Summary: Moves lldbsuite tests to lldb/test/API.
This is a largely mechanical change, moved with the following steps:
```
rm lldb/test/API/testcases
mkdir -p lldb/test/API/{test_runner/test,tools/lldb-{server,vscode}}
mv lldb/packages/Python/lldbsuite/test/test_runner/test lldb/test/API/test_runner
for d in $(find lldb/packages/Python/lldbsuite/test/* -maxdepth 0 -type d | egrep -v "make|plugins|test_runner|tools"); do mv $d lldb/test/API; done
for d in $(find lldb/packages/Python/lldbsuite/test/tools/lldb-vscode -maxdepth 1 -mindepth 1 | grep -v ".py"); do mv $d lldb/test/API/tools/lldb-vscode; done
for d in $(find lldb/packages/Python/lldbsuite/test/tools/lldb-server -maxdepth 1 -mindepth 1 | egrep -v "gdbremote_testcase.py|lldbgdbserverutils.py|socket_packet_pump.py"); do mv $d lldb/test/API/tools/lldb-server; done
```
lldb/packages/Python/lldbsuite/__init__.py and lldb/test/API/lit.cfg.py were also updated with the new directory structure.
Reviewers: labath, JDevlieghere
Tags: #lldb
Differential Revision: https://reviews.llvm.org/D71151
64 lines
2.3 KiB
Python
64 lines
2.3 KiB
Python
"""
|
|
Test SBTarget APIs.
|
|
"""
|
|
|
|
|
|
|
|
import unittest2
|
|
import lldb
|
|
from lldbsuite.test.decorators import *
|
|
from lldbsuite.test.lldbtest import *
|
|
from lldbsuite.test import lldbutil
|
|
|
|
|
|
class TestNameLookup(TestBase):
|
|
|
|
mydir = TestBase.compute_mydir(__file__)
|
|
|
|
@add_test_categories(['pyapi'])
|
|
@expectedFailureAll(oslist=["windows"], bugnumber='llvm.org/pr21765')
|
|
def test_target(self):
|
|
"""Exercise SBTarget.FindFunctions() with various name masks.
|
|
|
|
A previous regression caused mangled names to not be able to be looked up.
|
|
This test verifies that using a mangled name with eFunctionNameTypeFull works
|
|
and that using a function basename with eFunctionNameTypeFull works for all
|
|
C++ functions that are at the global namespace level."""
|
|
self.build();
|
|
exe = self.getBuildArtifact("a.out")
|
|
|
|
# Create a target by the debugger.
|
|
target = self.dbg.CreateTarget(exe)
|
|
self.assertTrue(target, VALID_TARGET)
|
|
|
|
exe_module = target.FindModule(target.GetExecutable())
|
|
|
|
c_name_to_symbol = {}
|
|
cpp_name_to_symbol = {}
|
|
mangled_to_symbol = {}
|
|
num_symbols = exe_module.GetNumSymbols();
|
|
for i in range(num_symbols):
|
|
symbol = exe_module.GetSymbolAtIndex(i);
|
|
name = symbol.GetName()
|
|
if name and 'unique_function_name' in name and '__PRETTY_FUNCTION__' not in name:
|
|
mangled = symbol.GetMangledName()
|
|
if mangled:
|
|
mangled_to_symbol[mangled] = symbol
|
|
if name:
|
|
cpp_name_to_symbol[name] = symbol
|
|
elif name:
|
|
c_name_to_symbol[name] = symbol
|
|
|
|
# Make sure each mangled name turns up exactly one match when looking up
|
|
# functions by full name and using the mangled name as the name in the
|
|
# lookup
|
|
self.assertGreaterEqual(len(mangled_to_symbol), 6)
|
|
for mangled in mangled_to_symbol.keys():
|
|
symbol_contexts = target.FindFunctions(mangled, lldb.eFunctionNameTypeFull)
|
|
self.assertTrue(symbol_contexts.GetSize() == 1)
|
|
for symbol_context in symbol_contexts:
|
|
self.assertTrue(symbol_context.GetFunction().IsValid())
|
|
self.assertTrue(symbol_context.GetSymbol().IsValid())
|
|
|
|
|