cryptospore / rpms / qemu-kvm

Forked from rpms/qemu-kvm 2 years ago
Clone
5d360b
From 231682fd6a7ca6fc5eecbec3df2f96133b9f3729 Mon Sep 17 00:00:00 2001
5d360b
From: =?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= <marcandre.lureau@redhat.com>
5d360b
Date: Wed, 13 Dec 2017 13:39:04 +0100
5d360b
Subject: [PATCH 33/41] scripts/dump-guest-memory.py: Move constants to the top
5d360b
MIME-Version: 1.0
5d360b
Content-Type: text/plain; charset=UTF-8
5d360b
Content-Transfer-Encoding: 8bit
5d360b
5d360b
RH-Author: Marc-André Lureau <marcandre.lureau@redhat.com>
5d360b
Message-id: <20171213133912.26176-34-marcandre.lureau@redhat.com>
5d360b
Patchwork-id: 78378
5d360b
O-Subject: [RHEL-7.5 qemu-kvm PATCH v3 33/41] scripts/dump-guest-memory.py: Move constants to the top
5d360b
Bugzilla: 1411490
5d360b
RH-Acked-by: Laszlo Ersek <lersek@redhat.com>
5d360b
RH-Acked-by: Michael S. Tsirkin <mst@redhat.com>
5d360b
RH-Acked-by: Miroslav Rezanina <mrezanin@redhat.com>
5d360b
5d360b
From: Janosch Frank <frankja@linux.vnet.ibm.com>
5d360b
5d360b
The constants bloated the class definition and were therefore moved to
5d360b
the top.
5d360b
5d360b
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
5d360b
Signed-off-by: Janosch Frank <frankja@linux.vnet.ibm.com>
5d360b
Message-Id: <1453464520-3882-2-git-send-email-frankja@linux.vnet.ibm.com>
5d360b
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
5d360b
5d360b
(cherry picked from commit ca81ce72b4d12494424d1813c6437035c1f89a8c)
5d360b
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
5d360b
Signed-off-by: Miroslav Rezanina <mrezanin@redhat.com>
5d360b
---
5d360b
 scripts/dump-guest-memory.py | 126 +++++++++++++++++++++----------------------
5d360b
 1 file changed, 63 insertions(+), 63 deletions(-)
5d360b
5d360b
diff --git a/scripts/dump-guest-memory.py b/scripts/dump-guest-memory.py
5d360b
index 1ed8b67..29f7c5b 100644
5d360b
--- a/scripts/dump-guest-memory.py
5d360b
+++ b/scripts/dump-guest-memory.py
5d360b
@@ -17,6 +17,55 @@
5d360b
 
5d360b
 import struct
5d360b
 
5d360b
+TARGET_PAGE_SIZE = 0x1000
5d360b
+TARGET_PAGE_MASK = 0xFFFFFFFFFFFFF000
5d360b
+
5d360b
+# Various ELF constants
5d360b
+EM_X86_64   = 62        # AMD x86-64 target machine
5d360b
+ELFDATA2LSB = 1         # little endian
5d360b
+ELFCLASS64  = 2
5d360b
+ELFMAG      = "\x7FELF"
5d360b
+EV_CURRENT  = 1
5d360b
+ET_CORE     = 4
5d360b
+PT_LOAD     = 1
5d360b
+PT_NOTE     = 4
5d360b
+
5d360b
+# Special value for e_phnum. This indicates that the real number of
5d360b
+# program headers is too large to fit into e_phnum. Instead the real
5d360b
+# value is in the field sh_info of section 0.
5d360b
+PN_XNUM = 0xFFFF
5d360b
+
5d360b
+# Format strings for packing and header size calculation.
5d360b
+ELF64_EHDR = ("4s" # e_ident/magic
5d360b
+              "B"  # e_ident/class
5d360b
+              "B"  # e_ident/data
5d360b
+              "B"  # e_ident/version
5d360b
+              "B"  # e_ident/osabi
5d360b
+              "8s" # e_ident/pad
5d360b
+              "H"  # e_type
5d360b
+              "H"  # e_machine
5d360b
+              "I"  # e_version
5d360b
+              "Q"  # e_entry
5d360b
+              "Q"  # e_phoff
5d360b
+              "Q"  # e_shoff
5d360b
+              "I"  # e_flags
5d360b
+              "H"  # e_ehsize
5d360b
+              "H"  # e_phentsize
5d360b
+              "H"  # e_phnum
5d360b
+              "H"  # e_shentsize
5d360b
+              "H"  # e_shnum
5d360b
+              "H"  # e_shstrndx
5d360b
+          )
5d360b
+ELF64_PHDR = ("I"  # p_type
5d360b
+              "I"  # p_flags
5d360b
+              "Q"  # p_offset
5d360b
+              "Q"  # p_vaddr
5d360b
+              "Q"  # p_paddr
5d360b
+              "Q"  # p_filesz
5d360b
+              "Q"  # p_memsz
5d360b
+              "Q"  # p_align
5d360b
+          )
5d360b
+
5d360b
 class DumpGuestMemory(gdb.Command):
5d360b
     """Extract guest vmcore from qemu process coredump.
5d360b
 
