199451b44SJordan Rupprecht""" 299451b44SJordan RupprechtTest SBThread APIs. 399451b44SJordan Rupprecht""" 499451b44SJordan Rupprecht 599451b44SJordan Rupprechtfrom __future__ import print_function 699451b44SJordan Rupprecht 799451b44SJordan Rupprecht 899451b44SJordan Rupprechtimport lldb 999451b44SJordan Rupprechtfrom lldbsuite.test.decorators import * 1099451b44SJordan Rupprechtfrom lldbsuite.test.lldbtest import * 1199451b44SJordan Rupprechtfrom lldbsuite.test import lldbutil 1299451b44SJordan Rupprechtfrom lldbsuite.test.lldbutil import get_stopped_thread, get_caller_symbol 1399451b44SJordan Rupprecht 1499451b44SJordan Rupprecht 1599451b44SJordan Rupprechtclass ThreadAPITestCase(TestBase): 1699451b44SJordan Rupprecht 1799451b44SJordan Rupprecht mydir = TestBase.compute_mydir(__file__) 1899451b44SJordan Rupprecht 1999451b44SJordan Rupprecht @add_test_categories(['pyapi']) 2099451b44SJordan Rupprecht def test_get_process(self): 2199451b44SJordan Rupprecht """Test Python SBThread.GetProcess() API.""" 2299451b44SJordan Rupprecht self.build() 2399451b44SJordan Rupprecht self.get_process() 2499451b44SJordan Rupprecht 2599451b44SJordan Rupprecht @add_test_categories(['pyapi']) 2699451b44SJordan Rupprecht def test_get_stop_description(self): 2799451b44SJordan Rupprecht """Test Python SBThread.GetStopDescription() API.""" 2899451b44SJordan Rupprecht self.build() 2999451b44SJordan Rupprecht self.get_stop_description() 3099451b44SJordan Rupprecht 3199451b44SJordan Rupprecht @add_test_categories(['pyapi']) 3299451b44SJordan Rupprecht def test_run_to_address(self): 3399451b44SJordan Rupprecht """Test Python SBThread.RunToAddress() API.""" 3499451b44SJordan Rupprecht # We build a different executable than the default build() does. 3599451b44SJordan Rupprecht d = {'CXX_SOURCES': 'main2.cpp', 'EXE': self.exe_name} 3699451b44SJordan Rupprecht self.build(dictionary=d) 3799451b44SJordan Rupprecht self.setTearDownCleanup(dictionary=d) 3899451b44SJordan Rupprecht self.run_to_address(self.exe_name) 3999451b44SJordan Rupprecht 4060dff35fSAdrian Prantl @skipIfAsan # The output looks different under ASAN. 4199451b44SJordan Rupprecht @add_test_categories(['pyapi']) 426805a77eSMuhammad Omair Javaid @expectedFailureAll(oslist=["linux"], archs=['arm'], bugnumber="llvm.org/pr45892") 4399451b44SJordan Rupprecht @expectedFailureAll(oslist=['freebsd'], bugnumber='llvm.org/pr20476') 4499451b44SJordan Rupprecht @expectedFailureAll(oslist=["windows"]) 4599451b44SJordan Rupprecht @expectedFailureNetBSD 4699451b44SJordan Rupprecht def test_step_out_of_malloc_into_function_b(self): 4799451b44SJordan Rupprecht """Test Python SBThread.StepOut() API to step out of a malloc call where the call site is at function b().""" 4899451b44SJordan Rupprecht # We build a different executable than the default build() does. 4999451b44SJordan Rupprecht d = {'CXX_SOURCES': 'main2.cpp', 'EXE': self.exe_name} 5099451b44SJordan Rupprecht self.build(dictionary=d) 5199451b44SJordan Rupprecht self.setTearDownCleanup(dictionary=d) 5299451b44SJordan Rupprecht self.step_out_of_malloc_into_function_b(self.exe_name) 5399451b44SJordan Rupprecht 5499451b44SJordan Rupprecht @add_test_categories(['pyapi']) 5599451b44SJordan Rupprecht def test_step_over_3_times(self): 5699451b44SJordan Rupprecht """Test Python SBThread.StepOver() API.""" 5799451b44SJordan Rupprecht # We build a different executable than the default build() does. 5899451b44SJordan Rupprecht d = {'CXX_SOURCES': 'main2.cpp', 'EXE': self.exe_name} 5999451b44SJordan Rupprecht self.build(dictionary=d) 6099451b44SJordan Rupprecht self.setTearDownCleanup(dictionary=d) 6199451b44SJordan Rupprecht self.step_over_3_times(self.exe_name) 6299451b44SJordan Rupprecht 6399451b44SJordan Rupprecht def setUp(self): 6499451b44SJordan Rupprecht # Call super's setUp(). 