summaryrefslogtreecommitdiffstats
path: root/gnu/llvm/lldb/packages/Python/lldbsuite/test/macosx/universal/TestUniversal.py
diff options
context:
space:
mode:
authorpatrick <patrick@openbsd.org>2020-08-03 14:33:06 +0000
committerpatrick <patrick@openbsd.org>2020-08-03 14:33:06 +0000
commit061da546b983eb767bad15e67af1174fb0bcf31c (patch)
tree83c78b820819d70aa40c36d90447978b300078c5 /gnu/llvm/lldb/packages/Python/lldbsuite/test/macosx/universal/TestUniversal.py
parentImport LLVM 10.0.0 release including clang, lld and lldb. (diff)
downloadwireguard-openbsd-061da546b983eb767bad15e67af1174fb0bcf31c.tar.xz
wireguard-openbsd-061da546b983eb767bad15e67af1174fb0bcf31c.zip
Import LLVM 10.0.0 release including clang, lld and lldb.
ok hackroom tested by plenty
Diffstat (limited to 'gnu/llvm/lldb/packages/Python/lldbsuite/test/macosx/universal/TestUniversal.py')
-rw-r--r--gnu/llvm/lldb/packages/Python/lldbsuite/test/macosx/universal/TestUniversal.py162
1 files changed, 162 insertions, 0 deletions
diff --git a/gnu/llvm/lldb/packages/Python/lldbsuite/test/macosx/universal/TestUniversal.py b/gnu/llvm/lldb/packages/Python/lldbsuite/test/macosx/universal/TestUniversal.py
new file mode 100644
index 00000000000..ebcdee84f64
--- /dev/null
+++ b/gnu/llvm/lldb/packages/Python/lldbsuite/test/macosx/universal/TestUniversal.py
@@ -0,0 +1,162 @@
+"""Test aspects of lldb commands on universal binaries."""
+
+
+
+import unittest2
+import os
+import lldb
+from lldbsuite.test.decorators import *
+from lldbsuite.test.lldbtest import *
+from lldbsuite.test import lldbutil
+
+def haswellOrLater():
+ features = subprocess.check_output(["sysctl", "machdep.cpu"])
+ return "AVX2" in features.split()
+
+class UniversalTestCase(TestBase):
+
+ NO_DEBUG_INFO_TESTCASE = True
+ mydir = TestBase.compute_mydir(__file__)
+
+ def setUp(self):
+ # Call super's setUp().
+ TestBase.setUp(self)
+ # Find the line number to break inside main().
+ self.line = line_number('main.c', '// Set break point at this line.')
+
+ @add_test_categories(['pyapi'])
+ @skipUnlessDarwin
+ @unittest2.skipUnless(hasattr(os, "uname") and os.uname()[4] in
+ ['x86_64'], "requires x86_64")
+ @skipIfDarwinEmbedded # this test file assumes we're targetting an x86 system
+ def test_sbdebugger_create_target_with_file_and_target_triple(self):
+ """Test the SBDebugger.CreateTargetWithFileAndTargetTriple() API."""
+ # Invoke the default build rule.
+ self.build()
+
+ # Note that "testit" is a universal binary.
+ exe = self.getBuildArtifact("testit")
+
+ # Create a target by the debugger.
+ target = self.dbg.CreateTargetWithFileAndTargetTriple(
+ exe, "x86_64-apple-macosx")
+ self.assertTrue(target, VALID_TARGET)
+ self.expect("image list -A -b", substrs=["x86_64 testit"])
+
+ # Now launch the process, and do not stop at entry point.
+ process = target.LaunchSimple(
+ None, None, self.get_process_working_directory())
+ self.assertTrue(process, PROCESS_IS_VALID)
+
+ @skipUnlessDarwin
+ @unittest2.skipUnless(hasattr(os, "uname") and os.uname()[4] in
+ ['x86_64'], "requires x86_64")
+ @skipIfDarwinEmbedded # this test file assumes we're targetting an x86 system
+ def test_process_launch_for_universal(self):
+ """Test process launch of a universal binary."""
+ from lldbsuite.test.lldbutil import print_registers
+
+ if not haswellOrLater():
+ return
+
+ # Invoke the default build rule.
