[lldb] Verify target stop-hooks support with scripted process (#91107)
This patch makes sure that scripted process are compatible with target stop-hooks. This wasn't tested in the past, but it turned out to be working out of the box. rdar://124396534 Signed-off-by: Med Ismail Bennani <ismail@bennani.ma>
This commit is contained in:
committed by
GitHub
parent
7c1b289830
commit
b3a835e129
@@ -187,6 +187,10 @@ class ScriptedProcesTestCase(TestBase):
|
||||
+ os.path.join(self.getSourceDir(), scripted_process_example_relpath)
|
||||
)
|
||||
|
||||
self.runCmd(
|
||||
"target stop-hook add -k first -v 1 -k second -v 2 -P dummy_scripted_process.DummyStopHook"
|
||||
)
|
||||
|
||||
launch_info = lldb.SBLaunchInfo(None)
|
||||
launch_info.SetProcessPluginName("ScriptedProcess")
|
||||
launch_info.SetScriptedProcessClassName(
|
||||
@@ -207,6 +211,9 @@ class ScriptedProcesTestCase(TestBase):
|
||||
self.assertTrue(hasattr(py_impl, "my_super_secret_member"))
|
||||
self.assertEqual(py_impl.my_super_secret_method(), 42)
|
||||
|
||||
self.assertTrue(hasattr(py_impl, "handled_stop"))
|
||||
self.assertTrue(py_impl.handled_stop)
|
||||
|
||||
# Try reading from target #0 process ...
|
||||
addr = 0x500000000
|
||||
message = "Hello, target 0"
|
||||
|
||||
Reference in New Issue
Block a user