aboutsummaryrefslogtreecommitdiff
path: root/gdb/testsuite/gdb.server/target-exec-file.exp
blob: 408635387853722f2559a59313afaa125eb39d58 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
# This testcase is part of GDB, the GNU debugger.

# Copyright 2023 Free Software Foundation, Inc.

# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

# Test GDB's handling of using a file with a 'target:' prefix as the
# executable file.  This test includes checking what happens when the
# file on the target system changes and GDB needs to reload it.

load_lib gdbserver-support.exp

require allow_gdbserver_tests !use_gdb_stub

standard_testfile

if { [build_executable "failed to prepare" $testfile $srcfile debug] } {
    return -1
}

clean_restart

# Some boards specifically set the sysroot to the empty string to
# avoid copying files from the target.  But for this test we do want
# to copy files from the target, so set the sysroot back to 'target:'.
#
# This is fine so long as we're not using a board file that sets the
# sysroot to something else -- but none of the standard boards do
# this, and plenty of other tests mess with the sysroot, so I guess we
# don't worry about that too much.
gdb_test "set sysroot target:" ".*"

# Make sure we're disconnected, in case we're testing with an
# extended-remote board, therefore already connected.
gdb_test "disconnect" ".*"

# Ensure the executable is on the target.
set target_exec [gdb_remote_download target $binfile]

# We're going to be restarting the inferior.  Lets ask GDB not to
# prompt us if this is the right thing to do.
gdb_test_no_output "set confirm off"

if { [allow_python_tests] } {
    # Register an event handler for the executable changed event.
    # This handler just copies the event into a global Python object.
    gdb_test_multiline "Add connection_removed event" \
	"python" "" \
	"global_exec_changed_event = None" "" \
	"def executable_changed(event):" "" \
	"   global global_exec_changed_event" "" \
	"   global_exec_changed_event = event" "" \
	"gdb.events.executable_changed.connect (executable_changed)" "" \
	"end" ""
}

# Start gdbserver, but always in extended-remote mode, and then
# connect to it from GDB.
set res [gdbserver_start "--multi" $target_exec]
set gdbserver_protocol "extended-remote"
set gdbserver_gdbport [lindex $res 1]
gdb_target_cmd $gdbserver_protocol $gdbserver_gdbport

if { [allow_python_tests] } {
    # When connecting to a remote target, if the user has not told GDB
    # which executable to use, then GDB will figure out an executable
    # from the remote target.
    #
    # As a result we expect to have seen an executable changed event.
    with_test_prefix "after connecting" {
	gdb_test "python print(global_exec_changed_event)" \
	    "<gdb.ExecutableChangedEvent object at $hex>"
	gdb_test "python print(global_exec_changed_event.progspace.executable_filename)" \
	    [string_to_regexp target:$target_exec]
	gdb_test "python print(global_exec_changed_event.reload)" "False"
	gdb_test_no_output "python global_exec_changed_event = None"
    }
}

# Issue a 'file' command and parse the output.  We look for a couple
# of specific things to ensure that we are correctly reading the exec
# from the remote target.
set saw_read_of_remote_exec false
set saw_read_of_syms_from_exec false
gdb_test_multiple "file target:$target_exec" "run file command" {
    -re "^file target:\[^\r\n\]+\r\n" {
	exp_continue
    }

    -re "^Reading (\[^\r\n\]+) from remote target\\.\\.\\.\r\n" {
	set filename $expect_out(1,string)
	if { $filename eq $target_exec } {
	    set saw_read_of_remote_exec true
	}
	exp_continue
    }

    -re "^warning: File transfers from remote targets can be slow\[^\r\n\]+\r\n" {
	exp_continue
    }

    -re "^Reading symbols from target:(\[^\r\n\]+)\\.\\.\\.\r\n" {
	set filename $expect_out(1,string)
	if { $filename eq $target_exec } {
	    set saw_read_of_syms_from_exec true
	}
	exp_continue
    }

