
You can now access a frame in a thread using: lldb.SBThread.frame[int] -> lldb.SBFrame object for a frame in a thread Where "int" is an integer index. You can also access a list object with all of the frames using: lldb.SBThread.frames => list() of lldb.SBFrame objects All SB objects that give out SBAddress objects have properties named "addr" lldb.SBInstructionList now has the following convenience accessors for len() and instruction access using an index: insts = lldb.frame.function.instructions for idx in range(len(insts)): print insts[idx] Instruction lists can also lookup an isntruction using a lldb.SBAddress as the key: pc_inst = lldb.frame.function.instructions[lldb.frame.addr] lldb.SBProcess now exposes: lldb.SBProcess.is_alive => BOOL Check if a process is exists and is alive lldb.SBProcess.is_running => BOOL check if a process is running (or stepping): lldb.SBProcess.is_running => BOOL check if a process is currently stopped or crashed: lldb.SBProcess.thread[int] => lldb.SBThreads for a given "int" zero based index lldb.SBProcess.threads => list() containing all lldb.SBThread objects in a process SBInstruction now exposes: lldb.SBInstruction.mnemonic => python string for instruction mnemonic lldb.SBInstruction.operands => python string for instruction operands lldb.SBInstruction.command => python string for instruction comment SBModule now exposes: lldb.SBModule.uuid => uuid.UUID(), an UUID object from the "uuid" python module lldb.SBModule.symbol[int] => lldb.Symbol, lookup symbol by zero based index lldb.SBModule.symbol[str] => list() of lldb.Symbol objects that match "str" lldb.SBModule.symbol[re] => list() of lldb.Symbol objecxts that match the regex lldb.SBModule.symbols => list() of all symbols in a module SBAddress objects can now access the current load address with the "lldb.SBAddress.load_addr" property. The current "lldb.target" will be used to try and resolve the load address. Load addresses can also be set using this accessor: addr = lldb.SBAddress() addd.load_addr = 0x123023 Then you can check the section and offset to see if the address got resolved. SBTarget now exposes: lldb.SBTarget.module[int] => lldb.SBModule from zero based module index lldb.SBTarget.module[str] => lldb.SBModule by basename or fullpath or uuid string lldb.SBTarget.module[uuid.UUID()] => lldb.SBModule whose UUID matches lldb.SBTarget.module[re] => list() of lldb.SBModule objects that match the regex lldb.SBTarget.modules => list() of all lldb.SBModule objects in the target SBSymbol now exposes: lldb.SBSymbol.name => python string for demangled symbol name lldb.SBSymbol.mangled => python string for mangled symbol name or None if there is none lldb.SBSymbol.type => lldb.eSymbolType enum value lldb.SBSymbol.addr => SBAddress object that represents the start address for this symbol (if there is one) lldb.SBSymbol.end_addr => SBAddress for the end address of the symbol (if there is one) lldb.SBSymbol.prologue_size => pythin int containing The size of the prologue in bytes lldb.SBSymbol.instructions => SBInstructionList containing all instructions for this symbol SBFunction now also has these new properties in addition to what is already has: lldb.SBFunction.addr => SBAddress object that represents the start address for this function lldb.SBFunction.end_addr => SBAddress for the end address of the function lldb.SBFunction.instructions => SBInstructionList containing all instructions for this function SBFrame now exposes the SBAddress for the frame: lldb.SBFrame.addr => SBAddress which is the section offset address for the current frame PC These are all in addition to what was already added. Documentation and website updates coming soon. llvm-svn: 149489
86 lines
2.1 KiB
C++
86 lines
2.1 KiB
C++
//===-- SWIG Interface for SBSymbol -----------------------------*- C++ -*-===//
|
|
//
|
|
// The LLVM Compiler Infrastructure
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
namespace lldb {
|
|
|
|
%feature("docstring",
|
|
"Represents the symbol possibly associated with a stack frame.
|
|
SBModule contains SBSymbol(s). SBSymbol can also be retrived from SBFrame.
|
|
|
|
See also SBModule and SBFrame."
|
|
) SBSymbol;
|
|
class SBSymbol
|
|
{
|
|
public:
|
|
|
|
SBSymbol ();
|
|
|
|
~SBSymbol ();
|
|
|
|
SBSymbol (const lldb::SBSymbol &rhs);
|
|
|
|
bool
|
|
IsValid () const;
|
|
|
|
|
|
const char *
|
|
GetName() const;
|
|
|
|
const char *
|
|
GetMangledName () const;
|
|
|
|
lldb::SBInstructionList
|
|
GetInstructions (lldb::SBTarget target);
|
|
|
|
SBAddress
|
|
GetStartAddress ();
|
|
|
|
SBAddress
|
|
GetEndAddress ();
|
|
|
|
uint32_t
|
|
GetPrologueByteSize ();
|
|
|
|
SymbolType
|
|
GetType ();
|
|
|
|
bool
|
|
GetDescription (lldb::SBStream &description);
|
|
|
|
%pythoncode %{
|
|
def get_instructions_from_current_target (self):
|
|
return self.GetInstructions (target)
|
|
|
|
__swig_getmethods__["name"] = GetName
|
|
if _newclass: x = property(GetName, None)
|
|
|
|
__swig_getmethods__["mangled"] = GetMangledName
|
|
if _newclass: x = property(GetMangledName, None)
|
|
|
|
__swig_getmethods__["type"] = GetType
|
|
if _newclass: x = property(GetType, None)
|
|
|
|
__swig_getmethods__["addr"] = GetStartAddress
|
|
if _newclass: x = property(GetStartAddress, None)
|
|
|
|
__swig_getmethods__["end_addr"] = GetEndAddress
|
|
if _newclass: x = property(GetEndAddress, None)
|
|
|
|
__swig_getmethods__["prologue_size"] = GetPrologueByteSize
|
|
if _newclass: x = property(GetPrologueByteSize, None)
|
|
|
|
__swig_getmethods__["instructions"] = get_instructions_from_current_target
|
|
if _newclass: x = property(get_instructions_from_current_target, None)
|
|
|
|
%}
|
|
|
|
};
|
|
|
|
} // namespace lldb
|