KSyms.cpp 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <AK/TemporaryChange.h>
  7. #include <Kernel/Arch/x86/SmapDisabler.h>
  8. #include <Kernel/FileSystem/FileDescription.h>
  9. #include <Kernel/KSyms.h>
  10. #include <Kernel/Process.h>
  11. #include <Kernel/Scheduler.h>
  12. #include <Kernel/Sections.h>
  13. namespace Kernel {
  14. FlatPtr g_lowest_kernel_symbol_address = 0xffffffff;
  15. FlatPtr g_highest_kernel_symbol_address = 0;
  16. bool g_kernel_symbols_available = false;
  17. extern "C" {
  18. __attribute__((section(".kernel_symbols"))) char kernel_symbols[5 * MiB] {};
  19. }
  20. static KernelSymbol* s_symbols;
  21. static size_t s_symbol_count = 0;
  22. static u8 parse_hex_digit(char nibble)
  23. {
  24. if (nibble >= '0' && nibble <= '9')
  25. return nibble - '0';
  26. VERIFY(nibble >= 'a' && nibble <= 'f');
  27. return 10 + (nibble - 'a');
  28. }
  29. FlatPtr address_for_kernel_symbol(const StringView& name)
  30. {
  31. for (size_t i = 0; i < s_symbol_count; ++i) {
  32. const auto& symbol = s_symbols[i];
  33. if (name == symbol.name)
  34. return symbol.address;
  35. }
  36. return 0;
  37. }
  38. const KernelSymbol* symbolicate_kernel_address(FlatPtr address)
  39. {
  40. if (address < g_lowest_kernel_symbol_address || address > g_highest_kernel_symbol_address)
  41. return nullptr;
  42. for (unsigned i = 0; i < s_symbol_count; ++i) {
  43. if (address < s_symbols[i + 1].address)
  44. return &s_symbols[i];
  45. }
  46. return nullptr;
  47. }
  48. UNMAP_AFTER_INIT static void load_kernel_symbols_from_data(ReadonlyBytes const& buffer)
  49. {
  50. g_lowest_kernel_symbol_address = 0xffffffff;
  51. g_highest_kernel_symbol_address = 0;
  52. auto* bufptr = (const char*)buffer.data();
  53. auto* start_of_name = bufptr;
  54. FlatPtr address = 0;
  55. for (size_t i = 0; i < 8; ++i)
  56. s_symbol_count = (s_symbol_count << 4) | parse_hex_digit(*(bufptr++));
  57. s_symbols = static_cast<KernelSymbol*>(kmalloc_eternal(sizeof(KernelSymbol) * s_symbol_count));
  58. ++bufptr; // skip newline
  59. dmesgln("Loading kernel symbol table...");
  60. size_t current_symbol_index = 0;
  61. while ((u8 const*)bufptr < buffer.data() + buffer.size()) {
  62. for (size_t i = 0; i < 8; ++i)
  63. address = (address << 4) | parse_hex_digit(*(bufptr++));
  64. bufptr += 3;
  65. start_of_name = bufptr;
  66. while (*(++bufptr)) {
  67. if (*bufptr == '\n') {
  68. break;
  69. }
  70. }
  71. auto& ksym = s_symbols[current_symbol_index];
  72. ksym.address = kernel_load_base + address;
  73. char* name = static_cast<char*>(kmalloc_eternal((bufptr - start_of_name) + 1));
  74. memcpy(name, start_of_name, bufptr - start_of_name);
  75. name[bufptr - start_of_name] = '\0';
  76. ksym.name = name;
  77. if (ksym.address < g_lowest_kernel_symbol_address)
  78. g_lowest_kernel_symbol_address = ksym.address;
  79. if (ksym.address > g_highest_kernel_symbol_address)
  80. g_highest_kernel_symbol_address = ksym.address;
  81. ++bufptr;
  82. ++current_symbol_index;
  83. }
  84. g_kernel_symbols_available = true;
  85. }
  86. NEVER_INLINE static void dump_backtrace_impl(FlatPtr base_pointer, bool use_ksyms, PrintToScreen print_to_screen)
  87. {
  88. #define PRINT_LINE(fmtstr, ...) \
