#!/usr/bin/env python3 # tools/minidumpserver.py # # Licensed to the Apache Software Foundation (ASF) under one or more # contributor license agreements. See the NOTICE file distributed with # this work for additional information regarding copyright ownership. The # ASF licenses this file to you under the Apache License, Version 2.0 (the # "License"); you may not use this file except in compliance with the # License. You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. # import argparse import binascii import logging import multiprocessing import os import re import shutil import socket import struct import subprocess import sys import elftools from elftools.elf.elffile import ELFFile # ELF section flags SHF_WRITE = 0x1 SHF_ALLOC = 0x2 SHF_EXEC = 0x4 SHF_WRITE_ALLOC = SHF_WRITE | SHF_ALLOC SHF_ALLOC_EXEC = SHF_ALLOC | SHF_EXEC GDB_SIGNAL_DEFAULT = 7 DEFAULT_GDB_INIT_CMD = "-ex 'bt full' -ex 'info reg' -ex 'display /40i $pc-40'" logger = logging.getLogger() reg_table = { "arm": { "R0": 0, "R1": 1, "R2": 2, "R3": 3, "R4": 4, "R5": 5, "R6": 6, "FP": 7, "R8": 8, "SB": 9, "SL": 10, "R11": 11, "IP": 12, "SP": 13, "LR": 14, "PC": 15, "xPSR": 16, }, "arm-a": { "R0": 0, "R1": 1, "R2": 2, "R3": 3, "R4": 4, "R5": 5, "R6": 6, "R7": 7, "R8": 8, "SB": 9, "SL": 10, "FP": 11, "IP": 12, "SP": 13, "LR": 14, "PC": 15, "CPSR": 41, }, "arm-t": { "R0": 0, "R1": 1, "R2": 2, "R3": 3, "R4": 4, "R5": 5, "R6": 6, "FP": 7, "R8": 8, "SB": 9, "SL": 10, "R11": 11, "IP": 12, "SP": 13, "LR": 14, "PC": 15, "CPSR": 41, }, "riscv": { "ZERO": 0, "RA": 1, "SP": 2, "GP": 3, "TP": 4, "T0": 5, "T1": 6, "T2": 7, "FP": 8, "S1": 9, "A0": 10, "A1": 11, "A2": 12, "A3": 13, "A4": 14, "A5": 15, "A6": 16, "A7": 17, "S2": 18, "S3": 19, "S4": 20, "S5": 21, "S6": 22, "S7": 23, "S8": 24, "S9": 25, "S10": 26, "S11": 27, "T3": 28, "T4": 29, "T5": 30, "T6": 31, "PC": 32, }, # use xtensa-esp32s3-elf-gdb register table "esp32s3": { "PC": 0, "PS": 73, "A0": 1, "A1": 2, "A2": 3, "A3": 4, "A4": 5, "A5": 6, "A6": 7, "A7": 8, "A8": 9, "A9": 10, "A10": 11, "A11": 12, "A12": 13, "A13": 14, "A14": 15, "A15": 16, "WINDOWBASE": 69, "WINDOWSTART": 70, "CAUSE": 190, "VADDR": 196, "LBEG": 65, "LEND": 66, "LCNT": 67, "SAR": 68, "SCOM": 76, }, # use xt-gdb register table "xtensa": { "PC": 32, "PS": 742, "A0": 256, "A1": 257, "A2": 258, "A3": 259, "A4": 260, "A5": 261, "A6": 262, "A7": 263, "A8": 264, "A9": 265, "A10": 266, "A11": 267, "A12": 268, "A13": 269, "A14": 270, "A15": 271, "WINDOWBASE": 584, "WINDOWSTART": 585, "CAUSE": 744, "VADDR": 750, "LBEG": 512, "LEND": 513, "LCNT": 514, "SAR": 515, "SCOM": 524, }, } # make sure the a0-a15 can be remapped to the correct register reg_fix_value = { "esp32s3": { "WINDOWBASE": 0, "WINDOWSTART": 1, "PS": 0x40000, }, "xtensa": { "WINDOWBASE": 0, "WINDOWSTART": 1, "PS": 0x40000, }, } def str_get_after(s, sub): index = s.find(sub) if index == -1: return None return s[index + len(sub) :] def pack_memory(start, end, data): return {"start": start, "end": end, "data": data} class DumpELFFile: """ Class to parse ELF file for memory content in various sections. There are read-only sections (e.g. text and rodata) where the memory content does not need to be dumped via coredump and can be retrieved from the ELF file. """ def __init__(self, elffile: str): self.elffile = elffile self.__memories = [] def parse(self): self.