OpenCores
URL https://opencores.org/ocsvn/openrisc_2011-10-31/openrisc_2011-10-31/trunk

Subversion Repositories openrisc_2011-10-31

[/] [openrisc/] [trunk/] [or_debug_proxy/] [src/] [gdb.c] - Rev 45

Go to most recent revision | Compare with Previous | Blame | View Log

/*$$HEADER*/
/******************************************************************************/
/*                                                                            */
/*                    H E A D E R   I N F O R M A T I O N                     */
/*                                                                            */
/******************************************************************************/
 
// Project Name                   : OpenRISC Debug Proxy
// File Name                      : gdb.c
// Prepared By                    : jb, rmd
// Project Start                  : 2008-10-01
 
/*$$COPYRIGHT NOTICE*/
/******************************************************************************/
/*                                                                            */
/*                      C O P Y R I G H T   N O T I C E                       */
/*                                                                            */
/******************************************************************************/
/*
  This library is free software; you can redistribute it and/or
  modify it under the terms of the GNU Lesser General Public
  License as published by the Free Software Foundation; 
  version 2.1 of the License, a copy of which is available from
  http://www.gnu.org/licenses/old-licenses/lgpl-2.1.txt.
 
  This library is distributed in the hope that it will be useful,
  but WITHOUT ANY WARRANTY; without even the implied warranty of
  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
  Lesser General Public License for more details.
 
  You should have received a copy of the GNU Lesser General Public
  License along with this library; if not, write to the Free Software
  Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301  USA
*/
 
/*$$DESCRIPTION*/
/******************************************************************************/
/*                                                                            */
/*                           D E S C R I P T I O N                            */
/*                                                                            */
/******************************************************************************/
//
// Implements GDB stub for OpenRISC debug proxy.
//
 
 
/*$$CHANGE HISTORY*/
/******************************************************************************/
/*                                                                            */
/*                         C H A N G E  H I S T O R Y                         */
/*                                                                            */
/******************************************************************************/
 
// Date		Version	Description
//------------------------------------------------------------------------
// 081101		Imported code from "jp" project			jb
// 090219               Adapted code from Jeremy Bennett's RSP server
//                      for the or1ksim project.                       rmb
// 090304               Finished RSP server code import, added extra
//                      functions, adding stability when debugging on
//                      a remote target.                                jb
// 090505               Remove PPC polling - caused intermittent errors 
//                      in or1k                                         jb
 
#ifdef CYGWIN_COMPILE
 
#else
// linux includes		   
#include <time.h>
#include <sched.h>
#endif
 
#include <stdio.h>
#include <ctype.h>
#include <string.h>
#include <stdlib.h>
#include <unistd.h>
#include <stdarg.h>
 
/* Libraries for JTAG proxy server.  */
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <sys/ioctl.h>
#include <sys/select.h>
#include <sys/poll.h>
#include <fcntl.h>
#include <netdb.h>
#include <netinet/tcp.h>
#include <signal.h>
#include <inttypes.h>
#include <errno.h>
#include <arpa/inet.h>
 
 
/*! Name of the Or1ksim RSP service */
#define OR1KSIM_RSP_SERVICE  "or1ksim-rsp"
 
#include "gdb.h" /* partially copied from gdb/config/or1k */
#include "or_debug_proxy.h"
 
#define MAX_GPRS    (32)
 
/* Indices of GDB registers that are not GPRs. Must match GDB settings! */
#define PPC_REGNUM  (MAX_GPRS + 0)	/*!< Previous PC */
#define NPC_REGNUM  (MAX_GPRS + 1)	/*!< Next PC */
#define SR_REGNUM   (MAX_GPRS + 2)	/*!< Supervision Register */
#define NUM_REGS    (MAX_GPRS + 3)	/*!< Total GDB registers */
 
/* OR1k CPU registers address */
#define NPC_CPU_REG_ADD  	0x10							/* Next PC */
#define SR_CPU_REG_ADD   	0x11							/* Supervision Register */
#define PPC_CPU_REG_ADD  	0x12							/* Previous PC */
#define DMR1_CPU_REG_ADD	((6 << 11) + 16)	/* Debug Mode Register 1 (DMR1) 0x3010 */
#define DMR2_CPU_REG_ADD	((6 << 11) + 17)	/* Debug Mode Register 2 (DMR2) 0x3011 */
#define DSR_CPU_REG_ADD		((6 << 11) + 20)	/* Debug Stop Register (DSR) 0x3014 */
#define DRR_CPU_REG_ADD  	((6 << 11) + 21)	/* Debug Reason Register (DRR) 0x3015 */
 
/*! Trap instruction for OR32 */
#define OR1K_TRAP_INSTR  0x21000001
 
/*! The maximum number of characters in inbound/outbound buffers.  The largest
    packets are the 'G' packet, which must hold the 'G' and all the registers
    with two hex digits per byte and the 'g' reply, which must hold all the
    registers, and (in our implementation) an end-of-string (0)
    character. Adding the EOS allows us to print out the packet as a
    string. So at least NUMREGBYTES*2 + 1 (for the 'G' or the EOS) are needed
    for register packets */
#define GDB_BUF_MAX  ((NUM_REGS) * 8 + 1)
 
/*! Size of the matchpoint hash table. Largest prime < 2^10 */
#define MP_HASH_SIZE  1021
 
/* Definition of special-purpose registers (SPRs). */
#define MAX_SPRS (0x10000)
 
#define SPR_DMR1_ST	  		0x00400000  /* Single-step trace*/
#define SPR_DMR2_WGB	   	0x003ff000  /* Watchpoints generating breakpoint */
#define SPR_DSR_TE				0x00002000  /* Trap exception */
 
#define WORDSBIGENDIAN_N
 
/* Definition of OR1K exceptions */
#define EXCEPT_NONE     0x0000
#define EXCEPT_RESET	0x0100
#define EXCEPT_BUSERR	0x0200
#define EXCEPT_DPF	0x0300
#define EXCEPT_IPF	0x0400
#define EXCEPT_TICK	0x0500
#define EXCEPT_ALIGN	0x0600
#define EXCEPT_ILLEGAL	0x0700
#define EXCEPT_INT	0x0800
#define EXCEPT_DTLBMISS	0x0900
#define EXCEPT_ITLBMISS	0x0a00
#define EXCEPT_RANGE	0x0b00
#define EXCEPT_SYSCALL	0x0c00
#define EXCEPT_FPE	0x0d00
#define EXCEPT_TRAP	0x0e00
 
// Changed to #defines from static const int's due to compile error
// DRR (Debug Reason Register) Bits
#define SPR_DRR_RSTE  0x00000001  //!< Reset
#define SPR_DRR_BUSEE 0x00000002  //!< Bus error
#define SPR_DRR_DPFE  0x00000004  //!< Data page fault
#define SPR_DRR_IPFE  0x00000008  //!< Insn page fault
#define SPR_DRR_TTE   0x00000010  //!< Tick timer
#define SPR_DRR_AE    0x00000020  //!< Alignment
#define SPR_DRR_IIE   0x00000040  //!< Illegal instruction
#define SPR_DRR_IE    0x00000080  //!< Interrupt
#define SPR_DRR_DME   0x00000100  //!< DTLB miss
#define SPR_DRR_IME   0x00000200  //!< ITLB miss
#define SPR_DRR_RE    0x00000400  //!< Range fault
#define SPR_DRR_SCE   0x00000800  //!< System call
#define SPR_DRR_FPE   0x00001000  //!< Floating point
#define SPR_DRR_TE    0x00002000  //!< Trap
 
 
/*! Definition of GDB target signals. Data taken from the GDB 6.8
    source. Only those we use defined here. The exact meaning of 
    signal number is defined by the header `include/gdb/signals.h'
    in the GDB source code. For an explanation of what each signal
    means, see target_signal_to_string.*/
enum target_signal {
  TARGET_SIGNAL_NONE =  0,
  TARGET_SIGNAL_INT  =  2,
  TARGET_SIGNAL_ILL  =  4,
  TARGET_SIGNAL_TRAP =  5,
  TARGET_SIGNAL_FPE  =  8,
  TARGET_SIGNAL_BUS  = 10,
  TARGET_SIGNAL_SEGV = 11,
  TARGET_SIGNAL_ALRM = 14,
  TARGET_SIGNAL_USR2 = 31,
  TARGET_SIGNAL_PWR  = 32
};
 
/*! String to map hex digits to chars */
static const char hexchars[]="0123456789abcdef";
 
 
//! Is the NPC cached?
 
//! Setting the NPC flushes the pipeline, so subsequent reads will return
//! zero until the processor has refilled the pipeline. This will not be
//! happening if the processor is stalled (as it is when GDB had control),
//! so we must cache the NPC. As soon as the processor is unstalled, this
//! cached value becomes invalid. So we must track the stall state, and if
//! appropriate cache the NPC.
enum stallStates {
  STALLED,
  UNSTALLED,
  UNKNOWN
} stallState;
 
int      npcIsCached;		//!< Is the NPC cached - should be bool
uint32_t  npcCachedValue;		//!< Cached value of the NPC
 
 
 
 
/************************
   JTAG Server Routines
************************/
int serverIP = 0;
int serverPort = 0;
int server_fd = 0;
int gdb_fd = 0;
 
static int tcp_level = 0;
 
/* global to store what chain the debug unit is currently connected to 
(not the JTAG TAP, but the onchip debug module has selected) */
int gdb_chain = -1;
 
/*! Data structure for RSP buffers. Can't be null terminated, since it may
  include zero bytes */
struct rsp_buf
{
  char  data[GDB_BUF_MAX];
  int   len;
};
 
/*! Enumeration of different types of matchpoint. These have explicit values
    matching the second digit of 'z' and 'Z' packets. */
enum mp_type {
  BP_MEMORY   = 0,		// software-breakpoint Z0  break 
  BP_HARDWARE = 1,		// hardware-breakpoint Z1  hbreak 
  WP_WRITE    = 2,		// write-watchpoint    Z2  watch  
  WP_READ     = 3,		// read-watchpoint     Z3  rwatch  
  WP_ACCESS   = 4			// access-watchpoint   Z4  awatch
};										
 
/*! Data structure for a matchpoint hash table entry */
struct mp_entry
{
  enum mp_type       type;		/*!< Type of matchpoint */
  uint32_t  addr;		/*!< Address with the matchpoint */
  uint32_t  instr;		/*!< Substituted instruction */
  struct mp_entry   *next;		/*!< Next entry with this hash */
};
 
/*! Central data for the RSP connection */
static struct
{
  int            		client_waiting;	/*!< Is client waiting a response? */
// Not used  int                proto_num;		/*!< Number of the protocol used */
  int                client_fd;		/*!< FD for talking to GDB */
  int               sigval;			/*!< GDB signal for any exception */
  uint32_t start_addr;	/*!< Start of last run */
  struct mp_entry   *mp_hash[MP_HASH_SIZE];	/*!< Matchpoint hash table */
} rsp;
 
/* Forward declarations of static functions */
static char *printTime(void);
static int gdb_read(void*, int);
static int gdb_write(void*, int);
static void ProtocolClean(int, int32_t);
static void GDBRequest(void);
static void rsp_interrupt();
static char rsp_peek();
static struct rsp_buf *get_packet (void);
static void rsp_init (void);
static void set_npc (uint32_t  addr);
static uint32_t get_npc();
static void rsp_check_for_exception();
static int check_for_exception_vector(uint32_t ppc);
static void rsp_exception (uint32_t  except);
static int get_rsp_char (void);
static int hex (int  c);
static void rsp_get_client (void);
static void rsp_client_request (void);
static void rsp_client_close (void);
static void client_close (char err);
static void	put_str_packet (const char *str);
static void rsp_report_exception (void);
static void put_packet (struct rsp_buf *p_buf);
static void send_rsp_str (unsigned char *data, int len);
static void rsp_query (struct rsp_buf *p_buf);
static void rsp_vpkt (struct rsp_buf *p_buf);
static void	rsp_step (struct rsp_buf *p_buf);
static void	rsp_step_with_signal (struct rsp_buf *p_buf);
static void	rsp_step_generic (uint32_t  addr, uint32_t  except);
static void rsp_continue (struct rsp_buf *p_buf);
static void	rsp_continue_with_signal (struct rsp_buf *p_buf);
static void	rsp_continue_generic (uint32_t  addr, uint32_t  except);
static void rsp_read_all_regs (void);
static void rsp_write_all_regs (struct rsp_buf *p_buf);
static void rsp_read_mem (struct rsp_buf *p_buf);
static void rsp_write_mem (struct rsp_buf *p_buf);
static void rsp_write_mem_bin (struct rsp_buf *p_buf);
static int rsp_unescape (char *data, int len);
static void rsp_read_reg (struct rsp_buf *p_buf);
static void rsp_write_reg (struct rsp_buf *p_buf);
static void mp_hash_init (void);
static void	mp_hash_add (enum mp_type type, uint32_t  addr, uint32_t  instr);
static struct mp_entry * mp_hash_lookup (enum mp_type type, uint32_t  addr);
static struct mp_entry * mp_hash_delete (enum mp_type type,	uint32_t  addr);
static void rsp_remove_matchpoint (struct rsp_buf *p_buf);
static void rsp_insert_matchpoint (struct rsp_buf *p_buf);
static void rsp_command (struct rsp_buf *p_buf);
static void rsp_set (struct rsp_buf *p_buf);
static void rsp_restart (void);
static void  ascii2hex (char *dest,char *src);
static void  hex2ascii (char *dest,	char *src);
static uint32_t hex2reg (char *p_buf);
static void	reg2hex (uint32_t  val, char *p_buf);
static void swap_buf(char* p_buf, int len);
static void set_stall_state (int state);
static void reset_or1k (void);
static void gdb_ensure_or1k_stalled();
static int gdb_set_chain(int chain);
static int gdb_write_reg(uint32_t adr, uint32_t data);
static int gdb_read_reg(uint32_t adr, uint32_t *data);
static int gdb_write_block(uint32_t adr, uint32_t *data, int len);
static int gdb_read_block(uint32_t adr, uint32_t *data, int len);
 
char *printTime(void)
{
  time_t tid;
  struct tm *strtm; 
  static char timeBuf[20];
 
  time(&tid); 
  strtm = localtime(&tid);
  sprintf(timeBuf,"[%.02d:%.02d:%.02d] ",strtm->tm_hour,strtm->tm_min,strtm->tm_sec);
  return timeBuf;
}
 
/*---------------------------------------------------------------------------*/
/*!Initialize the Remote Serial Protocol connection
 
   Set up the central data structures.                                       */
/*---------------------------------------------------------------------------*/
void
rsp_init (void)
{
  /* Clear out the central data structure */
  rsp.client_waiting =  0;		/* GDB client is not waiting for us */
  rsp.client_fd      = -1;		/* i.e. invalid */
  rsp.sigval         = 0;		/* No exception */
  rsp.start_addr     = EXCEPT_RESET;	/* Default restart point */
 
  /* Set up the matchpoint hash table */
  mp_hash_init ();
 
  /* RSP always starts stalled as though we have just reset the processor. */
  rsp_exception (EXCEPT_TRAP);
 
  /* Setup the NPC caching variables */
  stallState = STALLED;
  // Force a caching of the NPC
  npcIsCached = 0;
  get_npc();
 
}	/* rsp_init () */
 
/*---------------------------------------------------------------------------*/
/*!Look for action on RSP
 
   This function is called when the processor has stalled, which, except for
   initialization, must be due to an interrupt.
 
   If we have no RSP client, we get one. We can make no progress until the
   client is available.
 
   Then if the cause is an exception following a step or continue command, and
   the exception not been notified to GDB, a packet reporting the cause of the
   exception is sent.
 
