diff options
author | Josh Stone <jistone@redhat.com> | 2009-07-30 19:24:17 -0700 |
---|---|---|
committer | Josh Stone <jistone@redhat.com> | 2009-07-30 19:24:44 -0700 |
commit | f1312b2c2bc1ec7b0475a251f27a2f75779f4ccb (patch) | |
tree | 943668fd7137357f2aead6c759fa58357f6aea2f | |
parent | 8bab68f697a6da72ba67d7034f2acdffbe48f918 (diff) | |
download | systemtap-steved-f1312b2c2bc1ec7b0475a251f27a2f75779f4ccb.tar.gz systemtap-steved-f1312b2c2bc1ec7b0475a251f27a2f75779f4ccb.tar.xz systemtap-steved-f1312b2c2bc1ec7b0475a251f27a2f75779f4ccb.zip |
Relax the type-matching in the cmd_parse13 test
Dwarf probes are now printing their $target variables in -L, so we need
to handle more than just stap types in the regular expression.
-rw-r--r-- | testsuite/systemtap.base/cmd_parse.exp | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/testsuite/systemtap.base/cmd_parse.exp b/testsuite/systemtap.base/cmd_parse.exp index c6b098a4..b97d9448 100644 --- a/testsuite/systemtap.base/cmd_parse.exp +++ b/testsuite/systemtap.base/cmd_parse.exp @@ -116,7 +116,7 @@ wait;close spawn stap -L syscall.a* expect { -timeout 60 - -re {(syscall\.a[_a-zA-Z0-9]*(\ [_a-zA-Z0-9\$]+:(string|long|unknown|stats))*\r\n)+} { pass "cmd_parse13" } + -re {(syscall\.a[_a-zA-Z0-9]*(\ [_a-zA-Z0-9\$]+:[^:]+?)+\r\n)+} { pass "cmd_parse13" } timeout {fail "cmd_parse13: unexpected timeout"} eof {fail "cmd_parse13: unexpected EOF"} } |