database_gen.py 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291
  1. #!/usr/bin/env python3
  2. #
  3. # Copyright (c) 2020 Intel Corporation
  4. #
  5. # SPDX-License-Identifier: Apache-2.0
  6. """
  7. Dictionary-based Logging Database Generator
  8. This takes the built Zephyr ELF binary and produces a JSON database
  9. file for dictionary-based logging. This database is used together
  10. with the parser to decode binary log messages.
  11. """
  12. import argparse
  13. import logging
  14. import os
  15. import struct
  16. import sys
  17. import dictionary_parser.log_database
  18. from dictionary_parser.log_database import LogDatabase
  19. import elftools
  20. from elftools.elf.elffile import ELFFile
  21. from elftools.elf.descriptions import describe_ei_data
  22. from elftools.elf.sections import SymbolTableSection
  23. LOGGER_FORMAT = "%(name)s: %(levelname)s: %(message)s"
  24. logger = logging.getLogger(os.path.basename(sys.argv[0]))
  25. # Sections that contains static strings
  26. STATIC_STRING_SECTIONS = ['rodata', '.rodata', 'log_strings_sections']
  27. def parse_args():
  28. """Parse command line arguments"""
  29. argparser = argparse.ArgumentParser()
  30. argparser.add_argument("elffile", help="Zephyr ELF binary")
  31. argparser.add_argument("dbfile", help="Dictionary Logging Database file")
  32. argparser.add_argument("--build", help="Build ID")
  33. argparser.add_argument("--debug", action="store_true",
  34. help="Print extra debugging information")
  35. argparser.add_argument("-v", "--verbose", action="store_true",
  36. help="Print more information")
  37. return argparser.parse_args()
  38. def find_elf_sections(elf, sh_name):
  39. """Find all sections in ELF file"""
  40. for section in elf.iter_sections():
  41. if section.name == sh_name:
  42. ret = {
  43. 'name' : section.name,
  44. 'size' : section['sh_size'],
  45. 'start' : section['sh_addr'],
  46. 'end' : section['sh_addr'] + section['sh_size'] - 1,
  47. 'data' : section.data(),
  48. }
  49. return ret
  50. return None
  51. def get_kconfig_symbols(elf):
  52. """Get kconfig symbols from the ELF file"""
  53. for section in elf.iter_sections():
  54. if isinstance(section, SymbolTableSection):
  55. return {sym.name: sym.entry.st_value
  56. for sym in section.iter_symbols()
  57. if sym.name.startswith("CONFIG_")}
  58. raise LookupError("Could not find symbol table")
  59. def find_log_const_symbols(elf):
  60. """Extract all "log_const_*" symbols from ELF file"""
  61. symbol_tables = [s for s in elf.iter_sections()
  62. if isinstance(s, elftools.elf.sections.SymbolTableSection)]
  63. ret_list = []
  64. for section in symbol_tables:
  65. if not isinstance(section, elftools.elf.sections.SymbolTableSection):
  66. continue
  67. if section['sh_entsize'] == 0:
  68. continue
  69. for symbol in section.iter_symbols():
  70. if symbol.name.startswith("log_const_"):
  71. ret_list.append(symbol)
  72. return ret_list
  73. def parse_log_const_symbols(database, log_const_section, log_const_symbols):
  74. """Find the log instances and map source IDs to names"""
  75. if database.is_tgt_little_endian():
  76. formatter = "<"
  77. else:
  78. formatter = ">"
  79. if database.is_tgt_64bit():
  80. # 64-bit pointer to string
  81. formatter += "Q"
  82. else:
  83. # 32-bit pointer to string
  84. formatter += "L"
  85. # log instance level
  86. formatter += "B"
  87. datum_size = struct.calcsize(formatter)
  88. # Get the address of first log instance
  89. first_offset = log_const_symbols[0].entry['st_value']
  90. for sym in log_const_symbols:
  91. if sym.entry['st_value'] < first_offset:
  92. first_offset = sym.entry['st_value']
  93. first_offset -= log_const_section['start']
  94. # find all log_const_*
  95. for sym in log_const_symbols:
  96. # Find data offset in log_const_section for this symbol
  97. offset = sym.entry['st_value'] - log_const_section['start']
  98. idx_s = offset
  99. idx_e = offset + datum_size
  100. datum = log_const_section['data'][idx_s:idx_e]
  101. if len(datum) != datum_size:
  102. # Not enough data to unpack
  103. continue
  104. str_ptr, level = struct.unpack(formatter, datum)
  105. # Offset to rodata section for string
  106. instance_name = database.find_string(str_ptr)
  107. logger.info("Found Log Instance: %s, level: %d", instance_name, level)
  108. # source ID is simply the element index in the log instance array
  109. source_id = int((offset - first_offset) / sym.entry['st_size'])
  110. database.add_log_instance(source_id, instance_name, level, sym.entry['st_value'])
  111. def extract_elf_information(elf, database):
  112. """Extract information from ELF file and store in database"""
  113. e_ident = elf.header['e_ident']
  114. elf_data = describe_ei_data(e_ident['EI_DATA'])
  115. if elf_data == elftools.elf.descriptions._DESCR_EI_DATA['ELFDATA2LSB']:
  116. database.set_tgt_endianness(LogDatabase.LITTLE_ENDIAN)
  117. elif elf_data == elftools.elf.descriptions._DESCR_EI_DATA['ELFDATA2MSB']:
  118. database.set_tgt_endianness(LogDatabase.BIG_ENDIAN)
  119. else:
  120. logger.error("Cannot determine endianness from ELF file, exiting...")
