buf
, 0);
8438 buf_len
= strlen (rs
->buf
.data ());
8440 /* Sanity check the received packet. */
8441 if (buf_len
% 2 != 0)
8442 error (_("Remote 'g' packet reply is of odd length: %s"), rs
->buf
.data ());
8448 remote_target::process_g_packet (struct regcache
*regcache
)
8450 struct gdbarch
*gdbarch
= regcache
->arch ();
8451 struct remote_state
*rs
= get_remote_state ();
8452 remote_arch_state
*rsa
= rs
->get_remote_arch_state (gdbarch
);
8457 buf_len
= strlen (rs
->buf
.data ());
8459 /* Further sanity checks, with knowledge of the architecture. */
8460 if (buf_len
> 2 * rsa
->sizeof_g_packet
)
8461 error (_("Remote 'g' packet reply is too long (expected %ld bytes, got %d "
8463 rsa
->sizeof_g_packet
, buf_len
/ 2,
8466 /* Save the size of the packet sent to us by the target. It is used
8467 as a heuristic when determining the max size of packets that the
8468 target can safely receive. */
8469 if (rsa
->actual_register_packet_size
== 0)
8470 rsa
->actual_register_packet_size
= buf_len
;
8472 /* If this is smaller than we guessed the 'g' packet would be,
8473 update our records. A 'g' reply that doesn't include a register's
8474 value implies either that the register is not available, or that
8475 the 'p' packet must be used. */
8476 if (buf_len
< 2 * rsa
->sizeof_g_packet
)
8478 long sizeof_g_packet
= buf_len
/ 2;
8480 for (i
= 0; i
< gdbarch_num_regs (gdbarch
); i
++)
8482 long offset
= rsa
->regs
[i
].offset
;
8483 long reg_size
= register_size (gdbarch
, i
);
8485 if (rsa
->regs
[i
].pnum
== -1)
8488 if (offset
>= sizeof_g_packet
)
8489 rsa
->regs
[i
].in_g_packet
= 0;
8490 else if (offset
+ reg_size
> sizeof_g_packet
)
8491 error (_("Truncated register %d in remote 'g' packet"), i
);
8493 rsa
->regs
[i
].in_g_packet
= 1;
8496 /* Looks valid enough, we can assume this is the correct length
8497 for a 'g' packet. It's important not to adjust
8498 rsa->sizeof_g_packet if we have truncated registers otherwise
8499 this "if" won't be run the next time the method is called
8500 with a packet of the same size and one of the internal errors
8501 below will trigger instead. */
8502 rsa
->sizeof_g_packet
= sizeof_g_packet
;
8505 regs
= (char *) alloca (rsa
->sizeof_g_packet
);
8507 /* Unimplemented registers read as all bits zero. */
8508 memset (regs
, 0, rsa
->sizeof_g_packet
);
8510 /* Reply describes registers byte by byte, each byte encoded as two
8511 hex characters. Suck them all up, then supply them to the
8512 register cacheing/storage mechanism. */
8514 p
= rs
->buf
.data ();
8515 for (i
= 0; i
< rsa
->sizeof_g_packet
; i
++)
8517 if (p
[0] == 0 || p
[1] == 0)
8518 /* This shouldn't happen - we adjusted sizeof_g_packet above. */
8519 internal_error (__FILE__
, __LINE__
,
8520 _("unexpected end of 'g' packet reply"));
8522 if (p
[0] == 'x' && p
[1] == 'x')
8523 regs
[i
] = 0; /* 'x' */
8525 regs
[i
] = fromhex (p
[0]) * 16 + fromhex (p
[1]);
8529 for (i
= 0; i
< gdbarch_num_regs (gdbarch
); i
++)
8531 struct packet_reg
*r
= &rsa
->regs
[i
];
8532 long reg_size
= register_size (gdbarch
, i
);
8536 if ((r
->offset
+ reg_size
) * 2 > strlen (rs
->buf
.data ()))
8537 /* This shouldn't happen - we adjusted in_g_packet above. */
8538 internal_error (__FILE__
, __LINE__
,
8539 _("unexpected end of 'g' packet reply"));
8540 else if (rs
->buf
[r
->offset
* 2] == 'x')
8542 gdb_assert (r
->offset
* 2 < strlen (rs
->buf
.data ()));
8543 /* The register isn't available, mark it as such (at
8544 the same time setting the value to zero). */
8545 regcache
->raw_supply (r
->regnum
, NULL
);
8548 regcache
->raw_supply (r
->regnum
, regs
+ r
->offset
);
8554 remote_target::fetch_registers_using_g (struct regcache
*regcache
)
8557 process_g_packet (regcache
);
8560 /* Make the remote selected traceframe match GDB's selected
8564 remote_target::set_remote_traceframe ()
8567 struct remote_state
*rs
= get_remote_state ();
8569 if (rs
->remote_traceframe_number
== get_traceframe_number ())
8572 /* Avoid recursion, remote_trace_find calls us again. */
8573 rs
->remote_traceframe_number
= get_traceframe_number ();
8575 newnum
= target_trace_find (tfind_number
,
8576 get_traceframe_number (), 0, 0, NULL
);
8578 /* Should not happen. If it does, all bets are off. */
8579 if (newnum
!= get_traceframe_number ())
8580 warning (_("could not set remote traceframe"));
8584 remote_target::fetch_registers (struct regcache
*regcache
, int regnum
)
8586 struct gdbarch
*gdbarch
= regcache
->arch ();
8587 struct remote_state
*rs
= get_remote_state ();
8588 remote_arch_state
*rsa
= rs
->get_remote_arch_state (gdbarch
);
8591 set_remote_traceframe ();
8592 set_general_thread (regcache
->ptid ());
8596 packet_reg
*reg
= packet_reg_from_regnum (gdbarch
, rsa
, regnum
);
8598 gdb_assert (reg
!= NULL
);
8600 /* If this register might be in the 'g' packet, try that first -
8601 we are likely to read more than one register. If this is the
8602 first 'g' packet, we might be overly optimistic about its
8603 contents, so fall back to 'p'. */
8604 if (reg
->in_g_packet
)
8606 fetch_registers_using_g (regcache
);
8607 if (reg
->in_g_packet
)
8611 if (fetch_register_using_p (regcache
, reg
))
8614 /* This register is not available. */
8615 regcache
->raw_supply (reg
->regnum
, NULL
);
8620 fetch_registers_using_g (regcache
);
8622 for (i
= 0; i
< gdbarch_num_regs (gdbarch
); i
++)
8623 if (!rsa
->regs
[i
].in_g_packet
)
8624 if (!fetch_register_using_p (regcache
, &rsa
->regs
[i
]))
8626 /* This register is not available. */
8627 regcache
->raw_supply (i
, NULL
);
8631 /* Prepare to store registers. Since we may send them all (using a
8632 'G' request), we have to read out the ones we don't want to change
8636 remote_target::prepare_to_store (struct regcache
*regcache
)
8638 struct remote_state
*rs
= get_remote_state ();
8639 remote_arch_state
*rsa
= rs
->get_remote_arch_state (regcache
->arch ());
8642 /* Make sure the entire registers array is valid. */
8643 switch (packet_support (PACKET_P
))
8645 case PACKET_DISABLE
:
8646 case PACKET_SUPPORT_UNKNOWN
:
8647 /* Make sure all the necessary registers are cached. */
8648 for (i
= 0; i
< gdbarch_num_regs (regcache
->arch ()); i
++)
8649 if (rsa
->regs
[i
].in_g_packet
)
8650 regcache
->raw_update (rsa
->regs
[i
].regnum
);
8657 /* Helper: Attempt to store REGNUM using the P packet. Return fail IFF
8658 packet was not recognized. */
8661 remote_target::store_register_using_P (const struct regcache
*regcache
,
8664 struct gdbarch
*gdbarch
= regcache
->arch ();
8665 struct remote_state
*rs
= get_remote_state ();
8666 /* Try storing a single register. */
8667 char *buf
= rs
->buf
.data ();
8668 gdb_byte
*regp
= (gdb_byte
*) alloca (register_size (gdbarch
, reg
->regnum
));
8671 if (packet_support (PACKET_P
) == PACKET_DISABLE
)
8674 if (reg
->pnum
== -1)
8677 xsnprintf (buf
, get_remote_packet_size (), "P%s=", phex_nz (reg
->pnum
, 0));
8678 p
= buf
+ strlen (buf
);
8679 regcache
->raw_collect (reg
->regnum
, regp
);
8680 bin2hex (regp
, p
, register_size (gdbarch
, reg
->regnum
));
8682 getpkt (&rs
->buf
, 0);
8684 switch (packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_P
]))
8689 error (_("Could not write register \"%s\"; remote failure reply '%s'"),
8690 gdbarch_register_name (gdbarch
, reg
->regnum
), rs
->buf
.data ());
8691 case PACKET_UNKNOWN
:
8694 internal_error (__FILE__
, __LINE__
, _("Bad result from packet_ok"));
8698 /* Store register REGNUM, or all registers if REGNUM == -1, from the
8699 contents of the register cache buffer. FIXME: ignores errors. */
8702 remote_target::store_registers_using_G (const struct regcache
*regcache
)
8704 struct remote_state
*rs
= get_remote_state ();
8705 remote_arch_state
*rsa
= rs
->get_remote_arch_state (regcache
->arch ());
8709 /* Extract all the registers in the regcache copying them into a
8714 regs
= (gdb_byte
*) alloca (rsa
->sizeof_g_packet
);
8715 memset (regs
, 0, rsa
->sizeof_g_packet
);
8716 for (i
= 0; i
< gdbarch_num_regs (regcache
->arch ()); i
++)
8718 struct packet_reg
*r
= &rsa
->regs
[i
];
8721 regcache
->raw_collect (r
->regnum
, regs
+ r
->offset
);
8725 /* Command describes registers byte by byte,
8726 each byte encoded as two hex characters. */
8727 p
= rs
->buf
.data ();
8729 bin2hex (regs
, p
, rsa
->sizeof_g_packet
);
8731 getpkt (&rs
->buf
, 0);
8732 if (packet_check_result (rs
->buf
) == PACKET_ERROR
)
8733 error (_("Could not write registers; remote failure reply '%s'"),
8737 /* Store register REGNUM, or all registers if REGNUM == -1, from the contents
8738 of the register cache buffer. FIXME: ignores errors. */
8741 remote_target::store_registers (struct regcache
*regcache
, int regnum
)
8743 struct gdbarch
*gdbarch
= regcache
->arch ();
8744 struct remote_state
*rs
= get_remote_state ();
8745 remote_arch_state
*rsa
= rs
->get_remote_arch_state (gdbarch
);
8748 set_remote_traceframe ();
8749 set_general_thread (regcache
->ptid ());
8753 packet_reg
*reg
= packet_reg_from_regnum (gdbarch
, rsa
, regnum
);
8755 gdb_assert (reg
!= NULL
);
8757 /* Always prefer to store registers using the 'P' packet if
8758 possible; we often change only a small number of registers.
8759 Sometimes we change a larger number; we'd need help from a
8760 higher layer to know to use 'G'. */
8761 if (store_register_using_P (regcache
, reg
))
8764 /* For now, don't complain if we have no way to write the
8765 register. GDB loses track of unavailable registers too
8766 easily. Some day, this may be an error. We don't have
8767 any way to read the register, either... */
8768 if (!reg
->in_g_packet
)
8771 store_registers_using_G (regcache
);
8775 store_registers_using_G (regcache
);
8777 for (i
= 0; i
< gdbarch_num_regs (gdbarch
); i
++)
8778 if (!rsa
->regs
[i
].in_g_packet
)
8779 if (!store_register_using_P (regcache
, &rsa
->regs
[i
]))
8780 /* See above for why we do not issue an error here. */
8785 /* Return the number of hex digits in num. */
8788 hexnumlen (ULONGEST num
)
8792 for (i
= 0; num
!= 0; i
++)
8795 return std::max (i
, 1);
8798 /* Set BUF to the minimum number of hex digits representing NUM. */
8801 hexnumstr (char *buf
, ULONGEST num
)
8803 int len
= hexnumlen (num
);
8805 return hexnumnstr (buf
, num
, len
);
8809 /* Set BUF to the hex digits representing NUM, padded to WIDTH characters. */
8812 hexnumnstr (char *buf
, ULONGEST num
, int width
)
8818 for (i
= width
- 1; i
>= 0; i
--)
8820 buf
[i
] = "0123456789abcdef"[(num
& 0xf)];
8827 /* Mask all but the least significant REMOTE_ADDRESS_SIZE bits. */
8830 remote_address_masked (CORE_ADDR addr
)
8832 unsigned int address_size
= remote_address_size
;
8834 /* If "remoteaddresssize" was not set, default to target address size. */
8836 address_size
= gdbarch_addr_bit (target_gdbarch ());
8838 if (address_size
> 0
8839 && address_size
< (sizeof (ULONGEST
) * 8))
8841 /* Only create a mask when that mask can safely be constructed
8842 in a ULONGEST variable. */
8845 mask
= (mask
<< address_size
) - 1;
8851 /* Determine whether the remote target supports binary downloading.
8852 This is accomplished by sending a no-op memory write of zero length
8853 to the target at the specified address. It does not suffice to send
8854 the whole packet, since many stubs strip the eighth bit and
8855 subsequently compute a wrong checksum, which causes real havoc with
8858 NOTE: This can still lose if the serial line is not eight-bit
8859 clean. In cases like this, the user should clear "remote
8863 remote_target::check_binary_download (CORE_ADDR addr
)
8865 struct remote_state
*rs
= get_remote_state ();
8867 switch (packet_support (PACKET_X
))
8869 case PACKET_DISABLE
:
8873 case PACKET_SUPPORT_UNKNOWN
:
8877 p
= rs
->buf
.data ();
8879 p
+= hexnumstr (p
, (ULONGEST
) addr
);
8881 p
+= hexnumstr (p
, (ULONGEST
) 0);
8885 putpkt_binary (rs
->buf
.data (), (int) (p
- rs
->buf
.data ()));
8886 getpkt (&rs
->buf
, 0);
8888 if (rs
->buf
[0] == '\0')
8890 remote_debug_printf ("binary downloading NOT supported by target");
8891 remote_protocol_packets
[PACKET_X
].support
= PACKET_DISABLE
;
8895 remote_debug_printf ("binary downloading supported by target");
8896 remote_protocol_packets
[PACKET_X
].support
= PACKET_ENABLE
;
8903 /* Helper function to resize the payload in order to try to get a good
8904 alignment. We try to write an amount of data such that the next write will
8905 start on an address aligned on REMOTE_ALIGN_WRITES. */
8908 align_for_efficient_write (int todo
, CORE_ADDR memaddr
)
8910 return ((memaddr
+ todo
) & ~(REMOTE_ALIGN_WRITES
- 1)) - memaddr
;
8913 /* Write memory data directly to the remote machine.
8914 This does not inform the data cache; the data cache uses this.
8915 HEADER is the starting part of the packet.
8916 MEMADDR is the address in the remote memory space.
8917 MYADDR is the address of the buffer in our space.
8918 LEN_UNITS is the number of addressable units to write.
8919 UNIT_SIZE is the length in bytes of an addressable unit.
8920 PACKET_FORMAT should be either 'X' or 'M', and indicates if we
8921 should send data as binary ('X'), or hex-encoded ('M').
8923 The function creates packet of the form
8924 <HEADER><ADDRESS>,<LENGTH>:<DATA>
8926 where encoding of <DATA> is terminated by PACKET_FORMAT.
8928 If USE_LENGTH is 0, then the <LENGTH> field and the preceding comma
8931 Return the transferred status, error or OK (an
8932 'enum target_xfer_status' value). Save the number of addressable units
8933 transferred in *XFERED_LEN_UNITS. Only transfer a single packet.
8935 On a platform with an addressable memory size of 2 bytes (UNIT_SIZE == 2), an
8936 exchange between gdb and the stub could look like (?? in place of the
8942 -> $M1000,3:eeeeffffeeee#??
8946 <- eeeeffffeeeedddd */
8949 remote_target::remote_write_bytes_aux (const char *header
, CORE_ADDR memaddr
,
8950 const gdb_byte
*myaddr
,
8953 ULONGEST
*xfered_len_units
,
8954 char packet_format
, int use_length
)
8956 struct remote_state
*rs
= get_remote_state ();
8962 int payload_capacity_bytes
;
8963 int payload_length_bytes
;
8965 if (packet_format
!= 'X' && packet_format
!= 'M')
8966 internal_error (__FILE__
, __LINE__
,
8967 _("remote_write_bytes_aux: bad packet format"));
8970 return TARGET_XFER_EOF
;
8972 payload_capacity_bytes
= get_memory_write_packet_size ();
8974 /* The packet buffer will be large enough for the payload;
8975 get_memory_packet_size ensures this. */
8978 /* Compute the size of the actual payload by subtracting out the
8979 packet header and footer overhead: "$M<memaddr>,<len>:...#nn". */
8981 payload_capacity_bytes
-= strlen ("$,:#NN");
8983 /* The comma won't be used. */
8984 payload_capacity_bytes
+= 1;
8985 payload_capacity_bytes
-= strlen (header
);
8986 payload_capacity_bytes
-= hexnumlen (memaddr
);
8988 /* Construct the packet excluding the data: "<header><memaddr>,<len>:". */
8990 strcat (rs
->buf
.data (), header
);
8991 p
= rs
->buf
.data () + strlen (header
);
8993 /* Compute a best guess of the number of bytes actually transfered. */
8994 if (packet_format
== 'X')
8996 /* Best guess at number of bytes that will fit. */
8997 todo_units
= std::min (len_units
,
8998 (ULONGEST
) payload_capacity_bytes
/ unit_size
);
9000 payload_capacity_bytes
-= hexnumlen (todo_units
);
9001 todo_units
= std::min (todo_units
, payload_capacity_bytes
/ unit_size
);
9005 /* Number of bytes that will fit. */
9007 = std::min (len_units
,
9008 (ULONGEST
) (payload_capacity_bytes
/ unit_size
) / 2);
9010 payload_capacity_bytes
-= hexnumlen (todo_units
);
9011 todo_units
= std::min (todo_units
,
9012 (payload_capacity_bytes
/ unit_size
) / 2);
9015 if (todo_units
<= 0)
9016 internal_error (__FILE__
, __LINE__
,
9017 _("minimum packet size too small to write data"));
9019 /* If we already need another packet, then try to align the end
9020 of this packet to a useful boundary. */
9021 if (todo_units
> 2 * REMOTE_ALIGN_WRITES
&& todo_units
< len_units
)
9022 todo_units
= align_for_efficient_write (todo_units
, memaddr
);
9024 /* Append "<memaddr>". */
9025 memaddr
= remote_address_masked (memaddr
);
9026 p
+= hexnumstr (p
, (ULONGEST
) memaddr
);
9033 /* Append the length and retain its location and size. It may need to be
9034 adjusted once the packet body has been created. */
9036 plenlen
= hexnumstr (p
, (ULONGEST
) todo_units
);
9044 /* Append the packet body. */
9045 if (packet_format
== 'X')
9047 /* Binary mode. Send target system values byte by byte, in
9048 increasing byte addresses. Only escape certain critical
9050 payload_length_bytes
=
9051 remote_escape_output (myaddr
, todo_units
, unit_size
, (gdb_byte
*) p
,
9052 &units_written
, payload_capacity_bytes
);
9054 /* If not all TODO units fit, then we'll need another packet. Make
9055 a second try to keep the end of the packet aligned. Don't do
9056 this if the packet is tiny. */
9057 if (units_written
< todo_units
&& units_written
> 2 * REMOTE_ALIGN_WRITES
)
9061 new_todo_units
= align_for_efficient_write (units_written
, memaddr
);
9063 if (new_todo_units
!= units_written
)
9064 payload_length_bytes
=
9065 remote_escape_output (myaddr
, new_todo_units
, unit_size
,
9066 (gdb_byte
*) p
, &units_written
,
9067 payload_capacity_bytes
);
9070 p
+= payload_length_bytes
;
9071 if (use_length
&& units_written
< todo_units
)
9073 /* Escape chars have filled up the buffer prematurely,
9074 and we have actually sent fewer units than planned.
9075 Fix-up the length field of the packet. Use the same
9076 number of characters as before. */
9077 plen
+= hexnumnstr (plen
, (ULONGEST
) units_written
,
9079 *plen
= ':'; /* overwrite \0 from hexnumnstr() */
9084 /* Normal mode: Send target system values byte by byte, in
9085 increasing byte addresses. Each byte is encoded as a two hex
9087 p
+= 2 * bin2hex (myaddr
, p
, todo_units
* unit_size
);
9088 units_written
= todo_units
;
9091 putpkt_binary (rs
->buf
.data (), (int) (p
- rs
->buf
.data ()));
9092 getpkt (&rs
->buf
, 0);
9094 if (rs
->buf
[0] == 'E')
9095 return TARGET_XFER_E_IO
;
9097 /* Return UNITS_WRITTEN, not TODO_UNITS, in case escape chars caused us to
9098 send fewer units than we'd planned. */
9099 *xfered_len_units
= (ULONGEST
) units_written
;
9100 return (*xfered_len_units
!= 0) ? TARGET_XFER_OK
: TARGET_XFER_EOF
;
9103 /* Write memory data directly to the remote machine.
9104 This does not inform the data cache; the data cache uses this.
9105 MEMADDR is the address in the remote memory space.
9106 MYADDR is the address of the buffer in our space.
9107 LEN is the number of bytes.
9109 Return the transferred status, error or OK (an
9110 'enum target_xfer_status' value). Save the number of bytes
9111 transferred in *XFERED_LEN. Only transfer a single packet. */
9114 remote_target::remote_write_bytes (CORE_ADDR memaddr
, const gdb_byte
*myaddr
,
9115 ULONGEST len
, int unit_size
,
9116 ULONGEST
*xfered_len
)
9118 const char *packet_format
= NULL
;
9120 /* Check whether the target supports binary download. */
9121 check_binary_download (memaddr
);
9123 switch (packet_support (PACKET_X
))
9126 packet_format
= "X";
9128 case PACKET_DISABLE
:
9129 packet_format
= "M";
9131 case PACKET_SUPPORT_UNKNOWN
:
9132 internal_error (__FILE__
, __LINE__
,
9133 _("remote_write_bytes: bad internal state"));
9135 internal_error (__FILE__
, __LINE__
, _("bad switch"));
9138 return remote_write_bytes_aux (packet_format
,
9139 memaddr
, myaddr
, len
, unit_size
, xfered_len
,
9140 packet_format
[0], 1);
9143 /* Read memory data directly from the remote machine.
9144 This does not use the data cache; the data cache uses this.
9145 MEMADDR is the address in the remote memory space.
9146 MYADDR is the address of the buffer in our space.
9147 LEN_UNITS is the number of addressable memory units to read..
9148 UNIT_SIZE is the length in bytes of an addressable unit.
9150 Return the transferred status, error or OK (an
9151 'enum target_xfer_status' value). Save the number of bytes
9152 transferred in *XFERED_LEN_UNITS.
9154 See the comment of remote_write_bytes_aux for an example of
9155 memory read/write exchange between gdb and the stub. */
9158 remote_target::remote_read_bytes_1 (CORE_ADDR memaddr
, gdb_byte
*myaddr
,
9160 int unit_size
, ULONGEST
*xfered_len_units
)
9162 struct remote_state
*rs
= get_remote_state ();
9163 int buf_size_bytes
; /* Max size of packet output buffer. */
9168 buf_size_bytes
= get_memory_read_packet_size ();
9169 /* The packet buffer will be large enough for the payload;
9170 get_memory_packet_size ensures this. */
9172 /* Number of units that will fit. */
9173 todo_units
= std::min (len_units
,
9174 (ULONGEST
) (buf_size_bytes
/ unit_size
) / 2);
9176 /* Construct "m"<memaddr>","<len>". */
9177 memaddr
= remote_address_masked (memaddr
);
9178 p
= rs
->buf
.data ();
9180 p
+= hexnumstr (p
, (ULONGEST
) memaddr
);
9182 p
+= hexnumstr (p
, (ULONGEST
) todo_units
);
9185 getpkt (&rs
->buf
, 0);
9186 if (rs
->buf
[0] == 'E'
9187 && isxdigit (rs
->buf
[1]) && isxdigit (rs
->buf
[2])
9188 && rs
->buf
[3] == '\0')
9189 return TARGET_XFER_E_IO
;
9190 /* Reply describes memory byte by byte, each byte encoded as two hex
9192 p
= rs
->buf
.data ();
9193 decoded_bytes
= hex2bin (p
, myaddr
, todo_units
* unit_size
);
9194 /* Return what we have. Let higher layers handle partial reads. */
9195 *xfered_len_units
= (ULONGEST
) (decoded_bytes
/ unit_size
);
9196 return (*xfered_len_units
!= 0) ? TARGET_XFER_OK
: TARGET_XFER_EOF
;
9199 /* Using the set of read-only target sections of remote, read live
9202 For interface/parameters/return description see target.h,
9206 remote_target::remote_xfer_live_readonly_partial (gdb_byte
*readbuf
,
9210 ULONGEST
*xfered_len
)
9212 const struct target_section
*secp
;
9214 secp
= target_section_by_addr (this, memaddr
);
9216 && (bfd_section_flags (secp
->the_bfd_section
) & SEC_READONLY
))
9218 ULONGEST memend
= memaddr
+ len
;
9220 const target_section_table
*table
= target_get_section_table (this);
9221 for (const target_section
&p
: *table
)
9223 if (memaddr
>= p
.addr
)
9225 if (memend
<= p
.endaddr
)
9227 /* Entire transfer is within this section. */
9228 return remote_read_bytes_1 (memaddr
, readbuf
, len
, unit_size
,
9231 else if (memaddr
>= p
.endaddr
)
9233 /* This section ends before the transfer starts. */
9238 /* This section overlaps the transfer. Just do half. */
9239 len
= p
.endaddr
- memaddr
;
9240 return remote_read_bytes_1 (memaddr
, readbuf
, len
, unit_size
,
9247 return TARGET_XFER_EOF
;
9250 /* Similar to remote_read_bytes_1, but it reads from the remote stub
9251 first if the requested memory is unavailable in traceframe.
