Restrict atf_tc_expect_fail(PR port-amd64/51700) only for amd64 (x86_64)

Other ports than amd64 have their own issues, mostly keeping this call as
unimplemented.

While there cast sig_atomic_t to int in the printf(3)-like call -- pointed
out by <martin>

Sponsored by <The NetBSD Foundation>
This commit is contained in:
kamil 2016-12-09 08:34:37 +00:00
parent 56cbf6fa65
commit f6271ea6ad

View File

@ -1,4 +1,4 @@
/* $NetBSD: t_exect.c,v 1.3 2016/12/09 06:47:48 kamil Exp $ */
/* $NetBSD: t_exect.c,v 1.4 2016/12/09 08:34:37 kamil Exp $ */
/*-
* Copyright (c) 2014 The NetBSD Foundation, Inc.
@ -57,10 +57,12 @@ ATF_TC_BODY(t_exect_null, tc)
{
struct sigaction act;
#if defined(__x86_64__)
/*
* exect(NULL,NULL,NULL) generates 15859 times SIGTRAP on amd64
*/
atf_tc_expect_fail("PR port-amd64/51700");
#endif
ATF_REQUIRE(sigemptyset(&act.sa_mask) == 0);
act.sa_sigaction = sigtrap_handler;
@ -71,7 +73,7 @@ ATF_TC_BODY(t_exect_null, tc)
ATF_REQUIRE_ERRNO(EFAULT, exect(NULL, NULL, NULL) == -1);
ATF_REQUIRE_EQ_MSG(caught, 1, "expected caught (1) != received (%d)",
caught);
(int)caught);
}
ATF_TP_ADD_TCS(tp)