分享
 
 
 

RFC909 - Loader Debugger Protocol

王朝other·作者佚名  2008-05-31
窄屏简体版  字體: |||超大  

Loader Debugger Protocol

RFC-909

Christopher Welles

BBN Communications Corporation

Walter Milliken

BBN Laboratories

July 1984

Status of This Memo

This RFCspecifies a proposed protocol for the ARPA Internet

community, and requests discussion and suggestions for

improvements. Distribution of this memo is unlimited.

Table of Contents

1 IntrodUCtion.......................................... 1

1.1 Purpose of This Document............................ 1

1.2 Summary of Features................................. 2

2 General Description................................... 3

2.1 Motivation.......................................... 3

2.2 Relation to Other Protocols......................... 4

2.2.1 Transport Service Requirements.................... 5

3 Protocol Operation.................................... 9

3.1 Overview............................................ 9

3.2 Session Management.................................. 9

3.3 Command Sequencing................................. 10

3.4 Data Packing and Transmission...................... 10

3.5 Implementations.................................... 12

4 Commands and Formats................................. 15

4.1 Packet Format...................................... 15

4.2 Command Format..................................... 16

4.2.1 Command Header................................... 16

4.3 Addressing......................................... 19

4.3.1 Long Address Format.............................. 20

4.3.2 Short Address Format............................. 25

5 Protocol Commands.................................... 29

5.1 HELLO Command...................................... 29

5.2 HELLO_REPLY........................................ 29

5.3 SYNCH Command...................................... 33

5.4 SYNCH_REPLY........................................ 34

5.5 ABORT Command...................................... 35

5.6 ABORT_DONE Reply................................... 35

5.7 ERROR Reply........................................ 36

5.8 ERRACK Acknowledgement............................. 39

6 Data Transfer Commands............................... 41

6.1 WRITE Command...................................... 42

6.2 READ Command....................................... 43

6.3 READ_DATA Response................................. 45

6.4 READ_DONE Reply.................................... 47

6.5 MOVE Command....................................... 48

6.6 MOVE_DATA Response................................. 50

Page i

6.7 MOVE_DONE Reply.................................... 52

6.8 REPEAT_DATA........................................ 53

6.9 WRITE_MASK Command (Optional)...................... 54

7 Control Commands..................................... 59

7.1 START Command...................................... 59

7.2 STOP Command....................................... 61

7.3 CONTINUE Command................................... 62

7.4 STEP Command....................................... 62

7.5 REPORT Command..................................... 63

7.6 STATUS Reply....................................... 64

7.7 EXCEPTION Trap..................................... 66

8 Management Commands.................................. 69

8.1 CREATE Command..................................... 69

8.2 CREATE_DONE Reply.................................. 74

8.3 DELETE Command..................................... 75

8.4 DELETE_DONE Reply.................................. 76

8.5 LIST_ADDRESSES Command............................. 76

8.6 ADDRESS_LIST Reply................................. 77

8.7 LIST_BREAKPOINTS Command........................... 79

8.8 BREAKPOINT_LIST Reply.............................. 80

8.9 LIST_PROCESSES Command............................. 82

8.10 PROCESS_LIST Reply................................ 83

8.11 LIST_NAMES Command................................ 84

8.12 NAME_LIST Reply................................... 85

8.13 GET_PHYS_ADDR Command............................. 87

8.14 GOT_PHYS_ADDR Reply............................... 88

8.15 GET_OBJECT Command................................ 90

8.16 GOT_OBJECT Reply.................................. 91

9 Breakpoints and Watchpoints.......................... 93

9.1 BREAKPOINT_DATA Command............................ 95

10 Conditional Commands................................ 99

10.1 Condition Command Format......................... 100

10.2 COUNT Conditions................................. 101

10.3 CHANGED Condition................................ 102

10.4 COMPARE Condition................................ 103

10.5 TEST Condition................................... 105

11 Breakpoint Commands................................ 109

11.1 INCREMENT Command................................ 109

11.2 INC_COUNT Command................................ 110

11.3 OR Command....................................... 111

11.4 SET_PTR Command.................................. 112

11.5 SET_STATE Command................................ 113

Page ii

A Diagram Conventions................................. 115

B Command Summary..................................... 117

C Commands, Responses and Replies..................... 121

D Glossary............................................ 123

Page iii

FIGURES

1 Relation to Other Protocols............................ 4

2 Form of Data Exchange Between Layers................... 6

3 Packing of 16-bit Words............................... 11

4 Packing of 20-bit Words............................... 12

5 Network Packet Format................................. 15

6 LDP Command Header Format............................. 16

7 Command Classes....................................... 17

8 Command Types......................................... 18

9 Long Address Format................................... 20

10 Long Address Modes................................... 21

11 Short Address Format................................. 26

12 Short Address Modes.................................. 27

13 HELLO Command Format................................. 29

14 HELLO_REPLY Format................................... 30

15 System Types......................................... 31

16 Target Address Codes................................. 31

17 Feature Levels....................................... 32

18 Options.............................................. 33

19 SYNCH Command Format................................. 33

20 SYNCH_REPLY Format................................... 34

21 ABORT Command Format................................. 35

22 ABORT_DONE Reply Format.............................. 36

23 ERROR Reply Format................................... 37

24 ERROR Codes.......................................... 38

25 ERRACK Command Format................................ 40

26 WRITE Command Format................................. 42

27 READ Command Format.................................. 44

28 DATA Response Format................................. 46

29 READ_DONE Reply Format............................... 47

30 MOVE Command Format.................................. 49

31 MOVE_DATA Response Format............................ 51

32 MOVE_DONE Reply Format............................... 52

33 REPEAT_DATA Command Format........................... 54

34 WRITE_MASK Format.................................... 56

35 START Command Format................................. 60

36 STOP Command Format.................................. 61

37 CONTINUE Command Format.............................. 62

38 STEP Command Format.................................. 63

39 REPORT Command Format................................ 64

40 STATUS Reply Format.................................. 65

41 EXCEPTION Format..................................... 66

42 CREATE Command Format................................ 70

Page iv

43 Create Types......................................... 71

44 CREATE BREAKPOINT Format............................. 71

45 CREATE MEMORY_OBJECT Format.......................... 73

46 CREATE_DONE Reply Format............................. 74

47 DELETE Command Format................................ 75

48 DELETE_DONE Reply Format............................. 76

49 LIST_ADDRESSES Command Format........................ 77

50 ADDRESS_LIST Reply Format............................ 78

51 LIST_BREAKPOINTS Command Format...................... 80

52 BREAKPOINT_LIST Reply Format......................... 81

53 LIST_PROCESSES Command Format........................ 82

54 PROCESS_LIST Reply Format............................ 84

55 LIST_NAMES Command Format............................ 85

56 NAME_LIST Reply Format............................... 86

57 GET_PHYS_ADDR Command Format......................... 88

58 GOT_PHYS_ADDR Reply Format........................... 89

59 GET_OBJECT Command Format............................ 90

60 GOT_OBJECT Reply Format.............................. 91

61 Commands to Manipulate Breakpoints................... 93

62 Breakpoint Conditional Command Lists................. 95

63 BREAKPOINT_DATA Command Format....................... 96

64 Breakpoint Data Stream Format........................ 97

65 Conditional Command Summary.......................... 99

66 Condition Command Header............................ 101

67 COUNT Condition Format.............................. 101

68 CHANGED Condition................................... 102

69 COMPARE Condition................................... 104

70 TEST Condition...................................... 106

71 Breakpoint Command Summary.......................... 109

72 INCREMENT Command Format............................ 110

73 INC_COUNT Command Format............................ 111

74 OR Command Format................................... 111

75 SET_PTR Command Format.............................. 112

76 SET_STATE Command Format............................ 113

77 Sample Diagram...................................... 115

78 Command Summary..................................... 118

79 Commands, Responses and Replies..................... 122

Page v

CHAPTER 1

Introduction

The Loader-Debugger Protocol (LDP) is an application layer

protocol for loading, dumping and debugging target machines

from hosts in a network environment. This protocol is designed

to accommodate a variety of target cpu types. It provides a

powerful set of debugging services. At the same time, it is

structured so that a simple subset may be implemented in

applications like boot loading where efficiency and space are

at a premium.

The authors would like to thank Dan Franklin and Peter

Cudhea for providing many of the ideas on which this protocol is

based.

1.1 Purpose of This Document

This is a technical specification for the LDP protocol. It

is intended to be comprehensive enough to be used by implementors

of the protocol. It contains detailed descriptions of the

formats and usage of over forty commands. Readers interested in

an overview of LDP should read the Summary of Features, below,

and skim Sections 2 through 3.1. Also see Appendix B, the

Command Summary. The remainder of the document reads best when

accompanied by strong coffee or tea.

Page 1

RFC-909 July 1984

1.2 Summary of Features

LDP has the following features:

o commands to perform loading, dumping and debugging

o support for multiple connections to a single target

o reliable performance in an internet environment

o a small protocol subset for target loaders

o addressing modes and commands to support multiple

machine types

o breakpoints and watchpoints which run in the target

machine.

Page 2

LDP Specification General Description

CHAPTER 2

General Description

2.1 Motivation

LDP is an application protocol that provides a set of

commands used by application programs for loading, dumping and

debugging target machines across a network.

The goals of this protocol are shown in the following list:

o The protocol should support various processor types and

operating systems. Overhead and complexity should be

minimized for simpler cases.

o The protocol should provide support for applications in

which more than one user can debug the same target

machine. This implies an underlying transport mechanism

that supports multiple connections between a host-target

pair.

o LDP should have a minimal subset of commands for boot

loading and dumping. Target machine implementations of

these applications are often restricted in the amount of

code-space they may take. The services needed for

loading and dumping should be provided in a small,

easily implemented set of commands.

o There should be a means for communicating exceptions and

errors from the target LDP process to the host process.

o LDP should allow the application to implement a full set

of debugging functions without crippling the performance

of the target's application (i.e., PSN, PAD, gateway).

For example, a breakpoint mechanism that halts the

target machine while breakpoint commands are sent from

the host to the target is of limited usefulness, since

the target will be unable to service the real-time

Page 3

RFC-909 July 1984

demands of its application.

2.2 Relation to Other Protocols

LDP is an application protocol that fits into the layered

internet protocol environment. Figure 1 illustrates the place of

LDP in the protocol hierarchy.

+------------------------------+

LDP Application

+------------------------------+ Layer

+---------+ +---------+

RDP or TCP Transport Layer

+---------+ +---------+

or

+--------------------+

Internet Protocol Internetwork

+--------------------+ Layer

+------------------------------+

Network Access Protocol Network Layer

+------------------------------+

Relation to Other Protocols

Figure 1

Page 4

LDP Specification General Description

2.2.1 Transport Service Requirements

LDP requires that the underlying transport layer:

o allow connections to be opened by specifying a network

(or internet) address. Support passive and active

opens.

o for each connection, specify the maximum message size.

o provide a mechanism for sending and receiving messages

over an open connection.

o deliver messages reliably and in sequence

o support multiple connections, and distinguish messages

associated with different connections. This is only a

requirement where LDP is eXPected to support several

users at the same time.

o explictly return the outcome (success/failure) of each

request (open, send, receive), and provide a means of

querying the status of a connection (unacknowledged

message count, etc.).

Data is passed from the application program to the LDP user

process in the form of commands. In the case of an LDP server

process, command responses originate in LDP itself. Below LDP is

the transport protocol. The Reliable Data Protocol (RDP --

RFC908) is the recommended transport procotol. Data is passed

across the LDP/RDP interface in the form of messages. (TCP may

be used in place of RDP, but it will be less efficient and it

will require more resources to implement.) An internet layer

(IP) normally comes between RDP and the network layer, but RDP

may exchange data packets directly with the network layer.

Figure 2 shows the flow of data across the protocol

interfaces:

Page 5

RFC-909 July 1984

+------+

Appli-

cation

+------+

^

Commands

V

+------+

LDP

+------+

^

Messages

V

+-----+

RDP

+-----+

^

Segments

V

+----+

IP

+----+

^

Datagrams

V

? * !

$ = ^ +

*

> Internet

, ?

! )

* % $

Form of Data Exchange Between Layers

Figure 2

Page 6

LDP Specification General Description

Page 7

RFC-909 July 1984

Page 8

LDP Specification Protocol Operation

CHAPTER 3

Protocol Operation

3.1 Overview

An LDP session consists of an exchange of commands and

responses between an LDP user process and an LDP server process.

Normally, the user process resides on a host machine (a

timesharing computer used for network monitoring and control),

and the server process resides on a target machine (PSN, PAD,

gateway, etc.). Throughout this document, host and target are

used as synonyms for user process and server process,

respectively, although in some implementations (the Butterfly,

for example) this correspondence may be reversed. The host

controls the session by sending commands to the target. Some

commands elicit responses, and all commands may elicit an error

reply.

The protocol contains five classes of commands: protocol,

data transfer, management, control and breakpoint. Protocol

commands are used to verify the command sequencing mechanism and

to handle erroneous commands. Data transfer commands involve the

transfer of data from one place to another, such as for memory

examine/deposit, or loading. Management commands are used for

creating and deleting objects (processes, breakpoints,

watchpoints, etc.) in the target machine. Control commands are

used to control the execution of target code and breakpoints.

Breakpoint commands are used to control the execution of commands

inside breakpoints and watchpoints.

3.2 Session Management

An LDP session consists of a series of commands sent from a

host LDP to a target LDP, some of which may be followed by

responses from the target. A session begins when a host opens a

transport connection to a target listening on a well known port.