   The next client request is then processed.                                */
/*---------------------------------------------------------------------------*/
void
handle_rsp (void)
{
  uint32_t		temp_uint32;
 
  rsp_init();
 
  while (1){
    /* If we have no RSP client, wait until we get one. */
    while (-1 == rsp.client_fd)
      {
	rsp_get_client ();
	rsp.client_waiting = 0;		/* No longer waiting */
      }
 
    /* If we have an unacknowledged exception tell the GDB client. If this
       exception was a trap due to a memory breakpoint, then adjust the NPC. */
    if (rsp.client_waiting)
      {
 
	// Check for exception
	rsp_check_for_exception();
 
	if(stallState == STALLED)
	  // Get the PPC if we're stalled
	  gdb_read_reg(PPC_CPU_REG_ADD, &temp_uint32);
 
 
	if ((TARGET_SIGNAL_TRAP == rsp.sigval) && (NULL != mp_hash_lookup (BP_MEMORY, temp_uint32)))
	  {
	    if (stallState != STALLED)
	      // This is a quick fix for a strange situation seen in some of the simulators where
	      // the sw bp would be detected, but the stalled state variable wasn't updated correctly
	      // indicating that last time it checked, it wasn't set but the processor has now hit the
	      // breakpoint. So run rsp_check_for_exception() to bring everything up to date.
	      rsp_check_for_exception();
 
	    if(DEBUG_GDB) printf("Software breakpoint hit at 0x%08x. Rolling back NPC to this instruction\n", temp_uint32);
 
	    set_npc (temp_uint32);
 
	    rsp_report_exception();
	    rsp.client_waiting = 0;		/* No longer waiting */
	  }
	else if(stallState == STALLED) {
	  // If we're here, the thing has stalled, but not because of a breakpoint we set
	  // report back the exception
 
	  rsp_report_exception();
	  rsp.client_waiting = 0;		/* No longer waiting */
 
	}	      
 
	if (rsp.client_waiting)
#ifdef CYGWIN_COMPILE
	  sleep(1);
#else
	sched_yield();
#endif
 
 
      }
 
    // See if there's any incoming data from the client by peeking at the socket
    if (rsp_peek() > 0)
      {
	if (rsp_peek() == 0x03 && (stallState != STALLED)) // ETX, end of text control char
	  {
	    // Got an interrupt command from GDB, this function should
	    // pull the packet off the socket and stall the processor.
	    // and then send a stop reply packet with signal TARGET_SIGNAL_NONE
	    rsp_interrupt();
	    rsp.client_waiting = 0;
	  }
	else if (rsp.client_waiting == 0)
	  {
	    // Default handling of data from the client:
	    /* Get a RSP client request */
	    rsp_client_request ();
	  }
      } /* end if (rsp_peek() > 0) */
    else
#ifdef CYGWIN_COMPILE
      sleep(1);
#else
    {
      sched_yield();
    }
#endif
 
  }
 
}	/* handle_rsp () */
 
 
/*
  Check if processor is stalled - if it is, read the DRR
  and return the target signal code
*/
static void rsp_check_for_exception()
{
 
  unsigned char stalled;
  uint32_t drr;
  err = dbg_cpu0_read_ctrl(0, &stalled);				 /* check if we're stalled */
 
  if (!(stalled & 0x01))
    {
      // Processor not stalled. Just return;
      return;
    }
 
  if (DEBUG_GDB) printf("rsp_check_for_exception() detected processor was stalled\nChecking DRR\n");
 
  // We're stalled
  stallState = STALLED;
  npcIsCached = 0;
 
  gdb_set_chain(SC_RISC_DEBUG);
 
  // Now read the DRR (Debug Reason Register)
  gdb_read_reg(DRR_CPU_REG_ADD, &drr);
 
  if (DEBUG_GDB) printf("DRR: 0x%08x\n", drr);
 
  switch ((int)(drr&0xffffffff))
    {
    case SPR_DRR_RSTE:  rsp.sigval = TARGET_SIGNAL_PWR;  break;
    case SPR_DRR_BUSEE: rsp.sigval = TARGET_SIGNAL_BUS;  break;
    case SPR_DRR_DPFE:  rsp.sigval = TARGET_SIGNAL_SEGV; break;
    case SPR_DRR_IPFE:  rsp.sigval = TARGET_SIGNAL_SEGV; break;
    case SPR_DRR_TTE:   rsp.sigval = TARGET_SIGNAL_ALRM; break;
    case SPR_DRR_AE:    rsp.sigval = TARGET_SIGNAL_BUS;  break;
    case SPR_DRR_IIE:   rsp.sigval = TARGET_SIGNAL_ILL;  break;
    case SPR_DRR_IE:    rsp.sigval = TARGET_SIGNAL_INT;  break;
    case SPR_DRR_DME:   rsp.sigval = TARGET_SIGNAL_SEGV; break;
    case SPR_DRR_IME:   rsp.sigval = TARGET_SIGNAL_SEGV; break;
    case SPR_DRR_RE:    rsp.sigval = TARGET_SIGNAL_FPE;  break;
    case SPR_DRR_SCE:   rsp.sigval = TARGET_SIGNAL_USR2; break;
    case SPR_DRR_FPE:   rsp.sigval = TARGET_SIGNAL_FPE;  break;
    case SPR_DRR_TE:    rsp.sigval = TARGET_SIGNAL_TRAP; break;
 
    default:
      // This must be the case of single step (which does not set DRR)
      rsp.sigval = TARGET_SIGNAL_TRAP; break;
    }
 
  if (DEBUG_GDB) printf("rsp.sigval: 0x%x\n", rsp.sigval);
 
  return;  
}
 
/*---------------------------------------------------------------------------*/
/*!Check if PPC is in an exception vector that halts program flow
 
Compare the provided PPC with known exception vectors that are fatal
to a program's execution. Call rsp_exception(ppc) to set the appropriate
sigval and return.
 
@param[in] ppc  Value of current PPC, as read from debug unit
@return: 1 if we set a sigval and should return control to GDB, else 0       */
/*---------------------------------------------------------------------------*/
static int 
check_for_exception_vector(uint32_t ppc)
{
  switch(ppc)
    {
      // The following should return sigvals to GDB for processing
    case EXCEPT_BUSERR:   
    case EXCEPT_ALIGN:    
    case EXCEPT_ILLEGAL:  
    case EXCEPT_TRAP:     if(DEBUG_GDB) 
	                    printf("PPC at exception address\n");
                          rsp_exception(ppc); 
			  return 1;
 
    default:
      return 0;
    }
  return 1; 
}
 
/*---------------------------------------------------------------------------*/
/*!Note an exception for future processing
 
   The simulator has encountered an exception. Record it here, so that a
   future call to handle_exception will report it back to the client. The
   signal is supplied in Or1ksim form and recorded in GDB form.
 
   We flag up a warning if an exception is already pending, and ignore the
   earlier exception.
 
   @param[in] except  The exception (Or1ksim form)                           */
/*---------------------------------------------------------------------------*/
void
rsp_exception (uint32_t  except)
{
  int  sigval;			/* GDB signal equivalent to exception */
 
  switch (except)
    {
    case EXCEPT_RESET:    sigval = TARGET_SIGNAL_PWR;  break;
    case EXCEPT_BUSERR:   sigval = TARGET_SIGNAL_BUS;  break;
    case EXCEPT_DPF:      sigval = TARGET_SIGNAL_SEGV; break;
    case EXCEPT_IPF:      sigval = TARGET_SIGNAL_SEGV; break;
    case EXCEPT_TICK:     sigval = TARGET_SIGNAL_ALRM; break;
    case EXCEPT_ALIGN:    sigval = TARGET_SIGNAL_BUS;  break;
    case EXCEPT_ILLEGAL:  sigval = TARGET_SIGNAL_ILL;  break;
    case EXCEPT_INT:      sigval = TARGET_SIGNAL_INT;  break;
    case EXCEPT_DTLBMISS: sigval = TARGET_SIGNAL_SEGV; break;
    case EXCEPT_ITLBMISS: sigval = TARGET_SIGNAL_SEGV; break;
    case EXCEPT_RANGE:    sigval = TARGET_SIGNAL_FPE;  break;
    case EXCEPT_SYSCALL:  sigval = TARGET_SIGNAL_USR2; break;
    case EXCEPT_FPE:      sigval = TARGET_SIGNAL_FPE;  break;
    case EXCEPT_TRAP:     sigval = TARGET_SIGNAL_TRAP; break;
 
    default:
      fprintf (stderr, "Warning: Unknown RSP exception %u: Ignored\n", except);
      return;
    }
 
  if ((0 != rsp.sigval) && (sigval != rsp.sigval))
    {
      fprintf (stderr, "Warning: RSP signal %d received while signal "
	       "%d pending: Pending exception replaced\n", sigval, rsp.sigval);
    }
 
  rsp.sigval         = sigval;		/* Save the signal value */
 
}	/* rsp_exception () */
 
 
/*---------------------------------------------------------------------------*/
/*!Get a new client connection.
 
   Blocks until the client connection is available.
 
   A lot of this code is copied from remote_open in gdbserver remote-utils.c.
 
   This involves setting up a socket to listen on a socket for attempted
   connections from a single GDB instance (we couldn't be talking to multiple
   GDBs at once!).
 
   The service is specified either as a port number in the Or1ksim configuration
   (parameter rsp_port in section debug, default 51000) or as a service name
   in the constant OR1KSIM_RSP_SERVICE.
 
   The protocol used for communication is specified in OR1KSIM_RSP_PROTOCOL. */
/*---------------------------------------------------------------------------*/
static void
rsp_get_client (void)
{
  int                 tmp_fd;		/* Temporary descriptor for socket */
  int                 optval;		/* Socket options */
  struct sockaddr_in  sock_addr;	/* Socket address */
  socklen_t           len;		/* Size of the socket address */
 
  /* 0 is used as the RSP port number to indicate that we should use the
     service name instead. */
  if (0 == serverPort)
  {
    struct servent *service = getservbyname (OR1KSIM_RSP_SERVICE, "tcp");
    if (NULL == service)
      {
	fprintf (stderr, "Warning: RSP unable to find service \"%s\": %s\n",
		 OR1KSIM_RSP_SERVICE, strerror (errno));
	return;
      }
    serverPort = ntohs (service->s_port);
  }
 
  /* Open a socket on which we'll listen for clients */
  tmp_fd = socket (PF_INET, SOCK_STREAM, IPPROTO_TCP);
  if (tmp_fd < 0)
    {
      fprintf (stderr, "ERROR: Cannot open RSP socket\n");
      exit (0);
    }
 
  /* Allow rapid reuse of the port on this socket */
  optval = 1;
  setsockopt (tmp_fd, SOL_SOCKET, SO_REUSEADDR, (char *)&optval,
	      sizeof (optval));
 
  /* Bind the port to the socket */
  sock_addr.sin_family      = PF_INET;
  sock_addr.sin_port        = htons (serverPort);
  sock_addr.sin_addr.s_addr = INADDR_ANY;
  if (bind (tmp_fd, (struct sockaddr *) &sock_addr, sizeof (sock_addr)))
    {
      fprintf (stderr, "ERROR: Cannot bind to RSP socket\n");
      exit (0);
    }
 
  /* Listen for (at most one) client */
  if (0 != listen (tmp_fd, 1))
    {
      fprintf (stderr, "ERROR: Cannot listen on RSP socket\n");
      exit (0);
    }
 
  printf("Waiting for gdb connection on localhost:%d\n", serverPort);
  fflush (stdout);
 
  printf("Press CTRL+c to exit.\n");
  fflush (stdout);
 
  /* Accept a client which connects */
  len = sizeof (sock_addr);
  rsp.client_fd = accept (tmp_fd, (struct sockaddr *)&sock_addr, &len);
 
  if (-1 == rsp.client_fd)
  {
    fprintf (stderr, "Warning: Failed to accept RSP client\n");
    return;
  }
 
  /* Enable TCP keep alive process */
  optval = 1;
  setsockopt (rsp.client_fd, SOL_SOCKET, SO_KEEPALIVE, (char *)&optval,
	      sizeof (optval));
 
  int flags;
 
  /* If they have O_NONBLOCK, use the Posix way to do it */
 
#if defined(O_NONBLOCK)
  /* Fixme: O_NONBLOCK is defined but broken on SunOS 4.1.x and AIX 3.2.5. */
  if (-1 == (flags = fcntl(rsp.client_fd, F_GETFL, 0)))
    flags = 0;
 
  fcntl(rsp.client_fd, F_SETFL, flags | O_NONBLOCK);
#else
  /* Otherwise, use the old way of doing it */
  flags = 1;
  ioctl(fd, FIOBIO, &flags);
#endif
 
 
 
  /* Set socket to be non-blocking */
 
  /* We do this because when we're given a continue, or step
     instruction,command we set the processor stall off, then instnatly check
     if it's stopped. If it hasn't then we drop through and wait for input
     from GDB. Obviously this will cause problems when it will stop after we
     do the check. So now, rsp_peek() has been implemented to simply check if
     there's an incoming command from GDB (only interested in interrupt
     commands), otherwise it returns back to and poll the processor's PPC and
     stall bit. It can only do this if the socket is non-blocking.
 
     At first test, simply adding this line appeared to give no problems with
     the existing code. No "simulation" of blocking behaviour on the
     non-blocking socket was required (in the event that a read/write throws
     back a EWOULDBLOCK error, as was looked to be the case in the previous
     GDB handling code) -- Julius
  */
  if (ioctl(rsp.client_fd, FIONBIO, (char *)&optval) > 0 )
    {
      perror("ioctl() failed");
      close(rsp.client_fd);
      close(tmp_fd);
      exit(0);
    }
 
 
  /* Don't delay small packets, for better interactive response (disable
     Nagel's algorithm) */
  optval = 1;
  setsockopt (rsp.client_fd, IPPROTO_TCP, TCP_NODELAY, (char *)&optval,
	      sizeof (optval));
 
  /* Socket is no longer needed */
  close (tmp_fd);			/* No longer need this */
  signal (SIGPIPE, SIG_IGN);		/* So we don't exit if client dies */
 
  printf ("Remote debugging from host %s\n", inet_ntoa (sock_addr.sin_addr));
}	/* rsp_get_client () */
 
 
/*---------------------------------------------------------------------------*/
/*!Deal with a request from the GDB client session
 
   In general, apart from the simplest requests, this function replies on
   other functions to implement the functionality.                           */
/*---------------------------------------------------------------------------*/
static void rsp_client_request (void)
{
  struct rsp_buf *p_buf = get_packet ();	/* Message sent to us */
 
  // Null packet means we hit EOF or the link was closed for some other
  // reason. Close the client and return
  if (NULL == p_buf)
    {
      rsp_client_close ();
      return;
    }
 
  if (DEBUG_GDB){
    printf("%s-----------------------------------------------------\n", printTime());
    printf ("Packet received %s: %d chars\n", p_buf->data, p_buf->len );
    fflush (stdout);
  }
 
  switch (p_buf->data[0])
    {
    case '!':
      /* Request for extended remote mode */
      put_str_packet ("OK"); // OK = supports and has enabled extended mode.
      return;
 
    case '?':
      /* Return last signal ID */
      rsp_report_exception();
      return;
 
    case 'A':
      /* Initialization of argv not supported */
      fprintf (stderr, "Warning: RSP 'A' packet not supported: ignored\n");
      put_str_packet ("E01");
      return;
 
    case 'b':
      /* Setting baud rate is deprecated */
      fprintf (stderr, "Warning: RSP 'b' packet is deprecated and not "
	       "supported: ignored\n");
      return;
 
    case 'B':
      /* Breakpoints should be set using Z packets */
      fprintf (stderr, "Warning: RSP 'B' packet is deprecated (use 'Z'/'z' "
	       "packets instead): ignored\n");
      return;
 
    case 'c':
      /* Continue */
      rsp_continue (p_buf);
      return;
 
    case 'C':
      /* Continue with signal */
      rsp_continue_with_signal (p_buf);
      return;
 
    case 'd':
      /* Disable debug using a general query */
      fprintf (stderr, "Warning: RSP 'd' packet is deprecated (define a 'Q' "
	       "packet instead: ignored\n");
      return;
 
    case 'D':
      /* Detach GDB. Do this by closing the client. The rules say that
	 execution should continue. TODO. Is this really then intended
	 meaning? Or does it just mean that only vAttach will be recognized
	 after this? */
      put_str_packet ("OK");
      rsp_client_close ();
      reset_or1k ();
      set_stall_state (0);
      return;
 
    case 'F':
      /* File I/O is not currently supported */
      fprintf (stderr, "Warning: RSP file I/O not currently supported: 'F' "
	       "packet ignored\n");
      return;
 
    case 'g':
      rsp_read_all_regs ();
      return;
 
    case 'G':
      rsp_write_all_regs (p_buf);
      return;
 
    case 'H':
      /* Set the thread number of subsequent operations. For now ignore
	    silently and just reply "OK" */
      put_str_packet ("OK");
      return;
 
    case 'i':
      /* Single instruction step */
      fprintf (stderr, "Warning: RSP cycle stepping not supported: target "
	       "stopped immediately\n");
      rsp.client_waiting = 1;			/* Stop reply will be sent */
      return;
 
    case 'I':
      /* Single instruction step with signal */
      fprintf (stderr, "Warning: RSP cycle stepping not supported: target "
	       "stopped immediately\n");
      rsp.client_waiting = 1;			/* Stop reply will be sent */
      return;
 
    case 'k':
      /* Kill request. Do nothing for now. */
      return;
 
    case 'm':
      /* Read memory (symbolic) */
      rsp_read_mem (p_buf);
      return;
 
    case 'M':
      /* Write memory (symbolic) */
      rsp_write_mem (p_buf);
      return;
 
    case 'p':
      /* Read a register */
      rsp_read_reg (p_buf);
      return;
 
    case 'P':
      /* Write a register */
      rsp_write_reg (p_buf);
      return;
 
    case 'q':
      /* Any one of a number of query packets */
      rsp_query (p_buf);
      return;
 
    case 'Q':
      /* Any one of a number of set packets */
      rsp_set (p_buf);
      return;
 
    case 'r':
      /* Reset the system. Deprecated (use 'R' instead) */
      fprintf (stderr, "Warning: RSP 'r' packet is deprecated (use 'R' "
	       "packet instead): ignored\n");
      return;
 
    case 'R':
      /* Restart the program being debugged. */
      rsp_restart ();
      return;
 
    case 's':
      /* Single step (one high level instruction). This could be hard without
			DWARF2 info */
      rsp_step (p_buf);
      return;
 
    case 'S':
      /* Single step (one high level instruction) with signal. This could be
			hard without DWARF2 info */
      rsp_step_with_signal (p_buf);
      return;
 
    case 't':
      /* Search. This is not well defined in the manual and for now we don't
	 		support it. No response is defined. */
      fprintf (stderr, "Warning: RSP 't' packet not supported: ignored\n");
      return;
 
    case 'T':
      /* Is the thread alive. We are bare metal, so don't have a thread
	 		context. The answer is always "OK". */
      put_str_packet ("OK");
      return;
 
    case 'v':
      /* Any one of a number of packets to control execution */
      rsp_vpkt (p_buf);
      return;
 
    case 'X':
      /* Write memory (binary) */
      rsp_write_mem_bin (p_buf);
      return;
 
    case 'z':
      /* Remove a breakpoint/watchpoint. */
      rsp_remove_matchpoint (p_buf);
      return;
 
    case 'Z':
      /* Insert a breakpoint/watchpoint. */
      rsp_insert_matchpoint (p_buf);
      return;
 
    default:
      /* Unknown commands are ignored */
      fprintf (stderr, "Warning: Unknown RSP request %s\n", p_buf->data);
      return;
    }
}	/* rsp_client_request () */
 
 
/*---------------------------------------------------------------------------*/
/*!Close the connection to the client if it is open                          */
/*---------------------------------------------------------------------------*/
static void
rsp_client_close (void)
{
  if (-1 != rsp.client_fd)
    {
      close (rsp.client_fd);
      rsp.client_fd = -1;
    }
}	/* rsp_client_close () */
 
 
/*---------------------------------------------------------------------------*/
/*!Send a packet to the GDB client
 
   Modeled on the stub version supplied with GDB. Put out the data preceded by
   a '$', followed by a '#' and a one byte checksum. '$', '#', '*' and '}' are
   escaped by preceding them with '}' and then XORing the character with
   0x20.
 
