blob: 41da55f3f62d3931f05d5e4f20520b260b433df4 [file] [log] [blame]
Jason Molenda811d2592013-06-05 02:56:58 +00001# This implements the "diagnose-unwind" command, usually installed
2# in the debug session like
Enrico Granataa5c03082013-05-30 23:36:47 +00003# command script import lldb.diagnose
Jason Molenda811d2592013-06-05 02:56:58 +00004# it is used when lldb's backtrace fails -- it collects and prints
5# information about the stack frames, and tries an alternate unwind
6# algorithm, that will help to understand why lldb's unwind algorithm
7# did not succeed.
Jason Molendacaae3812013-04-23 03:40:32 +00008
Jason Molendacaae3812013-04-23 03:40:32 +00009import optparse
Jason Molenda0f224d22013-04-23 09:38:10 +000010import lldb
Jason Molendacaae3812013-04-23 03:40:32 +000011import re
12import shlex
Jason Molendacaae3812013-04-23 03:40:32 +000013
14# Print the frame number, pc, frame pointer, module UUID and function name
Jason Molenda83592142013-06-19 04:52:55 +000015# Returns the SBModule that contains the PC, if it could be found
Jason Molendacaae3812013-04-23 03:40:32 +000016def backtrace_print_frame (target, frame_num, addr, fp):
17 process = target.GetProcess()
18 addr_for_printing = addr
Jason Molenda64dd73e2013-05-01 01:26:52 +000019 addr_width = process.GetAddressByteSize() * 2
Jason Molendacaae3812013-04-23 03:40:32 +000020 if frame_num > 0:
21 addr = addr - 1
22
23 sbaddr = lldb.SBAddress()
Jason Molenda14c84cd2013-04-30 23:03:56 +000024 try:
25 sbaddr.SetLoadAddress(addr, target)
26 module_description = ""
27 if sbaddr.GetModule():
28 module_filename = ""
29 module_uuid_str = sbaddr.GetModule().GetUUIDString()
30 if module_uuid_str == None:
31 module_uuid_str = ""
32 if sbaddr.GetModule().GetFileSpec():
33 module_filename = sbaddr.GetModule().GetFileSpec().GetFilename()
34 if module_filename == None:
35 module_filename = ""
36 if module_uuid_str != "" or module_filename != "":
37 module_description = '%s %s' % (module_filename, module_uuid_str)
38 except Exception:
Jason Molenda64dd73e2013-05-01 01:26:52 +000039 print '%2d: pc==0x%-*x fp==0x%-*x' % (frame_num, addr_width, addr_for_printing, addr_width, fp)
Jason Molenda14c84cd2013-04-30 23:03:56 +000040 return
Jason Molendacaae3812013-04-23 03:40:32 +000041
Jason Molendacaae3812013-04-23 03:40:32 +000042 sym_ctx = target.ResolveSymbolContextForAddress(sbaddr, lldb.eSymbolContextEverything)
43 if sym_ctx.IsValid() and sym_ctx.GetSymbol().IsValid():
44 function_start = sym_ctx.GetSymbol().GetStartAddress().GetLoadAddress(target)
45 offset = addr - function_start
46 print '%2d: pc==0x%-*x fp==0x%-*x %s %s + %d' % (frame_num, addr_width, addr_for_printing, addr_width, fp, module_description, sym_ctx.GetSymbol().GetName(), offset)
47 else:
48 print '%2d: pc==0x%-*x fp==0x%-*x %s' % (frame_num, addr_width, addr_for_printing, addr_width, fp, module_description)
Jason Molenda83592142013-06-19 04:52:55 +000049 return sbaddr.GetModule()
Jason Molendacaae3812013-04-23 03:40:32 +000050
Jason Molenda83592142013-06-19 04:52:55 +000051# A simple stack walk algorithm that follows the frame chain.
52# Returns a two-element list; the first element is a list of modules
53# seen and the second element is a list of addresses seen during the backtrace.
Jason Molendacaae3812013-04-23 03:40:32 +000054def simple_backtrace(debugger):
55 target = debugger.GetSelectedTarget()
56 process = target.GetProcess()
57 cur_thread = process.GetSelectedThread()
58
Jason Molenda83592142013-06-19 04:52:55 +000059 initial_fp = cur_thread.GetFrameAtIndex(0).GetFP()
Jason Molendacaae3812013-04-23 03:40:32 +000060
61 # If the pseudoreg "fp" isn't recognized, on arm hardcode to r7 which is correct for Darwin programs.