LDP uses RDP port number zzz or TCP port number yyy. When the

connection has been established, the host sends a HELLO command,

and the target replies with a HELLO_REPLY. The HELLO_REPLY

contains parameters that describe the target's implementation of

LDP, including protocol version, implementation level, system

Page 9

RFC-909 July 1984

type, and address format. The session terminates when the host

closes the underlying transport connection. When the target

detects that the transport connection has been closed, it should

deallocate any resources dedicated to the session.

The target process is the passive partner in an LDP session,

and it waits for the host process to terminate the session. As

an implementation consideration, either LDP or the underlying

transport protocol in the target should have a method for

detecting if the host process has died. Otherwise, an LDP

target that supported only one connection could be rendered

useless by a host that crashed in the middle of a session. The

problem of detecting half-dead connections can be avoided by

taking a different tack: the target could allow new connections

to usurp inactive connections. A connection with no activity

could be declared 'dead', but would not be usurped until the

connection resource was needed. However, this would still

require the transport layer to support two connection channels:

one to receive connection requests, and another to use for an

active connection.

3.3 Command Sequencing

Each command sent from the host to the target has a sequence

number. The sequence number is used by the target to refer to

the command in normal replies and error replies. To save space,

these numbers are not actually included in host commands.

Instead, each command sent from the host is assigned an implicit

sequence number. The sequence number starts at zero at the

beginning of the LDP session and increases by one for each

command sent. The host and target each keep track of the current

number. The SYNCH <sequence number> command may be used by the

host to synchronize the sequence number.

3.4 Data Packing and Transmission

The convention for the order of data packing was chosen for

its simplicity: data are packed most significant bit first, in

order of increasing target address, into eight-bit octets. The

octets of packed data are transmitted in sequential order.

Page 10

LDP Specification Protocol Operation

Data are always packed according to the address format of

the target machine. For example, in an LDP session between a

20-bit host and a 16-bit target, 16-bit words (packed into

octets) are transmitted in both directions. For ease of

discussion, targets are treated here as if they have uniform

address spaces. In practice, the size of address units may vary

within a target -- 16-bit macromemory, 32-bit micromemory, 10-bit

dispatch memory, etc. Data packing between host and target is

tailored to the units of the current target address space.

Figures showing the packing of data for targets with various

address unit sizes are given below. The order of transmission

with respect to the diagrams is top to bottom. Bit numbering in

the following diagrams refers to significance in the octet: bit

zero is the least significant bit in an octet. For an

explanation of the bit numbering convention that applies in the

rest of this document, please see Appendix A.

The packing of data for targets with word lengths that are

multiples of 8 is straightforward. The following diagram

illustrates 16-bit packing:

7 0

---------------------------------

Octet 0 WORD 0 bits 15-08

---------------------------------

Octet 1 WORD 0 bits 07-00

---------------------------------

Octet 2 WORD 1 bits 15-08

---------------------------------

Octet 3 WORD 1 bits 07-00

---------------------------------

*

*

*

---------------------------------

Octet 2n-1 WORD n bits 07-00

---------------------------------

Packing of 16-bit Words

Figure 3

Page 11

RFC-909 July 1984

Packing for targets with peculiar word lengths is more

complicated. For 20-bit machines, 2 words of data are packed

into 5 octets. When an odd number of 20-bit words are

transmitted, the partially used octet is included in the length

of the command, and the octet is padded to the right with zeroes.

7 0

---------------------------------

Octet 0 WORD 0 bits 19-12

---------------------------------

Octet 1 WORD 0 bits 11-04

---------------------------------

Octet 2 WORD 0 03-00 WORD 1 19-16

---------------------------------

Octet 3 WORD 1 bits 15-08

---------------------------------

Octet 4 WORD 1 bits 07-00

---------------------------------

Packing of 20-bit Words

Figure 4

3.5 Implementations

A subset of LDP commands may be implemented in targets where

machine resources are limited and the full capabilities of LDP

are not needed. There are three basic levels of target

implementations: LOADER_DUMPER, BASIC_DEBUGGER and

FULL_DEBUGGER. The target communicates its LDP implementation

level to the host during session initiation. The implementation

levels are described below:

Page 12

LDP Specification Protocol Operation

LOADER_DUMPER

Used for loading/dumping of the target machine.

Includes all protocol class commands and replies; data

transfer commands READ, WRITE, MOVE and their responses;

control command START and control reply EXCEPTION.

Understands at least PHYS_MACRO and HOST addressing modes;

others if desired.

BASIC_DEBUGGER

Implements LOADER_DUMPER commands, all control commands,

all addressing modes appropriate to the target machine, but

does not have finite state machine (FSM) breakpoints or

watchpoints. Default breakpoints are implemented. The

target understands long addressing mode.

FULL_DEBUGGER

Implements all commands and addressing modes appropriate to

the target machine, and includes breakpoint commands,

conditional commands and BREAKPOINT_DATA. Watchpoints are

optional.

Page 13

RFC-909 July 1984

Page 14

LDP Specification Commands and Formats

CHAPTER 4

Commands and Formats

4.1 Packet Format

LDP commands are enclosed in RDP transport messages. An RDP

message may contain more than one command, but each command must

fit entirely within a single message. Network packets containing

LDP commands have the format shown in Figure 5.

+----------------+

Local Network

Header(s)

+----------------+

IP Header

+----------------+

RDP Header

+----------------+ +-+

LDP Command

Header

+----------------+

Optional

. LDP . LDP Command

. Data . Format

+----------------+

LDP Padding

+----------------+ +-+

Additional

. LDP .

. Commands .

. .

+----------------+

Network Packet Format

Figure 5

Page 15

RFC-909 July 1984

4.2 Command Format

LDP commands consist of a standard two-word header followed

optionally by additional data. To facilitate parsing of multi-

command messages, all commands contain an even number of octets.

Commands that contain an odd number of data octets must be padded

with a null octet.

The commands defined by the LDP specification are intended

to be of universal application to provide a common basis for all

implementations. Command class and type codes from 0 to 63. are

reserved by the protocol. Codes above 63. are available for the

implementation of target-specific commands.

4.2.1 Command Header

LDP commands begin with a fixed length header. The header

specifies the type of command and its length in octets.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length (octets)

+---------------+---------------+

1 Command Class Command Type

+---------------+---------------+

LDP Command Header Format

Figure 6

HEADER FIELDS:

Command Length

The command length gives the total number of octets in the

command, including the length field and data, and excluding

padding.

Command Class

Command Type

Page 16

LDP Specification Commands and Formats

The command class and type together specify a particular

command. The class selects one of six command categories,

and the type gives the command within that category. All

codes are decimal. The symbols given in Figures 7 and 8 for

command classes and types are used in the remainder of this

document for reference.

The command classes that have been defined are:

Command Class Symbol

----------------+-----------

1 PROTOCOL

2 DATA_TRANSFER

3 CONTROL

4 MANAGEMENT

5 BREAKPOINT

6 CONDITION

7 - 63 <reserved>

Command Classes

Figure 7

Command type codes are assigned in order of expected

frequency of use. Commands and their responses/replies are

numbered sequentially. The command types, ordered by

command class, are:

Page 17

RFC-909 July 1984

Command Class Command Type Symbol

----------------+---------------+----------

PROTOCOL 1 HELLO

2 HELLO_REPLY

3 SYNCH

4 SYNCH_REPLY

5 ERROR

6 ERRACK

7 ABORT

8 ABORT_DONE

9 - 63 <reserved>

DATA_TRANSFER 1 WRITE

2 READ

3 READ_DONE

4 READ_DATA

5 MOVE

6 MOVE_DONE

7 MOVE_DATA

8 REPEAT_DATA

9 BREAKPOINT_DATA

10 WRITE_MASK

11 - 63 <reserved>

CONTROL 1 START

2 STOP

3 CONTINUE

4 STEP

5 REPORT

6 STATUS

7 EXCEPTION

8 - 63 <reserved>

MANAGEMENT 1 CREATE

2 CREATE_DONE

3 DELETE

4 DELETE_DONE

5 LIST_ADDRESSES

6 ADDRESS_LIST

7 GET_PHYS_ADDRESS

8 GOT_PHYS_ADDRESS

9 GET_OBJECT

10 GOT_OBJECT

11 LIST_BREAKPOINTS

12 BREAKPOINT_LIST

Page 18

LDP Specification Commands and Formats

13 LIST_NAMES

14 NAME_LIST

15 LIST_PROCESSES

16 PROCESS_LIST

17 - 63 <reserved>

BREAKPOINT 1 INCREMENT

2 INC_COUNT

3 OR

4 SET_PTR

5 SET_STATE

6 - 63 <reserved>

CONDITION 1 CHANGED

2 COMPARE

3 COUNT_EQ

4 COUNT_GT

5 COUNT_LT

6 TEST

7 - 63 <reserved>

Command Types

Figure 8

4.3 Addressing

Addresses are used in LDP commands to refer to memory

locations, processes, buffers, breakpoints and other entities.

Many of these entities are machine-dependent; some machines have

named objects, some machines have multiple address spaces, the

size of address spaces varies, etc. The format for specifying

addresses needs to be general enough to handle all of these

cases. This speaks for a large, hierarchically structured

address format. However, the disadvantage of a large format is

that it imposes extra overhead on communication with targets that

have simpler address schemes.

LDP resolves this conflict by employing two address formats:

a short three-word format for addressing simpler targets, and a

long five-word format for others. Each target LDP is required to

implement at least one of these formats. At the start of an LDP

session, the target specifies the address format(s) it uses in

Page 19

RFC-909 July 1984

the Flag field of the HELLO_REPLY message. In each address, the

first bit of the mode octet is a format flag: 0 indicates LONG

address format, and 1 indicates SHORT format.

4.3.1 Long Address Format

The long address format is five words long and consists of a

three-word address descriptor and a two-word offset (see Figure

9). The descriptor specifies an address space to which the offset

is applied. The descriptor is subdivided into several fields, as

described below. The structuring of the descriptor is designed

to support complex addressing modes. For example, on targets

with multiple processes, descriptors may reference virtual

addresses, registers, and other entities within a particular

process.

The addressing modes defined below are intended as a base to

which target-specific modes may be added. Modes up to 63. are

reserved by the protocol. The range 64. to 127. may be used for

target-specific address modes.

Long Format - Format bit is LONG=0

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+-------------------------------+ +-+

0 Mode Mode Arg

+-------------------------------+

(31-16) Descriptor

+---- ID ---+

(15-0)

+-------------------------------+ +-+

(31-16)

+---- Offset ---+ Offset

(15-0)

+-------------------------------+ +-+

Long Address Format

Figure 9

LONG ADDRESS FIELDS:

Page 20

LDP Specification Commands and Formats

Mode

The address mode identifies the type of address space being

referenced. The mode is qualified by the mode argument and

the ID field. Implementation of modes other than physical

and host is machine-dependent. Currently defined modes and

the address space they reference are shown in Figure 10.

Mode Symbol Address space

-----+----------------------+---------------------------

0 HOST Host

1 PHYS_MACRO Macromemory

2 PHYS_MICRO Micromemory

3 PHYS_I/O I/O space

4 PHYS_MACRO_PTR Macro contains a pointer

5 PHYS_REG Register

6 PHYS_REG_OFFSET Register plus offset

7 PHYS_REG_INDIRECT Register contains address

of a pointer

8 PROCESS_CODE Process code space

9 PROCESS_DATA Process data space

10 PROCESS_DATA_PTR Process data contains a ptr

11 PROCESS_REG Process virtual register

12 PROCESS_REG_OFFSET Process register plus offset

13 PROCESS_REG_INDIRECT Process register contains

address of a pointer

14 OBJECT_OFFSET Memory object (queue, pool)

15 OBJECT_HEADER System header for an object

16 BREAKPOINT Breakpoint

17 WATCHPOINT Watchpoint

18 BPT_PTR_OFFSET Breakpoint ptr plus offset

19 BPT_PTR_INDIRECT Breakpoint ptr plus offset

gives address of a pointer

20 - <reserved>

63

Long Address Modes

Figure 10

Mode Argument

Page 21

RFC-909 July 1984

Provides a numeric argument to the mode field. Specifies

the register in physical and process REG and REG_OFFSET

modes.

ID Field

Identifies a particular process, buffer or object.

Offset

The offset into the linear address space defined by the

mode. The size of the machine word determines the number of

significant bits in the offset. Likewise, the addressing

units of the target are the units of the offset.

The interpretation of the mode argument, ID field and offset for

each address mode is given below:

HOST

The ID and offset fields are numbers assigned arbitrarily by

the host side of the debugger. These numbers are used in

MOVE and MOVE_DATA messages. MOVE_DATA responses containing

this mode as the destination are sent by the target to the

host. This may occur in debugging when data is sent to the

host from the target breakpoint.

PHYS_MACRO

The offset contains the 32-bit physical address of a

location in macromemory. The mode argument and ID field are

not used. For example, mode=PHYS_MACRO and offset=1000

specifies location 1000 in physical memory.

PHYS_MICRO

Like PHYS_MACRO, but the location is in micromemory.

PHYS_I/O

Like PHYS_MACRO, but the location is in I/O space.

PHYS_MACRO_PTR

The offset contains the address of a pointer in macromemory.

The location pointed to (the effective address) is also in

macromemory. The mode argument and ID field are unused.

Page 22

LDP Specification Commands and Formats

PHYS_REG

The mode argument gives the physical register. If the

register is used by the LDP target process, then the saved

copy from the previous context is used. This comment

applies to PHYS_REG_OFFSET mode as well. The ID field is

not used.

