From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 129301 invoked by alias); 19 Jul 2019 12:11:31 -0000 Mailing-List: contact dwz-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Post: List-Help: List-Subscribe: Sender: dwz-owner@sourceware.org Received: (qmail 129291 invoked by uid 89); 19 Jul 2019 12:11:31 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Checked: by ClamAV 0.100.3 on sourceware.org X-Virus-Found: No X-Spam-SWARE-Status: No, score=-26.2 required=5.0 tests=AWL,BAYES_00,GIT_PATCH_0,GIT_PATCH_1,GIT_PATCH_2,GIT_PATCH_3,SPF_PASS autolearn=ham version=3.3.1 spammy= X-Spam-Status: No, score=-26.2 required=5.0 tests=AWL,BAYES_00,GIT_PATCH_0,GIT_PATCH_1,GIT_PATCH_2,GIT_PATCH_3,SPF_PASS autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on sourceware.org X-Spam-Level: X-HELO: mx1.suse.de X-Virus-Scanned: by amavisd-new at test-mx.suse.de Date: Tue, 01 Jan 2019 00:00:00 -0000 From: Tom de Vries To: dwz@sourceware.org, jakub@redhat.com Subject: [committed] Require single pointer size in pr24823.sh Message-ID: <20190719121125.GA4377@delia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-SW-Source: 2019-q3/txt/msg00082.txt.bz2 Hi, On MIPS we run into: ... dwz: 1: DWARF pointer size differs between CUs dwz: 2: DWARF pointer size differs between CUs dwz: Too few files for multifile optimization FAIL: testsuite/dwz.tests/pr24823.sh ... Fix this by requiring a single pointer size for exec varval in pr24823.sh. Committed to trunk. Thanks, - Tom Require single pointer size in pr24823.sh 2019-07-19 Tom de Vries * testsuite/dwz.tests/pr24823.sh: Require single pointer size. --- testsuite/dwz.tests/pr24823.sh | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/testsuite/dwz.tests/pr24823.sh b/testsuite/dwz.tests/pr24823.sh index f6e5f90..8720aec 100644 --- a/testsuite/dwz.tests/pr24823.sh +++ b/testsuite/dwz.tests/pr24823.sh @@ -1,5 +1,14 @@ exec=$execs/varval +pointer_sizes=$(readelf -wi $exec \ + | grep "Pointer Size:" \ + | sort -u \ + | wc -l) + +if [ $pointer_sizes -ne 1 ]; then + exit 77 +fi + cp $exec 1 cp 1 2