6599451b44SJordan Rupprecht TestBase.setUp(self) 6699451b44SJordan Rupprecht # Find the line number within main.cpp to break inside main(). 6799451b44SJordan Rupprecht self.break_line = line_number( 6899451b44SJordan Rupprecht "main.cpp", "// Set break point at this line and check variable 'my_char'.") 6999451b44SJordan Rupprecht # Find the line numbers within main2.cpp for 7099451b44SJordan Rupprecht # step_out_of_malloc_into_function_b() and step_over_3_times(). 7199451b44SJordan Rupprecht self.step_out_of_malloc = line_number( 7299451b44SJordan Rupprecht "main2.cpp", "// thread step-out of malloc into function b.") 7399451b44SJordan Rupprecht self.after_3_step_overs = line_number( 7499451b44SJordan Rupprecht "main2.cpp", "// we should reach here after 3 step-over's.") 7599451b44SJordan Rupprecht 7699451b44SJordan Rupprecht # We'll use the test method name as the exe_name for executable 77e9264b74SKazuaki Ishizaki # compiled from main2.cpp. 7899451b44SJordan Rupprecht self.exe_name = self.testMethodName 7999451b44SJordan Rupprecht 8099451b44SJordan Rupprecht def get_process(self): 8199451b44SJordan Rupprecht """Test Python SBThread.GetProcess() API.""" 8299451b44SJordan Rupprecht exe = self.getBuildArtifact("a.out") 8399451b44SJordan Rupprecht 8499451b44SJordan Rupprecht target = self.dbg.CreateTarget(exe) 8599451b44SJordan Rupprecht self.assertTrue(target, VALID_TARGET) 8699451b44SJordan Rupprecht 8799451b44SJordan Rupprecht breakpoint = target.BreakpointCreateByLocation( 8899451b44SJordan Rupprecht "main.cpp", self.break_line) 8999451b44SJordan Rupprecht self.assertTrue(breakpoint, VALID_BREAKPOINT) 9099451b44SJordan Rupprecht self.runCmd("breakpoint list") 9199451b44SJordan Rupprecht 9299451b44SJordan Rupprecht # Launch the process, and do not stop at the entry point. 9399451b44SJordan Rupprecht process = target.LaunchSimple( 9499451b44SJordan Rupprecht None, None, self.get_process_working_directory()) 9599451b44SJordan Rupprecht 9699451b44SJordan Rupprecht thread = get_stopped_thread(process, lldb.eStopReasonBreakpoint) 9799451b44SJordan Rupprecht self.assertTrue( 9899451b44SJordan Rupprecht thread.IsValid(), 9999451b44SJordan Rupprecht "There should be a thread stopped due to breakpoint") 10099451b44SJordan Rupprecht self.runCmd("process status") 10199451b44SJordan Rupprecht 10299451b44SJordan Rupprecht proc_of_thread = thread.GetProcess() 103*b321b429SJonas Devlieghere self.trace("proc_of_thread:", proc_of_thread) 10499451b44SJordan Rupprecht self.assertTrue(proc_of_thread.GetProcessID() 10599451b44SJordan Rupprecht == process.GetProcessID()) 10699451b44SJordan Rupprecht 10799451b44SJordan Rupprecht def get_stop_description(self): 10899451b44SJordan Rupprecht """Test Python SBThread.GetStopDescription() API.""" 10999451b44SJordan Rupprecht exe = self.getBuildArtifact("a.out") 11099451b44SJordan Rupprecht 11199451b44SJordan Rupprecht target = self.dbg.CreateTarget(exe) 11299451b44SJordan Rupprecht self.assertTrue(target, VALID_TARGET) 11399451b44SJordan Rupprecht 11499451b44SJordan Rupprecht breakpoint = target.BreakpointCreateByLocation( 11599451b44SJordan Rupprecht "main.cpp", self.break_line) 11699451b44SJordan Rupprecht self.assertTrue(breakpoint, VALID_BREAKPOINT) 11799451b44SJordan Rupprecht #self.runCmd("breakpoint list") 11899451b44SJordan Rupprecht 11999451b44SJordan Rupprecht # Launch the process, and do not stop at the entry point. 