1 /*
   2  * Copyright (c) 2003, 2020, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.
   8  *
   9  * This code is distributed in the hope that it will be useful, but WITHOUT
  10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  12  * version 2 for more details (a copy is included in the LICENSE file that
  13  * accompanied this code).
  14  *
  15  * You should have received a copy of the GNU General Public License version
  16  * 2 along with this work; if not, write to the Free Software Foundation,
  17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  18  *
  19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  20  * or visit www.oracle.com if you need additional information or have any
  21  * questions.
  22  *
  23  */
  24 
  25 #include <jni.h>
  26 #include <unistd.h>
  27 #include <fcntl.h>
  28 #include <string.h>
  29 #include <stdlib.h>
  30 #include <stddef.h>
  31 #include <elf.h>
  32 #include <link.h>
  33 #include "libproc_impl.h"
  34 #include "ps_core_common.h"
  35 #include "proc_service.h"
  36 #include "salibelf.h"
  37 
  38 // This file has the libproc implementation to read core files.
  39 // For live processes, refer to ps_proc.c. Portions of this is adapted
  40 // /modelled after Solaris libproc.so (in particular Pcore.c)
  41 
  42 
  43 //---------------------------------------------------------------------------
  44 // functions to handle map_info
  45 
  46 // Order mappings based on virtual address.  We use this function as the
  47 // callback for sorting the array of map_info pointers.
  48 static int core_cmp_mapping(const void *lhsp, const void *rhsp)
  49 {
  50   const map_info *lhs = *((const map_info **)lhsp);
  51   const map_info *rhs = *((const map_info **)rhsp);
  52 
  53   if (lhs->vaddr == rhs->vaddr) {
  54     return (0);
  55   }
  56 
  57   return (lhs->vaddr < rhs->vaddr ? -1 : 1);
  58 }
  59 
  60 // we sort map_info by starting virtual address so that we can do
  61 // binary search to read from an address.
  62 static bool sort_map_array(struct ps_prochandle* ph) {
  63   size_t num_maps = ph->core->num_maps;
  64   map_info* map = ph->core->maps;
  65   int i = 0;
  66 
  67   // allocate map_array
  68   map_info** array;
  69   if ( (array = (map_info**) malloc(sizeof(map_info*) * num_maps)) == NULL) {
  70     print_debug("can't allocate memory for map array\n");
  71     return false;
  72   }
  73 
  74   // add maps to array
  75   while (map) {
  76     array[i] = map;
  77     i++;
  78     map = map->next;
  79   }
  80 
  81   // sort is called twice. If this is second time, clear map array
  82   if (ph->core->map_array) {
  83     free(ph->core->map_array);
  84   }
  85 
  86   ph->core->map_array = array;
  87   // sort the map_info array by base virtual address.
  88   qsort(ph->core->map_array, ph->core->num_maps, sizeof (map_info*),
  89         core_cmp_mapping);
  90 
  91   // print map
  92   if (is_debug()) {
  93     int j = 0;
  94     print_debug("---- sorted virtual address map ----\n");
  95     for (j = 0; j < ph->core->num_maps; j++) {
  96       print_debug("base = 0x%lx\tsize = %zu\n", ph->core->map_array[j]->vaddr,
  97                   ph->core->map_array[j]->memsz);
  98     }
  99   }
 100 
 101   return true;
 102 }
 103 
 104 #ifndef MIN
 105 #define MIN(x, y) (((x) < (y))? (x): (y))
 106 #endif
 107 
 108 static bool core_read_data(struct ps_prochandle* ph, uintptr_t addr, char *buf, size_t size) {
 109    ssize_t resid = size;
 110    int page_size=sysconf(_SC_PAGE_SIZE);
 111    while (resid != 0) {
 112       map_info *mp = core_lookup(ph, addr);
 113       uintptr_t mapoff;
 114       ssize_t len, rem;
 115       off_t off;
 116       int fd;
 117 
 118       if (mp == NULL) {
 119          break;  /* No mapping for this address */
 120       }
 121 
 122       fd = mp->fd;
 123       mapoff = addr - mp->vaddr;
 124       len = MIN(resid, mp->memsz - mapoff);
 125       off = mp->offset + mapoff;
 126 
 127       if ((len = pread(fd, buf, len, off)) <= 0) {
 128          break;
 129       }
 130 
 131       resid -= len;
 132       addr += len;
 133       buf = (char *)buf + len;
 134 
 135       // mappings always start at page boundary. But, may end in fractional
 136       // page. fill zeros for possible fractional page at the end of a mapping.
