qemu

Форк
0
/
win_dump.c 
497 строк · 14.2 Кб
1
/*
2
 * Windows crashdump (target specific implementations)
3
 *
4
 * Copyright (c) 2018 Virtuozzo International GmbH
5
 *
6
 * This work is licensed under the terms of the GNU GPL, version 2 or later.
7
 * See the COPYING file in the top-level directory.
8
 *
9
 */
10

11
#include "qemu/osdep.h"
12
#include "sysemu/dump.h"
13
#include "qapi/error.h"
14
#include "qemu/error-report.h"
15
#include "exec/cpu-defs.h"
16
#include "hw/core/cpu.h"
17
#include "qemu/win_dump_defs.h"
18
#include "win_dump.h"
19
#include "cpu.h"
20

21
#if defined(TARGET_X86_64)
22

23
bool win_dump_available(Error **errp)
24
{
25
    return true;
26
}
27

28
static size_t win_dump_ptr_size(bool x64)
29
{
30
    return x64 ? sizeof(uint64_t) : sizeof(uint32_t);
31
}
32

33
#define _WIN_DUMP_FIELD(f) (x64 ? h->x64.f : h->x32.f)
34
#define WIN_DUMP_FIELD(field) _WIN_DUMP_FIELD(field)
35

36
#define _WIN_DUMP_FIELD_PTR(f) (x64 ? (void *)&h->x64.f : (void *)&h->x32.f)
37
#define WIN_DUMP_FIELD_PTR(field) _WIN_DUMP_FIELD_PTR(field)
38

39
#define _WIN_DUMP_FIELD_SIZE(f) (x64 ? sizeof(h->x64.f) : sizeof(h->x32.f))
40
#define WIN_DUMP_FIELD_SIZE(field) _WIN_DUMP_FIELD_SIZE(field)
41

42
static size_t win_dump_ctx_size(bool x64)
43
{
44
    return x64 ? sizeof(WinContext64) : sizeof(WinContext32);
45
}
46

47
static size_t write_run(uint64_t base_page, uint64_t page_count,
48
        int fd, Error **errp)
49
{
50
    void *buf;
51
    uint64_t addr = base_page << TARGET_PAGE_BITS;
52
    uint64_t size = page_count << TARGET_PAGE_BITS;
53
    uint64_t len, l;
54
    int eno;
55
    size_t total = 0;
56

57
    while (size) {
58
        len = size;
59

60
        buf = cpu_physical_memory_map(addr, &len, false);
61
        if (!buf) {
62
            error_setg(errp, "win-dump: failed to map physical range"
63
                             " 0x%016" PRIx64 "-0x%016" PRIx64, addr, addr + size - 1);
64
            return 0;
65
        }
66

67
        l = qemu_write_full(fd, buf, len);
68
        eno = errno;
69
        cpu_physical_memory_unmap(buf, addr, false, len);
70
        if (l != len) {
71
            error_setg_errno(errp, eno, "win-dump: failed to save memory");
72
            return 0;
73
        }
74

75
        addr += l;
76
        size -= l;
77
        total += l;
78
    }
79

80
    return total;
81
}
82

83
static void write_runs(DumpState *s, WinDumpHeader *h, bool x64, Error **errp)
84
{
85
    uint64_t BasePage, PageCount;
86
    Error *local_err = NULL;
87
    int i;
88

89
    for (i = 0; i < WIN_DUMP_FIELD(PhysicalMemoryBlock.NumberOfRuns); i++) {
90
        BasePage = WIN_DUMP_FIELD(PhysicalMemoryBlock.Run[i].BasePage);
91
        PageCount = WIN_DUMP_FIELD(PhysicalMemoryBlock.Run[i].PageCount);
92
        s->written_size += write_run(BasePage, PageCount, s->fd, &local_err);
93
        if (local_err) {
94
            error_propagate(errp, local_err);
95
            return;
96
        }
97
    }
98
}
99

100
static int cpu_read_ptr(bool x64, CPUState *cpu, uint64_t addr, uint64_t *ptr)
101
{
102
    int ret;
103
    uint32_t ptr32;
104
    uint64_t ptr64;
105