9252 Otherwise, fall back to remote_read_bytes_1. */
9255 remote_target::remote_read_bytes (CORE_ADDR memaddr
,
9256 gdb_byte
*myaddr
, ULONGEST len
, int unit_size
,
9257 ULONGEST
*xfered_len
)
9260 return TARGET_XFER_EOF
;
9262 if (get_traceframe_number () != -1)
9264 std::vector
<mem_range
> available
;
9266 /* If we fail to get the set of available memory, then the
9267 target does not support querying traceframe info, and so we
9268 attempt reading from the traceframe anyway (assuming the
9269 target implements the old QTro packet then). */
9270 if (traceframe_available_memory (&available
, memaddr
, len
))
9272 if (available
.empty () || available
[0].start
!= memaddr
)
9274 enum target_xfer_status res
;
9276 /* Don't read into the traceframe's available
9278 if (!available
.empty ())
9280 LONGEST oldlen
= len
;
9282 len
= available
[0].start
- memaddr
;
9283 gdb_assert (len
<= oldlen
);
9286 /* This goes through the topmost target again. */
9287 res
= remote_xfer_live_readonly_partial (myaddr
, memaddr
,
9288 len
, unit_size
, xfered_len
);
9289 if (res
== TARGET_XFER_OK
)
9290 return TARGET_XFER_OK
;
9293 /* No use trying further, we know some memory starting
9294 at MEMADDR isn't available. */
9296 return (*xfered_len
!= 0) ?
9297 TARGET_XFER_UNAVAILABLE
: TARGET_XFER_EOF
;
9301 /* Don't try to read more than how much is available, in
9302 case the target implements the deprecated QTro packet to
9303 cater for older GDBs (the target's knowledge of read-only
9304 sections may be outdated by now). */
9305 len
= available
[0].length
;
9309 return remote_read_bytes_1 (memaddr
, myaddr
, len
, unit_size
, xfered_len
);
9314 /* Sends a packet with content determined by the printf format string
9315 FORMAT and the remaining arguments, then gets the reply. Returns
9316 whether the packet was a success, a failure, or unknown. */
9319 remote_target::remote_send_printf (const char *format
, ...)
9321 struct remote_state
*rs
= get_remote_state ();
9322 int max_size
= get_remote_packet_size ();
9325 va_start (ap
, format
);
9328 int size
= vsnprintf (rs
->buf
.data (), max_size
, format
, ap
);
9332 if (size
>= max_size
)
9333 internal_error (__FILE__
, __LINE__
, _("Too long remote packet."));
9335 if (putpkt (rs
->buf
) < 0)
9336 error (_("Communication problem with target."));
9339 getpkt (&rs
->buf
, 0);
9341 return packet_check_result (rs
->buf
);
9344 /* Flash writing can take quite some time. We'll set
9345 effectively infinite timeout for flash operations.
9346 In future, we'll need to decide on a better approach. */
9347 static const int remote_flash_timeout
= 1000;
9350 remote_target::flash_erase (ULONGEST address
, LONGEST length
)
9352 int addr_size
= gdbarch_addr_bit (target_gdbarch ()) / 8;
9353 enum packet_result ret
;
9354 scoped_restore restore_timeout
9355 = make_scoped_restore (&remote_timeout
, remote_flash_timeout
);
9357 ret
= remote_send_printf ("vFlashErase:%s,%s",
9358 phex (address
, addr_size
),
9362 case PACKET_UNKNOWN
:
9363 error (_("Remote target does not support flash erase"));
9365 error (_("Error erasing flash with vFlashErase packet"));
9372 remote_target::remote_flash_write (ULONGEST address
,
9373 ULONGEST length
, ULONGEST
*xfered_len
,
9374 const gdb_byte
*data
)
9376 scoped_restore restore_timeout
9377 = make_scoped_restore (&remote_timeout
, remote_flash_timeout
);
9378 return remote_write_bytes_aux ("vFlashWrite:", address
, data
, length
, 1,
9383 remote_target::flash_done ()
9387 scoped_restore restore_timeout
9388 = make_scoped_restore (&remote_timeout
, remote_flash_timeout
);
9390 ret
= remote_send_printf ("vFlashDone");
9394 case PACKET_UNKNOWN
:
9395 error (_("Remote target does not support vFlashDone"));
9397 error (_("Error finishing flash operation"));
9404 remote_target::files_info ()
9406 puts_filtered ("Debugging a target over a serial line.\n");
9409 /* Stuff for dealing with the packets which are part of this protocol.
9410 See comment at top of file for details. */
9412 /* Close/unpush the remote target, and throw a TARGET_CLOSE_ERROR
9413 error to higher layers. Called when a serial error is detected.
9414 The exception message is STRING, followed by a colon and a blank,
9415 the system error message for errno at function entry and final dot
9416 for output compatibility with throw_perror_with_name. */
9419 unpush_and_perror (remote_target
*target
, const char *string
)
9421 int saved_errno
= errno
;
9423 remote_unpush_target (target
);
9424 throw_error (TARGET_CLOSE_ERROR
, "%s: %s.", string
,
9425 safe_strerror (saved_errno
));
9428 /* Read a single character from the remote end. The current quit
9429 handler is overridden to avoid quitting in the middle of packet
9430 sequence, as that would break communication with the remote server.
9431 See remote_serial_quit_handler for more detail. */
9434 remote_target::readchar (int timeout
)
9437 struct remote_state
*rs
= get_remote_state ();
9440 scoped_restore restore_quit_target
9441 = make_scoped_restore (&curr_quit_handler_target
, this);
9442 scoped_restore restore_quit
9443 = make_scoped_restore (&quit_handler
, ::remote_serial_quit_handler
);
9445 rs
->got_ctrlc_during_io
= 0;
9447 ch
= serial_readchar (rs
->remote_desc
, timeout
);
9449 if (rs
->got_ctrlc_during_io
)
9456 switch ((enum serial_rc
) ch
)
9459 remote_unpush_target (this);
9460 throw_error (TARGET_CLOSE_ERROR
, _("Remote connection closed"));
9463 unpush_and_perror (this, _("Remote communication error. "
9464 "Target disconnected."));
9466 case SERIAL_TIMEOUT
:
9472 /* Wrapper for serial_write that closes the target and throws if
9473 writing fails. The current quit handler is overridden to avoid
9474 quitting in the middle of packet sequence, as that would break
9475 communication with the remote server. See
9476 remote_serial_quit_handler for more detail. */
9479 remote_target::remote_serial_write (const char *str
, int len
)
9481 struct remote_state
*rs
= get_remote_state ();
9483 scoped_restore restore_quit_target
9484 = make_scoped_restore (&curr_quit_handler_target
, this);
9485 scoped_restore restore_quit
9486 = make_scoped_restore (&quit_handler
, ::remote_serial_quit_handler
);
9488 rs
->got_ctrlc_during_io
= 0;
9490 if (serial_write (rs
->remote_desc
, str
, len
))
9492 unpush_and_perror (this, _("Remote communication error. "
9493 "Target disconnected."));
9496 if (rs
->got_ctrlc_during_io
)
9500 /* Return a string representing an escaped version of BUF, of len N.
9501 E.g. \n is converted to \\n, \t to \\t, etc. */
9504 escape_buffer (const char *buf
, int n
)
9508 stb
.putstrn (buf
, n
, '\\');
9509 return std::move (stb
.string ());
9512 /* Display a null-terminated packet on stdout, for debugging, using C
9516 print_packet (const char *buf
)
9518 puts_filtered ("\"");
9519 fputstr_filtered (buf
, '"', gdb_stdout
);
9520 puts_filtered ("\"");
9524 remote_target::putpkt (const char *buf
)
9526 return putpkt_binary (buf
, strlen (buf
));
9529 /* Wrapper around remote_target::putpkt to avoid exporting
9533 putpkt (remote_target
*remote
, const char *buf
)
9535 return remote
->putpkt (buf
);
9538 /* Send a packet to the remote machine, with error checking. The data
9539 of the packet is in BUF. The string in BUF can be at most
9540 get_remote_packet_size () - 5 to account for the $, # and checksum,
9541 and for a possible /0 if we are debugging (remote_debug) and want
9542 to print the sent packet as a string. */
9545 remote_target::putpkt_binary (const char *buf
, int cnt
)
9547 struct remote_state
*rs
= get_remote_state ();
9549 unsigned char csum
= 0;
9550 gdb::def_vector
<char> data (cnt
+ 6);
9551 char *buf2
= data
.data ();
9557 /* Catch cases like trying to read memory or listing threads while
9558 we're waiting for a stop reply. The remote server wouldn't be
9559 ready to handle this request, so we'd hang and timeout. We don't
9560 have to worry about this in synchronous mode, because in that
9561 case it's not possible to issue a command while the target is
9562 running. This is not a problem in non-stop mode, because in that
9563 case, the stub is always ready to process serial input. */
9564 if (!target_is_non_stop_p ()
9565 && target_is_async_p ()
9566 && rs
->waiting_for_stop_reply
)
9568 error (_("Cannot execute this command while the target is running.\n"
9569 "Use the \"interrupt\" command to stop the target\n"
9570 "and then try again."));
9573 /* We're sending out a new packet. Make sure we don't look at a
9574 stale cached response. */
9575 rs
->cached_wait_status
= 0;
9577 /* Copy the packet into buffer BUF2, encapsulating it
9578 and giving it a checksum. */
9583 for (i
= 0; i
< cnt
; i
++)
9589 *p
++ = tohex ((csum
>> 4) & 0xf);
9590 *p
++ = tohex (csum
& 0xf);
9592 /* Send it over and over until we get a positive ack. */
9600 int len
= (int) (p
- buf2
);
9603 if (remote_packet_max_chars
< 0)
9606 max_chars
= remote_packet_max_chars
;
9609 = escape_buffer (buf2
, std::min (len
, max_chars
));
9611 if (len
> max_chars
)
9612 remote_debug_printf_nofunc
9613 ("Sending packet: %s [%d bytes omitted]", str
.c_str (),
9616 remote_debug_printf_nofunc ("Sending packet: %s", str
.c_str ());
9618 remote_serial_write (buf2
, p
- buf2
);
9620 /* If this is a no acks version of the remote protocol, send the
9621 packet and move on. */
9625 /* Read until either a timeout occurs (-2) or '+' is read.
9626 Handle any notification that arrives in the mean time. */
9629 ch
= readchar (remote_timeout
);
9634 remote_debug_printf_nofunc ("Received Ack");
9637 remote_debug_printf_nofunc ("Received Nak");
9639 case SERIAL_TIMEOUT
:
9643 break; /* Retransmit buffer. */
9646 remote_debug_printf ("Packet instead of Ack, ignoring it");
9647 /* It's probably an old response sent because an ACK
9648 was lost. Gobble up the packet and ack it so it
9649 doesn't get retransmitted when we resend this
9652 remote_serial_write ("+", 1);
9653 continue; /* Now, go look for +. */
9660 /* If we got a notification, handle it, and go back to looking
9662 /* We've found the start of a notification. Now
9663 collect the data. */
9664 val
= read_frame (&rs
->buf
);
9667 remote_debug_printf_nofunc
9668 (" Notification received: %s",
9669 escape_buffer (rs
->buf
.data (), val
).c_str ());
9671 handle_notification (rs
->notif_state
, rs
->buf
.data ());
9672 /* We're in sync now, rewait for the ack. */
9676 remote_debug_printf_nofunc ("Junk: %c%s", ch
& 0177,
9682 remote_debug_printf_nofunc ("Junk: %c%s", ch
& 0177,
9686 break; /* Here to retransmit. */
9690 /* This is wrong. If doing a long backtrace, the user should be
9691 able to get out next time we call QUIT, without anything as
9692 violent as interrupt_query. If we want to provide a way out of
9693 here without getting to the next QUIT, it should be based on
9694 hitting ^C twice as in remote_wait. */
9706 /* Come here after finding the start of a frame when we expected an
9707 ack. Do our best to discard the rest of this packet. */
9710 remote_target::skip_frame ()
9716 c
= readchar (remote_timeout
);
9719 case SERIAL_TIMEOUT
:
9720 /* Nothing we can do. */
9723 /* Discard the two bytes of checksum and stop. */
9724 c
= readchar (remote_timeout
);
9726 c
= readchar (remote_timeout
);
9729 case '*': /* Run length encoding. */
9730 /* Discard the repeat count. */
9731 c
= readchar (remote_timeout
);
9736 /* A regular character. */
9742 /* Come here after finding the start of the frame. Collect the rest
9743 into *BUF, verifying the checksum, length, and handling run-length
9744 compression. NUL terminate the buffer. If there is not enough room,
9747 Returns -1 on error, number of characters in buffer (ignoring the
9748 trailing NULL) on success. (could be extended to return one of the
9749 SERIAL status indications). */
9752 remote_target::read_frame (gdb::char_vector
*buf_p
)
9757 char *buf
= buf_p
->data ();
9758 struct remote_state
*rs
= get_remote_state ();
9765 c
= readchar (remote_timeout
);
9768 case SERIAL_TIMEOUT
:
9769 remote_debug_printf ("Timeout in mid-packet, retrying");
9773 remote_debug_printf ("Saw new packet start in middle of old one");
9774 return -1; /* Start a new packet, count retries. */
9778 unsigned char pktcsum
;
9784 check_0
= readchar (remote_timeout
);
9786 check_1
= readchar (remote_timeout
);
9788 if (check_0
== SERIAL_TIMEOUT
|| check_1
== SERIAL_TIMEOUT
)
9790 remote_debug_printf ("Timeout in checksum, retrying");
9793 else if (check_0
< 0 || check_1
< 0)
9795 remote_debug_printf ("Communication error in checksum");
9799 /* Don't recompute the checksum; with no ack packets we
9800 don't have any way to indicate a packet retransmission
9805 pktcsum
= (fromhex (check_0
) << 4) | fromhex (check_1
);
9806 if (csum
== pktcsum
)
9810 ("Bad checksum, sentsum=0x%x, csum=0x%x, buf=%s",
9811 pktcsum
, csum
, escape_buffer (buf
, bc
).c_str ());
9813 /* Number of characters in buffer ignoring trailing
9817 case '*': /* Run length encoding. */
9822 c
= readchar (remote_timeout
);
9824 repeat
= c
- ' ' + 3; /* Compute repeat count. */
9826 /* The character before ``*'' is repeated. */
9828 if (repeat
> 0 && repeat
<= 255 && bc
> 0)
9830 if (bc
+ repeat
- 1 >= buf_p
->size () - 1)
9832 /* Make some more room in the buffer. */
9833 buf_p
->resize (buf_p
->size () + repeat
);
9834 buf
= buf_p
->data ();
9837 memset (&buf
[bc
], buf
[bc
- 1], repeat
);
9843 printf_filtered (_("Invalid run length encoding: %s\n"), buf
);
9847 if (bc
>= buf_p
->size () - 1)
9849 /* Make some more room in the buffer. */
9850 buf_p
->resize (buf_p
->size () * 2);
9851 buf
= buf_p
->data ();
9861 /* Set this to the maximum number of seconds to wait instead of waiting forever
9862 in target_wait(). If this timer times out, then it generates an error and
9863 the command is aborted. This replaces most of the need for timeouts in the
9864 GDB test suite, and makes it possible to distinguish between a hung target
9865 and one with slow communications. */
9867 static int watchdog
= 0;
9869 show_watchdog (struct ui_file
*file
, int from_tty
,
9870 struct cmd_list_element
*c
, const char *value
)
9872 fprintf_filtered (file
, _("Watchdog timer is %s.\n"), value
);
9875 /* Read a packet from the remote machine, with error checking, and
9876 store it in *BUF. Resize *BUF if necessary to hold the result. If
9877 FOREVER, wait forever rather than timing out; this is used (in
9878 synchronous mode) to wait for a target that is is executing user
9880 /* FIXME: ezannoni 2000-02-01 this wrapper is necessary so that we
9881 don't have to change all the calls to getpkt to deal with the
9882 return value, because at the moment I don't know what the right
9883 thing to do it for those. */
9886 remote_target::getpkt (gdb::char_vector
*buf
, int forever
)
9888 getpkt_sane (buf
, forever
);
9892 /* Read a packet from the remote machine, with error checking, and
9893 store it in *BUF. Resize *BUF if necessary to hold the result. If
9894 FOREVER, wait forever rather than timing out; this is used (in
9895 synchronous mode) to wait for a target that is is executing user
9896 code to stop. If FOREVER == 0, this function is allowed to time
9897 out gracefully and return an indication of this to the caller.
9898 Otherwise return the number of bytes read. If EXPECTING_NOTIF,
9899 consider receiving a notification enough reason to return to the
9900 caller. *IS_NOTIF is an output boolean that indicates whether *BUF
9901 holds a notification or not (a regular packet). */
9904 remote_target::getpkt_or_notif_sane_1 (gdb::char_vector
*buf
,
9905 int forever
, int expecting_notif
,
9908 struct remote_state
*rs
= get_remote_state ();
9914 /* We're reading a new response. Make sure we don't look at a
9915 previously cached response. */
9916 rs
->cached_wait_status
= 0;
9918 strcpy (buf
->data (), "timeout");
9921 timeout
= watchdog
> 0 ? watchdog
: -1;
9922 else if (expecting_notif
)
9923 timeout
= 0; /* There should already be a char in the buffer. If
9926 timeout
= remote_timeout
;
9930 /* Process any number of notifications, and then return when
9934 /* If we get a timeout or bad checksum, retry up to MAX_TRIES
9936 for (tries
= 1; tries
<= MAX_TRIES
; tries
++)
9938 /* This can loop forever if the remote side sends us
9939 characters continuously, but if it pauses, we'll get
9940 SERIAL_TIMEOUT from readchar because of timeout. Then
9941 we'll count that as a retry.
9943 Note that even when forever is set, we will only wait
9944 forever prior to the start of a packet. After that, we
9945 expect characters to arrive at a brisk pace. They should
9946 show up within remote_timeout intervals. */
9948 c
= readchar (timeout
);
9949 while (c
!= SERIAL_TIMEOUT
&& c
!= '$' && c
!= '%');
9951 if (c
== SERIAL_TIMEOUT
)
9953 if (expecting_notif
)
9954 return -1; /* Don't complain, it's normal to not get
9955 anything in this case. */
9957 if (forever
) /* Watchdog went off? Kill the target. */
9959 remote_unpush_target (this);
9960 throw_error (TARGET_CLOSE_ERROR
,
9961 _("Watchdog timeout has expired. "
9962 "Target detached."));
9965 remote_debug_printf ("Timed out.");
9969 /* We've found the start of a packet or notification.
9970 Now collect the data. */
9971 val
= read_frame (buf
);
9976 remote_serial_write ("-", 1);
9979 if (tries
> MAX_TRIES
)
9981 /* We have tried hard enough, and just can't receive the
9982 packet/notification. Give up. */
9983 printf_unfiltered (_("Ignoring packet error, continuing...\n"));
9985 /* Skip the ack char if we're in no-ack mode. */
9986 if (!rs
->noack_mode
)
9987 remote_serial_write ("+", 1);
9991 /* If we got an ordinary packet, return that to our caller. */
9998 if (remote_packet_max_chars
< 0)
10001 max_chars
= remote_packet_max_chars
;
10004 = escape_buffer (buf
->data (),
10005 std::min (val
, max_chars
));
10007 if (val
> max_chars
)
10008 remote_debug_printf_nofunc
10009 ("Packet received: %s [%d bytes omitted]", str
.c_str (),
10012 remote_debug_printf_nofunc ("Packet received: %s",
10016 /* Skip the ack char if we're in no-ack mode. */
10017 if (!rs
->noack_mode
)
10018 remote_serial_write ("+", 1);
10019 if (is_notif
!= NULL
)
10024 /* If we got a notification, handle it, and go back to looking
10028 gdb_assert (c
== '%');
10030 remote_debug_printf_nofunc
10031 (" Notification received: %s",
10032 escape_buffer (buf
->data (), val
).c_str ());
10034 if (is_notif
!= NULL
)
10037 handle_notification (rs
->notif_state
, buf
->data ());
10039 /* Notifications require no acknowledgement. */
10041 if (expecting_notif
)
10048 remote_target::getpkt_sane (gdb::char_vector
*buf
, int forever
)
10050 return getpkt_or_notif_sane_1 (buf
, forever
, 0, NULL
);
10054 remote_target::getpkt_or_notif_sane (gdb::char_vector
*buf
, int forever
,
10057 return getpkt_or_notif_sane_1 (buf
, forever
, 1, is_notif
);
10060 /* Kill any new fork children of process PID that haven't been
10061 processed by follow_fork. */
10064 remote_target::kill_new_fork_children (int pid
)
10066 remote_state
*rs
= get_remote_state ();
10067 struct notif_client
*notif
= ¬if_client_stop
;
10069 /* Kill the fork child threads of any threads in process PID
10070 that are stopped at a fork event. */
10071 for (thread_info
*thread
: all_non_exited_threads (this))
10073 struct target_waitstatus
*ws
= &thread
->pending_follow
;
10075 if (is_pending_fork_parent (ws
, pid
, thread
->ptid
))
10077 int child_pid
= ws
->value
.related_pid
.pid ();
10080 res
= remote_vkill (child_pid
);
10082 error (_("Can't kill fork child process %d"), child_pid
);
10086 /* Check for any pending fork events (not reported or processed yet)
10087 in process PID and kill those fork child threads as well. */
10088 remote_notif_get_pending_events (notif
);
10089 for (auto &event
: rs
->stop_reply_queue
)
10090 if (is_pending_fork_parent (&event
->ws
, pid
, event
->ptid
))
10092 int child_pid
= event
->ws
.value
.related_pid
.pid ();
10095 res
= remote_vkill (child_pid
);
10097 error (_("Can't kill fork child process %d"), child_pid
);
10102 /* Target hook to kill the current inferior. */
10105 remote_target::kill ()
10108 int pid
= inferior_ptid
.pid ();
10109 struct remote_state
*rs
= get_remote_state ();
10111 if (packet_support (PACKET_vKill
) != PACKET_DISABLE
)
10113 /* If we're stopped while forking and we haven't followed yet,
10114 kill the child task. We need to do this before killing the
10115 parent task because if this is a vfork then the parent will
10117 kill_new_fork_children (pid
);
10119 res
= remote_vkill (pid
);
10122 target_mourn_inferior (inferior_ptid
);
10127 /* If we are in 'target remote' mode and we are killing the only
10128 inferior, then we will tell gdbserver to exit and unpush the
10130 if (res
== -1 && !remote_multi_process_p (rs
)
10131 && number_of_live_inferiors (this) == 1)
10135 /* We've killed the remote end, we get to mourn it. If we are
10136 not in extended mode, mourning the inferior also unpushes
10137 remote_ops from the target stack, which closes the remote
10139 target_mourn_inferior (inferior_ptid
);
10144 error (_("Can't kill process"));
10147 /* Send a kill request to the target using the 'vKill' packet. */
10150 remote_target::remote_vkill (int pid
)
10152 if (packet_support (PACKET_vKill
) == PACKET_DISABLE
)
10155 remote_state
*rs
= get_remote_state ();
10157 /* Tell the remote target to detach. */
10158 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "vKill;%x", pid
);
10160 getpkt (&rs
->buf
, 0);
10162 switch (packet_ok (rs
->buf
,
10163 &remote_protocol_packets
[PACKET_vKill
]))
10169 case PACKET_UNKNOWN
:
10172 internal_error (__FILE__
, __LINE__
, _("Bad result from packet_ok"));
10176 /* Send a kill request to the target using the 'k' packet. */
10179 remote_target::remote_kill_k ()
10181 /* Catch errors so the user can quit from gdb even when we
10182 aren't on speaking terms with the remote system. */
10187 catch (const gdb_exception_error
&ex
)
10189 if (ex
.error
== TARGET_CLOSE_ERROR
)
10191 /* If we got an (EOF) error that caused the target
10192 to go away, then we're done, that's what we wanted.
10193 "k" is susceptible to cause a premature EOF, given
10194 that the remote server isn't actually required to
10195 reply to "k", and it can happen that it doesn't
10196 even get to reply ACK to the "k". */
10200 /* Otherwise, something went wrong. We didn't actually kill
10201 the target. Just propagate the exception, and let the
10202 user or higher layers decide what to do. */
10208 remote_target::mourn_inferior ()
10210 struct remote_state
*rs
= get_remote_state ();
10212 /* We're no longer interested in notification events of an inferior
10213 that exited or was killed/detached. */
10214 discard_pending_stop_replies (current_inferior ());
10216 /* In 'target remote' mode with one inferior, we close the connection. */
10217 if (!rs
->extended
&& number_of_live_inferiors (this) <= 1)
10219 remote_unpush_target (this);
10223 /* In case we got here due to an error, but we're going to stay
10225 rs
->waiting_for_stop_reply
= 0;
10227 /* If the current general thread belonged to the process we just
10228 detached from or has exited, the remote side current general
10229 thread becomes undefined. Considering a case like this:
10231 - We just got here due to a detach.
10232 - The process that we're detaching from happens to immediately
10233 report a global breakpoint being hit in non-stop mode, in the
10234 same thread we had selected before.
10235 - GDB attaches to this process again.
10236 - This event happens to be the next event we handle.
10238 GDB would consider that the current general thread didn't need to
10239 be set on the stub side (with Hg), since for all it knew,
10240 GENERAL_THREAD hadn't changed.
10242 Notice that although in all-stop mode, the remote server always
10243 sets the current thread to the thread reporting the stop event,
10244 that doesn't happen in non-stop mode; in non-stop, the stub *must
10245 not* change the current thread when reporting a breakpoint hit,
10246 due to the decoupling of event reporting and event handling.
