
This patch is the result of a discussion on lldb-dev, see http://lists.llvm.org/pipermail/lldb-dev/2018-January/013111.html for background. For each test (should be eventually: each test configuration) a separate build directory is created and we execute make VPATH=$srcdir/path/to/test -C $builddir/path/to/test -f $srcdir/path/to/test/Makefile -I $srcdir/path/to/test In order to make this work all LLDB tests need to be updated to find the executable in the test build directory, since CWD still points at the test's source directory, which is a requirement for unittest2. Although we have done extensive testing, I'm expecting that this first attempt will break a few bots. Please DO NOT HESITATE TO REVERT this patch in order to get the bots green again. We will likely have to iterate on this some more. Differential Revision: https://reviews.llvm.org/D42281 llvm-svn: 323803
95 lines
2.9 KiB
Python
95 lines
2.9 KiB
Python
"""
|
|
Test process attach/resume.
|
|
"""
|
|
|
|
from __future__ import print_function
|
|
|
|
|
|
import os
|
|
import time
|
|
import lldb
|
|
from lldbsuite.test.decorators import *
|
|
from lldbsuite.test.lldbtest import *
|
|
from lldbsuite.test import lldbutil
|
|
|
|
exe_name = "AttachResume" # Must match Makefile
|
|
|
|
|
|
class AttachResumeTestCase(TestBase):
|
|
|
|
mydir = TestBase.compute_mydir(__file__)
|
|
|
|
@skipIfRemote
|
|
@expectedFailureAll(oslist=['freebsd'], bugnumber='llvm.org/pr19310')
|
|
@expectedFailureAll(oslist=["windows"], bugnumber="llvm.org/pr24778")
|
|
def test_attach_continue_interrupt_detach(self):
|
|
"""Test attach/continue/interrupt/detach"""
|
|
self.build()
|
|
self.process_attach_continue_interrupt_detach()
|
|
|
|
def process_attach_continue_interrupt_detach(self):
|
|
"""Test attach/continue/interrupt/detach"""
|
|
|
|
exe = self.getBuildArtifact(exe_name)
|
|
|
|
popen = self.spawnSubprocess(exe)
|
|
self.addTearDownHook(self.cleanupSubprocesses)
|
|
|
|
self.runCmd("process attach -p " + str(popen.pid))
|
|
|
|
self.setAsync(True)
|
|
listener = self.dbg.GetListener()
|
|
process = self.dbg.GetSelectedTarget().GetProcess()
|
|
|
|
self.runCmd("c")
|
|
lldbutil.expect_state_changes(
|
|
self, listener, process, [
|
|
lldb.eStateRunning])
|
|
|
|
self.runCmd("process interrupt")
|
|
lldbutil.expect_state_changes(
|
|
self, listener, process, [
|
|
lldb.eStateStopped])
|
|
|
|
# be sure to continue/interrupt/continue (r204504)
|
|
self.runCmd("c")
|
|
lldbutil.expect_state_changes(
|
|
self, listener, process, [
|
|
lldb.eStateRunning])
|
|
|
|
self.runCmd("process interrupt")
|
|
lldbutil.expect_state_changes(
|
|
self, listener, process, [
|
|
lldb.eStateStopped])
|
|
|
|
# Second interrupt should have no effect.
|
|
self.expect(
|
|
"process interrupt",
|
|
patterns=["Process is not running"],
|
|
error=True)
|
|
|
|
# check that this breakpoint is auto-cleared on detach (r204752)
|
|
self.runCmd("br set -f main.cpp -l %u" %
|
|
(line_number('main.cpp', '// Set breakpoint here')))
|
|
|
|
self.runCmd("c")
|
|
lldbutil.expect_state_changes(
|
|
self, listener, process, [
|
|
lldb.eStateRunning, lldb.eStateStopped])
|
|
self.expect('br list', 'Breakpoint not hit',
|
|
substrs=['hit count = 1'])
|
|
|
|
# Make sure the breakpoint is not hit again.
|
|
self.expect("expr debugger_flag = false", substrs=[" = false"])
|
|
|
|
self.runCmd("c")
|
|
lldbutil.expect_state_changes(
|
|
self, listener, process, [
|
|
lldb.eStateRunning])
|
|
|
|
# make sure to detach while in running state (r204759)
|
|
self.runCmd("detach")
|
|
lldbutil.expect_state_changes(
|
|
self, listener, process, [
|
|
lldb.eStateDetached])
|