1 /* 2 * Copyright (c) 2003, 2020, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. 8 * 9 * This code is distributed in the hope that it will be useful, but WITHOUT 10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 12 * version 2 for more details (a copy is included in the LICENSE file that 13 * accompanied this code). 14 * 15 * You should have received a copy of the GNU General Public License version 16 * 2 along with this work; if not, write to the Free Software Foundation, 17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 18 * 19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 20 * or visit www.oracle.com if you need additional information or have any 21 * questions. 22 * 23 */ 24 25 #include <jni.h> 26 #include <unistd.h> 27 #include <fcntl.h> 28 #include <string.h> 29 #include <stdlib.h> 30 #include <stddef.h> 31 #include <elf.h> 32 #include <link.h> 33 #include "libproc_impl.h" 34 #include "ps_core_common.h" 35 #include "proc_service.h" 36 #include "salibelf.h" 37 38 // This file has the libproc implementation to read core files. 39 // For live processes, refer to ps_proc.c. Portions of this is adapted 40 // /modelled after Solaris libproc.so (in particular Pcore.c) 41 42 43 //--------------------------------------------------------------------------- 44 // functions to handle map_info 45 46 // Order mappings based on virtual address. We use this function as the 47 // callback for sorting the array of map_info pointers. 48 static int core_cmp_mapping(const void *lhsp, const void *rhsp) 49 { 50 const map_info *lhs = *((const map_info **)lhsp); 51 const map_info *rhs = *((const map_info **)rhsp); 52 53 if (lhs->vaddr == rhs->vaddr) { 54 return (0); 55 } 56 57 return (lhs->vaddr < rhs->vaddr ? -1 : 1); 58 } 59 60 // we sort map_info by starting virtual address so that we can do 61 // binary search to read from an address. 62 static bool sort_map_array(struct ps_prochandle* ph) { 63 size_t num_maps = ph->core->num_maps; 64 map_info* map = ph->core->maps; 65 int i = 0; 66 67 // allocate map_array 68 map_info** array; 69 if ( (array = (map_info**) malloc(sizeof(map_info*) * num_maps)) == NULL) { 70 print_debug("can't allocate memory for map array\n"); 71 return false; 72 } 73 74 // add maps to array 75 while (map) { 76 array[i] = map; 77 i++; 78 map = map->next; 79 } 80 81 // sort is called twice. If this is second time, clear map array 82 if (ph->core->map_array) { 83 free(ph->core->map_array); 84 } 85 86 ph->core->map_array = array; 87 // sort the map_info array by base virtual address. 88 qsort(ph->core->map_array, ph->core->num_maps, sizeof (map_info*), 89 core_cmp_mapping); 90 91 // print map 92 if (is_debug()) { 93 int j = 0; 94 print_debug("---- sorted virtual address map ----\n"); 95 for (j = 0; j < ph->core->num_maps; j++) { 96 print_debug("base = 0x%lx\tsize = %zu\n", ph->core->map_array[j]->vaddr, 97 ph->core->map_array[j]->memsz); 98 } 99 } 100 101 return true; 102 } 103 104 #ifndef MIN 105 #define MIN(x, y) (((x) < (y))? (x): (y)) 106 #endif 107 108 static bool core_read_data(struct ps_prochandle* ph, uintptr_t addr, char *buf, size_t size) { 109 ssize_t resid = size; 110 int page_size=sysconf(_SC_PAGE_SIZE); 111 while (resid != 0) { 112 map_info *mp = core_lookup(ph, addr); 113 uintptr_t mapoff; 114 ssize_t