blob: b58eda3d38c8d42039c58e7d7b815916b1bbdcab [file] [log] [blame]
Julius Werner634ccac2014-06-24 13:59:18 -07001# Copyright 2014 The Chromium OS Authors. All rights reserved.
2# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
5"""Connect to a DUT in firmware via remote GDB, install custom GDB commands."""
6
7import errno
Raul E Rangeleb8aadc2018-05-17 09:10:27 -06008import glob
Julius Werner634ccac2014-06-24 13:59:18 -07009import os
10import re
Julius Werner634ccac2014-06-24 13:59:18 -070011import socket
12import time
13
Mike Frysinger849d6402019-10-17 00:14:16 -040014from elftools.elf.elffile import ELFFile
15
Mike Frysinger06a51c82021-04-06 11:39:17 -040016from chromite.lib import build_target_lib
Aviv Keshetb7519e12016-10-04 00:50:00 -070017from chromite.lib import constants
Julius Werner634ccac2014-06-24 13:59:18 -070018from chromite.lib import cros_build_lib
Ralph Nathan91874ca2015-03-19 13:29:41 -070019from chromite.lib import cros_logging as logging
Julius Werner634ccac2014-06-24 13:59:18 -070020from chromite.lib import timeout_util
21
Julius Werner634ccac2014-06-24 13:59:18 -070022# Need to do this before Servo import
23cros_build_lib.AssertInsideChroot()
24
Mike Frysinger92bdef52019-08-21 21:05:13 -040025# pylint: disable=import-error,wrong-import-position
Julius Werner634ccac2014-06-24 13:59:18 -070026from servo import client
Ruben Rodriguez Buchillon15bdd452018-10-09 08:31:41 +080027from servo import servo_parsing
Aseda Aboagye6e21d3f2016-10-21 11:37:56 -070028from servo import terminal_freezer
Mike Frysinger92bdef52019-08-21 21:05:13 -040029# pylint: enable=import-error,wrong-import-position
Julius Werner634ccac2014-06-24 13:59:18 -070030
Ralph Nathan91874ca2015-03-19 13:29:41 -070031
Julius Werner634ccac2014-06-24 13:59:18 -070032_SRC_ROOT = os.path.join(constants.CHROOT_SOURCE_ROOT, 'src')
33_SRC_DC = os.path.join(_SRC_ROOT, 'platform/depthcharge')
34_SRC_VB = os.path.join(_SRC_ROOT, 'platform/vboot_reference')
35_SRC_LP = os.path.join(_SRC_ROOT, 'third_party/coreboot/payloads/libpayload')
36
Julius Werner634ccac2014-06-24 13:59:18 -070037_PTRN_GDB = 'Ready for GDB connection'
Julius Werner20dfc992014-07-21 18:40:11 -070038_PTRN_BOARD = 'Starting(?: read-only| read/write)? depthcharge on ([a-z_]+)...'
Julius Werner634ccac2014-06-24 13:59:18 -070039
40
Julius Werner149fe782018-10-10 15:18:14 -070041def GetGdbForElf(elf):
42 """Return the correct C compiler prefix for the target ELF file."""
Mike Frysinger17844a02019-08-24 18:21:02 -040043 with open(elf, 'rb') as fp:
Julius Werner149fe782018-10-10 15:18:14 -070044 return {
45 'EM_386': 'x86_64-cros-linux-gnu-gdb',
46 'EM_X86_64': 'x86_64-cros-linux-gnu-gdb',
47 'EM_ARM': 'armv7a-cros-linux-gnueabihf-gdb',
48 'EM_AARCH64': 'aarch64-cros-linux-gnu-gdb',
Mike Frysinger17844a02019-08-24 18:21:02 -040049 }[ELFFile(fp).header.e_machine]
Julius Werner634ccac2014-06-24 13:59:18 -070050
51
52def ParseArgs(argv):
53 """Parse and validate command line arguments."""
Raul E Rangelb54ec042020-02-06 09:25:12 -070054 description = 'Debug depthcharge using GDB'
55 parser = servo_parsing.ServodClientParser(description=description)
Julius Werner634ccac2014-06-24 13:59:18 -070056 parser.add_argument('-b', '--board',
57 help='The board overlay name (auto-detect by default)')
Raul E Rangel72f32712018-05-29 11:42:59 -060058 parser.add_argument('-c', '--cgdb', action='store_true',
59 help='Use cgdb curses interface rather than plain gdb')
Raul E Rangelb54ec042020-02-06 09:25:12 -070060 parser.add_argument('-y', '--symbols',
Julius Werner634ccac2014-06-24 13:59:18 -070061 help='Root directory or complete path to symbolized ELF '
62 '(defaults to /build/<BOARD>/firmware)')
63 parser.add_argument('-r', '--reboot', choices=['yes', 'no', 'auto'],
64 help='Reboot the DUT before connect (default: reboot if '
65 'the remote and is unreachable)', default='auto')
66 parser.add_argument('-e', '--execute', action='append', default=[],
67 help='GDB command to run after connect (can be supplied '
68 'multiple times)')
Julius Werner634ccac2014-06-24 13:59:18 -070069 parser.add_argument('-t', '--tty',
70 help='TTY file to connect to (defaults to cpu_uart_pty)')
Julius Werner634ccac2014-06-24 13:59:18 -070071 opts = parser.parse_args(argv)
Ruben Rodriguez Buchillond7c65bd2018-12-10 10:10:19 +080072
Julius Werner634ccac2014-06-24 13:59:18 -070073 return opts
74
75
Julius Werner193c9142018-05-09 16:25:38 -070076def FindSymbols(firmware_dir, board):
Julius Werner634ccac2014-06-24 13:59:18 -070077 """Find the symbolized depthcharge ELF (may be supplied by -s flag)."""
