mirror of
https://github.com/espressif/binutils-gdb.git
synced 2025-06-24 12:23:31 +08:00
[gdb/testsuite] Rewrite catch-follow-exec.exp using gdb_test
The testcase catch-follow-exec.exp is written use gdb -batch in order to avoid a GDB SIGTTOU. After the commit of "Avoid GDB SIGTTOU on catch exec + set follow-exec-mode new (PR 23368)", that no longer is necessary. Rewrite the test using regular gdb_test commands. Tested with x86_64-linux. 2018-10-24 Tom de Vries <tdevries@suse.de> * gdb.base/catch-follow-exec.exp: Rewrite using gdb_test.
This commit is contained in:
@ -1,3 +1,7 @@
|
|||||||
|
2018-10-24 Tom de Vries <tdevries@suse.de>
|
||||||
|
|
||||||
|
* gdb.base/catch-follow-exec.exp: Rewrite using gdb_test.
|
||||||
|
|
||||||
2018-10-24 Tom de Vries <tdevries@suse.de>
|
2018-10-24 Tom de Vries <tdevries@suse.de>
|
||||||
|
|
||||||
* gdb.base/valgrind-db-attach.exp: Handle removed support for
|
* gdb.base/valgrind-db-attach.exp: Handle removed support for
|
||||||
|
@ -13,72 +13,35 @@
|
|||||||
# You should have received a copy of the GNU General Public License
|
# You should have received a copy of the GNU General Public License
|
||||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
# Check whether finish respects the print pretty user setting when printing the
|
# Test whether info prog crashes gdb at a catch point in follow-exec-mode new.
|
||||||
# function result.
|
|
||||||
|
|
||||||
standard_testfile
|
standard_testfile
|
||||||
|
|
||||||
if { [target_info gdb_protocol] != "" } {
|
|
||||||
# Even though the feature under features being tested are supported by
|
|
||||||
# gdbserver, the way this test is written doesn't make it easy with a
|
|
||||||
# remote target.
|
|
||||||
unsupported "not native"
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if { ![remote_file target exists /bin/ls] } {
|
if { ![remote_file target exists /bin/ls] } {
|
||||||
unsupported "no ls"
|
unsupported "no ls"
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if { [build_executable "failed to prepare" $testfile $srcfile debug] == -1 } {
|
if { [prepare_for_testing "failed to prepare" $testfile $srcfile debug] } {
|
||||||
return -1
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
proc catch_follow_exec { } {
|
proc catch_follow_exec { } {
|
||||||
global binfile
|
if { ![runto_main] } {
|
||||||
global gdb_spawn_id
|
untested "could not run to main"
|
||||||
|
return -1
|
||||||
set test "catch-follow-exec"
|
|
||||||
|
|
||||||
append FLAGS " \"$binfile\""
|
|
||||||
append FLAGS " -batch"
|
|
||||||
append FLAGS " -ex \"catch exec\""
|
|
||||||
append FLAGS " -ex \"set follow-exec-mode new\""
|
|
||||||
append FLAGS " -ex \"run\""
|
|
||||||
append FLAGS " -ex \"info prog\""
|
|
||||||
|
|
||||||
gdb_exit
|
|
||||||
if {[gdb_spawn_with_cmdline_opts "$FLAGS"] != 0} {
|
|
||||||
fail "spawn"
|
|
||||||
return
|
|
||||||
}
|
}
|
||||||
|
|
||||||
gdb_test_multiple "" "run til exit" {
|
gdb_test "catch exec" \
|
||||||
"runtime error:" {
|
{Catchpoint [0-9]+ \(exec\)}
|
||||||
# Error in case of --enable-ubsan
|
|
||||||
fail "no runtime error"
|
|
||||||
}
|
|
||||||
eof {
|
|
||||||
set result [wait -i $gdb_spawn_id]
|
|
||||||
verbose $result
|
|
||||||
|
|
||||||
gdb_assert { [lindex $result 2] == 0 }
|
gdb_test_no_output "set follow-exec-mode new"
|
||||||
|
|
||||||
# We suspect this will be zero instead of one after fixing PR23368
|
gdb_test "continue" \
|
||||||
# - "gdb goes to into background when hitting exec catchpoint with
|
".*hit Catchpoint.*"
|
||||||
# follow-exec-mode new"
|
|
||||||
gdb_assert { [lindex $result 3] != 0 }
|
|
||||||
|
|
||||||
# Error in case of --disable-ubsan, we get
|
gdb_test "info prog" \
|
||||||
# "CHILDKILLED SIGSEGV {segmentation violation}" as extra
|
"No selected thread."
|
||||||
# argument(s).
|
|
||||||
gdb_assert { [llength $result] == 4 }
|
|
||||||
}
|
|
||||||
|
|
||||||
remote_close host
|
|
||||||
clear_gdb_spawn_id
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
catch_follow_exec
|
catch_follow_exec
|
||||||
|
Reference in New Issue
Block a user