expend20 / DrSymLogger

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Using DynamoRIO tool to capture function symbol calls at runtime.

Check out GUI launcher.

Fragment of capturing logs for cmd.exe:

-> ParseS0
    -> BinaryOperator
        -> ParseS1
            -> BinaryOperator
                -> ParseS2
                    -> BinaryOperator
                        -> ParseS3
                            -> BinaryOperator
                                -> ParseS4
                                    -> ParseRedir
                                    <- ParseRedir (0x0000000000000000)
                                    -> ParseS5
                                        -> ParseCmd
                                            -> LoadNodeTC
                                            <- LoadNodeTC (0x0000013275a2ffc0)
                                            -> Lex
                                                -> _intrinsic_setjmp
                                                <- _intrinsic_setjmp (0x0000000000000000)
                                            <- Lex (0x0000000000004000)
                                            -> mkstr
                                            <- mkstr (0x0000013275a2be30)
                                            -> Lex
                                                -> _intrinsic_setjmp
                                                <- _intrinsic_setjmp (0x0000000000000000)
                                            <- Lex (0x000000000000000a)
                                            -> ParseRedir
                                            <- ParseRedir (0x0000000000000000)
                                            -> Lex
                                                -> _intrinsic_setjmp
                                                <- _intrinsic_setjmp (0x0000000000000000)
                                            <- Lex (0x0000000000000000)
                                        <- ParseCmd (0x0000013275a2ffc0)
                                    <- ParseS5 (0x0000013275a2ffc0)
                                    -> GeToken

Dependencies

Tested with DR version 9.0.1, Windows 10.0.22621

Build

cmake -B build -DDynamoRIO_DIR="...\dr9\cmake"
cmake --build build --config RelWithDebInfo

Usage

  • Build the DrSymLogger.dll
  • Make sure you have symbols downloaded for specified modules
    • set _NT_SYMBOL_PATH system-wide for something like srv*c:\symbols*https://msdl.microsoft.com/download/symbols
    • Run the process under WinDbg, to download symbols
  • Spawn a new terminal for drrun
    • set _NT_SYMBOL_PATH for specific console to a directory c:\symbols or whereever you have your symbols. DR has a bit different _NT_SYMBOL_PATH meaning than WinDbg, it does not allow anything except local directories.
  • finally run the tool drrun.exe -c build\RelWithDebInfo\DrSymLogger.dll --printSymsExec --printSymsModule cmd.exe -- cmd.exe /c "echo 123; exit", it'll create sym_rt_trace_*.txt file

Some hints

To output result to console, add drrun.exe -c build\RelWithDebInfo\DrSymLogger.dll --printSymsExec --printSymsExecConsole --printSymsModule cmd.exe -- cmd.exe /c "echo 123 && exit". If your program outputs to console, you now have synchronized trace with your logs.

You could track which symbols get instrumented once with drrun.exe -c build\RelWithDebInfo\DrSymLogger.dll --printSymsInst --printSymsModule cmd.exe -- cmd.exe /c "echo 123 && exit"; this is super fast since it does not really affect the runtime stage at all.

You could use simple grep feature drrun.exe -c build\RelWithDebInfo\DrSymLogger.dll --printSymsExec --printSymsExecConsole --printSymsModule cmd.exe --printSymsGrep Parse -- cmd.exe /c "echo 123 && exit"

You could instrument literally every symbol with anything you want, look at some examples here.

License

MIT

About

License:MIT License


Languages

Language:C++ 94.7%Language:CMake 3.4%Language:C 1.9%