199451b44SJordan Rupprecht"""
299451b44SJordan RupprechtTest that SBProcess.LoadImageUsingPaths works correctly.
399451b44SJordan Rupprecht"""
499451b44SJordan Rupprecht
599451b44SJordan Rupprecht
699451b44SJordan Rupprecht
799451b44SJordan Rupprechtimport os
899451b44SJordan Rupprechtimport lldb
999451b44SJordan Rupprechtfrom lldbsuite.test.decorators import *
1099451b44SJordan Rupprechtfrom lldbsuite.test.lldbtest import *
1199451b44SJordan Rupprechtfrom lldbsuite.test import lldbutil
1299451b44SJordan Rupprecht
1399451b44SJordan Rupprecht
1499451b44SJordan Rupprecht@skipIfWindows  # The Windows platform doesn't implement DoLoadImage.
1599451b44SJordan Rupprechtclass LoadUsingPathsTestCase(TestBase):
1699451b44SJordan Rupprecht
1799451b44SJordan Rupprecht    NO_DEBUG_INFO_TESTCASE = True
1899451b44SJordan Rupprecht
1999451b44SJordan Rupprecht    def setUp(self):
2099451b44SJordan Rupprecht        # Call super's setUp().
2199451b44SJordan Rupprecht        TestBase.setUp(self)
2299451b44SJordan Rupprecht        # Make the hidden directory in the build hierarchy:
2399451b44SJordan Rupprecht        lldbutil.mkdir_p(self.getBuildArtifact("hidden"))
2499451b44SJordan Rupprecht
2599451b44SJordan Rupprecht        # Invoke the default build rule.
2699451b44SJordan Rupprecht        self.build()
2799451b44SJordan Rupprecht
2899451b44SJordan Rupprecht        ext = 'so'
2999451b44SJordan Rupprecht        if self.platformIsDarwin():
3099451b44SJordan Rupprecht            ext = 'dylib'
3199451b44SJordan Rupprecht        self.lib_name = 'libloadunload.' + ext
3299451b44SJordan Rupprecht
3399451b44SJordan Rupprecht        self.wd = os.path.realpath(self.getBuildDir())
3499451b44SJordan Rupprecht        self.hidden_dir = os.path.join(self.wd, 'hidden')
3599451b44SJordan Rupprecht        self.hidden_lib = os.path.join(self.hidden_dir, self.lib_name)
3699451b44SJordan Rupprecht
3766ae40ebSRaphael Isemann    @skipIfRemote
3899451b44SJordan Rupprecht    @skipIfWindows  # Windows doesn't have dlopen and friends, dynamic libraries work differently
3999451b44SJordan Rupprecht    @expectedFlakeyNetBSD
406805a77eSMuhammad Omair Javaid    @expectedFailureAll(oslist=["linux"], archs=['arm'], bugnumber="llvm.org/pr45894")
4199451b44SJordan Rupprecht    def test_load_using_paths(self):
4299451b44SJordan Rupprecht        """Test that we can load a module by providing a set of search paths."""
4399451b44SJordan Rupprecht        if self.platformIsDarwin():
4499451b44SJordan Rupprecht            dylibName = 'libloadunload_d.dylib'
4599451b44SJordan Rupprecht        else:
4699451b44SJordan Rupprecht            dylibName = 'libloadunload_d.so'
4799451b44SJordan Rupprecht
4899451b44SJordan Rupprecht        # The directory with the dynamic library we did not link to.
4999451b44SJordan Rupprecht        path_dir = os.path.join(self.getBuildDir(), "hidden")
5099451b44SJordan Rupprecht
5199451b44SJordan Rupprecht        (target, process, thread,
5299451b44SJordan Rupprecht         _) = lldbutil.run_to_source_breakpoint(self,
5399451b44SJordan Rupprecht                                                "Break here to do the load using paths",
5499451b44SJordan Rupprecht                                                lldb.SBFileSpec("main.cpp"))
5599451b44SJordan Rupprecht        error = lldb.SBError()
5699451b44SJordan Rupprecht        lib_spec = lldb.SBFileSpec(self.lib_name)
5799451b44SJordan Rupprecht        paths = lldb.SBStringList()
5899451b44SJordan Rupprecht        paths.AppendString(self.wd)
5999451b44SJordan Rupprecht        paths.AppendString(os.path.join(self.wd, "no_such_dir"))
6099451b44SJordan Rupprecht
6199451b44SJordan Rupprecht        out_spec = lldb.SBFileSpec()
6299451b44SJordan Rupprecht
6399451b44SJordan Rupprecht        # First try with no correct directories on the path, and make sure that doesn't blow up:
6499451b44SJordan Rupprecht        token = process.LoadImageUsingPaths(lib_spec, paths, out_spec, error)
6599451b44SJordan Rupprecht        self.assertEqual(token, lldb.LLDB_INVALID_IMAGE_TOKEN, "Only looked on the provided path.")
66f7588597SJim Ingham        # Make sure we got some error back in this case.  Since we don't actually know what
67f7588597SJim Ingham        # the error will look like, let's look for the absence of "unknown reasons".
68f7588597SJim Ingham        error_str = error.description
69f7588597SJim Ingham        self.assertNotEqual(len(error_str), 0, "Got an empty error string")
70f7588597SJim Ingham        self.assertNotIn("unknown reasons", error_str, "Error string had unknown reasons")
7199451b44SJordan Rupprecht
7299451b44SJordan Rupprecht        # Now add the correct dir to the paths list and try again:
7399451b44SJordan Rupprecht        paths.AppendString(self.hidden_dir)
7499451b44SJordan Rupprecht        token = process.LoadImageUsingPaths(lib_spec, paths, out_spec, error)
7599451b44SJordan Rupprecht
7699451b44SJordan Rupprecht        self.assertNotEqual(token, lldb.LLDB_INVALID_IMAGE_TOKEN, "Got a valid token")
7799451b44SJordan Rupprecht        self.assertEqual(out_spec, lldb.SBFileSpec(self.hidden_lib), "Found the expected library")
7899451b44SJordan Rupprecht
7999451b44SJordan Rupprecht        # Make sure this really is in the image list:
8099451b44SJordan Rupprecht        loaded_module = target.FindModule(out_spec)
8199451b44SJordan Rupprecht
8299451b44SJordan Rupprecht        self.assertTrue(loaded_module.IsValid(), "The loaded module is in the image list.")
