KSyms.cpp 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <AK/Demangle.h>
  7. #include <AK/TemporaryChange.h>
  8. #include <Kernel/Arch/x86/SmapDisabler.h>
  9. #include <Kernel/FileSystem/FileDescription.h>
  10. #include <Kernel/KSyms.h>
  11. #include <Kernel/Process.h>
  12. #include <Kernel/Scheduler.h>
  13. #include <Kernel/Sections.h>
  14. namespace Kernel {
  15. FlatPtr g_lowest_kernel_symbol_address = 0xffffffff;
  16. FlatPtr g_highest_kernel_symbol_address = 0;
  17. bool g_kernel_symbols_available = false;
  18. static KernelSymbol* s_symbols;
  19. static size_t s_symbol_count = 0;
  20. static u8 parse_hex_digit(char nibble)
  21. {
  22. if (nibble >= '0' && nibble <= '9')
  23. return nibble - '0';
  24. VERIFY(nibble >= 'a' && nibble <= 'f');
  25. return 10 + (nibble - 'a');
  26. }
  27. FlatPtr address_for_kernel_symbol(const StringView& name)
  28. {
  29. for (size_t i = 0; i < s_symbol_count; ++i) {
  30. const auto& symbol = s_symbols[i];
  31. if (name == symbol.name)
  32. return symbol.address;
  33. }
  34. return 0;
  35. }
  36. const KernelSymbol* symbolicate_kernel_address(FlatPtr address)
  37. {
  38. if (address < g_lowest_kernel_symbol_address || address > g_highest_kernel_symbol_address)
  39. return nullptr;
  40. for (unsigned i = 0; i < s_symbol_count; ++i) {
  41. if (address < s_symbols[i + 1].address)
  42. return &s_symbols[i];
  43. }
  44. return nullptr;
  45. }
  46. UNMAP_AFTER_INIT static void load_kernel_symbols_from_data(const KBuffer& buffer)
  47. {
  48. g_lowest_kernel_symbol_address = 0xffffffff;
  49. g_highest_kernel_symbol_address = 0;
  50. auto* bufptr = (const char*)buffer.data();
  51. auto* start_of_name = bufptr;
  52. FlatPtr address = 0;
  53. for (size_t i = 0; i < 8; ++i)
  54. s_symbol_count = (s_symbol_count << 4) | parse_hex_digit(*(bufptr++));
  55. s_symbols = static_cast<KernelSymbol*>(kmalloc_eternal(sizeof(KernelSymbol) * s_symbol_count));
  56. ++bufptr; // skip newline
  57. dmesgln("Loading kernel symbol table...");
  58. size_t current_symbol_index = 0;
  59. while (bufptr < buffer.end_pointer()) {
  60. for (size_t i = 0; i < 8; ++i)
  61. address = (address << 4) | parse_hex_digit(*(bufptr++));
  62. bufptr += 3;
  63. start_of_name = bufptr;
  64. while (*(++bufptr)) {
  65. if (*bufptr == '\n') {
  66. break;
  67. }
  68. }
  69. auto& ksym = s_symbols[current_symbol_index];
  70. ksym.address = address;
  71. char* name = static_cast<char*>(kmalloc_eternal((bufptr - start_of_name) + 1));
  72. memcpy(name, start_of_name, bufptr - start_of_name);
  73. name[bufptr - start_of_name] = '\0';
  74. ksym.name = name;
  75. if (ksym.address < g_lowest_kernel_symbol_address)
  76. g_lowest_kernel_symbol_address = ksym.address;
  77. if (ksym.address > g_highest_kernel_symbol_address)
  78. g_highest_kernel_symbol_address = ksym.address;
  79. ++bufptr;
  80. ++current_symbol_index;
  81. }
  82. g_kernel_symbols_available = true;
  83. }
  84. NEVER_INLINE static void dump_backtrace_impl(FlatPtr base_pointer, bool use_ksyms)
  85. {
  86. SmapDisabler disabler;
  87. if (use_ksyms && !g_kernel_symbols_available) {
  88. Processor::halt();
  89. return;
  90. }
  91. struct RecognizedSymbol {
  92. FlatPtr address;
  93. const KernelSymbol* symbol { nullptr };
  94. };
  95. constexpr size_t max_recognized_symbol_count = 256;
  96. RecognizedSymbol recognized_symbols[max_recognized_symbol_count];
  97. size_t recognized_symbol_count = 0;
  98. if (use_ksyms) {
  99. FlatPtr copied_stack_ptr[2];
  100. for (FlatPtr* stack_ptr = (FlatPtr*)base_pointer; stack_ptr && recognized_symbol_count < max_recognized_symbol_count; stack_ptr = (FlatPtr*)copied_stack_ptr[0]) {
  101. if ((FlatPtr)stack_ptr < KERNEL_BASE)
  102. break;
  103. void* fault_at;
  104. if (!safe_memcpy(copied_stack_ptr, stack_ptr, sizeof(copied_stack_ptr), fault_at))
  105. break;
  106. FlatPtr retaddr = copied_stack_ptr[1];
  107. recognized_symbols[recognized_symbol_count++] = { retaddr, symbolicate_kernel_address(retaddr) };
  108. }
  109. } else {
  110. void* fault_at;
  111. FlatPtr copied_stack_ptr[2];
  112. FlatPtr* stack_ptr = (FlatPtr*)base_pointer;
  113. while (stack_ptr && safe_memcpy(copied_stack_ptr, stack_ptr, sizeof(copied_stack_ptr), fault_at)) {
  114. FlatPtr retaddr = copied_stack_ptr[1];
  115. dbgln("{:p} (next: {:p})", retaddr, stack_ptr ? (FlatPtr*)copied_stack_ptr[0] : 0);
  116. stack_ptr = (FlatPtr*)copied_stack_ptr[0];
  117. }
  118. return;
  119. }
  120. VERIFY(recognized_symbol_count <= max_recognized_symbol_count);
  121. for (size_t i = 0; i < recognized_symbol_count; ++i) {
  122. auto& symbol = recognized_symbols[i];
  123. if (!symbol.address)
  124. break;
  125. if (!symbol.symbol) {
  126. dbgln("{:p}", symbol.address);
  127. continue;
  128. }
  129. size_t offset = symbol.address - symbol.symbol->address;
  130. if (symbol.symbol->address == g_highest_kernel_symbol_address && offset > 4096)
  131. dbgln("{:p}", symbol.address);
  132. else
  133. dbgln("{:p} {} +0x{:x}", symbol.address, demangle(symbol.symbol->name), offset);
  134. }
  135. }
  136. void dump_backtrace()
  137. {
  138. static bool in_dump_backtrace = false;
  139. if (in_dump_backtrace)
  140. return;
  141. TemporaryChange change(in_dump_backtrace, true);
  142. TemporaryChange disable_kmalloc_stacks(g_dump_kmalloc_stacks, false);
  143. FlatPtr ebp;
  144. asm volatile("movl %%ebp, %%eax"
  145. : "=a"(ebp));
  146. dump_backtrace_impl(ebp, g_kernel_symbols_available);
  147. }
  148. UNMAP_AFTER_INIT void load_kernel_symbol_table()
  149. {
  150. auto result = VFS::the().open("/res/kernel.map", O_RDONLY, 0, VFS::the().root_custody());
  151. if (!result.is_error()) {
  152. auto description = result.value();
  153. auto buffer = description->read_entire_file();
  154. if (!buffer.is_error())
  155. load_kernel_symbols_from_data(*buffer.value());
  156. }
  157. }
  158. }