5d360b
@@ -47,62 +96,13 @@ deliberately called abort(), or it was dumped in response to a signal at
5d360b
 a halfway fortunate point, then its coredump should be in reasonable
5d360b
 shape and this command should mostly work."""
5d360b
 
5d360b
-    TARGET_PAGE_SIZE = 0x1000
5d360b
-    TARGET_PAGE_MASK = 0xFFFFFFFFFFFFF000
5d360b
-
5d360b
-    # Various ELF constants
5d360b
-    EM_X86_64   = 62        # AMD x86-64 target machine
5d360b
-    ELFDATA2LSB = 1         # little endian
5d360b
-    ELFCLASS64  = 2
5d360b
-    ELFMAG      = "\x7FELF"
5d360b
-    EV_CURRENT  = 1
5d360b
-    ET_CORE     = 4
5d360b
-    PT_LOAD     = 1
5d360b
-    PT_NOTE     = 4
5d360b
-
5d360b
-    # Special value for e_phnum. This indicates that the real number of
5d360b
-    # program headers is too large to fit into e_phnum. Instead the real
5d360b
-    # value is in the field sh_info of section 0.
5d360b
-    PN_XNUM = 0xFFFF
5d360b
-
5d360b
-    # Format strings for packing and header size calculation.
5d360b
-    ELF64_EHDR = ("4s" # e_ident/magic
5d360b
-                  "B"  # e_ident/class
5d360b
-                  "B"  # e_ident/data
5d360b
-                  "B"  # e_ident/version
5d360b
-                  "B"  # e_ident/osabi
5d360b
-                  "8s" # e_ident/pad
5d360b
-                  "H"  # e_type
5d360b
-                  "H"  # e_machine
5d360b
-                  "I"  # e_version
5d360b
-                  "Q"  # e_entry
5d360b
-                  "Q"  # e_phoff
5d360b
-                  "Q"  # e_shoff
5d360b
-                  "I"  # e_flags
5d360b
-                  "H"  # e_ehsize
5d360b
-                  "H"  # e_phentsize
5d360b
-                  "H"  # e_phnum
5d360b
-                  "H"  # e_shentsize
5d360b
-                  "H"  # e_shnum
5d360b
-                  "H"  # e_shstrndx
5d360b
-                 )
5d360b
-    ELF64_PHDR = ("I"  # p_type
5d360b
-                  "I"  # p_flags
5d360b
-                  "Q"  # p_offset
5d360b
-                  "Q"  # p_vaddr
5d360b
-                  "Q"  # p_paddr
5d360b
-                  "Q"  # p_filesz
5d360b
-                  "Q"  # p_memsz
5d360b
-                  "Q"  # p_align
5d360b
-                 )
5d360b
-
5d360b
     def __init__(self):
5d360b
         super(DumpGuestMemory, self).__init__("dump-guest-memory",
5d360b
                                               gdb.COMMAND_DATA,
5d360b
                                               gdb.COMPLETE_FILENAME)
5d360b
         self.uintptr_t     = gdb.lookup_type("uintptr_t")
5d360b
-        self.elf64_ehdr_le = struct.Struct("<%s" % self.ELF64_EHDR)
5d360b
-        self.elf64_phdr_le = struct.Struct("<%s" % self.ELF64_PHDR)
5d360b
+        self.elf64_ehdr_le = struct.Struct("<%s" % ELF64_EHDR)
5d360b
+        self.elf64_phdr_le = struct.Struct("<%s" % ELF64_PHDR)
5d360b
 
5d360b
     def int128_get64(self, val):
5d360b
         assert (val["hi"] == 0)
5d360b
@@ -130,7 +130,7 @@ shape and this command should mostly work."""
5d360b
         if (mr["alias"] != 0):
5d360b
             return (self.memory_region_get_ram_ptr(mr["alias"].dereference()) +
5d360b
                     mr["alias_offset"])
5d360b
-        return self.qemu_get_ram_ptr(mr["ram_addr"] & self.TARGET_PAGE_MASK)
5d360b
+        return self.qemu_get_ram_ptr(mr["ram_addr"] & TARGET_PAGE_MASK)
5d360b
 
