blob: 88846c99b3a4747d7a471f685c3c87ced47db85c [file] [log] [blame]
Greg Clayton3c2c4bb2012-04-03 21:35:43 +00001#!/usr/bin/python
2
3#----------------------------------------------------------------------
4# Be sure to add the python path that points to the LLDB shared library.
5#
6# To use this in the embedded python interpreter using "lldb":
7#
8# cd /path/containing/crashlog.py
9# lldb
10# (lldb) script import crashlog
11# "crashlog" command installed, type "crashlog --help" for detailed help
12# (lldb) crashlog ~/Library/Logs/DiagnosticReports/a.crash
13#
14# The benefit of running the crashlog command inside lldb in the
15# embedded python interpreter is when the command completes, there
16# will be a target with all of the files loaded at the locations
17# described in the crash log. Only the files that have stack frames
18# in the backtrace will be loaded unless the "--load-all" option
19# has been specified. This allows users to explore the program in the
20# state it was in right at crash time.
21#
22# On MacOSX csh, tcsh:
23# ( setenv PYTHONPATH /path/to/LLDB.framework/Resources/Python ; ./crashlog.py ~/Library/Logs/DiagnosticReports/a.crash )
24#
25# On MacOSX sh, bash:
26# PYTHONPATH=/path/to/LLDB.framework/Resources/Python ./crashlog.py ~/Library/Logs/DiagnosticReports/a.crash
27#----------------------------------------------------------------------
28
29import lldb
30import commands
31import optparse
32import os
33import plistlib
34import re
35import shlex
36import sys
37import time
38import uuid
39
40class Address:
41 """Class that represents an address that will be symbolicated"""
42 def __init__(self, target, load_addr):
43 self.target = target
44 self.load_addr = load_addr # The load address that this object represents
45 self.so_addr = None # the resolved lldb.SBAddress (if any), named so_addr for section/offset address
46 self.sym_ctx = None # The cached symbol context for this address
47 self.description = None # Any original textual description of this address to be used as a backup in case symbolication fails
48 self.symbolication = None # The cached symbolicated string that describes this address
49 self.inlined = False
50 def __str__(self):
51 s = "%#16.16x" % (self.load_addr)
52 if self.symbolication:
53 s += " %s" % (self.symbolication)
54 elif self.description:
55 s += " %s" % (self.description)
56 elif self.so_addr:
57 s += " %s" % (self.so_addr)
58 return s
59
60 def resolve_addr(self):
61 if self.so_addr == None:
62 self.so_addr = self.target.ResolveLoadAddress (self.load_addr)
63 return self.so_addr
64
65 def is_inlined(self):
66 return self.inlined
67
68 def get_symbol_context(self):
69 if self.sym_ctx == None:
70 sb_addr = self.resolve_addr()
71 if sb_addr:
72 self.sym_ctx = self.target.ResolveSymbolContextForAddress (sb_addr, lldb.eSymbolContextEverything)
73 else:
74 self.sym_ctx = lldb.SBSymbolContext()
75 return self.sym_ctx
76
77 def get_instructions(self):
78 sym_ctx = self.get_symbol_context()
79 if sym_ctx:
80 function = sym_ctx.GetFunction()
81 if function:
82 return function.GetInstructions(self.target)
83 return sym_ctx.GetSymbol().GetInstructions(self.target)
84 return None
85
Greg Claytona7fb1dc2012-06-28 18:10:14 +000086 def symbolicate(self, verbose = False):
Greg Clayton3c2c4bb2012-04-03 21:35:43 +000087 if self.symbolication == None:
88 self.symbolication = ''
89 self.inlined = False
90 sym_ctx = self.get_symbol_context()
91 if sym_ctx:
92 module = sym_ctx.GetModule()
93 if module:
Greg Claytona7fb1dc2012-06-28 18:10:14 +000094 # Print full source file path in verbose mode
95 if verbose:
96 self.symbolication += str(module.GetFileSpec()) + '`'
97 else:
98 self.symbolication += module.GetFileSpec().GetFilename() + '`'
Greg Clayton3c2c4bb2012-04-03 21:35:43 +000099 function_start_load_addr = -1
100 function = sym_ctx.GetFunction()
101 block = sym_ctx.GetBlock()