106
    ret = cpu_memory_rw_debug(cpu, addr, x64 ? (void *)&ptr64 : (void *)&ptr32,
107
            win_dump_ptr_size(x64), 0);
108

109
    *ptr = x64 ? ptr64 : ptr32;
110

111
    return ret;
112
}
113

114
static void patch_mm_pfn_database(WinDumpHeader *h, bool x64, Error **errp)
115
{
116
    if (cpu_memory_rw_debug(first_cpu,
117
            WIN_DUMP_FIELD(KdDebuggerDataBlock) + KDBG_MM_PFN_DATABASE_OFFSET,
118
            WIN_DUMP_FIELD_PTR(PfnDatabase),
119
            WIN_DUMP_FIELD_SIZE(PfnDatabase), 0)) {
120
        error_setg(errp, "win-dump: failed to read MmPfnDatabase");
121
        return;
122
    }
123
}
124

125
static void patch_bugcheck_data(WinDumpHeader *h, bool x64, Error **errp)
126
{
127
    uint64_t KiBugcheckData;
128

129
    if (cpu_read_ptr(x64, first_cpu,
130
            WIN_DUMP_FIELD(KdDebuggerDataBlock) + KDBG_KI_BUGCHECK_DATA_OFFSET,
131
            &KiBugcheckData)) {
132
        error_setg(errp, "win-dump: failed to read KiBugcheckData");
133
        return;
134
    }
135

136
    if (cpu_memory_rw_debug(first_cpu, KiBugcheckData,
137
            WIN_DUMP_FIELD(BugcheckData),
138
            WIN_DUMP_FIELD_SIZE(BugcheckData), 0)) {
139
        error_setg(errp, "win-dump: failed to read bugcheck data");
140
        return;
141
    }
142

143
    /*
144
     * If BugcheckCode wasn't saved, we consider guest OS as alive.
145
     */
146

147
    if (!WIN_DUMP_FIELD(BugcheckCode)) {
148
        *(uint32_t *)WIN_DUMP_FIELD_PTR(BugcheckCode) = LIVE_SYSTEM_DUMP;
149
    }
150
}
151

152
/*
153
 * This routine tries to correct mistakes in crashdump header.
154
 */
155
static void patch_header(WinDumpHeader *h, bool x64)
156
{
157
    Error *local_err = NULL;
158

159
    if (x64) {
160
        h->x64.RequiredDumpSpace = sizeof(WinDumpHeader64) +
161
            (h->x64.PhysicalMemoryBlock.NumberOfPages << TARGET_PAGE_BITS);
162
        h->x64.PhysicalMemoryBlock.unused = 0;
163
        h->x64.unused1 = 0;
164
    } else {
165
        h->x32.RequiredDumpSpace = sizeof(WinDumpHeader32) +
166
            (h->x32.PhysicalMemoryBlock.NumberOfPages << TARGET_PAGE_BITS);
167
    }
168

169
    patch_mm_pfn_database(h, x64, &local_err);
170
    if (local_err) {
171
        warn_report_err(local_err);
172
        local_err = NULL;
173
    }
174
    patch_bugcheck_data(h, x64, &local_err);
175
    if (local_err) {
176
        warn_report_err(local_err);
177
    }
178
}
179

180
static bool check_header(WinDumpHeader *h, bool *x64, Error **errp)
181
{
182
    const char Signature[] = "PAGE";
183

184
    if (memcmp(h->Signature, Signature, sizeof(h->Signature))) {
185
        error_setg(errp, "win-dump: invalid header, expected '%.4s',"
186
                         " got '%.4s'", Signature, h->Signature);
187
        return false;
188
    }
189

190
    if (!memcmp(h->ValidDump, "DUMP", sizeof(h->ValidDump))) {
191
        *x64 = false;
192
    } else if (!memcmp(h->ValidDump, "DU64", sizeof(h->ValidDump))) {
193
        *x64 = true;
194
    } else {
195
        error_setg(errp, "win-dump: invalid header, expected 'DUMP' or 'DU64',"
196
                   " got '%.4s'", h->ValidDump);
197
        return false;
198
    }
199