  89. do { \
  90. if (print_to_screen == PrintToScreen::No) \
  91. dbgln(fmtstr, __VA_ARGS__); \
  92. else \
  93. critical_dmesgln(fmtstr, __VA_ARGS__); \
  94. } while (0)
  95. SmapDisabler disabler;
  96. if (use_ksyms && !g_kernel_symbols_available) {
  97. Processor::halt();
  98. return;
  99. }
  100. struct RecognizedSymbol {
  101. FlatPtr address;
  102. const KernelSymbol* symbol { nullptr };
  103. };
  104. constexpr size_t max_recognized_symbol_count = 256;
  105. RecognizedSymbol recognized_symbols[max_recognized_symbol_count];
  106. size_t recognized_symbol_count = 0;
  107. if (use_ksyms) {
  108. FlatPtr copied_stack_ptr[2];
  109. for (FlatPtr* stack_ptr = (FlatPtr*)base_pointer; stack_ptr && recognized_symbol_count < max_recognized_symbol_count; stack_ptr = (FlatPtr*)copied_stack_ptr[0]) {
  110. if ((FlatPtr)stack_ptr < kernel_load_base)
  111. break;
  112. void* fault_at;
  113. if (!safe_memcpy(copied_stack_ptr, stack_ptr, sizeof(copied_stack_ptr), fault_at))
  114. break;
  115. FlatPtr retaddr = copied_stack_ptr[1];
  116. recognized_symbols[recognized_symbol_count++] = { retaddr, symbolicate_kernel_address(retaddr) };
  117. }
  118. } else {
  119. void* fault_at;
  120. FlatPtr copied_stack_ptr[2];
  121. FlatPtr* stack_ptr = (FlatPtr*)base_pointer;
  122. while (stack_ptr && safe_memcpy(copied_stack_ptr, stack_ptr, sizeof(copied_stack_ptr), fault_at)) {
  123. FlatPtr retaddr = copied_stack_ptr[1];
  124. PRINT_LINE("{:p} (next: {:p})", retaddr, stack_ptr ? (FlatPtr*)copied_stack_ptr[0] : 0);
  125. stack_ptr = (FlatPtr*)copied_stack_ptr[0];
  126. }
  127. return;
  128. }
  129. VERIFY(recognized_symbol_count <= max_recognized_symbol_count);
  130. for (size_t i = 0; i < recognized_symbol_count; ++i) {
  131. auto& symbol = recognized_symbols[i];
  132. if (!symbol.address)
  133. break;
  134. if (!symbol.symbol) {
  135. PRINT_LINE("Kernel + {:p}", symbol.address - kernel_load_base);
  136. continue;
  137. }
  138. size_t offset = symbol.address - symbol.symbol->address;
  139. if (symbol.symbol->address == g_highest_kernel_symbol_address && offset > 4096)
  140. PRINT_LINE("Kernel + {:p}", symbol.address - kernel_load_base);
  141. else
  142. PRINT_LINE("Kernel + {:p} {} +{:#x}", symbol.address - kernel_load_base, symbol.symbol->name, offset);
  143. }
  144. }
  145. void dump_backtrace(PrintToScreen print_to_screen)
  146. {
  147. static bool in_dump_backtrace = false;
  148. if (in_dump_backtrace)
  149. return;
  150. TemporaryChange change(in_dump_backtrace, true);
  151. TemporaryChange disable_kmalloc_stacks(g_dump_kmalloc_stacks, false);
  152. FlatPtr ebp;
  153. asm volatile("movl %%ebp, %%eax"
  154. : "=a"(ebp));
  155. dump_backtrace_impl(ebp, g_kernel_symbols_available, print_to_screen);
  156. }
  157. UNMAP_AFTER_INIT void load_kernel_symbol_table()
  158. {
  159. auto kernel_symbols_size = strnlen(kernel_symbols, sizeof(kernel_symbols));
  160. // If we're hitting this VERIFY the kernel symbol file has grown beyond
  161. // the array size of kernel_symbols. Try making the array larger.
  162. VERIFY(kernel_symbols_size != sizeof(kernel_symbols));
  163. load_kernel_symbols_from_data({ kernel_symbols, kernel_symbols_size });
  164. }
  165. }