run-gdb-user 1.2 KB

1234567891011121314151617181920212223242526272829303132333435363738
  1. #!/usr/bin/env python3
  2. import imp
  3. import os
  4. import sys
  5. import common
  6. rungdb = imp.load_source('run_gdb', os.path.join(kwargs['root_dir'], 'run-gdb'))
  7. parser = self.get_argparse(argparse_args={
  8. 'description': '''GDB step debug guest userland processes without gdbserver.
  9. More information at: https://github.com/cirosantilli/linux-kernel-module-cheat#gdb-step-debug-userland-processes
  10. '''
  11. })
  12. parser.add_argument(
  13. 'executable',
  14. help='Path to the executable to be debugged relative to the Buildroot build directory.'
  15. )
  16. parser.add_argument(
  17. 'break_at',
  18. default=None,
  19. help='Break at this point, e.g. main.',
  20. nargs='?'
  21. )
  22. args = self.setup(parser)
  23. executable = self.resolve_userland(kwargs['executable'])
  24. addr = self.get_elf_entry(os.path.join(kwargs['buildroot_build_build_dir'], executable))
  25. extra_args = {}
  26. extra_args['before'] = '-ex \"add-symbol-file {} {}\"'.format(executable, hex(addr))
  27. # Or else lx-symbols throws for arm:
  28. # gdb.MemoryError: Cannot access memory at address 0xbf0040cc
  29. # TODO understand better.
  30. # Also, lx-symbols overrides the add-symbol-file commands.
  31. extra_args['no_lxsymbols'] = True
  32. extra_args['break_at'] = kwargs['break_at']
  33. sys.exit(rungdb.main(args, extra_args))