1756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// Copyright 2009 the V8 project authors. All rights reserved.
2756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// Redistribution and use in source and binary forms, with or without
3756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// modification, are permitted provided that the following conditions are
4756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// met:
5756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick//
6756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick//     * Redistributions of source code must retain the above copyright
7756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick//       notice, this list of conditions and the following disclaimer.
8756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick//     * Redistributions in binary form must reproduce the above
9756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick//       copyright notice, this list of conditions and the following
10756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick//       disclaimer in the documentation and/or other materials provided
11756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick//       with the distribution.
12756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick//     * Neither the name of Google Inc. nor the names of its
13756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick//       contributors may be used to endorse or promote products derived
14756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick//       from this software without specific prior written permission.
15756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick//
16756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
17756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
18756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
19756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
20756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
26756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
28756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// Flags: --expose-debug-as debug
29756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// Get the Debug object exposed from the debug context global object.
30756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain MerrickDebug = debug.Debug
31756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
32756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrickvar exception = null;
33756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrickvar state = 0;
34756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrickvar expected_function_name = null;
35756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrickvar expected_source_line_text = null;
36756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrickvar expected_caller_source_line = null;
37756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrickvar step_in_count = 2;
38756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
39756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// Simple debug event handler which first time will cause 'step in' action
40756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// to get into g.call and than check that execution is pauesed inside
41756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// function 'g'.
42756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrickfunction listener(event, exec_state, event_data, data) {
43756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  try {
44756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick    if (event == Debug.DebugEvent.Break) {
45756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick      if (state == 0) {
46756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick        // Step into f().
47756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick        exec_state.prepareStep(Debug.StepAction.StepIn, step_in_count);
48756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick        state = 2;
49756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick      } else if (state == 2) {
50756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick        assertEquals(expected_source_line_text,
51756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick                     event_data.sourceLineText());
52756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick        assertEquals(expected_function_name, event_data.func().name());
53756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick        state = 3;
54756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick      }
55756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick    }
56756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  } catch(e) {
57756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick    exception = e;
58756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  }
59756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick};
60756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
61756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// Add the debug event listener.
62756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain MerrickDebug.setListener(listener);
63756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
64756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
65589d6979ff2ef66fca2d8fa51404c369ca5e9250Ben Murdochfunction g() {
66756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick   return "s";  // expected line
67756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick}
68756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
69756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrickfunction testFunction() {
70756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  var f = g;
71756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  var s = 1 +f(10);
72756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick}
73756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
74589d6979ff2ef66fca2d8fa51404c369ca5e9250Ben Murdochfunction g2() {
75756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick   return "s2";  // expected line
76756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick}
77756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
78756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrickfunction testFunction2() {
79756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  var f = g2;
80756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  var s = 1 +f(10, 20);
81756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick}
82756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
83756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// Run three times. First time the function will be compiled lazily,
84756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// second time cached version will be used.
85756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrickfor (var i = 0; i < 3; i++) {
86756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  state = 0;
87756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  expected_function_name = 'g';
88756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  expected_source_line_text = '   return "s";  // expected line';
89756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  step_in_count = 2;
90756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  // Set a break point and call to invoke the debug event listener.
91756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  Debug.setBreakPoint(testFunction, 1, 0);
92756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  testFunction();
93756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  assertNull(exception);
94756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  assertEquals(3, state);
95756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick}
96756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
97756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// Test stepping into function call when a breakpoint is set at the place
98756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// of call. Use different pair of functions so that g2 is compiled lazily.
99756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// Run twice: first time function will be compiled lazily, second time
100756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// cached version will be used.
101756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrickfor (var i = 0; i < 3; i++) {
102756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  state = 0;
103756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  expected_function_name = 'g2';
104756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  expected_source_line_text = '   return "s2";  // expected line';
105756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  step_in_count = 1;
106756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  // Set a break point and call to invoke the debug event listener.
107756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  Debug.setBreakPoint(testFunction2, 2, 0);
108756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  testFunction2();
109756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  assertNull(exception);
110756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick  assertEquals(3, state);
111756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick}
112756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
113756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick
114756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain Merrick// Get rid of the debug event listener.
115756813857a4c2a4d8ad2e805969d5768d3cf43a0Iain MerrickDebug.setListener(null);
116