
This module was originally intended to be imported by top-level scripts to be able to find the LLDB packages and third party libraries. Packages themselves shouldn't need to import it, because by the time it gets into the package, the top-level script should have already done this. Indeed, it was just adding the same values to sys.path multiple times, so this patch is essentially no functional change. To make sure it doesn't get re-introduced, we also delete the `use_lldb_suite` module from `lldbsuite/test`, although the original copy still remains in `lldb/test` llvm-svn: 251963
82 lines
2.7 KiB
Python
82 lines
2.7 KiB
Python
"""
|
|
Test that we can backtrace correctly with 'sigtramp' functions on the stack
|
|
"""
|
|
|
|
from __future__ import print_function
|
|
|
|
|
|
|
|
import os, time
|
|
import lldb
|
|
from lldbsuite.test.lldbtest import *
|
|
import lldbsuite.test.lldbutil as lldbutil
|
|
|
|
class SigtrampUnwind(TestBase):
|
|
mydir = TestBase.compute_mydir(__file__)
|
|
|
|
# On different platforms the "_sigtramp" and "__kill" frames are likely to be different.
|
|
# This test could probably be adapted to run on linux/*bsd easily enough.
|
|
@skipUnlessDarwin
|
|
def test (self):
|
|
"""Test that we can backtrace correctly with _sigtramp on the stack"""
|
|
self.build()
|
|
self.setTearDownCleanup()
|
|
|
|
exe = os.path.join(os.getcwd(), "a.out")
|
|
target = self.dbg.CreateTarget(exe)
|
|
self.assertTrue(target, VALID_TARGET)
|
|
|
|
|
|
lldbutil.run_break_set_by_file_and_line (self, "main.c", line_number('main.c', '// Set breakpoint here'), num_expected_locations=1)
|
|
|
|
process = target.LaunchSimple (None, None, self.get_process_working_directory())
|
|
|
|
if not process:
|
|
self.fail("SBTarget.Launch() failed")
|
|
|
|
if process.GetState() != lldb.eStateStopped:
|
|
self.fail("Process should be in the 'stopped' state, "
|
|
"instead the actual state is: '%s'" %
|
|
lldbutil.state_type_to_str(process.GetState()))
|
|
|
|
self.expect("pro handle -n false -p true -s false SIGUSR1", "Have lldb pass SIGUSR1 signals",
|
|
substrs = ["SIGUSR1", "true", "false", "false"])
|
|
|
|
lldbutil.run_break_set_by_symbol (self, "handler", num_expected_locations=1, module_name="a.out")
|
|
|
|
self.runCmd("continue")
|
|
|
|
thread = process.GetThreadAtIndex(0)
|
|
|
|
found_handler = False
|
|
found_sigtramp = False
|
|
found_kill = False
|
|
found_main = False
|
|
|
|
for f in thread.frames:
|
|
if f.GetFunctionName() == "handler":
|
|
found_handler = True
|
|
if f.GetFunctionName() == "_sigtramp":
|
|
found_sigtramp = True
|
|
if f.GetFunctionName() == "__kill":
|
|
found_kill = True
|
|
if f.GetFunctionName() == "main":
|
|
found_main = True
|
|
|
|
if self.TraceOn():
|
|
print("Backtrace once we're stopped:")
|
|
for f in thread.frames:
|
|
print(" %d %s" % (f.GetFrameID(), f.GetFunctionName()))
|
|
|
|
if found_handler == False:
|
|
self.fail("Unable to find handler() in backtrace.")
|
|
|
|
if found_sigtramp == False:
|
|
self.fail("Unable to find _sigtramp() in backtrace.")
|
|
|
|
if found_kill == False:
|
|
self.fail("Unable to find kill() in backtrace.")
|
|
|
|
if found_main == False:
|
|
self.fail("Unable to find main() in backtrace.")
|