  121. sys.exit(1)
  122. def process_kconfigs(elf, database):
  123. """Process kconfigs to extract information"""
  124. kconfigs = get_kconfig_symbols(elf)
  125. # 32 or 64-bit target
  126. database.set_tgt_bits(64 if "CONFIG_64BIT" in kconfigs else 32)
  127. # Architecture
  128. for name, arch in dictionary_parser.log_database.ARCHS.items():
  129. if arch['kconfig'] in kconfigs:
  130. database.set_arch(name)
  131. break
  132. # Put some kconfigs into the database
  133. #
  134. # Use 32-bit timestamp? or 64-bit?
  135. if "CONFIG_LOG_TIMESTAMP_64BIT" in kconfigs:
  136. database.add_kconfig("CONFIG_LOG_TIMESTAMP_64BIT",
  137. kconfigs['CONFIG_LOG_TIMESTAMP_64BIT'])
  138. def extract_static_string_sections(elf, database):
  139. """Extract sections containing static strings"""
  140. string_sections = STATIC_STRING_SECTIONS
  141. # Some architectures may put static strings into additional sections.
  142. # So need to extract them too.
  143. arch_data = dictionary_parser.log_database.ARCHS[database.get_arch()]
  144. if "extra_string_section" in arch_data:
  145. string_sections.extend(arch_data['extra_string_section'])
  146. for name in string_sections:
  147. content = find_elf_sections(elf, name)
  148. if content is None:
  149. continue
  150. logger.info("Found section: %s, 0x%x - 0x%x",
  151. name, content['start'], content['end'])
  152. database.add_string_section(name, content)
  153. if not database.has_string_sections():
  154. logger.error("Cannot find any static string sections in ELF, exiting...")
  155. sys.exit(1)
  156. def extract_logging_subsys_information(elf, database):
  157. """
  158. Extract logging subsys related information and store in database.
  159. For example, this extracts the list of log instances to establish
  160. mapping from source ID to name.
  161. """
  162. # Extract log constant section for module names
  163. section_log_const = find_elf_sections(elf, "log_const_sections")
  164. if section_log_const is None:
  165. # ESP32 puts "log_const_*" info log_static_section instead of log_const_sections
  166. section_log_const = find_elf_sections(elf, "log_static_section")
  167. if section_log_const is None:
  168. logger.error("Cannot find section 'log_const_sections' in ELF file, exiting...")
  169. sys.exit(1)
  170. # Find all "log_const_*" symbols and parse them
  171. log_const_symbols = find_log_const_symbols(elf)
  172. parse_log_const_symbols(database, section_log_const, log_const_symbols)
  173. def main():
  174. """Main function of database generator"""
  175. args = parse_args()
  176. # Setup logging
  177. logging.basicConfig(format=LOGGER_FORMAT)
  178. if args.verbose:
  179. logger.setLevel(logging.INFO)
  180. elif args.debug:
  181. logger.setLevel(logging.DEBUG)
  182. else:
  183. logger.setLevel(logging.WARNING)
  184. elffile = open(args.elffile, "rb")
  185. if not elffile:
  186. logger.error("ERROR: Cannot open ELF file: %s, exiting...", args.elffile)
  187. sys.exit(1)
  188. logger.info("ELF file %s", args.elffile)
  189. logger.info("Database file %s", args.dbfile)
  190. elf = ELFFile(elffile)
  191. database = LogDatabase()
  192. if args.build:
  193. database.set_build_id(args.build)
  194. logger.info("Build ID: %s", args.build)
  195. extract_elf_information(elf, database)
  196. process_kconfigs(elf, database)
  197. logger.info("Target: %s, %d-bit", database.get_arch(), database.get_tgt_bits())
  198. if database.is_tgt_little_endian():
  199. logger.info("Endianness: Little")
  200. else:
  201. logger.info("Endianness: Big")
  202. # Extract sections from ELF files that contain strings
  203. extract_static_string_sections(elf, database)
  204. # Extract information related to logging subsystem
  205. extract_logging_subsys_information(elf, database)
  206. # Write database file
  207. if not LogDatabase.write_json_database(args.dbfile, database):
  208. logger.error("ERROR: Cannot open database file for write: %s, exiting...", args.dbfile)
  209. sys.exit(1)
  210. elffile.close()
  211. if __name__ == "__main__":
  212. main()