2015-09-17 02:17:11 +08:00
|
|
|
"""
|
|
|
|
Test basics of mini dump debugging.
|
|
|
|
"""
|
|
|
|
|
2016-01-12 00:35:30 +08:00
|
|
|
from six import iteritems
|
2015-11-04 03:20:39 +08:00
|
|
|
|
2015-10-23 04:06:20 +08:00
|
|
|
|
2015-09-17 02:17:11 +08:00
|
|
|
import lldb
|
2016-02-05 07:04:17 +08:00
|
|
|
from lldbsuite.test.decorators import *
|
2015-11-03 10:06:18 +08:00
|
|
|
from lldbsuite.test.lldbtest import *
|
2016-02-05 07:04:17 +08:00
|
|
|
from lldbsuite.test import lldbutil
|
2015-09-17 02:17:11 +08:00
|
|
|
|
2016-09-07 04:57:50 +08:00
|
|
|
|
2015-09-17 02:17:11 +08:00
|
|
|
class MiniDumpTestCase(TestBase):
|
2016-11-09 18:16:11 +08:00
|
|
|
NO_DEBUG_INFO_TESTCASE = True
|
2015-09-17 02:17:11 +08:00
|
|
|
|
|
|
|
def test_process_info_in_mini_dump(self):
|
|
|
|
"""Test that lldb can read the process information from the minidump."""
|
2015-12-12 06:27:57 +08:00
|
|
|
# target create -c fizzbuzz_no_heap.dmp
|
|
|
|
self.dbg.CreateTarget("")
|
|
|
|
self.target = self.dbg.GetSelectedTarget()
|
|
|
|
self.process = self.target.LoadCore("fizzbuzz_no_heap.dmp")
|
2015-09-17 02:17:11 +08:00
|
|
|
self.assertTrue(self.process, PROCESS_IS_VALID)
|
|
|
|
self.assertEqual(self.process.GetNumThreads(), 1)
|
2015-09-18 04:52:29 +08:00
|
|
|
self.assertEqual(self.process.GetProcessID(), 4440)
|
2015-09-17 02:17:11 +08:00
|
|
|
|
|
|
|
def test_thread_info_in_mini_dump(self):
|
|
|
|
"""Test that lldb can read the thread information from the minidump."""
|
2015-12-12 06:27:57 +08:00
|
|
|
# target create -c fizzbuzz_no_heap.dmp
|
|
|
|
self.dbg.CreateTarget("")
|
|
|
|
self.target = self.dbg.GetSelectedTarget()
|
|
|
|
self.process = self.target.LoadCore("fizzbuzz_no_heap.dmp")
|
2015-09-17 02:17:11 +08:00
|
|
|
# This process crashed due to an access violation (0xc0000005) in its
|
|
|
|
# one and only thread.
|
|
|
|
self.assertEqual(self.process.GetNumThreads(), 1)
|
|
|
|
thread = self.process.GetThreadAtIndex(0)
|
2022-08-04 02:42:12 +08:00
|
|
|
self.assertStopReason(thread.GetStopReason(), lldb.eStopReasonException)
|
2015-09-17 02:17:11 +08:00
|
|
|
stop_description = thread.GetStopDescription(256)
|
2021-02-03 08:24:03 +08:00
|
|
|
self.assertIn("0xc0000005", stop_description)
|
2015-09-17 02:17:11 +08:00
|
|
|
|
Improve LLDB's handling of non-local minidumps
Normally, LLDB is creating a high-fidelity representation of a live
process, including a list of modules and sections, with the
associated memory address ranges. In order to build the module and
section map LLDB tries to locate the local module image (object file)
and will parse it.
This does not work for postmortem debugging scenarios where the crash
dump (minidump in this case) was captured on a different machine.
Fortunately the minidump format encodes enough information about
each module's memory range to allow us to create placeholder modules.
This enables most LLDB functionality involving address-to-module
translations.
