mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
151 lines
5.1 KiB
Python
151 lines
5.1 KiB
Python
#!/usr/bin/env python
|
|
import re
|
|
from pprint import pformat
|
|
|
|
from test_panic_util.test_panic_util import get_dut
|
|
|
|
|
|
def get_default_backtrace(test_name):
|
|
return [
|
|
test_name,
|
|
'app_main',
|
|
'main_task',
|
|
'vPortTaskWrapper'
|
|
]
|
|
|
|
|
|
def test_common(dut, test_name, expected_backtrace=None):
|
|
if expected_backtrace is None:
|
|
expected_backtrace = get_default_backtrace(dut.test_name)
|
|
|
|
if 'gdbstub' in test_name:
|
|
dut.start_gdb()
|
|
frames = dut.gdb_backtrace()
|
|
if not dut.match_backtrace(frames, expected_backtrace):
|
|
raise AssertionError('Unexpected backtrace in test {}:\n{}'.format(test_name, pformat(frames)))
|
|
return
|
|
|
|
if 'uart' in test_name:
|
|
dut.expect(dut.COREDUMP_UART_END)
|
|
|
|
dut.expect('Rebooting...')
|
|
|
|
if 'uart' in test_name:
|
|
dut.process_coredump_uart()
|
|
# TODO: check backtrace
|
|
elif 'flash' in test_name:
|
|
dut.process_coredump_flash()
|
|
# TODO: check backtrace
|
|
elif 'panic' in test_name:
|
|
# TODO: check backtrace
|
|
pass
|
|
|
|
|
|
def task_wdt_inner(env, test_name):
|
|
with get_dut(env, test_name, 'test_task_wdt', qemu_wdt_enable=True) as dut:
|
|
dut.expect('Task watchdog got triggered. The following tasks did not reset the watchdog in time:')
|
|
dut.expect('CPU 0: main')
|
|
dut.expect(re.compile(r'abort\(\) was called at PC [0-9xa-f]+ on core 0'))
|
|
dut.expect_none('register dump:')
|
|
dut.expect_backtrace()
|
|
dut.expect_elf_sha256()
|
|
dut.expect_none('Guru Meditation')
|
|
test_common(dut, test_name, expected_backtrace=[
|
|
# Backtrace interrupted when abort is called, IDF-842.
|
|
# Task WDT calls abort internally.
|
|
'panic_abort', 'esp_system_abort'
|
|
])
|
|
|
|
|
|
def int_wdt_inner(env, test_name):
|
|
with get_dut(env, test_name, 'test_int_wdt', qemu_wdt_enable=True) as dut:
|
|
dut.expect_gme('Interrupt wdt timeout on CPU0')
|
|
dut.expect_reg_dump(0)
|
|
dut.expect_backtrace()
|
|
dut.expect_none('Guru Meditation')
|
|
dut.expect_reg_dump(1)
|
|
dut.expect_backtrace()
|
|
dut.expect_elf_sha256()
|
|
dut.expect_none('Guru Meditation')
|
|
test_common(dut, test_name)
|
|
|
|
|
|
def int_wdt_cache_disabled_inner(env, test_name):
|
|
with get_dut(env, test_name, 'test_int_wdt_cache_disabled', qemu_wdt_enable=True) as dut:
|
|
dut.expect('Re-enable cpu cache.')
|
|
dut.expect_gme('Interrupt wdt timeout on CPU0')
|
|
dut.expect_reg_dump(0)
|
|
dut.expect('Backtrace:')
|
|
dut.expect_none('Guru Meditation')
|
|
dut.expect_reg_dump(1)
|
|
dut.expect_backtrace()
|
|
dut.expect_elf_sha256()
|
|
dut.expect_none('Guru Meditation')
|
|
test_common(dut, test_name)
|
|
|
|
|
|
def cache_error_inner(env, test_name):
|
|
with get_dut(env, test_name, 'test_cache_error') as dut:
|
|
dut.expect('Re-enable cpu cache.')
|
|
dut.expect_gme('Cache disabled but cached memory region accessed')
|
|
dut.expect_reg_dump(0)
|
|
dut.expect_backtrace()
|
|
dut.expect_elf_sha256()
|
|
dut.expect_none('Guru Meditation')
|
|
test_common(dut, test_name,
|
|
expected_backtrace=['die'] + get_default_backtrace(dut.test_name))
|
|
|
|
|
|
def abort_inner(env, test_name):
|
|
with get_dut(env, test_name, 'test_abort') as dut:
|
|
dut.expect(re.compile(r'abort\(\) was called at PC [0-9xa-f]+ on core 0'))
|
|
dut.expect_backtrace()
|
|
dut.expect_elf_sha256()
|
|
dut.expect_none('Guru Meditation', 'Re-entered core dump')
|
|
test_common(dut, test_name, expected_backtrace=[
|
|
# Backtrace interrupted when abort is called, IDF-842
|
|
'panic_abort', 'esp_system_abort'
|
|
])
|
|
|
|
|
|
def storeprohibited_inner(env, test_name):
|
|
with get_dut(env, test_name, 'test_storeprohibited') as dut:
|
|
dut.expect_gme('StoreProhibited')
|
|
dut.expect_reg_dump(0)
|
|
dut.expect_backtrace()
|
|
dut.expect_elf_sha256()
|
|
dut.expect_none('Guru Meditation')
|
|
test_common(dut, test_name)
|
|
|
|
|
|
def stack_overflow_inner(env, test_name):
|
|
with get_dut(env, test_name, 'test_stack_overflow') as dut:
|
|
dut.expect_gme('Unhandled debug exception')
|
|
dut.expect('Stack canary watchpoint triggered (main)')
|
|
dut.expect_reg_dump(0)
|
|
dut.expect_backtrace()
|
|
dut.expect_elf_sha256()
|
|
dut.expect_none('Guru Meditation')
|
|
test_common(dut, test_name)
|
|
|
|
|
|
def illegal_instruction_inner(env, test_name):
|
|
with get_dut(env, test_name, 'test_illegal_instruction') as dut:
|
|
dut.expect_gme('IllegalInstruction')
|
|
dut.expect_reg_dump(0)
|
|
dut.expect_backtrace()
|
|
dut.expect_elf_sha256()
|
|
dut.expect_none('Guru Meditation')
|
|
test_common(dut, test_name)
|
|
|
|
|
|
def instr_fetch_prohibited_inner(env, test_name):
|
|
with get_dut(env, test_name, 'test_instr_fetch_prohibited') as dut:
|
|
dut.expect_gme('InstrFetchProhibited')
|
|
dut.expect_reg_dump(0)
|
|
dut.expect_backtrace()
|
|
dut.expect_elf_sha256()
|
|
dut.expect_none('Guru Meditation')
|
|
test_common(dut, test_name,
|
|
expected_backtrace=['_init'] + get_default_backtrace(dut.test_name))
|