summaryrefslogtreecommitdiffstats
path: root/lldb/test/python_api/hello_world/TestHelloWorld.py
diff options
context:
space:
mode:
authorJohnny Chen <johnny.chen@apple.com>2011-06-26 20:59:36 +0000
committerJohnny Chen <johnny.chen@apple.com>2011-06-26 20:59:36 +0000
commita9dd83be4b7ede10ea0aa0b87f3c83cc387d991a (patch)
tree0c4b7553cb77d3f2db95a74ab316e70c0937d739 /lldb/test/python_api/hello_world/TestHelloWorld.py
parent4ad8edd10fe9a37e0983680225a5a3d9ffd10f11 (diff)
downloadbcm5719-llvm-a9dd83be4b7ede10ea0aa0b87f3c83cc387d991a.tar.gz
bcm5719-llvm-a9dd83be4b7ede10ea0aa0b87f3c83cc387d991a.zip
Move hello_world to now reside under python_api dir.
llvm-svn: 133890
Diffstat (limited to 'lldb/test/python_api/hello_world/TestHelloWorld.py')
-rw-r--r--lldb/test/python_api/hello_world/TestHelloWorld.py178
1 files changed, 178 insertions, 0 deletions
diff --git a/lldb/test/python_api/hello_world/TestHelloWorld.py b/lldb/test/python_api/hello_world/TestHelloWorld.py
new file mode 100644
index 00000000000..79e3248ed6d
--- /dev/null
+++ b/lldb/test/python_api/hello_world/TestHelloWorld.py
@@ -0,0 +1,178 @@
+"""Test Python APIs for target (launch and attach), breakpoint, and process."""
+
+import os, sys, time
+import unittest2
+import lldb
+from lldbtest import *
+
+class HelloWorldTestCase(TestBase):
+
+ mydir = os.path.join("python_api", "hello_world")
+
+ @unittest2.skipUnless(sys.platform.startswith("darwin"), "requires Darwin")
+ @python_api_test
+ def test_with_dsym_and_process_launch_api(self):
+ """Create target, breakpoint, launch a process, and then kill it.
+
+ Use dsym info and process launch API.
+ """
+ self.buildDsym()
+ self.hello_world_python()
+
+ @python_api_test
+ def test_with_dwarf_and_process_launch_api(self):
+ """Create target, breakpoint, launch a process, and then kill it.
+
+ Use dwarf debug map and process launch API.
+ """
+ self.buildDwarf()
+ self.hello_world_python()
+
+ @unittest2.skipUnless(sys.platform.startswith("darwin"), "requires Darwin")
+ @python_api_test
+ def test_with_dsym_and_attach_to_process_with_id_api(self):
+ """Create target, spawn a process, and attach to it with process id.
+
+ Use dsym info and attach to process with id API.
+ """
+ self.buildDsym()
+ self.hello_world_attach_with_id_api()
+
+ @python_api_test
+ def test_with_dwarf_and_attach_to_process_with_id_api(self):
+ """Create target, spawn a process, and attach to it with process id.
+
+ Use dwarf map (no dsym) and attach to process with id API.
+ """
+ self.buildDwarf()
+ self.hello_world_attach_with_id_api()
+
+ @unittest2.skipUnless(sys.platform.startswith("darwin"), "requires Darwin")
+ @python_api_test
+ def test_with_dsym_and_attach_to_process_with_name_api(self):
+ """Create target, spawn a process, and attach to it with process name.
+
+ Use dsym info and attach to process with name API.
+ """
+ self.buildDsym()
+ self.hello_world_attach_with_name_api()
+
+ @python_api_test
+ def test_with_dwarf_and_attach_to_process_with_name_api(self):
+ """Create target, spawn a process, and attach to it with process name.
+
+ Use dwarf map (no dsym) and attach to process with name API.
+ """
+ self.buildDwarf()
+ self.hello_world_attach_with_name_api()
+
+ def setUp(self):
+ # Call super's setUp().
+ TestBase.setUp(self)
+ # Get the full path to our executable to be debugged.
+ self.exe = os.path.join(os.getcwd(), "hello_world")
+ # Find a couple of the line numbers within main.c.
+ self.line1 = line_number('main.c', '// Set break point at this line.')
+ self.line2 = line_number('main.c', '// Waiting to be attached...')
+
+ def hello_world_python(self):
+ """Create target, breakpoint, launch a process, and then kill it."""