5d360b
     def guest_phys_blocks_init(self):
5d360b
         self.guest_phys_blocks = []
5d360b
@@ -198,21 +198,21 @@ shape and this command should mostly work."""
5d360b
         # most common values. This also means that instruction pointer
5d360b
         # etc. will be bogus in the dump, but at least the RAM contents
5d360b
         # should be valid.
5d360b
-        self.dump_info = {"d_machine": self.EM_X86_64,
5d360b
-                          "d_endian" : self.ELFDATA2LSB,
5d360b
-                          "d_class"  : self.ELFCLASS64}
5d360b
+        self.dump_info = {"d_machine": EM_X86_64,
5d360b
+                          "d_endian" : ELFDATA2LSB,
5d360b
+                          "d_class"  : ELFCLASS64}
5d360b
 
5d360b
     def encode_elf64_ehdr_le(self):
5d360b
         return self.elf64_ehdr_le.pack(
5d360b
-                                 self.ELFMAG,                 # e_ident/magic
5d360b
+                                 ELFMAG,                      # e_ident/magic
5d360b
                                  self.dump_info["d_class"],   # e_ident/class
5d360b
                                  self.dump_info["d_endian"],  # e_ident/data
5d360b
-                                 self.EV_CURRENT,             # e_ident/version
5d360b
+                                 EV_CURRENT,                  # e_ident/version
5d360b
                                  0,                           # e_ident/osabi
5d360b
                                  "",                          # e_ident/pad
5d360b
-                                 self.ET_CORE,                # e_type
5d360b
+                                 ET_CORE,                     # e_type
5d360b
                                  self.dump_info["d_machine"], # e_machine
5d360b
-                                 self.EV_CURRENT,             # e_version
5d360b
+                                 EV_CURRENT,                  # e_version
5d360b
                                  0,                           # e_entry
5d360b
                                  self.elf64_ehdr_le.size,     # e_phoff
5d360b
                                  0,                           # e_shoff
5d360b
@@ -226,7 +226,7 @@ shape and this command should mostly work."""
5d360b
                                 )
5d360b
 
5d360b
     def encode_elf64_note_le(self):
5d360b
-        return self.elf64_phdr_le.pack(self.PT_NOTE,         # p_type
5d360b
+        return self.elf64_phdr_le.pack(PT_NOTE,              # p_type
5d360b
                                        0,                    # p_flags
5d360b
                                        (self.memory_offset -
5d360b
                                         len(self.note)),     # p_offset
5d360b
@@ -238,7 +238,7 @@ shape and this command should mostly work."""
5d360b
                                       )
5d360b
 
5d360b
     def encode_elf64_load_le(self, offset, start_hwaddr, range_size):
5d360b
-        return self.elf64_phdr_le.pack(self.PT_LOAD, # p_type
5d360b
+        return self.elf64_phdr_le.pack(PT_LOAD,      # p_type
5d360b
                                        0,            # p_flags
5d360b
                                        offset,       # p_offset
5d360b
                                        0,            # p_vaddr
5d360b
@@ -276,7 +276,7 @@ shape and this command should mostly work."""
5d360b
         # We should never reach PN_XNUM for paging=false dumps: there's
5d360b
         # just a handful of discontiguous ranges after merging.
5d360b
         self.phdr_num += len(self.guest_phys_blocks)
5d360b
-        assert (self.phdr_num < self.PN_XNUM)
5d360b
+        assert (self.phdr_num < PN_XNUM)
5d360b
 
5d360b
         # Calculate the ELF file offset where the memory dump commences:
5d360b
         #
5d360b
@@ -312,7 +312,7 @@ shape and this command should mostly work."""
5d360b
             print ("dumping range at %016x for length %016x" %
5d360b
                    (cur.cast(self.uintptr_t), left))
5d360b
             while (left > 0):
5d360b
-                chunk_size = min(self.TARGET_PAGE_SIZE, left)
5d360b
+                chunk_size = min(TARGET_PAGE_SIZE, left)
5d360b
                 chunk = qemu_core.read_memory(cur, chunk_size)
5d360b
                 vmcore.write(chunk)
5d360b
                 cur  += chunk_size
5d360b
-- 
5d360b
1.8.3.1
5d360b