Commit | Line | Data |
---|---|---|
0fb0cc75 | 1 | # Copyright 2000, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009 |
2f83a18e | 2 | # Free Software Foundation, Inc. |
6f8eac0e DJ |
3 | |
4 | # This program is free software; you can redistribute it and/or modify | |
5 | # it under the terms of the GNU General Public License as published by | |
e22f8b7c | 6 | # the Free Software Foundation; either version 3 of the License, or |
6f8eac0e | 7 | # (at your option) any later version. |
e22f8b7c | 8 | # |
6f8eac0e DJ |
9 | # This program is distributed in the hope that it will be useful, |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. | |
e22f8b7c | 13 | # |
6f8eac0e | 14 | # You should have received a copy of the GNU General Public License |
e22f8b7c | 15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
6f8eac0e DJ |
16 | |
17 | # This file is based on config/gdbserver.exp, which was written by | |
18 | # Michael Snyder (msnyder@redhat.com). | |
19 | ||
20 | # | |
21 | # To be addressed or set in your baseboard config file: | |
22 | # | |
23 | # set_board_info gdb_protocol "remote" | |
24 | # Unles you have a gdbserver that uses a different protocol... | |
25 | # | |
26 | # set_board_info gdb_server_prog | |
27 | # This will be the path to the gdbserver program you want to test. | |
28 | # Defaults to "gdbserver". | |
29 | # | |
30 | # set_board_info sockethost | |
31 | # The name of the host computer whose socket is being used. | |
32 | # Defaults to "localhost". Note: old gdbserver requires | |
33 | # that you define this, but libremote/gdbserver does not. | |
34 | # | |
35 | # set_board_info gdb,socketport | |
36 | # Port id to use for socket connection. If not set explicitly, | |
37 | # it will start at "2345" and increment for each use. | |
38 | # | |
39 | ||
40 | # | |
41 | # gdb_target_cmd | |
42 | # Send gdb the "target" command | |
43 | # | |
44 | proc gdb_target_cmd { targetname serialport } { | |
45 | global gdb_prompt | |
46 | ||
ef783a7d | 47 | set serialport_re [string_to_regexp $serialport] |
6f8eac0e DJ |
48 | for {set i 1} {$i <= 3} {incr i} { |
49 | send_gdb "target $targetname $serialport\n" | |
50 | gdb_expect 60 { | |
51 | -re "A program is being debugged already.*ill it.*y or n. $" { | |
52 | send_gdb "y\n" | |
53 | exp_continue | |
54 | } | |
401ea829 JB |
55 | -re "unknown host.*$gdb_prompt" { |
56 | verbose "Couldn't look up $serialport" | |
57 | } | |
2f83a18e | 58 | -re "Couldn't establish connection to remote.*$gdb_prompt $" { |
6f8eac0e DJ |
59 | verbose "Connection failed" |
60 | } | |
61 | -re "Remote MIPS debugging.*$gdb_prompt" { | |
62 | verbose "Set target to $targetname" | |
63 | return 0 | |
64 | } | |
ef783a7d | 65 | -re "Remote debugging using .*$serialport_re.*$gdb_prompt $" { |
6f8eac0e DJ |
66 | verbose "Set target to $targetname" |
67 | return 0 | |
68 | } | |
2f83a18e | 69 | -re "Remote target $targetname connected to.*$gdb_prompt $" { |
6f8eac0e DJ |
70 | verbose "Set target to $targetname" |
71 | return 0 | |
72 | } | |
2f83a18e | 73 | -re "Connected to.*$gdb_prompt $" { |
6f8eac0e DJ |
74 | verbose "Set target to $targetname" |
75 | return 0 | |
76 | } | |
2f83a18e DJ |
77 | -re "Ending remote.*$gdb_prompt $" { } |
78 | -re "Connection refused.*$gdb_prompt $" { | |
6f8eac0e DJ |
79 | verbose "Connection refused by remote target. Pausing, and trying again." |
80 | sleep 30 | |
81 | continue | |
82 | } | |
2f83a18e | 83 | -re "Timeout reading from remote system.*$gdb_prompt $" { |
6f8eac0e DJ |
84 | verbose "Got timeout error from gdb." |
85 | } | |
b741e217 DJ |
86 | -notransfer -re "Remote debugging using .*\r\n> $" { |
87 | # We got an unexpected prompt while creating the target. | |
88 | # Leave it there for the test to diagnose. | |
89 | return 1 | |
90 | } | |
6f8eac0e DJ |
91 | timeout { |
92 | send_gdb "\ 3" | |
93 | break | |
94 | } | |
95 | } | |
96 | } | |
97 | return 1 | |
98 | } | |
