2020-01-18 08:38:21 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
|
|
|
|
*
|
2021-04-22 08:24:48 +00:00
|
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
2020-01-18 08:38:21 +00:00
|
|
|
*/
|
|
|
|
|
2019-05-18 15:31:52 +00:00
|
|
|
#include <AK/TemporaryChange.h>
|
2022-05-02 20:46:43 +00:00
|
|
|
#include <Kernel/Arch/SafeMem.h>
|
2021-10-14 21:53:48 +00:00
|
|
|
#include <Kernel/Arch/SmapDisabler.h>
|
2021-09-07 11:39:11 +00:00
|
|
|
#include <Kernel/FileSystem/OpenFileDescription.h>
|
2019-11-06 12:42:38 +00:00
|
|
|
#include <Kernel/KSyms.h>
|
|
|
|
#include <Kernel/Process.h>
|
|
|
|
#include <Kernel/Scheduler.h>
|
2021-06-22 15:40:16 +00:00
|
|
|
#include <Kernel/Sections.h>
|
2018-12-24 21:59:10 +00:00
|
|
|
|
2020-02-16 00:27:42 +00:00
|
|
|
namespace Kernel {
|
|
|
|
|
2020-04-08 11:30:50 +00:00
|
|
|
FlatPtr g_lowest_kernel_symbol_address = 0xffffffff;
|
|
|
|
FlatPtr g_highest_kernel_symbol_address = 0;
|
|
|
|
bool g_kernel_symbols_available = false;
|
|
|
|
|
2021-07-14 19:04:18 +00:00
|
|
|
extern "C" {
|
|
|
|
__attribute__((section(".kernel_symbols"))) char kernel_symbols[5 * MiB] {};
|
|
|
|
}
|
|
|
|
|
2020-04-08 11:30:50 +00:00
|
|
|
static KernelSymbol* s_symbols;
|
|
|
|
static size_t s_symbol_count = 0;
|
2018-12-24 21:59:10 +00:00
|
|
|
|
2021-12-24 13:19:13 +00:00
|
|
|
UNMAP_AFTER_INIT static u8 parse_hex_digit(char nibble)
|
2018-12-24 21:59:10 +00:00
|
|
|
{
|
|
|
|
if (nibble >= '0' && nibble <= '9')
|
|
|
|
return nibble - '0';
|
2021-02-23 19:42:32 +00:00
|
|
|
VERIFY(nibble >= 'a' && nibble <= 'f');
|
2018-12-24 21:59:10 +00:00
|
|
|
return 10 + (nibble - 'a');
|
|
|
|
}
|
|
|
|
|
2021-11-10 23:55:02 +00:00
|
|
|
FlatPtr address_for_kernel_symbol(StringView name)
|
2019-11-28 20:30:20 +00:00
|
|
|
{
|
2020-04-08 11:30:50 +00:00
|
|
|
for (size_t i = 0; i < s_symbol_count; ++i) {
|
2022-04-01 17:58:27 +00:00
|
|
|
auto const& symbol = s_symbols[i];
|
2021-04-28 18:05:35 +00:00
|
|
|
if (name == symbol.name)
|
|
|
|
return symbol.address;
|
2019-11-28 20:30:20 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-04-01 17:58:27 +00:00
|
|
|
KernelSymbol const* symbolicate_kernel_address(FlatPtr address)
|
2018-12-24 21:59:10 +00:00
|
|
|
{
|
2020-04-08 11:30:50 +00:00
|
|
|
if (address < g_lowest_kernel_symbol_address || address > g_highest_kernel_symbol_address)
|
2018-12-24 21:59:10 +00:00
|
|
|
return nullptr;
|
2020-04-08 11:30:50 +00:00
|
|
|
for (unsigned i = 0; i < s_symbol_count; ++i) {
|
|
|
|
if (address < s_symbols[i + 1].address)
|
|
|