12099451b44SJordan Rupprecht process = target.LaunchSimple( 12199451b44SJordan Rupprecht None, None, self.get_process_working_directory()) 12299451b44SJordan Rupprecht 12399451b44SJordan Rupprecht thread = get_stopped_thread(process, lldb.eStopReasonBreakpoint) 12499451b44SJordan Rupprecht self.assertTrue( 12599451b44SJordan Rupprecht thread.IsValid(), 12699451b44SJordan Rupprecht "There should be a thread stopped due to breakpoint") 12799451b44SJordan Rupprecht 12899451b44SJordan Rupprecht # Get the stop reason. GetStopDescription expects that we pass in the size of the description 12999451b44SJordan Rupprecht # we expect plus an additional byte for the null terminator. 13099451b44SJordan Rupprecht 13199451b44SJordan Rupprecht # Test with a buffer that is exactly as large as the expected stop reason. 13299451b44SJordan Rupprecht self.assertEqual("breakpoint 1.1", thread.GetStopDescription(len('breakpoint 1.1') + 1)) 13399451b44SJordan Rupprecht 13499451b44SJordan Rupprecht # Test some smaller buffer sizes. 13599451b44SJordan Rupprecht self.assertEqual("breakpoint", thread.GetStopDescription(len('breakpoint') + 1)) 13699451b44SJordan Rupprecht self.assertEqual("break", thread.GetStopDescription(len('break') + 1)) 13799451b44SJordan Rupprecht self.assertEqual("b", thread.GetStopDescription(len('b') + 1)) 13899451b44SJordan Rupprecht 13999451b44SJordan Rupprecht # Test that we can pass in a much larger size and still get the right output. 14099451b44SJordan Rupprecht self.assertEqual("breakpoint 1.1", thread.GetStopDescription(len('breakpoint 1.1') + 100)) 14199451b44SJordan Rupprecht 14299451b44SJordan Rupprecht def step_out_of_malloc_into_function_b(self, exe_name): 14399451b44SJordan Rupprecht """Test Python SBThread.StepOut() API to step out of a malloc call where the call site is at function b().""" 14499451b44SJordan Rupprecht exe = self.getBuildArtifact(exe_name) 14599451b44SJordan Rupprecht 14699451b44SJordan Rupprecht target = self.dbg.CreateTarget(exe) 14799451b44SJordan Rupprecht self.assertTrue(target, VALID_TARGET) 14899451b44SJordan Rupprecht 14999451b44SJordan Rupprecht breakpoint = target.BreakpointCreateByName('malloc') 15099451b44SJordan Rupprecht self.assertTrue(breakpoint, VALID_BREAKPOINT) 15199451b44SJordan Rupprecht 15299451b44SJordan Rupprecht # Launch the process, and do not stop at the entry point. 15399451b44SJordan Rupprecht process = target.LaunchSimple( 15499451b44SJordan Rupprecht None, None, self.get_process_working_directory()) 15599451b44SJordan Rupprecht 15699451b44SJordan Rupprecht while True: 15799451b44SJordan Rupprecht thread = get_stopped_thread(process, lldb.eStopReasonBreakpoint) 15899451b44SJordan Rupprecht self.assertTrue( 15999451b44SJordan Rupprecht thread.IsValid(), 16099451b44SJordan Rupprecht "There should be a thread stopped due to breakpoint") 16199451b44SJordan Rupprecht caller_symbol = get_caller_symbol(thread) 16299451b44SJordan Rupprecht if not caller_symbol: 16399451b44SJordan Rupprecht self.fail( 16499451b44SJordan Rupprecht "Test failed: could not locate the caller symbol of malloc") 16599451b44SJordan Rupprecht 16699451b44SJordan Rupprecht # Our top frame may be an inlined function in malloc() (e.g., on 16799451b44SJordan Rupprecht # FreeBSD). Apply a simple heuristic of stepping out until we find 16899451b44SJordan Rupprecht # a non-malloc caller 16999451b44SJordan Rupprecht while caller_symbol.startswith("malloc"): 