1 /* This file is used to test the 'catch syscall' feature on GDB.
3 Please, if you are going to edit this file DO NOT change the syscalls
4 being called (nor the order of them). If you really must do this, then
5 take a look at catch-syscall.exp and modify there too.
7 Written by Sergio Durigan Junior <sergiodj@linux.vnet.ibm.com>
11 #include <sys/syscall.h>
16 /* These are the syscalls numbers used by the test. */
18 int close_syscall
= SYS_close
;
19 int chroot_syscall
= SYS_chroot
;
20 /* GDB had a bug where it couldn't catch syscall number 0 (PR 16297).
21 In most GNU/Linux architectures, syscall number 0 is
22 restart_syscall, which can't be called from userspace. However,
23 the "read" syscall is zero on x86_64. */
24 int read_syscall
= SYS_read
;
26 int pipe_syscall
= SYS_pipe
;
29 int pipe2_syscall
= SYS_pipe2
;
31 int write_syscall
= SYS_write
;
33 /* Although 123456789 is an illegal syscall umber on arm linux, kernel
34 sends SIGILL rather than returns -ENOSYS. However, arm linux kernel
35 returns -ENOSYS if syscall number is within 0xf0001..0xf07ff, so we
36 can use 0xf07ff for unknown_syscall in test. */
37 int unknown_syscall
= 0x0f07ff;
39 int unknown_syscall
= 123456789;
42 int exit_group_syscall
= SYS_exit_group
;
44 int exit_syscall
= SYS_exit
;
47 /* Set by the test when it wants execve. */
51 main (int argc
, char *const argv
[])
57 /* Test a simple self-exec, but only on request. */
61 /* A close() with a wrong argument. We are only
62 interested in the syscall. */
69 write (fd
[1], buf1
, sizeof (buf1
));
70 read (fd
[0], buf2
, sizeof (buf2
));
72 /* Test vfork-event interactions. Child exits immediately.
73 (Plain fork won't work on no-mmu kernel configurations.) */
77 /* Trigger an intentional ENOSYS. */
78 syscall (unknown_syscall
);
80 /* The last syscall. Do not change this. */