diff options
| author | Johnny Chen <johnny.chen@apple.com> | 2011-06-26 20:59:36 +0000 |
|---|---|---|
| committer | Johnny Chen <johnny.chen@apple.com> | 2011-06-26 20:59:36 +0000 |
| commit | a9dd83be4b7ede10ea0aa0b87f3c83cc387d991a (patch) | |
| tree | 0c4b7553cb77d3f2db95a74ab316e70c0937d739 /lldb/test/python_api/hello_world/TestHelloWorld.py | |
| parent | 4ad8edd10fe9a37e0983680225a5a3d9ffd10f11 (diff) | |
| download | bcm5719-llvm-a9dd83be4b7ede10ea0aa0b87f3c83cc387d991a.tar.gz bcm5719-llvm-a9dd83be4b7ede10ea0aa0b87f3c83cc387d991a.zip | |
Move hello_world to now reside under python_api dir.
llvm-svn: 133890
Diffstat (limited to 'lldb/test/python_api/hello_world/TestHelloWorld.py')
| -rw-r--r-- | lldb/test/python_api/hello_world/TestHelloWorld.py | 178 |
1 files changed, 178 insertions, 0 deletions
diff --git a/lldb/test/python_api/hello_world/TestHelloWorld.py b/lldb/test/python_api/hello_world/TestHelloWorld.py new file mode 100644 index 00000000000..79e3248ed6d --- /dev/null +++ b/lldb/test/python_api/hello_world/TestHelloWorld.py @@ -0,0 +1,178 @@ +"""Test Python APIs for target (launch and attach), breakpoint, and process.""" + +import os, sys, time +import unittest2 +import lldb +from lldbtest import * + +class HelloWorldTestCase(TestBase): + + mydir = os.path.join("python_api", "hello_world") + + @unittest2.skipUnless(sys.platform.startswith("darwin"), "requires Darwin") + @python_api_test + def test_with_dsym_and_process_launch_api(self): + """Create target, breakpoint, launch a process, and then kill it. + + Use dsym info and process launch API. + """ + self.buildDsym() + self.hello_world_python() + + @python_api_test + def test_with_dwarf_and_process_launch_api(self): + """Create target, breakpoint, launch a process, and then kill it. + + Use dwarf debug map and process launch API. + """ + self.buildDwarf() + self.hello_world_python() + + @unittest2.skipUnless(sys.platform.startswith("darwin"), "requires Darwin") + @python_api_test + def test_with_dsym_and_attach_to_process_with_id_api(self): + """Create target, spawn a process, and attach to it with process id. + + Use dsym info and attach to process with id API. + """ + self.buildDsym() + self.hello_world_attach_with_id_api() + + @python_api_test + def test_with_dwarf_and_attach_to_process_with_id_api(self): + """Create target, spawn a process, and attach to it with process id. + + Use dwarf map (no dsym) and attach to process with id API. + """ + self.buildDwarf() + self.hello_world_attach_with_id_api() + + @unittest2.skipUnless(sys.platform.startswith("darwin"), "requires Darwin") + @python_api_test + def test_with_dsym_and_attach_to_process_with_name_api(self): + """Create target, spawn a process, and attach to it with process name. + + Use dsym info and attach to process with name API. + """ + self.buildDsym() + self.hello_world_attach_with_name_api() + + @python_api_test + def test_with_dwarf_and_attach_to_process_with_name_api(self): + """Create target, spawn a process, and attach to it with process name. + + Use dwarf map (no dsym) and attach to process with name API. + """ + self.buildDwarf() + self.hello_world_attach_with_name_api() + + def setUp(self): + # Call super's setUp(). + TestBase.setUp(self) + # Get the full path to our executable to be debugged. + self.exe = os.path.join(os.getcwd(), "hello_world") + # Find a couple of the line numbers within main.c. + self.line1 = line_number('main.c', '// Set break point at this line.') + self.line2 = line_number('main.c', '// Waiting to be attached...') + + def hello_world_python(self): + """Create target, breakpoint, launch