]> git.saurik.com Git - apple/xnu.git/blob - osfmk/kern/kern_cdata.c
xnu-4570.51.1.tar.gz
[apple/xnu.git] / osfmk / kern / kern_cdata.c
1 /*
2 * Copyright (c) 2015 Apple Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28
29 #include <kern/assert.h>
30 #include <mach/mach_types.h>
31 #include <mach/boolean.h>
32 #include <mach/vm_param.h>
33 #include <kern/kern_types.h>
34 #include <kern/mach_param.h>
35 #include <kern/thread.h>
36 #include <kern/task.h>
37 #include <kern/kern_cdata.h>
38 #include <kern/kalloc.h>
39 #include <mach/mach_vm.h>
40
41 static kern_return_t kcdata_get_memory_addr_with_flavor(kcdata_descriptor_t data, uint32_t type, uint32_t size, uint64_t flags, mach_vm_address_t *user_addr);
42
43 /*
44 * Estimates how large of a buffer that should be allocated for a buffer that will contain
45 * num_items items of known types with overall length payload_size.
46 *
47 * NOTE: This function will not give an accurate estimate for buffers that will
48 * contain unknown types (those with string descriptions).
49 */
50 uint32_t kcdata_estimate_required_buffer_size(uint32_t num_items, uint32_t payload_size)
51 {
52 /*
53 * In the worst case each item will need (KCDATA_ALIGNMENT_SIZE - 1) padding
54 */
55 uint32_t max_padding_bytes = num_items * (KCDATA_ALIGNMENT_SIZE - 1);
56 uint32_t item_description_bytes = num_items * sizeof(struct kcdata_item);
57 uint32_t begin_and_end_marker_bytes = 2 * sizeof(struct kcdata_item);
58
59 return max_padding_bytes + item_description_bytes + begin_and_end_marker_bytes + payload_size;
60 }
61
62 kcdata_descriptor_t kcdata_memory_alloc_init(mach_vm_address_t buffer_addr_p, unsigned data_type, unsigned size, unsigned flags)
63 {
64 kcdata_descriptor_t data = NULL;
65 mach_vm_address_t user_addr = 0;
66
67 data = kalloc(sizeof(struct kcdata_descriptor));
68 if (data == NULL) {
69 return NULL;
70 }
71 bzero(data, sizeof(struct kcdata_descriptor));
72 data->kcd_addr_begin = buffer_addr_p;
73 data->kcd_addr_end = buffer_addr_p;
74 data->kcd_flags = (flags & KCFLAG_USE_COPYOUT)? KCFLAG_USE_COPYOUT : KCFLAG_USE_MEMCOPY;
75 data->kcd_length = size;
76
77 /* Initialize the BEGIN header */
78 if (KERN_SUCCESS != kcdata_get_memory_addr(data, data_type, 0, &user_addr)){
79 kcdata_memory_destroy(data);
80 return NULL;
81 }
82
83 return data;
84 }
85
86 kern_return_t kcdata_memory_static_init(kcdata_descriptor_t data, mach_vm_address_t buffer_addr_p, unsigned data_type, unsigned size, unsigned flags)
87 {
88 mach_vm_address_t user_addr = 0;
89
90 if (data == NULL) {
91 return KERN_INVALID_ARGUMENT;
92 }
93 bzero(data, sizeof(struct kcdata_descriptor));
94 data->kcd_addr_begin = buffer_addr_p;
95 data->kcd_addr_end = buffer_addr_p;
96 data->kcd_flags = (flags & KCFLAG_USE_COPYOUT)? KCFLAG_USE_COPYOUT : KCFLAG_USE_MEMCOPY;
97 data->kcd_length = size;
98
99 /* Initialize the BEGIN header */
100 return kcdata_get_memory_addr(data, data_type, 0, &user_addr);
101 }
102
103 void *kcdata_memory_get_begin_addr(kcdata_descriptor_t data)
104 {
105 if (data == NULL) {
106 return NULL;
107 }
108
109 return (void *)data->kcd_addr_begin;
110 }
111
112 uint64_t kcdata_memory_get_used_bytes(kcdata_descriptor_t kcd)
113 {
114 assert(kcd != NULL);
115 return ((uint64_t)kcd->kcd_addr_end - (uint64_t)kcd->kcd_addr_begin) + sizeof(struct kcdata_item);
116 }
117
118 /*
119 * Free up the memory associated with kcdata
120 */
121 kern_return_t kcdata_memory_destroy(kcdata_descriptor_t data)
122 {
123 if (!data) {
124 return KERN_INVALID_ARGUMENT;
125 }
126
127 /*
128 * data->kcd_addr_begin points to memory in not tracked by
129 * kcdata lib. So not clearing that here.