   @param[in] p_buf  The data to send                                          */
/*---------------------------------------------------------------------------*/
static void
put_packet (struct rsp_buf *p_buf)
{
  unsigned char  data[GDB_BUF_MAX * 2];
  int   len;
  int   ch;				/* Ack char */
 
  /* Construct $<packet info>#<checksum>. Repeat until the GDB client
     acknowledges satisfactory receipt. */
  do
  {
    unsigned char checksum = 0;	/* Computed checksum */
    int           count    = 0;	/* Index into the buffer */
 
    if (DEBUG_GDB_DUMP_DATA){
      printf ("Putting %s\n\n", p_buf->data);
      fflush (stdout);
    }
 
    len = 0;
    data[len++] =  '$';			/* Start char */
 
    /* Body of the packet */
    for (count = 0; count < p_buf->len; count++)
		{
		  unsigned char  ch = p_buf->data[count];
 
		  /* Check for escaped chars */
		  if (('$' == ch) || ('#' == ch) || ('*' == ch) || ('}' == ch))
		    {
		      ch       ^= 0x20;
		      checksum += (unsigned char)'}';
					data[len++] =  '}';
		    }
 
		  checksum += ch;
			data[len++] =  ch;
		}
 
		data[len++] =  '#';			/* End char */
 
    /* Computed checksum */
    data[len++] =	(hexchars[checksum >> 4]);
		data[len++] =	(hexchars[checksum % 16]);
 
		send_rsp_str ((unsigned char *) &data, len);
 
    /* Check for ack of connection failure */
    ch = get_rsp_char ();
    if (0 > ch)
		{
		  return;			/* Fail the put silently. */
		}
  }
  while ('+' != ch);
 
}	/* put_packet () */
 
 
/*---------------------------------------------------------------------------*/
/*!Convenience to put a constant string packet
 
   param[in] str  The text of the packet                                     */
/*---------------------------------------------------------------------------*/
static void
put_str_packet (const char *str)
{
  struct rsp_buf  buffer;
  int    len = strlen (str);
 
  /* Construct the packet to send, so long as string is not too big,
     otherwise truncate. Add EOS at the end for convenient debug printout */
 
  if (len >= GDB_BUF_MAX)
    {
      fprintf (stderr, "Warning: String %s too large for RSP packet: "
	       "truncated\n", str);
      len = GDB_BUF_MAX - 1;
    }
 
  strncpy (buffer.data, str, len);
  buffer.data[len] = 0;
  buffer.len       = len;
 
  put_packet (&buffer);
 
}	/* put_str_packet () */
 
 
/*---------------------------------------------------------------------------*/
/*!Get a packet from the GDB client
 
   Modeled on the stub version supplied with GDB. The data is in a static
   buffer. The data should be copied elsewhere if it is to be preserved across
   a subsequent call to get_packet().
 
   Unlike the reference implementation, we don't deal with sequence
   numbers. GDB has never used them, and this implementation is only intended
   for use with GDB 6.8 or later. Sequence numbers were removed from the RSP
   standard at GDB 5.0.
 
   @return  A pointer to the static buffer containing the data                */
/*---------------------------------------------------------------------------*/
static struct rsp_buf *
get_packet (void)
{
  static struct rsp_buf  buf;		/* Survives the return */
 
  /* Keep getting packets, until one is found with a valid checksum */
  while (1)
	{
		unsigned char checksum;		/* The checksum we have computed */
		int           count;			/* Index into the buffer */
		int 	     		ch;					/* Current character */
 
    /* Wait around for the start character ('$'). Ignore all other
	  characters */
    ch = get_rsp_char ();
 
    while (ch != '$')
		{
		  if (-1 == ch)
		    {
		      return  NULL;		/* Connection failed */
		    }
 
		  ch = get_rsp_char ();
 
		  // Potentially handle an interrupt character (0x03) here		  
		}
 
    /* Read until a '#' or end of buffer is found */
    checksum =  0;
    count    =  0;
    while (count < GDB_BUF_MAX - 1)
		{
		  ch = get_rsp_char ();
 
		  if(rsp.client_waiting && DEBUG_GDB)
		    {
		      printf("%x\n",ch);
		    }
 
 
		  /* Check for connection failure */
		  if (0 > ch)
		    {
		      return  NULL;
		    }
 
		  /* If we hit a start of line char begin all over again */
		  if ('$' == ch)
		    {
		      checksum =  0;
		      count    =  0;
 
		      continue;
		    }
 
		  /* Break out if we get the end of line char */
		  if ('#' == ch)
		    {
		      break;
		    }
 
		  /* Update the checksum and add the char to the buffer */
 
		  checksum        = checksum + (unsigned char)ch;
		  buf.data[count] = (char)ch;
		  count           = count + 1;
		}
 
    /* Mark the end of the buffer with EOS - it's convenient for non-binary
	  data to be valid strings. */
    buf.data[count] = 0;
    buf.len         = count;
 
    /* If we have a valid end of packet char, validate the checksum */
    if ('#' == ch)
		{
		  unsigned char  xmitcsum;	/* The checksum in the packet */
 
		  ch = get_rsp_char ();
		  if (0 > ch)
		    {
		      return  NULL;		/* Connection failed */
		    }
		  xmitcsum = hex (ch) << 4;
 
		  ch = get_rsp_char ();
		  if (0 > ch)
		    {
		      return  NULL;		/* Connection failed */
		    }
 
		  xmitcsum += hex (ch);
 
		  /* If the checksums don't match print a warning, and put the
		     negative ack back to the client. Otherwise put a positive ack. */
		  if (checksum != xmitcsum)
		    {
		      fprintf (stderr, "Warning: Bad RSP checksum: Computed "
			       "0x%02x, received 0x%02x\n", checksum, xmitcsum);
 
					ch = '-';
		      send_rsp_str ((unsigned char *) &ch, 1);	/* Failed checksum */
		    }
		  else
		    {
					ch = '+';
		      send_rsp_str ((unsigned char *) &ch, 1);	/* successful transfer */
		      break;
		    }
		}
    else
		{
		  fprintf (stderr, "Warning: RSP packet overran buffer\n");
		}
  }
  return &buf;				/* Success */
}	/* get_packet () */
 
 
/*---------------------------------------------------------------------------*/
/*!Put a single character out onto the client socket
 
   This should only be called if the client is open, but we check for safety.
 
   @param[in] c  The character to put out                                    */
/*---------------------------------------------------------------------------*/
static void
send_rsp_str (unsigned char *data, int len)
{
  if (-1 == rsp.client_fd)
    {
      fprintf (stderr, "Warning: Attempt to write '%s' to unopened RSP "
	       "client: Ignored\n", data);
      return;
    }
 
  /* Write until successful (we retry after interrupts) or catastrophic
     failure. */
  while (1)
    {
      switch (write (rsp.client_fd, data, len))
			{
			case -1:
			  /* Error: only allow interrupts or would block */
			  if ((EAGAIN != errno) && (EINTR != errno))
			    {
			      fprintf (stderr, "Warning: Failed to write to RSP client: "
				       "Closing client connection: %s\n",
				       strerror (errno));
			      rsp_client_close ();
			      return;
			    }
 
			  break;
 
			case 0:
			  break;		/* Nothing written! Try again */
 
			default:
			  return;		/* Success, we can return */
			}
    }
}	/* send_rsp_str () */
 
 
/*---------------------------------------------------------------------------*/
/*!Get a single character from the client socket
 
   This should only be called if the client is open, but we check for safety.
 
   @return  The character read, or -1 on failure                             */
/*---------------------------------------------------------------------------*/
static int
get_rsp_char ()
{
  if (-1 == rsp.client_fd)
    {
      fprintf (stderr, "Warning: Attempt to read from unopened RSP "
	       "client: Ignored\n");
      return  -1;
    }
 
  /* Non-blocking read until successful (we retry after interrupts) or
     catastrophic failure. */
  while (1)
    {
      unsigned char  c;
 
      switch (read (rsp.client_fd, &c, sizeof (c)))
	{
	case -1:
	  /* Error: only allow interrupts */
	  if ((EAGAIN != errno) && (EINTR != errno))
	    {
	      fprintf (stderr, "Warning: Failed to read from RSP client: "
		       "Closing client connection: %s\n",
		       strerror (errno));
	      rsp_client_close ();
	      return  -1;
	    }
 
	  break;
 
	case 0:
	  // EOF
	  rsp_client_close ();
	  return  -1;
 
	default:
	  return  c & 0xff; /* Success, we can return (no sign extend!) */
	}
    }
}	/* get_rsp_char () */
 
/*---------------------------------------------------------------------------*/
/* !Peek at data coming into server from GDB
 
   Useful for polling for ETX (0x3) chars being sent when GDB wants to
   interrupt
 
   @return the char we peeked, 0 otherwise                                   */
/*---------------------------------------------------------------------------*/
static char 
rsp_peek()
{
  /*
  if (-1 == rsp.client_fd)
    {
      fprintf (stderr, "Warning: Attempt to read from unopened RSP "
	       "client: Ignored\n");
      return  -1;
    }
  */
  char  c;
  int n;
  // Using recv here instead of read becuase we can pass the MSG_PEEK
  // flag, which lets us look at what's on the socket, without actually
  // taking it off
 
  //if (DEBUG_GDB) 
  //  printf("peeking at GDB socket...\n");
 
  n = recv (rsp.client_fd, &c, sizeof (c), MSG_PEEK);
 
  //if (DEBUG_GDB) 
  //  printf("peeked, got n=%d, c=0x%x\n",n, c);
 
  if (n > 0)
    return c;
  else
    return '\0';
 
}
 
/*---------------------------------------------------------------------------*/
/*!Handle an interrupt from GDB
 
 Detect an interrupt from GDB and stall the processor                        */
/*---------------------------------------------------------------------------*/
static void 
rsp_interrupt()
{
  unsigned char  c;
 
  if (read (rsp.client_fd, &c, sizeof (c)) <= 0)
    {
      // Had issues, just return
      return;
    }
 
  // Ensure this is a ETX control char (0x3), currently, we only call this
  // function when we've peeked and seen it, otherwise, ignore, return and pray
  // things go back to normal...
  if (c != 0x03)
    {
      printf("Warning: Interrupt character expected but not found on socket.\n");
      return;
    }
 
  // Otherwise, it's an interrupt packet, stall the processor, and upon return
  // to the main handle_rsp() loop, it will inform GDB.
 
  if (DEBUG_GDB) printf("Interrupt received from GDB. Stalling processor.\n");
 
  set_stall_state (1);
 
  // Send a stop reply response, manually set rsp.sigval to TARGET_SIGNAL_NONE
  rsp.sigval = TARGET_SIGNAL_NONE;
  rsp_report_exception();
  rsp.client_waiting = 0;		/* No longer waiting */  
 
  return;
 
}
 
 
/*---------------------------------------------------------------------------*/
/*!"Unescape" RSP binary data
 
   '#', '$' and '}' are escaped by preceding them by '}' and oring with 0x20.
 
   This function reverses that, modifying the data in place.
 
   @param[in] data  The array of bytes to convert
   @para[in]  len   The number of bytes to be converted
 
   @return  The number of bytes AFTER conversion                             */
/*---------------------------------------------------------------------------*/
static int
rsp_unescape (char *data,
	      int   len)
{
  int  from_off = 0;		/* Offset to source char */
  int  to_off   = 0;		/* Offset to dest char */
 
  while (from_off < len)
    {
      /* Is it escaped */
      if ( '}' == data[from_off])
			{
			  from_off++;
			  data[to_off] = data[from_off] ^ 0x20;
			}
		  else
			{
			  data[to_off] = data[from_off];
			}
 
      from_off++;
      to_off++;
    }
 
  return  to_off;
 
}	/* rsp_unescape () */
 
 
/*---------------------------------------------------------------------------*/
/*!Initialize the matchpoint hash table
 
   This is an open hash table, so this function clears all the links to
   NULL.                                                                     */
/*---------------------------------------------------------------------------*/
static void
mp_hash_init (void)
{
  int  i;
 
  for (i = 0; i < MP_HASH_SIZE; i++)
    {
      rsp.mp_hash[i] = NULL;
    }
}	/* mp_hash_init () */
 
 
/*---------------------------------------------------------------------------*/
/*!Add an entry to the matchpoint hash table
 
   Add the entry if it wasn't already there. If it was there do nothing. The
   match just be on type and addr. The instr need not match, since if this is
   a duplicate insertion (perhaps due to a lost packet) they will be
   different.
 
   @param[in] type   The type of matchpoint
   @param[in] addr   The address of the matchpoint
   @para[in]  instr  The instruction to associate with the address           */
/*---------------------------------------------------------------------------*/
static void
mp_hash_add (enum mp_type type,
	     uint32_t  addr,
	     uint32_t  instr)
{
  int              hv    = addr % MP_HASH_SIZE;
  struct mp_entry *curr;
 
  /* See if we already have the entry */
  for(curr = rsp.mp_hash[hv]; NULL != curr; curr = curr->next)
  {
    if ((type == curr->type) && (addr == curr->addr))
		{
		  return;		/* We already have the entry */
		}
  }
 
  /* Insert the new entry at the head of the chain */
  curr = (struct mp_entry*) malloc (sizeof (*curr));
 
  curr->type  = type;
  curr->addr  = addr;
  curr->instr = instr;
  curr->next  = rsp.mp_hash[hv];
 
  rsp.mp_hash[hv] = curr;
 
}	/* mp_hash_add () */
 
 
/*---------------------------------------------------------------------------*/
/*!Look up an entry in the matchpoint hash table
 
   The match must be on type AND addr.
 
   @param[in] type   The type of matchpoint
   @param[in] addr   The address of the matchpoint
 
   @return  The entry deleted, or NULL if the entry was not found            */
/*---------------------------------------------------------------------------*/
static struct mp_entry * mp_hash_lookup (enum mp_type type,	uint32_t addr)
{
  int    hv = addr % MP_HASH_SIZE;
  struct mp_entry *curr;
 
  /* Search */
  for (curr = rsp.mp_hash[hv]; NULL != curr; curr = curr->next)
  {
    if ((type == curr->type) && (addr == curr->addr))
		{
		  return  curr;		/* The entry found */
		}
  }
 
  /* Not found */
  return  NULL;
 
}	/* mp_hash_lookup () */
 
 
/*---------------------------------------------------------------------------*/
/*!Delete an entry from the matchpoint hash table
 
   If it is there the entry is deleted from the hash table. If it is not
   there, no action is taken. The match must be on type AND addr.
 
   The usual fun and games tracking the previous entry, so we can delete
   things.
 
   @note  The deletion DOES NOT free the memory associated with the entry,
          since that is returned. The caller should free the memory when they
          have used the information.
 
   @param[in] type   The type of matchpoint
   @param[in] addr   The address of the matchpoint
 
   @return  The entry deleted, or NULL if the entry was not found            */
/*---------------------------------------------------------------------------*/
static struct mp_entry *
mp_hash_delete (enum mp_type       type,
		uint32_t  addr)
{
  int              hv   = addr % MP_HASH_SIZE;
  struct mp_entry *prev = NULL;
  struct mp_entry *curr;
 
  /* Search */
  for (curr  = rsp.mp_hash[hv]; NULL != curr; curr = curr->next)
    {
      if ((type == curr->type) && (addr == curr->addr))
	{
	  /* Found - delete. Method depends on whether we are the head of
	     chain. */
	  if (NULL == prev)
	    {
	      rsp.mp_hash[hv] = curr->next;
	    }
	  else
	    {
	      prev->next = curr->next;
	    }
 
	  return  curr;		/* The entry deleted */
	}
 
      prev = curr;
    }
 
  /* Not found */
  return  NULL;
 
}	/* mp_hash_delete () */
 
 
/*---------------------------------------------------------------------------*/
/*!Utility to give the value of a hex char
 
   @param[in] ch  A character representing a hexadecimal digit. Done as -1,
                  for consistency with other character routines, which can use
                  -1 as EOF.
 
