summaryrefslogtreecommitdiff
path: root/packages/Python/lldbsuite/test/functionalities/asan/TestReportData.py
diff options
context:
space:
mode:
Diffstat (limited to 'packages/Python/lldbsuite/test/functionalities/asan/TestReportData.py')
-rw-r--r--packages/Python/lldbsuite/test/functionalities/asan/TestReportData.py95
1 files changed, 0 insertions, 95 deletions
diff --git a/packages/Python/lldbsuite/test/functionalities/asan/TestReportData.py b/packages/Python/lldbsuite/test/functionalities/asan/TestReportData.py
deleted file mode 100644
index ca070fa97dfa..000000000000
--- a/packages/Python/lldbsuite/test/functionalities/asan/TestReportData.py
+++ /dev/null
@@ -1,95 +0,0 @@
-"""
-Test the AddressSanitizer runtime support for report breakpoint and data extraction.
-"""
-
-from __future__ import print_function
-
-
-import os
-import time
-import json
-import lldb
-from lldbsuite.test.decorators import *
-from lldbsuite.test.lldbtest import *
-from lldbsuite.test import lldbutil
-
-
-class AsanTestReportDataCase(TestBase):
-
- mydir = TestBase.compute_mydir(__file__)
-
- @expectedFailureAll(
- oslist=["linux"],
- bugnumber="non-core functionality, need to reenable and fix later (DES 2014.11.07)")
- @skipIfFreeBSD # llvm.org/pr21136 runtimes not yet available by default
- @skipIfRemote
- @skipUnlessAddressSanitizer
- @skipIf(archs=['i386'], bugnumber="llvm.org/PR36710")
- def test(self):
- self.build()
- self.asan_tests()
-
- def setUp(self):
- # Call super's setUp().
- TestBase.setUp(self)
- self.line_malloc = line_number('main.c', '// malloc line')
- self.line_malloc2 = line_number('main.c', '// malloc2 line')
- self.line_free = line_number('main.c', '// free line')
- self.line_breakpoint = line_number('main.c', '// break line')
- self.line_crash = line_number('main.c', '// BOOM line')
- self.col_crash = 16
-
- def asan_tests(self):
- exe = self.getBuildArtifact("a.out")
- self.expect(
- "file " + exe,
- patterns=["Current executable set to .*a.out"])
- self.runCmd("run")
-
- stop_reason = self.dbg.GetSelectedTarget().process.GetSelectedThread().GetStopReason()
- if stop_reason == lldb.eStopReasonExec:
- # On OS X 10.10 and older, we need to re-exec to enable
- # interceptors.
- self.runCmd("continue")
-
- self.expect(
- "thread list",
- "Process should be stopped due to ASan report",
- substrs=[
- 'stopped',
- 'stop reason = Use of deallocated memory'])
-
- self.assertEqual(
- self.dbg.GetSelectedTarget().process.GetSelectedThread().GetStopReason(),
- lldb.eStopReasonInstrumentation)
-
- self.expect("bt", "The backtrace should show the crashing line",
- substrs=['main.c:%d:%d' % (self.line_crash, self.col_crash)])
-
- self.expect(
- "thread info -s",
- "The extended stop info should contain the ASan provided fields",
- substrs=[
- "access_size",
- "access_type",
- "address",
- "pc",
- "description",
- "heap-use-after-free"])
-
- output_lines = self.res.GetOutput().split('\n')
- json_line = '\n'.join(output_lines[2:])
- data = json.loads(json_line)
- self.assertEqual(data["description"], "heap-use-after-free")
- self.assertEqual(data["instrumentation_class"], "AddressSanitizer")
- self.assertEqual(data["stop_type"], "fatal_error")
-
- # now let's try the SB API
- process = self.dbg.GetSelectedTarget().process
- thread = process.GetSelectedThread()
-
- s = lldb.SBStream()
- self.assertTrue(thread.GetStopReasonExtendedInfoAsJSON(s))
- s = s.GetData()
- data2 = json.loads(s)
- self.assertEqual(data, data2)