Big-endian targets: Fix implptrpiece.exp

The test case implptrpiece.exp accesses the second byte of the short
integer number 1 and expects it to be zero.  This is valid for
little-endian targets, but fails on big-endian targets.

This is fixed by distinguishing the expected value by endianness.

gdb/testsuite/ChangeLog:

	* gdb.dwarf2/implptrpiece.exp: Fix check for big-endian targets.
This commit is contained in:
Andreas Arnez 2017-02-14 18:17:19 +01:00
parent bc303e5d6c
commit 075beec08a
2 changed files with 19 additions and 2 deletions

View File

@ -1,3 +1,7 @@
2017-02-14 Andreas Arnez <arnez@linux.vnet.ibm.com>
* gdb.dwarf2/implptrpiece.exp: Fix check for big-endian targets.
2017-02-13 Luis Machado <lgustavo@codesourcery.com>
* gdb.linespec/explicit.c (my_unique_function_name): New function.

View File

@ -80,7 +80,7 @@ Dwarf::assemble $asm_file {
{name s}
{type :$struct_label}
{location {
const1u 1
const2u 0x5678
stack_value
piece 2
const1u 2
@ -119,4 +119,17 @@ if ![runto_main] {
return -1
}
gdb_test "print/d p\[-1\]" " = 0"
# Determine endianness.
set endian "little"
gdb_test_multiple "show endian" "determine endianness" {
-re ".* (big|little) endian.*$gdb_prompt $" {
set endian $expect_out(1,string)
pass "endianness: $endian"
}
}
# Access the second byte of s through an implicit pointer to the third
# byte of s, using a negative offset. Compare that to the second byte of
# the short integer 0x5678 in target byte order.
switch $endian { little {set val 0x56} big {set val 0x78} }
gdb_test "p/x p\[-1\]" " = $val"