   @return  The value of the hex character, or -1 if the character is
            invalid.                                                         */
/*---------------------------------------------------------------------------*/
static int hex (int  c)
{
  return  ((c >= 'a') && (c <= 'f')) ? c - 'a' + 10 :
          ((c >= '0') && (c <= '9')) ? c - '0' :
          ((c >= 'A') && (c <= 'F')) ? c - 'A' + 10 : -1;
 
}	/* hex () */
 
 
/*---------------------------------------------------------------------------*/
/*!Convert a register to a hex digit string
 
   The supplied 32-bit value is converted to an 8 digit hex string according
   the target endianism. It is null terminated for convenient printing.
 
   @param[in]  val  The value to convert
   @param[out] p_buf  The buffer for the text string                           */
/*---------------------------------------------------------------------------*/
static void
reg2hex (uint32_t  val, char *p_buf)
{
  int  n;			/* Counter for digits */
	int  nyb_shift;
 
  for (n = 0; n < 8; n++)
    {
#ifdef WORDSBIGENDIAN
      if(n%2==0){
      	nyb_shift = n * 4 + 4;
			}
			else{
				nyb_shift = n * 4 - 4;
			}
#else
      nyb_shift = 28 - (n * 4);
#endif
      p_buf[n] = hexchars[(val >> nyb_shift) & 0xf];
    }
 
  p_buf[8] = 0;			/* Useful to terminate as string */
 
}	/* reg2hex () */
 
 
/*---------------------------------------------------------------------------*/
/*!Convert a hex digit string to a register value
 
   The supplied 8 digit hex string is converted to a 32-bit value according
   the target endianism
 
   @param[in] p_buf  The buffer with the hex string
 
   @return  The value to convert                                             */
/*---------------------------------------------------------------------------*/
static uint32_t
hex2reg (char *p_buf)
{
  int                n;		/* Counter for digits */
  uint32_t  val = 0;	/* The result */
 
  for (n = 0; n < 8; n++)
    {
#ifdef WORDSBIGENDIAN
      int  nyb_shift = n * 4;
#else
      int  nyb_shift = 28 - (n * 4);
#endif
      val |= hex (p_buf[n]) << nyb_shift;
    }
 
  return val;
 
}	/* hex2reg () */
 
 
/*---------------------------------------------------------------------------*/
/*!Convert an ASCII character string to pairs of hex digits
 
   Both source and destination are null terminated.
 
   @param[out] dest  Buffer to store the hex digit pairs (null terminated)
   @param[in]  src   The ASCII string (null terminated)                      */
/*---------------------------------------------------------------------------*/
static void  ascii2hex (char *dest,
			char *src)
{
  int  i;
 
  /* Step through converting the source string */
  for (i = 0; src[i] != '\0'; i++)
    {
      char  ch = src[i];
 
      dest[i * 2]     = hexchars[ch >> 4 & 0xf];
      dest[i * 2 + 1] = hexchars[ch      & 0xf];
    }
 
  dest[i * 2] = '\0';
 
}	/* ascii2hex () */
 
 
/*---------------------------------------------------------------------------*/
/*!Convert pairs of hex digits to an ASCII character string
 
   Both source and destination are null terminated.
 
   @param[out] dest  The ASCII string (null terminated)
   @param[in]  src   Buffer holding the hex digit pairs (null terminated)    */
/*---------------------------------------------------------------------------*/
static void  hex2ascii (char *dest,
			char *src)
{
  int  i;
 
  /* Step through convering the source hex digit pairs */
  for (i = 0; src[i * 2] != '\0' && src[i * 2 + 1] != '\0'; i++)
    {
      dest[i] = ((hex (src[i * 2]) & 0xf) << 4) | (hex (src[i * 2 + 1]) & 0xf);
    }
 
  dest[i] = '\0';
 
}	/* hex2ascii () */
 
 
/*---------------------------------------------------------------------------*/
/*!Set the program counter
 
   This sets the value in the NPC SPR. Not completely trivial, since this is
   actually cached in cpu_state.pc. Any reset of the NPC also involves
   clearing the delay state and setting the pcnext global.
 
   Only actually do this if the requested address is different to the current
   NPC (avoids clearing the delay pipe).
 
   @param[in] addr  The address to use                                       */
/*---------------------------------------------------------------------------*/
static void
set_npc (uint32_t  addr)
{
 
  // First set the chain 
  gdb_set_chain(SC_RISC_DEBUG);	/* 1 RISC Debug Interface chain */
 
 
  if (addr != get_npc())
  {
 
    gdb_write_reg(NPC_CPU_REG_ADD, addr);
 
    if (STALLED == stallState)
      {
	if (DEBUG_GDB) printf("set_npc(): New NPC value (0x%08x) written and locally cached \n", addr);
	npcCachedValue = addr;
	npcIsCached = 1;
      }
    else
      {
	if (DEBUG_GDB) printf("set_npc(): New NPC value (0x%08x) written \n", addr);
	npcIsCached = 0;
      }
 
 
  }
  else
    return;
 
 
}	/* set_npc () */
 
 
//! Read the value of the Next Program Counter (a SPR)
 
//! Setting the NPC flushes the pipeline, so subsequent reads will return
//! zero until the processor has refilled the pipeline. This will not be
//! happening if the processor is stalled (as it is when GDB had control),
//! so we must cache the NPC. As soon as the processor is unstalled, this
//! cached value becomes invalid.
 
//! If we are stalled and the value has been cached, use it. If we are stalled
//! and the value has not been cached, cache it (for efficiency) and use
//! it. Otherwise read the corresponding SPR.
 
//! @return  The value of the NPC
static uint32_t get_npc ()
{
  uint32_t current_npc;
 
  if (STALLED == stallState)
    {
      if (npcIsCached == 0)
	{
	  err = gdb_set_chain(SC_RISC_DEBUG);
	  err = gdb_read_reg(NPC_CPU_REG_ADD, &npcCachedValue);
	  if(err > 0){
	    printf("Error %d reading NPC\n", err);
	    rsp_client_close ();
	    return 0;
	  }
	  if (DEBUG_GDB) printf("get_npc(): caching newly read NPC value (0x%08x)\n",npcCachedValue);
 
 
	  npcIsCached    = 1;
	}
      else
	if (DEBUG_GDB) printf("get_npc(): reading cached NPC value (0x%08x)\n",npcCachedValue);
 
      return  npcCachedValue;
    }
  else
    {
      err = gdb_read_reg(NPC_CPU_REG_ADD, &current_npc);
      if(err > 0){
	printf("Error %d reading NPC\n", err);
	rsp_client_close ();
	return 0;
      }
      return current_npc;
 
    }
}	// get_npc ()
 
 
 
/*---------------------------------------------------------------------------*/
/*!Send a packet acknowledging an exception has occurred
 
   This is only called if there is a client FD to talk to                    */
/*---------------------------------------------------------------------------*/
static void
rsp_report_exception (void)
{
  struct rsp_buf  buffer;
 
  /* Construct a signal received packet */
  buffer.data[0] = 'S';
  buffer.data[1] = hexchars[rsp.sigval >> 4];
  buffer.data[2] = hexchars[rsp.sigval % 16];
  buffer.data[3] = 0;
  buffer.len     = strlen (buffer.data);
 
  put_packet (&buffer);
 
}	/* rsp_report_exception () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP continue request
 
   Parse the command to see if there is an address. Uses the underlying
   generic continue function, with EXCEPT_NONE.
 
   @param[in] p_buf  The full continue packet                                  */
/*---------------------------------------------------------------------------*/
static void
rsp_continue (struct rsp_buf *p_buf)
{
  uint32_t  addr;		/* Address to continue from, if any */
 
  // First set the chain 
  err = gdb_set_chain(SC_RISC_DEBUG);	/* 1 RISC Debug Interface chain */
 
  // Make sure the processor is stalled
  gdb_ensure_or1k_stalled();
 
  if(err > 0){
    printf("Error %d to set RISC Debug Interface chain in the CONTINUE command 'c'\n", err);
    rsp_client_close ();
    return;
  }
 
  if (0 == strcmp ("c", p_buf->data))
  {
    // Arc Sim Code -->   addr = cpu_state.pc;	/* Default uses current NPC */
    /* ---------- NPC ---------- */
    addr = get_npc();
  }
  else if (1 != sscanf (p_buf->data, "c%x", &addr))
  {
    fprintf (stderr,
       "Warning: RSP continue address %s not recognized: ignored\n",
       p_buf->data);
 
    // Arc Sim Code -->   addr = cpu_state.pc;	/* Default uses current NPC */
    /* ---------- NPC ---------- */
    addr = get_npc();
  }
 
  if (DEBUG_GDB) printf("rsp_continue() --> Read NPC = 0x%08x\n", addr);
 
  rsp_continue_generic (addr, EXCEPT_NONE);
 
}	/* rsp_continue () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP continue with signal request
 
   Currently null. Will use the underlying generic continue function.
 
   @param[in] p_buf  The full continue with signal packet                      */
/*---------------------------------------------------------------------------*/
static void
rsp_continue_with_signal (struct rsp_buf *p_buf)
{
  printf ("RSP continue with signal '%s' received\n", p_buf->data);
 
}	/* rsp_continue_with_signal () */
 
 
/*---------------------------------------------------------------------------*/
/*!Generic processing of a continue request
 
   The signal may be EXCEPT_NONE if there is no exception to be
   handled. Currently the exception is ignored.
 
   The single step flag is cleared in the debug registers and then the
   processor is unstalled.
 
   @param[in] addr    Address from which to step
   @param[in] except  The exception to use (if any)                          */
/*---------------------------------------------------------------------------*/
static void
rsp_continue_generic (uint32_t  addr,
		      uint32_t  except)
{
  uint32_t		temp_uint32;
 
  /* Set the address as the value of the next program counter */
  set_npc (addr);
 
  /* Clear Debug Reason Register (DRR) 0x3015 */
  // Arc sim --> cpu_state.sprs[SPR_DRR]   = 0;
  if(gdb_write_reg(DRR_CPU_REG_ADD, 0)) printf("Error write to DRR register\n");  
 
  /* Clear watchpoint break generation in Debug Mode Register 2	(DMR2) 0x3011 */
  // Arc sim --> cpu_state.sprs[SPR_DMR2] &= ~SPR_DMR2_WGB;
  if(gdb_read_reg(DMR2_CPU_REG_ADD, &temp_uint32)) printf("Error read from DMR2 register\n");
  temp_uint32 &= ~SPR_DMR2_WGB;
  if(gdb_write_reg(DMR2_CPU_REG_ADD, temp_uint32)) printf("Error write to DMR2 register\n");  
 
  /* Clear the single step trigger in Debug Mode Register 1 (DMR1) Register 0x3010 */
  // Arc sim --> cpu_state.sprs[SPR_DMR1] &= ~SPR_DMR1_ST;
  if(gdb_read_reg(DMR1_CPU_REG_ADD, &temp_uint32)) printf("Error read from DMR1 register\n");
  temp_uint32 &= ~SPR_DMR1_ST;
  if(gdb_write_reg(DMR1_CPU_REG_ADD, temp_uint32)) printf("Error write to DMR1 register\n");  
 
  /* Set traps to be handled by the debug unit in the Debug Stop Register (DSR) Register 0x3014 */
  // Arc sim --> cpu_state.sprs[SPR_DSR]  |= SPR_DSR_TE;
  if(gdb_read_reg(DSR_CPU_REG_ADD, &temp_uint32)) printf("Error read from DSR register\n");
  temp_uint32 |= SPR_DSR_TE;
  if(gdb_write_reg(DSR_CPU_REG_ADD, temp_uint32)) printf("Error write to DSR register\n");  
 
  /* Unstall the processor */
  set_stall_state (0);
 
  /* Note the GDB client is now waiting for a reply. */
  rsp.client_waiting = 1;
 
}	/* rsp_continue_generic () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP read all registers request
 
   The registers follow the GDB sequence for OR1K: GPR0 through GPR31, PPC
   (i.e. SPR PPC), NPC (i.e. SPR NPC) and SR (i.e. SPR SR). Each register is
   returned as a sequence of bytes in target endian order.
 
   Each byte is packed as a pair of hex digits.                              */
/*---------------------------------------------------------------------------*/
static void
rsp_read_all_regs (void)
{
  struct rsp_buf  buffer;			/* Buffer for the reply */
  int             r;			  	/* Register index */
  uint32_t   temp_uint32;
 
  // Make sure the processor is stalled
  gdb_ensure_or1k_stalled();
 
  // First set the chain 
  gdb_set_chain(SC_RISC_DEBUG);	/* 1 RISC Debug Interface chain */
 
 
  // Read all GPRs
  for (r = 0; r < MAX_GPRS; r++){
 
    err = gdb_read_reg(0x400 + r, &temp_uint32);
    if(err > 0){
      if (DEBUG_GDB) printf("Error %d in gdb_read_reg at reg. %d\n", err, r);
      put_str_packet ("E01");
      return;
    }
    reg2hex (temp_uint32, &(buffer.data[r * 8]));
 
    if (DEBUG_GDB_DUMP_DATA){
      switch(r % 4)
	{
	case 0:	 
	  printf("gpr%02d   0x%08x  ", r, temp_uint32);
	  break;
	case 1:	 
	case 2:
	  printf("0x%08x  ", temp_uint32);	 
	  break;
	case 3:	 
	  printf("0x%08x\n", temp_uint32);
	  break;
	default:
	  break;
	}
    }
 
  }
  /* ---------- PPC ---------- */
  err = gdb_read_reg(PPC_CPU_REG_ADD, &temp_uint32);
  if(err > 0){
  	if (DEBUG_GDB) printf("Error %d in gdb_read_reg read --> PPC\n", err);
  	put_str_packet ("E01");
  	return;
  }
  reg2hex (temp_uint32, &(buffer.data[PPC_REGNUM * 8]));
  if (DEBUG_GDB_DUMP_DATA)	printf("PPC     0x%08x\n", temp_uint32);
  /* ---------- NPC ---------- */
  temp_uint32 = get_npc();
  /*
  err = gdb_read_reg(NPC_CPU_REG_ADD, &temp_uint32);
  if(err > 0){
  	if (DEBUG_GDB) printf("Error %d in gdb_read_reg read --> NPC\n", err);
  	put_str_packet ("E01");
  	return;
  }
  */
  reg2hex (temp_uint32, &(buffer.data[NPC_REGNUM * 8]));
  if (DEBUG_GDB_DUMP_DATA)	printf("NPC     0x%08x\n", temp_uint32);
  /* ---------- SR ---------- */
  err = gdb_read_reg(SR_CPU_REG_ADD, &temp_uint32);
  if(err > 0){
  	if (DEBUG_GDB) printf("Error %d in gdb_read_reg read --> SP\n", err);
  	put_str_packet ("E01");
  	return;
  }
  reg2hex (temp_uint32, &(buffer.data[SR_REGNUM * 8]));
	if (DEBUG_GDB_DUMP_DATA)	printf("SR      0x%08x\n", temp_uint32);
 
  /* Finalize the packet and send it */
  buffer.data[NUM_REGS * 8] = 0;
  buffer.len                = NUM_REGS * 8;
 
  put_packet (&buffer);
	return;
}	/* rsp_read_all_regs () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP write all registers request
 
   The registers follow the GDB sequence for OR1K: GPR0 through GPR31, PPC
   (i.e. SPR PPC), NPC (i.e. SPR NPC) and SR (i.e. SPR SR). Each register is
   supplied as a sequence of bytes in target endian order.
 
   Each byte is packed as a pair of hex digits.
 
   @todo There is no error checking at present. Non-hex chars will generate a
         warning message, but there is no other check that the right amount
         of data is present. The result is always "OK".
 
