/usr/share/gps/library/addr2line.py is in gnat-gps-common 5.3dfsg-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 | """This plug-in provides an interface to addr2line, to convert addresses into
file names and line numbers
This is in particular useful when analyzing backtraces output by GNAT when
the application was bound with the -E switch:
gnatmake ... -bargs -E
addr2line is used to process the output and display a symbolic backtrace with
hyper links on which the user can click to jump to the actual source location.
One console is opened per executable (that is several addr2line consoles can
exist at the same time, each associated with a different executable).
While the console exists, you can enter additional backtraces to be processes
for the same executable, so that you do not have to enter the name of the
executable each time.
A convenience menu is added to open the console:
/Navigate/Open Addr2line Console
It asks you for the location of the executable
"""
#############################################################################
## No user customization below this line
#############################################################################
from GPS import *
import re
import os.path
Preference ("Plugins/addr2line/args").create (
"Arguments", "string",
"""Additional arguments to pass to addr2line""",
"--functions --demangle=gnat")
file_line_re = "(([-_\w./\\\\]+):(\d+)(:(\d+))?)"
class Addr2line (Console):
def __init__ (self, executable):
self.executable = executable
self.name = "addr2line -e " + os.path.basename (self.executable)
Console.__init__ (self, self.name,
on_input=Addr2line.on_input)
self.create_link (file_line_re, self.onclick)
self.clear ()
self.write ("Backtrace ?")
self.enable_input (True)
MDI.get (self.name).raise_window()
def backtrace (self, bt):
self.clear ()
cmd = "addr2line -e " + self.executable + " " + Preference ("Plugins/addr2line/args").get()
self.write (cmd + "\n")
Process (cmd + " " + bt, ".+",
on_exit = self.on_exit,
on_match = self.on_output)
def on_input (self, input):
self.backtrace (input.replace ("\n", " "))
def on_output (self, process, matched, unmatched):
self.write_with_links (unmatched + matched)
def on_exit (self, process, status, full_output):
MDI.get (self.name).raise_window()
self.write ("\n\nBacktrace ?")
self.enable_input (True)
def onclick (self, text):
matched = re.match (file_line_re, text)
buffer = EditorBuffer.get (File (matched.group (2)))
MDI.get_by_child (buffer.current_view()).raise_window()
line = int (matched.group (3))
column = matched.group (5)
if column != None:
buffer.current_view().goto (EditorLocation (buffer, line, int (column)))
else:
buffer.current_view().goto (EditorLocation (buffer, line, 1))
def open_addr2line_console (menu):
executable = MDI.input_dialog ("Location of the executable ?", "Exec")[0]
addr = Addr2line (executable)
Menu.create ("/Navigate/Open Addr2line Console", open_addr2line_console)
|