Home | History | Annotate | Download | only in python
      1 # This implements the "diagnose-unwind" command, usually installed
      2 # in the debug session like
      3 #   command script import lldb.diagnose
      4 # it is used when lldb's backtrace fails -- it collects and prints
      5 # information about the stack frames, and tries an alternate unwind
      6 # algorithm, that will help to understand why lldb's unwind algorithm
      7 # did not succeed.
      8 
      9 import optparse
     10 import lldb
     11 import re
     12 import shlex
     13 
     14 # Print the frame number, pc, frame pointer, module UUID and function name
     15 # Returns the SBModule that contains the PC, if it could be found
     16 def backtrace_print_frame (target, frame_num, addr, fp):
     17   process = target.GetProcess()
     18   addr_for_printing = addr
     19   addr_width = process.GetAddressByteSize() * 2
     20   if frame_num > 0:
     21     addr = addr - 1
     22 
     23   sbaddr = lldb.SBAddress()
     24   try:
     25     sbaddr.SetLoadAddress(addr, target)
     26     module_description = ""
     27     if sbaddr.GetModule():
     28       module_filename = ""
     29       module_uuid_str = sbaddr.GetModule().GetUUIDString()
     30       if module_uuid_str == None:
     31         module_uuid_str = ""
     32       if sbaddr.GetModule().GetFileSpec():
     33         module_filename = sbaddr.GetModule().GetFileSpec().GetFilename()
     34         if module_filename == None:
     35           module_filename = ""
     36       if module_uuid_str != "" or module_filename != "":
     37         module_description = '%s %s' % (module_filename, module_uuid_str)
     38   except Exception:
     39     print '%2d: pc==0x%-*x fp==0x%-*x' % (frame_num, addr_width, addr_for_printing, addr_width, fp)
     40     return
     41 
     42   sym_ctx = target.ResolveSymbolContextForAddress(sbaddr, lldb.eSymbolContextEverything)
     43   if sym_ctx.IsValid() and sym_ctx.GetSymbol().IsValid():
     44     function_start = sym_ctx.GetSymbol().GetStartAddress().GetLoadAddress(target)
     45     offset = addr - function_start
     46     print '%2d: pc==0x%-*x fp==0x%-*x %s %s + %d' % (frame_num, addr_width, addr_for_printing, addr_width, fp, module_description, sym_ctx.GetSymbol().GetName(), offset)
     47   else:
     48     print '%2d: pc==0x%-*x fp==0x%-*x %s' % (frame_num, addr_width, addr_for_printing, addr_width, fp, module_description)
     49   return sbaddr.GetModule()
     50 
     51 # A simple stack walk algorithm that follows the frame chain.
     52 # Returns a two-element list; the first element is a list of modules
     53 # seen and the second element is a list of addresses seen during the backtrace.
     54 def simple_backtrace(debugger):
     55   target = debugger.GetSelectedTarget()
     56   process = target.GetProcess()
     57   cur_thread = process.GetSelectedThread()
     58 
     59   initial_fp = cur_thread.GetFrameAtIndex(0).GetFP()
     60 
     61   # If the pseudoreg "fp" isn't recognized, on arm hardcode to r7 which is correct for Darwin programs.
