1 # Test Framework Driver for GDB driving a ROM monitor (via monitor.c).
2 # Copyright 1995-2015 Free Software Foundation, Inc.
4 # This program is free software; you can redistribute it and/or modify
5 # it under the terms of the GNU General Public License as published by
6 # the Free Software Foundation; either version 3 of the License, or
7 # (at your option) any later version.
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
14 # You should have received a copy of the GNU General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
18 # puts "***** DID USE MONITOR ******"
22 # Send gdb the "target" command
24 proc gdb_target_cmd { targetname serialport } {
27 for {set i 1} {$i <= 3} {incr i} {
28 send_gdb "target $targetname $serialport\n"
30 -re "A program is being debugged already.*ill it.*y or n. $" {
34 -re "Couldn't establish connection to remote.*$gdb_prompt" {
35 verbose "Connection failed"
37 -re "Remote MIPS debugging.*$gdb_prompt" {
38 verbose "Set target to $targetname"
41 -re "Remote debugging using .*$serialport.*$gdb_prompt" {
42 verbose "Set target to $targetname"
45 -re "Remote target $targetname connected to.*$gdb_prompt" {
46 verbose "Set target to $targetname"
49 -re "Connected to.*$gdb_prompt" {
50 verbose "Set target to $targetname"
53 -re "Ending remote.*$gdb_prompt" { }
54 -re "Connection refused.*$gdb_prompt" {
55 verbose "Connection refused by remote target. Pausing, and trying again."
59 -re "Timeout reading from remote system.*$gdb_prompt" {
60 verbose "Got timeout error from gdb."
75 # Set gdb to target the monitor
77 proc gdb_target_monitor { exec_file } {
82 if [target_info exists gdb_protocol] {
83 set targetname "[target_info gdb_protocol]"
85 perror "No protocol specified for [target_info name]."
88 if [target_info exists baud] {
89 gdb_test "set serial baud [target_info baud]" "" ""
91 if [target_info exists binarydownload] {
92 gdb_test "set remotebinarydownload [target_info binarydownload]" "" ""
94 if { [ target_info exists disable_x_packet ] } {
95 gdb_test "set remote X-packet disable" ""
97 if { [ target_info exists disable_z_packet ] } {
98 gdb_test "set remote Z-packet disable" ""
100 if [target_info exists gdb_serial] {
101 set serialport "[target_info gdb_serial]"
102 } elseif [target_info exists netport] {
103 set serialport "[target_info netport]"
105 set serialport "[target_info serial]"
108 for {set j 1} {$j <= 2} {incr j} {
109 if [gdb_file_cmd $exec_file] { return -1 }
111 if ![gdb_target_cmd $targetname $serialport] { return 0 }
115 if { $j == 1 && ![reboot_target] } {
120 perror "Couldn't set target for $targetname, port is $serialport."
124 proc gdb_target_exec { } {
125 gdb_test "target exec" "No executable file now." "" ".*Kill it.*y or n.*" "y"
129 # gdb_load -- load a file into the debugger.
130 # return a -1 if anything goes wrong.
132 proc gdb_load { arg } {
142 if [info exists last_gdb_file] {
143 set arg $last_gdb_file
145 send_gdb "info files\n"
147 -re "Symbols from \"(\[^\"\]+)\"" {
148 set arg $expect_out(1,string)
151 -re "Local exec file:\[\r\n\]+\[ \t\]*`(\[^'\]+)'," {
152 set arg $expect_out(1,string)
155 -re "$gdb_prompt $" { }
160 set last_gdb_file $arg
162 for { set j 1 } { $j <= 2 } {incr j } {
163 if [target_info exists gdb,use_standard_load] {
165 if ![target_info exists gdb,no_push_conn] {
166 remote_push_conn host
168 set state [remote_ld target $arg]
169 if ![target_info exists gdb,no_push_conn] {
173 if { $state == "pass" } {
174 if [gdb_target_monitor $arg] { return -1 }
175 gdb_test "list main" ".*" ""
176 verbose "Loaded $arg into $GDB\n"
181 if [gdb_target_monitor $arg] { return -1 }
183 if [is_remote host] {
184 # FIXME: Multiple downloads. bleah.
185 set farg [remote_download host $arg]
190 if { $arg != "" && [target_info exists gdb_sect_offset] } {
191 set textoff [target_info gdb_sect_offset]
192 send_gdb "sect .text $textoff\n"
194 -re "(0x\[0-9a-z]+) - 0x\[0-9a-z\]+ is \\.data" {
195 set dataoff $expect_out(1,string)
198 -re "(0x\[0-9a-z\]+) - 0x\[0-9a-z\]+ is \\.bss" {
199 set bssoff $expect_out(1,string)
202 -re "$gdb_prompt" { }
204 set dataoff [format 0x%x [expr $dataoff + $textoff]]
205 set bssoff [format 0x%x [expr $bssoff + $textoff]]
206 send_gdb "sect .data $dataoff\n"
208 -re "$gdb_prompt" { }
210 send_gdb "sect .bss $bssoff\n"
212 -re "$gdb_prompt" { }
216 verbose "Loading $farg"
217 if [target_info exists gdb_load_offset] {
218 set command "load $farg [target_info gdb_load_offset]\n"
220 set command "load $farg\n"
222 if [target_info exists gdb_load_timeout] {
223 set loadtimeout [target_info gdb_load_timeout]
228 if [is_remote target] {
229 set oldremotetimeout [get_remotetimeout]
230 set_remotetimeout $loadtimeout
235 gdb_expect $loadtimeout {
236 -re "\[Ff\]ailed.*$gdb_prompt $" {
237 verbose "load failed"
239 -re "Timeout reading from remote.*$gdb_prompt" {
241 -re "$gdb_prompt $" {
242 verbose "Loaded $farg into $GDB\n"
246 if { $verbose > 1 } {
247 perror "Timed out trying to load $farg."
252 if [is_remote target] {
253 set_remotetimeout $oldremotetimeout
256 if { $load_ok == 1 } {
261 # Make sure we don't have an open connection to the target.
265 if { ![reboot_target] } {
270 perror "Couldn't load file into GDB."