Also, we may want to completly disable the search for matching
local object files if we load minidumps unless we can prove that the
local image matches the one from the crash origin.
(not part of this change, see: llvm.org/pr35193)
Example: Identify the module from a stack frame PC:
Before:
thread #1, stop reason = Exception 0xc0000005 encountered at address 0x164d14
frame #0: 0x00164d14
frame #1: 0x00167c79
frame #2: 0x00167e6d
frame #3: 0x7510336a
frame #4: 0x77759882
frame #5: 0x77759855
After:
thread #1, stop reason = Exception 0xc0000005 encountered at address 0x164d14
frame #0: 0x00164d14 C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
frame #1: 0x00167c79 C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
frame #2: 0x00167e6d C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
frame #3: 0x7510336a C:\Windows\SysWOW64\kernel32.dll
frame #4: 0x77759882 C:\Windows\SysWOW64\ntdll.dll
frame #5: 0x77759855 C:\Windows\SysWOW64\ntdll.dll
Example: target modules list
Before:
error: the target has no associated executable images
After:
[ 0] C:\Windows\System32\MSVCP120D.dll
[ 1] C:\Windows\SysWOW64\kernel32.dll
[ 2] C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
[ 3] C:\Windows\System32\MSVCR120D.dll
[ 4] C:\Windows\SysWOW64\KERNELBASE.dll
[ 5] C:\Windows\SysWOW64\ntdll.dll
NOTE: the minidump format also includes the debug info GUID, so we can
fill-in the module UUID from it, but this part was excluded from this change
to keep the changes simple (the LLDB UUID is hardcoded to be either 16 or
20 bytes, while the CodeView GUIDs are normally 24 bytes)
Differential Revision: https://reviews.llvm.org/D45700
llvm-svn: 330302
2018-04-19 07:10:46 +08:00
|
|
|
def test_modules_in_mini_dump(self):
|
|
|
|
"""Test that lldb can read the list of modules from the minidump."""
|
|
|
|
# target create -c fizzbuzz_no_heap.dmp
|
|
|
|
self.dbg.CreateTarget("")
|
|
|
|
self.target = self.dbg.GetSelectedTarget()
|
|
|
|
self.process = self.target.LoadCore("fizzbuzz_no_heap.dmp")
|
|
|
|
self.assertTrue(self.process, PROCESS_IS_VALID)
|
|
|
|
expected_modules = [
|
2018-05-03 04:06:17 +08:00
|
|
|
{
|
|
|
|
'filename' : r"C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug/fizzbuzz.exe",
|
Minidump: extend UUID byte-swapping to windows platform
Summary:
D59433 added code to swap bytes UUIDs coming from minidump files, but
only enabled it for apple platforms. Based on my research, I believe
this is the correct thing to do for windows as well, as the natural way
of printing U(G)UIDs on this platforms is to print the first three
components as (4 or 2)-byte integers printed in natural (big-endian)
order. This makes the UUID string coming out of lldb match the strings
produced by other windows tools.
The decision to byte-swap the age field is somewhat arbitrary, because
the age field is usually printed separately from the file GUID (and
often in decimal). However, for our purposes (telling whether two files
are identical), including it in the UUID is correct, and printing it in
big-endian makes it easier to recognize the age value.
This also makes the UUIDs generated here (almost) match up with the
UUIDs computed for breakpad symbol files
(BreakpadRecords.cpp:parseModuleId), which already implemented the
byte-swapping. The "almost" is here because ObjectFileBreakpad does not
swap the age field, but I'll fix that in a follow-up.
There is no UUID support in ObjectFileCOFF at the moment, but ideally
the algorithms used here and in ObjectFileCOFF should be in sync so that
object file matching works correctly.
