xref: /aosp_15_r20/external/strace/tests-m32/qual_inject-error-signal.test (revision cf84ac9a129d8ea9952db616b4e9b904c4bdde56)
1*cf84ac9aSAndroid Build Coastguard Worker#!/bin/sh
2*cf84ac9aSAndroid Build Coastguard Worker
3*cf84ac9aSAndroid Build Coastguard Worker# Check fault injection along with signal injection.
4*cf84ac9aSAndroid Build Coastguard Worker. "${srcdir=.}/scno_tampering.sh"
5*cf84ac9aSAndroid Build Coastguard Worker
6*cf84ac9aSAndroid Build Coastguard Worker: ${suffix=}
7*cf84ac9aSAndroid Build Coastguard Worker[ -z "${name_override-}" ] || NAME="$name_override"
8*cf84ac9aSAndroid Build Coastguard Worker
9*cf84ac9aSAndroid Build Coastguard Workerrun_strace -a12 -echdir,exit_group \
10*cf84ac9aSAndroid Build Coastguard Worker	-einject=chdir:error=ENOENT:signal=USR1"$suffix" \
11*cf84ac9aSAndroid Build Coastguard Worker	"../$NAME"
12*cf84ac9aSAndroid Build Coastguard Workermatch_diff
13