102 line_entry = sym_ctx.GetLineEntry()
103 symbol = sym_ctx.GetSymbol()
104 inlined_block = block.GetContainingInlinedBlock();
105 if function:
106 self.symbolication += function.GetName()
107
108 if inlined_block:
109 self.inlined = True
110 self.symbolication += ' [inlined] ' + inlined_block.GetInlinedName();
111 block_range_idx = inlined_block.GetRangeIndexForBlockAddress (self.so_addr)
112 if block_range_idx < lldb.UINT32_MAX:
113 block_range_start_addr = inlined_block.GetRangeStartAddress (block_range_idx)
114 function_start_load_addr = block_range_start_addr.GetLoadAddress (self.target)
115 if function_start_load_addr == -1:
116 function_start_load_addr = function.GetStartAddress().GetLoadAddress (self.target)
117 elif symbol:
118 self.symbolication += symbol.GetName()
119 function_start_load_addr = symbol.GetStartAddress().GetLoadAddress (self.target)
120 else:
121 self.symbolication = ''
122 return False
123
124 # Dump the offset from the current function or symbol if it is non zero
125 function_offset = self.load_addr - function_start_load_addr
126 if function_offset > 0:
127 self.symbolication += " + %u" % (function_offset)
128 elif function_offset < 0:
129 self.symbolication += " %i (invalid negative offset, file a bug) " % function_offset
130
131 # Print out any line information if any is available
132 if line_entry.GetFileSpec():
Greg Claytona7fb1dc2012-06-28 18:10:14 +0000133 # Print full source file path in verbose mode
134 if verbose:
135 self.symbolication += ' at %s' % line_entry.GetFileSpec()
136 else:
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000137 self.symbolication += ' at %s' % line_entry.GetFileSpec().GetFilename()
Greg Claytona7fb1dc2012-06-28 18:10:14 +0000138 self.symbolication += ':%u' % line_entry.GetLine ()
139 column = line_entry.GetColumn()
140 if column > 0:
141 self.symbolication += ':%u' % column
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000142 return True
143 return False
144
145class Section:
146 """Class that represents an load address range"""
147 sect_info_regex = re.compile('(?P<name>[^=]+)=(?P<range>.*)')
148 addr_regex = re.compile('^\s*(?P<start>0x[0-9A-Fa-f]+)\s*$')
149 range_regex = re.compile('^\s*(?P<start>0x[0-9A-Fa-f]+)\s*(?P<op>[-+])\s*(?P<end>0x[0-9A-Fa-f]+)\s*$')
150
151 def __init__(self, start_addr = None, end_addr = None, name = None):
152 self.start_addr = start_addr
153 self.end_addr = end_addr
154 self.name = name
155
Greg Clayton641c23f2014-05-28 00:21:15 +0000156 @classmethod
157 def InitWithSBTargetAndSBSection(cls, target, section):
158 sect_load_addr = section.GetLoadAddress(target)
159 if sect_load_addr != lldb.LLDB_INVALID_ADDRESS:
160 obj = cls(sect_load_addr, sect_load_addr + section.size, section.name)
161 return obj
162 else:
163 return None
164
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000165 def contains(self, addr):
166 return self.start_addr <= addr and addr < self.end_addr;
167
168 def set_from_string(self, s):
169 match = self.sect_info_regex.match (s)
170 if match:
171 self.name = match.group('name')
172 range_str = match.group('range')
173 addr_match = self.addr_regex.match(range_str)
174 if addr_match:
175 self.start_addr = int(addr_match.group('start'), 16)
176 self.end_addr = None
177 return True
178
179 range_match = self.range_regex.match(range_str)
180 if range_match:
181 self.start_addr = int(range_match.group('start'), 16)
182 self.end_addr = int(range_match.group('end'), 16)
183 op = range_match.group('op')
184 if op == '+':
185 self.end_addr += self.start_addr
186 return True
187 print 'error: invalid section info string "%s"' % s
188 print 'Valid section info formats are:'
189 print 'Format Example Description'
190 print '--------------------- -----------------------------------------------'
191 print '<name>=<base> __TEXT=0x123000 Section from base address only'
