199451b44SJordan Rupprecht""" 299451b44SJordan RupprechtTest SBThread APIs. 399451b44SJordan Rupprecht""" 499451b44SJordan Rupprecht 599451b44SJordan Rupprechtfrom __future__ import print_function 699451b44SJordan Rupprecht 799451b44SJordan Rupprecht 899451b44SJordan Rupprechtimport lldb 999451b44SJordan Rupprechtfrom lldbsuite.test.decorators import * 1099451b44SJordan Rupprechtfrom lldbsuite.test.lldbtest import * 1199451b44SJordan Rupprechtfrom lldbsuite.test import lldbutil 1299451b44SJordan Rupprechtfrom lldbsuite.test.lldbutil import get_stopped_thread, get_caller_symbol 1399451b44SJordan Rupprecht 1499451b44SJordan Rupprecht 1599451b44SJordan Rupprechtclass ThreadAPITestCase(TestBase): 1699451b44SJordan Rupprecht 1799451b44SJordan Rupprecht mydir = TestBase.compute_mydir(__file__) 1899451b44SJordan Rupprecht 1999451b44SJordan Rupprecht def test_get_process(self): 2099451b44SJordan Rupprecht """Test Python SBThread.GetProcess() API.""" 2199451b44SJordan Rupprecht self.build() 2299451b44SJordan Rupprecht self.get_process() 2399451b44SJordan Rupprecht 2499451b44SJordan Rupprecht def test_get_stop_description(self): 2599451b44SJordan Rupprecht """Test Python SBThread.GetStopDescription() API.""" 2699451b44SJordan Rupprecht self.build() 2799451b44SJordan Rupprecht self.get_stop_description() 2899451b44SJordan Rupprecht 2999451b44SJordan Rupprecht def test_run_to_address(self): 3099451b44SJordan Rupprecht """Test Python SBThread.RunToAddress() API.""" 3199451b44SJordan Rupprecht # We build a different executable than the default build() does. 3299451b44SJordan Rupprecht d = {'CXX_SOURCES': 'main2.cpp', 'EXE': self.exe_name} 3399451b44SJordan Rupprecht self.build(dictionary=d) 3499451b44SJordan Rupprecht self.setTearDownCleanup(dictionary=d) 3599451b44SJordan Rupprecht self.run_to_address(self.exe_name) 3699451b44SJordan Rupprecht 3760dff35fSAdrian Prantl @skipIfAsan # The output looks different under ASAN. 386805a77eSMuhammad Omair Javaid @expectedFailureAll(oslist=["linux"], archs=['arm'], bugnumber="llvm.org/pr45892") 3999451b44SJordan Rupprecht @expectedFailureAll(oslist=["windows"]) 4099451b44SJordan Rupprecht def test_step_out_of_malloc_into_function_b(self): 4199451b44SJordan Rupprecht """Test Python SBThread.StepOut() API to step out of a malloc call where the call site is at function b().""" 4299451b44SJordan Rupprecht # We build a different executable than the default build() does. 4399451b44SJordan Rupprecht d = {'CXX_SOURCES': 'main2.cpp', 'EXE': self.exe_name} 4499451b44SJordan Rupprecht self.build(dictionary=d) 4599451b44SJordan Rupprecht self.setTearDownCleanup(dictionary=d) 4699451b44SJordan Rupprecht self.step_out_of_malloc_into_function_b(self.exe_name) 4799451b44SJordan Rupprecht 4899451b44SJordan Rupprecht def test_step_over_3_times(self): 4999451b44SJordan Rupprecht """Test Python SBThread.StepOver() API.""" 5099451b44SJordan Rupprecht # We build a different executable than the default build() does. 5199451b44SJordan Rupprecht d = {'CXX_SOURCES': 'main2.cpp', 'EXE': self.exe_name} 5299451b44SJordan Rupprecht self.build(dictionary=d) 5399451b44SJordan Rupprecht self.setTearDownCleanup(dictionary=d) 5499451b44SJordan Rupprecht self.step_over_3_times(self.exe_name) 5599451b44SJordan Rupprecht 5699451b44SJordan Rupprecht def setUp(self): 5799451b44SJordan Rupprecht # Call super's setUp(). 5899451b44SJordan Rupprecht TestBase.setUp(self) 5999451b44SJordan Rupprecht # Find the line number within main.cpp to break inside main(). 