200
    return true;
201
}
202

203
static void check_kdbg(WinDumpHeader *h, bool x64, Error **errp)
204
{
205
    const char OwnerTag[] = "KDBG";
206
    char read_OwnerTag[4];
207
    uint64_t KdDebuggerDataBlock = WIN_DUMP_FIELD(KdDebuggerDataBlock);
208
    bool try_fallback = true;
209

210
try_again:
211
    if (cpu_memory_rw_debug(first_cpu,
212
            KdDebuggerDataBlock + KDBG_OWNER_TAG_OFFSET,
213
            (uint8_t *)&read_OwnerTag, sizeof(read_OwnerTag), 0)) {
214
        error_setg(errp, "win-dump: failed to read OwnerTag");
215
        return;
216
    }
217

218
    if (memcmp(read_OwnerTag, OwnerTag, sizeof(read_OwnerTag))) {
219
        if (try_fallback) {
220
            /*
221
             * If attempt to use original KDBG failed
222
             * (most likely because of its encryption),
223
             * we try to use KDBG obtained by guest driver.
224
             */
225

226
            KdDebuggerDataBlock = WIN_DUMP_FIELD(BugcheckParameter1);
227
            try_fallback = false;
228
            goto try_again;
229
        } else {
230
            error_setg(errp, "win-dump: invalid KDBG OwnerTag,"
231
                             " expected '%.4s', got '%.4s'",
232
                             OwnerTag, read_OwnerTag);
233
            return;
234
        }
235
    }
236

237
    if (x64) {
238
        h->x64.KdDebuggerDataBlock = KdDebuggerDataBlock;
239
    } else {
240
        h->x32.KdDebuggerDataBlock = KdDebuggerDataBlock;
241
    }
242
}
243

244
struct saved_context {
245
    WinContext ctx;
246
    uint64_t addr;
247
};
248

249
static void patch_and_save_context(WinDumpHeader *h, bool x64,
250
                                   struct saved_context *saved_ctx,
251
                                   Error **errp)
252
{
253
    uint64_t KdDebuggerDataBlock = WIN_DUMP_FIELD(KdDebuggerDataBlock);
254
    uint64_t KiProcessorBlock;
255
    uint16_t OffsetPrcbContext;
256
    CPUState *cpu;
257
    int i = 0;
258

259
    if (cpu_read_ptr(x64, first_cpu,
260
            KdDebuggerDataBlock + KDBG_KI_PROCESSOR_BLOCK_OFFSET,
261
            &KiProcessorBlock)) {
262
        error_setg(errp, "win-dump: failed to read KiProcessorBlock");
263
        return;
264
    }
265

266
    if (cpu_memory_rw_debug(first_cpu,
267
            KdDebuggerDataBlock + KDBG_OFFSET_PRCB_CONTEXT_OFFSET,
268
            (uint8_t *)&OffsetPrcbContext, sizeof(OffsetPrcbContext), 0)) {
269
        error_setg(errp, "win-dump: failed to read OffsetPrcbContext");
270
        return;
271
    }
272

273
    CPU_FOREACH(cpu) {
274
        X86CPU *x86_cpu = X86_CPU(cpu);
275
        CPUX86State *env = &x86_cpu->env;
276
        uint64_t Prcb;
277
        uint64_t Context;
278
        WinContext ctx;
279

280
        if (i >= WIN_DUMP_FIELD(NumberProcessors)) {
281
            warn_report("win-dump: number of QEMU CPUs is bigger than"
282
                        " NumberProcessors (%u) in guest Windows",
283
                        WIN_DUMP_FIELD(NumberProcessors));
284
            return;
285
        }
286

287
        if (cpu_read_ptr(x64, first_cpu,
288
                KiProcessorBlock + i * win_dump_ptr_size(x64),
289
                &Prcb)) {
290
            error_setg(errp, "win-dump: failed to read"
291
                             " CPU #%d PRCB location", i);
292
            return;
293
        }
294

