]>
Commit | Line | Data |
---|---|---|
8bfabb04 AC |
1 | # This testcase is part of GDB, the GNU debugger. |
2 | ||
28e7fd62 | 3 | # Copyright 2004-2013 Free Software Foundation, Inc. |
8bfabb04 AC |
4 | |
5 | # This program is free software; you can redistribute it and/or modify | |
6 | # it under the terms of the GNU General Public License as published by | |
e22f8b7c | 7 | # the Free Software Foundation; either version 3 of the License, or |
8bfabb04 AC |
8 | # (at your option) any later version. |
9 | # | |
10 | # This program is distributed in the hope that it will be useful, | |
11 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
12 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
13 | # GNU General Public License for more details. | |
14 | # | |
15 | # You should have received a copy of the GNU General Public License | |
e22f8b7c | 16 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
8bfabb04 AC |
17 | |
18 | # Check that GDB can trigger and backtrace SIGSEGV signal stacks | |
19 | # caused by both accessing (data) and executing (code) at address | |
20 | # zero. | |
21 | ||
22 | # On function descriptor architectures, a zero descriptor, instead of | |
23 | # a NULL pointer, is used. That way the NULL code test always | |
24 | # contains a zero code reference. | |
25 | ||
26 | # For recovery, sigjmp/longjmp are used. | |
27 | ||
28 | # This also tests backtrace/gdb1476. | |
29 | ||
5f579bc5 | 30 | if [target_info exists gdb,nosignals] { |
446ab585 | 31 | verbose "Skipping signull.exp because of nosignals." |
5f579bc5 NS |
32 | continue |
33 | } | |
34 | ||
8bfabb04 AC |
35 | |
36 | set testfile "signull" | |
37 | set srcfile ${testfile}.c | |
38 | set binfile ${objdir}/${subdir}/${testfile} | |
39 | if { [gdb_compile "${srcdir}/${subdir}/${srcfile}" "${binfile}" executable {debug}] != "" } { | |
b60f0898 JB |
40 | untested signull.exp |
41 | return -1 | |
8bfabb04 AC |
42 | } |
43 | ||
44 | gdb_exit | |
45 | gdb_start | |
46 | gdb_reinitialize_dir $srcdir/$subdir | |
47 | gdb_load ${binfile} | |
48 | ||
49 | # | |
50 | # Run to `main' where we begin our tests. | |
51 | # | |
52 | ||
53 | if ![runto_main] then { | |
54 | gdb_suppress_tests | |
55 | } | |
56 | ||
57 | # If we can examine what's at memory address 0, it is possible that we | |
58 | # could also execute it. This could probably make us run away, | |
59 | # executing random code, which could have all sorts of ill effects, | |
60 | # especially on targets without an MMU. Don't run the tests in that | |
61 | # case. | |
62 | ||
02746bbc | 63 | gdb_test_multiple "x 0" "memory at address 0" { |
8bfabb04 AC |
64 | -re "0x0:.*Cannot access memory at address 0x0.*$gdb_prompt $" { } |
65 | -re "0x0:.*Error accessing memory address 0x0.*$gdb_prompt $" { } | |
66 | -re ".*$gdb_prompt $" { | |
67 | untested "Memory at address 0 is possibly executable" | |
68 | return | |
69 | } | |
70 | } | |
71 | ||
72 | # If an attempt to call a NULL pointer leaves the inferior in main, | |
73 | # then function pointers are descriptors, probe this and remember the | |
74 | # result. | |
75 | ||
27d3a1a2 MS |
76 | gdb_test_no_output "set test = code_entry_point" \ |
77 | "set for function pointer probe" | |
8bfabb04 AC |
78 | set test "probe function pointer" |
79 | set function_pointer code_entry_point | |
aacd552b | 80 | set signame "SIGSEGV" |
8bfabb04 | 81 | gdb_test_multiple "continue" "$test" { |
9d9030bc | 82 | -re "Program received signal SIGSEGV.*bowler .*$gdb_prompt $" { |
8bfabb04 AC |
83 | set function_pointer code_descriptor |
84 | pass "$test (function descriptor)" | |
85 | } | |
86 | -re "Program received signal SIGSEGV.*0.*$gdb_prompt $" { | |
87 | pass "$test (function entry-point)" | |
88 | } | |
aacd552b TG |
89 | -re "Program received signal SIGBUS.*0.*$gdb_prompt $" { |
90 | set signame SIGBUS | |
91 | pass "$test (function entry-point)" | |
92 | } | |
8bfabb04 AC |
93 | } |
94 | ||
95 | # Re-start from scratch, breakpoint the bowler so that control is | |
96 | # regained after each test, and run up to that. | |
97 | rerun_to_main | |
98 | gdb_test "break bowler" | |
99 | gdb_test "break keeper" | |
100 | # By default Stop:Yes Print:Yes Pass:Yes | |
101 | gdb_test "handle SIGSEGV" "SIGSEGV.*Yes.*Yes.*Yes.*Segmentation fault" | |
aacd552b | 102 | gdb_test "handle SIGBUS" "SIGBUS.*Yes.*Yes.*Yes.*Bus error" |
8bfabb04 AC |
103 | |
104 | # For the given signal type, check that: the SIGSEGV occures; a | |
105 | # backtrace from the SEGV works; the sigsegv is delivered; a backtrace | |
106 | # through the SEGV works. | |
107 | ||
108 | proc test_segv { name tag bt_from_segv bt_from_keeper } { | |
aacd552b | 109 | global signame |
ec58997a AC |
110 | gdb_test continue "Breakpoint.* bowler.*" "${name}; start with the bowler" |
111 | # NB: Don't use $tag in the testname - changes across systems. | |
27d3a1a2 | 112 | gdb_test_no_output "set test = $tag" "${name}; select the pointer type" |
aacd552b TG |
113 | gdb_test continue "Program received signal ${signame}.*" \ |
114 | "${name}; take the ${signame}" | |
115 | gdb_test backtrace $bt_from_segv "${name}; backtrace from ${signame}" | |
ec58997a | 116 | gdb_test continue "Breakpoint.* keeper.*" "${name}; continue to the keeper" |
aacd552b | 117 | gdb_test backtrace $bt_from_keeper "${name}; backtrace from keeper through ${signame}" |
8bfabb04 AC |
118 | } |
119 | ||
ec58997a | 120 | test_segv "data read" data_read \ |
9d9030bc AC |
121 | {#0 .* bowler .*#1 .* main .*} \ |
122 | {#0 .* keeper .*#1 .* handler .*#2 .* bowler .*#3 .* main .*} | |
ec58997a | 123 | test_segv "data write" data_write \ |
8bfabb04 AC |
124 | {#0 .* bowler .*#1 .* main .*} \ |
125 | {#0 .* keeper .*#1 .* handler .*#2 .* bowler .*#3 .* main .*} | |
126 | test_segv code $function_pointer \ | |
127 | {#0 .* 0x0+ .*#1 .* bowler .*#2 .* main .*} \ | |
128 | {#0 .* keeper .*#1 .* handler .*#2 .* 0x0+ .*#3 .* bowler .*#4 .* main .*} |