99 | ||
100 | ||
101 | global portnum | |
102 | set portnum "2345" | |
103 | ||
104 | # Locate the gdbserver binary. Returns "" if gdbserver could not be found. | |
105 | ||
106 | proc find_gdbserver { } { | |
107 | global GDB | |
6fadd07a DE |
108 | global GDBSERVER |
109 | ||
110 | if [info exists GDBSERVER] { | |
111 | return ${GDBSERVER} | |
112 | } | |
6f8eac0e DJ |
113 | |
114 | if [target_info exists gdb_server_prog] { | |
115 | return [target_info gdb_server_prog] | |
116 | } | |
117 | ||
118 | set gdbserver "${GDB}server" | |
119 | if { [file isdirectory $gdbserver] } { | |
120 | append gdbserver "/gdbserver" | |
121 | } | |
122 | ||
123 | if { [file executable $gdbserver] } { | |
124 | return $gdbserver | |
125 | } | |
126 | ||
127 | return "" | |
128 | } | |
129 | ||
130 | # Return non-zero if we should skip gdbserver-specific tests. | |
131 | ||
132 | proc skip_gdbserver_tests { } { | |
133 | if { [find_gdbserver] == "" } { | |
134 | return 1 | |
135 | } | |
136 | ||
137 | return 0 | |
138 | } | |
139 | ||
2d717e4f DJ |
140 | # Download the currently loaded program to the target if necessary. |
141 | # Return the target system filename. | |
6f8eac0e | 142 | |
2d717e4f | 143 | proc gdbserver_download { } { |
b741e217 DJ |
144 | global gdbserver_host_exec |
145 | global gdbserver_host_mtime | |
146 | global gdbserver_server_exec | |
147 | global last_loaded_file | |
148 | ||
149 | set host_exec $last_loaded_file | |
150 | ||
151 | # If we already downloaded a file to the target, see if we can reuse it. | |
152 | set reuse 0 | |
153 | if { [info exists gdbserver_server_exec] } { | |
154 | set reuse 1 | |
155 | ||
156 | # If the file has changed, we can not. | |
157 | if { $host_exec != $gdbserver_host_exec } { | |
158 | set reuse 0 | |
159 | } | |
160 | ||
161 | # If the mtime has changed, we can not. | |
162 | if { [file mtime $host_exec] != $gdbserver_host_mtime } { | |
163 | set reuse 0 | |
164 | } | |
165 | } | |
166 | ||
167 | if { $reuse == 0 } { | |
168 | set gdbserver_host_exec $host_exec | |
169 | set gdbserver_host_mtime [file mtime $host_exec] | |
170 | if [is_remote target] { | |
93f02886 | 171 | set gdbserver_server_exec [gdb_download $host_exec] |
b741e217 DJ |
172 | } else { |
173 | set gdbserver_server_exec $host_exec | |
174 | } | |
175 | } | |
6f8eac0e | 176 | |
2d717e4f DJ |
177 | return $gdbserver_server_exec |
178 | } | |
179 | ||
180 | # Start a gdbserver process with initial OPTIONS and trailing ARGUMENTS. | |
181 | # The port will be filled in between them automatically. | |
182 | # | |
183 | # Returns the target protocol and socket to connect to. | |
184 | ||
185 | proc gdbserver_start { options arguments } { | |
186 | global portnum | |
187 | ||
6f8eac0e DJ |
188 | # Port id -- either specified in baseboard file, or managed here. |
189 | if [target_info exists gdb,socketport] { | |
190 | set portnum [target_info gdb,socketport] | |
191 | } else { | |
192 | # Bump the port number to avoid conflicts with hung ports. | |
193 | incr portnum | |
194 | } | |
195 | ||
196 | # Extract the local and remote host ids from the target board struct. | |
197 | if [target_info exists sockethost] { | |
2d717e4f | 198 | set debughost [target_info sockethost] |
6f8eac0e DJ |
199 | } else { |
200 | set debughost "localhost:" | |
201 | } | |
202 | ||
203 | # Extract the protocol | |
204 | if [target_info exists gdb_protocol] { | |
205 | set protocol [target_info gdb_protocol] | |
206 | } else { | |
207 | set protocol "remote" | |
208 | } | |
209 | ||
210 | set gdbserver [find_gdbserver] | |
211 | ||
047427a8 JK |
212 | # Loop till we find a free port. |
213 | while 1 { | |
214 | # Export the host:port pair. | |
215 | set gdbport $debughost$portnum | |
216 | ||
217 | # Fire off the debug agent. | |
218 | set gdbserver_command "$gdbserver" | |
219 | if { $options != "" } { | |
220 | append gdbserver_command " $options" | |
221 | } | |