192 print '<name>=<base>-<end> __TEXT=0x123000-0x124000 Section from base address and end address'
193 print '<name>=<base>+<size> __TEXT=0x123000+0x1000 Section from base address and size'
194 return False
195
196 def __str__(self):
197 if self.name:
198 if self.end_addr != None:
199 if self.start_addr != None:
200 return "%s=[0x%16.16x - 0x%16.16x)" % (self.name, self.start_addr, self.end_addr)
201 else:
202 if self.start_addr != None:
203 return "%s=0x%16.16x" % (self.name, self.start_addr)
204 return self.name
205 return "<invalid>"
206
207class Image:
208 """A class that represents an executable image and any associated data"""
209
210 def __init__(self, path, uuid = None):
211 self.path = path
212 self.resolved_path = None
Greg Claytonf51a23f2012-06-04 23:22:17 +0000213 self.resolved = False
214 self.unavailable = False
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000215 self.uuid = uuid
216 self.section_infos = list()
217 self.identifier = None
218 self.version = None
219 self.arch = None
220 self.module = None
221 self.symfile = None
222 self.slide = None
Greg Claytona16cb162013-04-04 23:36:51 +0000223
Greg Clayton641c23f2014-05-28 00:21:15 +0000224 @classmethod
225 def InitWithSBTargetAndSBModule(cls, target, module):
Bruce Mitcheneradb99822015-09-22 05:07:56 +0000226 '''Initialize this Image object with a module from a target.'''
Greg Clayton641c23f2014-05-28 00:21:15 +0000227 obj = cls(module.file.fullpath, module.uuid)
228 obj.resolved_path = module.platform_file.fullpath
229 obj.resolved = True
230 obj.arch = module.triple
231 for section in module.sections:
232 symb_section = Section.InitWithSBTargetAndSBSection(target, section)
233 if symb_section:
234 obj.section_infos.append (symb_section)
235 obj.arch = module.triple
236 obj.module = module
237 obj.symfile = None
238 obj.slide = None
239 return obj
240
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000241 def dump(self, prefix):
242 print "%s%s" % (prefix, self)
Greg Clayton1f746072012-08-29 21:13:06 +0000243
244 def debug_dump(self):
245 print 'path = "%s"' % (self.path)
246 print 'resolved_path = "%s"' % (self.resolved_path)
247 print 'resolved = %i' % (self.resolved)
248 print 'unavailable = %i' % (self.unavailable)
249 print 'uuid = %s' % (self.uuid)
250 print 'section_infos = %s' % (self.section_infos)
251 print 'identifier = "%s"' % (self.identifier)
252 print 'version = %s' % (self.version)
253 print 'arch = %s' % (self.arch)
254 print 'module = %s' % (self.module)
255 print 'symfile = "%s"' % (self.symfile)
256 print 'slide = %i (0x%x)' % (self.slide, self.slide)
257
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000258 def __str__(self):
Greg Clayton641c23f2014-05-28 00:21:15 +0000259 s = ''
260 if self.uuid:
261 s += "%s " % (self.get_uuid())
262 if self.arch:
263 s += "%s " % (self.arch)
264 if self.version:
265 s += "%s " % (self.version)
266 resolved_path = self.get_resolved_path()
267 if resolved_path:
268 s += "%s " % (resolved_path)
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000269 for section_info in self.section_infos:
270 s += ", %s" % (section_info)
271 if self.slide != None:
272 s += ', slide = 0x%16.16x' % self.slide
273 return s
274
275 def add_section(self, section):
276 #print "added '%s' to '%s'" % (section, self.path)
277 self.section_infos.append (section)
278
279 def get_section_containing_load_addr (self, load_addr):
280 for section_info in self.section_infos:
281 if section_info.contains(load_addr):
282 return section_info
283 return None
284
285 def get_resolved_path(self):
286 if self.resolved_path:
287 return self.resolved_path
288 elif self.path:
289 return self.path
290 return None
291
292 def get_resolved_path_basename(self):
293 path = self.get_resolved_path()
294 if path:
295 return os.path.basename(path)
296 return None
297
298 def symfile_basename(self):
299 if self.symfile:
