1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
|
# Copyright 2008, 2009, 2010 Free Software Foundation, Inc.
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# This file is part of the GDB testsuite. It tests stepping over
# consecutive instructions in reverse.
if ![target_info exists gdb,can_reverse] {
return
}
set testfile "consecutive-reverse"
set srcfile ${testfile}.c
if { [prepare_for_testing $testfile.exp $testfile $srcfile] } {
return -1
}
runto main
if [target_info exists gdb,use_precord] {
# Activate process record/replay
gdb_test "record" "" "Turn on process record"
# FIXME: command ought to acknowledge, so we can test if it succeeded.
}
gdb_breakpoint foo
gdb_test "continue" "Breakpoint $decimal, foo .*" \
"continue to breakpoint in foo"
set foo1_addr 0
set foo2_addr 0
set stop_addr 0
gdb_test_multiple "x /2i \$pc" "get breakpoint address for foo" {
global hex
global foo1_addr
global foo2_addr
global gdb_prompt
-re "=> ($hex).*\[\r\n\]+ ($hex).*$gdb_prompt $" {
set foo1_addr $expect_out(1,string)
set foo2_addr $expect_out(2,string)
pass "get breakpoint address for foo"
}
}
gdb_test "break \*$foo2_addr" "Breakpoint $decimal at $foo2_addr: file .*" \
"set bp, 2nd instr"
set testmsg "stopped at bp, 2nd instr"
gdb_test_multiple "step" $testmsg {
-re "Breakpoint $decimal, ($hex) in foo.*$gdb_prompt $" {
set stop_addr $expect_out(1,string)
if [eval expr "$foo2_addr == $stop_addr"] then {
pass "stopped at bp, 2nd instr"
} else {
fail "stopped at bp, 2nd instr (wrong address)"
}
}
}
###
###
###
# Set reverse execution direction
# FIXME: command needs to acknowledge, so we can test if it succeeded.
gdb_test "set exec-dir reverse" "" "set reverse execution"
# Now step backward and hope to hit the first breakpoint.
set test_msg "stopped at bp in reverse, 1st instr"
gdb_test_multiple "step" "$test_msg" {
-re "Breakpoint $decimal, ($hex) in foo.*$gdb_prompt $" {
set stop_addr $expect_out(1,string)
if [eval expr "$foo1_addr == $stop_addr"] then {
pass "$test_msg"
} else {
fail "$test_msg (wrong address)"
}
}
-re "Breakpoint $decimal, foo.*$gdb_prompt $" {
gdb_test "print \$pc == $foo1_addr" \
"$decimal = 1" \
"$test_msg"
}
}
|