From 695f9bf8d0a7d0a871b8ab75270ceb29715d9be3 Mon Sep 17 00:00:00 2001 From: Kartik Agaram Date: Thu, 25 Jul 2019 00:08:23 -0700 Subject: 5468 --- html/subx/039debug.cc.html | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) (limited to 'html/subx/039debug.cc.html') diff --git a/html/subx/039debug.cc.html b/html/subx/039debug.cc.html index fa0901d6..a7c05411 100644 --- a/html/subx/039debug.cc.html +++ b/html/subx/039debug.cc.html @@ -99,17 +99,17 @@ if ('onhashchange' in window) { 39 if (contains_key(Symbol_name, EIP)) 40 trace(Callstack_depth, "run") << "== label " << get(Symbol_name, EIP) << end(); 41 if (contains_key(Source_line, EIP)) - 42 trace(Callstack_depth, "run") << "0x" << HEXWORD << EIP << ": " << get(Source_line, EIP) << end(); + 42 trace(Callstack_depth, "run") << "0x" << HEXWORD << EIP << ": " << get(Source_line, EIP) << end(); 43 else 44 // no source line info; do what you can - 45 trace(Callstack_depth, "run") << "0x" << HEXWORD << EIP << ": " << debug_info(EIP) << end(); + 45 trace(Callstack_depth, "run") << "0x" << HEXWORD << EIP << ": " << debug_info(EIP) << end(); 46 47 :(code) 48 string debug_info(uint32_t inst_address) { 49 uint8_t op = read_mem_u8(inst_address); 50 if (op != 0xe8) { 51 ostringstream out; - 52 out << HEXBYTE << NUM(op); + 52 out << HEXBYTE << NUM(op); 53 return out.str(); 54 } 55 int32_t offset = read_mem_i32(inst_address+/*skip op*/1); @@ -117,7 +117,7 @@ if ('onhashchange' in window) { 57 if (contains_key(Symbol_name, next_eip)) 58 return "e8/call "+get(Symbol_name, next_eip); 59 ostringstream out; - 60 out << "e8/call 0x" << HEXWORD << next_eip; + 60 out << "e8/call 0x" << HEXWORD << next_eip; 61 return out.str(); 62 } 63 @@ -136,7 +136,7 @@ if ('onhashchange' in window) { 76 if (Watch_points.empty()) return; 77 trace(Callstack_depth, "dbg") << "watch points:" << end(); 78 for (map<string, uint32_t>::iterator p = Watch_points.begin(); p != Watch_points.end(); ++p) - 79 trace(Callstack_depth, "dbg") << " " << p->first << ": " << HEXWORD << p->second << " -> " << HEXWORD << read_mem_u32(p->second) << end(); + 79 trace(Callstack_depth, "dbg") << " " << p->first << ": " << HEXWORD << p->second << " -> " << HEXWORD << read_mem_u32(p->second) << end(); 80 } 81 82 :(before "End Globals") @@ -147,7 +147,7 @@ if ('onhashchange' in window) { 87 Watch_this_effective_address = get(Symbol_name, EIP); 88 :(after "Found effective_address(addr)") 89 if (!Watch_this_effective_address.empty()) { - 90 dbg << "now watching " << HEXWORD << addr << " for " << Watch_this_effective_address << end(); + 90 dbg << "now watching " << HEXWORD << addr << " for " << Watch_this_effective_address << end(); 91 put(Watch_points, Watch_this_effective_address, addr); 92 } 93 @@ -160,9 +160,9 @@ if ('onhashchange' in window) { 100 :(code) 101 void dump_stream_at(uint32_t stream_start) { 102 int32_t stream_length = read_mem_i32(stream_start + 8); -103 dbg << "stream length: " << std::dec << stream_length << end(); +103 dbg << "stream length: " << std::dec << stream_length << end(); 104 for (int i = 0; i < stream_length + 12; ++i) -105 dbg << "0x" << HEXWORD << (stream_start+i) << ": " << HEXBYTE << NUM(read_mem_u8(stream_start+i)) << end(); +105 dbg << "0x" << HEXWORD << (stream_start+i) << ": " << HEXBYTE << NUM(read_mem_u8(stream_start+i)) << end(); 106 } 107 108 //: helpers -- cgit 1.4.1-2-gfad0