len, rem; 115 off_t off; 116 int fd; 117 118 if (mp == NULL) { 119 break; /* No mapping for this address */ 120 } 121 122 fd = mp->fd; 123 mapoff = addr - mp->vaddr; 124 len = MIN(resid, mp->memsz - mapoff); 125 off = mp->offset + mapoff; 126 127 if ((len = pread(fd, buf, len, off)) <= 0) { 128 break; 129 } 130 131 resid -= len; 132 addr += len; 133 buf = (char *)buf + len; 134 135 // mappings always start at page boundary. But, may end in fractional 136 // page. fill zeros for possible fractional page at the end of a mapping. 137 rem = mp->memsz % page_size; 138 if (rem > 0) { 139 rem = page_size - rem; 140 len = MIN(resid, rem); 141 resid -= len; 142 addr += len; 143 // we are not assuming 'buf' to be zero initialized. 144 memset(buf, 0, len); 145 buf += len; 146 } 147 } 148 149 if (resid) { 150 print_debug("core read failed for %d byte(s) @ 0x%lx (%d more bytes)\n", 151 size, addr, resid); 152 return false; 153 } else { 154 return true; 155 } 156 } 157 158 // null implementation for write 159 static bool core_write_data(struct ps_prochandle* ph, 160 uintptr_t addr, const char *buf , size_t size) { 161 return false; 162 } 163 164 static bool core_get_lwp_regs(struct ps_prochandle* ph, lwpid_t lwp_id, 165 struct user_regs_struct* regs) { 166 // for core we have cached the lwp regs from NOTE section 167 thread_info* thr = ph->threads; 168 while (thr) { 169 if (thr->lwp_id == lwp_id) { 170 memcpy(regs, &thr->regs, sizeof(struct user_regs_struct)); 171 return true; 172 } 173 thr = thr->next; 174 } 175 return false; 176 } 177 178 static ps_prochandle_ops core_ops = { 179 .release= core_release, 180 .p_pread= core_read_data, 181 .p_pwrite= core_write_data, 182 .get_lwp_regs= core_get_lwp_regs 183 }; 184 185 // read regs and create thread from NT_PRSTATUS entries from core file 186 static bool core_handle_prstatus(struct ps_prochandle* ph, const char* buf, size_t nbytes) { 187 // we have to read prstatus_t from buf 188 // assert(nbytes == sizeof(prstaus_t), "size mismatch on prstatus_t"); 189 prstatus_t* prstat = (prstatus_t*) buf; 190 thread_info* newthr; 191 print_debug("got integer regset for lwp %d\n", prstat->pr_pid); 192 if((newthr = add_thread_info(ph, prstat->pr_pid)) == NULL) 193 return false; 194 195 // copy regs 196 memcpy(&newthr->regs, prstat->pr_reg, sizeof(struct user_regs_struct)); 197 198 if (is_debug()) { 199 print_debug("integer regset\n"); 200 #ifdef i386 201 // print the regset 202 print_debug("\teax = 0x%x\n", newthr->regs.eax); 203 print_debug("\tebx = 0x%x\n", newthr->regs.ebx); 204 print_debug("\tecx = 0x%x\n", newthr->regs.ecx); 205 print_debug("\tedx = 0x%x\n", newthr->regs.edx); 206 print_debug("\tesp = 0x%x\n", newthr->regs.esp); 207 print_debug("\tebp = 0x%x\n", newthr->regs.ebp); 208 print_debug("\tesi = 0x%x\n", newthr->regs.esi); 209 print_debug("\tedi = 0x%x\n", newthr->regs.edi); 210 print_debug("\teip = 0x%x\n", newthr->regs.eip); 211 #endif 212 213 #if defined(amd64) || defined(x86_64) 214 // print the regset 215 print_debug("\tr15 = 0x%lx\n", newthr->regs.r15); 216 print_debug("\tr14 = 0x%lx\n", newthr->regs.r14); 217 print_debug("\tr13 = 0x%lx\n", newthr->regs.r13); 218 print_debug("\tr12 = 0x%lx\n", newthr->regs.r12); 219 print_debug("\trbp = 0x%lx\n", newthr->regs.rbp); 220 print_debug("\trbx = 