PHYS_REG_OFFSET

The offset is added to the contents of a register given as

the mode argument. The result is used as a physical address

in macromemory. ID is unused.

PHYS_REG_INDIRECT

The register specified in the mode arg contains the address

of a pointer in macromemory. The effective address is the

macromemory location specified in the pointer, plus the

offset. The ID field is unused.

PROCESS_CODE

The ID is a process ID, the offset is into the code space

for this process. Mode argument is not used.

PROCESS_DATA

The ID is a process ID, the offset is into the data space

for this process. Mode argument is not used. On systems

that do not distinguish between code and data space, these

two modes are equivalent, and reference the virtual address

space of the process.

PROCESS_DATA_PTR

The offset contains the address of a pointer in the data

space of the process specified by the ID. The location

pointed to (the effective address) is also in the data

space. The mode argument is not used.

PROCESS_REG

Accesses the registers (and other system data) of the

process given by the ID field. Mode argument 0 starts the

registers. After the registers, the mode argument is an

offset into the system area for the process.

Page 23

RFC-909 July 1984

PROCESS_REG_OFFSET

The offset plus the contents of the register given in the

mode argument specifies a location in the data space of the

process specified by the ID.

PROCESS_REG_INDIRECT

The register specified in the mode arg contains the address

of a pointer in the data space of the process given by the

ID. The effective address is the location in process data

space specified in the pointer, plus the offset.

OBJECT_OFFSET (optional)

The offset is into the memory space defined by the object ID

in ID. Recommended for remote control of parameter

segments.

OBJECT_HEADER (optional)

The offset is into the system header for the object

specified by the ID. Intended for use with the Butterfly.

BREAKPOINT

The descriptor specifies a breakpoint. The offset is never

used, this type is only used in descriptors referring to

breakpoints. (See Breakpoints and Watchpoints, below, for

an explanation of breakpoint descriptors.)

WATCHPOINT

The descriptor specifies a watchpoint. The offset is never

used, this type is only used in descriptors referring to

watchpoints. (See Breakpoints and Watchpoints, below, for

an explanation of watchpoint descriptors).

BPT_PTR_OFFSET

For this mode and BPT_PTR_INDIRECT, the mode argument

specifies one of two breakpoint pointer variables local to

the breakpoint in which this address occurs. These pointers

and the SET_PTR command which manipulates them provide for

an arbitrary amount of address indirection. They are

intended for use in traversing data structures: for example,

chasing queues. In BPT_PTR_OFFSET, the offset is added to

Page 24

LDP Specification Commands and Formats

the pointer variable to give the effective address. In

targets which support multiple processes, the location is in

the data space of the process given by the ID. Otherwise,

the location is a physical address in macro-memory.

BPT_PTR.* modes are valid only in breakpoints and

watchpoints.

BPT_PTR_INDIRECT

Like BPT_PTR_OFFSET, except that it uses one more level of

indirection. The pointer variable given by the mode

argument plus the offset specify an address which points to

the effective address. See the description of

BPT_PTR_OFFSET for a discussion of usage, limitations and

address space.

4.3.2 Short Address Format

The short address format is intended for use in

implementations where protocol overhead must be minimized. This

format is a subset of the long address format: it contains the

same fields except for the ID field. Therefore, the short

addressing format supports only HOST and PHYS_* address modes.

Only the LOADER_DUMPER implementation level commands may be used

with the short addressing format. The short address format is

three words long, consisting of a 16-bit word describing the

address space, and a 32-bit offset.

Page 25

RFC-909 July 1984

Short Format - Format bit is SHORT=1

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+-------------------------------+

1 Mode Mode Argument

+-------------------------------+ +-+

(31-16)

+---- Offset ---+ Offset

(15-0)

+-------------------------------+ +-+

Short Address Format

Figure 11

SHORT ADDRESS FIELDS:

Mode

The high-order bit is 1, indicating the short address

format. A list of the address modes supported is given

below. The interpretation of the remaining fields is as

described above for the long addressing format.

Page 26

LDP Specification Commands and Formats

Mode Symbol Address space

-----+--------------------+---------------------------

0 HOST Host

1 PHYS_MACRO Macro-memory

2 PHYS_MICRO Micro-memory

3 PHYS_I/O I/O space

4 PHYS_MACRO_PTR Macro contains a pointer

5 PHYS_REG Register

6 PHYS_REG_OFFSET Register plus offset

7 PHYS_REG_INDIRECT Register contains address

of a pointer

8 -

32 <reserved>

Short Address Modes

Figure 12

Page 27

RFC-909 July 1984

Page 28

LDP Specification Protocol Commands

CHAPTER 5

Protocol Commands

Protocol commands are used for error handling, for

synchronizing the command sequence number, and for communicating

protocol implementation parameters. Every protocol command has a

corresponding reply. All protocol commands are sent from the

host to the target, with replies flowing in the opposite

direction.

5.1 HELLO Command

The HELLO command is sent by the host to signal the start of

an LDP session. The target responds with HELLO_REPLY.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 4

+---------------+---------------+

1 PROTOCOL HELLO

+---------------+---------------+

HELLO Command Format

Figure 13

5.2 HELLO_REPLY

A HELLO_REPLY is sent by the target in response to the HELLO

command at the start of an LDP session. This reply is used to

inform the host about the target's implementation of LDP.

Page 29

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 10

+---------------+---------------+

1 PROTOCOL HELLO_REPLY

+---------------+---------------+

2 LDP Version System Type

+---------------+---------------+

3 Options WS Implementation

+---------------+---------------+

4 Address Code Reserved

+---------------+---------------+

HELLO_REPLY Format

Figure 14

HELLO_REPLY FIELDS:

LDP Version

The target's LDP protocol version. If the current

host protocol version does not agree with the target's

protocol version, the host may terminate the session, or

may continue it, at the discretion of the implementor. The

current version number is 2.

System Type

The type of system running on the target. This is used as a

check against what the host thinks the target is. The host

is expected to have a table of target system types with

information about target address spaces, target-specific

commands and addressing modes, and so forth.

Currently defined system types are shown in Figure 15. This

list includes some systems normally thought of as 'hosts'

(e.g. C70, VAX), for implementations where targets actively

initiate and direct a load of themselves.

Page 30

LDP Specification Protocol Commands

Code System Description

--------+---------------+---------------------------

1 C30_16_BIT BBN 16-bit C30

2 C30_20_BIT BBN 20-bit C30

3 H316 Honeywell-316

4 BUTTERFLY BBN Butterfly

5 PDP-11 DEC PDP-11

6 C10 BBN C10

7 C50 BBN C50

8 PLURIBUS BBN Pluribus

9 C70 BBN C70

10 VAX DEC VAX

11 MACINTOSH Apple MacIntosh

System Types

Figure 15

Address Code

The address code indicates which LDP address format(s) the

target is prepared to use. Address codes are show in Figure

16.

Address Code Symbol Description

--------------+---------------+-----------------------------

1 LONG_ADDRESS Five word address format.

Supports all address modes

and commands.

2 SHORT_ADDRESS Three word address format.

Supports only physical and

host address modes. Only

the LOADER_DUMPER set of

commands are supported.

Target Address Codes

Figure 16

Implementation

Page 31

RFC-909 July 1984

The implementation level specifies which features of

the protocol are implemented in the target. There are

three levels of protocol implementation. These levels are

intended to correspond to the three most likely applications

of LDP: simple loading and dumping, basic debugging, and

full debugging. (Please see Implementations, above, for a

detailed description of implementation levels.) There are

are also several optional features that are not included in

any particular level.

Implementation levels are cumulative, that is, each higher

level includes the features of all previous levels. The

levels are shown in Figure 17.

Feature Level Symbol Description

--------------+---------------+-----------------------------

1 LOADER_DUMPER Loader/dumper subset of LDP

2 BASIC_DEBUGGER Control commands, CREATE

3 FULL_DEBUGGER FSM breakpoints

Feature Levels

Figure 17

Options

The options field (see Figure 18) is an eight-bit flag

field. Bit flags are used to indicate if the target has

implemented particular optional commands. Not all optional

commands are referenced in this field. Commands whose

implementation depends on target machine features are

omitted. The LDP application is expected to 'know' about

target features that are not intrinsic to the protocol.

Examples of target-dependent commands are commands that

refer to named objects (CREATE, LIST_NAMES).

Page 32

LDP Specification Protocol Commands

Mask Symbol Description

------+-------------+---------------+-----------------

1 STEP The STEP command is implemented

2 WATCHPOINTS Watchpoints are implemented

Options

Figure 18

5.3 SYNCH Command

The SYNCH command is sent by the host to the target. The

target responds with a SYNCH_REPLY. The SYNCH - SYNCH_REPLY

exchange serves two functions: it synchronizes the host-to-target

implicit sequence number and acts as a cumulative acknowledgement

of the receipt and execution of all host commands up to the

SYNCH.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 6

+---------------+---------------+

1 PROTOCOL SYNCH

+---------------+---------------+

2 Sequence Number

+---------------+---------------+

SYNCH Command Format

Figure 19

SYNCH FIELDS:

Sequence Number

Page 33

RFC-909 July 1984

The sequence number of this command. If this is not what

the target is expecting, the target will reset to it and

respond with an ERROR reply.

5.4 SYNCH_REPLY

A SYNCH_REPLY is sent by the target in reponse to a valid

SYNCH command. A SYNCH command is valid if its sequence number

agrees with the sequence number the target is expecting.

Otherwise, the target will reset its sequence number to the SYNCH

command and send an ERROR reply.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 6

+---------------+---------------+

1 PROTOCOL SYNCH_REPLY

+---------------+---------------+

2 Sequence Number

+---------------+---------------+

SYNCH_REPLY Format

Figure 20

SYNCH_REPLY FIELDS:

Sequence Number

The sequence number of the SYNCH command to which this

SYNCH_REPLY is the response.

Page 34

LDP Specification Protocol Commands

5.5 ABORT Command

The ABORT command is sent from the host to abort all pending

operations at the target. The target responds with ABORT_DONE.

This is primarily intended to stop large data transfers from the

target. A likely application would be during a debugging session

when the user types an interrupt to abort a large printout of

data from the target. The ABORT command has no effect on any

breakpoints or watchpoints that may be enabled in the target.

As a practical matter, the ABORT command may be difficult to

implement on some targets. Its ability to interrupt command

processing on the target depends on the target being able to look

ahead at incoming commands and receive an out-of-band signal from

the host. However, the effect of an ABORT may be achieved by

simply closing and reopening the transport connection.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 4

+---------------+---------------+

1 PROTOCOL ABORT

+---------------+---------------+

ABORT Command Format

Figure 21

5.6 ABORT_DONE Reply

The ABORT_DONE reply is sent from the target to the host in

response to an ABORT command. This indicates that the target has

terminated all operations that were pending when the ABORT

command was received. The sequence number of the ABORT command

is included in the reply.

Page 35

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 4

+---------------+---------------+

1 PROTOCOL ABORT_DONE

+---------------+---------------+

2 Sequence Number

+---------------+---------------+

ABORT_DONE Reply Format

Figure 22

ABORT_DONE FIELDS:

Sequence Number

The sequence number of the ABORT command that elicited this

reply. This enables the host to distinguish between

replies to multiple aborts.

5.7 ERROR Reply

The ERROR reply is sent by the target in response to a bad

command. The ERROR reply gives the sequence number of the

offending command and a reason code. The target ignores further

commands until an ERRACK command is received. The reason for

ignoring commands is that the proper operation of outstanding

commands may be predicated on the execution of the erroneous

command.

Page 36

LDP Specification Protocol Commands

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 PROTOCOL ERROR

+---------------+---------------+

2 Command Sequence Number

+---------------+---------------+

3 Error code

+---------------+---------------+

4 Optional Data

+---------------+---------------+

*

*

*

+---------------+---------------+

n Optional Data

+---------------+---------------+

ERROR Reply Format

Figure 23

ERROR Reply FIELDS:

Command Sequence Number

The implicit sequence number of the erroneous command.

Error Code

A code specifying what error has taken place. The currently

defined codes are shown in Figure 24.

Page 37

RFC-909 July 1984

Error Code Symbol

-----------+------------------------

1 BAD_COMMAND

2 BAD_ADDRESS_MODE

3 BAD_ADDRESS_ID

4 BAD_ADDRESS_OFFSET

5 BAD_CREATE_TYPE

6 NO_RESOURCES

7 NO_OBJECT

8 OUT_OF_SYNCH

9 IN_BREAKPOINT

ERROR Codes

Figure 24

An explanation of each of these error codes follows:

BAD_COMMAND

The command was not meaningful to the target machine.

This includes commands that are valid but unimplemented

in this target. Also, the command was not valid in

this context. For example, a command given by the host

that is only legal in a breakpoint (e.g. IF,

SET_STATE).

BAD_ADDRESS_MODE <offending-address>

The mode of an address given in the command is not

meaningful to this target system. For example, a

PROCESS address mode on a target that does not support

multi-processing.

BAD_ADDRESS_ID <offending-address>

The ID field of an address didn't correspond to an

appropriate thing. For example, for a PROCESS address

mode, the ID of a non-existent process.

BAD_ADDRESS_OFFSET <offending-address>

The offset field of the address was outside the legal

range for the thing addressed. For example, an offset

of 200,000 in PHYS_MACRO mode on a target with 64K of

Page 38

LDP Specification Protocol Commands

macro-memory.

BAD_CREATE_TYPE

The object type in a CREATE command was unknown.

NO_RESOURCES

A CREATE command failed due to lack of necessary

resources.

