These tests fail if you build without the x86 llvm backend. Either because they use an x86 triple or try to backtrace which requires some x86 knowledge to see all frames. Reviewed By: labath Differential Revision: https://reviews.llvm.org/D100194
47 lines
2.0 KiB
Plaintext
47 lines
2.0 KiB
Plaintext
# REQUIRES: x86
|
|
|
|
# RUN: yaml2obj %S/Inputs/unwind-via-stack-win.yaml -o %t
|
|
# RUN: %lldb -c %t \
|
|
# RUN: -o "target symbols add %S/Inputs/unwind-via-raSearch.syms" \
|
|
# RUN: -s %s -b | FileCheck %s
|
|
|
|
# First check that unwind plan generation works correctly.
|
|
# This function has a "typical" unwind rule.
|
|
image show-unwind -n call_many
|
|
# CHECK-LABEL: image show-unwind -n call_many
|
|
# CHECK: UNWIND PLANS for unwind-via-stack-win.exe`call_many
|
|
# CHECK: Symbol file UnwindPlan:
|
|
# CHECK: This UnwindPlan originally sourced from breakpad STACK WIN
|
|
# CHECK: This UnwindPlan is sourced from the compiler: yes.
|
|
# CHECK: This UnwindPlan is valid at all instruction locations: no.
|
|
# CHECK: This UnwindPlan is for a trap handler function: no.
|
|
# CHECK: Address range of this UnwindPlan: [unwind-via-stack-win.exe..module_image + 4112-0x0000107d)
|
|
# CHECK: row[0]: 0: CFA=RaSearch@SP+0 => esp=DW_OP_pick 0x0, DW_OP_consts +4, DW_OP_plus eip=DW_OP_pick 0x0, DW_OP_deref
|
|
|
|
image show-unwind -n nonzero_frame_size
|
|
# CHECK-LABEL: image show-unwind -n nonzero_frame_size
|
|
# CHECK: UNWIND PLANS for unwind-via-stack-win.exe`nonzero_frame_size
|
|
# CHECK: Symbol file UnwindPlan:
|
|
# CHECK: row[0]: 0: CFA=RaSearch@SP+12 => esp=DW_OP_pick 0x0, DW_OP_consts +4, DW_OP_plus eip=DW_OP_pick 0x0, DW_OP_deref
|
|
|
|
# Then, some invalid rules.
|
|
image show-unwind -n complex_rasearch
|
|
# CHECK-LABEL: image show-unwind -n complex_rasearch
|
|
# CHECK: UNWIND PLANS for unwind-via-stack-win.exe`complex_rasearch
|
|
# CHECK-NOT: Symbol file
|
|
|
|
image show-unwind -n esp_rasearch
|
|
# CHECK-LABEL: image show-unwind -n esp_rasearch
|
|
# CHECK: UNWIND PLANS for unwind-via-stack-win.exe`esp_rasearch
|
|
# CHECK-NOT: Symbol file
|
|
|
|
# And finally, check that backtracing works as a whole by unwinding a simple
|
|
# stack.
|
|
thread backtrace
|
|
# CHECK-LABEL: thread backtrace
|
|
# CHECK: frame #0: 0x000b1092 unwind-via-stack-win.exe`many_pointer_args
|
|
# CHECK: frame #1: 0x000b1079 unwind-via-stack-win.exe`call_many + 105
|
|
# CHECK: frame #2: 0x000b1085 unwind-via-stack-win.exe`main + 5
|
|
# CHECK: frame #3: 0x77278494 kernel32.dll
|
|
# CHECK-NOT: frame
|