0x%lx\n", newthr->regs.rbx); 221 print_debug("\tr11 = 0x%lx\n", newthr->regs.r11); 222 print_debug("\tr10 = 0x%lx\n", newthr->regs.r10); 223 print_debug("\tr9 = 0x%lx\n", newthr->regs.r9); 224 print_debug("\tr8 = 0x%lx\n", newthr->regs.r8); 225 print_debug("\trax = 0x%lx\n", newthr->regs.rax); 226 print_debug("\trcx = 0x%lx\n", newthr->regs.rcx); 227 print_debug("\trdx = 0x%lx\n", newthr->regs.rdx); 228 print_debug("\trsi = 0x%lx\n", newthr->regs.rsi); 229 print_debug("\trdi = 0x%lx\n", newthr->regs.rdi); 230 print_debug("\torig_rax = 0x%lx\n", newthr->regs.orig_rax); 231 print_debug("\trip = 0x%lx\n", newthr->regs.rip); 232 print_debug("\tcs = 0x%lx\n", newthr->regs.cs); 233 print_debug("\teflags = 0x%lx\n", newthr->regs.eflags); 234 print_debug("\trsp = 0x%lx\n", newthr->regs.rsp); 235 print_debug("\tss = 0x%lx\n", newthr->regs.ss); 236 print_debug("\tfs_base = 0x%lx\n", newthr->regs.fs_base); 237 print_debug("\tgs_base = 0x%lx\n", newthr->regs.gs_base); 238 print_debug("\tds = 0x%lx\n", newthr->regs.ds); 239 print_debug("\tes = 0x%lx\n", newthr->regs.es); 240 print_debug("\tfs = 0x%lx\n", newthr->regs.fs); 241 print_debug("\tgs = 0x%lx\n", newthr->regs.gs); 242 #endif 243 } 244 245 return true; 246 } 247 248 #define ROUNDUP(x, y) ((((x)+((y)-1))/(y))*(y)) 249 250 // read NT_PRSTATUS entries from core NOTE segment 251 static bool core_handle_note(struct ps_prochandle* ph, ELF_PHDR* note_phdr) { 252 char* buf = NULL; 253 char* p = NULL; 254 size_t size = note_phdr->p_filesz; 255 256 // we are interested in just prstatus entries. we will ignore the rest. 257 // Advance the seek pointer to the start of the PT_NOTE data 258 if (lseek(ph->core->core_fd, note_phdr->p_offset, SEEK_SET) == (off_t)-1) { 259 print_debug("failed to lseek to PT_NOTE data\n"); 260 return false; 261 } 262 263 // Now process the PT_NOTE structures. Each one is preceded by 264 // an Elf{32/64}_Nhdr structure describing its type and size. 265 if ( (buf = (char*) malloc(size)) == NULL) { 266 print_debug("can't allocate memory for reading core notes\n"); 267 goto err; 268 } 269 270 // read notes into buffer 271 if (read(ph->core->core_fd, buf, size) != size) { 272 print_debug("failed to read notes, core file must have been truncated\n"); 273 goto err; 274 } 275 276 p = buf; 277 while (p < buf + size) { 278 ELF_NHDR* notep = (ELF_NHDR*) p; 279 char* descdata = p + sizeof(ELF_NHDR) + ROUNDUP(notep->n_namesz, 4); 280 print_debug("Note header with n_type = %d and n_descsz = %u\n", 281 notep->n_type, notep->n_descsz); 282 283 if (notep->n_type == NT_PRSTATUS) { 284 if (core_handle_prstatus(ph, descdata, notep->n_descsz) != true) { 285 return false; 286 } 287 } else if (notep->n_type == NT_AUXV) { 288 // Get first segment from entry point 289 ELF_AUXV *auxv = (ELF_AUXV *)descdata; 290 while (auxv->a_type != AT_NULL) { 291 if (auxv->a_type == AT_ENTRY) { 292 // Set entry point address to address of dynamic section. 293 // We will adjust it in read_exec_segments(). 