   @param[in] p_buf  The original packet request.                              */
/*---------------------------------------------------------------------------*/
static void
rsp_write_all_regs (struct rsp_buf *p_buf)
{
  uint32_t  regnum;				/* Register index */
  // char          valstr[9];		/* Allow for EOS on the string */
 
  // /* Check for valid data */
  // if (0 != (strcmp ("G", p_buf->data)) && (GDB_BUF_MAX != strlen(p_buf->data)))
  // {
  //   fprintf (stderr, "Warning: Failed to recognize RSP write register "
  //      "command: %s\n", p_buf->data);
  //   // put_str_packet ("E01");
  //   return;
  // }
 
  // Make sure the processor is stalled
  gdb_ensure_or1k_stalled();
 
  // First set the chain 
  err = gdb_set_chain(SC_RISC_DEBUG);	/* 1 RISC Debug Interface chain */
  if(err > 0){
  	if (DEBUG_GDB) printf("Error %d in gdb_set_chain\n", err);
    put_str_packet ("E01");
  	return;
	}
 
  /* ---------- GPRS ---------- */
  for (regnum = 0; regnum < MAX_GPRS; regnum++)
  {
    err = gdb_write_reg(0x400 + regnum, hex2reg (&p_buf->data[regnum * 8 + 1]));
	  if(err > 0){
	  	if (DEBUG_GDB) printf("Error %d in rsp_write_reg write --> GPRS\n", err);
	    put_str_packet ("E01");
	  	return;
	  }
  }																	 
 
  /* ---------- PPC ---------- */
  err = gdb_write_reg(PPC_CPU_REG_ADD, hex2reg (&p_buf->data[PPC_REGNUM * 8 + 1]));
  if(err > 0){
  	if (DEBUG_GDB) printf("Error %d in rsp_write_reg write --> PPC\n", err);
    put_str_packet ("E01");
  	return;
  }
  /* ---------- SR ---------- */
  err = gdb_write_reg(SR_CPU_REG_ADD, hex2reg (&p_buf->data[SR_REGNUM * 8 + 1]));
  if(err > 0){
  	if (DEBUG_GDB) printf("Error %d in rsp_write_reg write --> SR\n", err);
    put_str_packet ("E01");
  	return;
  }
  /* ---------- NPC ---------- */
  set_npc(hex2reg (&p_buf->data[NPC_REGNUM * 8 + 1]));
  /*
  err = gdb_write_reg(NPC_CPU_REG_ADD, hex2reg (&p_buf->data[NPC_REGNUM * 8 + 1]));
  if(err > 0){
  	if (DEBUG_GDB) printf("Error %d in rsp_write_reg write --> NPC\n", err);
    put_str_packet ("E01");
  	return;
  }
  */
  /* Acknowledge. TODO: We always succeed at present, even if the data was
     defective. */
  put_str_packet ("OK");
}	/* rsp_write_all_regs () */
 
 
/*---------------------------------------------------------------------------*/
/* Handle a RSP read memory (symbolic) request
 
   Syntax is:
 
     m<addr>,<length>:
 
   The response is the bytes, lowest address first, encoded as pairs of hex
   digits.
 
   The length given is the number of bytes to be read.
 
   @note This function reuses p_buf, so trashes the original command.
 
   @param[in] p_buf  The command received                                      */
/*---------------------------------------------------------------------------*/
static void rsp_read_mem (struct rsp_buf *p_buf)
{
  unsigned int    addr;			/* Where to read the memory */
  int             len;			/* Number of bytes to read */
  int             off;			/* Offset into the memory */
	uint32_t		temp_uint32 = 0;
  char 						*rec_buf;
 
 
  if (2 != sscanf (p_buf->data, "m%x,%x:", &addr, &len))
  {
    fprintf (stderr, "Warning: Failed to recognize RSP read memory "
       "command: %s\n", p_buf->data);
    put_str_packet ("E01");
    return;
  }
 
  /* Make sure we won't overflow the buffer (2 chars per byte) */
  if ((len * 2) >= GDB_BUF_MAX)
  {
    fprintf (stderr, "Warning: Memory read %s too large for RSP packet: "
       "truncated\n", p_buf->data);
    len = (GDB_BUF_MAX - 1) / 2;
	}
 
  if(!(rec_buf = (char*)malloc(len))) {
    put_str_packet ("E01");
    ProtocolClean(0, JTAG_PROXY_OUT_OF_MEMORY);
    return;
  }
 
  // Make sure the processor is stalled
  gdb_ensure_or1k_stalled();
 
  // Set chain 5 --> Wishbone Memory chain
  err = gdb_set_chain(SC_WISHBONE);
  if(err){
  	if (DEBUG_GDB) printf("Error %d in gdb_set_chain\n", err);
  	put_str_packet ("E01");
    return;
	}
 
  // Read the data from Wishbone Memory chain
  err = gdb_read_block(addr, (uint32_t*)rec_buf, len); 
  if(err){
  	put_str_packet ("E01");
		return;
	}
 
  /* Refill the buffer with the reply */
  for( off = 0 ; off < len ; off ++ ) {
		;
		temp_uint32 = (temp_uint32 << 8) | (0x000000ff & *(rec_buf + off));
 
		if((off %4 ) == 3){
			temp_uint32 = htonl(temp_uint32);
			reg2hex (temp_uint32, &(p_buf->data[off * 2 - 6]));
		}
		if (DEBUG_GDB_BLOCK_DATA){
		  switch(off % 16)
			{
				case 3:	 
					printf("Add 0x%08x   Data 0x%08x  ", addr + off - 3, temp_uint32);
					break;
				case 7:	 
				case 11:
					printf("0x%08x  ", temp_uint32);	 
					break;
				case 15:	 
					printf("0x%08x\n", temp_uint32);
					break;
				default:
					break;
			}
			if ((len - off == 1) && (off % 16) < 15) printf("\n");
		}
  }
 
  if (DEBUG_GDB && (err > 0)) printf("\nError %x\n", err);fflush (stdout);
	free(rec_buf);
  p_buf->data[off * 2] = 0;			/* End of string */
  p_buf->len           = strlen (p_buf->data);
  put_packet (p_buf);
}	/* rsp_read_mem () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP write memory (symbolic) request	 ("M")
 
   Syntax is:
 
     M<addr>,<length>:<data>
 
  	Example: M4015cc,2:c320# 
	  (Write the value 0xc320 to address 0x4015cc.) 
 
		An example target response: 
		+ $OK# 
 
   The data is the bytes, lowest address first, encoded as pairs of hex
   digits.
 
   The length given is the number of bytes to be written.
 
   @note This function reuses p_buf, so trashes the original command.
 
   @param[in] p_buf  The command received                                      */
/*---------------------------------------------------------------------------*/
static void
rsp_write_mem (struct rsp_buf *p_buf)
{
  unsigned int    addr;			/* Where to write the memory */
  int             len;			/* Number of bytes to write */
  char           *symdat;		/* Pointer to the symboli data */
  int             datlen;		/* Number of digits in symbolic data */
  int             off;			/* Offset into the memory */
  int             nibc;			/* Nibbel counter */
	uint32_t   val;
 
  if (2 != sscanf (p_buf->data, "M%x,%x:", &addr, &len))
  {
    fprintf (stderr, "Warning: Failed to recognize RSP write memory "
       "command: %s\n", p_buf->data);
    put_str_packet ("E01");
    return;
  }
 
  /* Find the start of the data and check there is the amount we expect. */
  symdat = (char*) memchr ((const void *)p_buf->data, ':', GDB_BUF_MAX) + 1;
  datlen = p_buf->len - (symdat - p_buf->data);
 
  /* Sanity check */
  if (len * 2 != datlen)
  {
    fprintf (stderr, "Warning: Write of %d digits requested, but %d digits "
       "supplied: packet ignored\n", len * 2, datlen );
    put_str_packet ("E01");
    return;
  }
 
  // Make sure the processor is stalled
  gdb_ensure_or1k_stalled();
 
 
  // Set chain 5 --> Wishbone Memory chain
  err = gdb_set_chain(SC_WISHBONE);
	if(err){
    put_str_packet ("E01");
    return;
	}
 
	val = 0;
	off = 0;
  /* Write the bytes to memory */
  for (nibc = 0; nibc < datlen; nibc++)
  {
		val |= 0x0000000f & hex (symdat[nibc]);
		if(nibc % 8 == 7){
			err = gdb_write_block(addr + off, &val, 4);
			if (DEBUG_GDB) printf("Error %x\n", err);fflush (stdout);
			if(err){
				put_str_packet ("E01");
				return;
			}
		  val = 0;
			off += 4;
		}	  
	  val <<= 4;
  }
  put_str_packet ("OK");
}	/* rsp_write_mem () */
 
 
/*---------------------------------------------------------------------------*/
/*!Read a single register
 
   The registers follow the GDB sequence for OR1K: GPR0 through GPR31, PC
   (i.e. SPR NPC) and SR (i.e. SPR SR). The register is returned as a
   sequence of bytes in target endian order.
 
   Each byte is packed as a pair of hex digits.
 
   @param[in] p_buf  The original packet request. Reused for the reply.        */
/*---------------------------------------------------------------------------*/
static void
rsp_read_reg (struct rsp_buf *p_buf)
{
  unsigned int  	regnum;
	uint32_t 	temp_uint32;
 
  /* Break out the fields from the data */
  if (1 != sscanf (p_buf->data, "p%x", &regnum))
    {
      fprintf (stderr, "Warning: Failed to recognize RSP read register "
	       "command: %s\n", p_buf->data);
      put_str_packet ("E01");
      return;
    }
 
  // Make sure the processor is stalled
  gdb_ensure_or1k_stalled();
 
  // First set the chain 
  err = gdb_set_chain(SC_RISC_DEBUG);	/* 1 RISC Debug Interface chain */
  if(err > 0){
  	if (DEBUG_GDB) printf("Error %d in gdb_set_chain\n", err);
    put_str_packet ("E01");
  	return;
	}
 
  /* Get the relevant register */
  if (regnum < MAX_GPRS)
    {
		  err = gdb_read_reg(0x400 + regnum, &temp_uint32);
		  if(err > 0){
		  	if (DEBUG_GDB) printf("Error %d in rsp_read_reg at reg. %d \n", err, regnum);
		    put_str_packet ("E01");
		  	return;
		  }
		  reg2hex (temp_uint32, p_buf->data);
    }
  else if (PPC_REGNUM == regnum)	/* ---------- PPC ---------- */
    {
		  err = gdb_read_reg(PPC_CPU_REG_ADD, &temp_uint32);
		  if(err > 0){
		  	if (DEBUG_GDB) printf("Error %d in rsp_read_reg read --> PPC\n", err);
		    put_str_packet ("E01");
		  	return;
		  }
		  reg2hex (temp_uint32, p_buf->data);
    }
  else if (NPC_REGNUM == regnum)	/* ---------- NPC ---------- */
    {
      temp_uint32 = get_npc();
      /*
      err = gdb_read_reg(NPC_CPU_REG_ADD, &temp_uint32);
      if(err > 0){
	if (DEBUG_GDB) printf("Error %d in rsp_read_reg read --> PPC\n", err);
	put_str_packet ("E01");
	return;
      }
      */
      reg2hex (temp_uint32, p_buf->data);
    }
  else if (SR_REGNUM == regnum)		/* ---------- SR ---------- */
    {
      err = gdb_read_reg(SR_CPU_REG_ADD, &temp_uint32);
      if(err > 0){
	if (DEBUG_GDB) printf("Error %d in rsp_read_reg read --> PPC\n", err);
	put_str_packet ("E01");
	return;
      }
      reg2hex (temp_uint32, p_buf->data);
    }
  else
    {
      /* Error response if we don't know the register */
      fprintf (stderr, "Warning: Attempt to read unknown register 0x%x: "
	       "ignored\n", regnum);
      put_str_packet ("E01");
      return;
    }
 
  p_buf->len = strlen (p_buf->data);
  put_packet (p_buf);
 
}	/* rsp_read_reg () */
 
 
/*---------------------------------------------------------------------------*/
/*!Write a single register
 
   The registers follow the GDB sequence for OR1K: GPR0 through GPR31, PC
   (i.e. SPR NPC) and SR (i.e. SPR SR). The register is specified as a
   sequence of bytes in target endian order.
 
   Each byte is packed as a pair of hex digits.
 
   @param[in] p_buf  The original packet request.                              */
/*---------------------------------------------------------------------------*/
static void
rsp_write_reg (struct rsp_buf *p_buf)
{
  unsigned int  regnum;
  char          valstr[9];		/* Allow for EOS on the string */
	// int           err = 0;
 
  /* Break out the fields from the data */
  if (2 != sscanf (p_buf->data, "P%x=%8s", &regnum, valstr))
    {
      fprintf (stderr, "Warning: Failed to recognize RSP write register "
	       "command: %s\n", p_buf->data);
      put_str_packet ("E01");
      return;
    }
 
  // Make sure the processor is stalled
  gdb_ensure_or1k_stalled();
 
  // First set the chain 
  err = gdb_set_chain(SC_RISC_DEBUG);	/* 1 RISC Debug Interface chain */
  if(err > 0){
  	if (DEBUG_GDB) printf("Error %d in gdb_set_chain\n", err);
    put_str_packet ("E01");
  	return;
	}
 
  /* Set the relevant register */
  if (regnum < MAX_GPRS)				 /* ---------- GPRS ---------- */
		{
      err = gdb_write_reg(0x400 + regnum, hex2reg (valstr));
		  if(err > 0){
		  	if (DEBUG_GDB) printf("Error %d in rsp_write_reg write --> GPRS\n", err);
		    put_str_packet ("E01");
		  	return;
		  }
    }
  else if (PPC_REGNUM == regnum) /* ---------- PPC ---------- */
    {
      err = gdb_write_reg(PPC_CPU_REG_ADD, hex2reg (valstr));
		  if(err > 0){
		  	if (DEBUG_GDB) printf("Error %d in rsp_write_reg write --> PPC\n", err);
		    put_str_packet ("E01");
		  	return;
		  }
    }
  else if (NPC_REGNUM == regnum) /* ---------- NPC ---------- */
    {
      set_npc(hex2reg (valstr));
      /*
      err = gdb_write_reg(NPC_CPU_REG_ADD, hex2reg (valstr));
      if(err > 0){
	if (DEBUG_GDB) printf("Error %d in rsp_write_reg write --> NPC\n", err);
	put_str_packet ("E01");
	return;
      }
      */
    }
  else if (SR_REGNUM == regnum)	 /* ---------- SR ---------- */
    {
      err = gdb_write_reg(SR_CPU_REG_ADD, hex2reg (valstr));
		  if(err > 0){
		  	if (DEBUG_GDB) printf("Error %d in rsp_write_reg write --> SR\n", err);
		    put_str_packet ("E01");
		  	return;
		  }
    }
  else
    {
      /* Error response if we don't know the register */
      fprintf (stderr, "Warning: Attempt to write unknown register 0x%x: "
	       "ignored\n", regnum);
      put_str_packet ("E01");
      return;
    }
 
  put_str_packet ("OK");
 
}	/* rsp_write_reg () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP query request
 
   @param[in] p_buf  The request                                               */
/*---------------------------------------------------------------------------*/
static void
rsp_query (struct rsp_buf *p_buf)
{
  if (0 == strcmp ("qC", p_buf->data))
    {
      /* Return the current thread ID (unsigned hex). A null response
	 indicates to use the previously selected thread. Since we do not
	 support a thread concept, this is the appropriate response. */
      put_str_packet ("");
    }
  else if (0 == strncmp ("qCRC", p_buf->data, strlen ("qCRC")))
    {
      /* Return CRC of memory area */
      fprintf (stderr, "Warning: RSP CRC query not supported\n");
      put_str_packet ("E01");
    }
  else if (0 == strcmp ("qfThreadInfo", p_buf->data))
    {
      /* Return info about active threads. We return just '-1' */
      put_str_packet ("m-1");
    }
  else if (0 == strcmp ("qsThreadInfo", p_buf->data))
    {
      /* Return info about more active threads. We have no more, so return the
	 end of list marker, 'l' */
      put_str_packet ("l");
    }
  else if (0 == strncmp ("qGetTLSAddr:", p_buf->data, strlen ("qGetTLSAddr:")))
    {
      /* We don't support this feature */
      put_str_packet ("");
    }
  else if (0 == strncmp ("qL", p_buf->data, strlen ("qL")))
    {
      /* Deprecated and replaced by 'qfThreadInfo' */
      fprintf (stderr, "Warning: RSP qL deprecated: no info returned\n");
      put_str_packet ("qM001");
    }
  else if (0 == strcmp ("qOffsets", p_buf->data))
    {
      /* Report any relocation */
      put_str_packet ("Text=0;Data=0;Bss=0");
    }
  else if (0 == strncmp ("qP", p_buf->data, strlen ("qP")))
    {
      /* Deprecated and replaced by 'qThreadExtraInfo' */
      fprintf (stderr, "Warning: RSP qP deprecated: no info returned\n");
      put_str_packet ("");
    }
  else if (0 == strncmp ("qRcmd,", p_buf->data, strlen ("qRcmd,")))
    {
      /* This is used to interface to commands to do "stuff" */
      rsp_command (p_buf);
    }
  else if (0 == strncmp ("qSupported", p_buf->data, strlen ("qSupported")))
    {
      /* Report a list of the features we support. For now we just ignore any
				 supplied specific feature queries, but in the future these may be
				 supported as well. Note that the packet size allows for 'G' + all the
				 registers sent to us, or a reply to 'g' with all the registers and an
				 EOS so the buffer is a well formed string. */
      setup_or32();	// setup cpu
      char  reply[GDB_BUF_MAX];
      sprintf (reply, "PacketSize=%x", GDB_BUF_MAX);
      put_str_packet (reply);
    }
  else if (0 == strncmp ("qSymbol:", p_buf->data, strlen ("qSymbol:")))
    {
      /* Offer to look up symbols. Nothing we want (for now). TODO. This just
	 ignores any replies to symbols we looked up, but we didn't want to
	 do that anyway! */
      put_str_packet ("OK");
    }
  else if (0 == strncmp ("qThreadExtraInfo,", p_buf->data,
			 strlen ("qThreadExtraInfo,")))
    {
      /* Report that we are runnable, but the text must be hex ASCI
	 digits. For now do this by steam, reusing the original packet */
      sprintf (p_buf->data, "%02x%02x%02x%02x%02x%02x%02x%02x%02x",
	       'R', 'u', 'n', 'n', 'a', 'b', 'l', 'e', 0);
      p_buf->len = strlen (p_buf->data);
      put_packet (p_buf);
    }
  else if (0 == strncmp ("qXfer:", p_buf->data, strlen ("qXfer:")))
    {
      /* For now we support no 'qXfer' requests, but these should not be
	 expected, since they were not reported by 'qSupported' */
      fprintf (stderr, "Warning: RSP 'qXfer' not supported: ignored\n");
      put_str_packet ("");
    }
  else
    {
      fprintf (stderr, "Unrecognized RSP query: ignored\n");
    }
}	/* rsp_query () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP qRcmd request
 
