
This module was originally intended to be imported by top-level scripts to be able to find the LLDB packages and third party libraries. Packages themselves shouldn't need to import it, because by the time it gets into the package, the top-level script should have already done this. Indeed, it was just adding the same values to sys.path multiple times, so this patch is essentially no functional change. To make sure it doesn't get re-introduced, we also delete the `use_lldb_suite` module from `lldbsuite/test`, although the original copy still remains in `lldb/test` llvm-svn: 251963
84 lines
3.2 KiB
Python
84 lines
3.2 KiB
Python
"""
|
|
Test the AddressSanitizer runtime support for report breakpoint and data extraction.
|
|
"""
|
|
|
|
from __future__ import print_function
|
|
|
|
|
|
|
|
import os, time
|
|
import lldb
|
|
from lldbsuite.test.lldbtest import *
|
|
import lldbsuite.test.lldbutil as lldbutil
|
|
import json
|
|
|
|
class AsanTestReportDataCase(TestBase):
|
|
|
|
mydir = TestBase.compute_mydir(__file__)
|
|
|
|
# The default compiler ("clang") may not support Address Sanitizer or it
|
|
# may not have the debugging API which was recently added, so we're calling
|
|
# self.useBuiltClang() to use clang from the llvm-build directory instead
|
|
|
|
@expectedFailureLinux # non-core functionality, need to reenable and fix later (DES 2014.11.07)
|
|
@skipIfFreeBSD # llvm.org/pr21136 runtimes not yet available by default
|
|
@skipIfRemote
|
|
@skipUnlessCompilerRt
|
|
def test(self):
|
|
compiler = self.findBuiltClang ()
|
|
self.build (None, compiler)
|
|
self.asan_tests ()
|
|
|
|
def setUp(self):
|
|
# Call super's setUp().
|
|
TestBase.setUp(self)
|
|
self.line_malloc = line_number('main.c', '// malloc line')
|
|
self.line_malloc2 = line_number('main.c', '// malloc2 line')
|
|
self.line_free = line_number('main.c', '// free line')
|
|
self.line_breakpoint = line_number('main.c', '// break line')
|
|
self.line_crash = line_number('main.c', '// BOOM line')
|
|
|
|
def asan_tests (self):
|
|
exe = os.path.join (os.getcwd(), "a.out")
|
|
self.expect("file " + exe, patterns = [ "Current executable set to .*a.out" ])
|
|
self.runCmd("run")
|
|
|
|
# ASan will relaunch the process to insert its library.
|
|
self.expect("thread list", "Process should be stopped due to exec.",
|
|
substrs = ['stopped', 'stop reason = exec'])
|
|
|
|
# no extended info when we have no ASan report
|
|
thread = self.dbg.GetSelectedTarget().process.GetSelectedThread()
|
|
s = lldb.SBStream()
|
|
self.assertFalse(thread.GetStopReasonExtendedInfoAsJSON(s))
|
|
|
|
self.runCmd("continue")
|
|
|
|
self.expect("thread list", "Process should be stopped due to ASan report",
|
|
substrs = ['stopped', 'stop reason = Use of deallocated memory detected'])
|
|
|
|
self.assertEqual(self.dbg.GetSelectedTarget().process.GetSelectedThread().GetStopReason(), lldb.eStopReasonInstrumentation)
|
|
|
|
self.expect("bt", "The backtrace should show the crashing line",
|
|
substrs = ['main.c:%d' % self.line_crash])
|
|
|
|
self.expect("thread info -s", "The extended stop info should contain the ASan provided fields",
|
|
substrs = ["access_size", "access_type", "address", "pc", "description", "heap-use-after-free"])
|
|
|
|
output_lines = self.res.GetOutput().split('\n')
|
|
json_line = output_lines[2]
|
|
data = json.loads(json_line)
|
|
self.assertEqual(data["description"], "heap-use-after-free")
|
|
self.assertEqual(data["instrumentation_class"], "AddressSanitizer")
|
|
self.assertEqual(data["stop_type"], "fatal_error")
|
|
|
|
# now let's try the SB API
|
|
process = self.dbg.GetSelectedTarget().process
|
|
thread = process.GetSelectedThread()
|
|
|
|
s = lldb.SBStream()
|
|
self.assertTrue(thread.GetStopReasonExtendedInfoAsJSON(s))
|
|
s = s.GetData()
|
|
data2 = json.loads(s)
|
|
self.assertEqual(data, data2)
|