6099451b44SJordan Rupprecht self.break_line = line_number( 6199451b44SJordan Rupprecht "main.cpp", "// Set break point at this line and check variable 'my_char'.") 6299451b44SJordan Rupprecht # Find the line numbers within main2.cpp for 6399451b44SJordan Rupprecht # step_out_of_malloc_into_function_b() and step_over_3_times(). 6499451b44SJordan Rupprecht self.step_out_of_malloc = line_number( 6599451b44SJordan Rupprecht "main2.cpp", "// thread step-out of malloc into function b.") 6699451b44SJordan Rupprecht self.after_3_step_overs = line_number( 6799451b44SJordan Rupprecht "main2.cpp", "// we should reach here after 3 step-over's.") 6899451b44SJordan Rupprecht 6999451b44SJordan Rupprecht # We'll use the test method name as the exe_name for executable 70e9264b74SKazuaki Ishizaki # compiled from main2.cpp. 7199451b44SJordan Rupprecht self.exe_name = self.testMethodName 7299451b44SJordan Rupprecht 7399451b44SJordan Rupprecht def get_process(self): 7499451b44SJordan Rupprecht """Test Python SBThread.GetProcess() API.""" 7599451b44SJordan Rupprecht exe = self.getBuildArtifact("a.out") 7699451b44SJordan Rupprecht 7799451b44SJordan Rupprecht target = self.dbg.CreateTarget(exe) 7899451b44SJordan Rupprecht self.assertTrue(target, VALID_TARGET) 7999451b44SJordan Rupprecht 8099451b44SJordan Rupprecht breakpoint = target.BreakpointCreateByLocation( 8199451b44SJordan Rupprecht "main.cpp", self.break_line) 8299451b44SJordan Rupprecht self.assertTrue(breakpoint, VALID_BREAKPOINT) 8399451b44SJordan Rupprecht self.runCmd("breakpoint list") 8499451b44SJordan Rupprecht 8599451b44SJordan Rupprecht # Launch the process, and do not stop at the entry point. 8699451b44SJordan Rupprecht process = target.LaunchSimple( 8799451b44SJordan Rupprecht None, None, self.get_process_working_directory()) 8899451b44SJordan Rupprecht 8999451b44SJordan Rupprecht thread = get_stopped_thread(process, lldb.eStopReasonBreakpoint) 9099451b44SJordan Rupprecht self.assertTrue( 9199451b44SJordan Rupprecht thread.IsValid(), 9299451b44SJordan Rupprecht "There should be a thread stopped due to breakpoint") 9399451b44SJordan Rupprecht self.runCmd("process status") 9499451b44SJordan Rupprecht 9599451b44SJordan Rupprecht proc_of_thread = thread.GetProcess() 96b321b429SJonas Devlieghere self.trace("proc_of_thread:", proc_of_thread) 970ed758b2SDave Lee self.assertEqual(proc_of_thread.GetProcessID(), process.GetProcessID()) 9899451b44SJordan Rupprecht 9999451b44SJordan Rupprecht def get_stop_description(self): 10099451b44SJordan Rupprecht """Test Python SBThread.GetStopDescription() API.""" 10199451b44SJordan Rupprecht exe = self.getBuildArtifact("a.out") 10299451b44SJordan Rupprecht 10399451b44SJordan Rupprecht target = self.dbg.CreateTarget(exe) 10499451b44SJordan Rupprecht self.assertTrue(target, VALID_TARGET) 10599451b44SJordan Rupprecht 10699451b44SJordan Rupprecht breakpoint = target.BreakpointCreateByLocation( 10799451b44SJordan Rupprecht "main.cpp", self.break_line) 10899451b44SJordan Rupprecht self.assertTrue(breakpoint, VALID_BREAKPOINT) 10999451b44SJordan Rupprecht #self.runCmd("breakpoint list") 11099451b44SJordan Rupprecht 11199451b44SJordan Rupprecht # Launch the process, and do not stop at the entry point. 