10248 To keep things simple, we always invalidate our notion of the
10250 record_currthread (rs
, minus_one_ptid
);
10252 /* Call common code to mark the inferior as not running. */
10253 generic_mourn_inferior ();
10257 extended_remote_target::supports_disable_randomization ()
10259 return packet_support (PACKET_QDisableRandomization
) == PACKET_ENABLE
;
10263 remote_target::extended_remote_disable_randomization (int val
)
10265 struct remote_state
*rs
= get_remote_state ();
10268 xsnprintf (rs
->buf
.data (), get_remote_packet_size (),
10269 "QDisableRandomization:%x", val
);
10271 reply
= remote_get_noisy_reply ();
10272 if (*reply
== '\0')
10273 error (_("Target does not support QDisableRandomization."));
10274 if (strcmp (reply
, "OK") != 0)
10275 error (_("Bogus QDisableRandomization reply from target: %s"), reply
);
10279 remote_target::extended_remote_run (const std::string
&args
)
10281 struct remote_state
*rs
= get_remote_state ();
10283 const char *remote_exec_file
= get_remote_exec_file ();
10285 /* If the user has disabled vRun support, or we have detected that
10286 support is not available, do not try it. */
10287 if (packet_support (PACKET_vRun
) == PACKET_DISABLE
)
10290 strcpy (rs
->buf
.data (), "vRun;");
10291 len
= strlen (rs
->buf
.data ());
10293 if (strlen (remote_exec_file
) * 2 + len
>= get_remote_packet_size ())
10294 error (_("Remote file name too long for run packet"));
10295 len
+= 2 * bin2hex ((gdb_byte
*) remote_exec_file
, rs
->buf
.data () + len
,
10296 strlen (remote_exec_file
));
10298 if (!args
.empty ())
10302 gdb_argv
argv (args
.c_str ());
10303 for (i
= 0; argv
[i
] != NULL
; i
++)
10305 if (strlen (argv
[i
]) * 2 + 1 + len
>= get_remote_packet_size ())
10306 error (_("Argument list too long for run packet"));
10307 rs
->buf
[len
++] = ';';
10308 len
+= 2 * bin2hex ((gdb_byte
*) argv
[i
], rs
->buf
.data () + len
,
10313 rs
->buf
[len
++] = '\0';
10316 getpkt (&rs
->buf
, 0);
10318 switch (packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_vRun
]))
10321 /* We have a wait response. All is well. */
10323 case PACKET_UNKNOWN
:
10326 if (remote_exec_file
[0] == '\0')
10327 error (_("Running the default executable on the remote target failed; "
10328 "try \"set remote exec-file\"?"));
10330 error (_("Running \"%s\" on the remote target failed"),
10333 gdb_assert_not_reached (_("bad switch"));
10337 /* Helper function to send set/unset environment packets. ACTION is
10338 either "set" or "unset". PACKET is either "QEnvironmentHexEncoded"
10339 or "QEnvironmentUnsetVariable". VALUE is the variable to be
10343 remote_target::send_environment_packet (const char *action
,
10344 const char *packet
,
10347 remote_state
*rs
= get_remote_state ();
10349 /* Convert the environment variable to an hex string, which
10350 is the best format to be transmitted over the wire. */
10351 std::string encoded_value
= bin2hex ((const gdb_byte
*) value
,
10354 xsnprintf (rs
->buf
.data (), get_remote_packet_size (),
10355 "%s:%s", packet
, encoded_value
.c_str ());
10358 getpkt (&rs
->buf
, 0);
10359 if (strcmp (rs
->buf
.data (), "OK") != 0)
10360 warning (_("Unable to %s environment variable '%s' on remote."),
10364 /* Helper function to handle the QEnvironment* packets. */
10367 remote_target::extended_remote_environment_support ()
10369 remote_state
*rs
= get_remote_state ();
10371 if (packet_support (PACKET_QEnvironmentReset
) != PACKET_DISABLE
)
10373 putpkt ("QEnvironmentReset");
10374 getpkt (&rs
->buf
, 0);
10375 if (strcmp (rs
->buf
.data (), "OK") != 0)
10376 warning (_("Unable to reset environment on remote."));
10379 gdb_environ
*e
= ¤t_inferior ()->environment
;
10381 if (packet_support (PACKET_QEnvironmentHexEncoded
) != PACKET_DISABLE
)
10382 for (const std::string
&el
: e
->user_set_env ())
10383 send_environment_packet ("set", "QEnvironmentHexEncoded",
10386 if (packet_support (PACKET_QEnvironmentUnset
) != PACKET_DISABLE
)
10387 for (const std::string
&el
: e
->user_unset_env ())
10388 send_environment_packet ("unset", "QEnvironmentUnset", el
.c_str ());
10391 /* Helper function to set the current working directory for the
10392 inferior in the remote target. */
10395 remote_target::extended_remote_set_inferior_cwd ()
10397 if (packet_support (PACKET_QSetWorkingDir
) != PACKET_DISABLE
)
10399 const std::string
&inferior_cwd
= current_inferior ()->cwd ();
10400 remote_state
*rs
= get_remote_state ();
10402 if (!inferior_cwd
.empty ())
10404 std::string hexpath
10405 = bin2hex ((const gdb_byte
*) inferior_cwd
.data (),
10406 inferior_cwd
.size ());
10408 xsnprintf (rs
->buf
.data (), get_remote_packet_size (),
10409 "QSetWorkingDir:%s", hexpath
.c_str ());
10413 /* An empty inferior_cwd means that the user wants us to
10414 reset the remote server's inferior's cwd. */
10415 xsnprintf (rs
->buf
.data (), get_remote_packet_size (),
10416 "QSetWorkingDir:");
10420 getpkt (&rs
->buf
, 0);
10421 if (packet_ok (rs
->buf
,
10422 &remote_protocol_packets
[PACKET_QSetWorkingDir
])
10425 Remote replied unexpectedly while setting the inferior's working\n\
10432 /* In the extended protocol we want to be able to do things like
10433 "run" and have them basically work as expected. So we need
10434 a special create_inferior function. We support changing the
10435 executable file and the command line arguments, but not the
10439 extended_remote_target::create_inferior (const char *exec_file
,
10440 const std::string
&args
,
10441 char **env
, int from_tty
)
10445 struct remote_state
*rs
= get_remote_state ();
10446 const char *remote_exec_file
= get_remote_exec_file ();
10448 /* If running asynchronously, register the target file descriptor
10449 with the event loop. */
10450 if (target_can_async_p ())
10453 /* Disable address space randomization if requested (and supported). */
10454 if (supports_disable_randomization ())
10455 extended_remote_disable_randomization (disable_randomization
);
10457 /* If startup-with-shell is on, we inform gdbserver to start the
10458 remote inferior using a shell. */
10459 if (packet_support (PACKET_QStartupWithShell
) != PACKET_DISABLE
)
10461 xsnprintf (rs
->buf
.data (), get_remote_packet_size (),
10462 "QStartupWithShell:%d", startup_with_shell
? 1 : 0);
10464 getpkt (&rs
->buf
, 0);
10465 if (strcmp (rs
->buf
.data (), "OK") != 0)
10467 Remote replied unexpectedly while setting startup-with-shell: %s"),
10471 extended_remote_environment_support ();
10473 extended_remote_set_inferior_cwd ();
10475 /* Now restart the remote server. */
10476 run_worked
= extended_remote_run (args
) != -1;
10479 /* vRun was not supported. Fail if we need it to do what the
10481 if (remote_exec_file
[0])
10482 error (_("Remote target does not support \"set remote exec-file\""));
10483 if (!args
.empty ())
10484 error (_("Remote target does not support \"set args\" or run ARGS"));
10486 /* Fall back to "R". */
10487 extended_remote_restart ();
10490 /* vRun's success return is a stop reply. */
10491 stop_reply
= run_worked
? rs
->buf
.data () : NULL
;
10492 add_current_inferior_and_thread (stop_reply
);
10494 /* Get updated offsets, if the stub uses qOffsets. */
10499 /* Given a location's target info BP_TGT and the packet buffer BUF, output
10500 the list of conditions (in agent expression bytecode format), if any, the
10501 target needs to evaluate. The output is placed into the packet buffer
10502 started from BUF and ended at BUF_END. */
10505 remote_add_target_side_condition (struct gdbarch
*gdbarch
,
10506 struct bp_target_info
*bp_tgt
, char *buf
,
10509 if (bp_tgt
->conditions
.empty ())
10512 buf
+= strlen (buf
);
10513 xsnprintf (buf
, buf_end
- buf
, "%s", ";");
10516 /* Send conditions to the target. */
10517 for (agent_expr
*aexpr
: bp_tgt
->conditions
)
10519 xsnprintf (buf
, buf_end
- buf
, "X%x,", aexpr
->len
);
10520 buf
+= strlen (buf
);
10521 for (int i
= 0; i
< aexpr
->len
; ++i
)
10522 buf
= pack_hex_byte (buf
, aexpr
->buf
[i
]);
10529 remote_add_target_side_commands (struct gdbarch
*gdbarch
,
10530 struct bp_target_info
*bp_tgt
, char *buf
)
10532 if (bp_tgt
->tcommands
.empty ())
10535 buf
+= strlen (buf
);
10537 sprintf (buf
, ";cmds:%x,", bp_tgt
->persist
);
10538 buf
+= strlen (buf
);
10540 /* Concatenate all the agent expressions that are commands into the
10542 for (agent_expr
*aexpr
: bp_tgt
->tcommands
)
10544 sprintf (buf
, "X%x,", aexpr
->len
);
10545 buf
+= strlen (buf
);
10546 for (int i
= 0; i
< aexpr
->len
; ++i
)
10547 buf
= pack_hex_byte (buf
, aexpr
->buf
[i
]);
10552 /* Insert a breakpoint. On targets that have software breakpoint
10553 support, we ask the remote target to do the work; on targets
10554 which don't, we insert a traditional memory breakpoint. */
10557 remote_target::insert_breakpoint (struct gdbarch
*gdbarch
,
10558 struct bp_target_info
*bp_tgt
)
10560 /* Try the "Z" s/w breakpoint packet if it is not already disabled.
10561 If it succeeds, then set the support to PACKET_ENABLE. If it
10562 fails, and the user has explicitly requested the Z support then
10563 report an error, otherwise, mark it disabled and go on. */
10565 if (packet_support (PACKET_Z0
) != PACKET_DISABLE
)
10567 CORE_ADDR addr
= bp_tgt
->reqstd_address
;
10568 struct remote_state
*rs
;
10571 /* Make sure the remote is pointing at the right process, if
10573 if (!gdbarch_has_global_breakpoints (target_gdbarch ()))
10574 set_general_process ();
10576 rs
= get_remote_state ();
10577 p
= rs
->buf
.data ();
10578 endbuf
= p
+ get_remote_packet_size ();
10583 addr
= (ULONGEST
) remote_address_masked (addr
);
10584 p
+= hexnumstr (p
, addr
);
10585 xsnprintf (p
, endbuf
- p
, ",%d", bp_tgt
->kind
);
10587 if (supports_evaluation_of_breakpoint_conditions ())
10588 remote_add_target_side_condition (gdbarch
, bp_tgt
, p
, endbuf
);
10590 if (can_run_breakpoint_commands ())
10591 remote_add_target_side_commands (gdbarch
, bp_tgt
, p
);
10594 getpkt (&rs
->buf
, 0);
10596 switch (packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_Z0
]))
10602 case PACKET_UNKNOWN
:
10607 /* If this breakpoint has target-side commands but this stub doesn't
10608 support Z0 packets, throw error. */
10609 if (!bp_tgt
->tcommands
.empty ())
10610 throw_error (NOT_SUPPORTED_ERROR
, _("\
10611 Target doesn't support breakpoints that have target side commands."));
10613 return memory_insert_breakpoint (this, gdbarch
, bp_tgt
);
10617 remote_target::remove_breakpoint (struct gdbarch
*gdbarch
,
10618 struct bp_target_info
*bp_tgt
,
10619 enum remove_bp_reason reason
)
10621 CORE_ADDR addr
= bp_tgt
->placed_address
;
10622 struct remote_state
*rs
= get_remote_state ();
10624 if (packet_support (PACKET_Z0
) != PACKET_DISABLE
)
10626 char *p
= rs
->buf
.data ();
10627 char *endbuf
= p
+ get_remote_packet_size ();
10629 /* Make sure the remote is pointing at the right process, if
10631 if (!gdbarch_has_global_breakpoints (target_gdbarch ()))
10632 set_general_process ();
10638 addr
= (ULONGEST
) remote_address_masked (bp_tgt
->placed_address
);
10639 p
+= hexnumstr (p
, addr
);
10640 xsnprintf (p
, endbuf
- p
, ",%d", bp_tgt
->kind
);
10643 getpkt (&rs
->buf
, 0);
10645 return (rs
->buf
[0] == 'E');
10648 return memory_remove_breakpoint (this, gdbarch
, bp_tgt
, reason
);
10651 static enum Z_packet_type
10652 watchpoint_to_Z_packet (int type
)
10657 return Z_PACKET_WRITE_WP
;
10660 return Z_PACKET_READ_WP
;
10663 return Z_PACKET_ACCESS_WP
;
10666 internal_error (__FILE__
, __LINE__
,
10667 _("hw_bp_to_z: bad watchpoint type %d"), type
);
10672 remote_target::insert_watchpoint (CORE_ADDR addr
, int len
,
10673 enum target_hw_bp_type type
, struct expression
*cond
)
10675 struct remote_state
*rs
= get_remote_state ();
10676 char *endbuf
= rs
->buf
.data () + get_remote_packet_size ();
10678 enum Z_packet_type packet
= watchpoint_to_Z_packet (type
);
10680 if (packet_support (PACKET_Z0
+ packet
) == PACKET_DISABLE
)
10683 /* Make sure the remote is pointing at the right process, if
10685 if (!gdbarch_has_global_breakpoints (target_gdbarch ()))
10686 set_general_process ();
10688 xsnprintf (rs
->buf
.data (), endbuf
- rs
->buf
.data (), "Z%x,", packet
);
10689 p
= strchr (rs
->buf
.data (), '\0');
10690 addr
= remote_address_masked (addr
);
10691 p
+= hexnumstr (p
, (ULONGEST
) addr
);
10692 xsnprintf (p
, endbuf
- p
, ",%x", len
);
10695 getpkt (&rs
->buf
, 0);
10697 switch (packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_Z0
+ packet
]))
10701 case PACKET_UNKNOWN
:
10706 internal_error (__FILE__
, __LINE__
,
10707 _("remote_insert_watchpoint: reached end of function"));
10711 remote_target::watchpoint_addr_within_range (CORE_ADDR addr
,
10712 CORE_ADDR start
, int length
)
10714 CORE_ADDR diff
= remote_address_masked (addr
- start
);
10716 return diff
< length
;
10721 remote_target::remove_watchpoint (CORE_ADDR addr
, int len
,
10722 enum target_hw_bp_type type
, struct expression
*cond
)
10724 struct remote_state
*rs
= get_remote_state ();
10725 char *endbuf
= rs
->buf
.data () + get_remote_packet_size ();
10727 enum Z_packet_type packet
= watchpoint_to_Z_packet (type
);
10729 if (packet_support (PACKET_Z0
+ packet
) == PACKET_DISABLE
)
10732 /* Make sure the remote is pointing at the right process, if
10734 if (!gdbarch_has_global_breakpoints (target_gdbarch ()))
10735 set_general_process ();
10737 xsnprintf (rs
->buf
.data (), endbuf
- rs
->buf
.data (), "z%x,", packet
);
10738 p
= strchr (rs
->buf
.data (), '\0');
10739 addr
= remote_address_masked (addr
);
10740 p
+= hexnumstr (p
, (ULONGEST
) addr
);
10741 xsnprintf (p
, endbuf
- p
, ",%x", len
);
10743 getpkt (&rs
->buf
, 0);
10745 switch (packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_Z0
+ packet
]))
10748 case PACKET_UNKNOWN
:
10753 internal_error (__FILE__
, __LINE__
,
10754 _("remote_remove_watchpoint: reached end of function"));
10758 static int remote_hw_watchpoint_limit
= -1;
10759 static int remote_hw_watchpoint_length_limit
= -1;
10760 static int remote_hw_breakpoint_limit
= -1;
10763 remote_target::region_ok_for_hw_watchpoint (CORE_ADDR addr
, int len
)
10765 if (remote_hw_watchpoint_length_limit
== 0)
10767 else if (remote_hw_watchpoint_length_limit
< 0)
10769 else if (len
<= remote_hw_watchpoint_length_limit
)
10776 remote_target::can_use_hw_breakpoint (enum bptype type
, int cnt
, int ot
)
10778 if (type
== bp_hardware_breakpoint
)
10780 if (remote_hw_breakpoint_limit
== 0)
10782 else if (remote_hw_breakpoint_limit
< 0)
10784 else if (cnt
<= remote_hw_breakpoint_limit
)
10789 if (remote_hw_watchpoint_limit
== 0)
10791 else if (remote_hw_watchpoint_limit
< 0)
10795 else if (cnt
<= remote_hw_watchpoint_limit
)
10801 /* The to_stopped_by_sw_breakpoint method of target remote. */
10804 remote_target::stopped_by_sw_breakpoint ()
10806 struct thread_info
*thread
= inferior_thread ();
10808 return (thread
->priv
!= NULL
10809 && (get_remote_thread_info (thread
)->stop_reason
10810 == TARGET_STOPPED_BY_SW_BREAKPOINT
));
10813 /* The to_supports_stopped_by_sw_breakpoint method of target
10817 remote_target::supports_stopped_by_sw_breakpoint ()
10819 return (packet_support (PACKET_swbreak_feature
) == PACKET_ENABLE
);
10822 /* The to_stopped_by_hw_breakpoint method of target remote. */
10825 remote_target::stopped_by_hw_breakpoint ()
10827 struct thread_info
*thread
= inferior_thread ();
10829 return (thread
->priv
!= NULL
10830 && (get_remote_thread_info (thread
)->stop_reason
10831 == TARGET_STOPPED_BY_HW_BREAKPOINT
));
10834 /* The to_supports_stopped_by_hw_breakpoint method of target
10838 remote_target::supports_stopped_by_hw_breakpoint ()
10840 return (packet_support (PACKET_hwbreak_feature
) == PACKET_ENABLE
);
10844 remote_target::stopped_by_watchpoint ()
10846 struct thread_info
*thread
= inferior_thread ();
10848 return (thread
->priv
!= NULL
10849 && (get_remote_thread_info (thread
)->stop_reason
10850 == TARGET_STOPPED_BY_WATCHPOINT
));
10854 remote_target::stopped_data_address (CORE_ADDR
*addr_p
)
10856 struct thread_info
*thread
= inferior_thread ();
10858 if (thread
->priv
!= NULL
10859 && (get_remote_thread_info (thread
)->stop_reason
10860 == TARGET_STOPPED_BY_WATCHPOINT
))
10862 *addr_p
= get_remote_thread_info (thread
)->watch_data_address
;
10871 remote_target::insert_hw_breakpoint (struct gdbarch
*gdbarch
,
10872 struct bp_target_info
*bp_tgt
)
10874 CORE_ADDR addr
= bp_tgt
->reqstd_address
;
10875 struct remote_state
*rs
;
10879 if (packet_support (PACKET_Z1
) == PACKET_DISABLE
)
10882 /* Make sure the remote is pointing at the right process, if
10884 if (!gdbarch_has_global_breakpoints (target_gdbarch ()))
10885 set_general_process ();
10887 rs
= get_remote_state ();
10888 p
= rs
->buf
.data ();
10889 endbuf
= p
+ get_remote_packet_size ();
10895 addr
= remote_address_masked (addr
);
10896 p
+= hexnumstr (p
, (ULONGEST
) addr
);
10897 xsnprintf (p
, endbuf
- p
, ",%x", bp_tgt
->kind
);
10899 if (supports_evaluation_of_breakpoint_conditions ())
10900 remote_add_target_side_condition (gdbarch
, bp_tgt
, p
, endbuf
);
10902 if (can_run_breakpoint_commands ())
10903 remote_add_target_side_commands (gdbarch
, bp_tgt
, p
);
10906 getpkt (&rs
->buf
, 0);
10908 switch (packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_Z1
]))
10911 if (rs
->buf
[1] == '.')
10913 message
= strchr (&rs
->buf
[2], '.');
10915 error (_("Remote failure reply: %s"), message
+ 1);
10918 case PACKET_UNKNOWN
:
10923 internal_error (__FILE__
, __LINE__
,
10924 _("remote_insert_hw_breakpoint: reached end of function"));
10929 remote_target::remove_hw_breakpoint (struct gdbarch
*gdbarch
,
10930 struct bp_target_info
*bp_tgt
)
10933 struct remote_state
*rs
= get_remote_state ();
10934 char *p
= rs
->buf
.data ();
10935 char *endbuf
= p
+ get_remote_packet_size ();
10937 if (packet_support (PACKET_Z1
) == PACKET_DISABLE
)
10940 /* Make sure the remote is pointing at the right process, if
10942 if (!gdbarch_has_global_breakpoints (target_gdbarch ()))
10943 set_general_process ();
10949 addr
= remote_address_masked (bp_tgt
->placed_address
);
10950 p
+= hexnumstr (p
, (ULONGEST
) addr
);
10951 xsnprintf (p
, endbuf
- p
, ",%x", bp_tgt
->kind
);
10954 getpkt (&rs
->buf
, 0);
10956 switch (packet_ok (rs
->buf
, &remote_protocol_packets
[PACKET_Z1
]))
10959 case PACKET_UNKNOWN
:
10964 internal_error (__FILE__
, __LINE__
,
10965 _("remote_remove_hw_breakpoint: reached end of function"));
10968 /* Verify memory using the "qCRC:" request. */
10971 remote_target::verify_memory (const gdb_byte
*data
, CORE_ADDR lma
, ULONGEST size
)
10973 struct remote_state
*rs
= get_remote_state ();
10974 unsigned long host_crc
, target_crc
;
10977 /* It doesn't make sense to use qCRC if the remote target is
10978 connected but not running. */
10979 if (target_has_execution ()
10980 && packet_support (PACKET_qCRC
) != PACKET_DISABLE
)
10982 enum packet_result result
;
10984 /* Make sure the remote is pointing at the right process. */
10985 set_general_process ();
10987 /* FIXME: assumes lma can fit into long. */
10988 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "qCRC:%lx,%lx",
10989 (long) lma
, (long) size
);
10992 /* Be clever; compute the host_crc before waiting for target
10994 host_crc
= xcrc32 (data
, size
, 0xffffffff);
10996 getpkt (&rs
->buf
, 0);
10998 result
= packet_ok (rs
->buf
,
10999 &remote_protocol_packets
[PACKET_qCRC
]);
11000 if (result
== PACKET_ERROR
)
11002 else if (result
== PACKET_OK
)
11004 for (target_crc
= 0, tmp
= &rs
->buf
[1]; *tmp
; tmp
++)
11005 target_crc
= target_crc
* 16 + fromhex (*tmp
);
11007 return (host_crc
== target_crc
);
11011 return simple_verify_memory (this, data
, lma
, size
);
11014 /* compare-sections command
11016 With no arguments, compares each loadable section in the exec bfd
11017 with the same memory range on the target, and reports mismatches.
11018 Useful for verifying the image on the target against the exec file. */
11021 compare_sections_command (const char *args
, int from_tty
)
11024 const char *sectname
;
11025 bfd_size_type size
;
11028 int mismatched
= 0;
11032 if (!current_program_space
->exec_bfd ())
11033 error (_("command cannot be used without an exec file"));
11035 if (args
!= NULL
&& strcmp (args
, "-r") == 0)
11041 for (s
= current_program_space
->exec_bfd ()->sections
; s
; s
= s
->next
)
11043 if (!(s
->flags
& SEC_LOAD
))
11044 continue; /* Skip non-loadable section. */
11046 if (read_only
&& (s
->flags
& SEC_READONLY
) == 0)
11047 continue; /* Skip writeable sections */
11049 size
= bfd_section_size (s
);
11051 continue; /* Skip zero-length section. */
11053 sectname
= bfd_section_name (s
);
11054 if (args
&& strcmp (args
, sectname
) != 0)
11055 continue; /* Not the section selected by user. */
11057 matched
= 1; /* Do this section. */
11060 gdb::byte_vector
sectdata (size
);
11061 bfd_get_section_contents (current_program_space
->exec_bfd (), s
,
11062 sectdata
.data (), 0, size
);
11064 res
= target_verify_memory (sectdata
.data (), lma
, size
);
11067 error (_("target memory fault, section %s, range %s -- %s"), sectname
,
11068 paddress (target_gdbarch (), lma
),
11069 paddress (target_gdbarch (), lma
+ size
));
11071 printf_filtered ("Section %s, range %s -- %s: ", sectname
,
11072 paddress (target_gdbarch (), lma
),
11073 paddress (target_gdbarch (), lma
+ size
));
11075 printf_filtered ("matched.\n");
11078 printf_filtered ("MIS-MATCHED!\n");
11082 if (mismatched
> 0)
11083 warning (_("One or more sections of the target image does not match\n\
11084 the loaded file\n"));
11085 if (args
&& !matched
)
11086 printf_filtered (_("No loaded section named '%s'.\n"), args
);
11089 /* Write LEN bytes from WRITEBUF into OBJECT_NAME/ANNEX at OFFSET
11090 into remote target. The number of bytes written to the remote
11091 target is returned, or -1 for error. */
11094 remote_target::remote_write_qxfer (const char *object_name
,
11095 const char *annex
, const gdb_byte
*writebuf
,
11096 ULONGEST offset
, LONGEST len
,
11097 ULONGEST
*xfered_len
,
11098 struct packet_config
*packet
)
11102 struct remote_state
*rs
= get_remote_state ();
11103 int max_size
= get_memory_write_packet_size ();
11105 if (packet_config_support (packet
) == PACKET_DISABLE
)
11106 return TARGET_XFER_E_IO
;
11108 /* Insert header. */
11109 i
= snprintf (rs
->buf
.data (), max_size
,
11110 "qXfer:%s:write:%s:%s:",
11111 object_name
, annex
? annex
: "",
11112 phex_nz (offset
, sizeof offset
));
11113 max_size
-= (i
+ 1);
11115 /* Escape as much data as fits into rs->buf. */
11116 buf_len
= remote_escape_output
11117 (writebuf
, len
, 1, (gdb_byte
*) rs
->buf
.data () + i
, &max_size
, max_size
);
11119 if (putpkt_binary (rs
->buf
.data (), i
+ buf_len
) < 0
11120 || getpkt_sane (&rs
->buf
, 0) < 0
11121 || packet_ok (rs
->buf
, packet
) != PACKET_OK
)
11122 return TARGET_XFER_E_IO
;
11124 unpack_varlen_hex (rs
->buf
.data (), &n
);
11127 return (*xfered_len
!= 0) ? TARGET_XFER_OK
: TARGET_XFER_EOF
;
11130 /* Read OBJECT_NAME/ANNEX from the remote target using a qXfer packet.
11131 Data at OFFSET, of up to LEN bytes, is read into READBUF; the
11132 number of bytes read is returned, or 0 for EOF, or -1 for error.