NO_OBJECT

A GET_OBJECT command failed to find the named object.

OUT_OF_SYNCH

The sequence number of the SYNCH command was not

expected by the target. The target has resynchronized

to it.

IN_BREAKPOINT <breakpoint-descriptor> <breakpoint-sequence#>

<reason-code> [<optional-info>]

An error occurred within a breakpoint command list.

The given 16-bit sequence-number refers to the sequence

number of the CREATE command that created the

breakpoint, while breakpoint-sequence# refers to the

sequence number of the command within the breakpoint

given by <breakpoint-descriptor>.

5.8 ERRACK Acknowledgement

An ERRACK is sent by the host in response to an ERROR

reply from the target. The ERRACK is used to acknowledge that

the host has received the ERROR reply.

Page 39

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 4

+---------------+---------------+

1 PROTOCOL ERRACK

+---------------+---------------+

ERRACK Command Format

Figure 25

Page 40

LDP Specification Data Transfer Commands

CHAPTER 6

Data Transfer Commands

Data transfer commands transfer data between the host and

the target. These commands are used for loading and dumping the

target, and examining and depositing locations on the target.

The READ command reads data from the target, the MOVE command

moves data within the target or from the target to another

entity, and the WRITE command writes data to the target.

REPEAT_DATA makes copies of a pattern to the target -- it is

useful for zeroing memory. WRITE_MASK writes data with a mask,

and is intended for modifying target parameter tables.

Data transmitted to and from the target always contains a

target address. In writes to the target, this is used as the

destination of the data. In reads from the target, the target

address is used by the host to identify where in the target the

data came from. In addition, the MOVE command may contain a

'host' address as its destination; this permits the host to

further discriminate between possible sources of data from the

target -- from different breakpoints, debugging windows, etc.

A read request to the target may generate one or more

response messages. In particular, responses to requests for

large amounts of data -- core dumps, for example -- must be

broken up into multiple messages, if the block of data requested

plus the LDP header exceeds the transport layer message size.

In commands which contain data (WRITE, READ_DATA, MOVE_DATA

and REPEAT_DATA), if there are an odd number of data octets, then

a null octet is appended. This is so that the next command in

the message, if any, will begin on an even octet. The command

length is the sum of the number of octets in the command header

and the number of octets of data, excluding the null octet, if

any.

The addressing formats which may be used with data transfer

commands are specified for each LDP session at the start of the

session by the target in the HELLO_REPLY response. See the

section entitled 'Addressing', above, for a description of LDP

addressing formats and modes. In the command diagrams given

below, the short addressing format is illustrated. For LDP

sessions using long addressing, addresses are five words long,

Page 41

RFC-909 July 1984

instead of three words, as shown here. In both addressing modes,

descriptors are three words and offsets are two words.

6.1 WRITE Command

The WRITE command is used to send octets of data from the

host to the target. This command specifies the address in the

target where the data is to be stored, followed by a stream of

data octets. If the data stream contains an odd number of

octets, then a null octet is appended so that the next command,

if any, will begin on an even octet. Since LDP must observe

message size limitations imposed by the underlying transport

layer, a single logical write may need to be broken up into

multiple WRITEs in separate transport messages.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 DATA_TRANSFER WRITE

+---------------+---------------+

2

+-- Target --+

3 Start

+-- Address --+

4

+---------------+---------------+

5 Data Octet Data Octet

+---------------+---------------+

*

*

*

+---------------+---------------+

n Data Octet Data or Null

+---------------+---------------+

WRITE Command Format

Figure 26

Page 42

LDP Specification Data Transfer Commands

WRITE FIELDS:

Command Length

The command length gives the number of octets in the

command, including data octets, but excluding the padding

octet, if any.

Target Start Address

This is the address to begin storing data in the target.

The length of the data to be stored may be inferred by the

target from the command length. An illegal address or range

will generate an ERROR reply.

Data Octets

Octets of data to be stored in the target. Data are packed

according to the packing convention described above. Ends

with a null octet if there are an odd number of data octets.

6.2 READ Command

The host uses the READ command to ask the target to

send back a contiguous block of data. The data is specified by

a target starting address and a count. The target returns the

data in one or more READ_DATA commands, which give the starting

address (in the target) of each segment of returned data. When

the transfer is completed, the target sends a READ_DONE command

to the host.

Page 43

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 14

+---------------+---------------+

1 DATA_TRANSFER READ

+---------------+---------------+

2

+-- Target --+

3 Start

+-- Address --+

4

+---------------+---------------+

5 Address

+-- Unit --+

6 Count

+---------------+---------------+

READ Command Format

Figure 27

READ FIELDS:

Target Start Address

The starting address of the requested block of target data.

The target sends an ERROR reply if the starting address is

illegal, if the ending address computed from the sum of the

start and the count is illegal, or if holes are encountered

in the middle of the range.

Address Unit Count

The count of the number of target indivisibly-addressable

units to be transferred. For example, if the address space

is PHYS_MACRO, a count of two and a start address of 1000

selects the contents of locations 1000 and 1001. 'Count' is

used instead of 'length' to avoid the problem of determining

units the length should be denominated in (octets, words,

etc.). The size and type of the unit will vary depending on

the address space selected by the target start address. The

target should reply with an error (if it is able to

Page 44

LDP Specification Data Transfer Commands

determine in advance of a transfer) if the inclusive range

of addresses specified by the start address and the count

contains an illegal or nonexistent address.

6.3 READ_DATA Response

The target uses the READ_DATA response to transmit data

requested by a host READ command. One or more READ_DATA

responses may be needed to fulfill a given READ command,

depending on the size of the data block requested and the

transport layer message size limits. Each READ_DATA response

gives the target starting address of its segment of data. If the

response contains an odd number of data octets, the target ends

the response with a null octet.

Page 45

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 DATA_TRANSFER READ_DATA

+---------------+---------------+

2

+-- Target --+

3 Start

+-- Address --+

4

+---------------+---------------+ +-+

5 Data Octet Data Octet

+---------------+---------------+

*

* Data

*

+---------------+---------------+

n Data Octet Data or Null

+---------------+---------------+ +-+

DATA Response Format

Figure 28

READ_DATA FIELDS:

Command Length

The command length gives the number of octets in the

command, including data octets, but excluding the padding

octet, if any. The host can calculate the length of the

data by suBTracting the header length from the command

length. Since the target address may be either three words

(short format) or five words (long format), the address mode

must be checked to determine which is being used.

Target Start Address

This is the starting address of the data segment in this

message. The host may infer the length of the data from the

command length. The address format (short or long) is the

Page 46

LDP Specification Data Transfer Commands

same as on the initial READ command.

Data Octets

Octets of data from the target. Data are packed according

to the packing convention described above. Ends with a null

octet if there are an odd number of data octets.

6.4 READ_DONE Reply

The target sends a READ_DONE reply to the host after it has

finished transferring the data requested by a READ command.

READ_DONE specifies the sequence number of the READ command.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 6

+---------------+---------------+

1 DATA_TRANSFER READ_DONE

+---------------+---------------+

2 READ Sequence Number

+---------------+---------------+

READ_DONE Reply Format

Figure 29

READ_DONE FIELDS:

READ Sequence Number

The sequence number of the READ command this is a reply to.

Page 47

RFC-909 July 1984

6.5 MOVE Command

The MOVE command is sent by the host to move a block of data

from the target to a specified destination. The destination

address may specify a location in the target, in the host, or in

another target (for loading one target from another). The data

is specified by a target starting address and an address unit

count. The target sends an ERROR reply if the starting address

is illegal, if the ending address computed from the sum of the

start and the count is illegal, or if holes are encountered in

the middle of the range. If the MOVE destination is off-target,

the target moves the data in one or MOVE_DATAs. Other commands

arriving at the target during the transfer should be processed in

a timely fashion, particularly the ABORT command. When the data

has been moved, the target sends a MOVE_DONE to the host.

However, a MOVE within a breakpoint will not generate a

MOVE_DONE.

A MOVE with a host destination differs from a READ in that

it contains a host address. This field is specified by the host

in the MOVE command and copied by the target into the responding

MOVE_DATA(s). The address may be used by the host to

differentiate data returned from multiple MOVE requests. This

information may be useful in breakpoints, in multi-window

debugging and in communication with targets with multiple

processors. For example, the host sends the MOVE command to the

target to be executed during a breakpoint. The ID field in

the host address might be an index into a host breakpoint table.

When the breakpoint executes, the host would use the ID to

associate the returning MOVE_DATA with this breakpoint.

Page 48

LDP Specification Data Transfer Commands

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 DATA_TRANSFER MOVE

+---------------+---------------+

2

+-- Source --+

3 Start

+-- Address --+

4

+---------------+---------------+

5 Address

+-- Unit --+

6 Count

+---------------+---------------+

7

+-- Destination --+

8 Start

+-- Address --+

9

+---------------+---------------+

MOVE Command Format

Figure 30

MOVE FIELDS:

Source Start Address

The starting address of the requested block of target data.

An illegal address type will generate an error reply.

Address Unit Count

The count of the number of target indivisibly-addressable

units to be transferred. For example, if the address space

is PHYS_MACRO, a count of two and a start address of 1000

selects the contents of locations 1000 and 1001. 'Count' is

used instead of 'length' to avoid the problem of determining

units the length should be denominated in (octets, words,

Page 49

RFC-909 July 1984

etc.). The size and type of the unit will vary depending on

the address space selected by the target start address. The

target should reply with an error (if it is able to

determine in advance of a transfer) if the inclusive range

of addresses specified by the start address and the count

contains an illegal or nonexistent address.

Destination Address

The destination of the MOVE. If the address space is on the

target, the address unit size should agree with that of the

source address space. If the address mode is HOST, the

values and interpretations of the remaining address fields

are arbitrary, and are determined by the host

implementation. For example, the mode argument might

specify a table (breakpoint, debugging window, etc.) and the

ID field an index into the table.

6.6 MOVE_DATA Response

The target uses the MOVE_DATA responses to transmit data

requested by a host MOVE command. One or more MOVE_DATA

responses may be needed to fulfill a given MOVE command,

depending on the size of the data block requested and the

transport layer message size limits. Each MOVE_DATA response

gives the target starting address of its segment of data. If the

response contains an odd number of data octets, the target should

end the response with a null octet.

Page 50

LDP Specification Data Transfer Commands

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 DATA_TRANSFER MOVE_DATA

+---------------+---------------+

2

+-- Source --+

3 Start

+-- Address --+

4

+---------------+---------------+

5

+-- Destination --+

6 Start

+-- Address --+

7

+---------------+---------------+ +-+

8 Data Octet Data Octet

+---------------+---------------+

*

* Data

*

+---------------+---------------+

n Data Octet Data or Null

+---------------+---------------+ +-+

MOVE_DATA Response Format

Figure 31

MOVE_DATA FIELDS:

Command Length

The command length gives the number of octets in the

command, including data octets, but excluding the padding

octet, if any.

Source Start Address

This is the starting address of the data segment in this

Page 51

RFC-909 July 1984

message. The host may infer length of the data from the

command length.

Destination Address

The destination address copied from the MOVE command that

initiated this transfer. In the case of HOST MOVEs, this is

used by the host to identify the source of the data.

Data Octets

Octets of data from the target. Data are packed according

to the packing convention described above. Ends with a null

octet if there are an odd number of data octets.

6.7 MOVE_DONE Reply

The target sends a MOVE_DONE reply to the host after it has

finished transferring the data requested by a MOVE command.

MOVE_DONE specifies the sequence number of the MOVE command.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 6

+---------------+---------------+

1 DATA_TRANSFER MOVE_DONE

+---------------+---------------+

2 MOVE Sequence Number

+---------------+---------------+

MOVE_DONE Reply Format

Figure 32

MOVE_DONE FIELDS:

MOVE Sequence Number

The sequence number of the MOVE command this is a reply to.

Page 52

LDP Specification Data Transfer Commands

6.8 REPEAT_DATA

The REPEAT_DATA command is sent by the host to write copies

of a specified pattern into the target. This provides an

efficient way of zeroing target memory and initializing target

data structures. The command specifies the target starting

address, the number of copies of the pattern to be made, and a

stream of octets that constitutes the pattern.

This command differs from the other data transfer commands

in that the effect of a REPEAT_DATA with a large pattern cannot

be duplicated by sending the data in smaller chunks over several

commands. Therefore, the maximum size of a pattern that can be

copied with REPEAT_DATA will depend on the message size limits of

the transport layer.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 DATA_TRANSFER REPEAT_DATA

+---------------+---------------+

2

+-- Target --+

3 Start

+-- Address --+

4

+---------------+---------------+

6 Repeat Count

+---------------+---------------+ +-+

7 Data Octet Data Octet

+---------------+---------------+

*

* Pattern

*

+---------------+---------------+

n Data Octet Data or Null

+---------------+---------------+ +-+

REPEAT_DATA Command Format

Figure 33

Page 53

RFC-909 July 1984

REPEAT_DATA FIELDS:

Command Length

The command length gives the number of octets in the

command, including data octets in the pattern, but excluding

the padding octet, if any.

Target Start Address

This is the starting address where the first copy of the

pattern should be written in the target. Successive copies

of the pattern are made contiguously starting at this

address.

Repeat Count

The repeat count specifies the number of copies of the

pattern that should be made in the target. The repeat count

should be greater than zero.

Pattern

The pattern to be copied into the target, packed into a

stream of octets. Data are packed according to the packing

convention described above. Ends with a null octet if there

are an odd number of data octets.

