]>
Commit | Line | Data |
---|---|---|
c906108c | 1 | # Test Framework Driver for GDB driving a ROM monitor (via monitor.c). |
6aba47ca | 2 | # Copyright 1995, 1996, 1997, 1998, 1999, 2000, 2007 |
b6ba6518 | 3 | # Free Software Foundation, Inc. |
c906108c SS |
4 | # |
5 | # This program is free software; you can redistribute it and/or modify | |
6 | # it under the terms of the GNU General Public License as published by | |
7 | # the Free Software Foundation; either version 2 of the License, or | |
8 | # (at your option) any later version. | |
9 | # | |
10 | # This program is distributed in the hope that it will be useful, | |
11 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
12 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
13 | # GNU General Public License for more details. | |
14 | # | |
15 | # You should have received a copy of the GNU General Public License | |
16 | # along with this program; if not, write to the Free Software | |
17 | # Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. | |
18 | ||
19 | load_lib gdb.exp | |
08e706b1 MS |
20 | # puts "***** DID USE MONITOR ******" |
21 | ||
22 | # | |
23 | # gdb_target_cmd | |
24 | # Send gdb the "target" command | |
25 | # | |
26 | proc gdb_target_cmd { targetname serialport } { | |
27 | global gdb_prompt | |
28 | ||
29 | for {set i 1} {$i <= 3} {incr i} { | |
30 | send_gdb "target $targetname $serialport\n" | |
31 | gdb_expect 60 { | |
32 | -re "A program is being debugged already.*ill it.*y or n. $" { | |
33 | send_gdb "y\n"; | |
34 | exp_continue; | |
35 | } | |
36 | -re "Couldn't establish connection to remote.*$gdb_prompt" { | |
37 | verbose "Connection failed"; | |
38 | } | |
39 | -re "Remote MIPS debugging.*$gdb_prompt" { | |
40 | verbose "Set target to $targetname"; | |
41 | return 0; | |
42 | } | |
43 | -re "Remote debugging using .*$serialport.*$gdb_prompt" { | |
44 | verbose "Set target to $targetname"; | |
45 | return 0; | |
46 | } | |
47 | -re "Remote target $targetname connected to.*$gdb_prompt" { | |
48 | verbose "Set target to $targetname"; | |
49 | return 0; | |
50 | } | |
51 | -re "Connected to.*$gdb_prompt" { | |
52 | verbose "Set target to $targetname"; | |
53 | return 0; | |
54 | } | |
55 | -re "Ending remote.*$gdb_prompt" { } | |
56 | -re "Connection refused.*$gdb_prompt" { | |
57 | verbose "Connection refused by remote target. Pausing, and trying again." | |
58 | sleep 30 | |
59 | continue | |
60 | } | |
61 | -re "Timeout reading from remote system.*$gdb_prompt" { | |
62 | verbose "Got timeout error from gdb."; | |
63 | } | |
64 | timeout { | |
65 | send_gdb "\ 3"; | |
66 | break | |
67 | } | |
68 | } | |
69 | } | |
269a569e | 70 | return 1 |
08e706b1 MS |
71 | } |
72 | ||
73 | ||
74 | ||
c906108c SS |
75 | # |
76 | # gdb_target_monitor | |
77 | # Set gdb to target the monitor | |
78 | # | |
79 | proc gdb_target_monitor { exec_file } { | |
80 | global gdb_prompt | |
81 | global exit_status | |
82 | global timeout | |
83 | ||
84 | if [target_info exists gdb_protocol] { | |
85 | set targetname "[target_info gdb_protocol]" | |
86 | } else { | |
87 | perror "No protocol specified for [target_info name]."; | |
88 | return -1; | |
89 | } | |
90 | if [target_info exists baud] { | |
91 | gdb_test "set remotebaud [target_info baud]" "" "" | |
92 | } | |
7a292a7a SS |
93 | if [target_info exists binarydownload] { |
94 | gdb_test "set remotebinarydownload [target_info binarydownload]" "" "" | |
95 | } | |
c2c6d25f JM |
96 | if { [ target_info exists disable_x_packet ] } { |
97 | gdb_test "set remote X-packet disable" "" | |
98 | } | |
99 | if { [ target_info exists disable_z_packet ] } { | |
100 | gdb_test "set remote Z-packet disable" "" | |
101 | } | |
c906108c SS |
102 | if [target_info exists gdb_serial] { |
103 | set serialport "[target_info gdb_serial]"; | |
104 | } elseif [target_info exists netport] { | |
105 | set serialport "[target_info netport]" | |
106 | } else { | |
107 | set serialport "[target_info serial]" | |
108 | } | |
109 | ||
110 | for {set j 1} {$j <= 2} {incr j} { | |
111 | if [gdb_file_cmd $exec_file] { return -1; } | |
112 | ||
269a569e | 113 | if ![gdb_target_cmd $targetname $serialport] { return 0; } |
c906108c SS |
114 | |
115 | gdb_target_exec; | |
116 | ||
117 | if { $j == 1 && ![reboot_target] } { | |