  The actual command follows the "qRcmd," in ASCII encoded to hex
 
   @param[in] p_buf  The request in full                                       */
/*---------------------------------------------------------------------------*/
static void
rsp_command (struct rsp_buf *p_buf)
{
  char  cmd[GDB_BUF_MAX];
  unsigned int      regno;
  uint32_t 		temp_uint32;
 
  hex2ascii (cmd, &(p_buf->data[strlen ("qRcmd,")]));
 
  /* Work out which command it is */
  if (0 == strncmp ("readspr ", cmd, strlen ("readspr")))
  {
    /* Parse and return error if we fail */
    if( 1 != sscanf (cmd, "readspr %4x", &regno))
      {
	fprintf (stderr, "Warning: qRcmd %s not recognized: ignored\n", cmd);
	put_str_packet ("E01");
	return;
      }
 
    /* SPR out of range */
    if (regno > MAX_SPRS)
      {
	fprintf (stderr, "Warning: qRcmd readspr %x too large: ignored\n",
		 regno);
	put_str_packet ("E01");
	return;
      }
 
    /* Construct the reply */										
 
    // Make sure the processor is stalled
    gdb_ensure_or1k_stalled();
 
    // First set the chain 
    gdb_set_chain(SC_RISC_DEBUG);	/* 1 RISC Debug Interface chain */
 
    // special case for NPC
    if(regno == NPC_CPU_REG_ADD)
      temp_uint32 = get_npc();
    else
      {
	err = gdb_read_reg(regno, &temp_uint32);
	if(err > 0){
	  if (DEBUG_GDB) printf("Error %d in rsp_command at reg. %x \n", err, regno);
	}										
	else{
	  reg2hex (temp_uint32, cmd);
	  if (DEBUG_GDB) printf("Error %d Command readspr Read reg. %x = 0x%08x\n", err, regno, temp_uint32);
	}
      }
 
    // pack the result into the buffer to send back
    sprintf (cmd, "%8x", (unsigned int)temp_uint32);
    ascii2hex (p_buf->data, cmd);
    p_buf->len = strlen (p_buf->data);
    put_packet (p_buf);
  }
  else if (0 == strncmp ("writespr ", cmd, strlen ("writespr")))
    {
      unsigned int       regno;
      uint32_t  val;
 
      /* Parse and return error if we fail */
      if( 2 != sscanf (cmd, "writespr %4x %8x", &regno, &val))
	{
	  fprintf (stderr, "Warning: qRcmd %s not recognized: ignored\n",
		   cmd);
	  put_str_packet ("E01");
	  return;
	}
 
      /* SPR out of range */
      if (regno > MAX_SPRS)
	{
	  fprintf (stderr, "Warning: qRcmd writespr %x too large: ignored\n",
		   regno);
	  put_str_packet ("E01");
	  return;
	}
 
      // Make sure the processor is stalled
      gdb_ensure_or1k_stalled();
 
      // First set the chain 
      gdb_set_chain(SC_RISC_DEBUG);	/* 1 RISC Debug Interface chain */
 
      /* set the relevant register */
      // special case for NPC
      if(regno == NPC_CPU_REG_ADD)
	set_npc(val);
      else
	{
 
	  err = gdb_write_reg(regno, val);
	  if(err > 0){
	    if (DEBUG_GDB) printf("Error %d in rsp_command write Reg. %x = 0x%08x\n", err, regno, val);
	    put_str_packet ("E01");
	    return;
	  }
	  else{
	    if (DEBUG_GDB) printf("Error %d Command writespr Write reg. %x = 0x%08x\n", err, regno, val);
	  }
	}
      put_str_packet ("OK");
    }
}	/* rsp_command () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP set request
 
   @param[in] p_buf  The request                                               */
/*---------------------------------------------------------------------------*/
static void
rsp_set (struct rsp_buf *p_buf)
{
  if (0 == strncmp ("QPassSignals:", p_buf->data, strlen ("QPassSignals:")))
    {
      /* Passing signals not supported */
      put_str_packet ("");
    }
  else if ((0 == strncmp ("QTDP",    p_buf->data, strlen ("QTDP")))   ||
	   (0 == strncmp ("QFrame",  p_buf->data, strlen ("QFrame"))) ||
	   (0 == strcmp  ("QTStart", p_buf->data))                    ||
	   (0 == strcmp  ("QTStop",  p_buf->data))                    ||
	   (0 == strcmp  ("QTinit",  p_buf->data))                    ||
	   (0 == strncmp ("QTro",    p_buf->data, strlen ("QTro"))))
    {
      /* All tracepoint features are not supported. This reply is really only
	 needed to 'QTDP', since with that the others should not be
	 generated. */
      put_str_packet ("");
    }
  else
    {
      fprintf (stderr, "Unrecognized RSP set request: ignored\n");
    }
}	/* rsp_set () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP restart request
 
   For now we just put the program counter back to the one used with the last
   vRun request. There is no point in unstalling the processor, since we'll
   never get control back.                                                   */
/*---------------------------------------------------------------------------*/
static void
rsp_restart (void)
{
  // Make sure the processor is stalled
  gdb_ensure_or1k_stalled();
 
  // First set the chain 
  err = gdb_set_chain(SC_RISC_DEBUG);	/* 1 RISC Debug Interface chain */
  if(err > 0){
  	if (DEBUG_GDB) printf("Error %d in gdb_set_chain\n", err);
    put_str_packet ("E01");
  	return;
	}
	// OR32 Arc sim equivalent --> set_npc (rsp.start_addr);
  /* Set NPC to reset vector 0x100 */
  set_npc(rsp.start_addr);
  /*
  err = gdb_write_reg(NPC_CPU_REG_ADD, rsp.start_addr);
  if(err > 0){
  	if (DEBUG_GDB) printf("Error %d in rsp_restart write Reg. %x = 0x%08x\n", err, NPC_CPU_REG_ADD, rsp.start_addr);
    put_str_packet ("E01");
  	return;
  }
 
  else{
  if (DEBUG_GDB) printf("Error %d Command Reset. Set NPC to Start vector %x = 0x%08x\n", err, NPC_CPU_REG_ADD, rsp.start_addr);
  }
  */
}	/* rsp_restart () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP step request
 
   Parse the command to see if there is an address. Uses the underlying
   generic step function, with EXCEPT_NONE.
 
   @param[in] p_buf  The full step packet                          */
/*---------------------------------------------------------------------------*/
static void
rsp_step (struct rsp_buf *p_buf)
{
  uint32_t  addr;		/* The address to step from, if any */
 
  // Make sure the processor is stalled
  gdb_ensure_or1k_stalled();
 
  // First set the chain 
  err = gdb_set_chain(SC_RISC_DEBUG);	/* 1 RISC Debug Interface chain */
  if(err > 0){
  	printf("Error %d to set RISC Debug Interface chain in the STEP command 's'\n", err);
    rsp_client_close ();
    return;
	}
 
  if (0 == strcmp ("s", p_buf->data))
  {
    // Arc Sim Code -->   addr = cpu_state.pc;	/* Default uses current NPC */
    /* ---------- Npc ---------- */
    addr = get_npc();
    /*
    err = gdb_read_reg(NPC_CPU_REG_ADD, &addr);
    if(err > 0){
      printf("Error %d to read NPC in the STEP command 's'\n", err);
      rsp_client_close ();
      return;
    }
    */
  }
  else if (1 != sscanf (p_buf->data, "s%x", &addr))
  {
    fprintf (stderr,
	     "Warning: RSP step address %s not recognized: ignored\n",
	     p_buf->data);
 
    // Arc Sim Code -->   addr = cpu_state.pc;	/* Default uses current NPC */
    /* ---------- NPC ---------- */
    addr = get_npc();
    /*
    err = gdb_read_reg(NPC_CPU_REG_ADD, &addr);
    if(err > 0){
      printf("Error %d to read NPC in the STEP command 's'\n", err);
      rsp_client_close ();
      return;
    }
    */
  }
 
  //if (DEBUG_GDB) printf("rsp_step() --> Read NPC = 0x%08x\n", addr);
  rsp_step_generic (addr, EXCEPT_NONE);
 
}	/* rsp_step () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP step with signal request
 
   Currently null. Will use the underlying generic step function.
 
   @param[in] p_buf  The full step with signal packet              */
/*---------------------------------------------------------------------------*/
static void
rsp_step_with_signal (struct rsp_buf *p_buf)
{
  printf ("RSP step with signal '%s' received\n", p_buf->data);
 
}	/* rsp_step_with_signal () */
 
 
/*---------------------------------------------------------------------------*/
/*!Generic processing of a step request
 
   The signal may be EXCEPT_NONE if there is no exception to be
   handled. Currently the exception is ignored.
 
   The single step flag is set in the debug registers and then the processor
   is unstalled.
 
   @param[in] addr    Address from which to step
   @param[in] except  The exception to use (if any)                          */
/*---------------------------------------------------------------------------*/
static void
rsp_step_generic (uint32_t  addr,
		  uint32_t  except)
{
  uint32_t		temp_uint32;
 
  /* Set the address as the value of the next program counter */
 
  set_npc (addr);
 
  /* Clear Debug Reason Register (DRR) 0x3015 */
  // Arc sim --> cpu_state.sprs[SPR_DRR]   = 0;
  if(gdb_write_reg(DRR_CPU_REG_ADD, 0)) printf("Error write to DRR register\n");  
 
  /* Clear watchpoint break generation in Debug Mode Register 2	(DMR2) 0x3011 */
  // Arc sim --> cpu_state.sprs[SPR_DMR2] &= ~SPR_DMR2_WGB;
  if(gdb_read_reg(DMR2_CPU_REG_ADD, &temp_uint32)) printf("Error read from DMR2 register\n");
  temp_uint32 &= ~SPR_DMR2_WGB;
  if(gdb_write_reg(DMR2_CPU_REG_ADD, temp_uint32)) printf("Error write to DMR2 register\n");  
 
  /* Set the single step trigger in Debug Mode Register 1 (DMR1) Register 0x3010 */
  // Arc sim --> cpu_state.sprs[SPR_DMR1] |= SPR_DMR1_ST;
  if(gdb_read_reg(DMR1_CPU_REG_ADD, &temp_uint32)) printf("Error read from DMR1 register\n");
  temp_uint32 |= SPR_DMR1_ST;
  if(gdb_write_reg(DMR1_CPU_REG_ADD, temp_uint32)) printf("Error write to DMR1 register\n");  
 
  /* Set traps to be handled by the debug unit in the Debug Stop Register (DSR) Register 0x3014 */
  // Arc sim --> cpu_state.sprs[SPR_DSR]  |= SPR_DSR_TE;
  if(gdb_read_reg(DSR_CPU_REG_ADD, &temp_uint32)) printf("Error read from DSR register\n");
  temp_uint32 |= SPR_DSR_TE;
  if(gdb_write_reg(DSR_CPU_REG_ADD, temp_uint32)) printf("Error write to DSR register\n");  
 
  /* Unstall the processor */
  set_stall_state (0);
 
  /* Note the GDB client is now waiting for a reply. */
  rsp.client_waiting = 1;
 
}	/* rsp_step_generic () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP 'v' packet
 
   These are commands associated with executing the code on the target
 
   @param[in] p_buf  The request                                               */
/*---------------------------------------------------------------------------*/
static void
rsp_vpkt (struct rsp_buf *p_buf)
{
  if (0 == strncmp ("vAttach;", p_buf->data, strlen ("vAttach;")))
    {
      /* Attaching is a null action, since we have no other process. We just
	 return a stop packet (using TRAP) to indicate we are stopped. */
      put_str_packet ("S05");
      return;
    }
  else if (0 == strcmp ("vCont?", p_buf->data))
    {
      /* For now we don't support this. */
      put_str_packet ("");
      return;
    }
  else if (0 == strncmp ("vCont", p_buf->data, strlen ("vCont")))
    {
      /* This shouldn't happen, because we've reported non-support via vCont?
	 above */
      fprintf (stderr, "Warning: RSP vCont not supported: ignored\n" );
      return;
    }
  else if (0 == strncmp ("vFile:", p_buf->data, strlen ("vFile:")))
    {
      /* For now we don't support this. */
      fprintf (stderr, "Warning: RSP vFile not supported: ignored\n" );
      put_str_packet ("");
      return;
    }
  else if (0 == strncmp ("vFlashErase:", p_buf->data, strlen ("vFlashErase:")))
    {
      /* For now we don't support this. */
      fprintf (stderr, "Warning: RSP vFlashErase not supported: ignored\n" );
      put_str_packet ("E01");
      return;
    }
  else if (0 == strncmp ("vFlashWrite:", p_buf->data, strlen ("vFlashWrite:")))
    {
      /* For now we don't support this. */
      fprintf (stderr, "Warning: RSP vFlashWrite not supported: ignored\n" );
      put_str_packet ("E01");
      return;
    }
  else if (0 == strcmp ("vFlashDone", p_buf->data))
    {
      /* For now we don't support this. */
      fprintf (stderr, "Warning: RSP vFlashDone not supported: ignored\n" );
      put_str_packet ("E01");
      return;
    }
  else if (0 == strncmp ("vRun;", p_buf->data, strlen ("vRun;")))
    {
      /* We shouldn't be given any args, but check for this */
      if (p_buf->len > (int) strlen ("vRun;"))
	{
	  fprintf (stderr, "Warning: Unexpected arguments to RSP vRun "
		   "command: ignored\n");
	}
 
      /* Restart the current program. However unlike a "R" packet, "vRun"
	 should behave as though it has just stopped. We use signal
	 5 (TRAP). */
      rsp_restart ();
      put_str_packet ("S05");
    }
  else
    {
      fprintf (stderr, "Warning: Unknown RSP 'v' packet type %s: ignored\n",
	       p_buf->data);
      put_str_packet ("E01");
      return;
    }
}	/* rsp_vpkt () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP write memory (binary) request
 
   Syntax is:
 
     X<addr>,<length>:
 
   Followed by the specified number of bytes as raw binary. Response should be
   "OK" if all copied OK, E<nn> if error <nn> has occurred.
 
   The length given is the number of bytes to be written. However the number
   of data bytes may be greater, since '#', '$' and '}' are escaped by
   preceding them by '}' and oring with 0x20.
 
   @param[in] p_buf  The command received                                      */
/*---------------------------------------------------------------------------*/
static void
rsp_write_mem_bin (struct rsp_buf *p_buf)
{
  unsigned int  addr;			/* Where to write the memory */
  int           len;			/* Number of bytes to write */
  char         	*bindat;	/* Pointer to the binary data */
  int           off = 0;	/* Offset to start of binary data */
  int           newlen;		/* Number of bytes in bin data */
 
  if (2 != sscanf (p_buf->data, "X%x,%x:", &addr, &len))
    {
      fprintf (stderr, "Warning: Failed to recognize RSP write memory "
	       "command: %s\n", p_buf->data);
      put_str_packet ("E01");
      return;
    }
 
  /* Find the start of the data and "unescape" it */
  bindat = p_buf->data;
  while(off < GDB_BUF_MAX){
  	if(bindat[off] == ':'){
			bindat = bindat + off + 1;
			off++;
			break;
		}
		off++;
  }
	if(off >= GDB_BUF_MAX){
	  put_str_packet ("E01");
		return;
	}
 
  newlen = rsp_unescape (bindat, p_buf->len - off);
 
  /* Sanity check */
  if (newlen != len)
  {
    int  minlen = len < newlen ? len : newlen;
 
    fprintf (stderr, "Warning: Write of %d bytes requested, but %d bytes "
       "supplied. %d will be written\n", len, newlen, minlen);
    len = minlen;
  }
 
  // Make sure the processor is stalled
  gdb_ensure_or1k_stalled();
 
  // Set chain 5 --> Wishbone Memory chain
  err = gdb_set_chain(SC_WISHBONE);
  if(err){
    put_str_packet ("E01");
    return;
  }
 
  /* Write the bytes to memory */
  if (len)
    {
      swap_buf(bindat, len);
 
      if (DEBUG_GDB_BLOCK_DATA){
	uint32_t  temp_uint32;
	for (off = 0; off < len; off++){
	  temp_uint32 = (temp_uint32 << 8) | (0x000000ff & bindat[off]);
	  if((off %4 ) == 3){
	    temp_uint32 = htonl(temp_uint32);
	  }
	  switch(off % 16)
	    {
	    case 3:	 
	      printf("Add 0x%08x   Data 0x%08x  ", addr + off - 3, temp_uint32);
	      break;
	    case 7:	 
	    case 11:
	      printf("0x%08x  ", temp_uint32);	 
	      break;
	    case 15:	 
	      printf("0x%08x\n", temp_uint32);
	      break;
	    default:
	      break;
	    }
	  if ((len - off == 1) && (off % 16) < 15) printf("\n");
	}
      }
 
      err = gdb_write_block(addr, (uint32_t*)bindat, len);
      if(err){
	put_str_packet ("E01");
	return;
      }
      if (DEBUG_GDB) printf("Error %x\n", err);fflush (stdout);
    }
  put_str_packet ("OK");
 
}	/* rsp_write_mem_bin () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP remove breakpoint or matchpoint request
 
   For now only memory breakpoints are implemented, which are implemented by
   substituting a breakpoint at the specified address. The implementation must
   cope with the possibility of duplicate packets.
 