11299451b44SJordan Rupprecht process = target.LaunchSimple( 11399451b44SJordan Rupprecht None, None, self.get_process_working_directory()) 11499451b44SJordan Rupprecht 11599451b44SJordan Rupprecht thread = get_stopped_thread(process, lldb.eStopReasonBreakpoint) 11699451b44SJordan Rupprecht self.assertTrue( 11799451b44SJordan Rupprecht thread.IsValid(), 11899451b44SJordan Rupprecht "There should be a thread stopped due to breakpoint") 11999451b44SJordan Rupprecht 12099451b44SJordan Rupprecht # Get the stop reason. GetStopDescription expects that we pass in the size of the description 12199451b44SJordan Rupprecht # we expect plus an additional byte for the null terminator. 12299451b44SJordan Rupprecht 12399451b44SJordan Rupprecht # Test with a buffer that is exactly as large as the expected stop reason. 12499451b44SJordan Rupprecht self.assertEqual("breakpoint 1.1", thread.GetStopDescription(len('breakpoint 1.1') + 1)) 12599451b44SJordan Rupprecht 12699451b44SJordan Rupprecht # Test some smaller buffer sizes. 12799451b44SJordan Rupprecht self.assertEqual("breakpoint", thread.GetStopDescription(len('breakpoint') + 1)) 12899451b44SJordan Rupprecht self.assertEqual("break", thread.GetStopDescription(len('break') + 1)) 12999451b44SJordan Rupprecht self.assertEqual("b", thread.GetStopDescription(len('b') + 1)) 13099451b44SJordan Rupprecht 13199451b44SJordan Rupprecht # Test that we can pass in a much larger size and still get the right output. 13299451b44SJordan Rupprecht self.assertEqual("breakpoint 1.1", thread.GetStopDescription(len('breakpoint 1.1') + 100)) 13399451b44SJordan Rupprecht 13499451b44SJordan Rupprecht def step_out_of_malloc_into_function_b(self, exe_name): 13599451b44SJordan Rupprecht """Test Python SBThread.StepOut() API to step out of a malloc call where the call site is at function b().""" 13699451b44SJordan Rupprecht exe = self.getBuildArtifact(exe_name) 13799451b44SJordan Rupprecht 13899451b44SJordan Rupprecht target = self.dbg.CreateTarget(exe) 13999451b44SJordan Rupprecht self.assertTrue(target, VALID_TARGET) 14099451b44SJordan Rupprecht 14199451b44SJordan Rupprecht breakpoint = target.BreakpointCreateByName('malloc') 14299451b44SJordan Rupprecht self.assertTrue(breakpoint, VALID_BREAKPOINT) 14399451b44SJordan Rupprecht 14499451b44SJordan Rupprecht # Launch the process, and do not stop at the entry point. 14599451b44SJordan Rupprecht process = target.LaunchSimple( 14699451b44SJordan Rupprecht None, None, self.get_process_working_directory()) 14799451b44SJordan Rupprecht 14899451b44SJordan Rupprecht while True: 14999451b44SJordan Rupprecht thread = get_stopped_thread(process, lldb.eStopReasonBreakpoint) 15099451b44SJordan Rupprecht self.assertTrue( 15199451b44SJordan Rupprecht thread.IsValid(), 15299451b44SJordan Rupprecht "There should be a thread stopped due to breakpoint") 15399451b44SJordan Rupprecht caller_symbol = get_caller_symbol(thread) 15499451b44SJordan Rupprecht if not caller_symbol: 15599451b44SJordan Rupprecht self.fail( 15699451b44SJordan Rupprecht "Test failed: could not locate the caller symbol of malloc") 15799451b44SJordan Rupprecht 15899451b44SJordan Rupprecht # Our top frame may be an inlined function in malloc() (e.g., on 15999451b44SJordan Rupprecht # FreeBSD). Apply a simple heuristic of stepping out until we find 16099451b44SJordan Rupprecht # a non-malloc caller 16199451b44SJordan Rupprecht while caller_symbol.startswith("malloc"): 16299451b44SJordan Rupprecht thread.StepOut() 16399451b44SJordan Rupprecht self.assertTrue(thread.IsValid(), 16499451b44SJordan Rupprecht "Thread