Reviewers: clayborg, amccarth, markmentovai, asmith
Subscribers: lldb-commits
Differential Revision: https://reviews.llvm.org/D60501
llvm-svn: 358169
2019-04-11 22:14:07 +08:00
|
|
|
'uuid' : '0F45B791-9A96-46F9-BF8F-2D6076EA421A-00000011',
|
2018-05-03 04:06:17 +08:00
|
|
|
},
|
|
|
|
{
|
2018-12-14 11:07:15 +08:00
|
|
|
'filename' : r"C:\Windows\SysWOW64/ntdll.dll",
|
Minidump: extend UUID byte-swapping to windows platform
Summary:
D59433 added code to swap bytes UUIDs coming from minidump files, but
only enabled it for apple platforms. Based on my research, I believe
this is the correct thing to do for windows as well, as the natural way
of printing U(G)UIDs on this platforms is to print the first three
components as (4 or 2)-byte integers printed in natural (big-endian)
order. This makes the UUID string coming out of lldb match the strings
produced by other windows tools.
The decision to byte-swap the age field is somewhat arbitrary, because
the age field is usually printed separately from the file GUID (and
often in decimal). However, for our purposes (telling whether two files
are identical), including it in the UUID is correct, and printing it in
big-endian makes it easier to recognize the age value.
This also makes the UUIDs generated here (almost) match up with the
UUIDs computed for breakpad symbol files
(BreakpadRecords.cpp:parseModuleId), which already implemented the
byte-swapping. The "almost" is here because ObjectFileBreakpad does not
swap the age field, but I'll fix that in a follow-up.
There is no UUID support in ObjectFileCOFF at the moment, but ideally
the algorithms used here and in ObjectFileCOFF should be in sync so that
object file matching works correctly.
Reviewers: clayborg, amccarth, markmentovai, asmith
Subscribers: lldb-commits
Differential Revision: https://reviews.llvm.org/D60501
llvm-svn: 358169
2019-04-11 22:14:07 +08:00
|
|
|
'uuid' : 'BBB0846A-402C-4052-A16B-67650BBFE6B0-00000002',
|
2018-12-14 11:07:15 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
'filename' : r"C:\Windows\SysWOW64/kernel32.dll",
|
Minidump: extend UUID byte-swapping to windows platform
Summary:
D59433 added code to swap bytes UUIDs coming from minidump files, but
only enabled it for apple platforms. Based on my research, I believe
this is the correct thing to do for windows as well, as the natural way
of printing U(G)UIDs on this platforms is to print the first three
components as (4 or 2)-byte integers printed in natural (big-endian)
order. This makes the UUID string coming out of lldb match the strings
produced by other windows tools.
The decision to byte-swap the age field is somewhat arbitrary, because
the age field is usually printed separately from the file GUID (and
often in decimal). However, for our purposes (telling whether two files
are identical), including it in the UUID is correct, and printing it in
big-endian makes it easier to recognize the age value.
This also makes the UUIDs generated here (almost) match up with the
UUIDs computed for breakpad symbol files
(BreakpadRecords.cpp:parseModuleId), which already implemented the
byte-swapping. The "almost" is here because ObjectFileBreakpad does not
swap the age field, but I'll fix that in a follow-up.
There is no UUID support in ObjectFileCOFF at the moment, but ideally
the algorithms used here and in ObjectFileCOFF should be in sync so that
object file matching works correctly.
Reviewers: clayborg, amccarth, markmentovai, asmith
Subscribers: lldb-commits
Differential Revision: https://reviews.llvm.org/D60501
llvm-svn: 358169
2019-04-11 22:14:07 +08:00
|
|
|
'uuid' : 'E5CB7E1B-005E-4113-AB98-98D6913B52D8-00000002',
|
2018-05-03 04:06:17 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
'filename' : r"C:\Windows\SysWOW64/KERNELBASE.dll",
|
Minidump: extend UUID byte-swapping to windows platform
Summary:
D59433 added code to swap bytes UUIDs coming from minidump files, but
only enabled it for apple platforms. Based on my research, I believe
this is the correct thing to do for windows as well, as the natural way
of printing U(G)UIDs on this platforms is to print the first three
components as (4 or 2)-byte integers printed in natural (big-endian)
order. This makes the UUID string coming out of lldb match the strings
produced by other windows tools.