 137       rem = mp->memsz % page_size;
 138       if (rem > 0) {
 139          rem = page_size - rem;
 140          len = MIN(resid, rem);
 141          resid -= len;
 142          addr += len;
 143          // we are not assuming 'buf' to be zero initialized.
 144          memset(buf, 0, len);
 145          buf += len;
 146       }
 147    }
 148 
 149    if (resid) {
 150       print_debug("core read failed for %d byte(s) @ 0x%lx (%d more bytes)\n",
 151               size, addr, resid);
 152       return false;
 153    } else {
 154       return true;
 155    }
 156 }
 157 
 158 // null implementation for write
 159 static bool core_write_data(struct ps_prochandle* ph,
 160                              uintptr_t addr, const char *buf , size_t size) {
 161    return false;
 162 }
 163 
 164 static bool core_get_lwp_regs(struct ps_prochandle* ph, lwpid_t lwp_id,
 165                           struct user_regs_struct* regs) {
 166    // for core we have cached the lwp regs from NOTE section
 167    thread_info* thr = ph->threads;
 168    while (thr) {
 169      if (thr->lwp_id == lwp_id) {
 170        memcpy(regs, &thr->regs, sizeof(struct user_regs_struct));
 171        return true;
 172      }
 173      thr = thr->next;
 174    }
 175    return false;
 176 }
 177 
 178 static ps_prochandle_ops core_ops = {
 179    .release=  core_release,
 180    .p_pread=  core_read_data,
 181    .p_pwrite= core_write_data,
 182    .get_lwp_regs= core_get_lwp_regs
 183 };
 184 
 185 // read regs and create thread from NT_PRSTATUS entries from core file
 186 static bool core_handle_prstatus(struct ps_prochandle* ph, const char* buf, size_t nbytes) {
 187    // we have to read prstatus_t from buf
 188    // assert(nbytes == sizeof(prstaus_t), "size mismatch on prstatus_t");
 189    prstatus_t* prstat = (prstatus_t*) buf;
 190    thread_info* newthr;
 191    print_debug("got integer regset for lwp %d\n", prstat->pr_pid);
 192    if((newthr = add_thread_info(ph, prstat->pr_pid)) == NULL)
 193       return false;
 194 
 195    // copy regs
 196    memcpy(&newthr->regs, prstat->pr_reg, sizeof(struct user_regs_struct));
 197 
 198    if (is_debug()) {
 199       print_debug("integer regset\n");
 200 #ifdef i386
 201       // print the regset
 202       print_debug("\teax = 0x%x\n", newthr->regs.eax);
 203       print_debug("\tebx = 0x%x\n", newthr->regs.ebx);
 204       print_debug("\tecx = 0x%x\n", newthr->regs.ecx);
 205       print_debug("\tedx = 0x%x\n", newthr->regs.edx);
 206       print_debug("\tesp = 0x%x\n", newthr->regs.esp);
 207       print_debug("\tebp = 0x%x\n", newthr->regs.ebp);
 208       print_debug("\tesi = 0x%x\n", newthr->regs.esi);
 209       print_debug("\tedi = 0x%x\n", newthr->regs.edi);
 210       print_debug("\teip = 0x%x\n", newthr->regs.eip);
 211 #endif
 212 
 213 #if defined(amd64) || defined(x86_64)
 214       // print the regset
 215       print_debug("\tr15 = 0x%lx\n", newthr->regs.r15);
 216       print_debug("\tr14 = 0x%lx\n", newthr->regs.r14);
 217       print_debug("\tr13 = 0x%lx\n", newthr->regs.r13);
 218       print_debug("\tr12 = 0x%lx\n", newthr->regs.r12);
 219       print_debug("\trbp = 0x%lx\n", newthr->regs.rbp);
 220       print_debug("\trbx = 0x%lx\n", newthr->regs.rbx);
 221       print_debug("\tr11 = 0x%lx\n", newthr->regs.r11);
 222       print_debug("\tr10 = 0x%lx\n", newthr->regs.r10);
 223       print_debug("\tr9 = 0x%lx\n", newthr->regs.r9);
 224       print_debug("\tr8 = 0x%lx\n", newthr->regs.r8);
 225       print_debug("\trax = 0x%lx\n", newthr->regs.rax);
 226       print_debug("\trcx = 0x%lx\n", newthr->regs.rcx);
 227       print_debug("\trdx = 0x%lx\n", newthr->regs.rdx);