+ self.build()
+
+ # Note that "testit" is a universal binary.
+ exe = self.getBuildArtifact("testit")
+
+ # By default, x86_64 is assumed if no architecture is specified.
+ self.expect("file " + exe, CURRENT_EXECUTABLE_SET,
+ startstr="Current executable set to ",
+ substrs=["testit' (x86_64h)."])
+
+ # Break inside the main.
+ lldbutil.run_break_set_by_file_and_line(
+ self, "main.c", self.line, num_expected_locations=1, loc_exact=True)
+
+ # We should be able to launch the x86_64h executable.
+ self.runCmd("run", RUN_SUCCEEDED)
+
+ # Check whether we have a x86_64h process launched.
+ target = self.dbg.GetSelectedTarget()
+ process = target.GetProcess()
+ self.expect("image list -A -b", substrs=["x86_64h testit"])
+ self.runCmd("continue")
+
+ # Now specify x86_64 as the architecture for "testit".
+ self.expect("file -a x86_64 " + exe, CURRENT_EXECUTABLE_SET,
+ startstr="Current executable set to ",
+ substrs=["testit' (x86_64)."])
+
+ # Break inside the main.
+ lldbutil.run_break_set_by_file_and_line(
+ self, "main.c", self.line, num_expected_locations=1, loc_exact=True)
+
+ # We should be able to launch the x86_64 executable as well.
+ self.runCmd("run", RUN_SUCCEEDED)
+
+ # Check whether we have a x86_64 process launched.
+
+ # FIXME: This wrong. We are expecting x86_64, but spawning a
+ # new process currently doesn't allow specifying a *sub*-architecture.
+ # <rdar://problem/46101466>
+ self.expect("image list -A -b", substrs=["x86_64h testit"])
+ self.runCmd("continue")
+
+ @skipUnlessDarwin
+ @unittest2.skipUnless(hasattr(os, "uname") and os.uname()[4] in
+ ['x86_64'], "requires x86_64")
+ @skipIfDarwinEmbedded # this test file assumes we're targetting an x86 system
+ def test_process_attach_with_wrong_arch(self):
+ """Test that when we attach to a binary from the wrong fork of
+ a universal binary, we fix up the ABI correctly."""
+ if not haswellOrLater():
+ return
+
+ # Now keep the architecture at x86_64, but switch the binary
+ # we launch to x86_64h, and make sure on attach we switch to
+ # the correct architecture.
+
+ # Invoke the default build rule.
+ self.build()
+
+ # Note that "testit" is a universal binary.
+ exe = self.getBuildArtifact("testit")
+
+ # Create a target by the debugger.
+ target = self.dbg.CreateTargetWithFileAndTargetTriple(
+ exe, "x86_64-apple-macosx")
+ self.assertTrue(target, VALID_TARGET)
+ self.expect("image list -A -b", substrs=["x86_64 testit"])
+
+ bkpt = target.BreakpointCreateBySourceRegex(
+ "sleep", lldb.SBFileSpec("main.c"))
+ self.assertTrue(bkpt.IsValid(), "Valid breakpoint")
+ self.assertTrue(
+ bkpt.GetNumLocations() >= 1,
+ "Our main breakpoint has locations.")
+
+ popen = self.spawnSubprocess(exe, ["keep_waiting"])
+ self.addTearDownHook(self.cleanupSubprocesses)
+
+ error = lldb.SBError()
+ empty_listener = lldb.SBListener()
+ process = target.AttachToProcessWithID(
+ empty_listener, popen.pid, error)
+ self.assertTrue(error.Success(), "Attached to process.")
+
+ self.expect("image list -A -b", substrs=["x86_64h testit"])
+
+ # It may seem odd to check the number of frames, but the bug
+ # that motivated this test was that we eventually fixed the
+ # architecture, but we left the ABI set to the original value.
+ # In that case, if you asked the process for its architecture,
+ # it would look right, but since the ABI was wrong,
+ # backtracing failed.
+
+ threads = lldbutil.continue_to_breakpoint(process, bkpt)
+ self.assertTrue(len(threads) == 1)
+ thread = threads[0]
+ self.assertTrue(
+ thread.GetNumFrames() > 1,
+ "We were able to backtrace.")