The decision to byte-swap the age field is somewhat arbitrary, because
the age field is usually printed separately from the file GUID (and
often in decimal). However, for our purposes (telling whether two files
are identical), including it in the UUID is correct, and printing it in
big-endian makes it easier to recognize the age value.
This also makes the UUIDs generated here (almost) match up with the
UUIDs computed for breakpad symbol files
(BreakpadRecords.cpp:parseModuleId), which already implemented the
byte-swapping. The "almost" is here because ObjectFileBreakpad does not
swap the age field, but I'll fix that in a follow-up.
There is no UUID support in ObjectFileCOFF at the moment, but ideally
the algorithms used here and in ObjectFileCOFF should be in sync so that
object file matching works correctly.
Reviewers: clayborg, amccarth, markmentovai, asmith
Subscribers: lldb-commits
Differential Revision: https://reviews.llvm.org/D60501
llvm-svn: 358169
2019-04-11 22:14:07 +08:00
|
|
|
'uuid' : '0BF95241-CB0D-4BD4-AC5D-186A6452E522-00000001',
|
2018-05-03 04:06:17 +08:00
|
|
|
},
|
|
|
|
{
|
2018-12-14 11:07:15 +08:00
|
|
|
'filename' : r"C:\Windows\System32/MSVCP120D.dll",
|
Minidump: extend UUID byte-swapping to windows platform
Summary:
D59433 added code to swap bytes UUIDs coming from minidump files, but
only enabled it for apple platforms. Based on my research, I believe
this is the correct thing to do for windows as well, as the natural way
of printing U(G)UIDs on this platforms is to print the first three
components as (4 or 2)-byte integers printed in natural (big-endian)
order. This makes the UUID string coming out of lldb match the strings
produced by other windows tools.
The decision to byte-swap the age field is somewhat arbitrary, because
the age field is usually printed separately from the file GUID (and
often in decimal). However, for our purposes (telling whether two files
are identical), including it in the UUID is correct, and printing it in
big-endian makes it easier to recognize the age value.
This also makes the UUIDs generated here (almost) match up with the
UUIDs computed for breakpad symbol files
(BreakpadRecords.cpp:parseModuleId), which already implemented the
byte-swapping. The "almost" is here because ObjectFileBreakpad does not
swap the age field, but I'll fix that in a follow-up.
There is no UUID support in ObjectFileCOFF at the moment, but ideally
the algorithms used here and in ObjectFileCOFF should be in sync so that
object file matching works correctly.
Reviewers: clayborg, amccarth, markmentovai, asmith
Subscribers: lldb-commits
Differential Revision: https://reviews.llvm.org/D60501
llvm-svn: 358169
2019-04-11 22:14:07 +08:00
|
|
|
'uuid' : '3C05516E-57E7-40EB-8D3F-9722C5BD80DD-00000001',
|
2018-12-14 11:07:15 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
'filename' : r"C:\Windows\System32/MSVCR120D.dll",
|
Minidump: extend UUID byte-swapping to windows platform
Summary:
D59433 added code to swap bytes UUIDs coming from minidump files, but
only enabled it for apple platforms. Based on my research, I believe
this is the correct thing to do for windows as well, as the natural way
of printing U(G)UIDs on this platforms is to print the first three
components as (4 or 2)-byte integers printed in natural (big-endian)
order. This makes the UUID string coming out of lldb match the strings
produced by other windows tools.
The decision to byte-swap the age field is somewhat arbitrary, because
the age field is usually printed separately from the file GUID (and
often in decimal). However, for our purposes (telling whether two files
are identical), including it in the UUID is correct, and printing it in
big-endian makes it easier to recognize the age value.