__memories = [] elf = ELFFile.load_from_path(self.elffile) for section in elf.iter_sections(): # REALLY NEED to match exact type as all other sections # (debug, text, etc.) are descendants where # isinstance() would match. if ( type(section) is not elftools.elf.sections.Section ): # pylint: disable=unidiomatic-typecheck continue size = section["sh_size"] flags = section["sh_flags"] start = section["sh_addr"] end = start + size - 1 store = False desc = "?" if section["sh_type"] == "SHT_PROGBITS": if (flags & SHF_ALLOC_EXEC) == SHF_ALLOC_EXEC: # Text section store = True desc = "text" elif (flags & SHF_WRITE_ALLOC) == SHF_WRITE_ALLOC: # Data section # # Running app changes the content so no need # to store pass elif (flags & SHF_ALLOC) == SHF_ALLOC: # Read only data section store = True desc = "read-only data" if store: memory = pack_memory(start, end, section.data()) logger.debug( f"ELF Section: {hex(memory['start'])} to {hex(memory['end'])} of size {len(memory['data'])} ({desc})" ) self.__memories.append(memory) elf.close() return True def get_memories(self): return self.__memories class DumpLogFile: def __init__(self, logfile): self.logfile = logfile self.registers = [] self.__memories = list() self.reg_table = dict() def _init_register(self): self.registers = [b"x"] * (max(self.reg_table.values()) + 1) def _parse_register(self, line): line = str_get_after(line, "up_dump_register:") if line is None: return False line = line.strip() # find register value find_res = re.findall(r"(?P\w+): (?P[0-9a-fA-F]+)", line) for reg_name, reg_val in find_res: if reg_name in self.reg_table: reg_index = self.reg_table[reg_name] self.registers[reg_index] = int(reg_val, 16) return True def _parse_fix_register(self, arch): if arch in reg_fix_value: for reg_name, reg_vals in reg_fix_value[arch].items(): reg_index = self.reg_table[reg_name] self.registers[reg_index] = reg_vals def _parse_stack(self, line, start, data): line = str_get_after(line, "stack_dump:") if line is None: return None line = line.strip() # find stack-dump match_res = re.match(r"(?P0x\w+): (?P( ?\w+)+)", line) if match_res is None: return None addr_start = int(match_res.groupdict()["ADDR_START"], 16) if start + len(data) != addr_start: # stack is not contiguous if len(data) == 0: start = addr_start else: self.__memories.append(pack_memory(start, start + len(data), data)) data = b"" start = addr_start for val in match_res.groupdict()["VALS"].split(): data = data + struct.pack(" unknown value # Send in "xxxxxxxx" pkt += b"x" * 8 self.put_gdb_packet(pkt) def handle_register_single_read_packet(self, pkt): reg_fmt = ", def get_mem_region(addr): left = 0 right = len(self.mem_regions) - 1 while left <= right: mid = (left + right) // 2 if ( self.mem_regions[mid]["start"] <= addr <= self.mem_regions[mid]["end"] ): return self.mem_regions[mid] elif addr < self.mem_regions[mid]["start"]: right = mid - 1 else: left = mid + 1 return None # extract address and length from packet # and convert them into usable integer values addr, length = pkt[1:].split(b",") s_addr = int(addr, 16) length = int(length, 16) remaining = length addr = s_addr barray = b"" r = get_mem_region(addr) while remaining > 0: if r is None: barray = None break offset = addr - r["start"] barray += r["data"][offset : offset + 1] addr += 1 remaining -= 1 if barray is not None: pkt = binascii.hexlify(barray) self.put_gdb_packet(pkt) else: self.put_gdb_packet(b"E01") def handle_memory_write_packet(self, pkt): # the 'M' packet for writing to memory # # We don't support writing so return error self.put_gdb_packet(b"E02") def handle_general_query_packet(self, pkt): self.put_gdb_packet(b"") def run(self, socket: socket.socket): self.socket = socket while True: pkt = self.get_gdb_packet() if pkt is None: continue pkt_type = pkt[0:1] logger.debug(f"Got packet type: {pkt_type}") if pkt_type == b"?": self.handle_signal_query_packet() elif pkt_type in (b"C", b"S"): # Continue/stepping execution, which is not supported. # So signal exception again self.handle_signal_query_packet() elif pkt_type == b"g": self.handle_register_group_read_packet() elif pkt_type == b"G": self.handle_register_group_write_packet() elif pkt_type == b"p": self.handle_register_single_read_packet(pkt) elif pkt_type == b"P": self.handle_register_single_write_packet(pkt) elif pkt_type == b"m": self.handle_memory_read_packet(pkt) elif pkt_type == b"M": self.handle_memory_write_packet(pkt) elif pkt_type == b"q": self.handle_general_query_packet(pkt) elif pkt_type == b"k": # GDB quits break else: self.put_gdb_packet(b"") def arg_parser(): parser = argparse.ArgumentParser() parser.add_argument("-e", "--elffile", required=True, help="elffile") parser.add_argument("-l", "--logfile", required=True, help="logfile") parser.add_argument( "-a", "--arch", help="select architecture,if not use this options", required=True, choices=[arch for arch in reg_table.keys()], ) parser.add_argument("-p", "--port", help="gdbport", type=int, default=1234) parser.add_argument( "-g", "--gdb", help="provided a custom GDB path, automatically start GDB session and exit minidumpserver when exit GDB. ", type=str, ) parser.add_argument( "-i", "--init-cmd", nargs="?", default=argparse.SUPPRESS, help="provided a custom GDB init command, automatically start GDB sessions and input what you provide. " f"if you don't provide any command, it will use default command [{DEFAULT_GDB_INIT_CMD}]. ", ) parser.add_argument( "--debug", action="store_true", default=False, help="if enabled, it will show more logs.", ) return parser.parse_args() def config_log(debug): if debug: logger.setLevel(logging.DEBUG) else: logger.setLevel(logging.INFO) logging.basicConfig(format="[%(levelname)s][%(name)s] %(message)s") def auto_parse_log_file(logfile): with open(logfile, errors="ignore") as f: dumps = [] tmp_dmp = [] start = False for line in f.readlines(): line = line.strip() if ( "up_dump_register" in line or "dump_stack" in line or "stack_dump" in line ): start = True else: if start: start = False dumps.append(tmp_dmp) tmp_dmp = [] if start: tmp_dmp.append(line) if start: dumps.append(tmp_dmp) terminal_width, _ = shutil.get_terminal_size() terminal_width = max(terminal_width - 4, 0) def get_one_line(lines): return " ".join(lines[:2])[:terminal_width] if len(dumps) == 0: logger.error(f"Cannot find any dump in {logfile}, exiting...") sys.exit(1) if len(dumps) == 1: return dumps[0] for i in range(len(dumps)): print(f"{i}: {get_one_line(dumps[i])}") index_input = input("Dump number[0]: ").strip() if index_input == "": index_input = 0 return dumps[int(index_input)] def main(args): if not os.path.isfile(args.elffile): logger.error(f"Cannot find file {args.elffile}, exiting...") sys.exit(1) if not os.path.isfile(args.logfile): logger.error(f"Cannot find file {args.logfile}, exiting...") sys.exit(1) config_log(args.debug) selected_log = auto_parse_log_file(args.logfile) log = DumpLogFile(selected_log) log.parse(args.arch) elf = DumpELFFile(args.elffile) elf.parse() gdb_stub = GDBStub(log, elf) gdbserver = socket.socket(socket.AF_INET, socket.SOCK_STREAM) # Reuse address so we don't have to wait for socket to be # close before we can bind to the port again gdbserver.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1) gdbserver.bind(("", args.port)) gdbserver.listen(1) gdb_exec = "gdb" if not args.gdb else args.gdb gdb_init_cmd = "" if hasattr(args, "init_cmd"): if args.init_cmd is not None: gdb_init_cmd = args.init_cmd.strip() else: gdb_init_cmd = DEFAULT_GDB_INIT_CMD gdb_cmd = ( f"{gdb_exec} {args.elffile} -ex 'target remote localhost:{args.port}' " f"{gdb_init_cmd}" ) logger.info(f"Waiting GDB connection on port {args.port} ...") if not args.gdb: logger.info("Press Ctrl+C to stop ...") logger.info(f"Hint: {gdb_cmd}") else: logger.info(f"Run GDB command: {gdb_cmd}") def gdb_run(cmd): try: subprocess.run(cmd, shell=True) except KeyboardInterrupt: pass multiprocessing.Process(target=gdb_run, args=(gdb_cmd,)).start() while True: try: conn, remote = gdbserver.accept() if conn: logger.info(f"Accepted GDB connection from {remote}") gdb_stub.run(conn) except KeyboardInterrupt: break gdbserver.close() if __name__ == "__main__": main(arg_parser())