From 6e55cd5e29130670545b448fe6ac485ac6a11153 Mon Sep 17 00:00:00 2001 From: Johnny Chen Date: Thu, 15 Dec 2011 23:30:05 +0000 Subject: [PATCH] Add test scenario for newly added SBProcess APIs: ReadCStringFromMemory() and ReadUnsignedFromMemory(). llvm-svn: 146704 --- .../test/python_api/process/TestProcessAPI.py | 45 +++++++++++++++++++ lldb/test/python_api/process/main.cpp | 3 ++ 2 files changed, 48 insertions(+) diff --git a/lldb/test/python_api/process/TestProcessAPI.py b/lldb/test/python_api/process/TestProcessAPI.py index 2d68d85030eb..c720d73b616c 100644 --- a/lldb/test/python_api/process/TestProcessAPI.py +++ b/lldb/test/python_api/process/TestProcessAPI.py @@ -105,6 +105,51 @@ class ProcessAPITestCase(TestBase): exe=False, startstr = 'x') + # Get the SBValue for the global variable 'my_cstring'. + val = frame.FindValue("my_cstring", lldb.eValueTypeVariableGlobal) + self.DebugSBValue(val) + + # If the variable does not have a load address, there's no sense continuing. + if not val.GetLocation().startswith("0x"): + return + + # OK, let's get the hex location of the variable. + location = int(val.GetLocation(), 16) + + # Due to the typemap magic (see lldb.swig), we pass in 256 to read at most 256 bytes + # from the address, and expect to get a Python string as the result object! + cstring = process.ReadCStringFromMemory(location, 256, error) + if not error.Success(): + self.fail("SBProcess.ReadCStringFromMemory() failed") + if self.TraceOn(): + print "cstring read is:", cstring + + self.expect(cstring, "Result from SBProcess.ReadCStringFromMemory() matches our expected output", + exe=False, + startstr = 'lldb.SBProcess.ReadCStringFromMemory() works!') + + # Get the SBValue for the global variable 'my_uint32'. + val = frame.FindValue("my_uint32", lldb.eValueTypeVariableGlobal) + self.DebugSBValue(val) + + # If the variable does not have a load address, there's no sense continuing. + if not val.GetLocation().startswith("0x"): + return + + # OK, let's get the hex location of the variable. + location = int(val.GetLocation(), 16) + + # Due to the typemap magic (see lldb.swig), we pass in 4 to read at 4 bytes + # from the address, and expect to get an int as the result! + my_uint32 = process.ReadUnsignedFromMemory(location, 4, error) + if not error.Success(): + self.fail("SBProcess.ReadCStringFromMemory() failed") + if self.TraceOn(): + print "uint32 read is:", my_uint32 + + if my_uint32 != 12345: + self.fail("Result from SBProcess.ReadUnsignedFromMemory() does not match our expected output") + def write_memory(self): """Test Python SBProcess.WriteMemory() API.""" exe = os.path.join(os.getcwd(), "a.out") diff --git a/lldb/test/python_api/process/main.cpp b/lldb/test/python_api/process/main.cpp index 4d5b5e6d7e9c..57da5748ddaa 100644 --- a/lldb/test/python_api/process/main.cpp +++ b/lldb/test/python_api/process/main.cpp @@ -7,10 +7,13 @@ // //===----------------------------------------------------------------------===// #include +#include // This simple program is to test the lldb Python API related to process. char my_char = 'u'; +char my_cstring[] = "lldb.SBProcess.ReadCStringFromMemory() works!"; +uint32_t my_uint32 = 12345; int my_int = 0; int main (int argc, char const *argv[])