130 */
131 kfree(data, sizeof(struct kcdata_descriptor));
132 return KERN_SUCCESS;
133 }
134
135
136
137 /*
138 * Routine: kcdata_get_memory_addr
139 * Desc: get memory address in the userspace memory for corpse info
140 * NOTE: The caller is responsible for zeroing the resulting memory or
141 * using other means to mark memory if it has failed populating the
142 * data in middle of operation.
143 * params: data - pointer describing the crash info allocation
144 * type - type of data to be put. See corpse.h for defined types
145 * size - size requested. The header describes this size
146 * returns: mach_vm_address_t address in user memory for copyout().
147 */
148 kern_return_t
149 kcdata_get_memory_addr(kcdata_descriptor_t data, uint32_t type, uint32_t size, mach_vm_address_t * user_addr)
150 {
151 /* record number of padding bytes as lower 4 bits of flags */
152 uint64_t flags = (KCDATA_FLAGS_STRUCT_PADDING_MASK & kcdata_calc_padding(size)) | KCDATA_FLAGS_STRUCT_HAS_PADDING;
153 return kcdata_get_memory_addr_with_flavor(data, type, size, flags, user_addr);
154 }
155
156 /*
157 * Routine: kcdata_add_buffer_end
158 *
159 * Desc: Write buffer end marker. This does not advance the end pointer in the
160 * kcdata_descriptor_t, so it may be used conservatively before additional data
161 * is added, as long as it is at least called after the last time data is added.
162 *
163 * params: data - pointer describing the crash info allocation
164 */
165
166 kern_return_t
167 kcdata_write_buffer_end(kcdata_descriptor_t data)
168 {
169 struct kcdata_item info;
170 bzero(&info, sizeof(info));
171 info.type = KCDATA_TYPE_BUFFER_END;
172 info.size = 0;
173 return kcdata_memcpy(data, data->kcd_addr_end, &info, sizeof(info));
174 }
175
176 /*
177 * Routine: kcdata_get_memory_addr_with_flavor
178 * Desc: internal function with flags field. See documentation for kcdata_get_memory_addr for details
179 */
180
181 static kern_return_t kcdata_get_memory_addr_with_flavor(
182 kcdata_descriptor_t data,
183 uint32_t type,
184 uint32_t size,
185 uint64_t flags,
186 mach_vm_address_t *user_addr)
187 {
188 struct kcdata_item info;
189
190 uint32_t orig_size = size;
191 /* make sure 16 byte aligned */
192 size += kcdata_calc_padding(size);
193 uint32_t total_size = size + sizeof(info);
194
195 if (user_addr == NULL || data == NULL || total_size + sizeof(info) < orig_size) {
196 return KERN_INVALID_ARGUMENT;
197 }
198
199 bzero(&info, sizeof(info));
200 info.type = type;
201 info.size = size;
202 info.flags = flags;
203
204 /* check available memory, including trailer size for KCDATA_TYPE_BUFFER_END */
205 if (total_size + sizeof(info) > data->kcd_length ||
206 data->kcd_length - (total_size + sizeof(info)) < data->kcd_addr_end - data->kcd_addr_begin) {
207 return KERN_RESOURCE_SHORTAGE;
208 }
209
210 if (data->kcd_flags & KCFLAG_USE_COPYOUT) {
211 if (copyout(&info, data->kcd_addr_end, sizeof(info)))
212 return KERN_NO_ACCESS;
213 } else {
214 memcpy((void *)data->kcd_addr_end, &info, sizeof(info));
215 }
216
217 data->kcd_addr_end += sizeof(info);
218 *user_addr = data->kcd_addr_end;
219 data->kcd_addr_end += size;
220
221 if (!(data->kcd_flags & KCFLAG_NO_AUTO_ENDBUFFER)) {
222 /* setup the end header as well */
223 return kcdata_write_buffer_end(data);
224 } else {
225 return KERN_SUCCESS;
226 }
227 }
228
229 /*
230 * Routine: kcdata_get_memory_addr_for_array
231 * Desc: get memory address in the userspace memory for corpse info
232 * NOTE: The caller is responsible to zero the resulting memory or
233 * user other means to mark memory if it has failed populating the
234 * data in middle of operation.
235 * params: data - pointer describing the crash info allocation
236 * type_of_element - type of data to be put. See kern_cdata.h for defined types
237 * size_of_element - size of element. The header describes this size
238 * count - num of elements in array.
