From 28244707d9e4f35cab1f9069cee1d44b38be095f Mon Sep 17 00:00:00 2001 From: Yao Qi Date: Wed, 29 Jun 2016 14:51:41 +0100 Subject: [PATCH] Set unknown_syscall differently on arm linux Currently, we use 123456789 as unknown or illegal syscall number, and expect program return ENOSYS. Although 123456789 is an illegal syscall number on arm linux, kernel sends SIGILL rather than returns -ENOSYS. However, arm linux kernel returns -ENOSYS if syscall number is within 0xf0001..0xf07ff, so we can use 0xf07ff for unknown_syscall in test. gdb/testsuite: 2016-06-29 Yao Qi * gdb.base/catch-syscall.c [__arm__]: Set unknown_syscall to 0x0f07ff. --- gdb/testsuite/ChangeLog | 5 +++++ gdb/testsuite/gdb.base/catch-syscall.c | 8 ++++++++ 2 files changed, 13 insertions(+) diff --git a/gdb/testsuite/ChangeLog b/gdb/testsuite/ChangeLog index 8ce6ee89027..9f8f40cd1f0 100644 --- a/gdb/testsuite/ChangeLog +++ b/gdb/testsuite/ChangeLog @@ -1,3 +1,8 @@ +2016-06-29 Yao Qi + + * gdb.base/catch-syscall.c [__arm__]: Set unknown_syscall to + 0x0f07ff. + 2016-06-28 Yao Qi * gdb.base/catch-syscall.exp: Remove check on isnative and target diff --git a/gdb/testsuite/gdb.base/catch-syscall.c b/gdb/testsuite/gdb.base/catch-syscall.c index 98222fa7881..0ab96318d3e 100644 --- a/gdb/testsuite/gdb.base/catch-syscall.c +++ b/gdb/testsuite/gdb.base/catch-syscall.c @@ -28,7 +28,15 @@ int pipe_syscall = SYS_pipe; int pipe2_syscall = SYS_pipe2; #endif int write_syscall = SYS_write; +#if defined(__arm__) +/* Although 123456789 is an illegal syscall umber on arm linux, kernel + sends SIGILL rather than returns -ENOSYS. However, arm linux kernel + returns -ENOSYS if syscall number is within 0xf0001..0xf07ff, so we + can use 0xf07ff for unknown_syscall in test. */ +int unknown_syscall = 0x0f07ff; +#else int unknown_syscall = 123456789; +#endif int exit_group_syscall = SYS_exit_group; /* Set by the test when it wants execve. */ -- 2.30.2