This also makes the UUIDs generated here (almost) match up with the
UUIDs computed for breakpad symbol files
(BreakpadRecords.cpp:parseModuleId), which already implemented the
byte-swapping. The "almost" is here because ObjectFileBreakpad does not
swap the age field, but I'll fix that in a follow-up.
There is no UUID support in ObjectFileCOFF at the moment, but ideally
the algorithms used here and in ObjectFileCOFF should be in sync so that
object file matching works correctly.
Reviewers: clayborg, amccarth, markmentovai, asmith
Subscribers: lldb-commits
Differential Revision: https://reviews.llvm.org/D60501
llvm-svn: 358169
2019-04-11 22:14:07 +08:00
|
|
|
'uuid' : '6382FB86-46C4-4046-AE42-8D97B3F91FF2-00000001',
|
2018-05-03 04:06:17 +08:00
|
|
|
},
|
Improve LLDB's handling of non-local minidumps
Normally, LLDB is creating a high-fidelity representation of a live
process, including a list of modules and sections, with the
associated memory address ranges. In order to build the module and
section map LLDB tries to locate the local module image (object file)
and will parse it.
This does not work for postmortem debugging scenarios where the crash
dump (minidump in this case) was captured on a different machine.
Fortunately the minidump format encodes enough information about
each module's memory range to allow us to create placeholder modules.
This enables most LLDB functionality involving address-to-module
translations.
Also, we may want to completly disable the search for matching
local object files if we load minidumps unless we can prove that the
local image matches the one from the crash origin.
(not part of this change, see: llvm.org/pr35193)
Example: Identify the module from a stack frame PC:
Before:
thread #1, stop reason = Exception 0xc0000005 encountered at address 0x164d14
frame #0: 0x00164d14
frame #1: 0x00167c79
frame #2: 0x00167e6d
frame #3: 0x7510336a
frame #4: 0x77759882
frame #5: 0x77759855
After:
thread #1, stop reason = Exception 0xc0000005 encountered at address 0x164d14
frame #0: 0x00164d14 C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
frame #1: 0x00167c79 C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
frame #2: 0x00167e6d C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
frame #3: 0x7510336a C:\Windows\SysWOW64\kernel32.dll
frame #4: 0x77759882 C:\Windows\SysWOW64\ntdll.dll
frame #5: 0x77759855 C:\Windows\SysWOW64\ntdll.dll
Example: target modules list
Before:
error: the target has no associated executable images
After:
[ 0] C:\Windows\System32\MSVCP120D.dll
[ 1] C:\Windows\SysWOW64\kernel32.dll
[ 2] C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
[ 3] C:\Windows\System32\MSVCR120D.dll
[ 4] C:\Windows\SysWOW64\KERNELBASE.dll
[ 5] C:\Windows\SysWOW64\ntdll.dll
NOTE: the minidump format also includes the debug info GUID, so we can
fill-in the module UUID from it, but this part was excluded from this change
to keep the changes simple (the LLDB UUID is hardcoded to be either 16 or
20 bytes, while the CodeView GUIDs are normally 24 bytes)
Differential Revision: https://reviews.llvm.org/D45700
llvm-svn: 330302
2018-04-19 07:10:46 +08:00
|
|
|
]
|
|
|
|
self.assertEqual(self.target.GetNumModules(), len(expected_modules))
|
|
|
|
for module, expected in zip(self.target.modules, expected_modules):
|
|
|
|
self.assertTrue(module.IsValid())
|
2018-05-03 04:06:17 +08:00
|
|
|
self.assertEqual(module.file.fullpath, expected['filename'])
|
|
|
|
self.assertEqual(module.GetUUIDString(), expected['uuid'])
|
Improve LLDB's handling of non-local minidumps
Normally, LLDB is creating a high-fidelity representation of a live
process, including a list of modules and sections, with the
associated memory address ranges. In order to build the module and
section map LLDB tries to locate the local module image (object file)
and will parse it.
This does not work for postmortem debugging scenarios where the crash
dump (minidump in this case) was captured on a different machine.