294 ph->core->dynamic_addr = auxv->a_un.a_val; 295 break; 296 } 297 auxv++; 298 } 299 } 300 p = descdata + ROUNDUP(notep->n_descsz, 4); 301 } 302 303 free(buf); 304 return true; 305 306 err: 307 if (buf) free(buf); 308 return false; 309 } 310 311 // read all segments from core file 312 static bool read_core_segments(struct ps_prochandle* ph, ELF_EHDR* core_ehdr) { 313 int i = 0; 314 ELF_PHDR* phbuf = NULL; 315 ELF_PHDR* core_php = NULL; 316 317 if ((phbuf = read_program_header_table(ph->core->core_fd, core_ehdr)) == NULL) 318 return false; 319 320 /* 321 * Now iterate through the program headers in the core file. 322 * We're interested in two types of Phdrs: PT_NOTE (which 323 * contains a set of saved /proc structures), and PT_LOAD (which 324 * represents a memory mapping from the process's address space). 325 * 326 * Difference b/w Solaris PT_NOTE and Linux/BSD PT_NOTE: 327 * 328 * In Solaris there are two PT_NOTE segments the first PT_NOTE (if present) 329 * contains /proc structs in the pre-2.6 unstructured /proc format. the last 330 * PT_NOTE has data in new /proc format. 331 * 332 * In Solaris, there is only one pstatus (process status). pstatus contains 333 * integer register set among other stuff. For each LWP, we have one lwpstatus 334 * entry that has integer regset for that LWP. 335 * 336 * Linux threads are actually 'clone'd processes. To support core analysis 337 * of "multithreaded" process, Linux creates more than one pstatus (called 338 * "prstatus") entry in PT_NOTE. Each prstatus entry has integer regset for one 339 * "thread". Please refer to Linux kernel src file 'fs/binfmt_elf.c', in particular 340 * function "elf_core_dump". 341 */ 342 343 for (core_php = phbuf, i = 0; i < core_ehdr->e_phnum; i++) { 344 switch (core_php->p_type) { 345 case PT_NOTE: 346 if (core_handle_note(ph, core_php) != true) { 347 goto err; 348 } 349 break; 350 351 case PT_LOAD: { 352 if (core_php->p_filesz != 0) { 353 if (add_map_info(ph, ph->core->core_fd, core_php->p_offset, 354 core_php->p_vaddr, core_php->p_filesz, core_php->p_flags) == NULL) goto err; 355 } 356 break; 357 } 358 } 359 360 core_php++; 361 } 362 363 free(phbuf); 364 return true; 365 err: 366 free(phbuf); 367 return false; 368 } 369 370 // read segments of a shared object 371 static bool read_lib_segments(struct ps_prochandle* ph, int lib_fd, ELF_EHDR* lib_ehdr, uintptr_t lib_base) { 372 int i = 0; 373 ELF_PHDR* phbuf; 374 ELF_PHDR* lib_php = NULL; 375 376 int page_size = sysconf(_SC_PAGE_SIZE); 377 378 if ((phbuf = read_program_header_table(lib_fd, lib_ehdr)) == NULL) { 379 return false; 380 } 381 382 // we want to process only PT_LOAD segments that are not writable. 383 // i.e., text segments. The read/write/exec (data) segments would 384 // have been already added from core file segments. 385 for (lib_php = phbuf, i = 0; i < lib_ehdr->e_phnum; i++) { 386 if ((lib_php->p_type == PT_LOAD) && !(lib_php->p_flags & PF_W) && (lib_php->p_filesz != 0)) { 387 388 uintptr_t target_vaddr = lib_php->p_vaddr + lib_base; 389 map_info *existing_map = core_lookup(ph, target_vaddr); 390 391 if (existing_map == NULL){ 392 if (add_map_info(ph, lib_fd, lib_php->p_offset, 393 target_vaddr, lib_php->p_memsz, lib_php->p_flags) == NULL) { 394 goto err; 395 } 396 } else if (lib_php->p_flags != existing_map->flags) { 397 // Access flags fot this memory region is different between the library 398 // and coredump. It might be caused by mprotect() call at runtime. 399 // We should respect to coredump. 400 continue; 401 } else { 402 // Read only segments in ELF should not be any different from PT_LOAD segments 403 // in the coredump. 