@@ -194,7 +194,7 @@ def debug_assembly(asm, gdbscript=None, vma=None, api=False):
194194 >>> assembly = shellcraft.echo("Hello world!\n")
195195 >>> io = gdb.debug_assembly(assembly)
196196 >>> io.recvline()
197- b'Hello world!\n '
197+ b'Hello world!'
198198 """
199199 tmp_elf = make_elf_from_assembly (asm , vma = vma , extract = False )
200200 os .chmod (tmp_elf , 0o777 )
@@ -229,7 +229,7 @@ def debug_shellcode(data, gdbscript=None, vma=None, api=False):
229229 >>> shellcode = asm(assembly)
230230 >>> io = gdb.debug_shellcode(shellcode)
231231 >>> io.recvline()
232- b'Hello world!\n '
232+ b'Hello world!'
233233 """
234234 if isinstance (data , str ):
235235 log .error ("Shellcode is cannot be unicode. Did you mean debug_assembly?" )
@@ -489,7 +489,7 @@ def debug(args, gdbscript=None, gdb_args=None, exe=None, ssh=None, env=None, por
489489
490490 >>> io.sendline(b"echo hello")
491491 >>> io.recvline()
492- b'hello\n '
492+ b'hello'
493493
494494 Interact with the process
495495
@@ -513,7 +513,7 @@ def debug(args, gdbscript=None, gdb_args=None, exe=None, ssh=None, env=None, por
513513
514514 >>> io.sendline(b"echo hello")
515515 >>> io.recvline()
516- b'hello\n '
516+ b'hello'
517517
518518 Interact with the process
519519
@@ -525,7 +525,7 @@ def debug(args, gdbscript=None, gdb_args=None, exe=None, ssh=None, env=None, por
525525 >>> io = gdb.debug(args=[b'\xde\xad\xbe\xef'], gdbscript='continue', exe="/bin/sh")
526526 >>> io.sendline(b"echo $0")
527527 >>> io.recvline()
528- b'\xde\xad\xbe\xef\n '
528+ b'\xde\xad\xbe\xef'
529529 >>> io.close()
530530
531531 Demonstrate that LD_PRELOAD is respected
@@ -571,15 +571,15 @@ def debug(args, gdbscript=None, gdb_args=None, exe=None, ssh=None, env=None, por
571571 >>> io = gdb.debug(args=[b'\xde\xad\xbe\xef'], gdbscript='continue', exe="/bin/sh", ssh=shell)
572572 >>> io.sendline(b"echo $0")
573573 >>> io.recvline()
574- b'$ \xde\xad\xbe\xef\n '
574+ b'$ \xde\xad\xbe\xef'
575575 >>> io.close()
576576
577577 Using an empty args[0] on a remote process
578578
579579 >>> io = gdb.debug(args=[], gdbscript='continue', exe="/bin/sh", ssh=shell)
580580 >>> io.sendline(b"echo $0")
581581 >>> io.recvline()
582- b'$ \n '
582+ b'$ '
583583 >>> io.close()
584584
585585
@@ -616,12 +616,12 @@ def debug(args, gdbscript=None, gdb_args=None, exe=None, ssh=None, env=None, por
616616
617617 >>> io.gdb.continue_nowait()
618618 >>> io.recvline()
619- b'foo\n '
619+ b'foo'
620620 >>> io.close()
621621
622622 >>> ssh_io.gdb.continue_nowait()
623623 >>> ssh_io.recvline()
624- b'foo\n '
624+ b'foo'
625625 >>> ssh_io.close()
626626 >>> shell.close()
627627 """
@@ -983,7 +983,7 @@ def attach(target, gdbscript = '', exe = None, gdb_args = None, ssh = None, sysr
983983 ... quit
984984 ... ''')
985985 >>> io.recvline()
986- b'Hello from process debugger!\n '
986+ b'Hello from process debugger!'
987987 >>> io.sendline(b'echo Hello from bash && exit')
988988 >>> io.recvall()
989989 b'Hello from bash\n'
@@ -1007,7 +1007,7 @@ def attach(target, gdbscript = '', exe = None, gdb_args = None, ssh = None, sysr
10071007 Observe the forced line
10081008
10091009 >>> io.recvline()
1010- b'Hello from process debugger!\n '
1010+ b'Hello from process debugger!'
10111011
10121012 Interact with the program in a regular way
10131013
@@ -1031,7 +1031,7 @@ def attach(target, gdbscript = '', exe = None, gdb_args = None, ssh = None, sysr
10311031 ... quit
10321032 ... ''')
10331033 >>> io.recvline()
1034- b'Hello from remote debugger!\n '
1034+ b'Hello from remote debugger!'
10351035 >>> io.sendline(b'echo Hello from bash && exit')
10361036 >>> io.recvall()
10371037 b'Hello from bash\n'
@@ -1052,12 +1052,12 @@ def attach(target, gdbscript = '', exe = None, gdb_args = None, ssh = None, sysr
10521052 ... end
10531053 ... ''')
10541054 >>> gdbserver.recvline(timeout=10) # doctest: +ELLIPSIS
1055- b'Remote debugging from host 127.0.0.1, ...\n '
1055+ b'Remote debugging from host 127.0.0.1, ...'
10561056 >>> gdbserver.recvline(timeout=10)
1057- b'Hello from gdbserver debugger!\n '
1057+ b'Hello from gdbserver debugger!'
10581058 >>> gdbserver.sendline(b'echo Hello from bash && exit')
10591059 >>> gdbserver.recvline(timeout=10)
1060- b'Hello from bash\n '
1060+ b'Hello from bash'
10611061 >>> gdbserver.close()
10621062
10631063 Attach to processes running on a remote machine via an SSH :class:`.ssh` process
@@ -1071,10 +1071,10 @@ def attach(target, gdbscript = '', exe = None, gdb_args = None, ssh = None, sysr
10711071 ... quit
10721072 ... ''')
10731073 >>> io.recvline(timeout=5) # doctest: +SKIP
1074- b'Hello from ssh debugger!\n '
1074+ b'Hello from ssh debugger!'
10751075 >>> io.sendline(b'This will be echoed back')
10761076 >>> io.recvline()
1077- b'This will be echoed back\n '
1077+ b'This will be echoed back'
10781078 >>> io.close()
10791079
10801080 To attach to remote gdbserver, assume you have a socat server delivering gdbserver
@@ -1095,7 +1095,7 @@ def attach(target, gdbscript = '', exe = None, gdb_args = None, ssh = None, sysr
10951095 ... io.recvline()
10961096 ... io.close()
10971097 ... server.close()
1098- b'Hello\n '
1098+ b'Hello'
10991099 """
11001100 if context .noptrace :
11011101 log .warn_once ("Skipping debug attach since context.noptrace==True" )
0 commit comments