Jason Molenda83592142013-06-19 04:52:55 +000062 if initial_fp == lldb.LLDB_INVALID_ADDRESS and target.triple[0:3] == "arm":
Jason Molendacaae3812013-04-23 03:40:32 +000063 for reggroup in cur_thread.GetFrameAtIndex(1).registers:
64 if reggroup.GetName() == "General Purpose Registers":
65 for reg in reggroup:
66 if reg.GetName() == "r7":
Jason Molenda83592142013-06-19 04:52:55 +000067 initial_fp = int (reg.GetValue(), 16)
68
69 module_list = []
70 address_list = [cur_thread.GetFrameAtIndex(0).GetPC()]
71 this_module = backtrace_print_frame (target, 0, cur_thread.GetFrameAtIndex(0).GetPC(), initial_fp)
72 if this_module != None:
73 module_list.append (this_module)
74 if cur_thread.GetNumFrames() < 2:
Jason Molenda5bd4a462013-07-09 05:08:14 +000075 return [module_list, address_list]
Jason Molenda83592142013-06-19 04:52:55 +000076
77 cur_fp = process.ReadPointerFromMemory (initial_fp, lldb.SBError())
78 cur_pc = process.ReadPointerFromMemory (initial_fp + process.GetAddressByteSize(), lldb.SBError())
Jason Molendacaae3812013-04-23 03:40:32 +000079
80 frame_num = 1
81
82 while cur_pc != 0 and cur_fp != 0 and cur_pc != lldb.LLDB_INVALID_ADDRESS and cur_fp != lldb.LLDB_INVALID_ADDRESS:
Jason Molenda83592142013-06-19 04:52:55 +000083 address_list.append (cur_pc)
84 this_module = backtrace_print_frame (target, frame_num, cur_pc, cur_fp)
Jason Molenda5bd4a462013-07-09 05:08:14 +000085 print_stack_frame (process, cur_fp)
86 print ""
Jason Molenda83592142013-06-19 04:52:55 +000087 if this_module != None:
88 module_list.append (this_module)
Jason Molendacaae3812013-04-23 03:40:32 +000089 frame_num = frame_num + 1
90 next_pc = 0
91 next_fp = 0
92 if target.triple[0:6] == "x86_64" or target.triple[0:4] == "i386" or target.triple[0:3] == "arm":
93 error = lldb.SBError()
94 next_pc = process.ReadPointerFromMemory(cur_fp + process.GetAddressByteSize(), error)
95 if not error.Success():
96 next_pc = 0
97 next_fp = process.ReadPointerFromMemory(cur_fp, error)
98 if not error.Success():
99 next_fp = 0
100 # Clear the 0th bit for arm frames - this indicates it is a thumb frame
101 if target.triple[0:3] == "arm" and (next_pc & 1) == 1:
102 next_pc = next_pc & ~1
103 cur_pc = next_pc
104 cur_fp = next_fp
Jason Molenda83592142013-06-19 04:52:55 +0000105 this_module = backtrace_print_frame (target, frame_num, cur_pc, cur_fp)
Jason Molenda5bd4a462013-07-09 05:08:14 +0000106 print_stack_frame (process, cur_fp)
107 print ""
Jason Molenda83592142013-06-19 04:52:55 +0000108 if this_module != None:
109 module_list.append (this_module)
110 return [module_list, address_list]
Jason Molendacaae3812013-04-23 03:40:32 +0000111
Jason Molenda5bd4a462013-07-09 05:08:14 +0000112def print_stack_frame(process, fp):
113 if fp == 0 or fp == lldb.LLDB_INVALID_ADDRESS or fp == 1:
114 return
115 addr_size = process.GetAddressByteSize()
116 addr = fp - (2 * addr_size)
117 i = 0
118 outline = "Stack frame from $fp-%d: " % (2 * addr_size)
119 error = lldb.SBError()
120 try:
121 while i < 5 and error.Success():
122 address = process.ReadPointerFromMemory(addr + (i * addr_size), error)
123 outline += " 0x%x" % address
124 i += 1
125 print outline
126 except Exception:
127 return
128
Jason Molendaf7305a612013-04-30 03:03:06 +0000129def diagnose_unwind(debugger, command, result, dict):
Jason Molenda811d2592013-06-05 02:56:58 +0000130 """
131Gather diagnostic information to help debug incorrect unwind (backtrace)
132behavior in lldb. When there is a backtrace that doesn't look
133correct, run this command with the correct thread selected and a
134large amount of diagnostic information will be printed, it is likely
135to be helpful when reporting the problem.