 228       print_debug("\trsi = 0x%lx\n", newthr->regs.rsi);
 229       print_debug("\trdi = 0x%lx\n", newthr->regs.rdi);
 230       print_debug("\torig_rax = 0x%lx\n", newthr->regs.orig_rax);
 231       print_debug("\trip = 0x%lx\n", newthr->regs.rip);
 232       print_debug("\tcs = 0x%lx\n", newthr->regs.cs);
 233       print_debug("\teflags = 0x%lx\n", newthr->regs.eflags);
 234       print_debug("\trsp = 0x%lx\n", newthr->regs.rsp);
 235       print_debug("\tss = 0x%lx\n", newthr->regs.ss);
 236       print_debug("\tfs_base = 0x%lx\n", newthr->regs.fs_base);
 237       print_debug("\tgs_base = 0x%lx\n", newthr->regs.gs_base);
 238       print_debug("\tds = 0x%lx\n", newthr->regs.ds);
 239       print_debug("\tes = 0x%lx\n", newthr->regs.es);
 240       print_debug("\tfs = 0x%lx\n", newthr->regs.fs);
 241       print_debug("\tgs = 0x%lx\n", newthr->regs.gs);
 242 #endif
 243    }
 244 
 245    return true;
 246 }
 247 
 248 #define ROUNDUP(x, y)  ((((x)+((y)-1))/(y))*(y))
 249 
 250 // read NT_PRSTATUS entries from core NOTE segment
 251 static bool core_handle_note(struct ps_prochandle* ph, ELF_PHDR* note_phdr) {
 252    char* buf = NULL;
 253    char* p = NULL;
 254    size_t size = note_phdr->p_filesz;
 255 
 256    // we are interested in just prstatus entries. we will ignore the rest.
 257    // Advance the seek pointer to the start of the PT_NOTE data
 258    if (lseek(ph->core->core_fd, note_phdr->p_offset, SEEK_SET) == (off_t)-1) {
 259       print_debug("failed to lseek to PT_NOTE data\n");
 260       return false;
 261    }
 262 
 263    // Now process the PT_NOTE structures.  Each one is preceded by
 264    // an Elf{32/64}_Nhdr structure describing its type and size.
 265    if ( (buf = (char*) malloc(size)) == NULL) {
 266       print_debug("can't allocate memory for reading core notes\n");
 267       goto err;
 268    }
 269 
 270    // read notes into buffer
 271    if (read(ph->core->core_fd, buf, size) != size) {
 272       print_debug("failed to read notes, core file must have been truncated\n");
 273       goto err;
 274    }
 275 
 276    p = buf;
 277    while (p < buf + size) {
 278       ELF_NHDR* notep = (ELF_NHDR*) p;
 279       char* descdata  = p + sizeof(ELF_NHDR) + ROUNDUP(notep->n_namesz, 4);
 280       print_debug("Note header with n_type = %d and n_descsz = %u\n",
 281                                    notep->n_type, notep->n_descsz);
 282 
 283       if (notep->n_type == NT_PRSTATUS) {
 284         if (core_handle_prstatus(ph, descdata, notep->n_descsz) != true) {
 285           return false;
 286         }
 287       } else if (notep->n_type == NT_AUXV) {
 288         // Get first segment from entry point
 289         ELF_AUXV *auxv = (ELF_AUXV *)descdata;
 290         while (auxv->a_type != AT_NULL) {
 291           if (auxv->a_type == AT_ENTRY) {
 292             // Set entry point address to address of dynamic section.
 293             // We will adjust it in read_exec_segments().
 294             ph->core->dynamic_addr = auxv->a_un.a_val;
 295             break;
 296           }
 297           auxv++;
 298         }
 299       }
 300       p = descdata + ROUNDUP(notep->n_descsz, 4);
 301    }
 302 
 303    free(buf);
 304    return true;
 305 
 306 err:
 307    if (buf) free(buf);
 308    return false;
 309 }
 310 
 311 // read all segments from core file
 312 static bool read_core_segments(struct ps_prochandle* ph, ELF_EHDR* core_ehdr) {
 313    int i = 0;
 314    ELF_PHDR* phbuf = NULL;
 315    ELF_PHDR* core_php = NULL;
 316 
 317    if ((phbuf =  read_program_header_table(ph->core->core_fd, core_ehdr)) == NULL)
 318       return false;
 319 
 320    /*
 321     * Now iterate through the program headers in the core file.