300 return os.path.basename(self.symfile)
301 return None
302
303 def has_section_load_info(self):
304 return self.section_infos or self.slide != None
305
306 def load_module(self, target):
Greg Claytonf51a23f2012-06-04 23:22:17 +0000307 if self.unavailable:
308 return None # We already warned that we couldn't find this module, so don't return an error string
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000309 # Load this module into "target" using the section infos to
310 # set the section load addresses
311 if self.has_section_load_info():
312 if target:
313 if self.module:
314 if self.section_infos:
315 num_sections_loaded = 0
316 for section_info in self.section_infos:
317 if section_info.name:
318 section = self.module.FindSection (section_info.name)
319 if section:
320 error = target.SetSectionLoadAddress (section, section_info.start_addr)
321 if error.Success():
322 num_sections_loaded += 1
323 else:
324 return 'error: %s' % error.GetCString()
325 else:
326 return 'error: unable to find the section named "%s"' % section_info.name
327 else:
328 return 'error: unable to find "%s" section in "%s"' % (range.name, self.get_resolved_path())
329 if num_sections_loaded == 0:
330 return 'error: no sections were successfully loaded'
331 else:
332 err = target.SetModuleLoadAddress(self.module, self.slide)
333 if err.Fail():
334 return err.GetCString()
335 return None
336 else:
337 return 'error: invalid module'
338 else:
339 return 'error: invalid target'
340 else:
341 return 'error: no section infos'
342
343 def add_module(self, target):
344 '''Add the Image described in this object to "target" and load the sections if "load" is True.'''
345 if target:
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000346 # Try and find using UUID only first so that paths need not match up
Greg Clayton60bb58f2012-05-11 00:30:14 +0000347 uuid_str = self.get_normalized_uuid_string()
348 if uuid_str:
349 self.module = target.AddModule (None, None, uuid_str)
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000350 if not self.module:
Greg Claytonf99295c2012-04-20 23:31:27 +0000351 self.locate_module_and_debug_symbols ()
Greg Claytonf51a23f2012-06-04 23:22:17 +0000352 if self.unavailable:
353 return None
Greg Claytonf99295c2012-04-20 23:31:27 +0000354 resolved_path = self.get_resolved_path()
Greg Clayton60bb58f2012-05-11 00:30:14 +0000355 self.module = target.AddModule (resolved_path, self.arch, uuid_str, self.symfile)
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000356 if not self.module:
Greg Claytonf99295c2012-04-20 23:31:27 +0000357 return 'error: unable to get module for (%s) "%s"' % (self.arch, self.get_resolved_path())
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000358 if self.has_section_load_info():
359 return self.load_module(target)
360 else:
361 return None # No sections, the module was added to the target, so success
362 else:
363 return 'error: invalid target'
364
365 def locate_module_and_debug_symbols (self):
366 # By default, just use the paths that were supplied in:
367 # self.path
368 # self.resolved_path
369 # self.module
370 # self.symfile
371 # Subclasses can inherit from this class and override this function
Greg Claytonf51a23f2012-06-04 23:22:17 +0000372 self.resolved = True
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000373 return True
374
375 def get_uuid(self):
Greg Clayton60bb58f2012-05-11 00:30:14 +0000376 if not self.uuid and self.module:
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000377 self.uuid = uuid.UUID(self.module.GetUUIDString())
378 return self.uuid
379
Greg Clayton60bb58f2012-05-11 00:30:14 +0000380 def get_normalized_uuid_string(self):
381 if self.uuid:
382 return str(self.uuid).upper()
383 return None
384
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000385 def create_target(self):
386 '''Create a target using the information in this Image object.'''