6.9 WRITE_MASK Command (Optional)

The host sends a WRITE_MASK command to the target to write

one or more masked values. The command uses an address to

specify a target base location, followed by one or more offset-

mask-value triplets. Each triplet gives an offset from the base,

a value, and a mask indicating which bits in the location at the

offset are to be changed.

This optional command is intended for use in controlling the

target by changing locations in a table. For example, it may be

used to change entries in a target parameter table. The

operation of modifying a specified location with a masked value

is intended to be atomic. In other words, another target process

should not be able to access the location to be modified between

Page 54

LDP Specification Data Transfer Commands

the start and the end of the modification.

Page 55

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 DATA_TRANSFER WRITE_MASK

+---------------+---------------+

2

+-- Target --+

3 Base

+-- Address --+

4

+---------------+---------------+ +-+

5

+-- Offset --+

6

+---------------+---------------+ Offset-Mask-Value

7 Triplet

+-- Mask --+

8

+---------------+---------------+

9

+-- Value --+

10

+---------------+---------------+ +-+

*

*

*

+---------------+---------------+ +-+

+-- Offset --+

+---------------+---------------+ Offset-Mask-Value

Triplet

+-- Mask --+

+---------------+---------------+

+-- Value --+

+---------------+---------------+ +-+

WRITE_MASK Format

Figure 34

Page 56

LDP Specification Data Transfer Commands

WRITE_MASK FIELDS:

Command Length

The command length gives the number of octets in the

command. The number of offset-value pairs may be calculated

from this, since the command header is either 10 or 12

octets long (short or long address format), and each

offset-mask-value triplet is 12 octets long.

Target Base Address

Specifies the target location to which the offset is added

to yield the location to be modified.

Offset

An offset to be added to the base to select a location to be

modified.

Mask

Specifies which bits in the value are to be copied into the

location.

Value

A value to be stored at the specified offset from the base.

The set bits in the mask determine which bits in the value

are applied to the location. The following algorithm will

achieve the intended result: take the one's complement of

the mask and AND it with the location, leaving the result in

the location. Then AND the mask and the value, and OR the

result into the location.

Page 57

RFC-909 July 1984

Page 58

LDP Specification Control Commands

CHAPTER 7

Control Commands

Control commands are used to control the execution of target

code, breakpoints and watchpoints. They are also used to read

and report the state of these objects. The object to be

controlled or reported on is specified with a descriptor. Valid

descriptor modes include PHYS_* (for some commands) PROCESS_CODE,

BREAKPOINT and WATCHPOINT. Control commands which change the

state of the target are START, STOP, CONTINUE and STEP. REPORT

requests a STATUS report on a target object. EXCEPTION is a

spontaneous report on an object, used to report asynchronous

events such as hardware traps. The host may verify the action of

a START, STOP, STEP or CONTINUE command by following it with a

REPORT command.

7.1 START Command

The START command is sent by the host to start execution of

a specified object in the target. For targets which support

multiple processes, a PROCESS_CODE address specifies the process

to be started. Otherwise, one of the PHYS_* modes may specify

a location in macro-memory where execution is to continue.

Applied to a breakpoint or watchpoint, START sets the value of

the object's state variable, and activates the breakpoint. The

breakpoint counter and pointer variables are initialized to zero.

Page 59

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 14

+---------------+---------------+

1 CONTROL START

+---------------+---------------+ +-+

2 Mode 0

+---------------+---------------+

3

+-- ID --+

4 Field Address

+-------------------------------+

5

+-- Offset --+

6

+-------------------------------+ +-+

START Command Format

Figure 35

START FIELDS:

Address

The descriptor specifies the object to be started. If the

mode is PROCESS_CODE, ID specifies the process to be

started, and offset gives the process virtual address to

start at. If the mode is PHYS_*, execution of the target is

continued at the specified address.

For modes of BREAKPOINT and WATCHPOINT, the offset specifies

the new value of the FSM state variable. This is for FSM

breakpoints and watchpoints.

Page 60

LDP Specification Control Commands

7.2 STOP Command

The STOP command is sent by the host to stop execution of a

specified object in the target. A descriptor specifies the

object. Applied to a breakpoint or watchpoint, STOP deactivates

it. The breakpoint/watchpoint may be re-activated by issuing a

START or a CONTINUE command for it.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 10

+---------------+---------------+

1 CONTROL STOP

+---------------+---------------+ +-+

2 Mode 0

+---------------+---------------+

3 Descriptor

+-- ID --+

4 Field

+-------------------------------+ +-+

STOP Command Format

Figure 36

STOP FIELDS:

Descriptor

The descriptor specifies the object to be stopped or

disarmed. If the mode is PROCESS_CODE, the ID specifies the

process to be stopped.

For modes of BREAKPOINT and WATCHPOINT, the specified

breakpoint or watchpoint is deactivated. It may be re-

activated by a CONTINUE or START command.

Page 61

RFC-909 July 1984

7.3 CONTINUE Command

The CONTINUE command is sent by the host to resume execution

of a specified object in the target. A descriptor specifies the

object. Applied to a breakpoint or watchpoint, CONTINUE activates

it.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 10

+---------------+---------------+

1 CONTROL CONTINUE

+---------------+---------------+ +-+

2 Mode 0

+---------------+---------------+

3 Descriptor

+-- ID --+

4 Field

+-------------------------------+ +-+

CONTINUE Command Format

Figure 37

CONTINUE FIELDS:

Descriptor

The descriptor specifies the object to be resumed or armed.

If the mode is PROCESS_CODE, the ID specifies the process to

be resumed.

For modes of BREAKPOINT and WATCHPOINT, the specified

breakpoint or watchpoint is armed.

7.4 STEP Command

The STEP command is sent by the host to the target. It

requests the execution of one instruction (or appropriate

operation) in the object specified by the descriptor.

Page 62

LDP Specification Control Commands

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 10

+---------------+---------------+

1 CONTROL STEP

+---------------+---------------+ +-+

2 Mode 0

+---------------+---------------+

3 Descriptor

+-- ID --+

4 Field

+-------------------------------+ +-+

STEP Command Format

Figure 38

STEP FIELDS:

Descriptor

The descriptor specifies the object to be stepped. If the

mode is PROCESS_CODE, the ID specifies a process.

7.5 REPORT Command

The REPORT command is sent by the host to request a status

report on a specified target object. The status is returned in a

STATUS reply.

Page 63

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 10

+---------------+---------------+

1 CONTROL REPORT

+---------------+---------------+ +-+

2 Mode 0

+---------------+---------------+

3 Descriptor

+-- ID --+

4 Field

+-------------------------------+ +-+

REPORT Command Format

Figure 39

REPORT FIELDS:

Descriptor

The descriptor specifies the object for which a STATUS

report is requested. For a mode of PROCESS_CODE, the ID

specifies a process. Other valid modes are PHYS_MACRO, to

query the status of the target application, and BREAKPOINT

and WATCHPOINT, to get the status of a breakpoint or

watchpoint.

7.6 STATUS Reply

The target sends a STATUS reply in response to a REPORT

command from the host. STATUS gives the state of a specified

object. For example, it may tell whether a particular target

process is running or stopped.

Page 64

LDP Specification Control Commands

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 CONTROL STATUS

+---------------+---------------+ +-+

2 Mode 0

+---------------+---------------+

3 Descriptor

+-- ID --+

4 Field

+-------------------------------+ +-+

5 Status

+-------------------------------+ +-+

*

*

* Other Data

+-------------------------------+

n Other Data

+-------------------------------+ +-+

STATUS Reply Format

Figure 40

STATUS FIELDS:

Descriptor

The descriptor specifies the object whose status is being

given. If the mode is PROCESS_CODE, then the ID specifies a

process. If the mode is PHYS_MACRO, then the status is that

of the target application.

Status

The status code describes the status of the object. Status

codes are 0=STOPPED and 1=RUNNING. For breakpoints and

watchpoints, STOPPED means disarmed and RUNNING means armed.

Other Data

For breakpoints and watchpoints, Other Data consists of a

Page 65

RFC-909 July 1984

16-bit word giving the current value of the FSM state

variable.

7.7 EXCEPTION Trap

An EXCEPTION is a spontaneous message sent from the target

indicating a target-machine exception associated with a

particular object. The object is specified by an address.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 CONTROL EXCEPTION

+---------------+---------------+ +-+

2 Mode 0

+---------------+---------------+

3

+-- ID --+

4 Field Address

+-------------------------------+

5

+-- Offset --+

6

+-------------------------------+ +-+

7 Type

+-------------------------------+ +-+

*

*

* Other Data

+-------------------------------+

n Other Data

+-------------------------------+ +-+

EXCEPTION Format

Figure 41

EXCEPTION FIELDS:

Address

Page 66

LDP Specification Control Commands

The address specifies the object the exception is for.

Type

The type of exception. Values are target-dependent.

Other Data

Values are target-dependent.

Page 67

RFC-909 July 1984

Page 68

LDP Specification Management Commands

CHAPTER 8

Management Commands

Management commands are used to control resources in the

target machine. There are two kinds of commands: those that

interrogate the remote machine about resources, and those that

allocate and free resources. There are management commands to

create, list and delete breakpoints. All commands have

corresponding replies which include the sequence number of the

request command. Failing requests produce ERROR replies.

There are two resource allocation commands, CREATE and

DELETE, which create and delete objects in the remote machine.

There are a number of listing commands for listing a variety of

target objects -- breakpoints, watchpoints, processes, and names.

The amount of data returned by listing commands may vary in

length, depending on the state of the target. If a list is too

large to fit in a single message, the target will send it in

several list replies. A flag in each reply specifies whether

more messages are to follow.

8.1 CREATE Command

The CREATE command is sent from the host to the target to

create a target object. If the CREATE is successful, the target

returns a CREATE_DONE reply, which contains a descriptor

associated with the CREATEd object. The types of objects that

may be specified in a CREATE include breakpoints, processes,

memory objects and descriptors. All are optional except for

breakpoints.

Page 69

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 MANAGEMENT CREATE

+---------------+---------------+

2 Create Type

+---------------+---------------+ +-+

*

* Create

* Arguments

+---------------+---------------+

n Create Arguments

+---------------+---------------+ +-+

CREATE Command Format

Figure 42

CREATE FIELDS:

Create Type

The type of object to be created. Arguments vary with the

type. Currently defined types are shown in Figure 43. All

are optional except for BREAKPOINT.

Create Type Symbol

-------------+----------------

0 BREAKPOINT

1 WATCHPOINT

2 PROCESS

3 MEMORY_OBJECT

4 DESCRIPTOR

Create Types

Figure 43

Page 70

LDP Specification Management Commands

Create Arguments

Create arguments depend on the type of object being created.

The formats for each type of object are described below.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 22

+---------------+---------------+

1 MANAGEMENT CREATE

+---------------+---------------+

2 BREAKPOINT

+---------------+---------------+ +-+

3 Mode Mode Argument

+---------------+---------------+

4

+-- ID --+ Create

5 Field BREAKPOINT

+-------------------------------+ Arguments

6

+-- Offset --+

7

+-------------------------------+

8 Maximum States

+---------------+---------------+

9 Maximum Size

+---------------+---------------+

10 Maximum Local Variables

+---------------+---------------+ +-+

CREATE BREAKPOINT Format

Figure 44

BREAKPOINT and WATCHPOINT

The format is the same for CREATE BREAKPOINT and CREATE

WATCHPOINT. In the following discussion, 'breakpoint' may

be taken to mean either breakpoint or watchpoint.

The address is the location where the breakpoint is to be

set. In the case of watchpoints it is the location to be

Page 71

RFC-909 July 1984

watched. Valid modes are any PHYS_* mode that addresses

macro-memory, PROCESS_CODE for breakpoints and PROCESS_DATA

for watchpoints.

'Maximum states' is the number of states the finite state

machine for this breakpoint will have. A value of zero

indicates a default breakpoint, for targets which do not

implement finite state machine (FSM) breakpoints. A default

breakpoint is the same as an FSM with one state consisting

of a STOP and a REPORT command for the process containing

the breakpoint.

'Maximum size' is the total size, in octets, of the

breakpoint data to be sent via subsequent BREAKPOINT_DATA

commands. This is the size of the data only, and does not

include the LDP command headers and breakpoint descriptors.

'Maximum local variables' is the number of 32-bit longs to

reserve for local variables for this breakpoint. Normally

this value will be zero.

PROCESS

Creates a new process. Arguments are target-dependent.

Page 72

LDP Specification Management Commands

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 MANAGEMENT CREATE

+---------------+---------------+

2 MEMORY_OBJECT

+---------------+---------------+

3 Object Size

+---------------+---------------+

4 Name Size

+-------------------------------+ +-+

5 Name char Name char

+-------------------------------+

* Object

* Name

*

+---------------+---------------+

n 0 or Name char 0

+---------------+---------------+ +-+

CREATE MEMORY_OBJECT Format

Figure 45

MEMORY_OBJECT

Creates an object of size Object Size, with the given name.

Object Size is in target dependent units. The name may be

the null string for unnamed objects. Name Size gives the

number of characters in Object Name, and must be even.

Always ends with a null octect.

DESCRIPTOR

Used for obtaining descriptors from IDs on target systems

where IDs are longer than 32 bits. There is a single

argument, Long ID, whose length is target dependent.