11133 The number of bytes read may be less than LEN without indicating an
11134 EOF. PACKET is checked and updated to indicate whether the remote
11135 target supports this object. */
11138 remote_target::remote_read_qxfer (const char *object_name
,
11140 gdb_byte
*readbuf
, ULONGEST offset
,
11142 ULONGEST
*xfered_len
,
11143 struct packet_config
*packet
)
11145 struct remote_state
*rs
= get_remote_state ();
11146 LONGEST i
, n
, packet_len
;
11148 if (packet_config_support (packet
) == PACKET_DISABLE
)
11149 return TARGET_XFER_E_IO
;
11151 /* Check whether we've cached an end-of-object packet that matches
11153 if (rs
->finished_object
)
11155 if (strcmp (object_name
, rs
->finished_object
) == 0
11156 && strcmp (annex
? annex
: "", rs
->finished_annex
) == 0
11157 && offset
== rs
->finished_offset
)
11158 return TARGET_XFER_EOF
;
11161 /* Otherwise, we're now reading something different. Discard
11163 xfree (rs
->finished_object
);
11164 xfree (rs
->finished_annex
);
11165 rs
->finished_object
= NULL
;
11166 rs
->finished_annex
= NULL
;
11169 /* Request only enough to fit in a single packet. The actual data
11170 may not, since we don't know how much of it will need to be escaped;
11171 the target is free to respond with slightly less data. We subtract
11172 five to account for the response type and the protocol frame. */
11173 n
= std::min
<LONGEST
> (get_remote_packet_size () - 5, len
);
11174 snprintf (rs
->buf
.data (), get_remote_packet_size () - 4,
11175 "qXfer:%s:read:%s:%s,%s",
11176 object_name
, annex
? annex
: "",
11177 phex_nz (offset
, sizeof offset
),
11178 phex_nz (n
, sizeof n
));
11179 i
= putpkt (rs
->buf
);
11181 return TARGET_XFER_E_IO
;
11184 packet_len
= getpkt_sane (&rs
->buf
, 0);
11185 if (packet_len
< 0 || packet_ok (rs
->buf
, packet
) != PACKET_OK
)
11186 return TARGET_XFER_E_IO
;
11188 if (rs
->buf
[0] != 'l' && rs
->buf
[0] != 'm')
11189 error (_("Unknown remote qXfer reply: %s"), rs
->buf
.data ());
11191 /* 'm' means there is (or at least might be) more data after this
11192 batch. That does not make sense unless there's at least one byte
11193 of data in this reply. */
11194 if (rs
->buf
[0] == 'm' && packet_len
== 1)
11195 error (_("Remote qXfer reply contained no data."));
11197 /* Got some data. */
11198 i
= remote_unescape_input ((gdb_byte
*) rs
->buf
.data () + 1,
11199 packet_len
- 1, readbuf
, n
);
11201 /* 'l' is an EOF marker, possibly including a final block of data,
11202 or possibly empty. If we have the final block of a non-empty
11203 object, record this fact to bypass a subsequent partial read. */
11204 if (rs
->buf
[0] == 'l' && offset
+ i
> 0)
11206 rs
->finished_object
= xstrdup (object_name
);
11207 rs
->finished_annex
= xstrdup (annex
? annex
: "");
11208 rs
->finished_offset
= offset
+ i
;
11212 return TARGET_XFER_EOF
;
11216 return TARGET_XFER_OK
;
11220 enum target_xfer_status
11221 remote_target::xfer_partial (enum target_object object
,
11222 const char *annex
, gdb_byte
*readbuf
,
11223 const gdb_byte
*writebuf
, ULONGEST offset
, ULONGEST len
,
11224 ULONGEST
*xfered_len
)
11226 struct remote_state
*rs
;
11230 int unit_size
= gdbarch_addressable_memory_unit_size (target_gdbarch ());
11232 set_remote_traceframe ();
11233 set_general_thread (inferior_ptid
);
11235 rs
= get_remote_state ();
11237 /* Handle memory using the standard memory routines. */
11238 if (object
== TARGET_OBJECT_MEMORY
)
11240 /* If the remote target is connected but not running, we should
11241 pass this request down to a lower stratum (e.g. the executable
11243 if (!target_has_execution ())
11244 return TARGET_XFER_EOF
;
11246 if (writebuf
!= NULL
)
11247 return remote_write_bytes (offset
, writebuf
, len
, unit_size
,
11250 return remote_read_bytes (offset
, readbuf
, len
, unit_size
,
11254 /* Handle extra signal info using qxfer packets. */
11255 if (object
== TARGET_OBJECT_SIGNAL_INFO
)
11258 return remote_read_qxfer ("siginfo", annex
, readbuf
, offset
, len
,
11259 xfered_len
, &remote_protocol_packets
11260 [PACKET_qXfer_siginfo_read
]);
11262 return remote_write_qxfer ("siginfo", annex
,
11263 writebuf
, offset
, len
, xfered_len
,
11264 &remote_protocol_packets
11265 [PACKET_qXfer_siginfo_write
]);
11268 if (object
== TARGET_OBJECT_STATIC_TRACE_DATA
)
11271 return remote_read_qxfer ("statictrace", annex
,
11272 readbuf
, offset
, len
, xfered_len
,
11273 &remote_protocol_packets
11274 [PACKET_qXfer_statictrace_read
]);
11276 return TARGET_XFER_E_IO
;
11279 /* Only handle flash writes. */
11280 if (writebuf
!= NULL
)
11284 case TARGET_OBJECT_FLASH
:
11285 return remote_flash_write (offset
, len
, xfered_len
,
11289 return TARGET_XFER_E_IO
;
11293 /* Map pre-existing objects onto letters. DO NOT do this for new
11294 objects!!! Instead specify new query packets. */
11297 case TARGET_OBJECT_AVR
:
11301 case TARGET_OBJECT_AUXV
:
11302 gdb_assert (annex
== NULL
);
11303 return remote_read_qxfer ("auxv", annex
, readbuf
, offset
, len
,
11305 &remote_protocol_packets
[PACKET_qXfer_auxv
]);
11307 case TARGET_OBJECT_AVAILABLE_FEATURES
:
11308 return remote_read_qxfer
11309 ("features", annex
, readbuf
, offset
, len
, xfered_len
,
11310 &remote_protocol_packets
[PACKET_qXfer_features
]);
11312 case TARGET_OBJECT_LIBRARIES
:
11313 return remote_read_qxfer
11314 ("libraries", annex
, readbuf
, offset
, len
, xfered_len
,
11315 &remote_protocol_packets
[PACKET_qXfer_libraries
]);
11317 case TARGET_OBJECT_LIBRARIES_SVR4
:
11318 return remote_read_qxfer
11319 ("libraries-svr4", annex
, readbuf
, offset
, len
, xfered_len
,
11320 &remote_protocol_packets
[PACKET_qXfer_libraries_svr4
]);
11322 case TARGET_OBJECT_MEMORY_MAP
:
11323 gdb_assert (annex
== NULL
);
11324 return remote_read_qxfer ("memory-map", annex
, readbuf
, offset
, len
,
11326 &remote_protocol_packets
[PACKET_qXfer_memory_map
]);
11328 case TARGET_OBJECT_OSDATA
:
11329 /* Should only get here if we're connected. */
11330 gdb_assert (rs
->remote_desc
);
11331 return remote_read_qxfer
11332 ("osdata", annex
, readbuf
, offset
, len
, xfered_len
,
11333 &remote_protocol_packets
[PACKET_qXfer_osdata
]);
11335 case TARGET_OBJECT_THREADS
:
11336 gdb_assert (annex
== NULL
);
11337 return remote_read_qxfer ("threads", annex
, readbuf
, offset
, len
,
11339 &remote_protocol_packets
[PACKET_qXfer_threads
]);
11341 case TARGET_OBJECT_TRACEFRAME_INFO
:
11342 gdb_assert (annex
== NULL
);
11343 return remote_read_qxfer
11344 ("traceframe-info", annex
, readbuf
, offset
, len
, xfered_len
,
11345 &remote_protocol_packets
[PACKET_qXfer_traceframe_info
]);
11347 case TARGET_OBJECT_FDPIC
:
11348 return remote_read_qxfer ("fdpic", annex
, readbuf
, offset
, len
,
11350 &remote_protocol_packets
[PACKET_qXfer_fdpic
]);
11352 case TARGET_OBJECT_OPENVMS_UIB
:
11353 return remote_read_qxfer ("uib", annex
, readbuf
, offset
, len
,
11355 &remote_protocol_packets
[PACKET_qXfer_uib
]);
11357 case TARGET_OBJECT_BTRACE
:
11358 return remote_read_qxfer ("btrace", annex
, readbuf
, offset
, len
,
11360 &remote_protocol_packets
[PACKET_qXfer_btrace
]);
11362 case TARGET_OBJECT_BTRACE_CONF
:
11363 return remote_read_qxfer ("btrace-conf", annex
, readbuf
, offset
,
11365 &remote_protocol_packets
[PACKET_qXfer_btrace_conf
]);
11367 case TARGET_OBJECT_EXEC_FILE
:
11368 return remote_read_qxfer ("exec-file", annex
, readbuf
, offset
,
11370 &remote_protocol_packets
[PACKET_qXfer_exec_file
]);
11373 return TARGET_XFER_E_IO
;
11376 /* Minimum outbuf size is get_remote_packet_size (). If LEN is not
11377 large enough let the caller deal with it. */
11378 if (len
< get_remote_packet_size ())
11379 return TARGET_XFER_E_IO
;
11380 len
= get_remote_packet_size ();
11382 /* Except for querying the minimum buffer size, target must be open. */
11383 if (!rs
->remote_desc
)
11384 error (_("remote query is only available after target open"));
11386 gdb_assert (annex
!= NULL
);
11387 gdb_assert (readbuf
!= NULL
);
11389 p2
= rs
->buf
.data ();
11391 *p2
++ = query_type
;
11393 /* We used one buffer char for the remote protocol q command and
11394 another for the query type. As the remote protocol encapsulation
11395 uses 4 chars plus one extra in case we are debugging
11396 (remote_debug), we have PBUFZIZ - 7 left to pack the query
11399 while (annex
[i
] && (i
< (get_remote_packet_size () - 8)))
11401 /* Bad caller may have sent forbidden characters. */
11402 gdb_assert (isprint (annex
[i
]) && annex
[i
] != '$' && annex
[i
] != '#');
11407 gdb_assert (annex
[i
] == '\0');
11409 i
= putpkt (rs
->buf
);
11411 return TARGET_XFER_E_IO
;
11413 getpkt (&rs
->buf
, 0);
11414 strcpy ((char *) readbuf
, rs
->buf
.data ());
11416 *xfered_len
= strlen ((char *) readbuf
);
11417 return (*xfered_len
!= 0) ? TARGET_XFER_OK
: TARGET_XFER_EOF
;
11420 /* Implementation of to_get_memory_xfer_limit. */
11423 remote_target::get_memory_xfer_limit ()
11425 return get_memory_write_packet_size ();
11429 remote_target::search_memory (CORE_ADDR start_addr
, ULONGEST search_space_len
,
11430 const gdb_byte
*pattern
, ULONGEST pattern_len
,
11431 CORE_ADDR
*found_addrp
)
11433 int addr_size
= gdbarch_addr_bit (target_gdbarch ()) / 8;
11434 struct remote_state
*rs
= get_remote_state ();
11435 int max_size
= get_memory_write_packet_size ();
11436 struct packet_config
*packet
=
11437 &remote_protocol_packets
[PACKET_qSearch_memory
];
11438 /* Number of packet bytes used to encode the pattern;
11439 this could be more than PATTERN_LEN due to escape characters. */
11440 int escaped_pattern_len
;
11441 /* Amount of pattern that was encodable in the packet. */
11442 int used_pattern_len
;
11445 ULONGEST found_addr
;
11447 auto read_memory
= [=] (CORE_ADDR addr
, gdb_byte
*result
, size_t len
)
11449 return (target_read (this, TARGET_OBJECT_MEMORY
, NULL
, result
, addr
, len
)
11453 /* Don't go to the target if we don't have to. This is done before
11454 checking packet_config_support to avoid the possibility that a
11455 success for this edge case means the facility works in
11457 if (pattern_len
> search_space_len
)
11459 if (pattern_len
== 0)
11461 *found_addrp
= start_addr
;
11465 /* If we already know the packet isn't supported, fall back to the simple
11466 way of searching memory. */
11468 if (packet_config_support (packet
) == PACKET_DISABLE
)
11470 /* Target doesn't provided special support, fall back and use the
11471 standard support (copy memory and do the search here). */
11472 return simple_search_memory (read_memory
, start_addr
, search_space_len
,
11473 pattern
, pattern_len
, found_addrp
);
11476 /* Make sure the remote is pointing at the right process. */
11477 set_general_process ();
11479 /* Insert header. */
11480 i
= snprintf (rs
->buf
.data (), max_size
,
11481 "qSearch:memory:%s;%s;",
11482 phex_nz (start_addr
, addr_size
),
11483 phex_nz (search_space_len
, sizeof (search_space_len
)));
11484 max_size
-= (i
+ 1);
11486 /* Escape as much data as fits into rs->buf. */
11487 escaped_pattern_len
=
11488 remote_escape_output (pattern
, pattern_len
, 1,
11489 (gdb_byte
*) rs
->buf
.data () + i
,
11490 &used_pattern_len
, max_size
);
11492 /* Bail if the pattern is too large. */
11493 if (used_pattern_len
!= pattern_len
)
11494 error (_("Pattern is too large to transmit to remote target."));
11496 if (putpkt_binary (rs
->buf
.data (), i
+ escaped_pattern_len
) < 0
11497 || getpkt_sane (&rs
->buf
, 0) < 0
11498 || packet_ok (rs
->buf
, packet
) != PACKET_OK
)
11500 /* The request may not have worked because the command is not
11501 supported. If so, fall back to the simple way. */
11502 if (packet_config_support (packet
) == PACKET_DISABLE
)
11504 return simple_search_memory (read_memory
, start_addr
, search_space_len
,
11505 pattern
, pattern_len
, found_addrp
);
11510 if (rs
->buf
[0] == '0')
11512 else if (rs
->buf
[0] == '1')
11515 if (rs
->buf
[1] != ',')
11516 error (_("Unknown qSearch:memory reply: %s"), rs
->buf
.data ());
11517 unpack_varlen_hex (&rs
->buf
[2], &found_addr
);
11518 *found_addrp
= found_addr
;
11521 error (_("Unknown qSearch:memory reply: %s"), rs
->buf
.data ());
11527 remote_target::rcmd (const char *command
, struct ui_file
*outbuf
)
11529 struct remote_state
*rs
= get_remote_state ();
11530 char *p
= rs
->buf
.data ();
11532 if (!rs
->remote_desc
)
11533 error (_("remote rcmd is only available after target open"));
11535 /* Send a NULL command across as an empty command. */
11536 if (command
== NULL
)
11539 /* The query prefix. */
11540 strcpy (rs
->buf
.data (), "qRcmd,");
11541 p
= strchr (rs
->buf
.data (), '\0');
11543 if ((strlen (rs
->buf
.data ()) + strlen (command
) * 2 + 8/*misc*/)
11544 > get_remote_packet_size ())
11545 error (_("\"monitor\" command ``%s'' is too long."), command
);
11547 /* Encode the actual command. */
11548 bin2hex ((const gdb_byte
*) command
, p
, strlen (command
));
11550 if (putpkt (rs
->buf
) < 0)
11551 error (_("Communication problem with target."));
11553 /* get/display the response */
11558 /* XXX - see also remote_get_noisy_reply(). */
11559 QUIT
; /* Allow user to bail out with ^C. */
11561 if (getpkt_sane (&rs
->buf
, 0) == -1)
11563 /* Timeout. Continue to (try to) read responses.
11564 This is better than stopping with an error, assuming the stub
11565 is still executing the (long) monitor command.
11566 If needed, the user can interrupt gdb using C-c, obtaining
11567 an effect similar to stop on timeout. */
11570 buf
= rs
->buf
.data ();
11571 if (buf
[0] == '\0')
11572 error (_("Target does not support this command."));
11573 if (buf
[0] == 'O' && buf
[1] != 'K')
11575 remote_console_output (buf
+ 1); /* 'O' message from stub. */
11578 if (strcmp (buf
, "OK") == 0)
11580 if (strlen (buf
) == 3 && buf
[0] == 'E'
11581 && isdigit (buf
[1]) && isdigit (buf
[2]))
11583 error (_("Protocol error with Rcmd"));
11585 for (p
= buf
; p
[0] != '\0' && p
[1] != '\0'; p
+= 2)
11587 char c
= (fromhex (p
[0]) << 4) + fromhex (p
[1]);
11589 fputc_unfiltered (c
, outbuf
);
11595 std::vector
<mem_region
>
11596 remote_target::memory_map ()
11598 std::vector
<mem_region
> result
;
11599 gdb::optional
<gdb::char_vector
> text
11600 = target_read_stralloc (current_inferior ()->top_target (),
11601 TARGET_OBJECT_MEMORY_MAP
, NULL
);
11604 result
= parse_memory_map (text
->data ());
11610 packet_command (const char *args
, int from_tty
)
11612 remote_target
*remote
= get_current_remote_target ();
11614 if (remote
== nullptr)
11615 error (_("command can only be used with remote target"));
11617 remote
->packet_command (args
, from_tty
);
11621 remote_target::packet_command (const char *args
, int from_tty
)
11624 error (_("remote-packet command requires packet text as argument"));
11626 puts_filtered ("sending: ");
11627 print_packet (args
);
11628 puts_filtered ("\n");
11631 remote_state
*rs
= get_remote_state ();
11633 getpkt (&rs
->buf
, 0);
11634 puts_filtered ("received: ");
11635 print_packet (rs
->buf
.data ());
11636 puts_filtered ("\n");
11640 /* --------- UNIT_TEST for THREAD oriented PACKETS ------------------- */
11642 static void display_thread_info (struct gdb_ext_thread_info
*info
);
11644 static void threadset_test_cmd (char *cmd
, int tty
);
11646 static void threadalive_test (char *cmd
, int tty
);
11648 static void threadlist_test_cmd (char *cmd
, int tty
);
11650 int get_and_display_threadinfo (threadref
*ref
);
11652 static void threadinfo_test_cmd (char *cmd
, int tty
);
11654 static int thread_display_step (threadref
*ref
, void *context
);
11656 static void threadlist_update_test_cmd (char *cmd
, int tty
);
11658 static void init_remote_threadtests (void);
11660 #define SAMPLE_THREAD 0x05060708 /* Truncated 64 bit threadid. */
11663 threadset_test_cmd (const char *cmd
, int tty
)
11665 int sample_thread
= SAMPLE_THREAD
;
11667 printf_filtered (_("Remote threadset test\n"));
11668 set_general_thread (sample_thread
);
11673 threadalive_test (const char *cmd
, int tty
)
11675 int sample_thread
= SAMPLE_THREAD
;
11676 int pid
= inferior_ptid
.pid ();
11677 ptid_t ptid
= ptid_t (pid
, sample_thread
, 0);
11679 if (remote_thread_alive (ptid
))
11680 printf_filtered ("PASS: Thread alive test\n");
11682 printf_filtered ("FAIL: Thread alive test\n");
11685 void output_threadid (char *title
, threadref
*ref
);
11688 output_threadid (char *title
, threadref
*ref
)
11692 pack_threadid (&hexid
[0], ref
); /* Convert thread id into hex. */
11694 printf_filtered ("%s %s\n", title
, (&hexid
[0]));
11698 threadlist_test_cmd (const char *cmd
, int tty
)
11701 threadref nextthread
;
11702 int done
, result_count
;
11703 threadref threadlist
[3];
11705 printf_filtered ("Remote Threadlist test\n");
11706 if (!remote_get_threadlist (startflag
, &nextthread
, 3, &done
,
11707 &result_count
, &threadlist
[0]))
11708 printf_filtered ("FAIL: threadlist test\n");
11711 threadref
*scan
= threadlist
;
11712 threadref
*limit
= scan
+ result_count
;
11714 while (scan
< limit
)
11715 output_threadid (" thread ", scan
++);
11720 display_thread_info (struct gdb_ext_thread_info
*info
)
11722 output_threadid ("Threadid: ", &info
->threadid
);
11723 printf_filtered ("Name: %s\n ", info
->shortname
);
11724 printf_filtered ("State: %s\n", info
->display
);
11725 printf_filtered ("other: %s\n\n", info
->more_display
);
11729 get_and_display_threadinfo (threadref
*ref
)
11733 struct gdb_ext_thread_info threadinfo
;
11735 set
= TAG_THREADID
| TAG_EXISTS
| TAG_THREADNAME
11736 | TAG_MOREDISPLAY
| TAG_DISPLAY
;
11737 if (0 != (result
= remote_get_threadinfo (ref
, set
, &threadinfo
)))
11738 display_thread_info (&threadinfo
);
11743 threadinfo_test_cmd (const char *cmd
, int tty
)
11745 int athread
= SAMPLE_THREAD
;
11749 int_to_threadref (&thread
, athread
);
11750 printf_filtered ("Remote Threadinfo test\n");
11751 if (!get_and_display_threadinfo (&thread
))
11752 printf_filtered ("FAIL cannot get thread info\n");
11756 thread_display_step (threadref
*ref
, void *context
)
11758 /* output_threadid(" threadstep ",ref); *//* simple test */
11759 return get_and_display_threadinfo (ref
);
11763 threadlist_update_test_cmd (const char *cmd
, int tty
)
11765 printf_filtered ("Remote Threadlist update test\n");
11766 remote_threadlist_iterator (thread_display_step
, 0, CRAZY_MAX_THREADS
);
11770 init_remote_threadtests (void)
11772 add_com ("tlist", class_obscure
, threadlist_test_cmd
,
11773 _("Fetch and print the remote list of "
11774 "thread identifiers, one pkt only."));
11775 add_com ("tinfo", class_obscure
, threadinfo_test_cmd
,
11776 _("Fetch and display info about one thread."));
11777 add_com ("tset", class_obscure
, threadset_test_cmd
,
11778 _("Test setting to a different thread."));
11779 add_com ("tupd", class_obscure
, threadlist_update_test_cmd
,
11780 _("Iterate through updating all remote thread info."));
11781 add_com ("talive", class_obscure
, threadalive_test
,
11782 _("Remote thread alive test."));
11787 /* Convert a thread ID to a string. */
11790 remote_target::pid_to_str (ptid_t ptid
)
11792 struct remote_state
*rs
= get_remote_state ();
11794 if (ptid
== null_ptid
)
11795 return normal_pid_to_str (ptid
);
11796 else if (ptid
.is_pid ())
11798 /* Printing an inferior target id. */
11800 /* When multi-process extensions are off, there's no way in the
11801 remote protocol to know the remote process id, if there's any
11802 at all. There's one exception --- when we're connected with
11803 target extended-remote, and we manually attached to a process
11804 with "attach PID". We don't record anywhere a flag that
11805 allows us to distinguish that case from the case of
11806 connecting with extended-remote and the stub already being
11807 attached to a process, and reporting yes to qAttached, hence
11808 no smart special casing here. */
11809 if (!remote_multi_process_p (rs
))
11810 return "Remote target";
11812 return normal_pid_to_str (ptid
);
11816 if (magic_null_ptid
== ptid
)
11817 return "Thread <main>";
11818 else if (remote_multi_process_p (rs
))
11819 if (ptid
.lwp () == 0)
11820 return normal_pid_to_str (ptid
);
11822 return string_printf ("Thread %d.%ld",
11823 ptid
.pid (), ptid
.lwp ());
11825 return string_printf ("Thread %ld", ptid
.lwp ());
11829 /* Get the address of the thread local variable in OBJFILE which is
11830 stored at OFFSET within the thread local storage for thread PTID. */
11833 remote_target::get_thread_local_address (ptid_t ptid
, CORE_ADDR lm
,
11836 if (packet_support (PACKET_qGetTLSAddr
) != PACKET_DISABLE
)
11838 struct remote_state
*rs
= get_remote_state ();
11839 char *p
= rs
->buf
.data ();
11840 char *endp
= p
+ get_remote_packet_size ();
11841 enum packet_result result
;
11843 strcpy (p
, "qGetTLSAddr:");
11845 p
= write_ptid (p
, endp
, ptid
);
11847 p
+= hexnumstr (p
, offset
);
11849 p
+= hexnumstr (p
, lm
);
11853 getpkt (&rs
->buf
, 0);
11854 result
= packet_ok (rs
->buf
,
11855 &remote_protocol_packets
[PACKET_qGetTLSAddr
]);
11856 if (result
== PACKET_OK
)
11860 unpack_varlen_hex (rs
->buf
.data (), &addr
);
11863 else if (result
== PACKET_UNKNOWN
)
11864 throw_error (TLS_GENERIC_ERROR
,
11865 _("Remote target doesn't support qGetTLSAddr packet"));
11867 throw_error (TLS_GENERIC_ERROR
,
11868 _("Remote target failed to process qGetTLSAddr request"));
11871 throw_error (TLS_GENERIC_ERROR
,
11872 _("TLS not supported or disabled on this target"));
11877 /* Provide thread local base, i.e. Thread Information Block address.