Raul E Rangeleb8aadc2018-05-17 09:10:27 -060078
79 # Allow overriding the file directly just in case our detection screws up.
80 if firmware_dir and firmware_dir.endswith('.elf'):
81 return firmware_dir
82
83 if not firmware_dir:
84 # Unified builds have the format
85 # /build/<board|family>/firmware/<build_target|model>/. The board in
86 # depthcharge corresponds to the build_target in unified builds. For this
87 # reason we need to glob all boards to find the correct build_target.
88 unified_build_dirs = glob.glob('/build/*/firmware/%s' % board)
89 if len(unified_build_dirs) == 1:
90 firmware_dir = unified_build_dirs[0]
91 elif len(unified_build_dirs) > 1:
92 raise ValueError(
93 'Multiple boards were found (%s). Use -s to specify manually' %
94 (', '.join(unified_build_dirs)))
95
Julius Werner634ccac2014-06-24 13:59:18 -070096 if not firmware_dir:
Mike Frysinger06a51c82021-04-06 11:39:17 -040097 firmware_dir = os.path.join(
98 build_target_lib.get_default_sysroot_path(board), 'firmware')
Julius Werner634ccac2014-06-24 13:59:18 -070099
Julius Werner193c9142018-05-09 16:25:38 -0700100 # Very old firmware you might still find on GoldenEye had dev.ro.elf.
101 basenames = ['dev.elf', 'dev.ro.elf']
102 for basename in basenames:
103 path = os.path.join(firmware_dir, 'depthcharge', basename)
104 if not os.path.exists(path):
105 path = os.path.join(firmware_dir, basename)
106 if os.path.exists(path):
107 logging.warning('Auto-detected symbol file at %s... make sure that this'
108 ' matches the image on your DUT!', path)
109 return path
Julius Werner634ccac2014-06-24 13:59:18 -0700110
Julius Werner193c9142018-05-09 16:25:38 -0700111 raise ValueError('Could not find depthcharge symbol file (dev.elf)! '
112 '(You can use -s to supply it manually.)')
Julius Werner634ccac2014-06-24 13:59:18 -0700113
114
115# TODO(jwerner): Fine tune |wait| delay or maybe even make it configurable if
116# this causes problems due to load on the host. The callers where this is
117# critical should all have their own timeouts now, though, so it's questionable
118# whether the delay here is even needed at all anymore.
119def ReadAll(fd, wait=0.03):
120 """Read from |fd| until no more data has come for at least |wait| seconds."""
121 data = ''
122 try:
123 while True:
124 time.sleep(wait)
Julius Werner193c9142018-05-09 16:25:38 -0700125 new_data = os.read(fd, 4096)
126 if not new_data:
127 break
128 data += new_data
Julius Werner634ccac2014-06-24 13:59:18 -0700129 except OSError as e:
Julius Werner193c9142018-05-09 16:25:38 -0700130 if e.errno != errno.EAGAIN:
131 raise
132 logging.debug(data)
133 return data
Julius Werner634ccac2014-06-24 13:59:18 -0700134
135
136def GdbChecksum(message):
137 """Calculate a remote-GDB style checksum."""
138 chksum = sum([ord(x) for x in message])
139 return ('%.2x' % chksum)[-2:]
140
141
142def TestConnection(fd):
143 """Return True iff there is a resposive GDB stub on the other end of 'fd'."""
144 cmd = 'vUnknownCommand'
Mike Frysinger79cca962019-06-13 15:26:53 -0400145 for _ in range(3):
Julius Werner634ccac2014-06-24 13:59:18 -0700146 os.write(fd, '$%s#%s\n' % (cmd, GdbChecksum(cmd)))
147 reply = ReadAll(fd)
148 if '+$#00' in reply:
149 os.write(fd, '+')
Mike Frysinger2403af42015-04-30 06:25:03 -0400150 logging.info('TestConnection: Could successfully connect to remote end.')
Julius Werner634ccac2014-06-24 13:59:18 -0700151 return True
Mike Frysinger2403af42015-04-30 06:25:03 -0400152 logging.info('TestConnection: Remote end does not respond.')