239 * returns: mach_vm_address_t address in user memory for copyout().
240 */
241
242 kern_return_t kcdata_get_memory_addr_for_array(
243 kcdata_descriptor_t data,
244 uint32_t type_of_element,
245 uint32_t size_of_element,
246 uint32_t count,
247 mach_vm_address_t *user_addr)
248 {
249 /* for arrays we record the number of padding bytes as the low-order 4 bits
250 * of the type field. KCDATA_TYPE_ARRAY_PAD{x} means x bytes of pad. */
251 uint64_t flags = type_of_element;
252 flags = (flags << 32) | count;
253 uint32_t total_size = count * size_of_element;
254 uint32_t pad = kcdata_calc_padding(total_size);
255
256 return kcdata_get_memory_addr_with_flavor(data, KCDATA_TYPE_ARRAY_PAD0 | pad, total_size, flags, user_addr);
257 }
258
259 /*
260 * Routine: kcdata_add_container_marker
261 * Desc: Add a container marker in the buffer for type and identifier.
262 * params: data - pointer describing the crash info allocation
263 * header_type - one of (KCDATA_TYPE_CONTAINER_BEGIN ,KCDATA_TYPE_CONTAINER_END)
264 * container_type - type of data to be put. See kern_cdata.h for defined types
265 * identifier - unique identifier. This is required to match nested containers.
266 * returns: return value of kcdata_get_memory_addr()
267 */
268
269 kern_return_t kcdata_add_container_marker(
270 kcdata_descriptor_t data,
271 uint32_t header_type,
272 uint32_t container_type,
273 uint64_t identifier)
274 {
275 mach_vm_address_t user_addr;
276 kern_return_t kr;
277 assert(header_type == KCDATA_TYPE_CONTAINER_END || header_type == KCDATA_TYPE_CONTAINER_BEGIN);
278 uint32_t data_size = (header_type == KCDATA_TYPE_CONTAINER_BEGIN)? sizeof(uint32_t): 0;
279 kr = kcdata_get_memory_addr_with_flavor(data, header_type, data_size, identifier, &user_addr);
280 if (kr != KERN_SUCCESS)
281 return kr;
282
283 if (data_size)
284 kr = kcdata_memcpy(data, user_addr, &container_type, data_size);
285 return kr;
286 }
287
288 /*
289 * Routine: kcdata_undo_addcontainer_begin
290 * Desc: call this after adding a container begin but before adding anything else to revert.
291 */
292 kern_return_t
293 kcdata_undo_add_container_begin(kcdata_descriptor_t data)
294 {
295 /*
296 * the payload of a container begin is a single uint64_t. It is padded out
297 * to 16 bytes.
298 */
299 const mach_vm_address_t padded_payload_size = 16;
300 data->kcd_addr_end -= sizeof(struct kcdata_item) + padded_payload_size;
301
302 if (!(data->kcd_flags & KCFLAG_NO_AUTO_ENDBUFFER)) {
303 /* setup the end header as well */
304 return kcdata_write_buffer_end(data);
305 } else {
306 return KERN_SUCCESS;
307 }
308 }
309
310 /*
311 * Routine: kcdata_memcpy
312 * Desc: a common function to copy data out based on either copyout or memcopy flags
313 * params: data - pointer describing the kcdata buffer
314 * dst_addr - destination address
315 * src_addr - source address
316 * size - size in bytes to copy.
317 * returns: KERN_NO_ACCESS if copyout fails.
318 */
319
320 kern_return_t kcdata_memcpy(kcdata_descriptor_t data, mach_vm_address_t dst_addr, void *src_addr, uint32_t size)
321 {
322 if (data->kcd_flags & KCFLAG_USE_COPYOUT) {
323 if (copyout(src_addr, dst_addr, size))
324 return KERN_NO_ACCESS;
325 } else {
326 memcpy((void *)dst_addr, src_addr, size);
327 }
328 return KERN_SUCCESS;
329 }
330
331 /*
332 * Routine: kcdata_add_type_definition
333 * Desc: add type definition to kcdata buffer.
334 * see feature description in documentation above.
335 * params: data - pointer describing the kcdata buffer
336 * type_id - unique type identifier for this data
337 * type_name - a string of max KCDATA_DESC_MAXLEN size for name of type
338 * elements_array - address to descriptors for each field in struct
339 * elements_count - count of how many fields are there in struct.
340 * returns: return code from kcdata_get_memory_addr in case of failure.
