# # gdb helper commands and functions for Linux kernel debugging # # load kernel and module symbols # # Copyright (c) Siemens AG, 2011-2013 # # Authors: # Jan Kiszka <jan.kiszka@siemens.com> # # This work is licensed under the terms of the GNU GPL version 2. #
import gdb import os import re import struct
from itertools import count from linux import modules, utils, constants
if hasattr(gdb, 'Breakpoint'): class LoadModuleBreakpoint(gdb.Breakpoint): def __init__(self, spec, gdb_command):
super(LoadModuleBreakpoint, self).__init__(spec, internal=True)
self.silent = True
self.gdb_command = gdb_command
# enforce update if object file is not found
cmd.module_files_updated = False
# Disable pagination while reporting symbol (re-)loading. # The console input is blocked in this context so that we would # get stuck waiting for the user to acknowledge paged output. with utils.pagination_off(): if module_name in cmd.loaded_modules:
gdb.write("refreshing all symbols to reload module " "'{0}'\n".format(module_name))
cmd.load_all_symbols() else:
cmd.load_module_symbols(module)
returnFalse
def get_vmcore_s390(): with utils.qemu_phy_mem_mode():
vmcore_info = 0x0e0c
paddr_vmcoreinfo_note = gdb.parse_and_eval("*(unsigned long long *)" +
hex(vmcore_info)) if paddr_vmcoreinfo_note == 0 or paddr_vmcoreinfo_note & 1: # In the early boot case, extract vm_layout.kaslr_offset from the # vmlinux image in physical memory. if paddr_vmcoreinfo_note == 0:
kaslr_offset_phys = 0 else:
kaslr_offset_phys = paddr_vmcoreinfo_note - 1 with utils.pagination_off():
gdb.execute("symbol-file {0} -o {1}".format(
utils.get_vmlinux(), hex(kaslr_offset_phys)))
kaslr_offset = gdb.parse_and_eval("vm_layout.kaslr_offset") return"KERNELOFFSET=" + hex(kaslr_offset)[2:]
inferior = gdb.selected_inferior()
elf_note = inferior.read_memory(paddr_vmcoreinfo_note, 12)
n_namesz, n_descsz, n_type = struct.unpack(">III", elf_note)
desc_paddr = paddr_vmcoreinfo_note + len(elf_note) + n_namesz + 1 return gdb.parse_and_eval("(char *)" + hex(desc_paddr)).string()
def get_kerneloffset(): if utils.is_target_arch('s390'): try:
vmcore_str = get_vmcore_s390() except gdb.error as e:
gdb.write("{}\n".format(e)) returnNone return utils.parse_vmcore(vmcore_str).kerneloffset returnNone
def is_in_s390_decompressor(): # DAT is always off in decompressor. Use this as an indicator. # Note that in the kernel, DAT can be off during kexec() or restart. # Accept this imprecision in order to avoid complicating things. # It is unlikely that someone will run lx-symbols at these points.
pswm = int(gdb.parse_and_eval("$pswm")) return (pswm & 0x0400000000000000) == 0
def skip_decompressor(): if utils.is_target_arch("s390"): if is_in_s390_decompressor(): # The address of the jump_to_kernel function is statically placed # into svc_old_psw.addr (see ipl_data.c); read it from there. DAT # is off, so we do not need to care about lowcore relocation.
svc_old_pswa = 0x148
jump_to_kernel = int(gdb.parse_and_eval("*(unsigned long long *)" +
hex(svc_old_pswa)))
gdb.execute("tbreak *" + hex(jump_to_kernel))
gdb.execute("continue") while is_in_s390_decompressor():
gdb.execute("stepi")
class LxSymbols(gdb.Command): """(Re-)load symbols of Linux kernel and currently loaded modules.
The kernel (vmlinux) is taken from the current working directly. Modules (.ko)
are scanned recursively, starting in the same directory. Optionally, the module
search path can be extended by a space separated list of paths passed to the
lx-symbols command."""
def _update_module_files(self):
self.module_files = [] for path in self.module_paths:
gdb.write("scanning for modules in {0}\n".format(path)) for root, dirs, files in os.walk(path): for name in files: if name.endswith(".ko") or name.endswith(".ko.debug"):
self.module_files.append(root + "/" + name)
self.module_files_updated = True
def _get_module_file(self, module_name):
module_pattern = r".*/{0}\.ko(?:.debug)?$".format(
module_name.replace("_", r"[_\-]")) for name in self.module_files: if re.match(module_pattern, name) and os.path.exists(name): return name returnNone
# Dropping symbols will disable all breakpoints. So save their states # and restore them afterward.
saved_states = [] if hasattr(gdb, 'breakpoints') andnot gdb.breakpoints() isNone: for bp in gdb.breakpoints():
saved_states.append({'breakpoint': bp, 'enabled': bp.enabled})
# drop all current symbols and reload vmlinux
orig_vmlinux = utils.get_vmlinux()
gdb.execute("symbol-file", to_string=True)
kerneloffset = get_kerneloffset() if kerneloffset isNone:
offset_arg = "" else:
offset_arg = " -o " + hex(kerneloffset)
gdb.execute("symbol-file {0}{1}".format(orig_vmlinux, offset_arg))
self.loaded_modules = []
module_list = modules.module_list() ifnot module_list:
gdb.write("no modules found\n") else:
[self.load_module_symbols(module) for module in module_list]
for saved_state in saved_states:
saved_state['breakpoint'].enabled = saved_state['enabled']
if hasattr(gdb, 'Breakpoint'): if self.breakpoint isnotNone:
self.breakpoint.delete()
self.breakpoint = None
self.breakpoint = LoadModuleBreakpoint( "kernel/module/main.c:do_init_module", self) else:
gdb.write("Note: symbol update on module loading not supported " "with this gdb version\n")
LxSymbols()
Messung V0.5
¤ Dauer der Verarbeitung: 0.12 Sekunden
(vorverarbeitet)
¤
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.