mirror of
https://github.com/espressif/binutils-gdb.git
synced 2025-06-24 20:28:28 +08:00
* gdb.base/gdb1476.exp: Only run the tests if we can't read the
memory at address 0.
This commit is contained in:
@ -1,3 +1,8 @@
|
|||||||
|
2004-01-07 Mark Kettenis <kettenis@gnu.org>
|
||||||
|
|
||||||
|
* gdb.base/gdb1476.exp: Only run the tests if we can't read the
|
||||||
|
memory at address 0.
|
||||||
|
|
||||||
2004-01-07 Michael Chastain <mec.gnu@mindspring.com>
|
2004-01-07 Michael Chastain <mec.gnu@mindspring.com>
|
||||||
|
|
||||||
* gdb.stabs/weird.exp: Use hp_cc_compiler and hp_aCC_compiler
|
* gdb.stabs/weird.exp: Use hp_cc_compiler and hp_aCC_compiler
|
||||||
|
@ -48,6 +48,21 @@ if ![runto_main] then {
|
|||||||
gdb_suppress_tests
|
gdb_suppress_tests
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# If we can examine what's at memory address 0, it is possible that we
|
||||||
|
# could also execute it. This could pobably make us run away,
|
||||||
|
# executing random code, which could have all sorts of ill effects,
|
||||||
|
# especially on targets without an MMU. Don't run the tests in that
|
||||||
|
# case.
|
||||||
|
|
||||||
|
send_gdb "x 0\n"
|
||||||
|
gdb_expect {
|
||||||
|
-re "0x0:.*Error accessing memory address 0x0.*$gdb_prompt $" { }
|
||||||
|
-re ".*$gdb_prompt $" {
|
||||||
|
untested "Memory at address 0 is possibly executable"
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
gdb_test "continue" "Program received signal SIGSEGV.*" \
|
gdb_test "continue" "Program received signal SIGSEGV.*" \
|
||||||
"continue to null pointer call"
|
"continue to null pointer call"
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user