/* This testcase is part of GDB, the GNU debugger.
Copyright 2004, 2007, 2008, 2009, 2010, 2011 Free Software Foundation, Inc.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see .
*/
#include
#include
#include
#include
static volatile int done;
extern int
callee (int param)
{
return param * done + 1;
}
extern int
caller (int a1, int a2, int a3, int a4, int a5, int a6, int a7, int a8)
{
return callee (a1 << a2 * a3 / a4 + a6 & a6 % a7 - a8) + done;
}
static void
catcher (int sig)
{
done = 1;
} /* handler */
static void
thrower (void)
{
/* Trigger a SIGSEGV. */
*(char *)0 = 0;
/* On MMU-less system, previous memory access to address zero doesn't
trigger a SIGSEGV. Trigger a SIGILL. Each arch should define its
own illegal instruction here. */
#if defined(__arm__)
asm(".word 0xf8f00000");
#elif defined(__TMS320C6X__)
asm(".word 0x56454313");
#else
#endif
}
main ()
{
signal (SIGILL, catcher);
signal (SIGSEGV, catcher);
thrower ();
}