11878 Returns 1 if ptid is found and thread_local_base is non zero. */
11881 remote_target::get_tib_address (ptid_t ptid
, CORE_ADDR
*addr
)
11883 if (packet_support (PACKET_qGetTIBAddr
) != PACKET_DISABLE
)
11885 struct remote_state
*rs
= get_remote_state ();
11886 char *p
= rs
->buf
.data ();
11887 char *endp
= p
+ get_remote_packet_size ();
11888 enum packet_result result
;
11890 strcpy (p
, "qGetTIBAddr:");
11892 p
= write_ptid (p
, endp
, ptid
);
11896 getpkt (&rs
->buf
, 0);
11897 result
= packet_ok (rs
->buf
,
11898 &remote_protocol_packets
[PACKET_qGetTIBAddr
]);
11899 if (result
== PACKET_OK
)
11902 unpack_varlen_hex (rs
->buf
.data (), &val
);
11904 *addr
= (CORE_ADDR
) val
;
11907 else if (result
== PACKET_UNKNOWN
)
11908 error (_("Remote target doesn't support qGetTIBAddr packet"));
11910 error (_("Remote target failed to process qGetTIBAddr request"));
11913 error (_("qGetTIBAddr not supported or disabled on this target"));
11918 /* Support for inferring a target description based on the current
11919 architecture and the size of a 'g' packet. While the 'g' packet
11920 can have any size (since optional registers can be left off the
11921 end), some sizes are easily recognizable given knowledge of the
11922 approximate architecture. */
11924 struct remote_g_packet_guess
11926 remote_g_packet_guess (int bytes_
, const struct target_desc
*tdesc_
)
11933 const struct target_desc
*tdesc
;
11936 struct remote_g_packet_data
: public allocate_on_obstack
11938 std::vector
<remote_g_packet_guess
> guesses
;
11941 static struct gdbarch_data
*remote_g_packet_data_handle
;
11944 remote_g_packet_data_init (struct obstack
*obstack
)
11946 return new (obstack
) remote_g_packet_data
;
11950 register_remote_g_packet_guess (struct gdbarch
*gdbarch
, int bytes
,
11951 const struct target_desc
*tdesc
)
11953 struct remote_g_packet_data
*data
11954 = ((struct remote_g_packet_data
*)
11955 gdbarch_data (gdbarch
, remote_g_packet_data_handle
));
11957 gdb_assert (tdesc
!= NULL
);
11959 for (const remote_g_packet_guess
&guess
: data
->guesses
)
11960 if (guess
.bytes
== bytes
)
11961 internal_error (__FILE__
, __LINE__
,
11962 _("Duplicate g packet description added for size %d"),
11965 data
->guesses
.emplace_back (bytes
, tdesc
);
11968 /* Return true if remote_read_description would do anything on this target
11969 and architecture, false otherwise. */
11972 remote_read_description_p (struct target_ops
*target
)
11974 struct remote_g_packet_data
*data
11975 = ((struct remote_g_packet_data
*)
11976 gdbarch_data (target_gdbarch (), remote_g_packet_data_handle
));
11978 return !data
->guesses
.empty ();
11981 const struct target_desc
*
11982 remote_target::read_description ()
11984 struct remote_g_packet_data
*data
11985 = ((struct remote_g_packet_data
*)
11986 gdbarch_data (target_gdbarch (), remote_g_packet_data_handle
));
11988 /* Do not try this during initial connection, when we do not know
11989 whether there is a running but stopped thread. */
11990 if (!target_has_execution () || inferior_ptid
== null_ptid
)
11991 return beneath ()->read_description ();
11993 if (!data
->guesses
.empty ())
11995 int bytes
= send_g_packet ();
11997 for (const remote_g_packet_guess
&guess
: data
->guesses
)
11998 if (guess
.bytes
== bytes
)
11999 return guess
.tdesc
;
12001 /* We discard the g packet. A minor optimization would be to
12002 hold on to it, and fill the register cache once we have selected
12003 an architecture, but it's too tricky to do safely. */
12006 return beneath ()->read_description ();
12009 /* Remote file transfer support. This is host-initiated I/O, not
12010 target-initiated; for target-initiated, see remote-fileio.c. */
12012 /* If *LEFT is at least the length of STRING, copy STRING to
12013 *BUFFER, update *BUFFER to point to the new end of the buffer, and
12014 decrease *LEFT. Otherwise raise an error. */
12017 remote_buffer_add_string (char **buffer
, int *left
, const char *string
)
12019 int len
= strlen (string
);
12022 error (_("Packet too long for target."));
12024 memcpy (*buffer
, string
, len
);
12028 /* NUL-terminate the buffer as a convenience, if there is
12034 /* If *LEFT is large enough, hex encode LEN bytes from BYTES into
12035 *BUFFER, update *BUFFER to point to the new end of the buffer, and
12036 decrease *LEFT. Otherwise raise an error. */
12039 remote_buffer_add_bytes (char **buffer
, int *left
, const gdb_byte
*bytes
,
12042 if (2 * len
> *left
)
12043 error (_("Packet too long for target."));
12045 bin2hex (bytes
, *buffer
, len
);
12046 *buffer
+= 2 * len
;
12049 /* NUL-terminate the buffer as a convenience, if there is
12055 /* If *LEFT is large enough, convert VALUE to hex and add it to
12056 *BUFFER, update *BUFFER to point to the new end of the buffer, and
12057 decrease *LEFT. Otherwise raise an error. */
12060 remote_buffer_add_int (char **buffer
, int *left
, ULONGEST value
)
12062 int len
= hexnumlen (value
);
12065 error (_("Packet too long for target."));
12067 hexnumstr (*buffer
, value
);
12071 /* NUL-terminate the buffer as a convenience, if there is
12077 /* Parse an I/O result packet from BUFFER. Set RETCODE to the return
12078 value, *REMOTE_ERRNO to the remote error number or zero if none
12079 was included, and *ATTACHMENT to point to the start of the annex
12080 if any. The length of the packet isn't needed here; there may
12081 be NUL bytes in BUFFER, but they will be after *ATTACHMENT.
12083 Return 0 if the packet could be parsed, -1 if it could not. If
12084 -1 is returned, the other variables may not be initialized. */
12087 remote_hostio_parse_result (const char *buffer
, int *retcode
,
12088 int *remote_errno
, const char **attachment
)
12093 *attachment
= NULL
;
12095 if (buffer
[0] != 'F')
12099 *retcode
= strtol (&buffer
[1], &p
, 16);
12100 if (errno
!= 0 || p
== &buffer
[1])
12103 /* Check for ",errno". */
12107 *remote_errno
= strtol (p
+ 1, &p2
, 16);
12108 if (errno
!= 0 || p
+ 1 == p2
)
12113 /* Check for ";attachment". If there is no attachment, the
12114 packet should end here. */
12117 *attachment
= p
+ 1;
12120 else if (*p
== '\0')
12126 /* Send a prepared I/O packet to the target and read its response.
12127 The prepared packet is in the global RS->BUF before this function
12128 is called, and the answer is there when we return.
12130 COMMAND_BYTES is the length of the request to send, which may include
12131 binary data. WHICH_PACKET is the packet configuration to check
12132 before attempting a packet. If an error occurs, *REMOTE_ERRNO
12133 is set to the error number and -1 is returned. Otherwise the value
12134 returned by the function is returned.
12136 ATTACHMENT and ATTACHMENT_LEN should be non-NULL if and only if an
12137 attachment is expected; an error will be reported if there's a
12138 mismatch. If one is found, *ATTACHMENT will be set to point into
12139 the packet buffer and *ATTACHMENT_LEN will be set to the
12140 attachment's length. */
12143 remote_target::remote_hostio_send_command (int command_bytes
, int which_packet
,
12144 int *remote_errno
, const char **attachment
,
12145 int *attachment_len
)
12147 struct remote_state
*rs
= get_remote_state ();
12148 int ret
, bytes_read
;
12149 const char *attachment_tmp
;
12151 if (packet_support (which_packet
) == PACKET_DISABLE
)
12153 *remote_errno
= FILEIO_ENOSYS
;
12157 putpkt_binary (rs
->buf
.data (), command_bytes
);
12158 bytes_read
= getpkt_sane (&rs
->buf
, 0);
12160 /* If it timed out, something is wrong. Don't try to parse the
12162 if (bytes_read
< 0)
12164 *remote_errno
= FILEIO_EINVAL
;
12168 switch (packet_ok (rs
->buf
, &remote_protocol_packets
[which_packet
]))
12171 *remote_errno
= FILEIO_EINVAL
;
12173 case PACKET_UNKNOWN
:
12174 *remote_errno
= FILEIO_ENOSYS
;
12180 if (remote_hostio_parse_result (rs
->buf
.data (), &ret
, remote_errno
,
12183 *remote_errno
= FILEIO_EINVAL
;
12187 /* Make sure we saw an attachment if and only if we expected one. */
12188 if ((attachment_tmp
== NULL
&& attachment
!= NULL
)
12189 || (attachment_tmp
!= NULL
&& attachment
== NULL
))
12191 *remote_errno
= FILEIO_EINVAL
;
12195 /* If an attachment was found, it must point into the packet buffer;
12196 work out how many bytes there were. */
12197 if (attachment_tmp
!= NULL
)
12199 *attachment
= attachment_tmp
;
12200 *attachment_len
= bytes_read
- (*attachment
- rs
->buf
.data ());
12206 /* See declaration.h. */
12209 readahead_cache::invalidate ()
12214 /* See declaration.h. */
12217 readahead_cache::invalidate_fd (int fd
)
12219 if (this->fd
== fd
)
12223 /* Set the filesystem remote_hostio functions that take FILENAME
12224 arguments will use. Return 0 on success, or -1 if an error
12225 occurs (and set *REMOTE_ERRNO). */
12228 remote_target::remote_hostio_set_filesystem (struct inferior
*inf
,
12231 struct remote_state
*rs
= get_remote_state ();
12232 int required_pid
= (inf
== NULL
|| inf
->fake_pid_p
) ? 0 : inf
->pid
;
12233 char *p
= rs
->buf
.data ();
12234 int left
= get_remote_packet_size () - 1;
12238 if (packet_support (PACKET_vFile_setfs
) == PACKET_DISABLE
)
12241 if (rs
->fs_pid
!= -1 && required_pid
== rs
->fs_pid
)
12244 remote_buffer_add_string (&p
, &left
, "vFile:setfs:");
12246 xsnprintf (arg
, sizeof (arg
), "%x", required_pid
);
12247 remote_buffer_add_string (&p
, &left
, arg
);
12249 ret
= remote_hostio_send_command (p
- rs
->buf
.data (), PACKET_vFile_setfs
,
12250 remote_errno
, NULL
, NULL
);
12252 if (packet_support (PACKET_vFile_setfs
) == PACKET_DISABLE
)
12256 rs
->fs_pid
= required_pid
;
12261 /* Implementation of to_fileio_open. */
12264 remote_target::remote_hostio_open (inferior
*inf
, const char *filename
,
12265 int flags
, int mode
, int warn_if_slow
,
12268 struct remote_state
*rs
= get_remote_state ();
12269 char *p
= rs
->buf
.data ();
12270 int left
= get_remote_packet_size () - 1;
12274 static int warning_issued
= 0;
12276 printf_unfiltered (_("Reading %s from remote target...\n"),
12279 if (!warning_issued
)
12281 warning (_("File transfers from remote targets can be slow."
12282 " Use \"set sysroot\" to access files locally"
12284 warning_issued
= 1;
12288 if (remote_hostio_set_filesystem (inf
, remote_errno
) != 0)
12291 remote_buffer_add_string (&p
, &left
, "vFile:open:");
12293 remote_buffer_add_bytes (&p
, &left
, (const gdb_byte
*) filename
,
12294 strlen (filename
));
12295 remote_buffer_add_string (&p
, &left
, ",");
12297 remote_buffer_add_int (&p
, &left
, flags
);
12298 remote_buffer_add_string (&p
, &left
, ",");
12300 remote_buffer_add_int (&p
, &left
, mode
);
12302 return remote_hostio_send_command (p
- rs
->buf
.data (), PACKET_vFile_open
,
12303 remote_errno
, NULL
, NULL
);
12307 remote_target::fileio_open (struct inferior
*inf
, const char *filename
,
12308 int flags
, int mode
, int warn_if_slow
,
12311 return remote_hostio_open (inf
, filename
, flags
, mode
, warn_if_slow
,
12315 /* Implementation of to_fileio_pwrite. */
12318 remote_target::remote_hostio_pwrite (int fd
, const gdb_byte
*write_buf
, int len
,
12319 ULONGEST offset
, int *remote_errno
)
12321 struct remote_state
*rs
= get_remote_state ();
12322 char *p
= rs
->buf
.data ();
12323 int left
= get_remote_packet_size ();
12326 rs
->readahead_cache
.invalidate_fd (fd
);
12328 remote_buffer_add_string (&p
, &left
, "vFile:pwrite:");
12330 remote_buffer_add_int (&p
, &left
, fd
);
12331 remote_buffer_add_string (&p
, &left
, ",");
12333 remote_buffer_add_int (&p
, &left
, offset
);
12334 remote_buffer_add_string (&p
, &left
, ",");
12336 p
+= remote_escape_output (write_buf
, len
, 1, (gdb_byte
*) p
, &out_len
,
12337 (get_remote_packet_size ()
12338 - (p
- rs
->buf
.data ())));
12340 return remote_hostio_send_command (p
- rs
->buf
.data (), PACKET_vFile_pwrite
,
12341 remote_errno
, NULL
, NULL
);
12345 remote_target::fileio_pwrite (int fd
, const gdb_byte
*write_buf
, int len
,
12346 ULONGEST offset
, int *remote_errno
)
12348 return remote_hostio_pwrite (fd
, write_buf
, len
, offset
, remote_errno
);
12351 /* Helper for the implementation of to_fileio_pread. Read the file
12352 from the remote side with vFile:pread. */
12355 remote_target::remote_hostio_pread_vFile (int fd
, gdb_byte
*read_buf
, int len
,
12356 ULONGEST offset
, int *remote_errno
)
12358 struct remote_state
*rs
= get_remote_state ();
12359 char *p
= rs
->buf
.data ();
12360 const char *attachment
;
12361 int left
= get_remote_packet_size ();
12362 int ret
, attachment_len
;
12365 remote_buffer_add_string (&p
, &left
, "vFile:pread:");
12367 remote_buffer_add_int (&p
, &left
, fd
);
12368 remote_buffer_add_string (&p
, &left
, ",");
12370 remote_buffer_add_int (&p
, &left
, len
);
12371 remote_buffer_add_string (&p
, &left
, ",");
12373 remote_buffer_add_int (&p
, &left
, offset
);
12375 ret
= remote_hostio_send_command (p
- rs
->buf
.data (), PACKET_vFile_pread
,
12376 remote_errno
, &attachment
,
12382 read_len
= remote_unescape_input ((gdb_byte
*) attachment
, attachment_len
,
12384 if (read_len
!= ret
)
12385 error (_("Read returned %d, but %d bytes."), ret
, (int) read_len
);
12390 /* See declaration.h. */
12393 readahead_cache::pread (int fd
, gdb_byte
*read_buf
, size_t len
,
12397 && this->offset
<= offset
12398 && offset
< this->offset
+ this->bufsize
)
12400 ULONGEST max
= this->offset
+ this->bufsize
;
12402 if (offset
+ len
> max
)
12403 len
= max
- offset
;
12405 memcpy (read_buf
, this->buf
+ offset
- this->offset
, len
);
12412 /* Implementation of to_fileio_pread. */
12415 remote_target::remote_hostio_pread (int fd
, gdb_byte
*read_buf
, int len
,
12416 ULONGEST offset
, int *remote_errno
)
12419 struct remote_state
*rs
= get_remote_state ();
12420 readahead_cache
*cache
= &rs
->readahead_cache
;
12422 ret
= cache
->pread (fd
, read_buf
, len
, offset
);
12425 cache
->hit_count
++;
12427 remote_debug_printf ("readahead cache hit %s",
12428 pulongest (cache
->hit_count
));
12432 cache
->miss_count
++;
12434 remote_debug_printf ("readahead cache miss %s",
12435 pulongest (cache
->miss_count
));
12438 cache
->offset
= offset
;
12439 cache
->bufsize
= get_remote_packet_size ();
12440 cache
->buf
= (gdb_byte
*) xrealloc (cache
->buf
, cache
->bufsize
);
12442 ret
= remote_hostio_pread_vFile (cache
->fd
, cache
->buf
, cache
->bufsize
,
12443 cache
->offset
, remote_errno
);
12446 cache
->invalidate_fd (fd
);
12450 cache
->bufsize
= ret
;
12451 return cache
->pread (fd
, read_buf
, len
, offset
);
12455 remote_target::fileio_pread (int fd
, gdb_byte
*read_buf
, int len
,
12456 ULONGEST offset
, int *remote_errno
)
12458 return remote_hostio_pread (fd
, read_buf
, len
, offset
, remote_errno
);
12461 /* Implementation of to_fileio_close. */
12464 remote_target::remote_hostio_close (int fd
, int *remote_errno
)
12466 struct remote_state
*rs
= get_remote_state ();
12467 char *p
= rs
->buf
.data ();
12468 int left
= get_remote_packet_size () - 1;
12470 rs
->readahead_cache
.invalidate_fd (fd
);
12472 remote_buffer_add_string (&p
, &left
, "vFile:close:");
12474 remote_buffer_add_int (&p
, &left
, fd
);
12476 return remote_hostio_send_command (p
- rs
->buf
.data (), PACKET_vFile_close
,
12477 remote_errno
, NULL
, NULL
);
12481 remote_target::fileio_close (int fd
, int *remote_errno
)
12483 return remote_hostio_close (fd
, remote_errno
);
12486 /* Implementation of to_fileio_unlink. */
12489 remote_target::remote_hostio_unlink (inferior
*inf
, const char *filename
,
12492 struct remote_state
*rs
= get_remote_state ();
12493 char *p
= rs
->buf
.data ();
12494 int left
= get_remote_packet_size () - 1;
12496 if (remote_hostio_set_filesystem (inf
, remote_errno
) != 0)
12499 remote_buffer_add_string (&p
, &left
, "vFile:unlink:");
12501 remote_buffer_add_bytes (&p
, &left
, (const gdb_byte
*) filename
,
12502 strlen (filename
));
12504 return remote_hostio_send_command (p
- rs
->buf
.data (), PACKET_vFile_unlink
,
12505 remote_errno
, NULL
, NULL
);
12509 remote_target::fileio_unlink (struct inferior
*inf
, const char *filename
,
12512 return remote_hostio_unlink (inf
, filename
, remote_errno
);
12515 /* Implementation of to_fileio_readlink. */
12517 gdb::optional
<std::string
>
12518 remote_target::fileio_readlink (struct inferior
*inf
, const char *filename
,
12521 struct remote_state
*rs
= get_remote_state ();
12522 char *p
= rs
->buf
.data ();
12523 const char *attachment
;
12524 int left
= get_remote_packet_size ();
12525 int len
, attachment_len
;
12528 if (remote_hostio_set_filesystem (inf
, remote_errno
) != 0)
12531 remote_buffer_add_string (&p
, &left
, "vFile:readlink:");
12533 remote_buffer_add_bytes (&p
, &left
, (const gdb_byte
*) filename
,
12534 strlen (filename
));
12536 len
= remote_hostio_send_command (p
- rs
->buf
.data (), PACKET_vFile_readlink
,
12537 remote_errno
, &attachment
,
12543 std::string
ret (len
, '\0');
12545 read_len
= remote_unescape_input ((gdb_byte
*) attachment
, attachment_len
,
12546 (gdb_byte
*) &ret
[0], len
);
12547 if (read_len
!= len
)
12548 error (_("Readlink returned %d, but %d bytes."), len
, read_len
);
12553 /* Implementation of to_fileio_fstat. */
12556 remote_target::fileio_fstat (int fd
, struct stat
*st
, int *remote_errno
)
12558 struct remote_state
*rs
= get_remote_state ();
12559 char *p
= rs
->buf
.data ();
12560 int left
= get_remote_packet_size ();
12561 int attachment_len
, ret
;
12562 const char *attachment
;
12563 struct fio_stat fst
;
12566 remote_buffer_add_string (&p
, &left
, "vFile:fstat:");
12568 remote_buffer_add_int (&p
, &left
, fd
);
12570 ret
= remote_hostio_send_command (p
- rs
->buf
.data (), PACKET_vFile_fstat
,
12571 remote_errno
, &attachment
,
12575 if (*remote_errno
!= FILEIO_ENOSYS
)
12578 /* Strictly we should return -1, ENOSYS here, but when
12579 "set sysroot remote:" was implemented in August 2008
12580 BFD's need for a stat function was sidestepped with
12581 this hack. This was not remedied until March 2015
12582 so we retain the previous behavior to avoid breaking
12585 Note that the memset is a March 2015 addition; older
12586 GDBs set st_size *and nothing else* so the structure
12587 would have garbage in all other fields. This might
12588 break something but retaining the previous behavior
12589 here would be just too wrong. */
12591 memset (st
, 0, sizeof (struct stat
));
12592 st
->st_size
= INT_MAX
;
12596 read_len
= remote_unescape_input ((gdb_byte
*) attachment
, attachment_len
,
12597 (gdb_byte
*) &fst
, sizeof (fst
));
12599 if (read_len
!= ret
)
12600 error (_("vFile:fstat returned %d, but %d bytes."), ret
, read_len
);
12602 if (read_len
!= sizeof (fst
))
12603 error (_("vFile:fstat returned %d bytes, but expecting %d."),
12604 read_len
, (int) sizeof (fst
));
12606 remote_fileio_to_host_stat (&fst
, st
);
12611 /* Implementation of to_filesystem_is_local. */
12614 remote_target::filesystem_is_local ()
12616 /* Valgrind GDB presents itself as a remote target but works
12617 on the local filesystem: it does not implement remote get
12618 and users are not expected to set a sysroot. To handle
12619 this case we treat the remote filesystem as local if the
12620 sysroot is exactly TARGET_SYSROOT_PREFIX and if the stub
12621 does not support vFile:open. */
12622 if (strcmp (gdb_sysroot
, TARGET_SYSROOT_PREFIX
) == 0)
12624 enum packet_support ps
= packet_support (PACKET_vFile_open
);
12626 if (ps
== PACKET_SUPPORT_UNKNOWN
)
12628 int fd
, remote_errno
;
12630 /* Try opening a file to probe support. The supplied
12631 filename is irrelevant, we only care about whether
12632 the stub recognizes the packet or not. */
12633 fd
= remote_hostio_open (NULL
, "just probing",
12634 FILEIO_O_RDONLY
, 0700, 0,
12638 remote_hostio_close (fd
, &remote_errno
);
12640 ps
= packet_support (PACKET_vFile_open
);
12643 if (ps
== PACKET_DISABLE
)
12645 static int warning_issued
= 0;
12647 if (!warning_issued
)
12649 warning (_("remote target does not support file"
12650 " transfer, attempting to access files"
12651 " from local filesystem."));
12652 warning_issued
= 1;
12663 remote_fileio_errno_to_host (int errnum
)
12669 case FILEIO_ENOENT
:
12677 case FILEIO_EACCES
:
12679 case FILEIO_EFAULT
:
12683 case FILEIO_EEXIST
:
12685 case FILEIO_ENODEV
:
12687 case FILEIO_ENOTDIR
:
12689 case FILEIO_EISDIR
:
12691 case FILEIO_EINVAL
:
12693 case FILEIO_ENFILE
:
12695 case FILEIO_EMFILE
:
12699 case FILEIO_ENOSPC
:
12701 case FILEIO_ESPIPE
:
12705 case FILEIO_ENOSYS
:
12707 case FILEIO_ENAMETOOLONG
:
12708 return ENAMETOOLONG
;
12714 remote_hostio_error (int errnum
)
12716 int host_error
= remote_fileio_errno_to_host (errnum
);
12718 if (host_error
== -1)
12719 error (_("Unknown remote I/O error %d"), errnum
);
12721 error (_("Remote I/O error: %s"), safe_strerror (host_error
));
12724 /* A RAII wrapper around a remote file descriptor. */
12726 class scoped_remote_fd
12729 scoped_remote_fd (remote_target
*remote
, int fd
)
12730 : m_remote (remote
), m_fd (fd
)
12734 ~scoped_remote_fd ()
12741 m_remote
->remote_hostio_close (m_fd
, &remote_errno
);
12745 /* Swallow exception before it escapes the dtor. If
12746 something goes wrong, likely the connection is gone,
12747 and there's nothing else that can be done. */
12752 DISABLE_COPY_AND_ASSIGN (scoped_remote_fd
);
12754 /* Release ownership of the file descriptor, and return it. */
12755 ATTRIBUTE_UNUSED_RESULT
int release () noexcept
12762 /* Return the owned file descriptor. */
12763 int get () const noexcept
12769 /* The remote target. */
12770 remote_target
*m_remote
;
12772 /* The owned remote I/O file descriptor. */
12777 remote_file_put (const char *local_file
, const char *remote_file
, int from_tty
)
12779 remote_target
*remote
= get_current_remote_target ();
12781 if (remote
== nullptr)
12782 error (_("command can only be used with remote target"));
12784 remote
->remote_file_put (local_file
, remote_file
, from_tty
);
12788 remote_target::remote_file_put (const char *local_file
, const char *remote_file
,
12791 int retcode
, remote_errno
, bytes
, io_size
;
12792 int bytes_in_buffer
;
12796 gdb_file_up file
= gdb_fopen_cloexec (local_file
, "rb");
12798 perror_with_name (local_file
);
12800 scoped_remote_fd fd
12801 (this, remote_hostio_open (NULL
,
12802 remote_file
, (FILEIO_O_WRONLY
| FILEIO_O_CREAT
12804 0700, 0, &remote_errno
));
12805 if (fd
.get () == -1)
12806 remote_hostio_error (remote_errno
);
12808 /* Send up to this many bytes at once. They won't all fit in the
12809 remote packet limit, so we'll transfer slightly fewer. */
12810 io_size
= get_remote_packet_size ();
12811 gdb::byte_vector
buffer (io_size
);
12813 bytes_in_buffer
= 0;
12816 while (bytes_in_buffer
|| !saw_eof
)
12820 bytes
= fread (buffer
.data () + bytes_in_buffer
, 1,
12821 io_size
- bytes_in_buffer
,
12825 if (ferror (file
.get ()))
12826 error (_("Error reading %s."), local_file
);
12829 /* EOF. Unless there is something still in the
12830 buffer from the last iteration, we are done. */
12832 if (bytes_in_buffer
== 0)
12840 bytes
+= bytes_in_buffer
;
12841 bytes_in_buffer
= 0;
12843 retcode
= remote_hostio_pwrite (fd
.get (), buffer
.data (), bytes
,
12844 offset
, &remote_errno
);
12847 remote_hostio_error (remote_errno
);
12848 else if (retcode
== 0)
12849 error (_("Remote write of %d bytes returned 0!"), bytes
);
12850 else if (retcode
< bytes
)
12852 /* Short write. Save the rest of the read data for the next
12854 bytes_in_buffer
= bytes
- retcode
;
12855 memmove (buffer
.data (), buffer
.data () + retcode
, bytes_in_buffer
);
12861 if (remote_hostio_close (fd
.release (), &remote_errno
))
12862 remote_hostio_error (remote_errno
);
12865 printf_filtered (_("Successfully sent file \"%s\".\n"), local_file
);
12869 remote_file_get (const char *remote_file
, const char *local_file
, int from_tty
)
12871 remote_target
*remote
= get_current_remote_target ();
12873 if (remote
== nullptr)
12874 error (_("command can only be used with remote target"));
12876 remote
->remote_file_get (remote_file
, local_file
, from_tty
);
12880 remote_target::remote_file_get (const char *remote_file
, const char *local_file
,
12883 int remote_errno
, bytes
, io_size
;
12886 scoped_remote_fd fd
12887 (this, remote_hostio_open (NULL
,
12888 remote_file
, FILEIO_O_RDONLY
, 0, 0,
12890 if (fd
.get () == -1)
12891 remote_hostio_error (remote_errno
);
12893 gdb_file_up file
= gdb_fopen_cloexec (local_file
, "wb");
12895 perror_with_name (local_file
);
12897 /* Send up to this many bytes at once. They won't all fit in the
12898 remote packet limit, so we'll transfer slightly fewer. */
12899 io_size
= get_remote_packet_size ();
12900 gdb::byte_vector
buffer (io_size
);
12905 bytes
= remote_hostio_pread (fd
.get (), buffer
.data (), io_size
, offset
,
12908 /* Success, but no bytes, means end-of-file. */
12911 remote_hostio_error (remote_errno
);
12915 bytes
= fwrite (buffer
.data (), 1, bytes
, file
.get ());
12917 perror_with_name (local_file
);
12920 if (remote_hostio_close (fd
.release (), &remote_errno
))
12921 remote_hostio_error (remote_errno
);
12924 printf_filtered (_("Successfully fetched file \"%s\".\n"), remote_file
);
12928 remote_file_delete (const char *remote_file
, int from_tty
)
12930 remote_target
*remote
= get_current_remote_target ();
12932 if (remote
== nullptr)
12933 error (_("command can only be used with remote target"));
12935 remote
->remote_file_delete (remote_file
, from_tty
);
12939 remote_target::remote_file_delete (const char *remote_file
, int from_tty
)
12941 int retcode
, remote_errno
;
12943 retcode
= remote_hostio_unlink (NULL
, remote_file
, &remote_errno
);
12945 remote_hostio_error (remote_errno
);
12948 printf_filtered (_("Successfully deleted file \"%s\".\n"), remote_file
);
12952 remote_put_command (const char *args
, int from_tty
)
12955 error_no_arg (_("file to put"));
12957 gdb_argv
argv (args
);
12958 if (argv
[0] == NULL
|| argv
[1] == NULL
|| argv
[2] != NULL
)
12959 error (_("Invalid parameters to remote put"));
12961 remote_file_put (argv
[0], argv
[1], from_tty
);
12965 remote_get_command (const char *args
, int from_tty
)
12968 error_no_arg (_("file to get"));
12970 gdb_argv
argv (args
);
12971 if (argv
[0] == NULL
|| argv
[1] == NULL
|| argv
[2] != NULL
)
12972 error (_("Invalid parameters to remote get"));
12974 remote_file_get (argv
[0], argv
[1], from_tty
);
12978 remote_delete_command (const char *args
, int from_tty
)