Page 73

RFC-909 July 1984

8.2 CREATE_DONE Reply

The target sends a CREATE_DONE reply to the host in response

to a successful CREATE command. The reply contains the sequence

number of the CREATE request, and a descriptor for the object

created. This descriptor is used by the host to specify the

object in subsequent commands referring to it. Commands which

refer to created objects include LIST_* commands, DELETE and

BREAKPOINT_DATA. For example, to delete a CREATEd object, the

host sends a DELETE command that specifies the descriptor

returned by the CREATE_DONE reply.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 12

+---------------+---------------+

1 MANAGEMENT CREATE_DONE

+---------------+---------------+

2 Create Sequence Number

+---------------+---------------+ +-+

3 Mode Mode Argmuent

+---------------+---------------+ Created

4 Object

+-- ID --+ Descriptor

5 Field

+---------------+---------------+ +-+

CREATE_DONE Reply Format

Figure 46

CREATE_DONE FIELDS:

Create Sequence Number

The sequence number of the CREATE command to which this is

the reply.

Created Object Descriptor

A descriptor assigned by the target to the created object.

The contents of the descriptor fields are arbitrarily

Page 74

LDP Specification Management Commands

assigned by the target at its convenience. The host treats

the descriptor as a unitary object, used for referring to

the created object in subsequent commands.

8.3 DELETE Command

The host sends a DELETE command to remove an object created

by an earlier CREATE command. The object to be deleted is

specified with a descriptor. The descriptor is from the

CREATE_DONE reply to the original CREATE command.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 10

+---------------+---------------+

1 MANAGEMENT DELETE

+---------------+---------------+ +-+

2 Mode Mode Argument

+---------------+---------------+

3 Created

+-- ID --+ Object

4 Field Descriptor

+---------------+---------------+ +-+

DELETE Command Format

Figure 47

DELETE FIELDS:

Created Object Descriptor

Specifies the object to be deleted. This is the descriptor

that was returned by the target in the CREATE_DONE reply to

the original CREATE command.

Page 75

RFC-909 July 1984

8.4 DELETE_DONE Reply

The target sends a DELETE_DONE reply to the host in response

to a successful DELETE command. The reply contains the sequence

number of the DELETE request.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 6

+---------------+---------------+

1 MANAGEMENT DELETE_DONE

+---------------+---------------+

2 Delete Sequence Number

+---------------+---------------+

DELETE_DONE Reply Format

Figure 48

DELETE_DONE FIELDS:

Request Sequence Number

The sequence number of the DELETE command to which this is

the reply.

8.5 LIST_ADDRESSES Command

The host sends a LIST_ADDRESSES command to request a list of

valid address ranges for a specified object. The object is given

by a descriptor. Typical objects are a target process, or the

target physical machine. The target responds with an

ADDRESS_LIST reply. This command is used for obtaining the size

of dynamic address spaces and for determining dump ranges.

Page 76

LDP Specification Management Commands

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 10

+---------------+---------------+

1 MANAGEMENT LIST_ADDRESSES

+---------------+---------------+ +-+

2 Mode Mode Argument

+---------------+---------------+ Object

3 Descriptor

+-- ID --+

4 Field

+---------------+---------------+ +-+

LIST_ADDRESSES Command Format

Figure 49

LIST_ADDRESSES FIELDS:

Object Descriptor

Specifies the object whose address ranges are to be listed.

Valid modes include PHYS_MACRO, PHYS_MICRO, PROCESS_CODE,

and PROCESS_DATA.

8.6 ADDRESS_LIST Reply

The target sends an ADDRESS_LIST reply to the host in

response to a successful LIST_ADDRESSES command. The reply

contains the sequence number of the LIST_ADDRESSES request, the

descriptor of the object being listed, and a list of the valid

address ranges within the object.

Page 77

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 MANAGEMENT ADDRESS_LIST

+---------------+---------------+

2 List Sequence Number

+---------------+---------------+

3 Flags M Item Count

+---------------+---------------+

4

+-- --+

5 Descriptor

+-- --+

6

+---------------+---------------+ +-+

7

+-- First Address --+ First

8 Address

+-------------------------------+ Range

9

+-- Last Address --+

10

+-------------------------------+ +-+

*

*

*

+---------------+---------------+ +-+

+-- First Address --+ Last

Address

+-------------------------------+ Range

+-- Last Address --+

+-------------------------------+ +-+

ADDRESS_LIST Reply Format

Figure 50

Page 78

LDP Specification Management Commands

ADDRESS_LIST FIELDS:

List Sequence Number

The sequence number of the LIST_ADDRESSES command to which

this is the reply.

Flags

If M=1, the address list is continued in one or more

subsequent ADDRESS_LIST replies. If M=0, this is the final

ADDRESS_LIST.

Item Count

The number of address ranges described in this command.

Descriptor

The descriptor of the object being listed.

Address Range

Each address range is composed of a pair of 32-bit addresses

which give the first and last addresses of the range. If

there are 'holes' in the address space of the object, then

multiple address ranges will be used to describe the valid

address space.

8.7 LIST_BREAKPOINTS Command

The host sends a LIST_BREAKPOINTS command to request a list

of all breakpoints associated with the current connection. The

target replies with BREAKPOINT_LIST.

Page 79

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 4

+---------------+---------------+

1 MANAGEMENT LIST_BREAKPOINTS

+---------------+---------------+

LIST_BREAKPOINTS Command Format

Figure 51

8.8 BREAKPOINT_LIST Reply

The target sends a BREAKPOINT_LIST reply to the host in

response to a LIST_BREAKPOINTS command. The reply contains the

sequence number of the LIST_BREAKPOINTS request, and a list of

all breakpoints associated with the current connection. The

descriptor and address of each breakpoint are listed.

Page 80

LDP Specification Management Commands

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 MANAGEMENT BREAKPOINT_LIST

+---------------+---------------+

2 List Sequence Number

+---------------+---------------+

3 Flags M Item Count

+---------------+---------------+ +-+

4 Mode 0

+---------------+---------------+

5 Breakpoint

+-- ID --+ Descriptor

6 Field

+---------------+---------------+ +-+

7 Mode Mode Argument

+---------------+---------------+

8

+-- ID --+ Breakpoint

9 Field Address

+-------------------------------+

10

+-- Offset --+

11

+-------------------------------+ +-+

* Additional

* Descriptor-Address

* Pairs

+-+

BREAKPOINT_LIST Reply Format

Figure 52

BREAKPOINT_LIST FIELDS:

List Sequence Number

The sequence number of the LIST_BREAKPOINTS command to which

this is the reply.

Flags

Page 81

RFC-909 July 1984

If M=1, the breakpoint list is continued in one or more

subsequent BREAKPOINT_LIST replies. If M=0, this is the

final BREAKPOINT_LIST.

Item Count

The number of breakpoints described in this list.

Breakpoint Descriptor

A descriptor assigned by the target to this breakpoint.

Used by the host to specify this breakpoint in

BREAKPOINT_DATA and DELETE commands.

Breakpoint Address

The address at which this breakpoint is set.

8.9 LIST_PROCESSES Command

The host sends a LIST_PROCESSES command to request a list of

descriptors for all processes on the target. The target replies

with PROCESS_LIST.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 4

+---------------+---------------+

1 MANAGEMENT LIST_PROCESSES

+---------------+---------------+

LIST_PROCESSES Command Format

Figure 53

Page 82

LDP Specification Management Commands

8.10 PROCESS_LIST Reply

The target sends a PROCESS_LIST reply to the host in

response to a LIST_PROCESSES command. The reply contains the

sequence number of the LIST_PROCESSES request, and a list of all

processes in the target. For each process, a descriptor and a

target-dependent amount of process data are given.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 MANAGEMENT PROCESS_LIST

+---------------+---------------+

2 List Sequence Number

+---------------+---------------+

3 Flags M Item Count

+---------------+---------------+ +-+

4 PROCESS_CODE 0

+---------------+---------------+

5 Process

+-- ID --+ Descriptor

6 Field

+---------------+---------------+ +-+

7 Process data count

+---------------+---------------+

8 Process data Process data

+-------------------------------+ Process

* Data

*

*

+---------------+---------------+

n Process data Process data

+-------------------------------+ +-+

* Additional

* Descriptor-Data

* Pairs

+-+

PROCESS_LIST Reply Format

Figure 54

Page 83

RFC-909 July 1984

PROCESS_LIST FIELDS:

List Sequence Number

The sequence number of the LIST_PROCESSES command to which

this is the reply.

Flags

If M=1, the process list is continued in one or more

subsequent PROCESS_LIST replies. If M=0, this is the final

PROCESS_LIST.

Item Count

The number of processes described in this list. For each

process there is a descriptor and a variable number of

octets of process data.

Process Descriptor

A descriptor assigned by the target to this process. Used

by the host to specify this PROCESS in a DELETE command.

Process Data Count

Number of octets of process data for this process. Must be

even.

Process Data

Target-dependent information about this process. Number of

octets is given by the process data count.

8.11 LIST_NAMES Command

The host sends a LIST_NAMES command to request a list of

available names as strings. The target replies with NAME_LIST.

Page 84

LDP Specification Management Commands

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 4

+---------------+---------------+

1 MANAGEMENT LIST_NAMES

+---------------+---------------+

LIST_NAMES Command Format

Figure 55

8.12 NAME_LIST Reply

The target sends a NAME_LIST reply to the host in response

to a LIST_NAMES command. The reply contains the sequence number

of the LIST_NAMES request, and a list of all target names, as

strings.

Page 85

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 MANAGEMENT NAME_LIST

+---------------+---------------+

2 List Sequence Number

+---------------+---------------+

3 Flags M Item Count

+---------------+---------------+ +-+

4 Name Size

+---------------+---------------+

5 Name Char Name Char Name

+---------------+---------------+ String

*

*

*

+---------------+---------------+

n 0 or Name Char 0

+---------------+---------------+ +-+

* Additional

* Name

* Strings

+-+

NAME_LIST Reply Format

Figure 56

NAME_LIST FIELDS:

List Sequence Number

The sequence number of the LIST_NAMES command to which this

is the reply.

Page 86

LDP Specification Management Commands

Flags

If M=1, the name list is continued in one or more subsequent

NAME_LIST replies. If M=0, this is the final NAME_LIST.

Item Count

The number of name strings in this list. Each name string

consists of a character count and a null-terminated string

of characters.

Name Size

The number of octets in this name string. Must be even.

Name Characters

A string of octets composing the name. Ends with a null

octet. The number of characters must be even, so if the

terminating null comes on an odd octet, another null is

appended.

8.13 GET_PHYS_ADDR Command

The host sends a GET_PHYS_ADDR command to convert an address

into physical form. The target returns the physical address in a

GOT_PHYS_ADDR reply. For example, the host could send a

GET_PHYS_ADDR command containing a register-offset address, and

the target would return the physical address derived from this in

a GOT_PHYS_ADDR reply.

Page 87

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 14

+---------------+---------------+

1 MANAGEMENT GET_PHYS_ADDR

+---------------+---------------+ +-+

2 Mode Mode Argument

+---------------+---------------+

3 ID

+-- Field --+

4 Address

+---------------+---------------+

5

+-- Offset --+

6

+---------------+---------------+ +-+

GET_PHYS_ADDR Command Format

Figure 57

GET_PHYS_ADDR FIELDS:

Address

The address to be converted to a physical address. The mode

may be one of PHYS_REG_OFFSET, PHYS_REG_INDIRECT,

PHYS_MACRO_PTR, any OBJECT_* mode, and any PROCESS_* mode

except for PROCESS_REG.

8.14 GOT_PHYS_ADDR Reply

The target sends a GOT_PHYS_ADDR reply to the host in

response to a successful GET_PHYS_ADDR command. The reply

contains the sequence number of the GET_PHYS_ADDR request, and

the specified address converted into a physical address.

Page 88

LDP Specification Management Commands

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 16

+---------------+---------------+

1 MANAGEMENT GOT_PHYS_ADDR

+---------------+---------------+

2 Get Sequence Number

+---------------+---------------+ +-+

3 PHYS_MACRO 0

+---------------+---------------+

4

+-- 0 --+

5 Address

+---------------+---------------+

6

+-- Offset --+

7

+---------------+---------------+ +-+

GOT_PHYS_ADDR Reply Format

Figure 58

GOT_PHYS_ADDR FIELDS:

Get Sequence Number

The sequence number of the GET_PHYS_ADDR command to which

this is the reply.

Address

The address resulting from translating the address given in

the GET_PHYS_ADDR command into a physical address. Mode is

always PHYS_MACRO and ID and mode argument are always zero.

Offset gives the 32-bit physical address.

Page 89

RFC-909 July 1984

8.15 GET_OBJECT Command

The host sends a GET_OBJECT command to convert a name string

into a descriptor. The target returns the descriptor in a

GOT_OBJECT reply. Intended for use in finding control parameter

objects.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 MANAGEMENT GET_OBJECT

+---------------+---------------+ +-+

2 Name Size

+---------------+---------------+

3 Name Char Name Char Name

+---------------+---------------+ String

*

*

*

+---------------+---------------+

n 0 or Name Char 0

+---------------+---------------+ +-+

GET_OBJECT Command Format

Figure 59

GET_OBJECT FIELDS:

Name String

The name of an object.

Name Size

The number of octets in this name string. Must be even.

Name Characters

A string of octets composing the name. Ends with a null

octet. The number of characters must be even, so if the

Page 90

LDP Specification Management Commands

terminating null comes on an odd octet, another null is

appended.

