1 # Test Framework Driver for GDB driving a ROM monitor (via monitor.c).
2 # Copyright 1995, 1996, 1997, 1998, 1999, 2000, 2007, 2008, 2009
3 # Free Software Foundation, Inc.
5 # This program is free software; you can redistribute it and/or modify
6 # it under the terms of the GNU General Public License as published by
7 # the Free Software Foundation; either version 3 of the License, or
8 # (at your option) any later version.
10 # This program is distributed in the hope that it will be useful,
11 # but WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 # GNU General Public License for more details.
15 # You should have received a copy of the GNU General Public License
16 # along with this program. If not, see <http://www.gnu.org/licenses/>.
19 # puts "***** DID USE MONITOR ******"
23 # Send gdb the "target" command
25 proc gdb_target_cmd { targetname serialport } {
28 for {set i 1} {$i <= 3} {incr i} {
29 send_gdb "target $targetname $serialport\n"
31 -re "A program is being debugged already.*ill it.*y or n. $" {
35 -re "Couldn't establish connection to remote.*$gdb_prompt" {
36 verbose "Connection failed";
38 -re "Remote MIPS debugging.*$gdb_prompt" {
39 verbose "Set target to $targetname";
42 -re "Remote debugging using .*$serialport.*$gdb_prompt" {
43 verbose "Set target to $targetname";
46 -re "Remote target $targetname connected to.*$gdb_prompt" {
47 verbose "Set target to $targetname";
50 -re "Connected to.*$gdb_prompt" {
51 verbose "Set target to $targetname";
54 -re "Ending remote.*$gdb_prompt" { }
55 -re "Connection refused.*$gdb_prompt" {
56 verbose "Connection refused by remote target. Pausing, and trying again."
60 -re "Timeout reading from remote system.*$gdb_prompt" {
61 verbose "Got timeout error from gdb.";
76 # Set gdb to target the monitor
78 proc gdb_target_monitor { exec_file } {
83 if [target_info exists gdb_protocol] {
84 set targetname "[target_info gdb_protocol]"
86 perror "No protocol specified for [target_info name].";
89 if [target_info exists baud] {
90 gdb_test "set remotebaud [target_info baud]" "" ""
92 if [target_info exists binarydownload] {
93 gdb_test "set remotebinarydownload [target_info binarydownload]" "" ""
95 if { [ target_info exists disable_x_packet ] } {
96 gdb_test "set remote X-packet disable" ""
98 if { [ target_info exists disable_z_packet ] } {
99 gdb_test "set remote Z-packet disable" ""
101 if [target_info exists gdb_serial] {
102 set serialport "[target_info gdb_serial]";
103 } elseif [target_info exists netport] {
104 set serialport "[target_info netport]"
106 set serialport "[target_info serial]"
109 for {set j 1} {$j <= 2} {incr j} {
110 if [gdb_file_cmd $exec_file] { return -1; }
112 if ![gdb_target_cmd $targetname $serialport] { return 0; }
116 if { $j == 1 && ![reboot_target] } {
121 perror "Couldn't set target for $targetname, port is $serialport.";
125 proc gdb_target_exec { } {
126 gdb_test "target exec" "No executable file now." "" ".*Kill it.*y or n.*" "y"
130 # gdb_load -- load a file into the debugger.
131 # return a -1 if anything goes wrong.
133 proc gdb_load { arg } {
140 global last_gdb_file;
143 if [info exists last_gdb_file] {
144 set arg $last_gdb_file;
146 send_gdb "info files\n";
148 -re "Symbols from \"(\[^\"\]+)\"" {
149 set arg $expect_out(1,string);
152 -re "Local exec file:\[\r\n\]+\[ \t\]*`(\[^'\]+)'," {
153 set arg $expect_out(1,string);
156 -re "$gdb_prompt $" { }
161 set last_gdb_file $arg;
163 for { set j 1; } { $j <= 2 } {incr j; } {
164 if [target_info exists gdb,use_standard_load] {
166 if ![target_info exists gdb,no_push_conn] {
167 remote_push_conn host;
169 set state [remote_ld target $arg];
170 if ![target_info exists gdb,no_push_conn] {
172 remote_pop_conn host;
174 if { $state == "pass" } {
175 if [gdb_target_monitor $arg] { return -1; }
176 gdb_test "list main" ".*" ""
177 verbose "Loaded $arg into $GDB\n";
182 if [gdb_target_monitor $arg] { return -1 }
184 if [is_remote host] {
185 # FIXME: Multiple downloads. bleah.
186 set farg [remote_download host $arg];
191 if { $arg != "" && [target_info exists gdb_sect_offset] } {
192 set textoff [target_info gdb_sect_offset];
193 send_gdb "sect .text $textoff\n";
195 -re "(0x\[0-9a-z]+) - 0x\[0-9a-z\]+ is \\.data" {
196 set dataoff $expect_out(1,string);
199 -re "(0x\[0-9a-z\]+) - 0x\[0-9a-z\]+ is \\.bss" {
200 set bssoff $expect_out(1,string);
203 -re "$gdb_prompt" { }
205 set dataoff [format 0x%x [expr $dataoff + $textoff]];
206 set bssoff [format 0x%x [expr $bssoff + $textoff]];
207 send_gdb "sect .data $dataoff\n";
209 -re "$gdb_prompt" { }
211 send_gdb "sect .bss $bssoff\n";
213 -re "$gdb_prompt" { }
217 verbose "Loading $farg"
218 if [target_info exists gdb_load_offset] {
219 set command "load $farg [target_info gdb_load_offset]\n";
221 set command "load $farg\n";
223 if [target_info exists gdb_load_timeout] {
224 set loadtimeout [target_info gdb_load_timeout]
230 gdb_expect $loadtimeout {
231 -re "\[Ff\]ailed.*$gdb_prompt $" {
232 verbose "load failed";
234 -re "Timeout reading from remote.*$gdb_prompt" {
236 -re "$gdb_prompt $" {
237 verbose "Loaded $farg into $GDB\n"
241 if { $verbose > 1 } {
242 perror "Timed out trying to load $farg."
248 # Make sure we don't have an open connection to the target.
252 if { ![reboot_target] } {
257 perror "Couldn't load file into GDB.";