222 | append gdbserver_command " :$portnum" | |
223 | if { $arguments != "" } { | |
224 | append gdbserver_command " $arguments" | |
225 | } | |
6f8eac0e | 226 | |
047427a8 JK |
227 | set server_spawn_id [remote_spawn target $gdbserver_command] |
228 | ||
229 | # Wait for the server to open its TCP socket, so that GDB can connect. | |
230 | expect { | |
231 | -i $server_spawn_id | |
232 | -notransfer | |
233 | -re "Listening on" { } | |
234 | -re "Can't bind address: Address already in use\\.\r\n" { | |
235 | verbose -log "Port $portnum is already in use." | |
236 | if ![target_info exists gdb,socketport] { | |
237 | # Bump the port number to avoid the conflict. | |
238 | wait -i $expect_out(spawn_id) | |
239 | incr portnum | |
240 | continue | |
241 | } | |
242 | } | |
243 | } | |
244 | break | |
6f8eac0e DJ |
245 | } |
246 | ||
247 | # We can't just call close, because if gdbserver is local then that means | |
248 | # that it will get a SIGHUP. Doing it this way could also allow us to | |
249 | # get at the inferior's input or output if necessary, and means that we | |
250 | # don't need to redirect output. | |
251 | expect_background { | |
252 | -i $server_spawn_id | |
2226f861 | 253 | full_buffer { } |
6f8eac0e DJ |
254 | eof { |
255 | # The spawn ID is already closed now (but not yet waited for). | |
256 | wait -i $expect_out(spawn_id) | |
257 | } | |
258 | } | |
259 | ||
260 | return [list $protocol $gdbport] | |
261 | } | |
262 | ||
2d717e4f DJ |
263 | # Start a gdbserver process running SERVER_EXEC, and connect GDB |
264 | # to it. CHILD_ARGS are passed to the inferior. | |
265 | # | |
266 | # Returns the target protocol and socket to connect to. | |
267 | ||
268 | proc gdbserver_spawn { child_args } { | |
269 | set target_exec [gdbserver_download] | |
270 | ||
271 | # Fire off the debug agent. This flavour of gdbserver takes as | |
272 | # arguments the port information, the name of the executable file to | |
273 | # be debugged, and any arguments. | |
274 | set arguments "$target_exec" | |
275 | if { $child_args != "" } { | |
276 | append arguments " $child_args" | |
277 | } | |
278 | return [gdbserver_start "" $arguments] | |
279 | } | |
280 | ||
6f8eac0e DJ |
281 | # Start a gdbserver process running HOST_EXEC and pass CHILD_ARGS |
282 | # to it. Return 0 on success, or non-zero on failure. | |
283 | ||
b741e217 | 284 | proc gdbserver_run { child_args } { |
b0f4b84b DJ |
285 | global gdbserver_protocol |
286 | global gdbserver_gdbport | |
287 | ||
2226f861 DJ |
288 | # Kill anything running before we try to start gdbserver, in case |
289 | # we are sharing a serial connection. | |
290 | global gdb_prompt | |
291 | send_gdb "kill\n" | |
292 | gdb_expect 120 { | |
293 | -re "Kill the program being debugged. .y or n. $" { | |
294 | send_gdb "y\n" | |
295 | verbose "\t\tKilling previous program being debugged" | |
296 | exp_continue | |
297 | } | |
298 | -re "$gdb_prompt $" { | |
299 | # OK. | |
300 | } | |
301 | } | |
302 | ||
b741e217 | 303 | set res [gdbserver_spawn $child_args] |
b0f4b84b DJ |
304 | set gdbserver_protocol [lindex $res 0] |
305 | set gdbserver_gdbport [lindex $res 1] | |
306 | ||
307 | return [gdb_target_cmd $gdbserver_protocol $gdbserver_gdbport] | |
308 | } | |
309 | ||
310 | # Reconnect to the previous gdbserver session. | |
311 | ||
312 | proc gdbserver_reconnect { } { | |
313 | global gdbserver_protocol | |
314 | global gdbserver_gdbport | |
6f8eac0e | 315 | |
b0f4b84b | 316 | return [gdb_target_cmd $gdbserver_protocol $gdbserver_gdbport] |
6f8eac0e | 317 | } |
2d717e4f DJ |
318 | |
319 | # Start and connect to a gdbserver in extended mode. | |
320 | proc gdbserver_start_extended { } { | |
321 | set res [gdbserver_start "--multi" ""] | |
322 | set gdbserver_protocol "extended-[lindex $res 0]" | |
323 | set gdbserver_gdbport [lindex $res 1] | |
324 | ||
325 | return [gdb_target_cmd $gdbserver_protocol $gdbserver_gdbport] | |
326 | } |