     62   if initial_fp == lldb.LLDB_INVALID_ADDRESS and target.triple[0:3] == "arm":
     63     for reggroup in cur_thread.GetFrameAtIndex(1).registers:
     64       if reggroup.GetName() == "General Purpose Registers":
     65         for reg in reggroup:
     66           if reg.GetName() == "r7":
     67             initial_fp = int (reg.GetValue(), 16)
     68 
     69   module_list = []
     70   address_list = [cur_thread.GetFrameAtIndex(0).GetPC()]
     71   this_module = backtrace_print_frame (target, 0, cur_thread.GetFrameAtIndex(0).GetPC(), initial_fp)
     72   print_stack_frame (process, initial_fp)
     73   print ""
     74   if this_module != None:
     75     module_list.append (this_module)
     76   if cur_thread.GetNumFrames() < 2:
     77     return [module_list, address_list]
     78 
     79   cur_fp = process.ReadPointerFromMemory (initial_fp, lldb.SBError())
     80   cur_pc = process.ReadPointerFromMemory (initial_fp + process.GetAddressByteSize(), lldb.SBError())
     81 
     82   frame_num = 1
     83 
     84   while cur_pc != 0 and cur_fp != 0 and cur_pc != lldb.LLDB_INVALID_ADDRESS and cur_fp != lldb.LLDB_INVALID_ADDRESS:
     85     address_list.append (cur_pc)
     86     this_module = backtrace_print_frame (target, frame_num, cur_pc, cur_fp)
     87     print_stack_frame (process, cur_fp)
     88     print ""
     89     if this_module != None:
     90       module_list.append (this_module)
     91     frame_num = frame_num + 1
     92     next_pc = 0
     93     next_fp = 0
     94     if target.triple[0:6] == "x86_64" or target.triple[0:4] == "i386" or target.triple[0:3] == "arm":
     95       error = lldb.SBError()
     96       next_pc = process.ReadPointerFromMemory(cur_fp + process.GetAddressByteSize(), error)
     97       if not error.Success():
     98         next_pc = 0
     99       next_fp = process.ReadPointerFromMemory(cur_fp, error)
    100       if not error.Success():
    101         next_fp = 0
    102     # Clear the 0th bit for arm frames - this indicates it is a thumb frame
    103     if target.triple[0:3] == "arm" and (next_pc & 1) == 1:
    104       next_pc = next_pc & ~1
    105     cur_pc = next_pc
    106     cur_fp = next_fp
    107   this_module = backtrace_print_frame (target, frame_num, cur_pc, cur_fp)
    108   print_stack_frame (process, cur_fp)
    109   print ""
    110   if this_module != None:
    111     module_list.append (this_module)
    112   return [module_list, address_list]
    113 
    114 def print_stack_frame(process, fp):
    115   if fp == 0 or fp == lldb.LLDB_INVALID_ADDRESS or fp == 1:
    116     return
    117   addr_size = process.GetAddressByteSize()
    118   addr = fp - (2 * addr_size)
    119   i = 0
    120   outline = "Stack frame from $fp-%d: " % (2 * addr_size)
    121   error = lldb.SBError()
    122   try:
    123     while i < 5 and error.Success():
    124       address = process.ReadPointerFromMemory(addr + (i * addr_size), error)
    125       outline += " 0x%x" % address
    126       i += 1
    127     print outline
    128   except Exception:
    129     return
    130 
    131 def diagnose_unwind(debugger, command, result, dict):
    132   """
    133 Gather diagnostic information to help debug incorrect unwind (backtrace) 
    134 behavior in lldb.  When there is a backtrace that doesn't look
    135 correct, run this command with the correct thread selected and a
    136 large amount of diagnostic information will be printed, it is likely
    137 to be helpful when reporting the problem.
    138   """
    139 
    140   command_args = shlex.split(command)
    141   parser = create_diagnose_unwind_options()
    142   try:
    143     (options, args) = parser.parse_args(command_args)
    144   except:
    145    return
    146   target = debugger.GetSelectedTarget()
    147   if target:
    148     process = target.GetProcess()
    149     if process:
    150       thread = process.GetSelectedThread()
    151       if thread:
    152         lldb_versions_match = re.search(r'[lL][lL][dD][bB]-(\d+)([.](\d+))?([.](\d+))?', debugger.GetVersionString())
    153         lldb_version = 0
    154         lldb_minor = 0
    155         if len(lldb_versions_match.groups()) >= 1 and lldb_versions_match.groups()[0]:
    156           lldb_major = int(lldb_versions_match.groups()[0])
    157         if len(lldb_versions_match.groups()) >= 5 and lldb_versions_match.groups()[4]:
    158           lldb_minor = int(lldb_versions_match.groups()[4])
    159 
    160         modules_seen = []
    161         addresses_seen = []
    162 
    163         print 'LLDB version %s' % debugger.GetVersionString()
    164         print 'Unwind diagnostics for thread %d' % thread.GetIndexID()
    165         print ""
    166         print "============================================================================================="
    167         print ""
    168         print "OS plugin setting:"
    169         debugger.HandleCommand("settings show target.process.python-os-plugin-path")
    170         print ""
    171         print "Live register context:"
    172         thread.SetSelectedFrame(0)
    173         debugger.HandleCommand("register read")
    174         print ""
    175         print "============================================================================================="
    176         print ""
    177         print "lldb's unwind algorithm:"