8399451b44SJordan Rupprecht
8499451b44SJordan Rupprecht        # Now see that we can call a function in the loaded module.
8599451b44SJordan Rupprecht        value = thread.frames[0].EvaluateExpression("d_function()", lldb.SBExpressionOptions())
86*779bbbf2SDave Lee        self.assertSuccess(value.GetError(), "Got a value from the expression")
8799451b44SJordan Rupprecht        ret_val = value.GetValueAsSigned()
8899451b44SJordan Rupprecht        self.assertEqual(ret_val, 12345, "Got the right value")
8999451b44SJordan Rupprecht
9099451b44SJordan Rupprecht        # Make sure the token works to unload it:
9199451b44SJordan Rupprecht        process.UnloadImage(token)
9299451b44SJordan Rupprecht
9399451b44SJordan Rupprecht        # Make sure this really is no longer in the image list:
9499451b44SJordan Rupprecht        loaded_module = target.FindModule(out_spec)
9599451b44SJordan Rupprecht
9699451b44SJordan Rupprecht        self.assertFalse(loaded_module.IsValid(), "The unloaded module is no longer in the image list.")
9799451b44SJordan Rupprecht
9899451b44SJordan Rupprecht        # Make sure a relative path also works:
9999451b44SJordan Rupprecht        paths.Clear()
10099451b44SJordan Rupprecht        paths.AppendString(os.path.join(self.wd, "no_such_dir"))
10199451b44SJordan Rupprecht        paths.AppendString(self.wd)
10299451b44SJordan Rupprecht        relative_spec = lldb.SBFileSpec(os.path.join("hidden", self.lib_name))
10399451b44SJordan Rupprecht
10499451b44SJordan Rupprecht        out_spec = lldb.SBFileSpec()
10599451b44SJordan Rupprecht        token = process.LoadImageUsingPaths(relative_spec, paths, out_spec, error)
10699451b44SJordan Rupprecht
10799451b44SJordan Rupprecht        self.assertNotEqual(token, lldb.LLDB_INVALID_IMAGE_TOKEN, "Got a valid token with relative path")
10899451b44SJordan Rupprecht        self.assertEqual(out_spec, lldb.SBFileSpec(self.hidden_lib), "Found the expected library with relative path")
10999451b44SJordan Rupprecht
11099451b44SJordan Rupprecht        process.UnloadImage(token)
11199451b44SJordan Rupprecht
11299451b44SJordan Rupprecht        # Make sure the presence of an empty path doesn't mess anything up:
11399451b44SJordan Rupprecht        paths.Clear()
11499451b44SJordan Rupprecht        paths.AppendString("")
11599451b44SJordan Rupprecht        paths.AppendString(os.path.join(self.wd, "no_such_dir"))
11699451b44SJordan Rupprecht        paths.AppendString(self.wd)
11799451b44SJordan Rupprecht        relative_spec = lldb.SBFileSpec(os.path.join("hidden", self.lib_name))
11899451b44SJordan Rupprecht
11999451b44SJordan Rupprecht        out_spec = lldb.SBFileSpec()
12099451b44SJordan Rupprecht        token = process.LoadImageUsingPaths(relative_spec, paths, out_spec, error)
12199451b44SJordan Rupprecht
12299451b44SJordan Rupprecht        self.assertNotEqual(token, lldb.LLDB_INVALID_IMAGE_TOKEN, "Got a valid token with included empty path")
12399451b44SJordan Rupprecht        self.assertEqual(out_spec, lldb.SBFileSpec(self.hidden_lib), "Found the expected library with included empty path")
12499451b44SJordan Rupprecht
12599451b44SJordan Rupprecht        process.UnloadImage(token)
12699451b44SJordan Rupprecht
12799451b44SJordan Rupprecht        # Finally, passing in an absolute path should work like the basename:
12899451b44SJordan Rupprecht        # This should NOT work because we've taken hidden_dir off the paths:
12999451b44SJordan Rupprecht        abs_spec = lldb.SBFileSpec(os.path.join(self.hidden_dir, self.lib_name))
13099451b44SJordan Rupprecht
13199451b44SJordan Rupprecht        token = process.LoadImageUsingPaths(lib_spec, paths, out_spec, error)
13299451b44SJordan Rupprecht        self.assertEqual(token, lldb.LLDB_INVALID_IMAGE_TOKEN, "Only looked on the provided path.")
13399451b44SJordan Rupprecht
13499451b44SJordan Rupprecht        # But it should work when we add the dir:
13599451b44SJordan Rupprecht        # Now add the correct dir to the paths list and try again:
13699451b44SJordan Rupprecht        paths.AppendString(self.hidden_dir)
13799451b44SJordan Rupprecht        token = process.LoadImageUsingPaths(lib_spec, paths, out_spec, error)
13899451b44SJordan Rupprecht
13999451b44SJordan Rupprecht        self.assertNotEqual(token, lldb.LLDB_INVALID_IMAGE_TOKEN, "Got a valid token")
14099451b44SJordan Rupprecht        self.assertEqual(out_spec, lldb.SBFileSpec(self.hidden_lib), "Found the expected library")
141