| # Copyright 2004 Free Software Foundation, Inc. |
| |
| # This program is free software; you can redistribute it and/or modify |
| # it under the terms of the GNU General Public License as published by |
| # the Free Software Foundation; either version 2 of the License, or |
| # (at your option) any later version. |
| # |
| # This program is distributed in the hope that it will be useful, |
| # but WITHOUT ANY WARRANTY; without even the implied warranty of |
| # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| # GNU General Public License for more details. |
| # |
| # You should have received a copy of the GNU General Public License |
| # along with this program; if not, write to the Free Software |
| # Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. |
| |
| # Please email any bugs, comments, and/or additions to this file to: |
| # bug-gdb@gnu.org |
| |
| # This file is part of the gdb testsuite. |
| |
| if $tracelevel { |
| strace $tracelevel |
| } |
| |
| # Testcase for backtrace/gdb1476. |
| |
| set prms_id 0 |
| set bug_id 0 |
| |
| set testfile "gdb1476" |
| set srcfile ${testfile}.c |
| set binfile ${objdir}/${subdir}/${testfile} |
| if { [gdb_compile "${srcdir}/${subdir}/${srcfile}" "${binfile}" executable {debug}] != "" } { |
| gdb_suppress_entire_file "Testcase compile failed, so all tests in this file will automatically fail." |
| } |
| |
| gdb_exit |
| gdb_start |
| gdb_reinitialize_dir $srcdir/$subdir |
| gdb_load ${binfile} |
| |
| # |
| # Run to `main' where we begin our tests. |
| # |
| |
| if ![runto_main] then { |
| gdb_suppress_tests |
| } |
| |
| # If we can examine what's at memory address 0, it is possible that we |
| # could also execute it. This could probably make us run away, |
| # executing random code, which could have all sorts of ill effects, |
| # especially on targets without an MMU. Don't run the tests in that |
| # case. |
| |
| send_gdb "x 0\n" |
| gdb_expect { |
| -re "0x0:.*Cannot access memory at address 0x0.*$gdb_prompt $" { } |
| -re "0x0:.*Error accessing memory address 0x0.*$gdb_prompt $" { } |
| -re ".*$gdb_prompt $" { |
| untested "Memory at address 0 is possibly executable" |
| return |
| } |
| } |
| |
| gdb_test "continue" "Program received signal (SIGSEGV|EXC_BAD_ACCESS).*" \ |
| "continue to null pointer call" |
| |
| gdb_test "backtrace 10" \ |
| "#0\[ \t\]*0x0* in .*\r\n#1\[ \t\]*$hex in x.*\r\n#2\[ \t\]*$hex in main.*" \ |
| "backtrace from null pointer call" |