 322     * We're interested in two types of Phdrs: PT_NOTE (which
 323     * contains a set of saved /proc structures), and PT_LOAD (which
 324     * represents a memory mapping from the process's address space).
 325     *
 326     * Difference b/w Solaris PT_NOTE and Linux/BSD PT_NOTE:
 327     *
 328     *     In Solaris there are two PT_NOTE segments the first PT_NOTE (if present)
 329     *     contains /proc structs in the pre-2.6 unstructured /proc format. the last
 330     *     PT_NOTE has data in new /proc format.
 331     *
 332     *     In Solaris, there is only one pstatus (process status). pstatus contains
 333     *     integer register set among other stuff. For each LWP, we have one lwpstatus
 334     *     entry that has integer regset for that LWP.
 335     *
 336     *     Linux threads are actually 'clone'd processes. To support core analysis
 337     *     of "multithreaded" process, Linux creates more than one pstatus (called
 338     *     "prstatus") entry in PT_NOTE. Each prstatus entry has integer regset for one
 339     *     "thread". Please refer to Linux kernel src file 'fs/binfmt_elf.c', in particular
 340     *     function "elf_core_dump".
 341     */
 342 
 343     for (core_php = phbuf, i = 0; i < core_ehdr->e_phnum; i++) {
 344       switch (core_php->p_type) {
 345          case PT_NOTE:
 346             if (core_handle_note(ph, core_php) != true) {
 347               goto err;
 348             }
 349             break;
 350 
 351          case PT_LOAD: {
 352             if (core_php->p_filesz != 0) {
 353                if (add_map_info(ph, ph->core->core_fd, core_php->p_offset,
 354                   core_php->p_vaddr, core_php->p_filesz, core_php->p_flags) == NULL) goto err;
 355             }
 356             break;
 357          }
 358       }
 359 
 360       core_php++;
 361    }
 362 
 363    free(phbuf);
 364    return true;
 365 err:
 366    free(phbuf);
 367    return false;
 368 }
 369 
 370 // read segments of a shared object
 371 static bool read_lib_segments(struct ps_prochandle* ph, int lib_fd, ELF_EHDR* lib_ehdr, uintptr_t lib_base) {
 372   int i = 0;
 373   ELF_PHDR* phbuf;
 374   ELF_PHDR* lib_php = NULL;
 375 
 376   int page_size = sysconf(_SC_PAGE_SIZE);
 377 
 378   if ((phbuf = read_program_header_table(lib_fd, lib_ehdr)) == NULL) {
 379     return false;
 380   }
 381 
 382   // we want to process only PT_LOAD segments that are not writable.
 383   // i.e., text segments. The read/write/exec (data) segments would
 384   // have been already added from core file segments.
 385   for (lib_php = phbuf, i = 0; i < lib_ehdr->e_phnum; i++) {
 386     if ((lib_php->p_type == PT_LOAD) && !(lib_php->p_flags & PF_W) && (lib_php->p_filesz != 0)) {
 387 
 388       uintptr_t target_vaddr = lib_php->p_vaddr + lib_base;
 389       map_info *existing_map = core_lookup(ph, target_vaddr);
 390 
 391       if (existing_map == NULL){
 392         if (add_map_info(ph, lib_fd, lib_php->p_offset,
 393                          target_vaddr, lib_php->p_memsz, lib_php->p_flags) == NULL) {
 394           goto err;
 395         }
 396       } else if (lib_php->p_flags != existing_map->flags) {
 397         // Access flags fot this memory region is different between the library
 398         // and coredump. It might be caused by mprotect() call at runtime.
 399         // We should respect to coredump.
 400         continue;
 401       } else {
 402         // Read only segments in ELF should not be any different from PT_LOAD segments
 403         // in the coredump.
 404         // And head of ELF header might be included in coredump (See JDK-7133122).
 405         // Thus we need to replace PT_LOAD segments the library version.
 406         //
 407         // Coredump stores value of p_memsz elf field
 408         // rounded up to page boundary.