404 // And head of ELF header might be included in coredump (See JDK-7133122). 405 // Thus we need to replace PT_LOAD segments the library version. 406 // 407 // Coredump stores value of p_memsz elf field 408 // rounded up to page boundary. 409 410 if ((existing_map->memsz != page_size) && 411 (existing_map->fd != lib_fd) && 412 (ROUNDUP(existing_map->memsz, page_size) != ROUNDUP(lib_php->p_memsz, page_size))) { 413 414 print_debug("address conflict @ 0x%lx (existing map size = %ld, size = %ld, flags = %d)\n", 415 target_vaddr, existing_map->memsz, lib_php->p_memsz, lib_php->p_flags); 416 goto err; 417 } 418 419 /* replace PT_LOAD segment with library segment */ 420 print_debug("overwrote with new address mapping (memsz %ld -> %ld)\n", 421 existing_map->memsz, ROUNDUP(lib_php->p_memsz, page_size)); 422 423 existing_map->fd = lib_fd; 424 existing_map->offset = lib_php->p_offset; 425 existing_map->memsz = ROUNDUP(lib_php->p_memsz, page_size); 426 } 427 } 428 429 lib_php++; 430 } 431 432 free(phbuf); 433 return true; 434 err: 435 free(phbuf); 436 return false; 437 } 438 439 // process segments from interpreter (ld.so or ld-linux.so) 440 static bool read_interp_segments(struct ps_prochandle* ph) { 441 ELF_EHDR interp_ehdr; 442 443 if (read_elf_header(ph->core->interp_fd, &interp_ehdr) != true) { 444 print_debug("interpreter is not a valid ELF file\n"); 445 return false; 446 } 447 448 if (read_lib_segments(ph, ph->core->interp_fd, &interp_ehdr, ph->core->ld_base_addr) != true) { 449 print_debug("can't read segments of interpreter\n"); 450 return false; 451 } 452 453 return true; 454 } 455 456 // process segments of a a.out 457 static bool read_exec_segments(struct ps_prochandle* ph, ELF_EHDR* exec_ehdr) { 458 int i = 0; 459 ELF_PHDR* phbuf = NULL; 460 ELF_PHDR* exec_php = NULL; 461 462 if ((phbuf = read_program_header_table(ph->core->exec_fd, exec_ehdr)) == NULL) { 463 return false; 464 } 465 466 for (exec_php = phbuf, i = 0; i < exec_ehdr->e_phnum; i++) { 467 switch (exec_php->p_type) { 468 469 // add mappings for PT_LOAD segments 470 case PT_LOAD: { 471 // add only non-writable segments of non-zero filesz 472 if (!(exec_php->p_flags & PF_W) && exec_php->p_filesz != 0) { 473 if (add_map_info(ph, ph->core->exec_fd, exec_php->p_offset, exec_php->p_vaddr, exec_php->p_filesz, exec_php->p_flags) == NULL) goto err; 474 } 475 break; 476 } 477 478 // read the interpreter and it's segments 479 case PT_INTERP: { 480 char interp_name[BUF_SIZE + 1]; 481 482 // BUF_SIZE is PATH_MAX + NAME_MAX + 1. 483 if (exec_php->p_filesz > BUF_SIZE) { 484 goto err; 485 } 486 if (pread(ph->core->exec_fd, interp_name, 487 exec_php->p_filesz, exec_php->p_offset) != exec_php->p_filesz) { 488 print_debug("Unable to read in the ELF interpreter\n"); 489 goto err; 490 } 491 interp_name[exec_php->p_filesz] = '\0'; 492 print_debug("ELF interpreter %s\n", interp_name); 493 // read interpreter segments as well 494 if ((ph->core->interp_fd = pathmap_open(interp_name)) < 0) { 495 print_debug("can't open runtime loader\n"); 496 goto err; 497 } 498 break; 499 } 500 501 // from PT_DYNAMIC we want to read address of first link_map addr 502 case PT_DYNAMIC: { 503 if (exec_ehdr->e_type == ET_EXEC) { 504 ph->core->dynamic_addr = exec_php->p_vaddr; 505 } else { // ET_DYN 506 // dynamic_addr has entry point of executable. 