Greg Claytonf51a23f2012-06-04 23:22:17 +0000387 if self.unavailable:
388 return None
389
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000390 if self.locate_module_and_debug_symbols ():
391 resolved_path = self.get_resolved_path();
392 path_spec = lldb.SBFileSpec (resolved_path)
393 #result.PutCString ('plist[%s] = %s' % (uuid, self.plist))
394 error = lldb.SBError()
395 target = lldb.debugger.CreateTarget (resolved_path, self.arch, None, False, error);
396 if target:
397 self.module = target.FindModule(path_spec)
398 if self.has_section_load_info():
399 err = self.load_module(target)
400 if err:
401 print 'ERROR: ', err
402 return target
403 else:
404 print 'error: unable to create a valid target for (%s) "%s"' % (self.arch, self.path)
405 else:
406 print 'error: unable to locate main executable (%s) "%s"' % (self.arch, self.path)
407 return None
408
409class Symbolicator:
410
411 def __init__(self):
412 """A class the represents the information needed to symbolicate addresses in a program"""
413 self.target = None
414 self.images = list() # a list of images to be used when symbolicating
Greg Claytona16cb162013-04-04 23:36:51 +0000415 self.addr_mask = 0xffffffffffffffff
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000416
Greg Clayton641c23f2014-05-28 00:21:15 +0000417 @classmethod
418 def InitWithSBTarget(cls, target):
419 obj = cls()
420 obj.target = target
421 obj.images = list();
422 triple = target.triple
423 if triple:
424 arch = triple.split('-')[0]
425 if "arm" in arch:
426 obj.addr_mask = 0xfffffffffffffffe
427
428 for module in target.modules:
429 image = Image.InitWithSBTargetAndSBModule(target, module)
430 obj.images.append(image)
431 return obj
432
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000433 def __str__(self):
434 s = "Symbolicator:\n"
435 if self.target:
436 s += "Target = '%s'\n" % (self.target)
Greg Clayton641c23f2014-05-28 00:21:15 +0000437 s += "Target modules:\n"
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000438 for m in self.target.modules:
Greg Clayton641c23f2014-05-28 00:21:15 +0000439 s += str(m) + "\n"
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000440 s += "Images:\n"
441 for image in self.images:
442 s += ' %s\n' % (image)
443 return s
444
445 def find_images_with_identifier(self, identifier):
446 images = list()
447 for image in self.images:
448 if image.identifier == identifier:
449 images.append(image)
Greg Clayton48d157d2015-03-05 22:53:06 +0000450 if len(images) == 0:
Greg Clayton6c42aa72016-06-10 20:09:33 +0000451 regex_text = '^.*\.%s$' % (re.escape(identifier))
Greg Clayton48d157d2015-03-05 22:53:06 +0000452 regex = re.compile(regex_text)
453 for image in self.images:
454 if regex.match(image.identifier):
455 images.append(image)
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000456 return images
457
458 def find_image_containing_load_addr(self, load_addr):
459 for image in self.images:
Greg Claytonf51a23f2012-06-04 23:22:17 +0000460 if image.get_section_containing_load_addr (load_addr):
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000461 return image
462 return None
463
464 def create_target(self):
465 if self.target:
466 return self.target
467
468 if self.images:
469 for image in self.images:
470 self.target = image.create_target ()
471 if self.target:
Greg Claytona16cb162013-04-04 23:36:51 +0000472 if self.target.GetAddressByteSize() == 4:
473 triple = self.target.triple
474 if triple:
475 arch = triple.split('-')[0]
476 if "arm" in arch:
477 self.addr_mask = 0xfffffffffffffffe
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000478 return self.target
