dmesg.py 2.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465
  1. #
  2. # gdb helper commands and functions for Linux kernel debugging
  3. #
  4. # kernel log buffer dump
  5. #
  6. # Copyright (c) Siemens AG, 2011, 2012
  7. #
  8. # Authors:
  9. # Jan Kiszka <jan.kiszka@siemens.com>
  10. #
  11. # This work is licensed under the terms of the GNU GPL version 2.
  12. #
  13. import gdb
  14. import string
  15. from linux import utils
  16. class LxDmesg(gdb.Command):
  17. """Print Linux kernel log buffer."""
  18. def __init__(self):
  19. super(LxDmesg, self).__init__("lx-dmesg", gdb.COMMAND_DATA)
  20. def invoke(self, arg, from_tty):
  21. log_buf_addr = int(str(gdb.parse_and_eval("log_buf")).split()[0], 16)
  22. log_first_idx = int(gdb.parse_and_eval("log_first_idx"))
  23. log_next_idx = int(gdb.parse_and_eval("log_next_idx"))
  24. log_buf_len = int(gdb.parse_and_eval("log_buf_len"))
  25. inf = gdb.inferiors()[0]
  26. start = log_buf_addr + log_first_idx
  27. if log_first_idx < log_next_idx:
  28. log_buf_2nd_half = -1
  29. length = log_next_idx - log_first_idx
  30. log_buf = inf.read_memory(start, length)
  31. else:
  32. log_buf_2nd_half = log_buf_len - log_first_idx
  33. log_buf = inf.read_memory(start, log_buf_2nd_half) + \
  34. inf.read_memory(log_buf_addr, log_next_idx)
  35. pos = 0
  36. while pos < log_buf.__len__():
  37. length = utils.read_u16(log_buf[pos + 8:pos + 10])
  38. if length == 0:
  39. if log_buf_2nd_half == -1:
  40. gdb.write("Corrupted log buffer!\n")
  41. break
  42. pos = log_buf_2nd_half
  43. continue
  44. text_len = utils.read_u16(log_buf[pos + 10:pos + 12])
  45. text = log_buf[pos + 16:pos + 16 + text_len]
  46. time_stamp = utils.read_u64(log_buf[pos:pos + 8])
  47. for line in memoryview(text).tobytes().splitlines():
  48. gdb.write("[{time:12.6f}] {line}\n".format(
  49. time=time_stamp / 1000000000.0,
  50. line=line))
  51. pos += length
  52. LxDmesg()