aboutsummaryrefslogtreecommitdiff
path: root/gdb/testsuite/gdb.python/py-bp-locations.exp
blob: 4892947ca55abc933f377568820a8832afa0e96a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
# Copyright (C) 2022-2024 Free Software Foundation, Inc.

# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

load_lib gdb-python.exp

require allow_python_tests

standard_testfile

if {[gdb_compile "${srcdir}/${subdir}/${srcfile}" "${binfile}" executable {c++ debug}] != "" } {
    return -1
}

save_vars { GDBFLAGS } {
    clean_restart $testfile
}

if ![runto_main] {
    return -1
}

# Build a regexp string that represents the __repr__ of a
# gdb.BreakpointLocation object.  Accepts arguments -enabled, -address,
# -source, -line, and -func.
proc build_bpl_regexp { args } {
    parse_args [list {enabled True} [list address "$::hex"] {source ".*"} \
		    [list line "$::decimal"] {func ""}]

    set pattern "<gdb.BreakpointLocation"

    if {$enabled} {
	set pattern "$pattern enabled"
    } else {
	set pattern "$pattern disabled"
    }

    set pattern "$pattern address=${address}(?: requested_address=$::hex)?"
    set pattern "$pattern source=${source}:${line}"
    if {$func ne ""} {
	set pattern "$pattern in ${func}"
    }
    set pattern "$pattern>"
    return $pattern
}

# Set breakpoint with 2 locations.
gdb_breakpoint "add"

set expected_line_a [gdb_get_line_number "a + b"]
set expected_line_b [gdb_get_line_number "c + d"]

# Test that the locations return correct source locations.
gdb_test "python print(gdb.breakpoints()\[1\].locations\[0\].source)" \
	 ".*('.*py-bp-locations.c', $expected_line_a).*"
gdb_test "python print(gdb.breakpoints()\[1\].locations\[1\].source)" \
	 ".*('.*py-bp-locations.c', $expected_line_b).*"
gdb_test "python print(gdb.breakpoints()\[1\].locations\[1\])" \
    [build_bpl_regexp -enabled True -source ".*py-bp-locations.c" \
	 -line "$expected_line_b" -func ".*"] \
    "check repr of enabled breakpoint location"

# Disable first location and make sure we don't hit it.
gdb_test "python gdb.breakpoints()\[1\].locations\[0\].enabled = False" ""
gdb_test "python print(gdb.breakpoints()\[1\].locations\[0\])" \
    [build_bpl_regexp -enabled False -source ".*py-bp-locations.c" \
	 -line "$expected_line_a" -func ".*"] \
    "check repr of disabled breakpoint location"
gdb_continue_to_breakpoint "" ".*25.*"

if ![runto_main] {
    return -1
}

gdb_breakpoint "add"
# Disable "add" owner breakpoint and verify all locations still are enabled.
gdb_test "python gdb.breakpoints()\[1\].enabled = False" "" "Disable add owner breakpoint."

gdb_test "python print(gdb.breakpoints()\[1\].locations\[0\].enabled)" "True" "First location still enabled"

gdb_test "python print(gdb.breakpoints()\[1\].locations\[1\].enabled)" "True" "Second location still enabled"

# Set breakpoint at end and make sure we run past the still enabled locations,
gdb_breakpoint 32
gdb_continue_to_breakpoint "end of main" ".*32.*"