diff options
author | Pavel Labath <labath@google.com> | 2016-09-08 11:09:14 +0000 |
---|---|---|
committer | Pavel Labath <labath@google.com> | 2016-09-08 11:09:14 +0000 |
commit | 6f22b771c4482900cbc0f1b585a4b94315d3d15e (patch) | |
tree | 6ee9addd3fceac9fdfc9c3d5904baac6fe87b1bc /lldb/packages/Python/lldbsuite/test/tools/lldb-server/TestGdbRemoteModuleInfo.py | |
parent | 4acc49e58dd8b8b8bd73453c2bb54cac7e4de127 (diff) | |
download | bcm5719-llvm-6f22b771c4482900cbc0f1b585a4b94315d3d15e.tar.gz bcm5719-llvm-6f22b771c4482900cbc0f1b585a4b94315d3d15e.zip |
Fix test breakage in r280919
It turns out that self.dbg.GetSelectedPlatform().GetTriple() is not a good way
to get the triple of the process, as it returns the incorrect triple in case of a
32-bit process running on a 64-bit platform.
Instead, go the long way round and ask the stub for the process triple. This
fixes the test for i386.
llvm-svn: 280922
Diffstat (limited to 'lldb/packages/Python/lldbsuite/test/tools/lldb-server/TestGdbRemoteModuleInfo.py')
-rw-r--r-- | lldb/packages/Python/lldbsuite/test/tools/lldb-server/TestGdbRemoteModuleInfo.py | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/lldb/packages/Python/lldbsuite/test/tools/lldb-server/TestGdbRemoteModuleInfo.py b/lldb/packages/Python/lldbsuite/test/tools/lldb-server/TestGdbRemoteModuleInfo.py index 3441075836f..cab8a9cedfa 100644 --- a/lldb/packages/Python/lldbsuite/test/tools/lldb-server/TestGdbRemoteModuleInfo.py +++ b/lldb/packages/Python/lldbsuite/test/tools/lldb-server/TestGdbRemoteModuleInfo.py @@ -14,10 +14,14 @@ class TestGdbRemoteModuleInfo(gdbremote_testcase.GdbRemoteTestCaseBase): def module_info(self): procs = self.prep_debug_monitor_and_inferior() + self.add_process_info_collection_packets() + context = self.expect_gdbremote_sequence() + info = self.parse_process_info_response(context) + self.test_sequence.add_log_lines([ 'read packet: $jModulesInfo:[{"file":"%s","triple":"%s"}]]#00' % ( lldbutil.append_to_process_working_directory("a.out"), - self.dbg.GetSelectedPlatform().GetTriple()), + info["triple"].decode('hex')), {"direction": "send", "regex": r'^\$\[{(.*)}\]\]#[0-9A-Fa-f]{2}', "capture": {1: "spec"}}, |