""" Test the lldb disassemble command on lib stdc++. """ from __future__ import print_function import unittest2 import os import time import lldb from lldbsuite.test.lldbtest import * import lldbsuite.test.lldbutil as lldbutil class StdCXXDisassembleTestCase(TestBase): mydir = TestBase.compute_mydir(__file__) def setUp(self): # Call super's setUp(). TestBase.setUp(self) # Find the line number to break inside main(). self.line = line_number('main.cpp', '// Set break point at this line.') # rdar://problem/8504895 # Crash while doing 'disassemble -n "-[NSNumber descriptionWithLocale:]" @unittest2.skipIf( TestBase.skipLongRunningTest(), "Skip this long running test") def test_stdcxx_disasm(self): """Do 'disassemble' on each and every 'Code' symbol entry from the std c++ lib.""" self.build() exe = self.getBuildArtifact("a.out") self.runCmd("file " + exe, CURRENT_EXECUTABLE_SET) # rdar://problem/8543077 # test/stl: clang built binaries results in the breakpoint locations = 3, # is this a problem with clang generated debug info? # # Break on line 13 of main.cpp. lldbutil.run_break_set_by_file_and_line( self, "main.cpp", self.line, num_expected_locations=1, loc_exact=True) self.runCmd("run", RUN_SUCCEEDED) # Now let's get the target as well as the process objects. target = self.dbg.GetSelectedTarget() process = target.GetProcess() # The process should be in a 'stopped' state. self.expect(str(process), STOPPED_DUE_TO_BREAKPOINT, exe=False, substrs=["a.out", "stopped"]) # Disassemble the functions on the call stack. self.runCmd("thread backtrace") thread = lldbutil.get_stopped_thread( process, lldb.eStopReasonBreakpoint) self.assertIsNotNone(thread) depth = thread.GetNumFrames() for i in range(depth - 1): frame = thread.GetFrameAtIndex(i) function = frame.GetFunction() if function.GetName(): self.runCmd("disassemble -n '%s'" % function.GetName()) lib_stdcxx = "FAILHORRIBLYHERE" # Iterate through the available modules, looking for stdc++ library... for i in range(target.GetNumModules()): module = target.GetModuleAtIndex(i) fs = module.GetFileSpec() if (fs.GetFilename().startswith("libstdc++") or fs.GetFilename().startswith("libc++")): lib_stdcxx = str(fs) break # At this point, lib_stdcxx is the full path to the stdc++ library and # module is the corresponding SBModule. self.expect(lib_stdcxx, "Libraray StdC++ is located", exe=False, substrs=["lib"]) self.runCmd("image dump symtab '%s'" % lib_stdcxx) raw_output = self.res.GetOutput() # Now, look for every 'Code' symbol and feed its load address into the # command: 'disassemble -s load_address -e end_address', where the # end_address is taken from the next consecutive 'Code' symbol entry's # load address. # # The load address column comes after the file address column, with both # looks like '0xhhhhhhhh', i.e., 8 hexadecimal digits. codeRE = re.compile(r""" \ Code\ {9} # ' Code' followed by 9 SPCs, 0x[0-9a-f]{16} # the file address column, and \ # a SPC, and (0x[0-9a-f]{16}) # the load address column, and .* # the rest. """, re.VERBOSE) # Maintain a start address variable; if we arrive at a consecutive Code # entry, then the load address of the that entry is fed as the end # address to the 'disassemble -s SA -e LA' command. SA = None for line in raw_output.split(os.linesep): match = codeRE.search(line) if match: LA = match.group(1) if self.TraceOn(): print("line:", line) print("load address:", LA) print("SA:", SA) if SA and LA: if int(LA, 16) > int(SA, 16): self.runCmd("disassemble -s %s -e %s" % (SA, LA)) SA = LA else: # This entry is not a Code entry. Reset SA = None. SA = None