Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/martinradev/gdb-pt-dump
https://github.com/martinradev/gdb-pt-dump
Last synced: 3 months ago
JSON representation
- Host: GitHub
- URL: https://github.com/martinradev/gdb-pt-dump
- Owner: martinradev
- License: mit
- Created: 2021-02-12T16:04:15.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2024-06-03T16:23:58.000Z (5 months ago)
- Last Synced: 2024-06-06T23:40:22.278Z (5 months ago)
- Language: Python
- Size: 643 KB
- Stars: 124
- Watchers: 7
- Forks: 26
- Open Issues: 13
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
- awesome-hacking-lists - martinradev/gdb-pt-dump - (Python)
README
# gdb-pt-dump
`gdb-pt-dump` is a gdb script to enhance debugging of a QEMU-based virtual machine.
The repository also includes `pt_host` which is a BPF program that allows for examining the page tables of a Linux process.
## Supported architectures
Supported architectures: `x86-64`, `x86-32`, `aarch64`, `riscv64`.
## Features
* Dumping a page table from a specific guest physical address.
* Merging semantically-similar contiguous memory.
* Provide detailed architectural information: writeable, executable, U/S, cacheable, write-back, XN, PXN, etc
* Cache collected information for future filtering and printing.
* Filter page table information via page attributes (x, w, u, s, ...) and virtual addresses (before, after, between)
* Search memory very fast using `/proc/QEMU_PID/mem`. Search for string, u8, u4
Search is applied after filter.
* Filter-out search results by address alignment. Useful for filtering-out SLAB allocations.
* Try to determine KASLR information by examining the address space.
* Find virtual memory aliases.
* Dump host page tables via `pt_host.py`## How to use
The script is standalone.
For now, do `source PATH_TO_PT_DUMP/pt.py`.
For details, just do `help pt` in gdb.
## Examples
![x86_64: Only user space pages](example_pictures/x86_64_user_space.jpg "x86_64 only user space")
![x86_64: Only executable pages](example_pictures/x86_64_exec_filter.jpg "x86_64 only executable")
![aarch64: User space accessible pages](example_pictures/aarch64_user.jpg "Aarch64 user space accessible")
![aarch64: write or executable pages](example_pictures/aarch64_w_or_x.jpg "Aarch64 write or executable pages")
![aarch64: only executable pages](example_pictures/aarch64_x.jpg "Aarch64 only executable pages")
![Saved page tables](example_pictures/cache_list.jpg "Show saved page tables")
## Possible issues
Old QEMU versions seem to not provide access to privileged registers like cr3.
Thus, the page table address would need to be retrieved in some other way.