 409 
 410         if ((existing_map->memsz != page_size) &&
 411             (existing_map->fd != lib_fd) &&
 412             (ROUNDUP(existing_map->memsz, page_size) != ROUNDUP(lib_php->p_memsz, page_size))) {
 413 
 414           print_debug("address conflict @ 0x%lx (existing map size = %ld, size = %ld, flags = %d)\n",
 415                         target_vaddr, existing_map->memsz, lib_php->p_memsz, lib_php->p_flags);
 416           goto err;
 417         }
 418 
 419         /* replace PT_LOAD segment with library segment */
 420         print_debug("overwrote with new address mapping (memsz %ld -> %ld)\n",
 421                      existing_map->memsz, ROUNDUP(lib_php->p_memsz, page_size));
 422 
 423         existing_map->fd = lib_fd;
 424         existing_map->offset = lib_php->p_offset;
 425         existing_map->memsz = ROUNDUP(lib_php->p_memsz, page_size);
 426       }
 427     }
 428 
 429     lib_php++;
 430   }
 431 
 432   free(phbuf);
 433   return true;
 434 err:
 435   free(phbuf);
 436   return false;
 437 }
 438 
 439 // process segments from interpreter (ld.so or ld-linux.so)
 440 static bool read_interp_segments(struct ps_prochandle* ph) {
 441   ELF_EHDR interp_ehdr;
 442 
 443   if (read_elf_header(ph->core->interp_fd, &interp_ehdr) != true) {
 444     print_debug("interpreter is not a valid ELF file\n");
 445     return false;
 446   }
 447 
 448   if (read_lib_segments(ph, ph->core->interp_fd, &interp_ehdr, ph->core->ld_base_addr) != true) {
 449     print_debug("can't read segments of interpreter\n");
 450     return false;
 451   }
 452 
 453   return true;
 454 }
 455 
 456 // process segments of a a.out
 457 static bool read_exec_segments(struct ps_prochandle* ph, ELF_EHDR* exec_ehdr) {
 458   int i = 0;
 459   ELF_PHDR* phbuf = NULL;
 460   ELF_PHDR* exec_php = NULL;
 461 
 462   if ((phbuf = read_program_header_table(ph->core->exec_fd, exec_ehdr)) == NULL) {
 463     return false;
 464   }
 465 
 466   for (exec_php = phbuf, i = 0; i < exec_ehdr->e_phnum; i++) {
 467     switch (exec_php->p_type) {
 468 
 469       // add mappings for PT_LOAD segments
 470     case PT_LOAD: {
 471       // add only non-writable segments of non-zero filesz
 472       if (!(exec_php->p_flags & PF_W) && exec_php->p_filesz != 0) {
 473         if (add_map_info(ph, ph->core->exec_fd, exec_php->p_offset, exec_php->p_vaddr, exec_php->p_filesz, exec_php->p_flags) == NULL) goto err;
 474       }
 475       break;
 476     }
 477 
 478     // read the interpreter and it's segments
 479     case PT_INTERP: {
 480       char interp_name[BUF_SIZE + 1];
 481 
 482       // BUF_SIZE is PATH_MAX + NAME_MAX + 1.
 483       if (exec_php->p_filesz > BUF_SIZE) {
 484         goto err;
 485       }
 486       if (pread(ph->core->exec_fd, interp_name,
 487                 exec_php->p_filesz, exec_php->p_offset) != exec_php->p_filesz) {
 488         print_debug("Unable to read in the ELF interpreter\n");
 489         goto err;
 490       }
 491       interp_name[exec_php->p_filesz] = '\0';
 492       print_debug("ELF interpreter %s\n", interp_name);
 493       // read interpreter segments as well
 494       if ((ph->core->interp_fd = pathmap_open(interp_name)) < 0) {
 495         print_debug("can't open runtime loader\n");
 496         goto err;
 497       }
 498       break;
 499     }
 500 
 501     // from PT_DYNAMIC we want to read address of first link_map addr
 502     case PT_DYNAMIC: {
 503       if (exec_ehdr->e_type == ET_EXEC) {
 504         ph->core->dynamic_addr = exec_php->p_vaddr;
 505       } else { // ET_DYN
 506         // dynamic_addr has entry point of executable.
 507         // Thus we should substract it.