    178         print ""
    179         frame_num = 0
    180         for frame in thread.frames:
    181           if not frame.IsInlined():
    182             this_module = backtrace_print_frame (target, frame_num, frame.GetPC(), frame.GetFP())
    183             print_stack_frame (process, frame.GetFP())
    184             print ""
    185             if this_module != None:
    186               modules_seen.append (this_module)
    187             addresses_seen.append (frame.GetPC())
    188             frame_num = frame_num + 1
    189         print ""
    190         print "============================================================================================="
    191         print ""
    192         print "Simple stack walk algorithm:"
    193         print ""
    194         (module_list, address_list) = simple_backtrace(debugger)
    195         if module_list and module_list != None:
    196           modules_seen += module_list
    197         if address_list and address_list != None:
    198           addresses_seen = set(addresses_seen)
    199           addresses_seen.update(set(address_list))
    200 
    201         print ""
    202         print "============================================================================================="
    203         print ""
    204         print "Modules seen in stack walks:"
    205         print ""
    206         modules_already_seen = set()
    207         for module in modules_seen:
    208           if module != None and module.GetFileSpec().GetFilename() != None:
    209             if not module.GetFileSpec().GetFilename() in modules_already_seen:
    210               debugger.HandleCommand('image list %s' % module.GetFileSpec().GetFilename())
    211               modules_already_seen.add(module.GetFileSpec().GetFilename())
    212 
    213         print ""
    214         print "============================================================================================="
    215         print ""
    216         print "Disassembly ofaddresses seen in stack walks:"
    217         print ""
    218         additional_addresses_to_disassemble = addresses_seen
    219         for frame in thread.frames:
    220           if not frame.IsInlined():
    221             print "--------------------------------------------------------------------------------------"
    222             print ""
    223             print "Disassembly of %s, frame %d, address 0x%x" % (frame.GetFunctionName(), frame.GetFrameID(), frame.GetPC())
    224             print ""
    225             if target.triple[0:6] == "x86_64" or target.triple[0:4] == "i386":
    226               debugger.HandleCommand('disassemble -F att -a 0x%x' % frame.GetPC())
    227             else:
    228               debugger.HandleCommand('disassemble -a 0x%x' % frame.GetPC())
    229             if frame.GetPC() in additional_addresses_to_disassemble:
    230               additional_addresses_to_disassemble.remove (frame.GetPC())
    231 
    232         for address in list(additional_addresses_to_disassemble):
    233           print "--------------------------------------------------------------------------------------"
    234           print ""
    235           print "Disassembly of 0x%x" % address
    236           print ""
    237           if target.triple[0:6] == "x86_64" or target.triple[0:4] == "i386":
    238             debugger.HandleCommand('disassemble -F att -a 0x%x' % address)
    239           else:
    240             debugger.HandleCommand('disassemble -a 0x%x' % address)
    241 
    242         print ""
    243         print "============================================================================================="
    244         print ""
    245         additional_addresses_to_show_unwind = addresses_seen
    246         for frame in thread.frames:
    247           if not frame.IsInlined():
    248             print "--------------------------------------------------------------------------------------"
    249             print ""
    250             print "Unwind instructions for %s, frame %d" % (frame.GetFunctionName(), frame.GetFrameID())
    251             print ""
    252             debugger.HandleCommand('image show-unwind -a "0x%x"' % frame.GetPC())
    253             if frame.GetPC() in additional_addresses_to_show_unwind:
    254               additional_addresses_to_show_unwind.remove (frame.GetPC())
    255 
    256         for address in list(additional_addresses_to_show_unwind):
    257           print "--------------------------------------------------------------------------------------"
    258           print ""
    259           print "Unwind instructions for 0x%x" % address
    260           print ""
    261           debugger.HandleCommand('image show-unwind -a "0x%x"' % address)
    262 
    263 def create_diagnose_unwind_options():
    264   usage = "usage: %prog"
    265   description='''Print diagnostic information about a thread backtrace which will help to debug unwind problems'''
    266   parser = optparse.OptionParser(description=description, prog='diagnose_unwind',usage=usage)
    267   return parser
    268 
    269 lldb.debugger.HandleCommand('command script add -f %s.diagnose_unwind diagnose-unwind' % __name__)
    270 print 'The "diagnose-unwind" command has been installed, type "help diagnose-unwind" for detailed help.'
    271