| """Test Python APIs for target (launch and attach), breakpoint, and process.""" |
| |
| import os, sys, time |
| import unittest2 |
| import lldb |
| import time |
| from lldbtest import * |
| |
| class HelloWorldTestCase(TestBase): |
| |
| mydir = TestBase.compute_mydir(__file__) |
| |
| @unittest2.skipUnless(sys.platform.startswith("darwin"), "requires Darwin") |
| @python_api_test |
| @dsym_test |
| def test_with_dsym_and_process_launch_api(self): |
| """Create target, breakpoint, launch a process, and then kill it. |
| |
| Use dsym info and process launch API. |
| """ |
| self.buildDsym(dictionary=self.d) |
| self.setTearDownCleanup(dictionary=self.d) |
| self.hello_world_python() |
| |
| @python_api_test |
| @dwarf_test |
| def test_with_dwarf_and_process_launch_api(self): |
| """Create target, breakpoint, launch a process, and then kill it. |
| |
| Use dwarf debug map and process launch API. |
| """ |
| self.buildDwarf(dictionary=self.d) |
| self.setTearDownCleanup(dictionary=self.d) |
| self.hello_world_python() |
| |
| @not_remote_testsuite_ready |
| @unittest2.skipUnless(sys.platform.startswith("darwin"), "requires Darwin") |
| @python_api_test |
| @dsym_test |
| def test_with_dsym_and_attach_to_process_with_id_api(self): |
| """Create target, spawn a process, and attach to it with process id. |
| |
| Use dsym info and attach to process with id API. |
| """ |
| self.buildDsym(dictionary=self.d) |
| self.setTearDownCleanup(dictionary=self.d) |
| self.hello_world_attach_with_id_api() |
| |
| @not_remote_testsuite_ready |
| @python_api_test |
| @dwarf_test |
| @expectedFailurei386 # llvm.org/pr17384: lldb needs to be aware of linux-vdso.so to unwind stacks properly |
| def test_with_dwarf_and_attach_to_process_with_id_api(self): |
| """Create target, spawn a process, and attach to it with process id. |
| |
| Use dwarf map (no dsym) and attach to process with id API. |
| """ |
| self.buildDwarf(dictionary=self.d) |
| self.setTearDownCleanup(dictionary=self.d) |
| self.hello_world_attach_with_id_api() |
| |
| @not_remote_testsuite_ready |
| @unittest2.skipUnless(sys.platform.startswith("darwin"), "requires Darwin") |
| @python_api_test |
| @dsym_test |
| def test_with_dsym_and_attach_to_process_with_name_api(self): |
| """Create target, spawn a process, and attach to it with process name. |
| |
| Use dsym info and attach to process with name API. |
| """ |
| self.buildDsym(dictionary=self.d) |
| self.setTearDownCleanup(dictionary=self.d) |
| self.hello_world_attach_with_name_api() |
| |
| @not_remote_testsuite_ready |
| @python_api_test |
| @dwarf_test |
| @expectedFailurei386 # llvm.org/pr17384: lldb needs to be aware of linux-vdso.so to unwind stacks properly |
| def test_with_dwarf_and_attach_to_process_with_name_api(self): |
| """Create target, spawn a process, and attach to it with process name. |
| |
| Use dwarf map (no dsym) and attach to process with name API. |
| """ |
| self.buildDwarf(dictionary=self.d) |
| self.setTearDownCleanup(dictionary=self.d) |
| self.hello_world_attach_with_name_api() |
| |
| def setUp(self): |
| # Call super's setUp(). |
| TestBase.setUp(self) |
| # Get the full path to our executable to be attached/debugged. |
| self.exe = os.path.join(os.getcwd(), self.testMethodName) |
| self.d = {'EXE': self.testMethodName} |
| # Find a couple of the line numbers within main.c. |
| self.line1 = line_number('main.c', '// Set break point at this line.') |
| self.line2 = line_number('main.c', '// Waiting to be attached...') |
| |
| def hello_world_python(self): |
| """Create target, breakpoint, launch a process, and then kill it.""" |
| |
| target = self.dbg.CreateTarget(self.exe) |
| |
| breakpoint = target.BreakpointCreateByLocation("main.c", self.line1) |
| |
| # The default state after breakpoint creation should be enabled. |