+
+ target = self.dbg.CreateTarget(self.exe)
+
+ breakpoint = target.BreakpointCreateByLocation("main.c", self.line1)
+
+ # The default state after breakpoint creation should be enabled.
+ self.assertTrue(breakpoint.IsEnabled(),
+ "Breakpoint should be enabled after creation")
+
+ breakpoint.SetEnabled(False)
+ self.assertTrue(not breakpoint.IsEnabled(),
+ "Breakpoint.SetEnabled(False) works")
+
+ breakpoint.SetEnabled(True)
+ self.assertTrue(breakpoint.IsEnabled(),
+ "Breakpoint.SetEnabled(True) works")
+
+ # rdar://problem/8364687
+ # SBTarget.Launch() issue (or is there some race condition)?
+
+ process = target.LaunchSimple(None, None, os.getcwd())
+ # The following isn't needed anymore, rdar://8364687 is fixed.
+ #
+ # Apply some dances after LaunchProcess() in order to break at "main".
+ # It only works sometimes.
+ #self.breakAfterLaunch(process, "main")
+
+ process = target.GetProcess()
+ self.assertTrue(process, PROCESS_IS_VALID)
+
+ thread = process.GetThreadAtIndex(0)
+ if thread.GetStopReason() != lldb.eStopReasonBreakpoint:
+ from lldbutil import stop_reason_to_str
+ self.fail(STOPPED_DUE_TO_BREAKPOINT_WITH_STOP_REASON_AS %
+ stop_reason_to_str(thread.GetStopReason()))
+
+ # The breakpoint should have a hit count of 1.
+ self.assertTrue(breakpoint.GetHitCount() == 1, BREAKPOINT_HIT_ONCE)
+
+ def hello_world_attach_with_id_api(self):
+ """Create target, spawn a process, and attach to it by id."""
+
+ target = self.dbg.CreateTarget(self.exe)
+
+ # Spawn a new process and don't display the stdout if not in TraceOn() mode.
+ import subprocess
+ popen = subprocess.Popen([self.exe, "abc", "xyz"],
+ stdout = open(os.devnull, 'w') if not self.TraceOn() else None)
+ #print "pid of spawned process: %d" % popen.pid
+
+ listener = lldb.SBListener("my.attach.listener")
+ error = lldb.SBError()
+ process = target.AttachToProcessWithID(listener, popen.pid, error)
+
+ self.assertTrue(error.Success() and process, PROCESS_IS_VALID)
+
+ # Let's check the stack traces of the attached process.
+ import lldbutil
+ stacktraces = lldbutil.print_stacktraces(process, string_buffer=True)
+ self.expect(stacktraces, exe=False,
+ substrs = ['main.c:%d' % self.line2,
+ '(int)argc=3'])
+
+ def hello_world_attach_with_name_api(self):
+ """Create target, spawn a process, and attach to it by name."""
+
+ target = self.dbg.CreateTarget(self.exe)
+
+ # Spawn a new process and don't display the stdout if not in TraceOn() mode.
+ import subprocess
+ popen = subprocess.Popen([self.exe, "abc", "xyz"],
+ stdout = open(os.devnull, 'w') if not self.TraceOn() else None)
+ #print "pid of spawned process: %d" % popen.pid
+
+ listener = lldb.SBListener("my.attach.listener")
+ error = lldb.SBError()
+ # Pass 'False' since we don't want to wait for new instance of "hello_world" to be launched.
+ name = os.path.basename(self.exe)
+ process = target.AttachToProcessWithName(listener, name, False, error)
+
+ self.assertTrue(error.Success() and process, PROCESS_IS_VALID)
+
+ # Verify that after attach, our selected target indeed matches name.
+ self.expect(self.dbg.GetSelectedTarget().GetExecutable().GetFilename(), exe=False,
+ startstr = name)
+
+ # Let's check the stack traces of the attached process.
+ import lldbutil
+ stacktraces = lldbutil.print_stacktraces(process, string_buffer=True)
+ self.expect(stacktraces, exe=False,
+ substrs = ['main.c:%d' % self.line2,
+ '(int)argc=3'])
+
+
+if __name__ == '__main__':
+ import atexit
+ lldb.SBDebugger.Initialize()
+ atexit.register(lambda: lldb.SBDebugger.Terminate())
+ unittest2.main()
OpenPOWER on IntegriCloud