Julius Werner634ccac2014-06-24 13:59:18 -0700153 return False
154
155
156def main(argv):
157 opts = ParseArgs(argv)
Raul E Rangelb54ec042020-02-06 09:25:12 -0700158 servo = client.ServoClient(host=opts.host, port=opts.port)
Julius Werner634ccac2014-06-24 13:59:18 -0700159
160 if not opts.tty:
161 try:
162 opts.tty = servo.get('cpu_uart_pty')
163 except (client.ServoClientError, socket.error):
Mike Frysinger2403af42015-04-30 06:25:03 -0400164 logging.error('Cannot auto-detect TTY file without servod. Use the --tty '
165 'option.')
Julius Werner634ccac2014-06-24 13:59:18 -0700166 raise
Aseda Aboagye6e21d3f2016-10-21 11:37:56 -0700167 with terminal_freezer.TerminalFreezer(opts.tty):
Julius Werner634ccac2014-06-24 13:59:18 -0700168 fd = os.open(opts.tty, os.O_RDWR | os.O_NONBLOCK)
169
170 data = ReadAll(fd)
171 if opts.reboot == 'auto':
172 if TestConnection(fd):
173 opts.reboot = 'no'
174 else:
175 opts.reboot = 'yes'
176
177 if opts.reboot == 'yes':
Mike Frysinger2403af42015-04-30 06:25:03 -0400178 logging.info('Rebooting DUT...')
Julius Werner634ccac2014-06-24 13:59:18 -0700179 try:
180 servo.set('warm_reset', 'on')
181 time.sleep(0.1)
182 servo.set('warm_reset', 'off')
183 except (client.ServoClientError, socket.error):
Mike Frysinger2403af42015-04-30 06:25:03 -0400184 logging.error('Cannot reboot without a Servo board. You have to boot '
185 'into developer mode and press CTRL+G manually before '
186 'running fwgdb.')
Julius Werner634ccac2014-06-24 13:59:18 -0700187 raise
188
189 # Throw away old data to avoid confusion from messages before the reboot
190 data = ''
Julius Werner193c9142018-05-09 16:25:38 -0700191 msg = ('Could not reboot into depthcharge!')
Mike Frysingerd6e2df02014-11-26 02:55:04 -0500192 with timeout_util.Timeout(10, msg):
Julius Werner193c9142018-05-09 16:25:38 -0700193 while not re.search(_PTRN_BOARD, data):
Julius Werner634ccac2014-06-24 13:59:18 -0700194 data += ReadAll(fd)
195
Mike Frysingerd6e2df02014-11-26 02:55:04 -0500196 msg = ('Could not enter GDB mode with CTRL+G! '
Julius Werner193c9142018-05-09 16:25:38 -0700197 '(Confirm that you flashed an "image.dev.bin" image to this DUT, '
198 'and that you have GBB_FLAG_FORCE_DEV_SWITCH_ON (0x8) set.)')
199 with timeout_util.Timeout(5, msg):
200 while not re.search(_PTRN_GDB, data):
201 # Send a CTRL+G to tell depthcharge to trap into GDB.
202 logging.debug('[Ctrl+G]')
203 os.write(fd, chr(ord('G') & 0x1f))
Julius Werner634ccac2014-06-24 13:59:18 -0700204 data += ReadAll(fd)
205
206 if not opts.board:
207 matches = re.findall(_PTRN_BOARD, data)
208 if not matches:
209 raise ValueError('Could not auto-detect board! Please use -b option.')
210 opts.board = matches[-1]
Mike Frysinger2403af42015-04-30 06:25:03 -0400211 logging.info('Auto-detected board as %s from DUT console output.',
212 opts.board)
Julius Werner634ccac2014-06-24 13:59:18 -0700213
214 if not TestConnection(fd):
215 raise IOError('Could not connect to remote end! Confirm that your DUT is '
216 'running in GDB mode on %s.' % opts.tty)
217
218 # Eat up leftover data or it will spill back to terminal
219 ReadAll(fd)
220 os.close(fd)
221
222 opts.execute.insert(0, 'target remote %s' % opts.tty)
223 ex_args = sum([['--ex', cmd] for cmd in opts.execute], [])
224
Julius Werner149fe782018-10-10 15:18:14 -0700225 elf = FindSymbols(opts.symbols, opts.board)
226 gdb_cmd = GetGdbForElf(elf)
Raul E Rangel72f32712018-05-29 11:42:59 -0600227
Raul E Rangel72f32712018-05-29 11:42:59 -0600228 gdb_args = [
Julius Werner149fe782018-10-10 15:18:14 -0700229 '--symbols', elf,
Raul E Rangel72f32712018-05-29 11:42:59 -0600230 '--directory', _SRC_DC,
231 '--directory', _SRC_VB,
232 '--directory', _SRC_LP,
233 ] + ex_args
234
235 if opts.cgdb:
236 full_cmd = ['cgdb', '-d', gdb_cmd, '--'] + gdb_args
237 else:
238 full_cmd = [gdb_cmd] + gdb_args
239
Julius Werner149fe782018-10-10 15:18:14 -0700240 logging.info('Launching GDB...')
Mike Frysinger45602c72019-09-22 02:15:11 -0400241 cros_build_lib.run(
Raul E Rangel72f32712018-05-29 11:42:59 -0600242 full_cmd, ignore_sigint=True, debug_level=logging.WARNING)