|
return &s_symbols[i];
|
2018-12-24 21:59:10 +00:00
|
|
|
}
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2021-12-17 08:52:06 +00:00
|
|
|
UNMAP_AFTER_INIT static void load_kernel_symbols_from_data(Bytes buffer)
|
2018-12-24 21:59:10 +00:00
|
|
|
{
|
2020-04-08 11:30:50 +00:00
|
|
|
g_lowest_kernel_symbol_address = 0xffffffff;
|
|
|
|
g_highest_kernel_symbol_address = 0;
|
|
|
|
|
2021-12-17 08:52:06 +00:00
|
|
|
auto* bufptr = (char*)buffer.data();
|
2018-12-24 21:59:10 +00:00
|
|
|
auto* start_of_name = bufptr;
|
2020-04-08 11:30:50 +00:00
|
|
|
FlatPtr address = 0;
|
2018-12-24 21:59:10 +00:00
|
|
|
|
2020-04-08 11:30:50 +00:00
|
|
|
for (size_t i = 0; i < 8; ++i)
|
|
|
|
s_symbol_count = (s_symbol_count << 4) | parse_hex_digit(*(bufptr++));
|
2021-12-28 18:12:22 +00:00
|
|
|
s_symbols = static_cast<KernelSymbol*>(kmalloc(sizeof(KernelSymbol) * s_symbol_count));
|
2018-12-24 21:59:10 +00:00
|
|
|
++bufptr; // skip newline
|
|
|
|
|
2021-03-12 13:06:37 +00:00
|
|
|
dmesgln("Loading kernel symbol table...");
|
2018-12-24 21:59:10 +00:00
|
|
|
|
2020-04-08 11:30:50 +00:00
|
|
|
size_t current_symbol_index = 0;
|
2018-12-24 21:59:10 +00:00
|
|
|
|
2021-07-14 19:04:18 +00:00
|
|
|
while ((u8 const*)bufptr < buffer.data() + buffer.size()) {
|
2021-12-13 03:28:24 +00:00
|
|
|
for (size_t i = 0; i < sizeof(void*) * 2; ++i)
|
2018-12-24 21:59:10 +00:00
|
|
|
address = (address << 4) | parse_hex_digit(*(bufptr++));
|
|
|
|
bufptr += 3;
|
|
|
|
start_of_name = bufptr;
|
|
|
|
while (*(++bufptr)) {
|
|
|
|
if (*bufptr == '\n') {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2020-04-08 11:30:50 +00:00
|
|
|
auto& ksym = s_symbols[current_symbol_index];
|
2021-07-26 13:10:51 +00:00
|
|
|
ksym.address = kernel_load_base + address;
|
2021-12-17 08:52:06 +00:00
|
|
|
ksym.name = start_of_name;
|
|
|
|
|
|
|
|
*bufptr = '\0';
|
2018-12-24 21:59:10 +00:00
|
|
|
|
2020-04-08 11:30:50 +00:00
|
|
|
if (ksym.address < g_lowest_kernel_symbol_address)
|
|
|
|
g_lowest_kernel_symbol_address = ksym.address;
|
|
|
|
if (ksym.address > g_highest_kernel_symbol_address)
|
|
|
|
g_highest_kernel_symbol_address = ksym.address;
|
2018-12-24 21:59:10 +00:00
|
|
|
|
|
|
|
++bufptr;
|
2020-04-08 11:30:50 +00:00
|
|
|
++current_symbol_index;
|
2018-12-24 21:59:10 +00:00
|
|
|
}
|
2020-04-08 11:30:50 +00:00
|
|
|
g_kernel_symbols_available = true;
|
2018-12-24 21:59:10 +00:00
|
|
|
}
|
|
|
|
|
2021-08-04 15:52:14 +00:00
|
|
|
NEVER_INLINE static void dump_backtrace_impl(FlatPtr base_pointer, bool use_ksyms, PrintToScreen print_to_screen)