   @todo This doesn't work with icache/immu yet
 
   @param[in] p_buf  The command received                                      */
/*---------------------------------------------------------------------------*/
static void
rsp_remove_matchpoint (struct rsp_buf *p_buf)
{
  enum mp_type       type;		/* What sort of matchpoint */
  uint32_t  addr;		/* Address specified */
  int                len;			/* Matchpoint length (not used) */
  struct mp_entry   *mpe;			/* Info about the replaced instr */
 
  /* Break out the instruction */
  if (3 != sscanf (p_buf->data, "z%1d,%x,%1d", (int *)&type, &addr, &len))
    {
      fprintf (stderr, "Warning: RSP matchpoint deletion request not "
	       "recognized: ignored\n");
      put_str_packet ("E01");
      return;
    }
 
  /* Sanity check that the length is 4 */
  if (4 != len)
    {
      fprintf (stderr, "Warning: RSP matchpoint deletion length %d not "
	       "valid: 4 assumed\n", len);
      len = 4;
    }
 
  /* Sort out the type of matchpoint */
  switch (type)
    {
    case BP_MEMORY:
      /* Memory breakpoint - replace the original instruction. */
      mpe = mp_hash_delete (type, addr);
 
      /* If the BP hasn't yet been deleted, put the original instruction
			 back. Don't forget to free the hash table entry afterwards. */
			if (NULL != mpe)
			{
			  // Arc Sim Code -->   set_program32 (addr, mpe->instr);
			  // Make sure the processor is stalled
			  gdb_ensure_or1k_stalled();
 
			  // Set chain 5 --> Wishbone Memory chain
			  err = gdb_set_chain(SC_WISHBONE);
				if(err){
					put_str_packet ("E01");
				  return;
				}
				err = gdb_write_block(addr, &mpe->instr, 4);
				if(err){
					put_str_packet ("E01");
				  return;
				}
			  free (mpe);
			}
 
      put_str_packet ("OK");
      return;
 
    case BP_HARDWARE:
      put_str_packet ("");		/* Not supported */
      return;
 
    case WP_WRITE:
      put_str_packet ("");		/* Not supported */
      return;
 
    case WP_READ:
      put_str_packet ("");		/* Not supported */
      return;
 
    case WP_ACCESS:
      put_str_packet ("");		/* Not supported */
      return;
 
    default:
      fprintf (stderr, "Warning: RSP matchpoint type %d not "
	       "recognized: ignored\n", type);
      put_str_packet ("E01");
      return;
 
    }
}	/* rsp_remove_matchpoint () */
 
 
/*---------------------------------------------------------------------------*/
/*!Handle a RSP insert breakpoint or matchpoint request
 
   For now only memory breakpoints are implemented, which are implemented by
   substituting a breakpoint at the specified address. The implementation must
   cope with the possibility of duplicate packets.
 
   @todo This doesn't work with icache/immu yet
 
   @param[in] p_buf  The command received                                      */
/*---------------------------------------------------------------------------*/
static void
rsp_insert_matchpoint (struct rsp_buf *p_buf)
{
  enum mp_type       type;		/* What sort of matchpoint */
  uint32_t  addr;		/* Address specified */
  int                len;		/* Matchpoint length (not used) */
	uint32_t      instr;
 
  /* Break out the instruction */
  if (3 != sscanf (p_buf->data, "Z%1d,%x,%1d", (int *)&type, &addr, &len))
    {
      fprintf (stderr, "Warning: RSP matchpoint insertion request not "
	       "recognized: ignored\n");
      put_str_packet ("E01");
      return;
    }
 
  /* Sanity check that the length is 4 */
  if (4 != len)
    {
      fprintf (stderr, "Warning: RSP matchpoint insertion length %d not "
	       "valid: 4 assumed\n", len);
      len = 4;
    }
 
  /* Sort out the type of matchpoint */
  switch (type)
    {
    case BP_MEMORY:		// software-breakpoint Z0  break
      /* Memory breakpoint - substitute a TRAP instruction */
      // Make sure the processor is stalled
      gdb_ensure_or1k_stalled();
 
      // Set chain 5 --> Wishbone Memory chain
      gdb_set_chain(SC_WISHBONE);
 
      // Read the data from Wishbone Memory chain
      // Arc Sim Code -->   mp_hash_add (type, addr, eval_direct32 (addr, 0, 0));
      gdb_read_block(addr, &instr, 4); 
 
      mp_hash_add (type, addr, instr);
 
      // Arc Sim Code -->   set_program32 (addr, OR1K_TRAP_INSTR);
      instr = OR1K_TRAP_INSTR;
      err = gdb_write_block(addr, &instr, 4);
      if(err){
	put_str_packet ("E01");
	return;
      }
      put_str_packet ("OK");
      return;
 
    case BP_HARDWARE:	// hardware-breakpoint Z1  hbreak
      put_str_packet ("");		/* Not supported */
      return;
 
    case WP_WRITE:		// write-watchpoint    Z2  watch																			
      put_str_packet ("");		/* Not supported */						 
      return;																								
 
    case WP_READ:			// read-watchpoint     Z3  rwatch
      put_str_packet ("");		/* Not supported */
      return;
 
    case WP_ACCESS:		// access-watchpoint   Z4  awatch
      put_str_packet ("");		/* Not supported */
      return;
 
    default:
      fprintf (stderr, "Warning: RSP matchpoint type %d not "
	       "recognized: ignored\n", type);
      put_str_packet ("E01");
      return;
    }
}	/* rsp_insert_matchpoint () */
 
 
/*---------------------------------------------------------------------------
Setup the or32 to init state
 
---------------------------------------------------------------------------*/
void setup_or32(void)
{
  uint32_t		temp_uint32;
  // First set the chain 
  err = gdb_set_chain(SC_REGISTER);	/* 4 Register Chain */
  if(err > 0){
    if (DEBUG_GDB) printf("Error %d in gdb_set_chain\n", err);
  }
  if(gdb_read_reg(0x04, &temp_uint32)) printf("Error read from register\n");
  if (DEBUG_GDB) printf("Read from chain 4 SC_REGISTER at add 0x00000004 = 0x%08x\n", temp_uint32 );			
 
  if(gdb_write_reg(0x04, 0x00000001)) printf("Error write to register\n");  
  if (DEBUG_GDB) printf("Write to chain 4 SC_REGISTER at add 0x00000004 = 0x00000001\n");			
 
  //	if(gdb_read_reg(0x04, &temp_uint32)) printf("Error read from register\n");
  //	if (DEBUG_GDB) printf("Read from chain 4 SC_REGISTER at add 0x00000004 = 0x%08x\n", temp_uint32 );			
 
  //	if(gdb_read_reg(0x04, &temp_uint32)) printf("Error read from register\n");
  //	if (DEBUG_GDB) printf("Read from chain 4 SC_REGISTER at add 0x00000004 = 0x%08x\n", temp_uint32 );			
 
  if(gdb_write_reg(0x00, 0x01000001)) printf("Error write to register\n");  
  if (DEBUG_GDB) printf("Write to chain 4 SC_REGISTER at add 0x00000000 = 0x01000001\n");			
}
 
// Function to check if the processor is stalled - if not then stall it.
// this is useful in the event that GDB thinks the processor is stalled, but has, in fact
// been hard reset on the board and is running.
static void gdb_ensure_or1k_stalled()
{
  unsigned char stalled;
  dbg_cpu0_read_ctrl(0, &stalled);
  if ((stalled & 0x1) != 0x1)
    {
      if (DEBUG_GDB)
	printf("Processor not stalled, like we thought\n");
 
      // Set the TAP controller to its OR1k chain
      dbg_set_tap_ir(JI_DEBUG);
      gdb_chain = -1;
 
      // Processor isn't stalled, contrary to what we though, so stall it
      printf("Stalling or1k\n");
      dbg_cpu0_write_ctrl(0, 0x01);      // stall or1k
    }  
}
 
 
int gdb_read_reg(uint32_t adr, uint32_t *data) {
  switch (gdb_chain) {
  case SC_RISC_DEBUG: return dbg_cpu0_read(adr, data) ? ERR_CRC : ERR_NONE;
  case SC_REGISTER:   return dbg_cpu0_read_ctrl(adr, (unsigned char*)data) ? 
      ERR_CRC : ERR_NONE;
  case SC_WISHBONE:   return dbg_wb_read32(adr, data) ? ERR_CRC : ERR_NONE;
  case SC_TRACE:      *data = 0; return 0;
  default:            return JTAG_PROXY_INVALID_CHAIN;
  }
}
 
int gdb_write_reg(uint32_t adr, uint32_t data) {
  switch (gdb_chain) { /* remap registers, to be compatible with jp1 */
  case SC_RISC_DEBUG: if (adr == JTAG_RISCOP) adr = 0x00;
    return dbg_cpu0_write(adr, data) ? ERR_CRC : ERR_NONE;
  case SC_REGISTER:   return dbg_cpu0_write_ctrl(adr, data) ? ERR_CRC : ERR_NONE;
  case SC_WISHBONE:   return dbg_wb_write32(adr, data) ? ERR_CRC : ERR_NONE;
  case SC_TRACE:      return 0;
  default:            return JTAG_PROXY_INVALID_CHAIN;
  }
}
 
int gdb_read_block(uint32_t adr, uint32_t *data, int len) {
  if (DEBUG_CMDS) printf("rb %d\n", gdb_chain);
  switch (gdb_chain) {
  case SC_WISHBONE:   return dbg_wb_read_block32(adr, data, len) ? 
      ERR_CRC : ERR_NONE;
  default:            return JTAG_PROXY_INVALID_CHAIN;
  }
}
 
int gdb_write_block(uint32_t adr, uint32_t *data, int len) {
  if (DEBUG_CMDS) printf("wb %d\n", gdb_chain);
  switch (gdb_chain) {
  case SC_WISHBONE:   return dbg_wb_write_block32(adr, data, len) ? 
      ERR_CRC : ERR_NONE;
  default:            return JTAG_PROXY_INVALID_CHAIN;
  }
}
 
int gdb_set_chain(int chain) {
  switch (chain) {
  case SC_RISC_DEBUG:
  case SC_REGISTER:
  case SC_TRACE:      
  case SC_WISHBONE:   gdb_chain = chain;
    return ERR_NONE;
  default:            return JTAG_PROXY_INVALID_CHAIN;
  }
}
 
/* Added by CZ 24/05/01 */
int GetServerSocket(const char* name, const char* proto, int port) {
  struct servent *service;
  struct protoent *protocol;
  struct sockaddr_in sa;
  struct hostent *hp;  
  int sockfd;
  char myname[256];
  //int flags; --changed to socklen_t for c++?! -- Julius
  socklen_t flags;
  char sTemp[256];
 
  /* First, get the protocol number of TCP */
  if (!(protocol = getprotobyname(proto))) {
    sprintf(sTemp, "Unable to load protocol \"%s\"", proto);
    perror(sTemp);
    return 0;
  }
  tcp_level = protocol->p_proto; /* Save for later */
 
  /* If we weren't passed a non standard port, get the port
     from the services directory. */
  if (!port && (service = getservbyname(name, protocol->p_name)))
    port = ntohs(service->s_port);
 
  /* Create the socket using the TCP protocol */
  if ((sockfd = socket(PF_INET, SOCK_STREAM, protocol->p_proto)) < 0) {
    perror("Unable to create socket");
    return 0;
  }
 
  flags = 1;
  if (setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, 
		 (const char*)&flags, sizeof(int)) < 0) {
    sprintf(sTemp, "Can not set SO_REUSEADDR option on socket %d", sockfd);
    perror(sTemp);
    close(sockfd);
    return 0;
  }
 
  /* The server should also be non blocking. Get the current flags. */
  if(fcntl(sockfd, F_GETFL, &flags) < 0) {
    sprintf(sTemp, "Unable to get flags for socket %d", sockfd);
    perror(sTemp);
    close(sockfd);
    return 0;
  }
 
  /* Set the nonblocking flag */
  if(fcntl(sockfd, F_SETFL, flags | O_NONBLOCK) < 0) {
    sprintf(sTemp, "Unable to set flags for socket %d to value 0x%08x", 
                    sockfd, flags | O_NONBLOCK);
    perror(sTemp);
    close(sockfd);
    return 0;
  }
 
  /* Find out what our address is */
  memset(&sa, 0, sizeof(struct sockaddr_in));
  gethostname(myname, sizeof(myname));
  if(!(hp = gethostbyname(myname))) {
    perror("Unable to read hostname");
    close(sockfd);
    return 0;
  }
 
  /* Bind our socket to the appropriate address */
  sa.sin_family = hp->h_addrtype;
  sa.sin_port = htons(port);
  if(bind(sockfd, (struct sockaddr*)&sa, sizeof(struct sockaddr_in)) < 0) {
    sprintf(sTemp, "Unable to bind socket %d to port %d", sockfd, port);
    perror(sTemp);
    close(sockfd);
    return 0;
  }
  serverIP = sa.sin_addr.s_addr;
  flags = sizeof(struct sockaddr_in);
  if(getsockname(sockfd, (struct sockaddr*)&sa, &flags) < 0) {
    sprintf(sTemp, "Unable to get socket information for socket %d", sockfd);
    perror(sTemp);
    close(sockfd);
    return 0;
  }
  serverPort = ntohs(sa.sin_port);
 
  /* Set the backlog to 1 connections */
  if(listen(sockfd, 1) < 0) {
    sprintf(sTemp, "Unable to set backlog on socket %d to %d", sockfd, 1);
    perror(sTemp);
    close(sockfd);
    return 0;
  }
 
  return sockfd;
}
 
//void HandleServerSocket(Boolean block) {
void HandleServerSocket(void) {
  struct pollfd fds[2];
  int n;
  uint32_t		temp_uint32;
 
 rebuild:
  n = 0;
  if(!server_fd && !gdb_fd) return;
 
  if(server_fd) {
    fds[n].fd = server_fd;
    fds[n].events = POLLIN;
    fds[n++].revents = 0;
  }
  if(gdb_fd) {
    fds[n].fd = gdb_fd;
    fds[n].events = POLLIN;
    fds[n++].revents = 0;
  }
 
  while(1) {
    switch(poll(fds, n, -1)) {
    case 0:
    case -1:
      if(errno == EINTR) continue;
      perror("poll");
      server_fd = 0;
      return;
    default:
      /* Make sure to handle the gdb port first! */
      if (gdb_fd && ((fds[0].revents && !server_fd) || (fds[1].revents && server_fd)))
	{
	  int revents = server_fd ? fds[1].revents : fds[0].revents;
	  if (revents & POLLIN){
	    /* If we have an unacknowledged exception tell the GDB client. If this
	       exception was a trap due to a memory breakpoint, then adjust the NPC. */
	    if (rsp.client_waiting)
	      {
		err = gdb_read_reg(PPC_CPU_REG_ADD, &temp_uint32);
		if(err) printf("Error read from PPC register\n");
		if ((TARGET_SIGNAL_TRAP == rsp.sigval) &&
		    (NULL != mp_hash_lookup (BP_MEMORY, temp_uint32)))
		  {
		    set_npc (temp_uint32);
		  }
 
		rsp_report_exception();
		rsp.client_waiting = 0;		/* No longer waiting */
	      }
	    GDBRequest();
	  }
	  else {/* Error Occurred */
	    printf("\n%sSocket closed.\n",printTime());
	    //fprintf(stderr, 
	    //"Received flags 0x%08x on gdb socket. Shutting down.\n", revents);
	    close(gdb_fd);
	    gdb_fd = 0;
	  }
	}
 