507 // Thus we should substract it. 508 ph->core->dynamic_addr += exec_php->p_vaddr - exec_ehdr->e_entry; 509 } 510 print_debug("address of _DYNAMIC is 0x%lx\n", ph->core->dynamic_addr); 511 break; 512 } 513 514 } // switch 515 exec_php++; 516 } // for 517 518 free(phbuf); 519 return true; 520 err: 521 free(phbuf); 522 return false; 523 } 524 525 526 #define FIRST_LINK_MAP_OFFSET offsetof(struct r_debug, r_map) 527 #define LD_BASE_OFFSET offsetof(struct r_debug, r_ldbase) 528 #define LINK_MAP_ADDR_OFFSET offsetof(struct link_map, l_addr) 529 #define LINK_MAP_NAME_OFFSET offsetof(struct link_map, l_name) 530 #define LINK_MAP_LD_OFFSET offsetof(struct link_map, l_ld) 531 #define LINK_MAP_NEXT_OFFSET offsetof(struct link_map, l_next) 532 533 #define INVALID_LOAD_ADDRESS -1L 534 #define ZERO_LOAD_ADDRESS 0x0L 535 536 // Calculate the load address of shared library 537 // on prelink-enabled environment. 538 // 539 // In case of GDB, it would be calculated by offset of link_map.l_ld 540 // and the address of .dynamic section. 541 // See GDB implementation: lm_addr_check @ solib-svr4.c 542 static uintptr_t calc_prelinked_load_address(struct ps_prochandle* ph, int lib_fd, ELF_EHDR* elf_ehdr, uintptr_t link_map_addr) { 543 ELF_PHDR *phbuf; 544 uintptr_t lib_ld; 545 uintptr_t lib_dyn_addr = 0L; 546 uintptr_t load_addr; 547 int i; 548 549 phbuf = read_program_header_table(lib_fd, elf_ehdr); 550 if (phbuf == NULL) { 551 print_debug("can't read program header of shared object\n"); 552 return INVALID_LOAD_ADDRESS; 553 } 554 555 // Get the address of .dynamic section from shared library. 556 for (i = 0; i < elf_ehdr->e_phnum; i++) { 557 if (phbuf[i].p_type == PT_DYNAMIC) { 558 lib_dyn_addr = phbuf[i].p_vaddr; 559 break; 560 } 561 } 562 563 free(phbuf); 564 565 if (ps_pdread(ph, (psaddr_t)link_map_addr + LINK_MAP_LD_OFFSET, 566 &lib_ld, sizeof(uintptr_t)) != PS_OK) { 567 print_debug("can't read address of dynamic section in shared object\n"); 568 return INVALID_LOAD_ADDRESS; 569 } 570 571 // Return the load address which is calculated by the address of .dynamic 572 // and link_map.l_ld . 573 load_addr = lib_ld - lib_dyn_addr; 574 print_debug("lib_ld = 0x%lx, lib_dyn_addr = 0x%lx -> lib_base_diff = 0x%lx\n", lib_ld, lib_dyn_addr, load_addr); 575 return load_addr; 576 } 577 578 // read shared library info from runtime linker's data structures. 579 // This work is done by librtlb_db in Solaris 580 static bool read_shared_lib_info(struct ps_prochandle* ph) { 581 uintptr_t addr = ph->core->dynamic_addr; 582 uintptr_t debug_base; 583 uintptr_t first_link_map_addr; 584 uintptr_t ld_base_addr; 585 uintptr_t link_map_addr; 586 uintptr_t lib_base_diff; 587 uintptr_t lib_base; 588 uintptr_t lib_name_addr; 589 char lib_name[BUF_SIZE]; 590 ELF_DYN dyn; 591 ELF_EHDR elf_ehdr; 592 int lib_fd; 593 594 // _DYNAMIC has information of the form 595 // [tag] [data] [tag] [data] ..... 596 // Both tag and data are pointer sized. 