|
2018-12-24 21:59:10 +00:00
|
|
|
{
|
2021-08-04 15:52:14 +00:00
|
|
|
#define PRINT_LINE(fmtstr, ...) \
|
|
|
|
do { \
|
|
|
|
if (print_to_screen == PrintToScreen::No) \
|
|
|
|
dbgln(fmtstr, __VA_ARGS__); \
|
|
|
|
else \
|
|
|
|
critical_dmesgln(fmtstr, __VA_ARGS__); \
|
|
|
|
} while (0)
|
|
|
|
|
2020-01-05 17:00:15 +00:00
|
|
|
SmapDisabler disabler;
|
2021-10-07 17:51:24 +00:00
|
|
|
if (use_ksyms && !g_kernel_symbols_available)
|
2020-07-06 13:27:22 +00:00
|
|
|
Processor::halt();
|
2020-03-02 09:40:40 +00:00
|
|
|
|
2018-12-24 21:59:10 +00:00
|
|
|
struct RecognizedSymbol {
|
2020-04-08 11:30:50 +00:00
|
|
|
FlatPtr address;
|
2022-04-01 17:58:27 +00:00
|
|
|
KernelSymbol const* symbol { nullptr };
|
2018-12-24 21:59:10 +00:00
|
|
|
};
|
2021-03-10 15:23:11 +00:00
|
|
|
constexpr size_t max_recognized_symbol_count = 256;
|
2019-04-15 21:50:25 +00:00
|
|
|
RecognizedSymbol recognized_symbols[max_recognized_symbol_count];
|
2020-04-08 11:30:50 +00:00
|
|
|
size_t recognized_symbol_count = 0;
|
2018-12-24 21:59:10 +00:00
|
|
|
if (use_ksyms) {
|
2020-09-12 03:11:07 +00:00
|
|
|
FlatPtr copied_stack_ptr[2];
|
|
|
|
for (FlatPtr* stack_ptr = (FlatPtr*)base_pointer; stack_ptr && recognized_symbol_count < max_recognized_symbol_count; stack_ptr = (FlatPtr*)copied_stack_ptr[0]) {
|
2022-04-10 19:49:06 +00:00
|
|
|
if ((FlatPtr)stack_ptr < kernel_mapping_base)
|
2020-11-06 08:09:51 +00:00
|
|
|
break;
|
|
|
|
|
2020-09-12 03:11:07 +00:00
|
|
|
void* fault_at;
|
|
|
|
if (!safe_memcpy(copied_stack_ptr, stack_ptr, sizeof(copied_stack_ptr), fault_at))
|
|
|
|
break;
|
|
|
|
FlatPtr retaddr = copied_stack_ptr[1];
|
2020-04-08 11:30:50 +00:00
|
|
|
recognized_symbols[recognized_symbol_count++] = { retaddr, symbolicate_kernel_address(retaddr) };
|
2018-12-24 21:59:10 +00:00
|
|
|
}
|
2019-04-15 21:50:25 +00:00
|
|
|
} else {
|
2020-09-12 03:11:07 +00:00
|
|
|
void* fault_at;
|
|
|
|
FlatPtr copied_stack_ptr[2];
|
|
|
|
FlatPtr* stack_ptr = (FlatPtr*)base_pointer;
|
|
|
|
while (stack_ptr && safe_memcpy(copied_stack_ptr, stack_ptr, sizeof(copied_stack_ptr), fault_at)) {
|
|
|
|
FlatPtr retaddr = copied_stack_ptr[1];
|
2021-08-04 15:52:14 +00:00
|
|
|
PRINT_LINE("{:p} (next: {:p})", retaddr, stack_ptr ? (FlatPtr*)copied_stack_ptr[0] : 0);
|
2020-09-12 03:11:07 +00:00
|
|
|
stack_ptr = (FlatPtr*)copied_stack_ptr[0];
|
2018-12-24 21:59:10 +00:00
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
2021-02-23 19:42:32 +00:00
|
|
|
VERIFY(recognized_symbol_count <= max_recognized_symbol_count);