12981 error_no_arg (_("file to delete"));
12983 gdb_argv
argv (args
);
12984 if (argv
[0] == NULL
|| argv
[1] != NULL
)
12985 error (_("Invalid parameters to remote delete"));
12987 remote_file_delete (argv
[0], from_tty
);
12991 remote_target::can_execute_reverse ()
12993 if (packet_support (PACKET_bs
) == PACKET_ENABLE
12994 || packet_support (PACKET_bc
) == PACKET_ENABLE
)
13001 remote_target::supports_non_stop ()
13007 remote_target::supports_disable_randomization ()
13009 /* Only supported in extended mode. */
13014 remote_target::supports_multi_process ()
13016 struct remote_state
*rs
= get_remote_state ();
13018 return remote_multi_process_p (rs
);
13022 remote_supports_cond_tracepoints ()
13024 return packet_support (PACKET_ConditionalTracepoints
) == PACKET_ENABLE
;
13028 remote_target::supports_evaluation_of_breakpoint_conditions ()
13030 return packet_support (PACKET_ConditionalBreakpoints
) == PACKET_ENABLE
;
13034 remote_supports_fast_tracepoints ()
13036 return packet_support (PACKET_FastTracepoints
) == PACKET_ENABLE
;
13040 remote_supports_static_tracepoints ()
13042 return packet_support (PACKET_StaticTracepoints
) == PACKET_ENABLE
;
13046 remote_supports_install_in_trace ()
13048 return packet_support (PACKET_InstallInTrace
) == PACKET_ENABLE
;
13052 remote_target::supports_enable_disable_tracepoint ()
13054 return (packet_support (PACKET_EnableDisableTracepoints_feature
)
13059 remote_target::supports_string_tracing ()
13061 return packet_support (PACKET_tracenz_feature
) == PACKET_ENABLE
;
13065 remote_target::can_run_breakpoint_commands ()
13067 return packet_support (PACKET_BreakpointCommands
) == PACKET_ENABLE
;
13071 remote_target::trace_init ()
13073 struct remote_state
*rs
= get_remote_state ();
13076 remote_get_noisy_reply ();
13077 if (strcmp (rs
->buf
.data (), "OK") != 0)
13078 error (_("Target does not support this command."));
13081 /* Recursive routine to walk through command list including loops, and
13082 download packets for each command. */
13085 remote_target::remote_download_command_source (int num
, ULONGEST addr
,
13086 struct command_line
*cmds
)
13088 struct remote_state
*rs
= get_remote_state ();
13089 struct command_line
*cmd
;
13091 for (cmd
= cmds
; cmd
; cmd
= cmd
->next
)
13093 QUIT
; /* Allow user to bail out with ^C. */
13094 strcpy (rs
->buf
.data (), "QTDPsrc:");
13095 encode_source_string (num
, addr
, "cmd", cmd
->line
,
13096 rs
->buf
.data () + strlen (rs
->buf
.data ()),
13097 rs
->buf
.size () - strlen (rs
->buf
.data ()));
13099 remote_get_noisy_reply ();
13100 if (strcmp (rs
->buf
.data (), "OK"))
13101 warning (_("Target does not support source download."));
13103 if (cmd
->control_type
== while_control
13104 || cmd
->control_type
== while_stepping_control
)
13106 remote_download_command_source (num
, addr
, cmd
->body_list_0
.get ());
13108 QUIT
; /* Allow user to bail out with ^C. */
13109 strcpy (rs
->buf
.data (), "QTDPsrc:");
13110 encode_source_string (num
, addr
, "cmd", "end",
13111 rs
->buf
.data () + strlen (rs
->buf
.data ()),
13112 rs
->buf
.size () - strlen (rs
->buf
.data ()));
13114 remote_get_noisy_reply ();
13115 if (strcmp (rs
->buf
.data (), "OK"))
13116 warning (_("Target does not support source download."));
13122 remote_target::download_tracepoint (struct bp_location
*loc
)
13126 std::vector
<std::string
> tdp_actions
;
13127 std::vector
<std::string
> stepping_actions
;
13129 struct breakpoint
*b
= loc
->owner
;
13130 struct tracepoint
*t
= (struct tracepoint
*) b
;
13131 struct remote_state
*rs
= get_remote_state ();
13133 const char *err_msg
= _("Tracepoint packet too large for target.");
13136 /* We use a buffer other than rs->buf because we'll build strings
13137 across multiple statements, and other statements in between could
13139 gdb::char_vector
buf (get_remote_packet_size ());
13141 encode_actions_rsp (loc
, &tdp_actions
, &stepping_actions
);
13143 tpaddr
= loc
->address
;
13144 strcpy (addrbuf
, phex (tpaddr
, sizeof (CORE_ADDR
)));
13145 ret
= snprintf (buf
.data (), buf
.size (), "QTDP:%x:%s:%c:%lx:%x",
13146 b
->number
, addrbuf
, /* address */
13147 (b
->enable_state
== bp_enabled
? 'E' : 'D'),
13148 t
->step_count
, t
->pass_count
);
13150 if (ret
< 0 || ret
>= buf
.size ())
13151 error ("%s", err_msg
);
13153 /* Fast tracepoints are mostly handled by the target, but we can
13154 tell the target how big of an instruction block should be moved
13156 if (b
->type
== bp_fast_tracepoint
)
13158 /* Only test for support at download time; we may not know
13159 target capabilities at definition time. */
13160 if (remote_supports_fast_tracepoints ())
13162 if (gdbarch_fast_tracepoint_valid_at (loc
->gdbarch
, tpaddr
,
13165 size_left
= buf
.size () - strlen (buf
.data ());
13166 ret
= snprintf (buf
.data () + strlen (buf
.data ()),
13168 gdb_insn_length (loc
->gdbarch
, tpaddr
));
13170 if (ret
< 0 || ret
>= size_left
)
13171 error ("%s", err_msg
);
13174 /* If it passed validation at definition but fails now,
13175 something is very wrong. */
13176 internal_error (__FILE__
, __LINE__
,
13177 _("Fast tracepoint not "
13178 "valid during download"));
13181 /* Fast tracepoints are functionally identical to regular
13182 tracepoints, so don't take lack of support as a reason to
13183 give up on the trace run. */
13184 warning (_("Target does not support fast tracepoints, "
13185 "downloading %d as regular tracepoint"), b
->number
);
13187 else if (b
->type
== bp_static_tracepoint
)
13189 /* Only test for support at download time; we may not know
13190 target capabilities at definition time. */
13191 if (remote_supports_static_tracepoints ())
13193 struct static_tracepoint_marker marker
;
13195 if (target_static_tracepoint_marker_at (tpaddr
, &marker
))
13197 size_left
= buf
.size () - strlen (buf
.data ());
13198 ret
= snprintf (buf
.data () + strlen (buf
.data ()),
13201 if (ret
< 0 || ret
>= size_left
)
13202 error ("%s", err_msg
);
13205 error (_("Static tracepoint not valid during download"));
13208 /* Fast tracepoints are functionally identical to regular
13209 tracepoints, so don't take lack of support as a reason
13210 to give up on the trace run. */
13211 error (_("Target does not support static tracepoints"));
13213 /* If the tracepoint has a conditional, make it into an agent
13214 expression and append to the definition. */
13217 /* Only test support at download time, we may not know target
13218 capabilities at definition time. */
13219 if (remote_supports_cond_tracepoints ())
13221 agent_expr_up aexpr
= gen_eval_for_expr (tpaddr
,
13224 size_left
= buf
.size () - strlen (buf
.data ());
13226 ret
= snprintf (buf
.data () + strlen (buf
.data ()),
13227 size_left
, ":X%x,", aexpr
->len
);
13229 if (ret
< 0 || ret
>= size_left
)
13230 error ("%s", err_msg
);
13232 size_left
= buf
.size () - strlen (buf
.data ());
13234 /* Two bytes to encode each aexpr byte, plus the terminating
13236 if (aexpr
->len
* 2 + 1 > size_left
)
13237 error ("%s", err_msg
);
13239 pkt
= buf
.data () + strlen (buf
.data ());
13241 for (int ndx
= 0; ndx
< aexpr
->len
; ++ndx
)
13242 pkt
= pack_hex_byte (pkt
, aexpr
->buf
[ndx
]);
13246 warning (_("Target does not support conditional tracepoints, "
13247 "ignoring tp %d cond"), b
->number
);
13250 if (b
->commands
|| *default_collect
)
13252 size_left
= buf
.size () - strlen (buf
.data ());
13254 ret
= snprintf (buf
.data () + strlen (buf
.data ()),
13257 if (ret
< 0 || ret
>= size_left
)
13258 error ("%s", err_msg
);
13261 putpkt (buf
.data ());
13262 remote_get_noisy_reply ();
13263 if (strcmp (rs
->buf
.data (), "OK"))
13264 error (_("Target does not support tracepoints."));
13266 /* do_single_steps (t); */
13267 for (auto action_it
= tdp_actions
.begin ();
13268 action_it
!= tdp_actions
.end (); action_it
++)
13270 QUIT
; /* Allow user to bail out with ^C. */
13272 bool has_more
= ((action_it
+ 1) != tdp_actions
.end ()
13273 || !stepping_actions
.empty ());
13275 ret
= snprintf (buf
.data (), buf
.size (), "QTDP:-%x:%s:%s%c",
13276 b
->number
, addrbuf
, /* address */
13277 action_it
->c_str (),
13278 has_more
? '-' : 0);
13280 if (ret
< 0 || ret
>= buf
.size ())
13281 error ("%s", err_msg
);
13283 putpkt (buf
.data ());
13284 remote_get_noisy_reply ();
13285 if (strcmp (rs
->buf
.data (), "OK"))
13286 error (_("Error on target while setting tracepoints."));
13289 for (auto action_it
= stepping_actions
.begin ();
13290 action_it
!= stepping_actions
.end (); action_it
++)
13292 QUIT
; /* Allow user to bail out with ^C. */
13294 bool is_first
= action_it
== stepping_actions
.begin ();
13295 bool has_more
= (action_it
+ 1) != stepping_actions
.end ();
13297 ret
= snprintf (buf
.data (), buf
.size (), "QTDP:-%x:%s:%s%s%s",
13298 b
->number
, addrbuf
, /* address */
13299 is_first
? "S" : "",
13300 action_it
->c_str (),
13301 has_more
? "-" : "");
13303 if (ret
< 0 || ret
>= buf
.size ())
13304 error ("%s", err_msg
);
13306 putpkt (buf
.data ());
13307 remote_get_noisy_reply ();
13308 if (strcmp (rs
->buf
.data (), "OK"))
13309 error (_("Error on target while setting tracepoints."));
13312 if (packet_support (PACKET_TracepointSource
) == PACKET_ENABLE
)
13314 if (b
->location
!= NULL
)
13316 ret
= snprintf (buf
.data (), buf
.size (), "QTDPsrc:");
13318 if (ret
< 0 || ret
>= buf
.size ())
13319 error ("%s", err_msg
);
13321 encode_source_string (b
->number
, loc
->address
, "at",
13322 event_location_to_string (b
->location
.get ()),
13323 buf
.data () + strlen (buf
.data ()),
13324 buf
.size () - strlen (buf
.data ()));
13325 putpkt (buf
.data ());
13326 remote_get_noisy_reply ();
13327 if (strcmp (rs
->buf
.data (), "OK"))
13328 warning (_("Target does not support source download."));
13330 if (b
->cond_string
)
13332 ret
= snprintf (buf
.data (), buf
.size (), "QTDPsrc:");
13334 if (ret
< 0 || ret
>= buf
.size ())
13335 error ("%s", err_msg
);
13337 encode_source_string (b
->number
, loc
->address
,
13338 "cond", b
->cond_string
,
13339 buf
.data () + strlen (buf
.data ()),
13340 buf
.size () - strlen (buf
.data ()));
13341 putpkt (buf
.data ());
13342 remote_get_noisy_reply ();
13343 if (strcmp (rs
->buf
.data (), "OK"))
13344 warning (_("Target does not support source download."));
13346 remote_download_command_source (b
->number
, loc
->address
,
13347 breakpoint_commands (b
));
13352 remote_target::can_download_tracepoint ()
13354 struct remote_state
*rs
= get_remote_state ();
13355 struct trace_status
*ts
;
13358 /* Don't try to install tracepoints until we've relocated our
13359 symbols, and fetched and merged the target's tracepoint list with
13361 if (rs
->starting_up
)
13364 ts
= current_trace_status ();
13365 status
= get_trace_status (ts
);
13367 if (status
== -1 || !ts
->running_known
|| !ts
->running
)
13370 /* If we are in a tracing experiment, but remote stub doesn't support
13371 installing tracepoint in trace, we have to return. */
13372 if (!remote_supports_install_in_trace ())
13380 remote_target::download_trace_state_variable (const trace_state_variable
&tsv
)
13382 struct remote_state
*rs
= get_remote_state ();
13385 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "QTDV:%x:%s:%x:",
13386 tsv
.number
, phex ((ULONGEST
) tsv
.initial_value
, 8),
13388 p
= rs
->buf
.data () + strlen (rs
->buf
.data ());
13389 if ((p
- rs
->buf
.data ()) + tsv
.name
.length () * 2
13390 >= get_remote_packet_size ())
13391 error (_("Trace state variable name too long for tsv definition packet"));
13392 p
+= 2 * bin2hex ((gdb_byte
*) (tsv
.name
.data ()), p
, tsv
.name
.length ());
13395 remote_get_noisy_reply ();
13396 if (rs
->buf
[0] == '\0')
13397 error (_("Target does not support this command."));
13398 if (strcmp (rs
->buf
.data (), "OK") != 0)
13399 error (_("Error on target while downloading trace state variable."));
13403 remote_target::enable_tracepoint (struct bp_location
*location
)
13405 struct remote_state
*rs
= get_remote_state ();
13407 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "QTEnable:%x:%s",
13408 location
->owner
->number
,
13409 phex (location
->address
, sizeof (CORE_ADDR
)));
13411 remote_get_noisy_reply ();
13412 if (rs
->buf
[0] == '\0')
13413 error (_("Target does not support enabling tracepoints while a trace run is ongoing."));
13414 if (strcmp (rs
->buf
.data (), "OK") != 0)
13415 error (_("Error on target while enabling tracepoint."));
13419 remote_target::disable_tracepoint (struct bp_location
*location
)
13421 struct remote_state
*rs
= get_remote_state ();
13423 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "QTDisable:%x:%s",
13424 location
->owner
->number
,
13425 phex (location
->address
, sizeof (CORE_ADDR
)));
13427 remote_get_noisy_reply ();
13428 if (rs
->buf
[0] == '\0')
13429 error (_("Target does not support disabling tracepoints while a trace run is ongoing."));
13430 if (strcmp (rs
->buf
.data (), "OK") != 0)
13431 error (_("Error on target while disabling tracepoint."));
13435 remote_target::trace_set_readonly_regions ()
13438 bfd_size_type size
;
13443 if (!current_program_space
->exec_bfd ())
13444 return; /* No information to give. */
13446 struct remote_state
*rs
= get_remote_state ();
13448 strcpy (rs
->buf
.data (), "QTro");
13449 offset
= strlen (rs
->buf
.data ());
13450 for (s
= current_program_space
->exec_bfd ()->sections
; s
; s
= s
->next
)
13452 char tmp1
[40], tmp2
[40];
13455 if ((s
->flags
& SEC_LOAD
) == 0 ||
13456 /* (s->flags & SEC_CODE) == 0 || */
13457 (s
->flags
& SEC_READONLY
) == 0)
13461 vma
= bfd_section_vma (s
);
13462 size
= bfd_section_size (s
);
13463 sprintf_vma (tmp1
, vma
);
13464 sprintf_vma (tmp2
, vma
+ size
);
13465 sec_length
= 1 + strlen (tmp1
) + 1 + strlen (tmp2
);
13466 if (offset
+ sec_length
+ 1 > rs
->buf
.size ())
13468 if (packet_support (PACKET_qXfer_traceframe_info
) != PACKET_ENABLE
)
13470 Too many sections for read-only sections definition packet."));
13473 xsnprintf (rs
->buf
.data () + offset
, rs
->buf
.size () - offset
, ":%s,%s",
13475 offset
+= sec_length
;
13480 getpkt (&rs
->buf
, 0);
13485 remote_target::trace_start ()
13487 struct remote_state
*rs
= get_remote_state ();
13489 putpkt ("QTStart");
13490 remote_get_noisy_reply ();
13491 if (rs
->buf
[0] == '\0')
13492 error (_("Target does not support this command."));
13493 if (strcmp (rs
->buf
.data (), "OK") != 0)
13494 error (_("Bogus reply from target: %s"), rs
->buf
.data ());
13498 remote_target::get_trace_status (struct trace_status
*ts
)
13500 /* Initialize it just to avoid a GCC false warning. */
13502 enum packet_result result
;
13503 struct remote_state
*rs
= get_remote_state ();
13505 if (packet_support (PACKET_qTStatus
) == PACKET_DISABLE
)
13508 /* FIXME we need to get register block size some other way. */
13509 trace_regblock_size
13510 = rs
->get_remote_arch_state (target_gdbarch ())->sizeof_g_packet
;
13512 putpkt ("qTStatus");
13516 p
= remote_get_noisy_reply ();
13518 catch (const gdb_exception_error
&ex
)
13520 if (ex
.error
!= TARGET_CLOSE_ERROR
)
13522 exception_fprintf (gdb_stderr
, ex
, "qTStatus: ");
13528 result
= packet_ok (p
, &remote_protocol_packets
[PACKET_qTStatus
]);
13530 /* If the remote target doesn't do tracing, flag it. */
13531 if (result
== PACKET_UNKNOWN
)
13534 /* We're working with a live target. */
13535 ts
->filename
= NULL
;
13538 error (_("Bogus trace status reply from target: %s"), rs
->buf
.data ());
13540 /* Function 'parse_trace_status' sets default value of each field of
13541 'ts' at first, so we don't have to do it here. */
13542 parse_trace_status (p
, ts
);
13544 return ts
->running
;
13548 remote_target::get_tracepoint_status (struct breakpoint
*bp
,
13549 struct uploaded_tp
*utp
)
13551 struct remote_state
*rs
= get_remote_state ();
13553 struct tracepoint
*tp
= (struct tracepoint
*) bp
;
13554 size_t size
= get_remote_packet_size ();
13559 tp
->traceframe_usage
= 0;
13560 for (bp_location
*loc
: tp
->locations ())
13562 /* If the tracepoint was never downloaded, don't go asking for
13564 if (tp
->number_on_target
== 0)
13566 xsnprintf (rs
->buf
.data (), size
, "qTP:%x:%s", tp
->number_on_target
,
13567 phex_nz (loc
->address
, 0));
13569 reply
= remote_get_noisy_reply ();
13570 if (reply
&& *reply
)
13573 parse_tracepoint_status (reply
+ 1, bp
, utp
);
13579 utp
->hit_count
= 0;
13580 utp
->traceframe_usage
= 0;
13581 xsnprintf (rs
->buf
.data (), size
, "qTP:%x:%s", utp
->number
,
13582 phex_nz (utp
->addr
, 0));
13584 reply
= remote_get_noisy_reply ();
13585 if (reply
&& *reply
)
13588 parse_tracepoint_status (reply
+ 1, bp
, utp
);
13594 remote_target::trace_stop ()
13596 struct remote_state
*rs
= get_remote_state ();
13599 remote_get_noisy_reply ();
13600 if (rs
->buf
[0] == '\0')
13601 error (_("Target does not support this command."));
13602 if (strcmp (rs
->buf
.data (), "OK") != 0)
13603 error (_("Bogus reply from target: %s"), rs
->buf
.data ());
13607 remote_target::trace_find (enum trace_find_type type
, int num
,
13608 CORE_ADDR addr1
, CORE_ADDR addr2
,
13611 struct remote_state
*rs
= get_remote_state ();
13612 char *endbuf
= rs
->buf
.data () + get_remote_packet_size ();
13614 int target_frameno
= -1, target_tracept
= -1;
13616 /* Lookups other than by absolute frame number depend on the current
13617 trace selected, so make sure it is correct on the remote end
13619 if (type
!= tfind_number
)
13620 set_remote_traceframe ();
13622 p
= rs
->buf
.data ();
13623 strcpy (p
, "QTFrame:");
13624 p
= strchr (p
, '\0');
13628 xsnprintf (p
, endbuf
- p
, "%x", num
);
13631 xsnprintf (p
, endbuf
- p
, "pc:%s", phex_nz (addr1
, 0));
13634 xsnprintf (p
, endbuf
- p
, "tdp:%x", num
);
13637 xsnprintf (p
, endbuf
- p
, "range:%s:%s", phex_nz (addr1
, 0),
13638 phex_nz (addr2
, 0));
13640 case tfind_outside
:
13641 xsnprintf (p
, endbuf
- p
, "outside:%s:%s", phex_nz (addr1
, 0),
13642 phex_nz (addr2
, 0));
13645 error (_("Unknown trace find type %d"), type
);
13649 reply
= remote_get_noisy_reply ();
13650 if (*reply
== '\0')
13651 error (_("Target does not support this command."));
13653 while (reply
&& *reply
)
13658 target_frameno
= (int) strtol (p
, &reply
, 16);
13660 error (_("Unable to parse trace frame number"));
13661 /* Don't update our remote traceframe number cache on failure
13662 to select a remote traceframe. */
13663 if (target_frameno
== -1)
13668 target_tracept
= (int) strtol (p
, &reply
, 16);
13670 error (_("Unable to parse tracepoint number"));
13672 case 'O': /* "OK"? */
13673 if (reply
[1] == 'K' && reply
[2] == '\0')
13676 error (_("Bogus reply from target: %s"), reply
);
13679 error (_("Bogus reply from target: %s"), reply
);
13682 *tpp
= target_tracept
;
13684 rs
->remote_traceframe_number
= target_frameno
;
13685 return target_frameno
;
13689 remote_target::get_trace_state_variable_value (int tsvnum
, LONGEST
*val
)
13691 struct remote_state
*rs
= get_remote_state ();
13695 set_remote_traceframe ();
13697 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "qTV:%x", tsvnum
);
13699 reply
= remote_get_noisy_reply ();
13700 if (reply
&& *reply
)
13704 unpack_varlen_hex (reply
+ 1, &uval
);
13705 *val
= (LONGEST
) uval
;
13713 remote_target::save_trace_data (const char *filename
)
13715 struct remote_state
*rs
= get_remote_state ();
13718 p
= rs
->buf
.data ();
13719 strcpy (p
, "QTSave:");
13721 if ((p
- rs
->buf
.data ()) + strlen (filename
) * 2
13722 >= get_remote_packet_size ())
13723 error (_("Remote file name too long for trace save packet"));
13724 p
+= 2 * bin2hex ((gdb_byte
*) filename
, p
, strlen (filename
));
13727 reply
= remote_get_noisy_reply ();
13728 if (*reply
== '\0')
13729 error (_("Target does not support this command."));
13730 if (strcmp (reply
, "OK") != 0)
13731 error (_("Bogus reply from target: %s"), reply
);
13735 /* This is basically a memory transfer, but needs to be its own packet
13736 because we don't know how the target actually organizes its trace
13737 memory, plus we want to be able to ask for as much as possible, but
13738 not be unhappy if we don't get as much as we ask for. */
13741 remote_target::get_raw_trace_data (gdb_byte
*buf
, ULONGEST offset
, LONGEST len
)
13743 struct remote_state
*rs
= get_remote_state ();
13748 p
= rs
->buf
.data ();
13749 strcpy (p
, "qTBuffer:");
13751 p
+= hexnumstr (p
, offset
);
13753 p
+= hexnumstr (p
, len
);
13757 reply
= remote_get_noisy_reply ();
13758 if (reply
&& *reply
)
13760 /* 'l' by itself means we're at the end of the buffer and
13761 there is nothing more to get. */
13765 /* Convert the reply into binary. Limit the number of bytes to
13766 convert according to our passed-in buffer size, rather than
13767 what was returned in the packet; if the target is
13768 unexpectedly generous and gives us a bigger reply than we
13769 asked for, we don't want to crash. */
13770 rslt
= hex2bin (reply
, buf
, len
);
13774 /* Something went wrong, flag as an error. */
13779 remote_target::set_disconnected_tracing (int val
)
13781 struct remote_state
*rs
= get_remote_state ();
13783 if (packet_support (PACKET_DisconnectedTracing_feature
) == PACKET_ENABLE
)
13787 xsnprintf (rs
->buf
.data (), get_remote_packet_size (),
13788 "QTDisconnected:%x", val
);
13790 reply
= remote_get_noisy_reply ();
13791 if (*reply
== '\0')
13792 error (_("Target does not support this command."));
13793 if (strcmp (reply
, "OK") != 0)
13794 error (_("Bogus reply from target: %s"), reply
);
13797 warning (_("Target does not support disconnected tracing."));
13801 remote_target::core_of_thread (ptid_t ptid
)
13803 thread_info
*info
= find_thread_ptid (this, ptid
);
13805 if (info
!= NULL
&& info
->priv
!= NULL
)
13806 return get_remote_thread_info (info
)->core
;
13812 remote_target::set_circular_trace_buffer (int val
)
13814 struct remote_state
*rs
= get_remote_state ();
13817 xsnprintf (rs
->buf
.data (), get_remote_packet_size (),
13818 "QTBuffer:circular:%x", val
);
13820 reply
= remote_get_noisy_reply ();
13821 if (*reply
== '\0')
13822 error (_("Target does not support this command."));
13823 if (strcmp (reply
, "OK") != 0)
13824 error (_("Bogus reply from target: %s"), reply
);
13828 remote_target::traceframe_info ()
13830 gdb::optional
<gdb::char_vector
> text
13831 = target_read_stralloc (current_inferior ()->top_target (),
13832 TARGET_OBJECT_TRACEFRAME_INFO
,
13835 return parse_traceframe_info (text
->data ());
13840 /* Handle the qTMinFTPILen packet. Returns the minimum length of
13841 instruction on which a fast tracepoint may be placed. Returns -1
13842 if the packet is not supported, and 0 if the minimum instruction
13843 length is unknown. */
13846 remote_target::get_min_fast_tracepoint_insn_len ()
13848 struct remote_state
*rs
= get_remote_state ();
13851 /* If we're not debugging a process yet, the IPA can't be
13853 if (!target_has_execution ())
13856 /* Make sure the remote is pointing at the right process. */
13857 set_general_process ();
13859 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "qTMinFTPILen");
13861 reply
= remote_get_noisy_reply ();
13862 if (*reply
== '\0')
13866 ULONGEST min_insn_len
;
13868 unpack_varlen_hex (reply
, &min_insn_len
);
13870 return (int) min_insn_len
;
13875 remote_target::set_trace_buffer_size (LONGEST val
)
13877 if (packet_support (PACKET_QTBuffer_size
) != PACKET_DISABLE
)
13879 struct remote_state
*rs
= get_remote_state ();
13880 char *buf
= rs
->buf
.data ();
13881 char *endbuf
= buf
+ get_remote_packet_size ();
13882 enum packet_result result
;
13884 gdb_assert (val
>= 0 || val
== -1);
13885 buf
+= xsnprintf (buf
, endbuf
- buf
, "QTBuffer:size:");
13886 /* Send -1 as literal "-1" to avoid host size dependency. */
13890 buf
+= hexnumstr (buf
, (ULONGEST
) -val
);
13893 buf
+= hexnumstr (buf
, (ULONGEST
) val
);
13896 remote_get_noisy_reply ();
13897 result
= packet_ok (rs
->buf
,
13898 &remote_protocol_packets
[PACKET_QTBuffer_size
]);
13900 if (result
!= PACKET_OK
)
13901 warning (_("Bogus reply from target: %s"), rs
->buf
.data ());
13906 remote_target::set_trace_notes (const char *user
, const char *notes
,
13907 const char *stop_notes
)
13909 struct remote_state
*rs
= get_remote_state ();
13911 char *buf
= rs
->buf
.data ();
13912 char *endbuf
= buf
+ get_remote_packet_size ();
13915 buf
+= xsnprintf (buf
, endbuf
- buf
, "QTNotes:");
13918 buf
+= xsnprintf (buf
, endbuf
- buf
, "user:");
13919 nbytes
= bin2hex ((gdb_byte
*) user
, buf
, strlen (user
));
13925 buf
+= xsnprintf (buf
, endbuf
- buf
, "notes:");
13926 nbytes
= bin2hex ((gdb_byte
*) notes
, buf
, strlen (notes
));
13932 buf
+= xsnprintf (buf
, endbuf
- buf
, "tstop:");
13933 nbytes
= bin2hex ((gdb_byte
*) stop_notes
, buf
, strlen (stop_notes
));
13937 /* Ensure the buffer is terminated. */
13941 reply
= remote_get_noisy_reply ();
13942 if (*reply
== '\0')
13945 if (strcmp (reply
, "OK") != 0)
13946 error (_("Bogus reply from target: %s"), reply
);
13952 remote_target::use_agent (bool use
)
13954 if (packet_support (PACKET_QAgent
) != PACKET_DISABLE
)
13956 struct remote_state
*rs
= get_remote_state ();
13958 /* If the stub supports QAgent. */
13959 xsnprintf (rs
->buf
.data (), get_remote_packet_size (), "QAgent:%d", use
);
13961 getpkt (&rs
->buf
, 0);
13963 if (strcmp (rs
->buf
.data (), "OK") == 0)
13974 remote_target::can_use_agent ()
13976 return (packet_support (PACKET_QAgent
) != PACKET_DISABLE
);
13979 struct btrace_target_info
13981 /* The ptid of the traced thread. */
13984 /* The obtained branch trace configuration. */
13985 struct btrace_config conf
;
13988 /* Reset our idea of our target's btrace configuration. */
13991 remote_btrace_reset (remote_state
*rs
)
13993 memset (&rs
->btrace_config
, 0, sizeof (rs
->btrace_config
));
13996 /* Synchronize the configuration with the target. */
13999 remote_target::btrace_sync_conf (const btrace_config
*conf
)
14001 struct packet_config
*packet
;
14002 struct remote_state
*rs
;
14003 char *buf
, *pos
, *endbuf
;
14005 rs
= get_remote_state ();
14006 buf
= rs
->buf
.data ();
14007 endbuf
= buf
+ get_remote_packet_size ();
14009 packet
= &remote_protocol_packets
[PACKET_Qbtrace_conf_bts_size
];
14010 if (packet_config_support (packet
) == PACKET_ENABLE
14011 && conf
->bts
.size
!= rs
->btrace_config
.bts
.size
)
14014 pos
+= xsnprintf (pos
, endbuf
- pos
, "%s=0x%x", packet
->name
,
14018 getpkt (&rs
->buf
, 0);
14020 if (packet_ok (buf
, packet
) == PACKET_ERROR
)
14022 if (buf
[0] == 'E' && buf
[1] == '.')