8.16 GOT_OBJECT Reply

The target sends a GOT_OBJECT reply to the host in response

to a successful GET_OBJECT command. The reply contains the

sequence number of the GET_OBJECT request, and the specified

object name converted into a descriptor.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 12

+---------------+---------------+

1 MANAGEMENT GOT_OBJECT

+---------------+---------------+

2 Get Sequence Number

+---------------+---------------+ +-+

3 Mode Mode Argument

+---------------+---------------+

4

+-- ID --+ Object

5 Descriptor

+---------------+---------------+ +-+

GOT_OBJECT Reply Format

Figure 60

GOT_OBJECT FIELDS:

Get Sequence Number

The sequence number of the GET_OBJECT command to which this

is the reply.

Descriptor

Page 91

RFC-909 July 1984

The descriptor of the object named in the GET_OBJECT

command.

Page 92

LDP Specification Breakpoints and Watchpoints

CHAPTER 9

Breakpoints and Watchpoints

Breakpoints and watchpoints are used in debugging

applications. Each breakpoint or watchpoint is associated with

one debugger connection and one address. When a breakpoint or

watchpoint is triggered, the target executes one or more commands

associated with it. A breakpoint is triggered when its address

is executed. A watchpoint is triggered when its address is

modified. The same mechanism is used for structuring breakpoint

and watchpoint commands. For brevity's sake, 'breakpoint' will

be used in the remainder of this document to refer to either a

breakpoint or a watchpoint.

The commands used by the host to manipulate breakpoints are

given in Figure 61, in the order in which they are normally used.

All commands are sent from the host to the target, and each

specifies the descriptor of a breakpoint.

Command Description

---------------------+------------------------------------

CREATE Create a breakpoint

BREAKPOINT_DATA Send commands to be executed in an

FSM breakpoint

START Activate a breakpoint, set state

and initialize breakpoint variables

STOP Deactivate a breakpoint

CONTINUE Activate a breakpoint

LIST_BREAKPOINTS List all breakpoints

REPORT Report the status of a breakpoint

DELETE Delete a breakpoint

Commands to Manipulate Breakpoints

Figure 61

Page 93

RFC-909 July 1984

There are two kinds of breakpoints: default breakpoints and

finite state machine (FSM) breakpoints. They differ in their use

of commands.

Default breakpoints do not contain any commands. When

triggered, a default breakpoint stops the target object (i.e.,

target process or application) it is located in. A STATUS report

on the stopped object is sent to the host. At this point, the

host may send further commands to debug the target.

An FSM breakpoint has one or more conditional command lists,

organized into a finite state machine. When an FSM breakpoint is

created, the total number of states is specified. The host then

sends commands (using BREAKPOINT_DATA) to be associated with each

state. The target maintains a state variable for the breakpoint,

which determines which command list will be executed if the

breakpoint is triggered. When the breakpoint is created its

state variable is initialized to zero (zero is the first state).

A breakpoint command, SET_STATE, may be used within a breakpoint

to change the value of the state variable. A REPORT command

applied to a breakpoint descriptor returns its address, whether

it is armed or disarmed, and the value of its state variable.

Commands valid in breakpoints include all implemented data

transfer and control commands, a set of conditional commands, and

a set of breakpoint commands. The conditional commands and the

breakpoint commands act on a set of local breakpoint variables.

The breakpoint variables consist of the state variable, a

counter, and two pointer variables. The conditional commands

control the execution of breakpoint command lists based on the

contents of one of the breakpoint variables. The breakpoint

commands are used to set the value of the breakpoint variables:

SET_STATE sets the state variable, SET_PTR sets one of the

pointer variables, and INC_COUNT increments the breakpoint

counter. There may be implementation restrictions on the number

of breakpoints, the number of states, the number of conditions,

and the size of the command lists. Management commands and

protocol commands are forbidden in breakpoints.

In FSM breakpoints, the execution of commands is controlled

as follows. When a breakpoint is triggered, the breakpoint's

state variable selects a particular state. One or more

conditional command lists is associated with this state. A

conditional command list consists of a list of conditions

followed by a list of commands which are executed if the

condition list is satisfied. The debugger starts a breakpoint by

executing the first of these lists. If the condition list is

Page 94

LDP Specification Breakpoints and Watchpoints

satisfied, the debugger executes the associated command list and

leaves the breakpoint. If the condition list fails, the debugger

skips to the next conditional command list. This process

continues until the debugger either encounters a successful

condition list, or exhausts all the conditional command lists for

the state. The relationship of commands, lists and states is

shown in Figure 62 (IFs, THENs and ELSEs are used below to

clarify the logical structure within a state; they are not part

of the protocol).

State 0

IF <condition list 0>

THEN <command list 0>

ELSE IF <condition list 1>

THEN <command list 1>

*

*

*

ELSE IF <condition list n>

THEN <command list n>

ELSE <exit>

*

*

*

State n

Breakpoint Conditional Command Lists

Figure 62

9.1 BREAKPOINT_DATA Command

BREAKPOINT_DATA is a data transfer command used by the host

to send commands to be executed in breakpoints and watchpoints.

The command specifies the descriptor of the breakpoint or

watchpoint, and a stream of commands to be appended to the end of

the breakpoint's command list. BREAKPOINT_DATA is applied

sequentially to successive breakpoint states, and successive

Page 95

RFC-909 July 1984

command lists within each state. Multiple BREAKPOINT_DATAs may

be sent for a given breakpoint. Breaks between BREAKPOINT_DATA

commands may occur anywhere within the data stream, even within

individual commands in the data. Sufficient space to store the

data must have been allocated by the maximum size field in the

CREATE BREAKPOINT/WATCHPOINT command.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 DATA_TRANSFER BREAKPOINT_DATA

+---------------+---------------+ +-+

2 Mode Mode Argument

+---------------+---------------+ Breakpoint or

3 Watchpoint

+-- ID --+ Descriptor

4 Field

+-------------------------------+ +-+

5 Data Data

+-------------------------------+

*

* Data

*

+---------------+---------------+

n Data Data or 0

+---------------+---------------+ +-+

BREAKPOINT_DATA Command Format

Figure 63

BREAKPOINT_DATA FIELDS:

Command Length

Total length of this command in octets, including data,

excluding the final padding octet, if any.

Data

A stream of data to be appended to the data for this

breakpoint or watchpoint. This stream has the form of one

or more states, each containing one or more conditional

Page 96

LDP Specification Breakpoints and Watchpoints

command lists. The first BREAKPOINT_DATA command sent for a

breakpoint contains data starting with state zero. The data

for each state starts with the state size. A conditional

command list is composed of two parts: a condition list, and

a command list. Each list begins with a word that gives its

size in octets.

<state 0 size>

<condition list 0 size> <condition list 0>

<command list 0 size> <command list 0>

*

*

*

<condition list n size> <condition list n>

<command list n size> <command list n>

<state 1 size>

<etc>

*

*

*

<state n size>

Breakpoint Data Stream Format

Figure 64

Page 97

RFC-909 July 1984

Sizes

All sizes are stored in 16-bit words, and include their own

length. The state size gives the total number of octets of

breakpoint data for the state. The condition list size

gives the total octets of breakpoint data for the following

condition list. A condition list size of 2 indicates an

empty condition list: in this case the following command

list is executed unconditionally. The command list size

gives the total octets of breakpoint data for the following

command list.

Lists

Condition and command lists come in pairs. When the

breakpoint occurs, the condition list controls whether the

following command list should be executed. A condition list

consists of one or more commands from the CONDITION command

class. A command list consists one or more LDP commands.

Valid commands are any commands from the BREAKPOINT,

DATA_TRANSFER or CONTROL command classes.

Page 98

LDP Specification Conditional Commands

CHAPTER 10

Conditional Commands

Conditional commands are used in breakpoints to control the

execution of breakpoint commands. One or more conditions in

sequence form a condition list. If a condition list is satisfied

(evaluates to TRUE), the breakpoint command list immediately

following it is executed. (See Breakpoints and Watchpoints,

above, for a discussion of the logic flow in conditional/command

lists.) Conditional commands perform tests on local breakpoint

variables, and other locations. Each condition evaluates to

either TRUE or FALSE. Figure 65 contains a summary of

conditional commands:

Command Description

-----------------------------+------------------------------------

CHANGED <loc> Determine if a location has changed

COMPARE <loc1> <mask> <loc2> Compare two locations, using a mask

COUNT_[EQ GT LT] <value> Compare the counter to a value

TEST <loc> <mask> <value> Compare a location to a value

Conditional Command Summary

Figure 65

The rules for forming and evaluating condition lists are:

o consecutive conditions have an implicit logical AND between

them. A sequence of such conditions is called an 'and_list'.

and_lists are delimited by an OR command and by the end of

the condition list.

o the breakpoint OR command may be inserted between any pair of

conditions

o AND takes precedence over OR

o nested condition lists are not supported. A condition list

is simply one or more and_lists, separated by ORs.

Page 99

RFC-909 July 1984

o the condition list is evaluated in sequence until either a

TRUE and_list is found (condition list <- TRUE), or the end

of the condition list is reached (condition list <- FALSE).

An and_list is TRUE if all its conditions are TRUE.

The distillation of these rules into BNF is:

<condition_list> :== <and_list> [OR <and_list>]*

<and_list> :== <condition> [AND <condition>]*

<condition> :== CHANGED COMPARE COUNT TEST

where: OR is a breakpoint command

AND is implicit for any pair of consecutive conditions

For example, the following condition list, with one command per

line,

COUNT_EQ 1

OR

COUNT_GT 10

COUNT_LT 20

evaluates to:

(COUNT = 1) OR (COUNT > 10 AND COUNT < 20)

and will cause the command list that follows it to be executed if

the counter is equal to one, or is between 10 and 20.

10.1 Condition Command Format

Condition commands start with the standard four-octet

command header. The high-order bit of the command type byte is

used as a negate flag: if this bit is set, the boolean value of

the condition is negated. This flag applies to one condition

only, and not to other conditions in the condition list.

Page 100

LDP Specification Conditional Commands

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Command Length

+---------------+---------------+

1 CONDITION N Type

+---------------+---------------+

Condition Command Header

Figure 66

10.2 COUNT Conditions

The COUNT conditions (COUNT_EQ, COUNT_GT and COUNT_LT) are

used to compare the breakpoint counter to a specified value. The

counter is set to zero when the breakpoint is STARTed, and is

incremented by the INC_COUNT breakpoint command. The format is

the same for the COUNT_EQ, COUNT_GT and COUNT_LT conditions.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 8

+---------------+---------------+

1 CONDITION N Type

+---------------+---------------+

2

+-- Value --+

3

+---------------+---------------+

COUNT Condition Format

Figure 67

COUNT_* Condition FIELDS:

Page 101

RFC-909 July 1984

Type

One of COUNT_EQ, COUNT_LT and COUNT_GT. The condition is

TRUE if the breakpoint counter is [EQ LT GT] the

specified value.

Value

A 32-bit value to be compared to the counter.

10.3 CHANGED Condition

The CHANGED condition is TRUE if the contents of the

specified location have changed since the last time this

breakpoint occurred. Only one location may be specified as the

object of CHANGED conditions per breakpoint. The CHANGED

condition is always FALSE the first time the breakpoint occurs.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 14

+---------------+---------------+

1 CONDITION N CHANGED

+---------------+---------------+

2

+-- --+

3 Address

+-- --+

4

+-- --+

5

+-- --+

6

+---------------+---------------+

CHANGED Condition

Figure 68

Page 102

LDP Specification Conditional Commands

CHANGED FIELDS:

Address

The full 5-word address of the location to be tested by the

CHANGED command.

10.4 COMPARE Condition

The COMPARE condition compares two locations using a mask.

The condition is TRUE if (<loc1> & <mask>) = (<loc2> & <mask>).

Page 103

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 28

+---------------+---------------+

1 CONDITION N COMPARE

+---------------+---------------+

2

+-- --+

3 Address 1

+-- --+

4

+-- --+

5

+-- --+

6

+---------------+---------------+

7

+-- Mask --+

8

+-------------------------------+

9

+-- --+

10 Address 2

+-- --+

11

+-- --+

12

+-- --+

13

+-------------------------------+

COMPARE Condition

Figure 69

Page 104

LDP Specification Conditional Commands

COMPARE FIELDS:

Address 1

Address 2

The 5-word addresses of the locations to be compared.

Mask

A 32-bit mask specifying which bits in the locations should

be compared.

10.5 TEST Condition

The TEST condition is used to compare a location to a value,

using a mask. The condition is TRUE if (<loc> & <mask>) =

<value>.

Page 105

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 22

+---------------+---------------+

1 CONDITION N TEST

+---------------+---------------+

2

+-- --+

3 Address

+-- --+

4

+-- --+

5

+-- --+

6

+---------------+---------------+

7

+-- Mask --+

8

+-------------------------------+

9

+-- Value --+

10

+-------------------------------+

TEST Condition

Figure 70

TEST FIELDS:

Address

The 5-word address of the location to be compared to the

value.

Mask

A 32-bit mask specifying which bits in the location should

be compared.

Value

A 32-bit value to compare to the masked location.

Page 106

LDP Specification Conditional Commands

Page 107

RFC-909 July 1984

Page 108

LDP Specification Breakpoint Commands

CHAPTER 11

Breakpoint Commands

Breakpoint commands are used to set the value of breakpoint

variables. These commands are only valid within breakpoints and

watchpoints. They are sent from the host to the target as data

in BREAKPOINT_DATA commands. Figure 71 contains a summary of

breakpoint commands:

Command Description

------------------------+-------------------------------------

INCREMENT <location> Increment the specified location

INC_COUNT Increment the breakpoint counter

OR OR two breakpoint condition lists

SET_PTR <n> <location> Set pointer <n> to the contents of

<location>

SET_STATE <n> Set the breakpoint state variable

to <n>

Breakpoint Command Summary

Figure 71

11.1 INCREMENT Command

The INCREMENT command increments the contents of a specified

location. The location may be in any address space writable from

LDP.