|
2020-04-08 11:30:50 +00:00
|
|
|
for (size_t i = 0; i < recognized_symbol_count; ++i) {
|
2019-04-15 21:50:25 +00:00
|
|
|
auto& symbol = recognized_symbols[i];
|
2019-04-30 12:47:22 +00:00
|
|
|
if (!symbol.address)
|
|
|
|
break;
|
2020-04-08 11:30:50 +00:00
|
|
|
if (!symbol.symbol) {
|
2021-08-04 15:52:14 +00:00
|
|
|
PRINT_LINE("Kernel + {:p}", symbol.address - kernel_load_base);
|
2019-04-30 12:47:22 +00:00
|
|
|
continue;
|
|
|
|
}
|
2020-04-08 11:30:50 +00:00
|
|
|
size_t offset = symbol.address - symbol.symbol->address;
|
|
|
|
if (symbol.symbol->address == g_highest_kernel_symbol_address && offset > 4096)
|
2021-08-04 15:52:14 +00:00
|
|
|
PRINT_LINE("Kernel + {:p}", symbol.address - kernel_load_base);
|
2019-04-30 12:47:22 +00:00
|
|
|
else
|
2021-08-04 15:52:14 +00:00
|
|
|
PRINT_LINE("Kernel + {:p} {} +{:#x}", symbol.address - kernel_load_base, symbol.symbol->name, offset);
|
2018-12-24 21:59:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-09-21 12:33:39 +00:00
|
|
|
void dump_backtrace_from_base_pointer(FlatPtr base_pointer)
|
|
|
|
{
|
|
|
|
dump_backtrace_impl(base_pointer, g_kernel_symbols_available, PrintToScreen::Yes);
|
|
|
|
}
|
|
|
|
|
2021-08-04 15:52:14 +00:00
|
|
|
void dump_backtrace(PrintToScreen print_to_screen)
|
2019-02-24 13:51:48 +00:00
|
|
|
{
|
2019-05-18 15:31:52 +00:00
|
|
|
static bool in_dump_backtrace = false;
|
2019-11-08 16:36:29 +00:00
|
|
|
if (in_dump_backtrace)
|
2019-05-18 15:31:52 +00:00
|
|
|
return;
|
|
|
|
TemporaryChange change(in_dump_backtrace, true);
|
2019-08-07 18:35:41 +00:00
|
|
|
TemporaryChange disable_kmalloc_stacks(g_dump_kmalloc_stacks, false);
|
2022-05-02 20:22:33 +00:00
|
|
|
|
|
|
|
FlatPtr base_pointer = (FlatPtr)__builtin_frame_address(0);
|
2021-12-13 03:28:24 +00:00
|
|
|
dump_backtrace_impl(base_pointer, g_kernel_symbols_available, print_to_screen);
|
2019-02-24 13:51:48 +00:00
|
|
|
}
|
|
|
|
|
2021-02-19 20:29:46 +00:00
|
|
|
UNMAP_AFTER_INIT void load_kernel_symbol_table()
|
2018-12-24 21:59:10 +00:00
|
|
|
{
|
2021-07-14 19:04:18 +00:00
|
|
|
auto kernel_symbols_size = strnlen(kernel_symbols, sizeof(kernel_symbols));
|
|
|
|
// If we're hitting this VERIFY the kernel symbol file has grown beyond
|
|
|
|
// the array size of kernel_symbols. Try making the array larger.
|
|
|
|
VERIFY(kernel_symbols_size != sizeof(kernel_symbols));
|
|
|
|
load_kernel_symbols_from_data({ kernel_symbols, kernel_symbols_size });
|
2018-12-24 21:59:10 +00:00
|
|
|
}
|
2020-02-16 00:27:42 +00:00
|
|
|
|
|
|
|
}
|