17099451b44SJordan Rupprecht thread.StepOut() 17199451b44SJordan Rupprecht self.assertTrue(thread.IsValid(), 17299451b44SJordan Rupprecht "Thread valid after stepping to outer malloc") 17399451b44SJordan Rupprecht caller_symbol = get_caller_symbol(thread) 17499451b44SJordan Rupprecht 17599451b44SJordan Rupprecht if caller_symbol == "b(int)": 17699451b44SJordan Rupprecht break 17799451b44SJordan Rupprecht process.Continue() 17899451b44SJordan Rupprecht 17999451b44SJordan Rupprecht # On Linux malloc calls itself in some case. Remove the breakpoint because we don't want 18099451b44SJordan Rupprecht # to hit it during step-out. 18199451b44SJordan Rupprecht target.BreakpointDelete(breakpoint.GetID()) 18299451b44SJordan Rupprecht 18399451b44SJordan Rupprecht thread.StepOut() 18499451b44SJordan Rupprecht self.runCmd("thread backtrace") 18599451b44SJordan Rupprecht self.assertTrue( 18699451b44SJordan Rupprecht thread.GetFrameAtIndex(0).GetLineEntry().GetLine() == self.step_out_of_malloc, 18799451b44SJordan Rupprecht "step out of malloc into function b is successful") 18899451b44SJordan Rupprecht 18999451b44SJordan Rupprecht def step_over_3_times(self, exe_name): 19099451b44SJordan Rupprecht """Test Python SBThread.StepOver() API.""" 19199451b44SJordan Rupprecht exe = self.getBuildArtifact(exe_name) 19299451b44SJordan Rupprecht 19399451b44SJordan Rupprecht target = self.dbg.CreateTarget(exe) 19499451b44SJordan Rupprecht self.assertTrue(target, VALID_TARGET) 19599451b44SJordan Rupprecht 19699451b44SJordan Rupprecht breakpoint = target.BreakpointCreateByLocation( 19799451b44SJordan Rupprecht 'main2.cpp', self.step_out_of_malloc) 19899451b44SJordan Rupprecht self.assertTrue(breakpoint, VALID_BREAKPOINT) 19999451b44SJordan Rupprecht self.runCmd("breakpoint list") 20099451b44SJordan Rupprecht 20199451b44SJordan Rupprecht # Launch the process, and do not stop at the entry point. 20299451b44SJordan Rupprecht process = target.LaunchSimple( 20399451b44SJordan Rupprecht None, None, self.get_process_working_directory()) 20499451b44SJordan Rupprecht 20599451b44SJordan Rupprecht self.assertTrue(process, PROCESS_IS_VALID) 20699451b44SJordan Rupprecht 20799451b44SJordan Rupprecht # Frame #0 should be on self.step_out_of_malloc. 20899451b44SJordan Rupprecht self.assertTrue(process.GetState() == lldb.eStateStopped) 20999451b44SJordan Rupprecht thread = get_stopped_thread(process, lldb.eStopReasonBreakpoint) 21099451b44SJordan Rupprecht self.assertTrue( 21199451b44SJordan Rupprecht thread.IsValid(), 21299451b44SJordan Rupprecht "There should be a thread stopped due to breakpoint condition") 21399451b44SJordan Rupprecht self.runCmd("thread backtrace") 21499451b44SJordan Rupprecht frame0 = thread.GetFrameAtIndex(0) 21599451b44SJordan Rupprecht lineEntry = frame0.GetLineEntry() 21699451b44SJordan Rupprecht self.assertTrue(lineEntry.GetLine() == self.step_out_of_malloc) 21799451b44SJordan Rupprecht 21899451b44SJordan Rupprecht thread.StepOver() 21999451b44SJordan Rupprecht thread.StepOver() 22099451b44SJordan Rupprecht thread.StepOver() 22199451b44SJordan Rupprecht self.runCmd("thread backtrace") 22299451b44SJordan Rupprecht 22399451b44SJordan Rupprecht # Verify that we are stopped at the correct source line number in 22499451b44SJordan Rupprecht # main2.cpp. 22599451b44SJordan Rupprecht frame0 = thread.GetFrameAtIndex(0) 22699451b44SJordan Rupprecht lineEntry = frame0.GetLineEntry() 22799451b44SJordan Rupprecht self.assertTrue(thread.GetStopReason() == lldb.eStopReasonPlanComplete) 22899451b44SJordan Rupprecht # Expected failure with clang as the compiler. 