 508         ph->core->dynamic_addr += exec_php->p_vaddr - exec_ehdr->e_entry;
 509       }
 510       print_debug("address of _DYNAMIC is 0x%lx\n", ph->core->dynamic_addr);
 511       break;
 512     }
 513 
 514     } // switch
 515     exec_php++;
 516   } // for
 517 
 518   free(phbuf);
 519   return true;
 520  err:
 521   free(phbuf);
 522   return false;
 523 }
 524 
 525 
 526 #define FIRST_LINK_MAP_OFFSET offsetof(struct r_debug,  r_map)
 527 #define LD_BASE_OFFSET        offsetof(struct r_debug,  r_ldbase)
 528 #define LINK_MAP_ADDR_OFFSET  offsetof(struct link_map, l_addr)
 529 #define LINK_MAP_NAME_OFFSET  offsetof(struct link_map, l_name)
 530 #define LINK_MAP_LD_OFFSET    offsetof(struct link_map, l_ld)
 531 #define LINK_MAP_NEXT_OFFSET  offsetof(struct link_map, l_next)
 532 
 533 #define INVALID_LOAD_ADDRESS -1L
 534 #define ZERO_LOAD_ADDRESS 0x0L
 535 
 536 // Calculate the load address of shared library
 537 // on prelink-enabled environment.
 538 //
 539 // In case of GDB, it would be calculated by offset of link_map.l_ld
 540 // and the address of .dynamic section.
 541 // See GDB implementation: lm_addr_check @ solib-svr4.c
 542 static uintptr_t calc_prelinked_load_address(struct ps_prochandle* ph, int lib_fd, ELF_EHDR* elf_ehdr, uintptr_t link_map_addr) {
 543   ELF_PHDR *phbuf;
 544   uintptr_t lib_ld;
 545   uintptr_t lib_dyn_addr = 0L;
 546   uintptr_t load_addr;
 547   int i;
 548 
 549   phbuf = read_program_header_table(lib_fd, elf_ehdr);
 550   if (phbuf == NULL) {
 551     print_debug("can't read program header of shared object\n");
 552     return INVALID_LOAD_ADDRESS;
 553   }
 554 
 555   // Get the address of .dynamic section from shared library.
 556   for (i = 0; i < elf_ehdr->e_phnum; i++) {
 557     if (phbuf[i].p_type == PT_DYNAMIC) {
 558       lib_dyn_addr = phbuf[i].p_vaddr;
 559       break;
 560     }
 561   }
 562 
 563   free(phbuf);
 564 
 565   if (ps_pdread(ph, (psaddr_t)link_map_addr + LINK_MAP_LD_OFFSET,
 566                &lib_ld, sizeof(uintptr_t)) != PS_OK) {
 567     print_debug("can't read address of dynamic section in shared object\n");
 568     return INVALID_LOAD_ADDRESS;
 569   }
 570 
 571   // Return the load address which is calculated by the address of .dynamic
 572   // and link_map.l_ld .
 573   load_addr = lib_ld - lib_dyn_addr;
 574   print_debug("lib_ld = 0x%lx, lib_dyn_addr = 0x%lx -> lib_base_diff = 0x%lx\n", lib_ld, lib_dyn_addr, load_addr);
 575   return load_addr;
 576 }
 577 
 578 // read shared library info from runtime linker's data structures.
 579 // This work is done by librtlb_db in Solaris
 580 static bool read_shared_lib_info(struct ps_prochandle* ph) {
 581   uintptr_t addr = ph->core->dynamic_addr;
 582   uintptr_t debug_base;
 583   uintptr_t first_link_map_addr;
 584   uintptr_t ld_base_addr;
 585   uintptr_t link_map_addr;
 586   uintptr_t lib_base_diff;
 587   uintptr_t lib_base;
 588   uintptr_t lib_name_addr;
 589   char lib_name[BUF_SIZE];
 590   ELF_DYN dyn;
 591   ELF_EHDR elf_ehdr;
 592   int lib_fd;
 593 
 594   // _DYNAMIC has information of the form
 595   //         [tag] [data] [tag] [data] .....
 596   // Both tag and data are pointer sized.
 597   // We look for dynamic info with DT_DEBUG. This has shared object info.