Fortunately the minidump format encodes enough information about
each module's memory range to allow us to create placeholder modules.
This enables most LLDB functionality involving address-to-module
translations.
Also, we may want to completly disable the search for matching
local object files if we load minidumps unless we can prove that the
local image matches the one from the crash origin.
(not part of this change, see: llvm.org/pr35193)
Example: Identify the module from a stack frame PC:
Before:
thread #1, stop reason = Exception 0xc0000005 encountered at address 0x164d14
frame #0: 0x00164d14
frame #1: 0x00167c79
frame #2: 0x00167e6d
frame #3: 0x7510336a
frame #4: 0x77759882
frame #5: 0x77759855
After:
thread #1, stop reason = Exception 0xc0000005 encountered at address 0x164d14
frame #0: 0x00164d14 C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
frame #1: 0x00167c79 C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
frame #2: 0x00167e6d C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
frame #3: 0x7510336a C:\Windows\SysWOW64\kernel32.dll
frame #4: 0x77759882 C:\Windows\SysWOW64\ntdll.dll
frame #5: 0x77759855 C:\Windows\SysWOW64\ntdll.dll
Example: target modules list
Before:
error: the target has no associated executable images
After:
[ 0] C:\Windows\System32\MSVCP120D.dll
[ 1] C:\Windows\SysWOW64\kernel32.dll
[ 2] C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
[ 3] C:\Windows\System32\MSVCR120D.dll
[ 4] C:\Windows\SysWOW64\KERNELBASE.dll
[ 5] C:\Windows\SysWOW64\ntdll.dll
NOTE: the minidump format also includes the debug info GUID, so we can
fill-in the module UUID from it, but this part was excluded from this change
to keep the changes simple (the LLDB UUID is hardcoded to be either 16 or
20 bytes, while the CodeView GUIDs are normally 24 bytes)
Differential Revision: https://reviews.llvm.org/D45700
llvm-svn: 330302
2018-04-19 07:10:46 +08:00
|
|
|
|
2019-04-16 22:51:47 +08:00
|
|
|
def test_breakpad_uuid_matching(self):
|
|
|
|
"""Test that the uuid computation algorithms in minidump and breakpad
|
|
|
|
files match."""
|
|
|
|
self.target = self.dbg.CreateTarget("")
|
|
|
|
self.process = self.target.LoadCore("fizzbuzz_no_heap.dmp")
|
|
|
|
self.assertTrue(self.process, PROCESS_IS_VALID)
|
|
|
|
self.expect("target symbols add fizzbuzz.syms", substrs=["symbol file",
|
|
|
|
"fizzbuzz.syms", "has been added to", "fizzbuzz.exe"]),
|
|
|
|
self.assertTrue(self.target.modules[0].FindSymbol("main"))
|
|
|
|
|
2019-10-18 21:49:40 +08:00
|
|
|
@skipIfLLVMTargetMissing("X86")
|
2015-11-13 05:16:15 +08:00
|
|
|
def test_stack_info_in_mini_dump(self):
|
2015-12-12 06:27:57 +08:00
|
|
|
"""Test that we can see a trivial stack in a VS-generate mini dump."""
|
|
|
|
# target create -c fizzbuzz_no_heap.dmp
|
|
|
|
self.dbg.CreateTarget("")
|
|
|
|
self.target = self.dbg.GetSelectedTarget()
|
|
|
|
self.process = self.target.LoadCore("fizzbuzz_no_heap.dmp")
|
2015-11-13 05:16:15 +08:00
|
|
|
self.assertEqual(self.process.GetNumThreads(), 1)
|
|
|
|
thread = self.process.GetThreadAtIndex(0)
|
2017-10-27 03:08:34 +08:00
|
|
|
|
|
|
|
pc_list = [ 0x00164d14, 0x00167c79, 0x00167e6d, 0x7510336a, 0x77759882, 0x77759855]
|
|
|
|
|
|
|
|
self.assertEqual(thread.GetNumFrames(), len(pc_list))
|
|
|
|
for i in range(len(pc_list)):
|
|
|
|
frame = thread.GetFrameAtIndex(i)
|
|
|
|
self.assertTrue(frame.IsValid())
|
|
|
|
self.assertEqual(frame.GetPC(), pc_list[i])
|
Improve LLDB's handling of non-local minidumps
Normally, LLDB is creating a high-fidelity representation of a live
process, including a list of modules and sections, with the
associated memory address ranges. In order to build the module and
section map LLDB tries to locate the local module image (object file)
and will parse it.