a process, and then kill it.""" + + target = self.dbg.CreateTarget(self.exe) + + breakpoint = target.BreakpointCreateByLocation("main.c", self.line1) + + # The default state after breakpoint creation should be enabled. + self.assertTrue(breakpoint.IsEnabled(), + "Breakpoint should be enabled after creation") + + breakpoint.SetEnabled(False) + self.assertTrue(not breakpoint.IsEnabled(), + "Breakpoint.SetEnabled(False) works") + + breakpoint.SetEnabled(True) + self.assertTrue(breakpoint.IsEnabled(), + "Breakpoint.SetEnabled(True) works") + + # rdar://problem/8364687 + # SBTarget.Launch() issue (or is there some race condition)? + + process = target.LaunchSimple(None, None, os.getcwd()) + # The following isn't needed anymore, rdar://8364687 is fixed. + # + # Apply some dances after LaunchProcess() in order to break at "main". + # It only works sometimes. + #self.breakAfterLaunch(process, "main") + + process = target.GetProcess() + self.assertTrue(process, PROCESS_IS_VALID) + + thread = process.GetThreadAtIndex(0) + if thread.GetStopReason() != lldb.eStopReasonBreakpoint: + from lldbutil import stop_reason_to_str + self.fail(STOPPED_DUE_TO_BREAKPOINT_WITH_STOP_REASON_AS % + stop_reason_to_str(thread.GetStopReason())) + + # The breakpoint should have a hit count of 1. + self.assertTrue(breakpoint.GetHitCount() == 1, BREAKPOINT_HIT_ONCE) + + def hello_world_attach_with_id_api(self): + """Create target, spawn a process, and attach to it by id.""" + + target = self.dbg.CreateTarget(self.exe) + + # Spawn a new process and don't display the stdout if not in TraceOn() mode. + import subprocess + popen = subprocess.Popen([self.exe, "abc", "xyz"], + stdout = open(os.devnull, 'w') if not self.TraceOn() else None) + #print "pid of spawned process: %d" % popen.pid + + listener = lldb.SBListener("my.attach.listener") + error = lldb.SBError() + process = target.AttachToProcessWithID(listener, popen.pid, error) + + self.assertTrue(error.Success() and process, PROCESS_IS_VALID) + + # Let's check the stack traces of the attached process. + import lldbutil + stacktraces = lldbutil.print_stacktraces(process, string_buffer=True) + self.expect(stacktraces, exe=False, + substrs = ['main.c:%d' % self.line2, + '(int)argc=3']) + + def hello_world_attach_with_name_api(self): + """Create target, spawn a process, and attach to it by name.""" + + target = self.dbg.CreateTarget(self.exe) + + # Spawn a new process and don't display the stdout if not in TraceOn() mode. + import subprocess + popen = subprocess.Popen([self.exe, "abc", "xyz"], + stdout = open(os.devnull, 'w') if not self.TraceOn() else None) + #print "pid of spawned process: %d" % popen.pid + + listener = lldb.SBListener("my.attach.listener") + error = lldb.SBError() + # Pass 'False' since we don't want to wait for new instance of "hello_world" to be launched. + name = os.path.basename(self.exe) + process = target.AttachToProcessWithName(listener, name, False, error) + + self.assertTrue(error.Success() and process, PROCESS_IS_VALID) + + # Verify that after attach, our selected target indeed matches name. + self.expect(self.dbg.GetSelectedTarget().GetExecutable().GetFilename(), exe=False, + startstr = name) + + # Let's check the stack traces of the attached process. + import lldbutil + stacktraces = lldbutil.print_stacktraces(process, string_buffer=True) + self.expect(stacktraces, exe=False, + substrs = ['main.c:%d' % self.line2, + '(int)argc=3']) + + +if __name__ == '__main__': + import atexit + lldb.SBDebugger.Initialize() + atexit.register(lambda: lldb.SBDebugger.Terminate()) + unittest2.main() |