valid after stepping to outer malloc") 16599451b44SJordan Rupprecht caller_symbol = get_caller_symbol(thread) 16699451b44SJordan Rupprecht 16799451b44SJordan Rupprecht if caller_symbol == "b(int)": 16899451b44SJordan Rupprecht break 16999451b44SJordan Rupprecht process.Continue() 17099451b44SJordan Rupprecht 17199451b44SJordan Rupprecht # On Linux malloc calls itself in some case. Remove the breakpoint because we don't want 17299451b44SJordan Rupprecht # to hit it during step-out. 17399451b44SJordan Rupprecht target.BreakpointDelete(breakpoint.GetID()) 17499451b44SJordan Rupprecht 17599451b44SJordan Rupprecht thread.StepOut() 17699451b44SJordan Rupprecht self.runCmd("thread backtrace") 1770ed758b2SDave Lee self.assertEqual( 1780ed758b2SDave Lee thread.GetFrameAtIndex(0).GetLineEntry().GetLine(), self.step_out_of_malloc, 17999451b44SJordan Rupprecht "step out of malloc into function b is successful") 18099451b44SJordan Rupprecht 18199451b44SJordan Rupprecht def step_over_3_times(self, exe_name): 18299451b44SJordan Rupprecht """Test Python SBThread.StepOver() API.""" 18399451b44SJordan Rupprecht exe = self.getBuildArtifact(exe_name) 18499451b44SJordan Rupprecht 18599451b44SJordan Rupprecht target = self.dbg.CreateTarget(exe) 18699451b44SJordan Rupprecht self.assertTrue(target, VALID_TARGET) 18799451b44SJordan Rupprecht 18899451b44SJordan Rupprecht breakpoint = target.BreakpointCreateByLocation( 18999451b44SJordan Rupprecht 'main2.cpp', self.step_out_of_malloc) 19099451b44SJordan Rupprecht self.assertTrue(breakpoint, VALID_BREAKPOINT) 19199451b44SJordan Rupprecht self.runCmd("breakpoint list") 19299451b44SJordan Rupprecht 19399451b44SJordan Rupprecht # Launch the process, and do not stop at the entry point. 19499451b44SJordan Rupprecht process = target.LaunchSimple( 19599451b44SJordan Rupprecht None, None, self.get_process_working_directory()) 19699451b44SJordan Rupprecht 19799451b44SJordan Rupprecht self.assertTrue(process, PROCESS_IS_VALID) 19899451b44SJordan Rupprecht 19999451b44SJordan Rupprecht # Frame #0 should be on self.step_out_of_malloc. 200*47c4c6a7SDave Lee self.assertState(process.GetState(), lldb.eStateStopped) 20199451b44SJordan Rupprecht thread = get_stopped_thread(process, lldb.eStopReasonBreakpoint) 20299451b44SJordan Rupprecht self.assertTrue( 20399451b44SJordan Rupprecht thread.IsValid(), 20499451b44SJordan Rupprecht "There should be a thread stopped due to breakpoint condition") 20599451b44SJordan Rupprecht self.runCmd("thread backtrace") 20699451b44SJordan Rupprecht frame0 = thread.GetFrameAtIndex(0) 20799451b44SJordan Rupprecht lineEntry = frame0.GetLineEntry() 208619e2e09SDave Lee self.assertEqual(lineEntry.GetLine(), self.step_out_of_malloc) 20999451b44SJordan Rupprecht 21099451b44SJordan Rupprecht thread.StepOver() 21199451b44SJordan Rupprecht thread.StepOver() 21299451b44SJordan Rupprecht thread.StepOver() 21399451b44SJordan Rupprecht self.runCmd("thread backtrace") 21499451b44SJordan Rupprecht 21599451b44SJordan Rupprecht # Verify that we are stopped at the correct source line number in 21699451b44SJordan Rupprecht # main2.cpp. 21799451b44SJordan Rupprecht frame0 = thread.GetFrameAtIndex(0) 21899451b44SJordan Rupprecht lineEntry = frame0.GetLineEntry() 219619e2e09SDave Lee self.assertEqual(thread.GetStopReason(), lldb.eStopReasonPlanComplete) 22099451b44SJordan Rupprecht # Expected failure with clang as the compiler. 