| self.assertTrue(breakpoint.IsEnabled(), |
| "Breakpoint should be enabled after creation") |
| |
| breakpoint.SetEnabled(False) |
| self.assertTrue(not breakpoint.IsEnabled(), |
| "Breakpoint.SetEnabled(False) works") |
| |
| breakpoint.SetEnabled(True) |
| self.assertTrue(breakpoint.IsEnabled(), |
| "Breakpoint.SetEnabled(True) works") |
| |
| # rdar://problem/8364687 |
| # SBTarget.Launch() issue (or is there some race condition)? |
| |
| process = target.LaunchSimple (None, None, self.get_process_working_directory()) |
| # The following isn't needed anymore, rdar://8364687 is fixed. |
| # |
| # Apply some dances after LaunchProcess() in order to break at "main". |
| # It only works sometimes. |
| #self.breakAfterLaunch(process, "main") |
| |
| process = target.GetProcess() |
| self.assertTrue(process, PROCESS_IS_VALID) |
| |
| thread = process.GetThreadAtIndex(0) |
| if thread.GetStopReason() != lldb.eStopReasonBreakpoint: |
| from lldbutil import stop_reason_to_str |
| self.fail(STOPPED_DUE_TO_BREAKPOINT_WITH_STOP_REASON_AS % |
| stop_reason_to_str(thread.GetStopReason())) |
| |
| # The breakpoint should have a hit count of 1. |
| self.assertTrue(breakpoint.GetHitCount() == 1, BREAKPOINT_HIT_ONCE) |
| |
| def hello_world_attach_with_id_api(self): |
| """Create target, spawn a process, and attach to it by id.""" |
| |
| target = self.dbg.CreateTarget(self.exe) |
| |
| # Spawn a new process |
| popen = self.spawnSubprocess(self.exe, ["abc", "xyz"]) |
| self.addTearDownHook(self.cleanupSubprocesses) |
| |
| # Give the subprocess time to start and wait for user input |
| time.sleep(0.25) |
| |
| listener = lldb.SBListener("my.attach.listener") |
| error = lldb.SBError() |
| process = target.AttachToProcessWithID(listener, popen.pid, error) |
| |
| self.assertTrue(error.Success() and process, PROCESS_IS_VALID) |
| |
| # Let's check the stack traces of the attached process. |
| import lldbutil |
| stacktraces = lldbutil.print_stacktraces(process, string_buffer=True) |
| self.expect(stacktraces, exe=False, |
| substrs = ['main.c:%d' % self.line2, |
| '(int)argc=3']) |
| |
| def hello_world_attach_with_name_api(self): |
| """Create target, spawn a process, and attach to it by name.""" |
| |
| target = self.dbg.CreateTarget(self.exe) |
| |
| # Spawn a new process |
| popen = self.spawnSubprocess(self.exe, ["abc", "xyz"]) |
| self.addTearDownHook(self.cleanupSubprocesses) |
| |
| # Give the subprocess time to start and wait for user input |
| time.sleep(0.25) |
| |
| listener = lldb.SBListener("my.attach.listener") |
| error = lldb.SBError() |
| # Pass 'False' since we don't want to wait for new instance of "hello_world" to be launched. |
| name = os.path.basename(self.exe) |
| |
| # While we're at it, make sure that passing a None as the process name |
| # does not hang LLDB. |
| target.AttachToProcessWithName(listener, None, False, error) |
| # Also boundary condition test ConnectRemote(), too. |
| target.ConnectRemote(listener, None, None, error) |
| |
| process = target.AttachToProcessWithName(listener, name, False, error) |
| |
| self.assertTrue(error.Success() and process, PROCESS_IS_VALID) |
| |
| # Verify that after attach, our selected target indeed matches name. |
| self.expect(self.dbg.GetSelectedTarget().GetExecutable().GetFilename(), exe=False, |
| startstr = name) |
| |
| # Let's check the stack traces of the attached process. |
| import lldbutil |
| stacktraces = lldbutil.print_stacktraces(process, string_buffer=True) |
| self.expect(stacktraces, exe=False, |
| substrs = ['main.c:%d' % self.line2, |
| '(int)argc=3']) |
| |
| |
| if __name__ == '__main__': |
| import atexit |
| lldb.SBDebugger.Initialize() |
| atexit.register(lambda: lldb.SBDebugger.Terminate()) |
| unittest2.main() |