597 // We look for dynamic info with DT_DEBUG. This has shared object info. 598 // refer to struct r_debug in link.h 599 600 dyn.d_tag = DT_NULL; 601 while (dyn.d_tag != DT_DEBUG) { 602 if (ps_pdread(ph, (psaddr_t) addr, &dyn, sizeof(ELF_DYN)) != PS_OK) { 603 print_debug("can't read debug info from _DYNAMIC\n"); 604 return false; 605 } 606 addr += sizeof(ELF_DYN); 607 } 608 609 // we have got Dyn entry with DT_DEBUG 610 debug_base = dyn.d_un.d_ptr; 611 // at debug_base we have struct r_debug. This has first link map in r_map field 612 if (ps_pdread(ph, (psaddr_t) debug_base + FIRST_LINK_MAP_OFFSET, 613 &first_link_map_addr, sizeof(uintptr_t)) != PS_OK) { 614 print_debug("can't read first link map address\n"); 615 return false; 616 } 617 618 // read ld_base address from struct r_debug 619 if (ps_pdread(ph, (psaddr_t) debug_base + LD_BASE_OFFSET, &ld_base_addr, 620 sizeof(uintptr_t)) != PS_OK) { 621 print_debug("can't read ld base address\n"); 622 return false; 623 } 624 ph->core->ld_base_addr = ld_base_addr; 625 626 print_debug("interpreter base address is 0x%lx\n", ld_base_addr); 627 628 // now read segments from interp (i.e ld.so or ld-linux.so or ld-elf.so) 629 if (read_interp_segments(ph) != true) { 630 return false; 631 } 632 633 // after adding interpreter (ld.so) mappings sort again 634 if (sort_map_array(ph) != true) { 635 return false; 636 } 637 638 print_debug("first link map is at 0x%lx\n", first_link_map_addr); 639 640 link_map_addr = first_link_map_addr; 641 while (link_map_addr != 0) { 642 // read library base address of the .so. Note that even though <sys/link.h> calls 643 // link_map->l_addr as "base address", this is * not * really base virtual 644 // address of the shared object. This is actually the difference b/w the virtual 645 // address mentioned in shared object and the actual virtual base where runtime 646 // linker loaded it. We use "base diff" in read_lib_segments call below. 647 648 if (ps_pdread(ph, (psaddr_t) link_map_addr + LINK_MAP_ADDR_OFFSET, 649 &lib_base_diff, sizeof(uintptr_t)) != PS_OK) { 650 print_debug("can't read shared object base address diff\n"); 651 return false; 652 } 653 654 // read address of the name 655 if (ps_pdread(ph, (psaddr_t) link_map_addr + LINK_MAP_NAME_OFFSET, 656 &lib_name_addr, sizeof(uintptr_t)) != PS_OK) { 657 print_debug("can't read address of shared object name\n"); 658 return false; 659 } 660 661 // read name of the shared object 662 lib_name[0] = '\0'; 663 if (lib_name_addr != 0 && 664 read_string(ph, (uintptr_t) lib_name_addr, lib_name, sizeof(lib_name)) != true) { 665 print_debug("can't read shared object name\n"); 666 // don't let failure to read the name stop opening the file. If something is really wrong 667 // it will fail later. 668 } 669 670 if (lib_name[0] != '\0') { 671 // ignore empty lib names 672 lib_fd = pathmap_open(lib_name); 673 674 if (lib_fd < 0) { 675 print_debug("can't open shared object %s\n", lib_name); 676 // continue with other libraries... 677 } else { 678 if (read_elf_header(lib_fd, &elf_ehdr)) { 679 if (lib_base_diff == ZERO_LOAD_ADDRESS ) { 680 lib_base_diff = calc_prelinked_load_address(ph, lib_fd, &elf_ehdr, link_map_addr); 681 if (lib_base_diff == INVALID_LOAD_ADDRESS) { 682 close(lib_fd); 683 return false; 684 } 685 } 686 687 lib_base = lib_base_diff + find_base_address(lib_fd, &elf_ehdr); 688 print_debug("reading library %s @ 0x%lx [ 0x%lx ]\n", 689 lib_name, lib_base, lib_base_diff); 690 // while adding library mappings we need to use "base difference". 