22199451b44SJordan Rupprecht # rdar://problem/9223880 22299451b44SJordan Rupprecht # 22399451b44SJordan Rupprecht # Which has been fixed on the lldb by compensating for inaccurate line 22499451b44SJordan Rupprecht # table information with r140416. 225619e2e09SDave Lee self.assertEqual(lineEntry.GetLine(), self.after_3_step_overs) 22699451b44SJordan Rupprecht 22799451b44SJordan Rupprecht def run_to_address(self, exe_name): 22899451b44SJordan Rupprecht """Test Python SBThread.RunToAddress() API.""" 22999451b44SJordan Rupprecht exe = self.getBuildArtifact(exe_name) 23099451b44SJordan Rupprecht 23199451b44SJordan Rupprecht target = self.dbg.CreateTarget(exe) 23299451b44SJordan Rupprecht self.assertTrue(target, VALID_TARGET) 23399451b44SJordan Rupprecht 23499451b44SJordan Rupprecht breakpoint = target.BreakpointCreateByLocation( 23599451b44SJordan Rupprecht 'main2.cpp', self.step_out_of_malloc) 23699451b44SJordan Rupprecht self.assertTrue(breakpoint, VALID_BREAKPOINT) 23799451b44SJordan Rupprecht self.runCmd("breakpoint list") 23899451b44SJordan Rupprecht 23999451b44SJordan Rupprecht # Launch the process, and do not stop at the entry point. 24099451b44SJordan Rupprecht process = target.LaunchSimple( 24199451b44SJordan Rupprecht None, None, self.get_process_working_directory()) 24299451b44SJordan Rupprecht 24399451b44SJordan Rupprecht self.assertTrue(process, PROCESS_IS_VALID) 24499451b44SJordan Rupprecht 24599451b44SJordan Rupprecht # Frame #0 should be on self.step_out_of_malloc. 246*47c4c6a7SDave Lee self.assertState(process.GetState(), lldb.eStateStopped) 24799451b44SJordan Rupprecht thread = get_stopped_thread(process, lldb.eStopReasonBreakpoint) 24899451b44SJordan Rupprecht self.assertTrue( 24999451b44SJordan Rupprecht thread.IsValid(), 25099451b44SJordan Rupprecht "There should be a thread stopped due to breakpoint condition") 25199451b44SJordan Rupprecht self.runCmd("thread backtrace") 25299451b44SJordan Rupprecht frame0 = thread.GetFrameAtIndex(0) 25399451b44SJordan Rupprecht lineEntry = frame0.GetLineEntry() 254619e2e09SDave Lee self.assertEqual(lineEntry.GetLine(), self.step_out_of_malloc) 25599451b44SJordan Rupprecht 25699451b44SJordan Rupprecht # Get the start/end addresses for this line entry. 25799451b44SJordan Rupprecht start_addr = lineEntry.GetStartAddress().GetLoadAddress(target) 25899451b44SJordan Rupprecht end_addr = lineEntry.GetEndAddress().GetLoadAddress(target) 25999451b44SJordan Rupprecht if self.TraceOn(): 26099451b44SJordan Rupprecht print("start addr:", hex(start_addr)) 26199451b44SJordan Rupprecht print("end addr:", hex(end_addr)) 26299451b44SJordan Rupprecht 26399451b44SJordan Rupprecht # Disable the breakpoint. 26499451b44SJordan Rupprecht self.assertTrue(target.DisableAllBreakpoints()) 26599451b44SJordan Rupprecht self.runCmd("breakpoint list") 26699451b44SJordan Rupprecht 26799451b44SJordan Rupprecht thread.StepOver() 26899451b44SJordan Rupprecht thread.StepOver() 26999451b44SJordan Rupprecht thread.StepOver() 27099451b44SJordan Rupprecht self.runCmd("thread backtrace") 27199451b44SJordan Rupprecht 27299451b44SJordan Rupprecht # Now ask SBThread to run to the address 'start_addr' we got earlier, which 27399451b44SJordan Rupprecht # corresponds to self.step_out_of_malloc line entry's start address. 27499451b44SJordan Rupprecht thread.RunToAddress(start_addr) 27599451b44SJordan Rupprecht self.runCmd("process status") 27699451b44SJordan Rupprecht #self.runCmd("thread backtrace") 277