 598   // refer to struct r_debug in link.h
 599 
 600   dyn.d_tag = DT_NULL;
 601   while (dyn.d_tag != DT_DEBUG) {
 602     if (ps_pdread(ph, (psaddr_t) addr, &dyn, sizeof(ELF_DYN)) != PS_OK) {
 603       print_debug("can't read debug info from _DYNAMIC\n");
 604       return false;
 605     }
 606     addr += sizeof(ELF_DYN);
 607   }
 608 
 609   // we have got Dyn entry with DT_DEBUG
 610   debug_base = dyn.d_un.d_ptr;
 611   // at debug_base we have struct r_debug. This has first link map in r_map field
 612   if (ps_pdread(ph, (psaddr_t) debug_base + FIRST_LINK_MAP_OFFSET,
 613                  &first_link_map_addr, sizeof(uintptr_t)) != PS_OK) {
 614     print_debug("can't read first link map address\n");
 615     return false;
 616   }
 617 
 618   // read ld_base address from struct r_debug
 619   if (ps_pdread(ph, (psaddr_t) debug_base + LD_BASE_OFFSET, &ld_base_addr,
 620                  sizeof(uintptr_t)) != PS_OK) {
 621     print_debug("can't read ld base address\n");
 622     return false;
 623   }
 624   ph->core->ld_base_addr = ld_base_addr;
 625 
 626   print_debug("interpreter base address is 0x%lx\n", ld_base_addr);
 627 
 628   // now read segments from interp (i.e ld.so or ld-linux.so or ld-elf.so)
 629   if (read_interp_segments(ph) != true) {
 630       return false;
 631   }
 632 
 633   // after adding interpreter (ld.so) mappings sort again
 634   if (sort_map_array(ph) != true) {
 635     return false;
 636   }
 637 
 638    print_debug("first link map is at 0x%lx\n", first_link_map_addr);
 639 
 640    link_map_addr = first_link_map_addr;
 641    while (link_map_addr != 0) {
 642       // read library base address of the .so. Note that even though <sys/link.h> calls
 643       // link_map->l_addr as "base address",  this is * not * really base virtual
 644       // address of the shared object. This is actually the difference b/w the virtual
 645       // address mentioned in shared object and the actual virtual base where runtime
 646       // linker loaded it. We use "base diff" in read_lib_segments call below.
 647 
 648       if (ps_pdread(ph, (psaddr_t) link_map_addr + LINK_MAP_ADDR_OFFSET,
 649                    &lib_base_diff, sizeof(uintptr_t)) != PS_OK) {
 650          print_debug("can't read shared object base address diff\n");
 651          return false;
 652       }
 653 
 654       // read address of the name
 655       if (ps_pdread(ph, (psaddr_t) link_map_addr + LINK_MAP_NAME_OFFSET,
 656                     &lib_name_addr, sizeof(uintptr_t)) != PS_OK) {
 657          print_debug("can't read address of shared object name\n");
 658          return false;
 659       }
 660 
 661       // read name of the shared object
 662       lib_name[0] = '\0';
 663       if (lib_name_addr != 0 &&
 664           read_string(ph, (uintptr_t) lib_name_addr, lib_name, sizeof(lib_name)) != true) {
 665          print_debug("can't read shared object name\n");
 666          // don't let failure to read the name stop opening the file.  If something is really wrong
 667          // it will fail later.
 668       }
 669 
 670       if (lib_name[0] != '\0') {
 671          // ignore empty lib names
 672          lib_fd = pathmap_open(lib_name);
 673 
 674          if (lib_fd < 0) {
 675             print_debug("can't open shared object %s\n", lib_name);
 676             // continue with other libraries...
 677          } else {
 678             if (read_elf_header(lib_fd, &elf_ehdr)) {
 679                if (lib_base_diff == ZERO_LOAD_ADDRESS ) {
 680                  lib_base_diff = calc_prelinked_load_address(ph, lib_fd, &elf_ehdr, link_map_addr);
 681                  if (lib_base_diff == INVALID_LOAD_ADDRESS) {
 682                    close(lib_fd);
 683                    return false;
 684                  }
 685                }
 686 
 687                lib_base = lib_base_diff + find_base_address(lib_fd, &elf_ehdr);
 688                print_debug("reading library %s @ 0x%lx [ 0x%lx ]\n",
 689                            lib_name, lib_base, lib_base_diff);
 690                // while adding library mappings we need to use "base difference".