14023 error (_("Failed to configure the BTS buffer size: %s"), buf
+ 2);
14025 error (_("Failed to configure the BTS buffer size."));
14028 rs
->btrace_config
.bts
.size
= conf
->bts
.size
;
14031 packet
= &remote_protocol_packets
[PACKET_Qbtrace_conf_pt_size
];
14032 if (packet_config_support (packet
) == PACKET_ENABLE
14033 && conf
->pt
.size
!= rs
->btrace_config
.pt
.size
)
14036 pos
+= xsnprintf (pos
, endbuf
- pos
, "%s=0x%x", packet
->name
,
14040 getpkt (&rs
->buf
, 0);
14042 if (packet_ok (buf
, packet
) == PACKET_ERROR
)
14044 if (buf
[0] == 'E' && buf
[1] == '.')
14045 error (_("Failed to configure the trace buffer size: %s"), buf
+ 2);
14047 error (_("Failed to configure the trace buffer size."));
14050 rs
->btrace_config
.pt
.size
= conf
->pt
.size
;
14054 /* Read the current thread's btrace configuration from the target and
14055 store it into CONF. */
14058 btrace_read_config (struct btrace_config
*conf
)
14060 gdb::optional
<gdb::char_vector
> xml
14061 = target_read_stralloc (current_inferior ()->top_target (),
14062 TARGET_OBJECT_BTRACE_CONF
, "");
14064 parse_xml_btrace_conf (conf
, xml
->data ());
14067 /* Maybe reopen target btrace. */
14070 remote_target::remote_btrace_maybe_reopen ()
14072 struct remote_state
*rs
= get_remote_state ();
14073 int btrace_target_pushed
= 0;
14074 #if !defined (HAVE_LIBIPT)
14078 /* Don't bother walking the entirety of the remote thread list when
14079 we know the feature isn't supported by the remote. */
14080 if (packet_support (PACKET_qXfer_btrace_conf
) != PACKET_ENABLE
)
14083 scoped_restore_current_thread restore_thread
;
14085 for (thread_info
*tp
: all_non_exited_threads (this))
14087 set_general_thread (tp
->ptid
);
14089 memset (&rs
->btrace_config
, 0x00, sizeof (struct btrace_config
));
14090 btrace_read_config (&rs
->btrace_config
);
14092 if (rs
->btrace_config
.format
== BTRACE_FORMAT_NONE
)
14095 #if !defined (HAVE_LIBIPT)
14096 if (rs
->btrace_config
.format
== BTRACE_FORMAT_PT
)
14101 warning (_("Target is recording using Intel Processor Trace "
14102 "but support was disabled at compile time."));
14107 #endif /* !defined (HAVE_LIBIPT) */
14109 /* Push target, once, but before anything else happens. This way our
14110 changes to the threads will be cleaned up by unpushing the target
14111 in case btrace_read_config () throws. */
14112 if (!btrace_target_pushed
)
14114 btrace_target_pushed
= 1;
14115 record_btrace_push_target ();
14116 printf_filtered (_("Target is recording using %s.\n"),
14117 btrace_format_string (rs
->btrace_config
.format
));
14120 tp
->btrace
.target
= XCNEW (struct btrace_target_info
);
14121 tp
->btrace
.target
->ptid
= tp
->ptid
;
14122 tp
->btrace
.target
->conf
= rs
->btrace_config
;
14126 /* Enable branch tracing. */
14128 struct btrace_target_info
*
14129 remote_target::enable_btrace (ptid_t ptid
, const struct btrace_config
*conf
)
14131 struct btrace_target_info
*tinfo
= NULL
;
14132 struct packet_config
*packet
= NULL
;
14133 struct remote_state
*rs
= get_remote_state ();
14134 char *buf
= rs
->buf
.data ();
14135 char *endbuf
= buf
+ get_remote_packet_size ();
14137 switch (conf
->format
)
14139 case BTRACE_FORMAT_BTS
:
14140 packet
= &remote_protocol_packets
[PACKET_Qbtrace_bts
];
14143 case BTRACE_FORMAT_PT
:
14144 packet
= &remote_protocol_packets
[PACKET_Qbtrace_pt
];
14148 if (packet
== NULL
|| packet_config_support (packet
) != PACKET_ENABLE
)
14149 error (_("Target does not support branch tracing."));
14151 btrace_sync_conf (conf
);
14153 set_general_thread (ptid
);
14155 buf
+= xsnprintf (buf
, endbuf
- buf
, "%s", packet
->name
);
14157 getpkt (&rs
->buf
, 0);
14159 if (packet_ok (rs
->buf
, packet
) == PACKET_ERROR
)
14161 if (rs
->buf
[0] == 'E' && rs
->buf
[1] == '.')
14162 error (_("Could not enable branch tracing for %s: %s"),
14163 target_pid_to_str (ptid
).c_str (), &rs
->buf
[2]);
14165 error (_("Could not enable branch tracing for %s."),
14166 target_pid_to_str (ptid
).c_str ());
14169 tinfo
= XCNEW (struct btrace_target_info
);
14170 tinfo
->ptid
= ptid
;
14172 /* If we fail to read the configuration, we lose some information, but the
14173 tracing itself is not impacted. */
14176 btrace_read_config (&tinfo
->conf
);
14178 catch (const gdb_exception_error
&err
)
14180 if (err
.message
!= NULL
)
14181 warning ("%s", err
.what ());
14187 /* Disable branch tracing. */
14190 remote_target::disable_btrace (struct btrace_target_info
*tinfo
)
14192 struct packet_config
*packet
= &remote_protocol_packets
[PACKET_Qbtrace_off
];
14193 struct remote_state
*rs
= get_remote_state ();
14194 char *buf
= rs
->buf
.data ();
14195 char *endbuf
= buf
+ get_remote_packet_size ();
14197 if (packet_config_support (packet
) != PACKET_ENABLE
)
14198 error (_("Target does not support branch tracing."));
14200 set_general_thread (tinfo
->ptid
);
14202 buf
+= xsnprintf (buf
, endbuf
- buf
, "%s", packet
->name
);
14204 getpkt (&rs
->buf
, 0);
14206 if (packet_ok (rs
->buf
, packet
) == PACKET_ERROR
)
14208 if (rs
->buf
[0] == 'E' && rs
->buf
[1] == '.')
14209 error (_("Could not disable branch tracing for %s: %s"),
14210 target_pid_to_str (tinfo
->ptid
).c_str (), &rs
->buf
[2]);
14212 error (_("Could not disable branch tracing for %s."),
14213 target_pid_to_str (tinfo
->ptid
).c_str ());
14219 /* Teardown branch tracing. */
14222 remote_target::teardown_btrace (struct btrace_target_info
*tinfo
)
14224 /* We must not talk to the target during teardown. */
14228 /* Read the branch trace. */
14231 remote_target::read_btrace (struct btrace_data
*btrace
,
14232 struct btrace_target_info
*tinfo
,
14233 enum btrace_read_type type
)
14235 struct packet_config
*packet
= &remote_protocol_packets
[PACKET_qXfer_btrace
];
14238 if (packet_config_support (packet
) != PACKET_ENABLE
)
14239 error (_("Target does not support branch tracing."));
14241 #if !defined(HAVE_LIBEXPAT)
14242 error (_("Cannot process branch tracing result. XML parsing not supported."));
14247 case BTRACE_READ_ALL
:
14250 case BTRACE_READ_NEW
:
14253 case BTRACE_READ_DELTA
:
14257 internal_error (__FILE__
, __LINE__
,
14258 _("Bad branch tracing read type: %u."),
14259 (unsigned int) type
);
14262 gdb::optional
<gdb::char_vector
> xml
14263 = target_read_stralloc (current_inferior ()->top_target (),
14264 TARGET_OBJECT_BTRACE
, annex
);
14266 return BTRACE_ERR_UNKNOWN
;
14268 parse_xml_btrace (btrace
, xml
->data ());
14270 return BTRACE_ERR_NONE
;
14273 const struct btrace_config
*
14274 remote_target::btrace_conf (const struct btrace_target_info
*tinfo
)
14276 return &tinfo
->conf
;
14280 remote_target::augmented_libraries_svr4_read ()
14282 return (packet_support (PACKET_augmented_libraries_svr4_read_feature
)
14286 /* Implementation of to_load. */
14289 remote_target::load (const char *name
, int from_tty
)
14291 generic_load (name
, from_tty
);
14294 /* Accepts an integer PID; returns a string representing a file that
14295 can be opened on the remote side to get the symbols for the child
14296 process. Returns NULL if the operation is not supported. */
14299 remote_target::pid_to_exec_file (int pid
)
14301 static gdb::optional
<gdb::char_vector
> filename
;
14302 char *annex
= NULL
;
14304 if (packet_support (PACKET_qXfer_exec_file
) != PACKET_ENABLE
)
14307 inferior
*inf
= find_inferior_pid (this, pid
);
14309 internal_error (__FILE__
, __LINE__
,
14310 _("not currently attached to process %d"), pid
);
14312 if (!inf
->fake_pid_p
)
14314 const int annex_size
= 9;
14316 annex
= (char *) alloca (annex_size
);
14317 xsnprintf (annex
, annex_size
, "%x", pid
);
14320 filename
= target_read_stralloc (current_inferior ()->top_target (),
14321 TARGET_OBJECT_EXEC_FILE
, annex
);
14323 return filename
? filename
->data () : nullptr;
14326 /* Implement the to_can_do_single_step target_ops method. */
14329 remote_target::can_do_single_step ()
14331 /* We can only tell whether target supports single step or not by
14332 supported s and S vCont actions if the stub supports vContSupported
14333 feature. If the stub doesn't support vContSupported feature,
14334 we have conservatively to think target doesn't supports single
14336 if (packet_support (PACKET_vContSupported
) == PACKET_ENABLE
)
14338 struct remote_state
*rs
= get_remote_state ();
14340 if (packet_support (PACKET_vCont
) == PACKET_SUPPORT_UNKNOWN
)
14341 remote_vcont_probe ();
14343 return rs
->supports_vCont
.s
&& rs
->supports_vCont
.S
;
14349 /* Implementation of the to_execution_direction method for the remote
14352 enum exec_direction_kind
14353 remote_target::execution_direction ()
14355 struct remote_state
*rs
= get_remote_state ();
14357 return rs
->last_resume_exec_dir
;
14360 /* Return pointer to the thread_info struct which corresponds to
14361 THREAD_HANDLE (having length HANDLE_LEN). */
14364 remote_target::thread_handle_to_thread_info (const gdb_byte
*thread_handle
,
14368 for (thread_info
*tp
: all_non_exited_threads (this))
14370 remote_thread_info
*priv
= get_remote_thread_info (tp
);
14372 if (tp
->inf
== inf
&& priv
!= NULL
)
14374 if (handle_len
!= priv
->thread_handle
.size ())
14375 error (_("Thread handle size mismatch: %d vs %zu (from remote)"),
14376 handle_len
, priv
->thread_handle
.size ());
14377 if (memcmp (thread_handle
, priv
->thread_handle
.data (),
14387 remote_target::thread_info_to_thread_handle (struct thread_info
*tp
)
14389 remote_thread_info
*priv
= get_remote_thread_info (tp
);
14390 return priv
->thread_handle
;
14394 remote_target::can_async_p ()
14396 struct remote_state
*rs
= get_remote_state ();
14398 /* We don't go async if the user has explicitly prevented it with the
14399 "maint set target-async" command. */
14400 if (!target_async_permitted
)
14403 /* We're async whenever the serial device is. */
14404 return serial_can_async_p (rs
->remote_desc
);
14408 remote_target::is_async_p ()
14410 struct remote_state
*rs
= get_remote_state ();
14412 if (!target_async_permitted
)
14413 /* We only enable async when the user specifically asks for it. */
14416 /* We're async whenever the serial device is. */
14417 return serial_is_async_p (rs
->remote_desc
);
14420 /* Pass the SERIAL event on and up to the client. One day this code
14421 will be able to delay notifying the client of an event until the
14422 point where an entire packet has been received. */
14424 static serial_event_ftype remote_async_serial_handler
;
14427 remote_async_serial_handler (struct serial
*scb
, void *context
)
14429 /* Don't propogate error information up to the client. Instead let
14430 the client find out about the error by querying the target. */
14431 inferior_event_handler (INF_REG_EVENT
);
14435 remote_async_inferior_event_handler (gdb_client_data data
)
14437 inferior_event_handler (INF_REG_EVENT
);
14441 remote_target::async_wait_fd ()
14443 struct remote_state
*rs
= get_remote_state ();
14444 return rs
->remote_desc
->fd
;
14448 remote_target::async (int enable
)
14450 struct remote_state
*rs
= get_remote_state ();
14454 serial_async (rs
->remote_desc
, remote_async_serial_handler
, rs
);
14456 /* If there are pending events in the stop reply queue tell the
14457 event loop to process them. */
14458 if (!rs
->stop_reply_queue
.empty ())
14459 mark_async_event_handler (rs
->remote_async_inferior_event_token
);
14460 /* For simplicity, below we clear the pending events token
14461 without remembering whether it is marked, so here we always
14462 mark it. If there's actually no pending notification to
14463 process, this ends up being a no-op (other than a spurious
14464 event-loop wakeup). */
14465 if (target_is_non_stop_p ())
14466 mark_async_event_handler (rs
->notif_state
->get_pending_events_token
);
14470 serial_async (rs
->remote_desc
, NULL
, NULL
);
14471 /* If the core is disabling async, it doesn't want to be
14472 disturbed with target events. Clear all async event sources
14474 clear_async_event_handler (rs
->remote_async_inferior_event_token
);
14475 if (target_is_non_stop_p ())
14476 clear_async_event_handler (rs
->notif_state
->get_pending_events_token
);
14480 /* Implementation of the to_thread_events method. */
14483 remote_target::thread_events (int enable
)
14485 struct remote_state
*rs
= get_remote_state ();
14486 size_t size
= get_remote_packet_size ();
14488 if (packet_support (PACKET_QThreadEvents
) == PACKET_DISABLE
)
14491 xsnprintf (rs
->buf
.data (), size
, "QThreadEvents:%x", enable
? 1 : 0);
14493 getpkt (&rs
->buf
, 0);
14495 switch (packet_ok (rs
->buf
,
14496 &remote_protocol_packets
[PACKET_QThreadEvents
]))
14499 if (strcmp (rs
->buf
.data (), "OK") != 0)
14500 error (_("Remote refused setting thread events: %s"), rs
->buf
.data ());
14503 warning (_("Remote failure reply: %s"), rs
->buf
.data ());
14505 case PACKET_UNKNOWN
:
14511 show_remote_cmd (const char *args
, int from_tty
)
14513 /* We can't just use cmd_show_list here, because we want to skip
14514 the redundant "show remote Z-packet" and the legacy aliases. */
14515 struct cmd_list_element
*list
= remote_show_cmdlist
;
14516 struct ui_out
*uiout
= current_uiout
;
14518 ui_out_emit_tuple
tuple_emitter (uiout
, "showlist");
14519 for (; list
!= NULL
; list
= list
->next
)
14520 if (strcmp (list
->name
, "Z-packet") == 0)
14522 else if (list
->type
== not_set_cmd
)
14523 /* Alias commands are exactly like the original, except they
14524 don't have the normal type. */
14528 ui_out_emit_tuple
option_emitter (uiout
, "option");
14530 uiout
->field_string ("name", list
->name
);
14531 uiout
->text (": ");
14532 if (list
->type
== show_cmd
)
14533 do_show_command (NULL
, from_tty
, list
);
14535 cmd_func (list
, NULL
, from_tty
);
14540 /* Function to be called whenever a new objfile (shlib) is detected. */
14542 remote_new_objfile (struct objfile
*objfile
)
14544 remote_target
*remote
= get_current_remote_target ();
14546 /* First, check whether the current inferior's process target is a remote
14548 if (remote
== nullptr)
14551 /* When we are attaching or handling a fork child and the shared library
14552 subsystem reads the list of loaded libraries, we receive new objfile
14553 events in between each found library. The libraries are read in an
14554 undefined order, so if we gave the remote side a chance to look up
14555 symbols between each objfile, we might give it an inconsistent picture
14556 of the inferior. It could appear that a library A appears loaded but
14557 a library B does not, even though library A requires library B. That
14558 would present a state that couldn't normally exist in the inferior.
14560 So, skip these events, we'll give the remote a chance to look up symbols
14561 once all the loaded libraries and their symbols are known to GDB. */
14562 if (current_inferior ()->in_initial_library_scan
)
14565 remote
->remote_check_symbols ();
14568 /* Pull all the tracepoints defined on the target and create local
14569 data structures representing them. We don't want to create real
14570 tracepoints yet, we don't want to mess up the user's existing
14574 remote_target::upload_tracepoints (struct uploaded_tp
**utpp
)
14576 struct remote_state
*rs
= get_remote_state ();
14579 /* Ask for a first packet of tracepoint definition. */
14581 getpkt (&rs
->buf
, 0);
14582 p
= rs
->buf
.data ();
14583 while (*p
&& *p
!= 'l')
14585 parse_tracepoint_definition (p
, utpp
);
14586 /* Ask for another packet of tracepoint definition. */
14588 getpkt (&rs
->buf
, 0);
14589 p
= rs
->buf
.data ();
14595 remote_target::upload_trace_state_variables (struct uploaded_tsv
**utsvp
)
14597 struct remote_state
*rs
= get_remote_state ();
14600 /* Ask for a first packet of variable definition. */
14602 getpkt (&rs
->buf
, 0);
14603 p
= rs
->buf
.data ();
14604 while (*p
&& *p
!= 'l')
14606 parse_tsv_definition (p
, utsvp
);
14607 /* Ask for another packet of variable definition. */
14609 getpkt (&rs
->buf
, 0);
14610 p
= rs
->buf
.data ();
14615 /* The "set/show range-stepping" show hook. */
14618 show_range_stepping (struct ui_file
*file
, int from_tty
,
14619 struct cmd_list_element
*c
,
14622 fprintf_filtered (file
,
14623 _("Debugger's willingness to use range stepping "
14624 "is %s.\n"), value
);
14627 /* Return true if the vCont;r action is supported by the remote
14631 remote_target::vcont_r_supported ()
14633 if (packet_support (PACKET_vCont
) == PACKET_SUPPORT_UNKNOWN
)
14634 remote_vcont_probe ();
14636 return (packet_support (PACKET_vCont
) == PACKET_ENABLE
14637 && get_remote_state ()->supports_vCont
.r
);
14640 /* The "set/show range-stepping" set hook. */
14643 set_range_stepping (const char *ignore_args
, int from_tty
,
14644 struct cmd_list_element
*c
)
14646 /* When enabling, check whether range stepping is actually supported
14647 by the target, and warn if not. */
14648 if (use_range_stepping
)
14650 remote_target
*remote
= get_current_remote_target ();
14652 || !remote
->vcont_r_supported ())
14653 warning (_("Range stepping is not supported by the current target"));
14658 show_remote_debug (struct ui_file
*file
, int from_tty
,
14659 struct cmd_list_element
*c
, const char *value
)
14661 fprintf_filtered (file
, _("Debugging of remote protocol is %s.\n"),
14666 show_remote_timeout (struct ui_file
*file
, int from_tty
,
14667 struct cmd_list_element
*c
, const char *value
)
14669 fprintf_filtered (file
,
14670 _("Timeout limit to wait for target to respond is %s.\n"),
14674 /* Implement the "supports_memory_tagging" target_ops method. */
14677 remote_target::supports_memory_tagging ()
14679 return remote_memory_tagging_p ();
14682 /* Create the qMemTags packet given ADDRESS, LEN and TYPE. */
14685 create_fetch_memtags_request (gdb::char_vector
&packet
, CORE_ADDR address
,
14686 size_t len
, int type
)
14688 int addr_size
= gdbarch_addr_bit (target_gdbarch ()) / 8;
14690 std::string request
= string_printf ("qMemTags:%s,%s:%s",
14691 phex_nz (address
, addr_size
),
14692 phex_nz (len
, sizeof (len
)),
14693 phex_nz (type
, sizeof (type
)));
14695 strcpy (packet
.data (), request
.c_str ());
14698 /* Parse the qMemTags packet reply into TAGS.