295
        if (cpu_read_ptr(x64, first_cpu,
296
                Prcb + OffsetPrcbContext,
297
                &Context)) {
298
            error_setg(errp, "win-dump: failed to read"
299
                             " CPU #%d ContextFrame location", i);
300
            return;
301
        }
302

303
        saved_ctx[i].addr = Context;
304

305
        if (x64) {
306
            ctx.x64 = (WinContext64){
307
                .ContextFlags = WIN_CTX64_ALL,
308
                .MxCsr = env->mxcsr,
309

310
                .SegEs = env->segs[0].selector,
311
                .SegCs = env->segs[1].selector,
312
                .SegSs = env->segs[2].selector,
313
                .SegDs = env->segs[3].selector,
314
                .SegFs = env->segs[4].selector,
315
                .SegGs = env->segs[5].selector,
316
                .EFlags = cpu_compute_eflags(env),
317

318
                .Dr0 = env->dr[0],
319
                .Dr1 = env->dr[1],
320
                .Dr2 = env->dr[2],
321
                .Dr3 = env->dr[3],
322
                .Dr6 = env->dr[6],
323
                .Dr7 = env->dr[7],
324

325
                .Rax = env->regs[R_EAX],
326
                .Rbx = env->regs[R_EBX],
327
                .Rcx = env->regs[R_ECX],
328
                .Rdx = env->regs[R_EDX],
329
                .Rsp = env->regs[R_ESP],
330
                .Rbp = env->regs[R_EBP],
331
                .Rsi = env->regs[R_ESI],
332
                .Rdi = env->regs[R_EDI],
333
                .R8  = env->regs[8],
334
                .R9  = env->regs[9],
335
                .R10 = env->regs[10],
336
                .R11 = env->regs[11],
337
                .R12 = env->regs[12],
338
                .R13 = env->regs[13],
339
                .R14 = env->regs[14],
340
                .R15 = env->regs[15],
341

342
                .Rip = env->eip,
343
                .FltSave = {
344
                    .MxCsr = env->mxcsr,
345
                },
346
            };
347
        } else {
348
            ctx.x32 = (WinContext32){
349
                .ContextFlags = WIN_CTX32_FULL | WIN_CTX_DBG,
350

351
                .SegEs = env->segs[0].selector,
352
                .SegCs = env->segs[1].selector,
353
                .SegSs = env->segs[2].selector,
354
                .SegDs = env->segs[3].selector,
355
                .SegFs = env->segs[4].selector,
356
                .SegGs = env->segs[5].selector,
357
                .EFlags = cpu_compute_eflags(env),
358

359
                .Dr0 = env->dr[0],
360
                .Dr1 = env->dr[1],
361
                .Dr2 = env->dr[2],
362
                .Dr3 = env->dr[3],
363
                .Dr6 = env->dr[6],
364
                .Dr7 = env->dr[7],
365

366
                .Eax = env->regs[R_EAX],
367
                .Ebx = env->regs[R_EBX],
368
                .Ecx = env->regs[R_ECX],
369
                .Edx = env->regs[R_EDX],
370
                .Esp = env->regs[R_ESP],
371
                .Ebp = env->regs[R_EBP],
372
                .Esi = env->regs[R_ESI],
373
                .Edi = env->regs[R_EDI],
374

375
                .Eip = env->eip,
376
            };
377
        }
378

379
        if (cpu_memory_rw_debug(first_cpu, Context,
380
                &saved_ctx[i].ctx, win_dump_ctx_size(x64), 0)) {
381
            error_setg(errp, "win-dump: failed to save CPU #%d context", i);
382
            return;
383
        }
384

385
        if (cpu_memory_rw_debug(first_cpu, Context,
386
                &ctx, win_dump_ctx_size(x64), 1)) {
387
            error_setg(errp, "win-dump: failed to write CPU #%d context", i);
388
            return;
389
        }
390