22999451b44SJordan Rupprecht # rdar://problem/9223880 23099451b44SJordan Rupprecht # 23199451b44SJordan Rupprecht # Which has been fixed on the lldb by compensating for inaccurate line 23299451b44SJordan Rupprecht # table information with r140416. 23399451b44SJordan Rupprecht self.assertTrue(lineEntry.GetLine() == self.after_3_step_overs) 23499451b44SJordan Rupprecht 23599451b44SJordan Rupprecht def run_to_address(self, exe_name): 23699451b44SJordan Rupprecht """Test Python SBThread.RunToAddress() API.""" 23799451b44SJordan Rupprecht exe = self.getBuildArtifact(exe_name) 23899451b44SJordan Rupprecht 23999451b44SJordan Rupprecht target = self.dbg.CreateTarget(exe) 24099451b44SJordan Rupprecht self.assertTrue(target, VALID_TARGET) 24199451b44SJordan Rupprecht 24299451b44SJordan Rupprecht breakpoint = target.BreakpointCreateByLocation( 24399451b44SJordan Rupprecht 'main2.cpp', self.step_out_of_malloc) 24499451b44SJordan Rupprecht self.assertTrue(breakpoint, VALID_BREAKPOINT) 24599451b44SJordan Rupprecht self.runCmd("breakpoint list") 24699451b44SJordan Rupprecht 24799451b44SJordan Rupprecht # Launch the process, and do not stop at the entry point. 24899451b44SJordan Rupprecht process = target.LaunchSimple( 24999451b44SJordan Rupprecht None, None, self.get_process_working_directory()) 25099451b44SJordan Rupprecht 25199451b44SJordan Rupprecht self.assertTrue(process, PROCESS_IS_VALID) 25299451b44SJordan Rupprecht 25399451b44SJordan Rupprecht # Frame #0 should be on self.step_out_of_malloc. 25499451b44SJordan Rupprecht self.assertTrue(process.GetState() == lldb.eStateStopped) 25599451b44SJordan Rupprecht thread = get_stopped_thread(process, lldb.eStopReasonBreakpoint) 25699451b44SJordan Rupprecht self.assertTrue( 25799451b44SJordan Rupprecht thread.IsValid(), 25899451b44SJordan Rupprecht "There should be a thread stopped due to breakpoint condition") 25999451b44SJordan Rupprecht self.runCmd("thread backtrace") 26099451b44SJordan Rupprecht frame0 = thread.GetFrameAtIndex(0) 26199451b44SJordan Rupprecht lineEntry = frame0.GetLineEntry() 26299451b44SJordan Rupprecht self.assertTrue(lineEntry.GetLine() == self.step_out_of_malloc) 26399451b44SJordan Rupprecht 26499451b44SJordan Rupprecht # Get the start/end addresses for this line entry. 26599451b44SJordan Rupprecht start_addr = lineEntry.GetStartAddress().GetLoadAddress(target) 26699451b44SJordan Rupprecht end_addr = lineEntry.GetEndAddress().GetLoadAddress(target) 26799451b44SJordan Rupprecht if self.TraceOn(): 26899451b44SJordan Rupprecht print("start addr:", hex(start_addr)) 26999451b44SJordan Rupprecht print("end addr:", hex(end_addr)) 27099451b44SJordan Rupprecht 27199451b44SJordan Rupprecht # Disable the breakpoint. 27299451b44SJordan Rupprecht self.assertTrue(target.DisableAllBreakpoints()) 27399451b44SJordan Rupprecht self.runCmd("breakpoint list") 27499451b44SJordan Rupprecht 27599451b44SJordan Rupprecht thread.StepOver() 27699451b44SJordan Rupprecht thread.StepOver() 27799451b44SJordan Rupprecht thread.StepOver() 27899451b44SJordan Rupprecht self.runCmd("thread backtrace") 27999451b44SJordan Rupprecht 28099451b44SJordan Rupprecht # Now ask SBThread to run to the address 'start_addr' we got earlier, which 28199451b44SJordan Rupprecht # corresponds to self.step_out_of_malloc line entry's start address. 28299451b44SJordan Rupprecht thread.RunToAddress(start_addr) 28399451b44SJordan Rupprecht self.runCmd("process status") 28499451b44SJordan Rupprecht #self.runCmd("thread backtrace") 285