691 if (! read_lib_segments(ph, lib_fd, &elf_ehdr, lib_base_diff)) { 692 print_debug("can't read shared object's segments\n"); 693 close(lib_fd); 694 return false; 695 } 696 add_lib_info_fd(ph, lib_name, lib_fd, lib_base); 697 // Map info is added for the library (lib_name) so 698 // we need to re-sort it before calling the p_pdread. 699 if (sort_map_array(ph) != true) 700 return false; 701 } else { 702 print_debug("can't read ELF header for shared object %s\n", lib_name); 703 close(lib_fd); 704 // continue with other libraries... 705 } 706 } 707 } 708 709 // read next link_map address 710 if (ps_pdread(ph, (psaddr_t) link_map_addr + LINK_MAP_NEXT_OFFSET, 711 &link_map_addr, sizeof(uintptr_t)) != PS_OK) { 712 print_debug("can't read next link in link_map\n"); 713 return false; 714 } 715 } 716 717 return true; 718 } 719 720 // the one and only one exposed stuff from this file 721 JNIEXPORT struct ps_prochandle* JNICALL 722 Pgrab_core(const char* exec_file, const char* core_file) { 723 ELF_EHDR core_ehdr; 724 ELF_EHDR exec_ehdr; 725 ELF_EHDR lib_ehdr; 726 727 struct ps_prochandle* ph = (struct ps_prochandle*) calloc(1, sizeof(struct ps_prochandle)); 728 if (ph == NULL) { 729 print_debug("can't allocate ps_prochandle\n"); 730 return NULL; 731 } 732 733 if ((ph->core = (struct core_data*) calloc(1, sizeof(struct core_data))) == NULL) { 734 free(ph); 735 print_debug("can't allocate ps_prochandle\n"); 736 return NULL; 737 } 738 739 // initialize ph 740 ph->ops = &core_ops; 741 ph->core->core_fd = -1; 742 ph->core->exec_fd = -1; 743 ph->core->interp_fd = -1; 744 745 // open the core file 746 if ((ph->core->core_fd = open(core_file, O_RDONLY)) < 0) { 747 print_debug("can't open core file\n"); 748 goto err; 749 } 750 751 // read core file ELF header 752 if (read_elf_header(ph->core->core_fd, &core_ehdr) != true || core_ehdr.e_type != ET_CORE) { 753 print_debug("core file is not a valid ELF ET_CORE file\n"); 754 goto err; 755 } 756 757 if ((ph->core->exec_fd = open(exec_file, O_RDONLY)) < 0) { 758 print_debug("can't open executable file\n"); 759 goto err; 760 } 761 762 if (read_elf_header(ph->core->exec_fd, &exec_ehdr) != true || 763 ((exec_ehdr.e_type != ET_EXEC) && (exec_ehdr.e_type != ET_DYN))) { 764 print_debug("executable file is not a valid ELF file\n"); 765 goto err; 766 } 767 768 // process core file segments 769 if (read_core_segments(ph, &core_ehdr) != true) { 770 goto err; 771 } 772 773 // process exec file segments 774 if (read_exec_segments(ph, &exec_ehdr) != true) { 775 goto err; 776 } 777 778 // exec file is also treated like a shared object for symbol search 779 // FIXME: This is broken and ends up with a base address of 0. See JDK-8248876. 780 if (add_lib_info_fd(ph, exec_file, ph->core->exec_fd, 781 (uintptr_t)0 + find_base_address(ph->core->exec_fd, &exec_ehdr)) == NULL) { 782 goto err; 783 } 784 785 // allocate and sort maps into map_array, we need to do this 786 // here because read_shared_lib_info needs to read from debuggee 787 // address space 788 if (sort_map_array(ph) != true) { 789 goto err; 790 } 791 792 if (read_shared_lib_info(ph) != true) { 793 goto err; 794 } 795 796 // sort again because we have added more mappings from shared objects 797 if (sort_map_array(ph) != true) { 798 goto err; 799 } 800 801 if (init_classsharing_workaround(ph) != true) { 802 goto err; 803 } 804 805 return ph; 806 807 err: 808 Prelease(ph); 809 return NULL; 810 }