136 """
137
Jason Molendacaae3812013-04-23 03:40:32 +0000138 command_args = shlex.split(command)
Jason Molendaf7305a612013-04-30 03:03:06 +0000139 parser = create_diagnose_unwind_options()
Jason Molendacaae3812013-04-23 03:40:32 +0000140 try:
141 (options, args) = parser.parse_args(command_args)
142 except:
143 return
144 target = debugger.GetSelectedTarget()
145 if target:
146 process = target.GetProcess()
147 if process:
148 thread = process.GetSelectedThread()
149 if thread:
Jason Molenda0f224d22013-04-23 09:38:10 +0000150 lldb_versions_match = re.search(r'[lL][lL][dD][bB]-(\d+)([.](\d+))?([.](\d+))?', debugger.GetVersionString())
Jason Molendacaae3812013-04-23 03:40:32 +0000151 lldb_version = 0
152 lldb_minor = 0
Jason Molenda0f224d22013-04-23 09:38:10 +0000153 if len(lldb_versions_match.groups()) >= 1 and lldb_versions_match.groups()[0]:
154 lldb_major = int(lldb_versions_match.groups()[0])
155 if len(lldb_versions_match.groups()) >= 5 and lldb_versions_match.groups()[4]:
156 lldb_minor = int(lldb_versions_match.groups()[4])
Jason Molendacaae3812013-04-23 03:40:32 +0000157
Jason Molenda83592142013-06-19 04:52:55 +0000158 modules_seen = []
159 addresses_seen = []
160
Jason Molenda811d2592013-06-05 02:56:58 +0000161 print 'LLDB version %s' % debugger.GetVersionString()
Jason Molendacaae3812013-04-23 03:40:32 +0000162 print 'Unwind diagnostics for thread %d' % thread.GetIndexID()
163 print ""
Jason Molenda13329882013-06-20 21:57:34 +0000164 print "============================================================================================="
165 print ""
Jason Molendae445f8f2013-06-20 22:05:35 +0000166 print "OS plugin setting:"
167 debugger.HandleCommand("settings show target.process.python-os-plugin-path")
168 print ""
Jason Molenda13329882013-06-20 21:57:34 +0000169 print "Live register context:"
170 thread.SetSelectedFrame(0)
171 debugger.HandleCommand("register read")
172 print ""
173 print "============================================================================================="
174 print ""
Jason Molendacaae3812013-04-23 03:40:32 +0000175 print "lldb's unwind algorithm:"
176 print ""
177 frame_num = 0
178 for frame in thread.frames:
179 if not frame.IsInlined():
Jason Molenda83592142013-06-19 04:52:55 +0000180 this_module = backtrace_print_frame (target, frame_num, frame.GetPC(), frame.GetFP())
Jason Molenda5bd4a462013-07-09 05:08:14 +0000181 print_stack_frame (process, frame.GetFP())
182 print ""
Jason Molenda83592142013-06-19 04:52:55 +0000183 if this_module != None:
184 modules_seen.append (this_module)
185 addresses_seen.append (frame.GetPC())
Jason Molendacaae3812013-04-23 03:40:32 +0000186 frame_num = frame_num + 1
187 print ""
188 print "============================================================================================="
189 print ""
190 print "Simple stack walk algorithm:"
191 print ""
Jason Molenda5bd4a462013-07-09 05:08:14 +0000192 (module_list, address_list) = simple_backtrace(debugger)
193 if module_list and module_list != None:
194 modules_seen += module_list
195 if address_list and address_list != None:
196 addresses_seen = set(addresses_seen)
197 addresses_seen.update(set(address_list))
Jason Molenda83592142013-06-19 04:52:55 +0000198
Jason Molendacaae3812013-04-23 03:40:32 +0000199 print ""
200 print "============================================================================================="
201 print ""
Jason Molenda83592142013-06-19 04:52:55 +0000202 print "Modules seen in stack walks:"
203 print ""
204 modules_already_seen = set()
205 for module in modules_seen:
206 if module != None and module.GetFileSpec().GetFilename() != None:
207 if not module.GetFileSpec().GetFilename() in modules_already_seen:
208 debugger.HandleCommand('image list %s' % module.GetFileSpec().GetFilename())
209 modules_already_seen.add(module.GetFileSpec().GetFilename())
210
211 print ""
212 print "============================================================================================="
213 print ""
214 print "Disassembly ofaddresses seen in stack walks:"
215 print ""
216 additional_addresses_to_disassemble = addresses_seen
Jason Molendacaae3812013-04-23 03:40:32 +0000217 for frame in thread.frames:
218 if not frame.IsInlined():
219 print "--------------------------------------------------------------------------------------"
220 print ""
Jason Molenda83592142013-06-19 04:52:55 +0000221 print "Disassembly of %s, frame %d, address 0x%x" % (frame.GetFunctionName(), frame.GetFrameID(), frame.GetPC())
Jason Molendacaae3812013-04-23 03:40:32 +0000222 print ""
Jason Molenda83592142013-06-19 04:52:55 +0000223 if target.triple[0:6] == "x86_64" or target.triple[0:4] == "i386":
224 debugger.HandleCommand('disassemble -F att -a 0x%x' % frame.GetPC())
Jason Molendacaae3812013-04-23 03:40:32 +0000225 else:
Jason Molenda83592142013-06-19 04:52:55 +0000226 debugger.HandleCommand('disassemble -a 0x%x' % frame.GetPC())
227 if frame.GetPC() in additional_addresses_to_disassemble:
228 additional_addresses_to_disassemble.remove (frame.GetPC())
229
230 for address in list(additional_addresses_to_disassemble):
231 print "--------------------------------------------------------------------------------------"
232 print ""
233 print "Disassembly of 0x%x" % address
234 print ""
235 if target.triple[0:6] == "x86_64" or target.triple[0:4] == "i386":
236 debugger.HandleCommand('disassemble -F att -a 0x%x' % address)
237 else:
238 debugger.HandleCommand('disassemble -a 0x%x' % address)
239
Jason Molendacaae3812013-04-23 03:40:32 +0000240 print ""
241 print "============================================================================================="
242 print ""
Jason Molenda83592142013-06-19 04:52:55 +0000243 additional_addresses_to_show_unwind = addresses_seen
Jason Molendacaae3812013-04-23 03:40:32 +0000244 for frame in thread.frames:
245 if not frame.IsInlined():
246 print "--------------------------------------------------------------------------------------"
247 print ""
248 print "Unwind instructions for %s, frame %d" % (frame.GetFunctionName(), frame.GetFrameID())
249 print ""
Jason Molenda83592142013-06-19 04:52:55 +0000250 debugger.HandleCommand('image show-unwind -a "0x%x"' % frame.GetPC())
251 if frame.GetPC() in additional_addresses_to_show_unwind:
252 additional_addresses_to_show_unwind.remove (frame.GetPC())
253
254 for address in list(additional_addresses_to_show_unwind):
255 print "--------------------------------------------------------------------------------------"
256 print ""
257 print "Unwind instructions for 0x%x" % address
258 print ""
259 debugger.HandleCommand('image show-unwind -a "0x%x"' % address)
Jason Molendacaae3812013-04-23 03:40:32 +0000260
Jason Molendaf7305a612013-04-30 03:03:06 +0000261def create_diagnose_unwind_options():
Jason Molendacaae3812013-04-23 03:40:32 +0000262 usage = "usage: %prog"
263 description='''Print diagnostic information about a thread backtrace which will help to debug unwind problems'''
Jason Molendaf7305a612013-04-30 03:03:06 +0000264 parser = optparse.OptionParser(description=description, prog='diagnose_unwind',usage=usage)
Jason Molendacaae3812013-04-23 03:40:32 +0000265 return parser
266
Jason Molendaf7305a612013-04-30 03:03:06 +0000267lldb.debugger.HandleCommand('command script add -f %s.diagnose_unwind diagnose-unwind' % __name__)
268print 'The "diagnose-unwind" command has been installed, type "help diagnose-unwind" for detailed help.'