 691                if (! read_lib_segments(ph, lib_fd, &elf_ehdr, lib_base_diff)) {
 692                   print_debug("can't read shared object's segments\n");
 693                   close(lib_fd);
 694                   return false;
 695                }
 696                add_lib_info_fd(ph, lib_name, lib_fd, lib_base);
 697                // Map info is added for the library (lib_name) so
 698                // we need to re-sort it before calling the p_pdread.
 699                if (sort_map_array(ph) != true)
 700                   return false;
 701             } else {
 702                print_debug("can't read ELF header for shared object %s\n", lib_name);
 703                close(lib_fd);
 704                // continue with other libraries...
 705             }
 706          }
 707       }
 708 
 709     // read next link_map address
 710     if (ps_pdread(ph, (psaddr_t) link_map_addr + LINK_MAP_NEXT_OFFSET,
 711                    &link_map_addr, sizeof(uintptr_t)) != PS_OK) {
 712       print_debug("can't read next link in link_map\n");
 713       return false;
 714     }
 715   }
 716 
 717   return true;
 718 }
 719 
 720 // the one and only one exposed stuff from this file
 721 JNIEXPORT struct ps_prochandle* JNICALL
 722 Pgrab_core(const char* exec_file, const char* core_file) {
 723   ELF_EHDR core_ehdr;
 724   ELF_EHDR exec_ehdr;
 725   ELF_EHDR lib_ehdr;
 726 
 727   struct ps_prochandle* ph = (struct ps_prochandle*) calloc(1, sizeof(struct ps_prochandle));
 728   if (ph == NULL) {
 729     print_debug("can't allocate ps_prochandle\n");
 730     return NULL;
 731   }
 732 
 733   if ((ph->core = (struct core_data*) calloc(1, sizeof(struct core_data))) == NULL) {
 734     free(ph);
 735     print_debug("can't allocate ps_prochandle\n");
 736     return NULL;
 737   }
 738 
 739   // initialize ph
 740   ph->ops = &core_ops;
 741   ph->core->core_fd   = -1;
 742   ph->core->exec_fd   = -1;
 743   ph->core->interp_fd = -1;
 744 
 745   // open the core file
 746   if ((ph->core->core_fd = open(core_file, O_RDONLY)) < 0) {
 747     print_debug("can't open core file\n");
 748     goto err;
 749   }
 750 
 751   // read core file ELF header
 752   if (read_elf_header(ph->core->core_fd, &core_ehdr) != true || core_ehdr.e_type != ET_CORE) {
 753     print_debug("core file is not a valid ELF ET_CORE file\n");
 754     goto err;
 755   }
 756 
 757   if ((ph->core->exec_fd = open(exec_file, O_RDONLY)) < 0) {
 758     print_debug("can't open executable file\n");
 759     goto err;
 760   }
 761 
 762   if (read_elf_header(ph->core->exec_fd, &exec_ehdr) != true ||
 763       ((exec_ehdr.e_type != ET_EXEC) && (exec_ehdr.e_type != ET_DYN))) {
 764     print_debug("executable file is not a valid ELF file\n");
 765     goto err;
 766   }
 767 
 768   // process core file segments
 769   if (read_core_segments(ph, &core_ehdr) != true) {
 770     goto err;
 771   }
 772 
 773   // process exec file segments
 774   if (read_exec_segments(ph, &exec_ehdr) != true) {
 775     goto err;
 776   }
 777 
 778   // exec file is also treated like a shared object for symbol search
 779   // FIXME: This is broken and ends up with a base address of 0. See JDK-8248876.
 780   if (add_lib_info_fd(ph, exec_file, ph->core->exec_fd,
 781                       (uintptr_t)0 + find_base_address(ph->core->exec_fd, &exec_ehdr)) == NULL) {
 782     goto err;
 783   }
 784 
 785   // allocate and sort maps into map_array, we need to do this
 786   // here because read_shared_lib_info needs to read from debuggee
 787   // address space
 788   if (sort_map_array(ph) != true) {
 789     goto err;
 790   }
 791 
 792   if (read_shared_lib_info(ph) != true) {
 793     goto err;
 794   }
 795 
 796   // sort again because we have added more mappings from shared objects
 797   if (sort_map_array(ph) != true) {
 798     goto err;
 799   }
 800 
 801   if (init_classsharing_workaround(ph) != true) {
 802     goto err;
 803   }
 804 
 805   return ph;
 806 
 807 err:
 808   Prelease(ph);
 809   return NULL;
 810 }