      // Go to blocking accept() instead of looping around through poll(), 
      // takes a loot of CPU resources and it doesn't work when 
      // reconnecting... Jonas Rosén
      if(!gdb_fd)
      {
			  JTAGRequest();
			  rsp.client_waiting = 0;		/* No longer waiting */
			  goto rebuild;
      }
 
      if(fds[0].revents && server_fd) {
        if(fds[0].revents & POLLIN) {
          JTAGRequest();
          rsp.client_waiting = 0;		/* No longer waiting */
          goto rebuild;
        } else { /* Error Occurred */
			  fprintf(stderr, 
				  "Received flags 0x%08x on server. Shutting down.\n", 
				  fds[0].revents);
			  close(server_fd);
			  server_fd = 0;
			  serverPort = 0;
			  serverIP = 0;
			  return;
				}
  		}
      break;
    } /* End of switch statement */
  } /* End of while statement */
}
 
void JTAGRequest(void) {
  struct sockaddr_in sa;
  struct sockaddr* addr = (struct sockaddr*)&sa;
  //int n = sizeof(struct sockaddr_in); --changed to socklen_t from int type
  socklen_t n = sizeof(struct sockaddr_in);
  int fd = accept(server_fd, addr, &n);
  int on_off = 0; /* Turn off Nagel's algorithm on the socket */
  int flags;
  char sTemp[256];
  if (DEBUG_GDB) printf("JTAGRequest\n");
 
  if(fd < 0) {
    /* This is valid, because a connection could have started, 
       and then terminated due to a protocol error or user
       initiation before the accept could take place. */
    if(errno != EWOULDBLOCK && errno != EAGAIN) {
      perror("accept");
      close(server_fd);
      server_fd = 0;
      serverPort = 0;
      serverIP = 0;
    }
    return;
  }
 
  if(gdb_fd) {
    close(fd);
    return;
  }
 
  if(fcntl(fd, F_GETFL, &flags) < 0) {
    sprintf(sTemp, "Unable to get flags for gdb socket %d", fd);
    perror(sTemp);
    close(fd);
    return;
  }
 
  /* Rene
  if(fcntl(fd, F_SETFL, flags | O_NONBLOCK) < 0) {
    sprintf(sTemp, "Unable to set flags for gdb socket %d to value 0x%08x", 
      fd, flags | O_NONBLOCK);
    perror(sTemp);
    close(fd);
    return;
  }	Rene */
 
  if(setsockopt(fd, tcp_level, TCP_NODELAY, &on_off, sizeof(int)) < 0) {
    sprintf(sTemp, "Unable to disable Nagel's algorithm for socket %d.\nsetsockopt", fd);
    perror(sTemp);
    close(fd);
    return;
  }
 
  printf("\n%sConnection established from %s on port %d\n", printTime(),inet_ntoa(sa.sin_addr),ntohs(sa.sin_port));
  gdb_fd = fd;
}
 
 
/*---------------------------------------------------------------------------
* Decode the GDB command.
*
*---------------------------------------------------------------------------*/
static void GDBRequest(void) {
  JTAGProxyWriteMessage msg_write;
  JTAGProxyReadMessage msg_read;
  JTAGProxyChainMessage msg_chain;
  JTAGProxyWriteResponse resp_write;
  JTAGProxyReadResponse resp_read;
  JTAGProxyChainResponse resp_chain;
  JTAGProxyBlockWriteMessage *msg_bwrite;
  JTAGProxyBlockReadMessage msg_bread;
  JTAGProxyBlockWriteResponse resp_bwrite;
  JTAGProxyBlockReadResponse *resp_bread;
  char *p_buf;
  uint32_t command;
  uint32_t length;
  int len, i;
 
  /* First, we must read the incomming command */
  if(gdb_read(&command, sizeof(uint32_t)) < 0) {
    client_close ('1');
    return;
  }
  command = ntohl(command);
 
  if(gdb_read(&length, sizeof(uint32_t)) < 0) {
    client_close ('2');
    return;
  }
  length = ntohl(length);
  if (DEBUG_GDB) printf("\n%s-----------------------------------------------------\nCommand %d Length %d ", printTime(), command, length);
 
  if (DEBUG_GDB){
  switch(command){
    case JTAG_COMMAND_READ:
            printf("JTAG_COMMAND_READ       \n");
            break;
    case JTAG_COMMAND_WRITE:
            printf("JTAG_COMMAND_WRITE      \n");
            break;
    case JTAG_COMMAND_BLOCK_READ:
            printf("JTAG_COMMAND_BLOCK_READ \n");
            break;
    case JTAG_COMMAND_BLOCK_WRITE:
            printf("JTAG_COMMAND_BLOCK_WRITE\n");
            break;
    case JTAG_COMMAND_CHAIN:
            printf("JTAG_COMMAND_CHAIN      \n");
            break;
		}
	}
 
  /* Now, verify the protocol and implement the command */
  switch(command) {
    case JTAG_COMMAND_WRITE:
      if(length != sizeof(msg_write) - 8) {
        ProtocolClean(length, JTAG_PROXY_PROTOCOL_ERROR);
        return;
      }
      p_buf = (char*)&msg_write;
      if(gdb_read(&p_buf[8], length) < 0) {
        client_close ('3');
        return;
      }
      msg_write.address = ntohl(msg_write.address);
      msg_write.data_H = ntohl(msg_write.data_H);
      msg_write.data_L = ntohl(msg_write.data_L);
      err = gdb_write_reg(msg_write.address, msg_write.data_L);      
      resp_write.status = htonl(err);      
      if (DEBUG_GDB) printf("Write Reg to Chain %d at add 0x%08x -> H-Data 0x%08x L-Data 0x%08x Error %d", 
        gdb_chain, msg_write.address, msg_write.data_H, msg_write.data_L, err);fflush (stdout);
      if(gdb_write(&resp_write, sizeof(resp_write)) < 0) {
        client_close ('4');
        return;
      }
      break;
    case JTAG_COMMAND_READ:
      if(length != sizeof(msg_read) - 8) {
        ProtocolClean(length, JTAG_PROXY_PROTOCOL_ERROR);
        return;
      }
      p_buf = (char*)&msg_read;
      if(gdb_read(&p_buf[8], length) < 0) {
        client_close ('5');
        return;
      }
      msg_read.address = ntohl(msg_read.address);
      err = gdb_read_reg(msg_read.address, (uint32_t *)&resp_read.data_L);
      if (DEBUG_GDB) printf("Read Reg from Chain %d at add 0x%08x", gdb_chain, msg_read.address);
      resp_read.status = htonl(err);
      resp_read.data_H = 0;
      resp_read.data_L = htonl(resp_read.data_L);
      if(gdb_write(&resp_read, sizeof(resp_read)) < 0) {
        client_close ('6');
        return;
        }
      if (DEBUG_GDB) printf(" --> Data 0x%08x Error %d\n", htonl(resp_read.data_L), err);fflush (stdout);
      break;
    case JTAG_COMMAND_BLOCK_WRITE:
      if(length < sizeof(JTAGProxyBlockWriteMessage)-8) {
        ProtocolClean(length, JTAG_PROXY_PROTOCOL_ERROR);
        return;
      }
      if(!(p_buf = (char*)malloc(8+length))) {
        ProtocolClean(length, JTAG_PROXY_OUT_OF_MEMORY);
        return;
      }
      msg_bwrite = (JTAGProxyBlockWriteMessage*)p_buf;
      if(gdb_read(&p_buf[8], length) < 0) {
        client_close ('5');
        free(p_buf);
        return;
      }
      msg_bwrite->address = ntohl(msg_bwrite->address);
      msg_bwrite->nRegisters = ntohl(msg_bwrite->nRegisters);
      if (DEBUG_GDB) printf("Block Write to Chain %d start add 0x%08x Write %d (32 bit words):\n\n", gdb_chain, msg_bwrite->address, msg_bwrite->nRegisters);
      for(i=0;i<msg_bwrite->nRegisters;i++) {
        msg_bwrite->data[i] = ntohl(msg_bwrite->data[i]);
				if (DEBUG_GDB_BLOCK_DATA){
				  if ((i % 4) == 0)      printf("Add 0x%08x   Data 0x%08x  ", msg_bwrite->address + (i * 4), msg_bwrite->data[i]);
		          else if ((i % 4) == 3) printf("0x%08x\n", msg_bwrite->data[i]);
				  else                   printf("0x%08x  ", msg_bwrite->data[i]);
 
					// add a new line on the last data, but not if it is the last one in the colum 
					if ((msg_bwrite->nRegisters - i == 1) && (i % 4) < 3) printf("\n");
				}
      }
      err = gdb_write_block(msg_bwrite->address, (uint32_t*)msg_bwrite->data, msg_bwrite->nRegisters * 4);
      if (DEBUG_GDB) printf("Error %x\n", err);fflush (stdout);
      resp_bwrite.status = htonl(err);
      free(p_buf);
      msg_bwrite = (JTAGProxyBlockWriteMessage *)NULL;
      p_buf = (char *)msg_bwrite;
      if(gdb_write(&resp_bwrite, sizeof(resp_bwrite)) < 0) {
        client_close ('4');
        return;
      }
      break;
    case JTAG_COMMAND_BLOCK_READ:
      if(length != sizeof(msg_bread) - 8) {
        ProtocolClean(length, JTAG_PROXY_PROTOCOL_ERROR);
        return;
      }
      p_buf = (char*)&msg_bread;
      if(gdb_read(&p_buf[8], length) < 0) {
        client_close ('5');
        return;
      }
      msg_bread.address = ntohl(msg_bread.address);
      msg_bread.nRegisters = ntohl(msg_bread.nRegisters);
      if (DEBUG_GDB) printf("Block Read from Chain %d start add 0x%08x Read %d (32 bit words):\n\n", gdb_chain, msg_bread.address, msg_bread.nRegisters);
      len = sizeof(JTAGProxyBlockReadResponse) + 4*(msg_bread.nRegisters-1);
      if(!(p_buf = (char*)malloc(len))) {
        ProtocolClean(0, JTAG_PROXY_OUT_OF_MEMORY);
        return;
      }
      resp_bread = (JTAGProxyBlockReadResponse*)p_buf;
      err = gdb_read_block(msg_bread.address, (uint32_t*)resp_bread->data, msg_bread.nRegisters * 4);
      for(i=0;i<msg_bread.nRegisters;i++) {
        /* Read previous, address next one. */
        resp_bread->data[i] = htonl(resp_bread->data[i]);
		if (DEBUG_GDB_BLOCK_DATA){
		  if ((i % 4) == 0)      printf("Add 0x%08x   Data 0x%08x  ", msg_bread.address + (i * 4), htonl(resp_bread->data[i]));
          else if ((i % 4) == 3) printf("0x%08x\n", htonl(resp_bread->data[i]));
		  else                   printf("0x%08x  ", htonl(resp_bread->data[i]));
		}
		// add a new line on the last data, but not if it is the last one in the colum 
		if ((msg_bread.nRegisters - i == 1) && (i % 4) < 3) printf("\n");
      }
      resp_bread->status = htonl(err);
      resp_bread->nRegisters = htonl(msg_bread.nRegisters);
      if (DEBUG_GDB) printf("\nError %x\n", err);fflush (stdout);
      if(gdb_write(resp_bread, len) < 0) {
        client_close ('6');
        free(p_buf);
        return;
      }
      free(p_buf);
      resp_bread = (JTAGProxyBlockReadResponse *)NULL;
      p_buf = (char *)resp_bread;
      break;
    case JTAG_COMMAND_CHAIN:
      if(length != sizeof(msg_chain) - 8) {
        ProtocolClean(length, JTAG_PROXY_PROTOCOL_ERROR);
        return;
      }
      p_buf = (char*)&msg_chain;
      if(gdb_read(&p_buf[8], sizeof(msg_chain)-8) < 0) {
        client_close ('7');
        return;
      }
      msg_chain.chain = htonl(msg_chain.chain);
      err = gdb_set_chain(msg_chain.chain);
      resp_chain.status = htonl(err);
      if (DEBUG_GDB){
	      switch(msg_chain.chain){
					case SC_GLOBAL:      /* 0 Global BS Chain */
						printf("Set Chain %d Global BS Chain  Error %x\n", msg_chain.chain, err);
						break;
					case SC_RISC_DEBUG:  /* 1 RISC Debug Interface chain */
						printf("Set Chain %d RISC Debug Interface chain  Error %x\n", msg_chain.chain, err);
						break;
					case SC_RISC_TEST:   /* 2 RISC Test Chain */
						printf("Set Chain %d RISC Test Chain  Error %x\n", msg_chain.chain, err);
						break;
					case SC_TRACE:       /* 3 Trace Chain */
						printf("Set Chain %d Trace Chain  Error %x\n", msg_chain.chain, err);
						break;
					case SC_REGISTER:    /* 4 Register Chain */
						printf("Set Chain %d Register Chain  Error %x\n", msg_chain.chain, err);
						break;
					case SC_WISHBONE:    /* 5 Memory chain */
						printf("Set Chain %d Wishbone Memory chain  Error %x\n", msg_chain.chain, err);
						break;
					case SC_BLOCK:       /* 6 Block Chains */
						printf("Set Chain %d Block Chains  Error %x\n", msg_chain.chain, err);
						break;
					default:						 /* Invalid chain */
						printf("Set Chain %d Invalid chain  Error %x\n", msg_chain.chain, err);
						break;
	      }
      	fflush (stdout);
      }
      if(gdb_write(&resp_chain, sizeof(resp_chain)) < 0) {
        client_close ('8');
        return;
      }
      break;
    default:
      perror("Unknown JTAG command.");fflush (stdout);
      ProtocolClean(length, JTAG_PROXY_COMMAND_NOT_IMPLEMENTED);
      break;
  }
}
 
static void ProtocolClean(int length, int32_t err) {
  char buffer[4096];
 
  err = htonl(err);
  if(((gdb_read(buffer, length) < 0) || (gdb_write(&err, sizeof(err)) < 0)) && gdb_fd) {
    perror("gdb socket - 9");
    close(gdb_fd);
    gdb_fd = 0;
  }
}
 
static int gdb_write(void* p_buf, int len) {
  int n;
  char* w_buf = (char*)p_buf;
  struct pollfd block;
 
  while(len) {
    if((n = write(gdb_fd, w_buf, len)) < 0) {
      switch(errno) {
        case EWOULDBLOCK: /* or EAGAIN */
          /* We've been called on a descriptor marked
             for nonblocking I/O. We better simulate
             blocking behavior. */
          block.fd = gdb_fd;
          block.events = POLLOUT;
          block.revents = 0;
          poll(&block, 1, -1);
          continue;
        case EINTR:
          continue;
        case EPIPE:
          close(gdb_fd);
          gdb_fd = 0;
          return -1;
        default:
          return -1;
        }
      } else {
        len -= n;
        w_buf += n;
      }
  }
  return 0;
}
 
static int gdb_read(void* p_buf, int len) {
  int n;
  char* r_buf = (char*)p_buf;
  struct pollfd block;
 
  while(len) {
    if((n = read(gdb_fd, r_buf, len)) < 0) {
      switch(errno) {
        case EWOULDBLOCK: /* or EAGAIN */
          /* We've been called on a descriptor marked
       for nonblocking I/O. We better simulate
       blocking behavior. */
          block.fd = gdb_fd;
          block.events = POLLIN;
          block.revents = 0;
          poll(&block, 1, -1);
          continue;
        case EINTR:
          continue;
        default:
          return -1;
        }
    } else if(n == 0) {
      close(gdb_fd);
      gdb_fd = 0;
      return -1;
    } else {
      len -= n;
      r_buf += n;
    }
  }
  return 0;
}
 
 
/*****************************************************************************
* Close the connection to the client if it is open
******************************************************************************/
static void client_close (char err)
{
  if(gdb_fd) {
    perror("gdb socket - " + err);
    close(gdb_fd);
    gdb_fd = 0;
  }
}	/* client_close () */
 
 
/*---------------------------------------------------------------------------*/
/* Swap a buffer of 4-byte from 1234 to 4321
 
   parameter[in]  p_buf and len
   parameter[out] none																											 */
/*---------------------------------------------------------------------------*/
static void swap_buf(char* p_buf, int len) 
{
	int temp;
	int n = 0;
 
  if (len > 2)
  {
    while(n < len){
    	// swap 0 and 3
    	temp = p_buf[n];
			p_buf[n] = p_buf[n + 3];
			p_buf[n + 3] = temp;
    	// swap 1 and 2
    	temp = p_buf[n + 1];
			p_buf[n + 1] = p_buf[n + 2];
			p_buf[n + 2] = temp;
 
			n += 4;
    }
	}
}
 
 
/*---------------------------------------------------------------------------*/
/*!Set the stall state of the processor
 
   @param[in] state  If non-zero stall the processor.                        */
/*---------------------------------------------------------------------------*/
static void
set_stall_state (int state)
{
 
  if(state == 0)
    {
      err = dbg_cpu0_write_ctrl(0, 0);	 /* unstall or1k */
      stallState = UNSTALLED;
      npcIsCached = 0;
      rsp.sigval = TARGET_SIGNAL_NONE;
    }
  else 
    {
      err = dbg_cpu0_write_ctrl(0, 0x01);				 /* stall or1k */
      stallState = STALLED;
    }  
 
  if(err > 0 && DEBUG_GDB)printf("Error %d in set_stall_state Stall state = %d\n", err, state);
 
}	/* set_stall_state () */
 
 
/*---------------------------------------------------------------------------*/
/*!Set the reset bit of the processor's control reg in debug interface
 */
/*---------------------------------------------------------------------------*/
static void
reset_or1k (void)
{
 
  err = dbg_cpu0_write_ctrl(0, 0x02);  /* reset or1k */
 
  if(err > 0 && DEBUG_GDB)printf("Error %d in reset_or1k()\n", err);
 
}	/* reset_or1k () */
 
 
/*---------------------------------------------------------------------------*/
/*!Close down the connection with GDB in the event of a kill signal
 
 */
/*---------------------------------------------------------------------------*/
void gdb_close()
{
  if (gdb_fd) close(gdb_fd);
  // Maybe do other things here!
}
 

Go to most recent revision | Compare with Previous | Blame | View Log

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.