2010-07-10 15:15:00 +00:00
|
|
|
/*-
|
2017-11-20 19:49:47 +00:00
|
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
*
|
2010-07-10 15:15:00 +00:00
|
|
|
* Copyright (c) 2008, Juniper Networks, Inc.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the author nor the names of any co-contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/endian.h>
|
|
|
|
#include <sys/kerneldump.h>
|
|
|
|
#include <sys/mman.h>
|
|
|
|
|
|
|
|
#include <elf.h>
|
|
|
|
#include <kvm.h>
|
2015-11-27 18:58:26 +00:00
|
|
|
#include <limits.h>
|
2010-07-10 15:15:00 +00:00
|
|
|
#include <stdlib.h>
|
2011-01-24 11:06:40 +00:00
|
|
|
#include <string.h>
|
2010-07-10 15:15:00 +00:00
|
|
|
|
|
|
|
#include "kvm_private.h"
|
|
|
|
|
|
|
|
struct vmstate {
|
|
|
|
void *map;
|
|
|
|
size_t mapsz;
|
|
|
|
size_t dmphdrsz;
|
|
|
|
Elf64_Ehdr *eh;
|
|
|
|
Elf64_Phdr *ph;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2020-09-23 02:11:24 +00:00
|
|
|
valid_elf_header(kvm_t *kd, Elf64_Ehdr *eh)
|
2010-07-10 15:15:00 +00:00
|
|
|
{
|
|
|
|
|
|
|
|
if (!IS_ELF(*eh))
|
|
|
|
return (0);
|
|
|
|
if (eh->e_ident[EI_CLASS] != ELFCLASS64)
|
|
|
|
return (0);
|
2020-09-23 02:11:24 +00:00
|
|
|
if (eh->e_ident[EI_DATA] != ELFDATA2MSB &&
|
|
|
|
eh->e_ident[EI_DATA] != ELFDATA2LSB)
|
2010-07-10 15:15:00 +00:00
|
|
|
return (0);
|
|
|
|
if (eh->e_ident[EI_VERSION] != EV_CURRENT)
|
|
|
|
return (0);
|
|
|
|
if (eh->e_ident[EI_OSABI] != ELFOSABI_STANDALONE)
|
|
|
|
return (0);
|
2020-09-23 02:11:24 +00:00
|
|
|
if (_kvm16toh(kd, eh->e_type) != ET_CORE)
|
2010-07-10 15:15:00 +00:00
|
|
|
return (0);
|
2020-09-23 02:11:24 +00:00
|
|
|
if (_kvm16toh(kd, eh->e_machine) != EM_PPC64)
|
2010-07-10 15:15:00 +00:00
|
|
|
return (0);
|
|
|
|
/* Can't think of anything else to check... */
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static size_t
|
|
|
|
dump_header_size(struct kerneldumpheader *dh)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (strcmp(dh->magic, KERNELDUMPMAGIC) != 0)
|
|
|
|
return (0);
|
2020-09-23 02:11:24 +00:00
|
|
|
if (strcmp(dh->architecture, "powerpc64") != 0 &&
|
|
|
|
strcmp(dh->architecture, "powerpc64le") != 0)
|
2010-07-10 15:15:00 +00:00
|
|
|
return (0);
|
|
|
|
/* That should do it... */
|
|
|
|
return (sizeof(*dh));
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Map the ELF headers into the process' address space. We do this in two
|
|
|
|
* steps: first the ELF header itself and using that information the whole
|
|
|
|
* set of headers.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
powerpc_maphdrs(kvm_t *kd)
|
|
|
|
{
|
|
|
|
struct vmstate *vm;
|
|
|
|
size_t mapsz;
|
|
|
|
|
|
|
|
vm = kd->vmst;
|
|
|
|
|
2015-11-27 18:58:26 +00:00
|
|
|
vm->mapsz = sizeof(*vm->eh) + sizeof(struct kerneldumpheader);
|
2010-07-10 15:15:00 +00:00
|
|
|
vm->map = mmap(NULL, vm->mapsz, PROT_READ, MAP_PRIVATE, kd->pmfd, 0);
|
|
|
|
if (vm->map == MAP_FAILED) {
|
|
|
|
_kvm_err(kd, kd->program, "cannot map corefile");
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
vm->dmphdrsz = 0;
|
|
|
|
vm->eh = vm->map;
|
2020-09-23 02:11:24 +00:00
|
|
|
if (!valid_elf_header(kd, vm->eh)) {
|
2010-07-10 15:15:00 +00:00
|
|
|
/*
|
|
|
|
* Hmmm, no ELF header. Maybe we still have a dump header.