479 return None
480
Greg Clayton641c23f2014-05-28 00:21:15 +0000481
Greg Claytona7fb1dc2012-06-28 18:10:14 +0000482 def symbolicate(self, load_addr, verbose = False):
Greg Claytonf51a23f2012-06-04 23:22:17 +0000483 if not self.target:
484 self.create_target()
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000485 if self.target:
Greg Clayton59c40ff2013-02-25 19:34:57 +0000486 live_process = False
487 process = self.target.process
488 if process:
489 state = process.state
Greg Claytonfdc25152013-02-25 21:20:59 +0000490 if state > lldb.eStateUnloaded and state < lldb.eStateDetached:
Greg Clayton59c40ff2013-02-25 19:34:57 +0000491 live_process = True
492 # If we don't have a live process, we can attempt to find the image
493 # that a load address belongs to and lazily load its module in the
494 # target, but we shouldn't do any of this if we have a live process
495 if not live_process:
496 image = self.find_image_containing_load_addr (load_addr)
497 if image:
498 image.add_module (self.target)
Greg Clayton94073022012-07-07 01:22:45 +0000499 symbolicated_address = Address(self.target, load_addr)
500 if symbolicated_address.symbolicate (verbose):
501 if symbolicated_address.so_addr:
502 symbolicated_addresses = list()
503 symbolicated_addresses.append(symbolicated_address)
504 # See if we were able to reconstruct anything?
505 while 1:
506 inlined_parent_so_addr = lldb.SBAddress()
507 inlined_parent_sym_ctx = symbolicated_address.sym_ctx.GetParentOfInlinedScope (symbolicated_address.so_addr, inlined_parent_so_addr)
508 if not inlined_parent_sym_ctx:
509 break
510 if not inlined_parent_so_addr:
511 break
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000512
Greg Clayton94073022012-07-07 01:22:45 +0000513 symbolicated_address = Address(self.target, inlined_parent_so_addr.GetLoadAddress(self.target))
514 symbolicated_address.sym_ctx = inlined_parent_sym_ctx
515 symbolicated_address.so_addr = inlined_parent_so_addr
516 symbolicated_address.symbolicate (verbose)
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000517
Greg Clayton94073022012-07-07 01:22:45 +0000518 # push the new frame onto the new frame stack
519 symbolicated_addresses.append (symbolicated_address)
520
521 if symbolicated_addresses:
522 return symbolicated_addresses
Greg Claytonf51a23f2012-06-04 23:22:17 +0000523 else:
524 print 'error: no target in Symbolicator'
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000525 return None
526
527
528def disassemble_instructions (target, instructions, pc, insts_before_pc, insts_after_pc, non_zeroeth_frame):
529 lines = list()
530 pc_index = -1
531 comment_column = 50
532 for inst_idx, inst in enumerate(instructions):
533 inst_pc = inst.GetAddress().GetLoadAddress(target);
534 if pc == inst_pc:
535 pc_index = inst_idx
536 mnemonic = inst.GetMnemonic (target)
537 operands = inst.GetOperands (target)
538 comment = inst.GetComment (target)
539 #data = inst.GetData (target)
540 lines.append ("%#16.16x: %8s %s" % (inst_pc, mnemonic, operands))
541 if comment:
542 line_len = len(lines[-1])
543 if line_len < comment_column:
544 lines[-1] += ' ' * (comment_column - line_len)
545 lines[-1] += "; %s" % comment
546
547 if pc_index >= 0:
548 # If we are disassembling the non-zeroeth frame, we need to backup the PC by 1
549 if non_zeroeth_frame and pc_index > 0:
550 pc_index = pc_index - 1
551 if insts_before_pc == -1:
552 start_idx = 0
553 else:
554 start_idx = pc_index - insts_before_pc
555 if start_idx < 0:
556 start_idx = 0
557 if insts_before_pc == -1:
558 end_idx = inst_idx
559 else:
560 end_idx = pc_index + insts_after_pc
561 if end_idx > inst_idx:
562 end_idx = inst_idx
563 for i in range(start_idx, end_idx+1):
564 if i == pc_index:
565 print ' -> ', lines[i]
566 else:
567 print ' ', lines[i]
568
569def print_module_section_data (section):
570 print section
571 section_data = section.GetSectionData()
572 if section_data:
573 ostream = lldb.SBStream()
574 section_data.GetDescription (ostream, section.GetFileAddress())
575 print ostream.GetData()
576
577def print_module_section (section, depth):
578 print section
579 if depth > 0:
580 num_sub_sections = section.GetNumSubSections()
581 for sect_idx in range(num_sub_sections):
582 print_module_section (section.GetSubSectionAtIndex(sect_idx), depth - 1)
583
584def print_module_sections (module, depth):
585 for sect in module.section_iter():
586 print_module_section (sect, depth)
587
588def print_module_symbols (module):
589 for sym in module:
590 print sym
591
592def Symbolicate(command_args):
593
594 usage = "usage: %prog [options] <addr1> [addr2 ...]"
595 description='''Symbolicate one or more addresses using LLDB's python scripting API..'''
596 parser = optparse.OptionParser(description=description, prog='crashlog.py',usage=usage)
597 parser.add_option('-v', '--verbose', action='store_true', dest='verbose', help='display verbose debug info', default=False)
Greg Claytonabc18412013-06-26 22:24:05 +0000598 parser.add_option('-p', '--platform', type='string', metavar='platform', dest='platform', help='Specify the platform to use when creating the debug target. Valid values include "localhost", "darwin-kernel", "ios-simulator", "remote-freebsd", "remote-macosx", "remote-ios", "remote-linux".')
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000599 parser.add_option('-f', '--file', type='string', metavar='file', dest='file', help='Specify a file to use when symbolicating')
600 parser.add_option('-a', '--arch', type='string', metavar='arch', dest='arch', help='Specify a architecture to use when symbolicating')
601 parser.add_option('-s', '--slide', type='int', metavar='slide', dest='slide', help='Specify the slide to use on the file specified with the --file option', default=None)
602 parser.add_option('--section', type='string', action='append', dest='section_strings', help='specify <sect-name>=<start-addr> or <sect-name>=<start-addr>-<end-addr>')
603 try:
604 (options, args) = parser.parse_args(command_args)
605 except:
606 return
607 symbolicator = Symbolicator()
608 images = list();
609 if options.file:
610 image = Image(options.file);
611 image.arch = options.arch
612 # Add any sections that were specified with one or more --section options
613 if options.section_strings:
614 for section_str in options.section_strings:
615 section = Section()
616 if section.set_from_string (section_str):
617 image.add_section (section)
618 else:
619 sys.exit(1)
620 if options.slide != None:
621 image.slide = options.slide
622 symbolicator.images.append(image)
623
624 target = symbolicator.create_target()
625 if options.verbose:
626 print symbolicator
627 if target:
628 for addr_str in args:
629 addr = int(addr_str, 0)
Greg Claytona7fb1dc2012-06-28 18:10:14 +0000630 symbolicated_addrs = symbolicator.symbolicate(addr, options.verbose)
Greg Clayton3c2c4bb2012-04-03 21:35:43 +0000631 for symbolicated_addr in symbolicated_addrs:
632 print symbolicated_addr
633 print
634 else:
635 print 'error: no target for %s' % (symbolicator)
636
637if __name__ == '__main__':
638 # Create a new debugger instance
639 lldb.debugger = lldb.SBDebugger.Create()
640 Symbolicate (sys.argv[1:])