14700 Return true if successful, false otherwise. */
14703 parse_fetch_memtags_reply (const gdb::char_vector
&reply
,
14704 gdb::byte_vector
&tags
)
14706 if (reply
.empty () || reply
[0] == 'E' || reply
[0] != 'm')
14709 /* Copy the tag data. */
14710 tags
= hex2bin (reply
.data () + 1);
14715 /* Create the QMemTags packet given ADDRESS, LEN, TYPE and TAGS. */
14718 create_store_memtags_request (gdb::char_vector
&packet
, CORE_ADDR address
,
14719 size_t len
, int type
,
14720 const gdb::byte_vector
&tags
)
14722 int addr_size
= gdbarch_addr_bit (target_gdbarch ()) / 8;
14724 /* Put together the main packet, address and length. */
14725 std::string request
= string_printf ("QMemTags:%s,%s:%s:",
14726 phex_nz (address
, addr_size
),
14727 phex_nz (len
, sizeof (len
)),
14728 phex_nz (type
, sizeof (type
)));
14729 request
+= bin2hex (tags
.data (), tags
.size ());
14731 /* Check if we have exceeded the maximum packet size. */
14732 if (packet
.size () < request
.length ())
14733 error (_("Contents too big for packet QMemTags."));
14735 strcpy (packet
.data (), request
.c_str ());
14738 /* Implement the "fetch_memtags" target_ops method. */
14741 remote_target::fetch_memtags (CORE_ADDR address
, size_t len
,
14742 gdb::byte_vector
&tags
, int type
)
14744 /* Make sure the qMemTags packet is supported. */
14745 if (!remote_memory_tagging_p ())
14746 gdb_assert_not_reached ("remote fetch_memtags called with packet disabled");
14748 struct remote_state
*rs
= get_remote_state ();
14750 create_fetch_memtags_request (rs
->buf
, address
, len
, type
);
14753 getpkt (&rs
->buf
, 0);
14755 return parse_fetch_memtags_reply (rs
->buf
, tags
);
14758 /* Implement the "store_memtags" target_ops method. */
14761 remote_target::store_memtags (CORE_ADDR address
, size_t len
,
14762 const gdb::byte_vector
&tags
, int type
)
14764 /* Make sure the QMemTags packet is supported. */
14765 if (!remote_memory_tagging_p ())
14766 gdb_assert_not_reached ("remote store_memtags called with packet disabled");
14768 struct remote_state
*rs
= get_remote_state ();
14770 create_store_memtags_request (rs
->buf
, address
, len
, type
, tags
);
14773 getpkt (&rs
->buf
, 0);
14775 /* Verify if the request was successful. */
14776 return packet_check_result (rs
->buf
.data ()) == PACKET_OK
;
14779 /* Return true if remote target T is non-stop. */
14782 remote_target_is_non_stop_p (remote_target
*t
)
14784 scoped_restore_current_thread restore_thread
;
14785 switch_to_target_no_thread (t
);
14787 return target_is_non_stop_p ();
14792 namespace selftests
{
14795 test_memory_tagging_functions ()
14797 remote_target remote
;
14799 struct packet_config
*config
14800 = &remote_protocol_packets
[PACKET_memory_tagging_feature
];
14802 scoped_restore restore_memtag_support_
14803 = make_scoped_restore (&config
->support
);
14805 /* Test memory tagging packet support. */
14806 config
->support
= PACKET_SUPPORT_UNKNOWN
;
14807 SELF_CHECK (remote
.supports_memory_tagging () == false);
14808 config
->support
= PACKET_DISABLE
;
14809 SELF_CHECK (remote
.supports_memory_tagging () == false);
14810 config
->support
= PACKET_ENABLE
;
14811 SELF_CHECK (remote
.supports_memory_tagging () == true);
14813 /* Setup testing. */
14814 gdb::char_vector packet
;
14815 gdb::byte_vector tags
, bv
;
14816 std::string expected
, reply
;
14817 packet
.resize (32000);
14819 /* Test creating a qMemTags request. */
14821 expected
= "qMemTags:0,0:0";
14822 create_fetch_memtags_request (packet
, 0x0, 0x0, 0);
14823 SELF_CHECK (strcmp (packet
.data (), expected
.c_str ()) == 0);
14825 expected
= "qMemTags:deadbeef,10:1";
14826 create_fetch_memtags_request (packet
, 0xdeadbeef, 16, 1);
14827 SELF_CHECK (strcmp (packet
.data (), expected
.c_str ()) == 0);
14829 /* Test parsing a qMemTags reply. */
14831 /* Error reply, tags vector unmodified. */
14833 strcpy (packet
.data (), reply
.c_str ());
14835 SELF_CHECK (parse_fetch_memtags_reply (packet
, tags
) == false);
14836 SELF_CHECK (tags
.size () == 0);
14838 /* Valid reply, tags vector updated. */
14842 for (int i
= 0; i
< 5; i
++)
14845 reply
= "m" + bin2hex (bv
.data (), bv
.size ());
14846 strcpy (packet
.data (), reply
.c_str ());
14848 SELF_CHECK (parse_fetch_memtags_reply (packet
, tags
) == true);
14849 SELF_CHECK (tags
.size () == 5);
14851 for (int i
= 0; i
< 5; i
++)
14852 SELF_CHECK (tags
[i
] == i
);
14854 /* Test creating a QMemTags request. */
14856 /* Empty tag data. */
14858 expected
= "QMemTags:0,0:0:";
14859 create_store_memtags_request (packet
, 0x0, 0x0, 0, tags
);
14860 SELF_CHECK (memcmp (packet
.data (), expected
.c_str (),
14861 expected
.length ()) == 0);
14863 /* Non-empty tag data. */
14865 for (int i
= 0; i
< 5; i
++)
14866 tags
.push_back (i
);
14867 expected
= "QMemTags:deadbeef,ff:1:0001020304";
14868 create_store_memtags_request (packet
, 0xdeadbeef, 255, 1, tags
);
14869 SELF_CHECK (memcmp (packet
.data (), expected
.c_str (),
14870 expected
.length ()) == 0);
14873 } // namespace selftests
14874 #endif /* GDB_SELF_TEST */
14876 void _initialize_remote ();
14878 _initialize_remote ()
14880 /* architecture specific data */
14881 remote_g_packet_data_handle
=
14882 gdbarch_data_register_pre_init (remote_g_packet_data_init
);
14884 add_target (remote_target_info
, remote_target::open
);
14885 add_target (extended_remote_target_info
, extended_remote_target::open
);
14887 /* Hook into new objfile notification. */
14888 gdb::observers::new_objfile
.attach (remote_new_objfile
, "remote");
14891 init_remote_threadtests ();
14894 /* set/show remote ... */
14896 add_basic_prefix_cmd ("remote", class_maintenance
, _("\
14897 Remote protocol specific variables.\n\
14898 Configure various remote-protocol specific variables such as\n\
14899 the packets being used."),
14900 &remote_set_cmdlist
,
14901 0 /* allow-unknown */, &setlist
);
14902 add_prefix_cmd ("remote", class_maintenance
, show_remote_cmd
, _("\
14903 Remote protocol specific variables.\n\
14904 Configure various remote-protocol specific variables such as\n\
14905 the packets being used."),
14906 &remote_show_cmdlist
,
14907 0 /* allow-unknown */, &showlist
);
14909 add_cmd ("compare-sections", class_obscure
, compare_sections_command
, _("\
14910 Compare section data on target to the exec file.\n\
14911 Argument is a single section name (default: all loaded sections).\n\
14912 To compare only read-only loaded sections, specify the -r option."),
14915 add_cmd ("packet", class_maintenance
, packet_command
, _("\
14916 Send an arbitrary packet to a remote target.\n\
14917 maintenance packet TEXT\n\
14918 If GDB is talking to an inferior via the GDB serial protocol, then\n\
14919 this command sends the string TEXT to the inferior, and displays the\n\
14920 response packet. GDB supplies the initial `$' character, and the\n\
14921 terminating `#' character and checksum."),
14924 set_show_commands remotebreak_cmds
14925 = add_setshow_boolean_cmd ("remotebreak", no_class
, &remote_break
, _("\
14926 Set whether to send break if interrupted."), _("\
14927 Show whether to send break if interrupted."), _("\
14928 If set, a break, instead of a cntrl-c, is sent to the remote target."),
14929 set_remotebreak
, show_remotebreak
,
14930 &setlist
, &showlist
);
14931 deprecate_cmd (remotebreak_cmds
.set
, "set remote interrupt-sequence");
14932 deprecate_cmd (remotebreak_cmds
.show
, "show remote interrupt-sequence");
14934 add_setshow_enum_cmd ("interrupt-sequence", class_support
,
14935 interrupt_sequence_modes
, &interrupt_sequence_mode
,
14937 Set interrupt sequence to remote target."), _("\
14938 Show interrupt sequence to remote target."), _("\
14939 Valid value is \"Ctrl-C\", \"BREAK\" or \"BREAK-g\". The default is \"Ctrl-C\"."),
14940 NULL
, show_interrupt_sequence
,
14941 &remote_set_cmdlist
,
14942 &remote_show_cmdlist
);
14944 add_setshow_boolean_cmd ("interrupt-on-connect", class_support
,
14945 &interrupt_on_connect
, _("\
14946 Set whether interrupt-sequence is sent to remote target when gdb connects to."), _("\
14947 Show whether interrupt-sequence is sent to remote target when gdb connects to."), _("\
14948 If set, interrupt sequence is sent to remote target."),
14950 &remote_set_cmdlist
, &remote_show_cmdlist
);
14952 /* Install commands for configuring memory read/write packets. */
14954 add_cmd ("remotewritesize", no_class
, set_memory_write_packet_size
, _("\
14955 Set the maximum number of bytes per memory write packet (deprecated)."),
14957 add_cmd ("remotewritesize", no_class
, show_memory_write_packet_size
, _("\
14958 Show the maximum number of bytes per memory write packet (deprecated)."),
14960 add_cmd ("memory-write-packet-size", no_class
,
14961 set_memory_write_packet_size
, _("\
14962 Set the maximum number of bytes per memory-write packet.\n\
14963 Specify the number of bytes in a packet or 0 (zero) for the\n\
14964 default packet size. The actual limit is further reduced\n\
14965 dependent on the target. Specify ``fixed'' to disable the\n\
14966 further restriction and ``limit'' to enable that restriction."),
14967 &remote_set_cmdlist
);
14968 add_cmd ("memory-read-packet-size", no_class
,
14969 set_memory_read_packet_size
, _("\
14970 Set the maximum number of bytes per memory-read packet.\n\
14971 Specify the number of bytes in a packet or 0 (zero) for the\n\
14972 default packet size. The actual limit is further reduced\n\
14973 dependent on the target. Specify ``fixed'' to disable the\n\
14974 further restriction and ``limit'' to enable that restriction."),
14975 &remote_set_cmdlist
);
14976 add_cmd ("memory-write-packet-size", no_class
,
14977 show_memory_write_packet_size
,
14978 _("Show the maximum number of bytes per memory-write packet."),
14979 &remote_show_cmdlist
);
14980 add_cmd ("memory-read-packet-size", no_class
,
14981 show_memory_read_packet_size
,
14982 _("Show the maximum number of bytes per memory-read packet."),
14983 &remote_show_cmdlist
);
14985 add_setshow_zuinteger_unlimited_cmd ("hardware-watchpoint-limit", no_class
,
14986 &remote_hw_watchpoint_limit
, _("\
14987 Set the maximum number of target hardware watchpoints."), _("\
14988 Show the maximum number of target hardware watchpoints."), _("\
14989 Specify \"unlimited\" for unlimited hardware watchpoints."),
14990 NULL
, show_hardware_watchpoint_limit
,
14991 &remote_set_cmdlist
,
14992 &remote_show_cmdlist
);
14993 add_setshow_zuinteger_unlimited_cmd ("hardware-watchpoint-length-limit",
14995 &remote_hw_watchpoint_length_limit
, _("\
14996 Set the maximum length (in bytes) of a target hardware watchpoint."), _("\
14997 Show the maximum length (in bytes) of a target hardware watchpoint."), _("\
14998 Specify \"unlimited\" to allow watchpoints of unlimited size."),
14999 NULL
, show_hardware_watchpoint_length_limit
,
15000 &remote_set_cmdlist
, &remote_show_cmdlist
);
15001 add_setshow_zuinteger_unlimited_cmd ("hardware-breakpoint-limit", no_class
,
15002 &remote_hw_breakpoint_limit
, _("\
15003 Set the maximum number of target hardware breakpoints."), _("\
15004 Show the maximum number of target hardware breakpoints."), _("\
15005 Specify \"unlimited\" for unlimited hardware breakpoints."),
15006 NULL
, show_hardware_breakpoint_limit
,
15007 &remote_set_cmdlist
, &remote_show_cmdlist
);
15009 add_setshow_zuinteger_cmd ("remoteaddresssize", class_obscure
,
15010 &remote_address_size
, _("\
15011 Set the maximum size of the address (in bits) in a memory packet."), _("\
15012 Show the maximum size of the address (in bits) in a memory packet."), NULL
,
15014 NULL
, /* FIXME: i18n: */
15015 &setlist
, &showlist
);
15017 init_all_packet_configs ();
15019 add_packet_config_cmd (&remote_protocol_packets
[PACKET_X
],
15020 "X", "binary-download", 1);
15022 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vCont
],
15023 "vCont", "verbose-resume", 0);
15025 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QPassSignals
],
15026 "QPassSignals", "pass-signals", 0);
15028 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QCatchSyscalls
],
15029 "QCatchSyscalls", "catch-syscalls", 0);
15031 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QProgramSignals
],
15032 "QProgramSignals", "program-signals", 0);
15034 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QSetWorkingDir
],
15035 "QSetWorkingDir", "set-working-dir", 0);
15037 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QStartupWithShell
],
15038 "QStartupWithShell", "startup-with-shell", 0);
15040 add_packet_config_cmd (&remote_protocol_packets
15041 [PACKET_QEnvironmentHexEncoded
],
15042 "QEnvironmentHexEncoded", "environment-hex-encoded",
15045 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QEnvironmentReset
],
15046 "QEnvironmentReset", "environment-reset",
15049 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QEnvironmentUnset
],
15050 "QEnvironmentUnset", "environment-unset",
15053 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qSymbol
],
15054 "qSymbol", "symbol-lookup", 0);
15056 add_packet_config_cmd (&remote_protocol_packets
[PACKET_P
],
15057 "P", "set-register", 1);
15059 add_packet_config_cmd (&remote_protocol_packets
[PACKET_p
],
15060 "p", "fetch-register", 1);
15062 add_packet_config_cmd (&remote_protocol_packets
[PACKET_Z0
],
15063 "Z0", "software-breakpoint", 0);
15065 add_packet_config_cmd (&remote_protocol_packets
[PACKET_Z1
],
15066 "Z1", "hardware-breakpoint", 0);
15068 add_packet_config_cmd (&remote_protocol_packets
[PACKET_Z2
],
15069 "Z2", "write-watchpoint", 0);
15071 add_packet_config_cmd (&remote_protocol_packets
[PACKET_Z3
],
15072 "Z3", "read-watchpoint", 0);
15074 add_packet_config_cmd (&remote_protocol_packets
[PACKET_Z4
],
15075 "Z4", "access-watchpoint", 0);
15077 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_auxv
],
15078 "qXfer:auxv:read", "read-aux-vector", 0);
15080 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_exec_file
],
15081 "qXfer:exec-file:read", "pid-to-exec-file", 0);
15083 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_features
],
15084 "qXfer:features:read", "target-features", 0);
15086 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_libraries
],
15087 "qXfer:libraries:read", "library-info", 0);
15089 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_libraries_svr4
],
15090 "qXfer:libraries-svr4:read", "library-info-svr4", 0);
15092 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_memory_map
],
15093 "qXfer:memory-map:read", "memory-map", 0);
15095 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_osdata
],
15096 "qXfer:osdata:read", "osdata", 0);
15098 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_threads
],
15099 "qXfer:threads:read", "threads", 0);
15101 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_siginfo_read
],
15102 "qXfer:siginfo:read", "read-siginfo-object", 0);
15104 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_siginfo_write
],
15105 "qXfer:siginfo:write", "write-siginfo-object", 0);
15107 add_packet_config_cmd
15108 (&remote_protocol_packets
[PACKET_qXfer_traceframe_info
],
15109 "qXfer:traceframe-info:read", "traceframe-info", 0);
15111 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_uib
],
15112 "qXfer:uib:read", "unwind-info-block", 0);
15114 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qGetTLSAddr
],
15115 "qGetTLSAddr", "get-thread-local-storage-address",
15118 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qGetTIBAddr
],
15119 "qGetTIBAddr", "get-thread-information-block-address",
15122 add_packet_config_cmd (&remote_protocol_packets
[PACKET_bc
],
15123 "bc", "reverse-continue", 0);
15125 add_packet_config_cmd (&remote_protocol_packets
[PACKET_bs
],
15126 "bs", "reverse-step", 0);
15128 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qSupported
],
15129 "qSupported", "supported-packets", 0);
15131 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qSearch_memory
],
15132 "qSearch:memory", "search-memory", 0);
15134 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qTStatus
],
15135 "qTStatus", "trace-status", 0);
15137 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vFile_setfs
],
15138 "vFile:setfs", "hostio-setfs", 0);
15140 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vFile_open
],
15141 "vFile:open", "hostio-open", 0);
15143 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vFile_pread
],
15144 "vFile:pread", "hostio-pread", 0);
15146 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vFile_pwrite
],
15147 "vFile:pwrite", "hostio-pwrite", 0);
15149 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vFile_close
],
15150 "vFile:close", "hostio-close", 0);
15152 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vFile_unlink
],
15153 "vFile:unlink", "hostio-unlink", 0);
15155 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vFile_readlink
],
15156 "vFile:readlink", "hostio-readlink", 0);
15158 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vFile_fstat
],
15159 "vFile:fstat", "hostio-fstat", 0);
15161 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vAttach
],
15162 "vAttach", "attach", 0);
15164 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vRun
],
15167 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QStartNoAckMode
],
15168 "QStartNoAckMode", "noack", 0);
15170 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vKill
],
15171 "vKill", "kill", 0);
15173 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qAttached
],
15174 "qAttached", "query-attached", 0);
15176 add_packet_config_cmd (&remote_protocol_packets
[PACKET_ConditionalTracepoints
],
15177 "ConditionalTracepoints",
15178 "conditional-tracepoints", 0);
15180 add_packet_config_cmd (&remote_protocol_packets
[PACKET_ConditionalBreakpoints
],
15181 "ConditionalBreakpoints",
15182 "conditional-breakpoints", 0);
15184 add_packet_config_cmd (&remote_protocol_packets
[PACKET_BreakpointCommands
],
15185 "BreakpointCommands",
15186 "breakpoint-commands", 0);
15188 add_packet_config_cmd (&remote_protocol_packets
[PACKET_FastTracepoints
],
15189 "FastTracepoints", "fast-tracepoints", 0);
15191 add_packet_config_cmd (&remote_protocol_packets
[PACKET_TracepointSource
],
15192 "TracepointSource", "TracepointSource", 0);
15194 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QAllow
],
15195 "QAllow", "allow", 0);
15197 add_packet_config_cmd (&remote_protocol_packets
[PACKET_StaticTracepoints
],
15198 "StaticTracepoints", "static-tracepoints", 0);
15200 add_packet_config_cmd (&remote_protocol_packets
[PACKET_InstallInTrace
],
15201 "InstallInTrace", "install-in-trace", 0);
15203 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_statictrace_read
],
15204 "qXfer:statictrace:read", "read-sdata-object", 0);
15206 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_fdpic
],
15207 "qXfer:fdpic:read", "read-fdpic-loadmap", 0);
15209 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QDisableRandomization
],
15210 "QDisableRandomization", "disable-randomization", 0);
15212 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QAgent
],
15213 "QAgent", "agent", 0);
15215 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QTBuffer_size
],
15216 "QTBuffer:size", "trace-buffer-size", 0);
15218 add_packet_config_cmd (&remote_protocol_packets
[PACKET_Qbtrace_off
],
15219 "Qbtrace:off", "disable-btrace", 0);
15221 add_packet_config_cmd (&remote_protocol_packets
[PACKET_Qbtrace_bts
],
15222 "Qbtrace:bts", "enable-btrace-bts", 0);
15224 add_packet_config_cmd (&remote_protocol_packets
[PACKET_Qbtrace_pt
],
15225 "Qbtrace:pt", "enable-btrace-pt", 0);
15227 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_btrace
],
15228 "qXfer:btrace", "read-btrace", 0);
15230 add_packet_config_cmd (&remote_protocol_packets
[PACKET_qXfer_btrace_conf
],
15231 "qXfer:btrace-conf", "read-btrace-conf", 0);
15233 add_packet_config_cmd (&remote_protocol_packets
[PACKET_Qbtrace_conf_bts_size
],
15234 "Qbtrace-conf:bts:size", "btrace-conf-bts-size", 0);
15236 add_packet_config_cmd (&remote_protocol_packets
[PACKET_multiprocess_feature
],
15237 "multiprocess-feature", "multiprocess-feature", 0);
15239 add_packet_config_cmd (&remote_protocol_packets
[PACKET_swbreak_feature
],
15240 "swbreak-feature", "swbreak-feature", 0);
15242 add_packet_config_cmd (&remote_protocol_packets
[PACKET_hwbreak_feature
],
15243 "hwbreak-feature", "hwbreak-feature", 0);
15245 add_packet_config_cmd (&remote_protocol_packets
[PACKET_fork_event_feature
],
15246 "fork-event-feature", "fork-event-feature", 0);
15248 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vfork_event_feature
],
15249 "vfork-event-feature", "vfork-event-feature", 0);
15251 add_packet_config_cmd (&remote_protocol_packets
[PACKET_Qbtrace_conf_pt_size
],
15252 "Qbtrace-conf:pt:size", "btrace-conf-pt-size", 0);
15254 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vContSupported
],
15255 "vContSupported", "verbose-resume-supported", 0);
15257 add_packet_config_cmd (&remote_protocol_packets
[PACKET_exec_event_feature
],
15258 "exec-event-feature", "exec-event-feature", 0);
15260 add_packet_config_cmd (&remote_protocol_packets
[PACKET_vCtrlC
],
15261 "vCtrlC", "ctrl-c", 0);
15263 add_packet_config_cmd (&remote_protocol_packets
[PACKET_QThreadEvents
],
15264 "QThreadEvents", "thread-events", 0);
15266 add_packet_config_cmd (&remote_protocol_packets
[PACKET_no_resumed
],
15267 "N stop reply", "no-resumed-stop-reply", 0);
15269 add_packet_config_cmd (&remote_protocol_packets
[PACKET_memory_tagging_feature
],
15270 "memory-tagging-feature", "memory-tagging-feature", 0);
15272 /* Assert that we've registered "set remote foo-packet" commands
15273 for all packet configs. */
15277 for (i
= 0; i
< PACKET_MAX
; i
++)
15279 /* Ideally all configs would have a command associated. Some
15280 still don't though. */
15285 case PACKET_QNonStop
:
15286 case PACKET_EnableDisableTracepoints_feature
:
15287 case PACKET_tracenz_feature
:
15288 case PACKET_DisconnectedTracing_feature
:
15289 case PACKET_augmented_libraries_svr4_read_feature
:
15291 /* Additions to this list need to be well justified:
15292 pre-existing packets are OK; new packets are not. */
15300 /* This catches both forgetting to add a config command, and
15301 forgetting to remove a packet from the exception list. */
15302 gdb_assert (excepted
== (remote_protocol_packets
[i
].name
== NULL
));
15306 /* Keep the old ``set remote Z-packet ...'' working. Each individual
15307 Z sub-packet has its own set and show commands, but users may
15308 have sets to this variable in their .gdbinit files (or in their
15310 add_setshow_auto_boolean_cmd ("Z-packet", class_obscure
,
15311 &remote_Z_packet_detect
, _("\
15312 Set use of remote protocol `Z' packets."), _("\
15313 Show use of remote protocol `Z' packets."), _("\
15314 When set, GDB will attempt to use the remote breakpoint and watchpoint\n\
15316 set_remote_protocol_Z_packet_cmd
,
15317 show_remote_protocol_Z_packet_cmd
,
15318 /* FIXME: i18n: Use of remote protocol
15319 `Z' packets is %s. */
15320 &remote_set_cmdlist
, &remote_show_cmdlist
);
15322 add_basic_prefix_cmd ("remote", class_files
, _("\
15323 Manipulate files on the remote system.\n\
15324 Transfer files to and from the remote target system."),
15326 0 /* allow-unknown */, &cmdlist
);
15328 add_cmd ("put", class_files
, remote_put_command
,
15329 _("Copy a local file to the remote system."),
15332 add_cmd ("get", class_files
, remote_get_command
,
15333 _("Copy a remote file to the local system."),
15336 add_cmd ("delete", class_files
, remote_delete_command
,
15337 _("Delete a remote file."),
15340 add_setshow_string_noescape_cmd ("exec-file", class_files
,
15341 &remote_exec_file_var
, _("\
15342 Set the remote pathname for \"run\"."), _("\
15343 Show the remote pathname for \"run\"."), NULL
,
15344 set_remote_exec_file
,
15345 show_remote_exec_file
,
15346 &remote_set_cmdlist
,
15347 &remote_show_cmdlist
);
15349 add_setshow_boolean_cmd ("range-stepping", class_run
,
15350 &use_range_stepping
, _("\
15351 Enable or disable range stepping."), _("\
15352 Show whether target-assisted range stepping is enabled."), _("\
15353 If on, and the target supports it, when stepping a source line, GDB\n\
15354 tells the target to step the corresponding range of addresses itself instead\n\
15355 of issuing multiple single-steps. This speeds up source level\n\
15356 stepping. If off, GDB always issues single-steps, even if range\n\
15357 stepping is supported by the target. The default is on."),
15358 set_range_stepping
,
15359 show_range_stepping
,
15363 add_setshow_zinteger_cmd ("watchdog", class_maintenance
, &watchdog
, _("\
15364 Set watchdog timer."), _("\
15365 Show watchdog timer."), _("\
15366 When non-zero, this timeout is used instead of waiting forever for a target\n\
15367 to finish a low-level step or continue operation. If the specified amount\n\
15368 of time passes without a response from the target, an error occurs."),
15371 &setlist
, &showlist
);
15373 add_setshow_zuinteger_unlimited_cmd ("remote-packet-max-chars", no_class
,
15374 &remote_packet_max_chars
, _("\
15375 Set the maximum number of characters to display for each remote packet."), _("\
15376 Show the maximum number of characters to display for each remote packet."), _("\
15377 Specify \"unlimited\" to display all the characters."),
15378 NULL
, show_remote_packet_max_chars
,
15379 &setdebuglist
, &showdebuglist
);
15381 add_setshow_boolean_cmd ("remote", no_class
, &remote_debug
,
15382 _("Set debugging of remote protocol."),
15383 _("Show debugging of remote protocol."),
15385 When enabled, each packet sent or received with the remote target\n\
15389 &setdebuglist
, &showdebuglist
);
15391 add_setshow_zuinteger_unlimited_cmd ("remotetimeout", no_class
,
15392 &remote_timeout
, _("\
15393 Set timeout limit to wait for target to respond."), _("\
15394 Show timeout limit to wait for target to respond."), _("\
15395 This value is used to set the time limit for gdb to wait for a response\n\
15396 from the target."),
15398 show_remote_timeout
,
15399 &setlist
, &showlist
);
15401 /* Eventually initialize fileio. See fileio.c */
15402 initialize_remote_fileio (&remote_set_cmdlist
, &remote_show_cmdlist
);
15405 selftests::register_test ("remote_memory_tagging",
15406 selftests::test_memory_tagging_functions
);