Page 109

RFC-909 July 1984

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 14

+---------------+---------------+

1 BREAKPOINT INCREMENT

+---------------+---------------+

2

+-- --+

3 Address

+-- --+

4

+-- --+

5

+-- --+

6

+---------------+---------------+

INCREMENT Command Format

Figure 72

INCREMENT FIELDS:

Address

The full address of the location whose contents are to be

incremented.

11.2 INC_COUNT Command

The INC_COUNT command increments the breakpoint counter.

There is one counter variable for each breakpoint. It is

initialized to zero when the breakpoint is created, when it is

armed with the START command, and whenever the breakpoint state

changes. The counter is tested by the COUNT_* conditions.

Page 110

LDP Specification Breakpoint Commands

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 4

+---------------+---------------+

1 BREAKPOINT INC_COUNT

+---------------+---------------+

INC_COUNT Command Format

Figure 73

11.3 OR Command

The OR command delineates two and_lists in a breakpoint

condition list. A condition list is TRUE if any of the OR

separated and_lists in it are TRUE. A breakpoint condition list

may contain zero, one or, many OR commands. See 'Condition

Commands' for an explanation of condition lists.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 4

+---------------+---------------+

1 BREAKPOINT OR

+---------------+---------------+

OR Command Format

Figure 74

Page 111

RFC-909 July 1984

11.4 SET_PTR Command

The SET_PTR command loads the specified breakpoint pointer

with the contents of a location. The pointer variables and the

SET_PTR command are intended to provide a primitive but unlimited

indirect addressing capability. Two addressing modes,

BPT_PTR_OFFSET and BPT_PTR_INDIRECT, are used for referencing the

breakpoint pointers. For example, to follow a linked list, use

SET_PTR to load a pointer with the start of the list, then use

successive SET_PTR commands with addressing mode BPT_PTR_OFFSET

to get successive elements.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 16

+---------------+---------------+

1 BREAKPOINT SET_PTR

+---------------+---------------+

2 Pointer

+---------------+---------------+

3

+-- --+

4 Address

+-- --+

5

+-- --+

6

+-- --+

7

+---------------+---------------+

SET_PTR Command Format

Figure 75

SET_PTR FIELDS:

Pointer

The pointer to be changed. Allowable values are 0 and 1.

Address

Page 112

LDP Specification Breakpoint Commands

The full address of the location whose contents are to be

loaded into the given pointer variable.

11.5 SET_STATE Command

The SET_STATE command sets the breakpoint state variable to

the specified value. This is the only method of changing a

breakpoint's state from within a breakpoint. The breakpoint's

state may be also be changed by a START command from the host.

The state variable is initialized to zero when the breakpoint is

created.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 6

+---------------+---------------+

1 BREAKPOINT SET_STATE

+---------------+---------------+

2 State Value

+-------------------------------+

SET_STATE Command Format

Figure 76

SET_STATE FIELDS:

State Value

The new value for the breakpoint state variable. Must not

be greater than the maximum state value specified in the

CREATE BREAKPOINT command that created this breakpoint.

Page 113

RFC-909 July 1984

Page 114

LDP Specification Diagram Conventions

APPENDIX A

Diagram Conventions

Command and message diagrams are used in this document to

illustrate the format of these entities. Words are listed in

order of transmission down the page. The first word is word

zero. Bits within a word run left to right, most significant to

least. However, following a convention observed in other

protocol documents, bits are numbered in order of transmission;

the most significant bit in a word is transmitted first. The bit

labelled '0' is the most significant bit.

0 0 0 1 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 M L

+---------------+---------------+

1 Most Sig Octet Least S. Octet

+---------------+---------------+

M = most significant bit in word zero,

transmitted first

L = least significant bit in word zero,

transmitted last

Sample Diagram

Figure 77

Page 115

RFC-909 July 1984

Page 116

LDP Specification Command Summary

APPENDIX B

Command Summary

The following table lists all non-breakpoint LDP commands in

alphabetical order, with a brief description of each.

Page 117

RFC-909 July 1984

Sender

Command Host Target Function

-------------------+-------------+---------------------------

ABORT X Abort outstanding commands

ABORT_DONE X Acknowledge ABORT

ADDRESS_LIST X Return valid address ranges

BREAKPOINT_DATA X Send breakpoint commands

BREAKPOINT_LIST X Return list of breakpoints

CONTINUE X Resume execution

CREATE X Create target object

CREATE_DONE X Acknowledge CREATE

DELETE X Delete target object

DELETE_DONE X Acknowledge DELETE

EXCEPTION X Report target exception

ERROR X Report error with a host command

ERRACK X Acknowledge ERROR

GET_OBJECT X Get object descriptor from name

GET_PHYS_ADDRESS X Get address in physical form

GOT_OBJECT X Return object descriptor

GOT_PHYS_ADDRESS X Return physical address

HELLO X Initiate LDP session

HELLO_REPLY X Return LDP parameters

LIST_ADDRESSES X Request valid address ranges

LIST_BREAKPOINTS X Request breakpoint list

LIST_NAMES X Request name list

LIST_PROCESSES X Request process list

MOVE X Read data from target

MOVE_DONE X Acknowledge MOVE completion

MOVE_DATA X Send data request by MOVE

NAME_LIST X Return name list

PROCESS_LIST X Return process list

READ X Read data from target

READ_DATA X Return data requested by READ

READ_DONE X Acknowledge READ completion

REPEAT_DATA X Write copies of data

REPORT X Request status of object

START X Start target object

STATUS X Return status of object

STEP X Step execution of target object

STOP X Stop target object

SYNCH X Check sequence number

SYNCH_REPLY X Confirm sequence number

WRITE X Write data

WRITE_MASK X Write data with mask

Page 118

LDP Specification Command Summary

Command Summary

Figure 78

Page 119

RFC-909 July 1984

Page 120

LDP Specification Commands, Responses and Replies

APPENDIX C

Commands, Responses and Replies

The following table shows the relationship between commands,

responses and replies. Commands are sent from the host to the

target. Some commands elicit responses and/or replies from the

target. Responses and replies are sent from the target to the

host. The distinction between them is that the target sends only

one reply to a command, but may send multiple responses.

Responses always contain data, whereas replies may or may not.

Page 121

RFC-909 July 1984

Command Response Reply

-------------------+--------------+------------------

ABORT ABORT_DONE

BREAKPOINT_DATA

CONTINUE

CREATE CREATE_DONE

DELETE DELETE_DONE

GET_OBJECT GOT_OBJECT

GET_PHYS_ADDRESS GOT_PHYS_ADDRESS

HELLO HELLO_REPLY

LIST_ADDRESSES ADDRESS_LIST

LIST_BREAKPOINTS BREAKPOINT_LIST

LIST_NAMES NAME_LIST

LIST_PROCESSES PROCESS_LIST

MOVE MOVE_DATA MOVE_DONE

READ READ_DATA READ_DONE

REPEAT_DATA

REPORT STATUS

START

STEP

STOP

SYNCH SYNCH_REPLY

WRITE

WRITE_MASK

Commands, Responses and Replies

Figure 79

Page 122

LDP Specification Glossary

APPENDIX D

Glossary

FSM

Finite state machine. Commands of each breakpoint or

watchpoint are implemented as part of a finite state

machine. A list of breakpoint commands is associated with

each state. There are several breakpoint commands to change

from one state to another.

host

The 'host' in an LDP session is the timesharing system on

which the user process runs.

long

A long is a 32-bit quantity.

octet

An octet is an eight-bit quantity.

RDP

The Reliable Data Protocol (RDP) is a transport layer

protocol designed as a low-overhead alternative to TCP. RDP

is a connection oriented protocol that provides reliable,

sequenced message delivery.

server process

The LDP server process is the passive participant in an LDP

session. The server process usually resides on a target

machine such as a PAD, PSN or gateway. The server process

waits for a user process to initiate a session, and responds

to commands from the user process. In response to user

commands, the server may perform services on the target like

reading and writing memory locations or setting breakpoints.

'Server' is sometimes employed as a shorthand for 'server

process'.

Page 123

RFC-909 July 1984

target

The 'target' in an LDP session is the PSN, PAD or gateway

that is being loaded, dumped or debugged by the host.

Normally, LDP will be implemented in the target as a server

process. However, in some targets with strange

requirements, notably the Butterfly, the target LDP may be a

user process.

user process

The LDP user process is the active participant in an LDP

session. The user process initiates and terminates the

session and sends commands to the server process which

control the session. The user process usually resides on a

timesharing host and is driven by a higher-level entity

(e.g., an application program like an interactive debugger).

'User' is sometimes employed as a shorthand for 'user

process'.

word

A word is a sixteen-bit quantity.

Page 124

INDEX

ABORT command............................................ 35

ABORT_DONE reply......................................... 36

address.............................................. 60, 66

address descriptor....................................... 20

address format................................... 19, 25, 31

address ID............................................... 22

address mode......................................... 20, 22

address mode argument.................................... 21

address offset........................................... 20

addressing............................................... 19

ADDRESS_LIST reply................................... 76, 77

BASIC_DEBUGGER....................................... 12, 32

breakpoint... 9, 13, 57, 60, 71, 79, 92, 93, 95, 96, 99, 107

breakpoint commands.......................... 9, 94, 95, 107

breakpoint counter........................ 94, 100, 101, 110

breakpoint data...................................... 97, 99

breakpoint state variable........................... 94, 107

breakpoint variables..................................... 94

BREAKPOINT_DATA command..................... 73, 94, 95, 107

BREAKPOINT_LIST reply................................ 79, 80

CHANGED condition....................................... 102

command class............................................ 16

command length field..................................... 16

COMPARE Condition....................................... 103

condition command header................................ 101

conditional commands................................. 94, 99

CONTINUE command......................................... 62

control commands...................................... 9, 57

COUNT condition.................................... 110, 111

COUNT_EQ condition...................................... 101

COUNT_GT condition...................................... 101

COUNT_LT condition...................................... 101

CREATE command............................... 69, 70, 73, 75

create types............................................. 70

CREATE_DONE reply.................................... 73, 75

data octets...................................... 43, 47, 52

data packing............................................. 10

data transfer commands................................ 9, 41

data transmission........................................ 10

datagrams................................................. 5

debugging.............................................. 1, 3

Page 125

default breakpoint................................... 71, 92

DELETE command....................................... 73, 75

DELETE_DONE reply........................................ 75

descriptor........... 20, 57, 61, 62, 63, 64, 65, 73, 75, 93

dumping................................................... 3

ERRACK............................................... 10, 39

ERROR codes.............................................. 38

ERROR reply.......................................... 37, 67

EXCEPTION trap........................................... 66

finite state machine................................. 60, 93

FSM breakpoint................................... 71, 92, 94

FULL-DEBUGGER............................................ 12

FULL_DEBUGGER............................................ 32

gateway................................................ 3, 9

GET_OBJECT command................................... 89, 91

GET_PHYS_ADDR command................................ 87, 88

GOT_OBJECT reply..................................... 89, 91

GOT_PHYS_ADDR reply.................................. 87, 88

HELLO command......................................... 9, 29

HELLO_REPLY....................................... 9, 19, 30

host descriptor.......................................... 41

implementation....................................... 12, 31

INC_COUNT command......................... 94, 107, 110, 111

INCREMENT command....................................... 109

internet.................................................. 5

internet protocols........................................ 4

IP........................................................ 5

LDP command formats...................................... 15

LDP header........................................... 15, 16

LDP Version.............................................. 30

LIST commands............................................ 73

LIST_ADDRESSES command............................... 76, 77

LIST_BREAKPOINTS command............................. 79, 80

LIST_NAMES command................................... 84, 85

LIST_PROCESSES command................................... 82

LOADER_DUMPER........................................ 12, 32

loading................................................ 1, 3

long address format...................................... 20

management commands...................................... 67

memory object............................................ 73

MOVE command................................. 22, 41, 47, 49

MOVE sequence number..................................... 52

MOVE_DATA response................................... 22, 51

MOVE_DONE reply.......................................... 52

NAME_LIST reply...................................... 84, 85

offset............................................... 20, 22

OR command.............................................. 111

Page 126

PAD.................................................... 3, 9

pattern.................................................. 54

PHYS_ADDRESS............................................. 57

PHYS_MACRO............................................... 60

PROCESS.................................................. 57

PROCESS_CODE............................................. 60

PROCESS_LIST reply....................................... 82

protocol commands......................................... 9

PSN.................................................... 3, 9

RDP................................................... 5, 15

READ command..................................... 41, 43, 44

READ sequence number..................................... 47

READ_DATA response................................... 45, 46

READ_DONE reply.......................................... 47

repeat count............................................. 54

REPEAT_DATA command.................................. 41, 53

REPORT command................................... 63, 64, 94

sequence number...................................... 10, 39

session................................................... 9

SET_PTR command................................ 94, 111, 112

SET_STATE command.............................. 94, 107, 113

short address format..................................... 25

START command........................................ 59, 60

STATUS reply..................................... 64, 65, 94

STEP command......................................... 62, 63

STOP command......................................... 60, 61

SYNCH.................................................... 10

SYNCH command............................................ 33

SYNCH_REPLY.............................................. 34

system type.............................................. 30

target start address......................... 43, 44, 46, 54

transport................................................. 9

watchpoint.......... 13, 57, 60, 71, 92, 93, 95, 96, 99, 107

WRITE command........................................ 41, 42

WRITE_MASK command....................................... 56

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有