This does not work for postmortem debugging scenarios where the crash
dump (minidump in this case) was captured on a different machine.
Fortunately the minidump format encodes enough information about
each module's memory range to allow us to create placeholder modules.
This enables most LLDB functionality involving address-to-module
translations.
Also, we may want to completly disable the search for matching
local object files if we load minidumps unless we can prove that the
local image matches the one from the crash origin.
(not part of this change, see: llvm.org/pr35193)
Example: Identify the module from a stack frame PC:
Before:
thread #1, stop reason = Exception 0xc0000005 encountered at address 0x164d14
frame #0: 0x00164d14
frame #1: 0x00167c79
frame #2: 0x00167e6d
frame #3: 0x7510336a
frame #4: 0x77759882
frame #5: 0x77759855
After:
thread #1, stop reason = Exception 0xc0000005 encountered at address 0x164d14
frame #0: 0x00164d14 C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
frame #1: 0x00167c79 C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
frame #2: 0x00167e6d C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
frame #3: 0x7510336a C:\Windows\SysWOW64\kernel32.dll
frame #4: 0x77759882 C:\Windows\SysWOW64\ntdll.dll
frame #5: 0x77759855 C:\Windows\SysWOW64\ntdll.dll
Example: target modules list
Before:
error: the target has no associated executable images
After:
[ 0] C:\Windows\System32\MSVCP120D.dll
[ 1] C:\Windows\SysWOW64\kernel32.dll
[ 2] C:\Users\amccarth\Documents\Visual Studio 2013\Projects\fizzbuzz\Debug\fizzbuzz.exe
[ 3] C:\Windows\System32\MSVCR120D.dll
[ 4] C:\Windows\SysWOW64\KERNELBASE.dll
[ 5] C:\Windows\SysWOW64\ntdll.dll
NOTE: the minidump format also includes the debug info GUID, so we can
fill-in the module UUID from it, but this part was excluded from this change
to keep the changes simple (the LLDB UUID is hardcoded to be either 16 or
20 bytes, while the CodeView GUIDs are normally 24 bytes)
Differential Revision: https://reviews.llvm.org/D45700
llvm-svn: 330302
2018-04-19 07:10:46 +08:00
|
|
|
self.assertTrue(frame.GetModule().IsValid())
|
2015-11-13 05:16:15 +08:00
|
|
|
|
2016-11-09 18:16:11 +08:00
|
|
|
@skipUnlessWindows # Minidump saving works only on windows
|
2015-12-12 06:27:57 +08:00
|
|
|
def test_deeper_stack_in_mini_dump(self):
|
|
|
|
"""Test that we can examine a more interesting stack in a mini dump."""
|
|
|
|
self.build()
|
2018-01-20 07:24:35 +08:00
|
|
|
exe = self.getBuildArtifact("a.out")
|
2018-01-31 02:29:16 +08:00
|
|
|
core = self.getBuildArtifact("core.dmp")
|
2015-12-12 06:27:57 +08:00
|
|
|
try:
|
|
|
|
# Set a breakpoint and capture a mini dump.
|
|
|
|
target = self.dbg.CreateTarget(exe)
|
|
|
|
breakpoint = target.BreakpointCreateByName("bar")
|
|
|
|
process = target.LaunchSimple(
|
|
|
|
None, None, self.get_process_working_directory())
|
2022-06-09 13:22:27 +08:00
|
|
|
self.assertState(process.GetState(), lldb.eStateStopped)
|
2015-12-12 06:27:57 +08:00
|
|
|
self.assertTrue(process.SaveCore(core))
|
|
|
|
self.assertTrue(os.path.isfile(core))
|
2022-02-12 13:23:16 +08:00
|
|
|
self.assertSuccess(process.Kill())
|
2015-12-12 06:27:57 +08:00
|
|
|
|
|
|
|
# Launch with the mini dump, and inspect the stack.
|
|
|
|
target = self.dbg.CreateTarget(None)
|
|
|
|
process = target.LoadCore(core)
|
|
|
|
thread = process.GetThreadAtIndex(0)
|
|
|
|
|
|
|
|
expected_stack = {0: 'bar', 1: 'foo', 2: 'main'}
|
2016-01-12 00:35:30 +08:00
|
|
|
self.assertGreaterEqual(thread.GetNumFrames(), len(expected_stack))
|
|
|
|
for index, name in iteritems(expected_stack):
|
2015-12-12 06:27:57 +08:00
|
|
|
frame = thread.GetFrameAtIndex(index)
|
|
|
|
self.assertTrue(frame.IsValid())
|
|
|
|
function_name = frame.GetFunctionName()
|
2021-02-03 08:24:03 +08:00
|
|
|
self.assertIn(name, function_name)
|
2015-12-12 06:27:57 +08:00
|
|
|
|
|
|
|
finally:
|
|
|
|
# Clean up the mini dump file.
|
|
|
|
self.assertTrue(self.dbg.DeleteTarget(target))
|
|
|
|
if (os.path.isfile(core)):
|
|
|
|
os.unlink(core)
|
|
|
|
|
2016-11-09 18:16:11 +08:00
|
|
|
@skipUnlessWindows # Minidump saving works only on windows
|
2015-12-12 06:27:57 +08:00
|
|
|
def test_local_variables_in_mini_dump(self):
|
|
|
|
"""Test that we can examine local variables in a mini dump."""
|
|
|
|
self.build()
|
2018-01-20 07:24:35 +08:00
|
|
|
exe = self.getBuildArtifact("a.out")
|
2018-01-31 02:29:16 +08:00
|
|
|
core = self.getBuildArtifact("core.dmp")
|
2015-12-12 06:27:57 +08:00
|
|
|
try:
|
|
|
|
# Set a breakpoint and capture a mini dump.
|
|
|
|
target = self.dbg.CreateTarget(exe)
|
|
|
|
breakpoint = target.BreakpointCreateByName("bar")
|
|
|
|
process = target.LaunchSimple(
|
|
|
|
None, None, self.get_process_working_directory())
|
2022-06-09 13:22:27 +08:00
|
|
|
self.assertState(process.GetState(), lldb.eStateStopped)
|
2015-12-12 06:27:57 +08:00
|
|
|
self.assertTrue(process.SaveCore(core))
|
|
|
|
self.assertTrue(os.path.isfile(core))
|
2022-02-12 13:23:16 +08:00
|
|
|
self.assertSuccess(process.Kill())
|
2015-12-12 06:27:57 +08:00
|
|
|
|
|
|
|
# Launch with the mini dump, and inspect a local variable.
|
|
|
|
target = self.dbg.CreateTarget(None)
|
|
|
|
process = target.LoadCore(core)
|
|
|
|
thread = process.GetThreadAtIndex(0)
|
|
|
|
frame = thread.GetFrameAtIndex(0)
|
|
|
|
value = frame.EvaluateExpression('x')
|
|
|
|
self.assertEqual(value.GetValueAsSigned(), 3)
|
|
|
|
|
|
|
|
finally:
|
|
|
|
# Clean up the mini dump file.
|
|
|
|
self.assertTrue(self.dbg.DeleteTarget(target))
|
|
|
|
if (os.path.isfile(core)):
|
|
|
|
os.unlink(core)
|