118 | break; | |
119 | } | |
120 | } | |
121 | ||
122 | perror "Couldn't set target for $targetname, port is $serialport."; | |
123 | return -1; | |
124 | } | |
125 | ||
126 | proc gdb_target_exec { } { | |
127 | gdb_test "target exec" "No executable file now." "" ".*Kill it.*y or n.*" "y" | |
128 | ||
129 | } | |
130 | # | |
131 | # gdb_load -- load a file into the debugger. | |
132 | # return a -1 if anything goes wrong. | |
133 | # | |
134 | proc gdb_load { arg } { | |
135 | global verbose | |
136 | global loadpath | |
137 | global loadfile | |
138 | global GDB | |
139 | global gdb_prompt | |
140 | global timeout | |
141 | global last_gdb_file; | |
142 | ||
143 | if { $arg == "" } { | |
144 | if [info exists last_gdb_file] { | |
145 | set arg $last_gdb_file; | |
146 | } else { | |
147 | send_gdb "info files\n"; | |
148 | gdb_expect 30 { | |
149 | -re "Symbols from \"(\[^\"\]+)\"" { | |
150 | set arg $expect_out(1,string); | |
151 | exp_continue; | |
152 | } | |
153 | -re "Local exec file:\[\r\n\]+\[ \t\]*`(\[^'\]+)'," { | |
154 | set arg $expect_out(1,string); | |
155 | exp_continue; | |
156 | } | |
157 | -re "$gdb_prompt $" { } | |
158 | } | |
159 | } | |
160 | } | |
161 | ||
162 | set last_gdb_file $arg; | |
163 | ||
164 | for { set j 1; } { $j <= 2 } {incr j; } { | |
165 | if [target_info exists gdb,use_standard_load] { | |
166 | gdb_target_exec; | |
167 | if ![target_info exists gdb,no_push_conn] { | |
168 | remote_push_conn host; | |
169 | } | |
170 | set state [remote_ld target $arg]; | |
171 | if ![target_info exists gdb,no_push_conn] { | |
172 | remote_close target; | |
173 | remote_pop_conn host; | |
174 | } | |
175 | if { $state == "pass" } { | |
176 | if [gdb_target_monitor $arg] { return -1; } | |
177 | gdb_test "list main" ".*" "" | |
178 | verbose "Loaded $arg into $GDB\n"; | |
179 | return 0; | |
180 | } | |
181 | } else { | |
182 | ||
183 | if [gdb_target_monitor $arg] { return -1 } | |
184 | ||
185 | if [is_remote host] { | |
186 | # FIXME: Multiple downloads. bleah. | |
187 | set farg [remote_download host $arg]; | |
188 | } else { | |
189 | set farg $arg; | |
190 | } | |
191 | ||
192 | if { $arg != "" && [target_info exists gdb_sect_offset] } { | |
193 | set textoff [target_info gdb_sect_offset]; | |
194 | send_gdb "sect .text $textoff\n"; | |
195 | gdb_expect 30 { | |
196 | -re "(0x\[0-9a-z]+) - 0x\[0-9a-z\]+ is \\.data" { | |
197 | set dataoff $expect_out(1,string); | |
198 | exp_continue; | |
199 | } | |
200 | -re "(0x\[0-9a-z\]+) - 0x\[0-9a-z\]+ is \\.bss" { | |
201 | set bssoff $expect_out(1,string); | |
202 | exp_continue; | |
203 | } | |
204 | -re "$gdb_prompt" { } | |
205 | } | |
206 | set dataoff [format 0x%x [expr $dataoff + $textoff]]; | |
207 | set bssoff [format 0x%x [expr $bssoff + $textoff]]; | |
208 | send_gdb "sect .data $dataoff\n"; | |
209 | gdb_expect 30 { | |
210 | -re "$gdb_prompt" { } | |
211 | } | |
212 | send_gdb "sect .bss $bssoff\n"; | |
213 | gdb_expect 30 { | |
214 | -re "$gdb_prompt" { } | |
215 | } | |
216 | } | |
217 | ||
218 | verbose "Loading $farg" | |
219 | if [target_info exists gdb_load_offset] { | |
220 | set command "load $farg [target_info gdb_load_offset]\n"; | |
221 | } else { | |
222 | set command "load $farg\n"; | |
223 | } | |
f949823c MS |
224 | if [target_info exists gdb_load_timeout] { |
225 | set loadtimeout [target_info gdb_load_timeout] | |
226 | } else { | |
227 | set loadtimeout 1600 | |
228 | } | |
229 | ||
c906108c | 230 | send_gdb $command; |
f949823c | 231 | gdb_expect $loadtimeout { |
c906108c SS |
232 | -re "\[Ff\]ailed.*$gdb_prompt $" { |
233 | verbose "load failed"; | |
234 | } | |
235 | -re "Timeout reading from remote.*$gdb_prompt" { | |
236 | } | |
237 | -re "$gdb_prompt $" { | |
238 | verbose "Loaded $farg into $GDB\n" | |
239 | return 0; | |
240 | } | |
241 | timeout { | |
242 | if { $verbose > 1 } { | |
243 | perror "Timed out trying to load $farg." | |
244 | } | |
245 | } | |
246 | } | |
247 | } | |
248 | ||
249 | # Make sure we don't have an open connection to the target. | |
250 | gdb_target_exec; | |
251 | ||
252 | if { $j == 1 } { | |
253 | if { ![reboot_target] } { | |
254 | break; | |
255 | } | |
256 | } | |
257 | } | |
258 | perror "Couldn't load file into GDB."; | |
259 | return -1; | |
260 | } |