1 #! /bin/sh 2 3 # In case the test binary contains debug line info first change 4 # bad0.c:?? to a (bogus) binary path /foobar/tests/amd64-linux/defcfaexpr/ 5 # 6 # then change 7 # 8 # ==6019== at 0x400512: bbb (in 9 # /home/sewardj/VgTRUNK/trunk/memcheck/tests/amd64/defcfaexpr) 10 # 11 # to 12 # 13 # ==6019== at 0x400512: bbb (in bogus.S:0) 14 # 15 # and then to 16 # 17 # ==6019== at 0x400512: bbb (bogus.S:0) 18 # 19 # Then the standard ./filter_stderr won't screw it up any more, 20 # instead producing what we want, which is 21 # 22 # at 0x........: bbb (bogus.S:0) 23 # 24 # where the important point is that the function name is intact. 25 # since the point of this test is to check that V can unwind the 26 # stack given the unusual CFAs describing it. 27 28 29 sed "s/bad0.c:[0-9]\+/\/foobar\/tests\/amd64-linux\/defcfaexpr/" | \ 30 ./filter_stderr "$@" | \ 31 sed "s/\/.*\/tests\/amd64-linux\/defcfaexpr/bogus.S:0/" | \ 32 sed "s/(in /(/" 33