391
        i++;
392
    }
393
}
394

395
static void restore_context(WinDumpHeader *h, bool x64,
396
                            struct saved_context *saved_ctx)
397
{
398
    int i;
399

400
    for (i = 0; i < WIN_DUMP_FIELD(NumberProcessors); i++) {
401
        if (cpu_memory_rw_debug(first_cpu, saved_ctx[i].addr,
402
                &saved_ctx[i].ctx, win_dump_ctx_size(x64), 1)) {
403
            warn_report("win-dump: failed to restore CPU #%d context", i);
404
        }
405
    }
406
}
407

408
void create_win_dump(DumpState *s, Error **errp)
409
{
410
    WinDumpHeader *h = (void *)(s->guest_note + VMCOREINFO_ELF_NOTE_HDR_SIZE);
411
    X86CPU *first_x86_cpu = X86_CPU(first_cpu);
412
    uint64_t saved_cr3 = first_x86_cpu->env.cr[3];
413
    struct saved_context *saved_ctx = NULL;
414
    Error *local_err = NULL;
415
    bool x64 = true;
416
    size_t hdr_size;
417

418
    if (s->guest_note_size != VMCOREINFO_WIN_DUMP_NOTE_SIZE32 &&
419
            s->guest_note_size != VMCOREINFO_WIN_DUMP_NOTE_SIZE64) {
420
        error_setg(errp, "win-dump: invalid vmcoreinfo note size");
421
        return;
422
    }
423

424
    if (!check_header(h, &x64, &local_err)) {
425
        error_propagate(errp, local_err);
426
        return;
427
    }
428

429
    hdr_size = x64 ? sizeof(WinDumpHeader64) : sizeof(WinDumpHeader32);
430

431
    /*
432
     * Further access to kernel structures by virtual addresses
433
     * should be made from system context.
434
     */
435

436
    first_x86_cpu->env.cr[3] = WIN_DUMP_FIELD(DirectoryTableBase);
437

438
    check_kdbg(h, x64, &local_err);
439
    if (local_err) {
440
        error_propagate(errp, local_err);
441
        goto out_cr3;
442
    }
443

444
    patch_header(h, x64);
445

446
    saved_ctx = g_new(struct saved_context, WIN_DUMP_FIELD(NumberProcessors));
447

448
    /*
449
     * Always patch context because there is no way
450
     * to determine if the system-saved context is valid
451
     */
452

453
    patch_and_save_context(h, x64, saved_ctx, &local_err);
454
    if (local_err) {
455
        error_propagate(errp, local_err);
456
        goto out_free;
457
    }
458

459
    s->total_size = WIN_DUMP_FIELD(RequiredDumpSpace);
460

461
    s->written_size = qemu_write_full(s->fd, h, hdr_size);
462
    if (s->written_size != hdr_size) {
463
        error_setg_errno(errp, errno, "win-dump: failed to write header");
464
        goto out_restore;
465
    }
466

467
    write_runs(s, h, x64, &local_err);
468
    if (local_err) {
469
        error_propagate(errp, local_err);
470
        goto out_restore;
471
    }
472

473
out_restore:
474
    restore_context(h, x64, saved_ctx);
475
out_free:
476
    g_free(saved_ctx);
477
out_cr3:
478
    first_x86_cpu->env.cr[3] = saved_cr3;
479

480
    return;
481
}
482

483
#else /* !TARGET_X86_64 */
484

485
bool win_dump_available(Error **errp)
486
{
487
    error_setg(errp, "Windows dump is only available for x86-64");
488

489
    return false;
490
}
491

492
void create_win_dump(DumpState *s, Error **errp)
493
{
494
    win_dump_available(errp);
495
}
496

497
#endif
498

Использование cookies

Мы используем файлы cookie в соответствии с Политикой конфиденциальности и Политикой использования cookies.

Нажимая кнопку «Принимаю», Вы даете АО «СберТех» согласие на обработку Ваших персональных данных в целях совершенствования нашего веб-сайта и Сервиса GitVerse, а также повышения удобства их использования.

Запретить использование cookies Вы можете самостоятельно в настройках Вашего браузера.