diff options
-rw-r--r-- | gdb/testsuite/ChangeLog | 5 | ||||
-rw-r--r-- | gdb/testsuite/gdb.base/catch-syscall.c | 8 |
2 files changed, 13 insertions, 0 deletions
diff --git a/gdb/testsuite/ChangeLog b/gdb/testsuite/ChangeLog index 8ce6ee8..9f8f40c 100644 --- a/gdb/testsuite/ChangeLog +++ b/gdb/testsuite/ChangeLog @@ -1,3 +1,8 @@ +2016-06-29 Yao Qi <yao.qi@linaro.org> + + * gdb.base/catch-syscall.c [__arm__]: Set unknown_syscall to + 0x0f07ff. + 2016-06-28 Yao Qi <yao.qi@linaro.org> * gdb.base/catch-syscall.exp: Remove check on isnative and target diff --git a/gdb/testsuite/gdb.base/catch-syscall.c b/gdb/testsuite/gdb.base/catch-syscall.c index 98222fa..0ab9631 100644 --- a/gdb/testsuite/gdb.base/catch-syscall.c +++ b/gdb/testsuite/gdb.base/catch-syscall.c @@ -28,7 +28,15 @@ int pipe_syscall = SYS_pipe; int pipe2_syscall = SYS_pipe2; #endif int write_syscall = SYS_write; +#if defined(__arm__) +/* Although 123456789 is an illegal syscall umber on arm linux, kernel + sends SIGILL rather than returns -ENOSYS. However, arm linux kernel + returns -ENOSYS if syscall number is within 0xf0001..0xf07ff, so we + can use 0xf07ff for unknown_syscall in test. */ +int unknown_syscall = 0x0f07ff; +#else int unknown_syscall = 123456789; +#endif int exit_group_syscall = SYS_exit_group; /* Set by the test when it wants execve. */ |