    -re "^Expanding full symbols from \[^\r\n\]+\r\n" {
	exp_continue
    }

    -re "^$gdb_prompt $" {
	pass $gdb_test_name
    }
}

gdb_assert { $saw_read_of_remote_exec } \
    "exec was read from the remote target"

gdb_assert { $saw_read_of_syms_from_exec } \
    "symbols were read from remote exec file"

if { [allow_python_tests] } {
    # The 'file' command forces GDB to always load the executable,
    # even if the same filename is used.  In this case, as the
    # filename is the same, this will show as a reload event.
    with_test_prefix "after 'file' command" {
	gdb_test "python print(global_exec_changed_event)" \
	    "<gdb.ExecutableChangedEvent object at $hex>"
	gdb_test "python print(global_exec_changed_event.progspace.executable_filename)" \
	    [string_to_regexp target:$target_exec]
	gdb_test "python print(global_exec_changed_event.reload)" "True"
	gdb_test_no_output "python global_exec_changed_event = None"
    }
}

# Start the inferior (with the 'start' command), use TESTNAME for any
# pass/fail calls.  EXPECT_REREAD should be true or false and
# indicates if we expect to too a line like:
#
#  `FILE' has changed; re-reading symbols.
proc start_inferior { testname expect_reread } {
    with_test_prefix $testname {
	if { [gdb_start_cmd] < 0 } {
	    fail "start command"
	    return -1
	}

	set saw_reread false
	gdb_test_multiple "" "stopped at main" {
	    -re "^start\\s*\r\n" {
		exp_continue
	    }
	    -re "^`\[^\r\n\]+' has changed; re-reading symbols\\.\r\n" {
		set saw_reread true
		exp_continue
	    }
	    -re "^Reading \[^\r\n\]+ from remote target\\.\\.\\.\r\n" {
		exp_continue
	    }
	    -re "^Expanding full symbols from \[^\r\n\]+\\.\\.\\.\r\n" {
		exp_continue
	    }
	    -re "^Temporary breakpoint $::decimal at $::hex: \[^\r\n\]+\r\n" {
		exp_continue
	    }
	    -re "^Starting program: \[^\r\n\]+\r\n" {
		exp_continue
	    }
	    -re "^\\s*\r\n" {
		exp_continue
	    }
	    -re "^Temporary breakpoint $::decimal, main \\(\\) at .*$::gdb_prompt $" {
		pass $testname
	    }
	}

	gdb_assert { $expect_reread == $saw_reread } \
	    "check symbol re-read behaviour"
    }
}

# Start the inferior for the first time.  The symbols were already
# read from the file when the 'file' command was used, we should not
# see the symbols re-read now.
start_inferior "start inferior the first time" false

if { [allow_python_tests] } {
    # The executable hasn't changed.
    with_test_prefix "after starting inferior for the first time" {
	gdb_test "python print(global_exec_changed_event)" "None"
    }
}

# Re-start the inferior.  The executable is unchanged so we should not
# see the symbol file being re-read.
start_inferior "start inferior a second time" false

if { [allow_python_tests] } {
    # The executable still hasn't changed.
    with_test_prefix "after starting inferior for the second time" {
	gdb_test "python print(global_exec_changed_event)" "None"
    }
}

# Delay for a short while so, when we touch the exec, we know the
# timestamp will change.
sleep 1
set res [remote_exec target "touch $target_exec"]
set status [lindex $res 0]
if { $status != 0 } {
    fail "touching executable on target"
    return -1
}

# Start the inferior again, we expect to see the symbols being re-read
# from the remote file.
start_inferior "start inferior a third time" true

if { [allow_python_tests] } {
    # The executable has now changed on disk.  This will be a reload
    # event.
    with_test_prefix "after starting inferior for the third time" {
	gdb_test "python print(global_exec_changed_event)" \
	    "<gdb.ExecutableChangedEvent object at $hex>"
	gdb_test "python print(global_exec_changed_event.progspace.executable_filename)" \
	    [string_to_regexp target:$target_exec]
	gdb_test "python print(global_exec_changed_event.reload)" "True"
	gdb_test_no_output "python global_exec_changed_event = None"
    }
}