Debugging with GDB
The GNU DeBugger (GDB) comes installed with the compiler toolchain in the form of the arm-none-eabi-gdb
binary. 调试器读取ELF文件内的调试符号,以了解PX4固件的静态和动态内存布局。 To access the PX4 autopilot microcontroller, it needs to connect to a Remote Target, which is provided by a SWD debug probe.
信息流看起来像这样:
sh
Developer <=> GDB <=> GDB Server <=> Debug Probe <=> SWD <=> PX4 Autopilot.
快速入门
要启动调试会话,您通常需要:
- Need a specialized SWD debug probe.
- Find and connect to the SWD debug port. You may need a debug adapter.
- 配置并启动调试探测来创建 GDB 服务。
- 启动GDB并作为远程目标连接到 GDB 服务。
- 以交互方式调试您的固件。
See the debug probe documentation for details on how to setup your debug connection:
- SEGGER J-Link: commercial probe, no built-in serial console, requires adapter.
- Black Magic Probe: integrated GDB server and serial console, requires adapter.
- STLink: best value, integrated serial console, adapter must be soldered.
We recommend using the J-Link with the Pixhawk Debug Adapter or the STLinkv3-MINIE with a soldered custom cable.
Once connected, you can use the usual GDB commands such as:
continue
to continue program executionrun
to start from the beginningbacktrace
to see the backtracebreak somewhere.cpp:123
to set a breakpointdelete somewhere.cpp:123
to remove it againinfo locals
to print local variablesinfo registers
to print the registers
Consult the GDB documentation for more details.
TIP
To avoid having to type all commands to connect in GDB each time, you can write them into ~/.gdbinit
.
Gazebo dependencies
You've now connected the flight controller to an SWD debug probe!
The following topics explain how to start on-target debugging:
视频
The following video provides an overview of the tooling available for advanced debugging of PX4 via GDB. It was presented at the PX4 Developer Conference 2023.
Overview: The inspection tools built into PX4 via Mavlink Shell (NSH) as well as interpretation of the PX4 uLog after a flight require PX4 to still be functioning. However, the most problematic bugs often manifest themselves in a (partially) hanging or crashed system. Therefore, we present the open-source Embedded Debug Tools project, which manages and configures probe, debugging and analysis tools for PX4 and NuttX:
- Debug interfaces (SWD) and the associated debug probes (J-Link, STLink) and libraries (JLinkGDBServer, OpenOCD).
- How to install and configure
arm-none-eabi-gdb(-py3)
for debugging your ELF. - Commonly used GDB commands and scripts.
- Advanced GDB scripting via its Python API.
- Inspection of NuttX RTOS component internals: tasks, semaphores, scheduler.
- Inspecting peripheral state with CMSIS-SVD files and custom visualizations.
- Coredumping for post-mortem debugging via CrashDebug.
- Hardfault analysis in a live system and via the hardfault log.
- Remote GDB scripting via the Machine Interface.
- Automated HiL testing of PX4 via combined GDB and NSH scripting.
- ITM profiling over SWO pin using Orbuculum.
- Thread/IRQ/Workqueue/Heap visualization and latency analysis using perfetto.
- High-bandwidth ETM tracing over TRACE pins: J-Trace and ORBtrace mini.
- We conclude with an overview of interesting related project and an outlook on the future of PX4 debugging.
Embedded Debug Tools
The Embedded Debug Tools connect several software and hardware debugging tools together in a user friendly Python package to more easily enable advanced use cases for ARM Cortex-M microcontrollers and related devices.
The library orchestrates the launch and configuration of hardware debug and trace probes, debuggers, logic analyzers, and waveform generators and provides analysis tools, converters, and plugins to provide significant insight into the software and hardware state during or after execution.
The emdbg
library contains many useful GDB plugins that make debugging PX4 easier. It also provides tools for profiling PX4 in real-time.