341 */
342
343 kern_return_t kcdata_add_type_definition(
344 kcdata_descriptor_t data,
345 uint32_t type_id,
346 char *type_name,
347 struct kcdata_subtype_descriptor *elements_array_addr,
348 uint32_t elements_count)
349 {
350 kern_return_t kr = KERN_SUCCESS;
351 struct kcdata_type_definition kc_type_definition;
352 mach_vm_address_t user_addr;
353 uint32_t total_size = sizeof(struct kcdata_type_definition);
354 bzero(&kc_type_definition, sizeof(kc_type_definition));
355
356 if (strlen(type_name) >= KCDATA_DESC_MAXLEN)
357 return KERN_INVALID_ARGUMENT;
358 strlcpy(&kc_type_definition.kct_name[0], type_name, KCDATA_DESC_MAXLEN);
359 kc_type_definition.kct_num_elements = elements_count;
360 kc_type_definition.kct_type_identifier = type_id;
361
362 total_size += elements_count * sizeof(struct kcdata_subtype_descriptor);
363 /* record number of padding bytes as lower 4 bits of flags */
364 if (KERN_SUCCESS != (kr = kcdata_get_memory_addr_with_flavor(data, KCDATA_TYPE_TYPEDEFINTION, total_size,
365 kcdata_calc_padding(total_size), &user_addr)))
366 return kr;
367 if (KERN_SUCCESS != (kr = kcdata_memcpy(data, user_addr, (void *)&kc_type_definition, sizeof(struct kcdata_type_definition))))
368 return kr;
369 user_addr += sizeof(struct kcdata_type_definition);
370 if (KERN_SUCCESS != (kr = kcdata_memcpy(data, user_addr, (void *)elements_array_addr, elements_count * sizeof(struct kcdata_subtype_descriptor))))
371 return kr;
372 return kr;
373 }
374
375 #pragma pack(4)
376
377 /* Internal structs for convenience */
378 struct _uint64_with_description_data {
379 char desc[KCDATA_DESC_MAXLEN];
380 uint64_t data;
381 };
382
383 struct _uint32_with_description_data {
384 char desc[KCDATA_DESC_MAXLEN];
385 uint32_t data;
386 };
387
388 #pragma pack()
389
390 kern_return_t
391 kcdata_add_uint64_with_description(kcdata_descriptor_t data_desc, uint64_t data, const char * description)
392 {
393 if (strlen(description) >= KCDATA_DESC_MAXLEN)
394 return KERN_INVALID_ARGUMENT;
395
396 kern_return_t kr = 0;
397 mach_vm_address_t user_addr;
398 struct _uint64_with_description_data save_data;
399 const uint64_t size_req = sizeof(save_data);
400 bzero(&save_data, size_req);
401
402 strlcpy(&(save_data.desc[0]), description, sizeof(save_data.desc));
403 save_data.data = data;
404
405 kr = kcdata_get_memory_addr(data_desc, KCDATA_TYPE_UINT64_DESC, size_req, &user_addr);
406 if (kr != KERN_SUCCESS)
407 return kr;
408
409 if (data_desc->kcd_flags & KCFLAG_USE_COPYOUT) {
410 if (copyout(&save_data, user_addr, size_req))
411 return KERN_NO_ACCESS;
412 } else {
413 memcpy((void *)user_addr, &save_data, size_req);
414 }
415 return KERN_SUCCESS;
416 }
417
418 kern_return_t kcdata_add_uint32_with_description(
419 kcdata_descriptor_t data_desc,
420 uint32_t data,
421 const char *description)
422 {
423 assert(strlen(description) < KCDATA_DESC_MAXLEN);
424 if (strlen(description) >= KCDATA_DESC_MAXLEN)
425 return KERN_INVALID_ARGUMENT;
426 kern_return_t kr = 0;
427 mach_vm_address_t user_addr;
428 struct _uint32_with_description_data save_data;
429 const uint64_t size_req = sizeof(save_data);
430
431 bzero(&save_data, size_req);
432 strlcpy(&(save_data.desc[0]), description, sizeof(save_data.desc));
433 save_data.data = data;
434
435 kr = kcdata_get_memory_addr(data_desc, KCDATA_TYPE_UINT32_DESC, size_req, &user_addr);
436 if (kr != KERN_SUCCESS)
437 return kr;
438 if (data_desc->kcd_flags & KCFLAG_USE_COPYOUT) {
439 if (copyout(&save_data, user_addr, size_req))
440 return KERN_NO_ACCESS;
441 } else {
442 memcpy((void *)user_addr, &save_data, size_req);
443 }
444 return KERN_SUCCESS;
445 }
446
447
448 /* end buffer management api */