|
|
|
|
* This is normal when the core file wasn't created by
|
|
|
|
* savecore(8), but instead was dumped over TFTP. We can
|
|
|
|
* easily skip the dump header...
|
|
|
|
*/
|
|
|
|
vm->dmphdrsz = dump_header_size(vm->map);
|
|
|
|
if (vm->dmphdrsz == 0)
|
|
|
|
goto inval;
|
|
|
|
vm->eh = (void *)((uintptr_t)vm->map + vm->dmphdrsz);
|
2020-09-23 02:11:24 +00:00
|
|
|
if (!valid_elf_header(kd, vm->eh))
|
2010-07-10 15:15:00 +00:00
|
|
|
goto inval;
|
|
|
|
}
|
2020-09-23 02:11:24 +00:00
|
|
|
mapsz = _kvm16toh(kd, vm->eh->e_phentsize) *
|
|
|
|
_kvm16toh(kd, vm->eh->e_phnum) + _kvm64toh(kd, vm->eh->e_phoff);
|
2010-07-10 15:15:00 +00:00
|
|
|
munmap(vm->map, vm->mapsz);
|
|
|
|
|
|
|
|
/* Map all headers. */
|
|
|
|
vm->mapsz = vm->dmphdrsz + mapsz;
|
|
|
|
vm->map = mmap(NULL, vm->mapsz, PROT_READ, MAP_PRIVATE, kd->pmfd, 0);
|
|
|
|
if (vm->map == MAP_FAILED) {
|
2015-11-27 18:58:26 +00:00
|
|
|
_kvm_err(kd, kd->program, "cannot map corefile headers");
|
2010-07-10 15:15:00 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
vm->eh = (void *)((uintptr_t)vm->map + vm->dmphdrsz);
|
2015-11-27 18:58:26 +00:00
|
|
|
vm->ph = (void *)((uintptr_t)vm->eh +
|
2020-09-23 02:11:24 +00:00
|
|
|
(uintptr_t)_kvm64toh(kd, vm->eh->e_phoff));
|
2010-07-10 15:15:00 +00:00
|
|
|
return (0);
|
|
|
|
|
|
|
|
inval:
|
|
|
|
_kvm_err(kd, kd->program, "invalid corefile");
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Determine the offset within the corefile corresponding the virtual
|
|
|
|
* address. Return the number of contiguous bytes in the corefile or
|
|
|
|
* 0 when the virtual address is invalid.
|
|
|
|
*/
|
|
|
|
static size_t
|
2015-11-27 18:58:26 +00:00
|
|
|
powerpc64_va2off(kvm_t *kd, kvaddr_t va, off_t *ofs)
|
2010-07-10 15:15:00 +00:00
|
|
|
{
|
|
|
|
struct vmstate *vm = kd->vmst;
|
|
|
|
Elf64_Phdr *ph;
|
|
|
|
int nph;
|
|
|
|
|
|
|
|
ph = vm->ph;
|
2020-09-23 02:11:24 +00:00
|
|
|
nph = _kvm16toh(kd, vm->eh->e_phnum);
|
|
|
|
while (nph && (va < _kvm64toh(kd, ph->p_vaddr) ||
|
|
|
|
va >= _kvm64toh(kd, ph->p_vaddr) + _kvm64toh(kd, ph->p_memsz))) {
|
2010-07-10 15:15:00 +00:00
|
|
|
nph--;
|
2020-09-23 02:11:24 +00:00
|
|
|
ph = (void *)((uintptr_t)ph +
|
|
|
|
_kvm16toh(kd, vm->eh->e_phentsize));
|
2010-07-10 15:15:00 +00:00
|
|
|
}
|
|
|
|
if (nph == 0)
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
/* Segment found. Return file offset and range. */
|
2020-09-23 02:11:24 +00:00
|
|
|
*ofs = vm->dmphdrsz + _kvm64toh(kd, ph->p_offset) +
|
|
|
|
(va - _kvm64toh(kd, ph->p_vaddr));
|
|
|
|
return (_kvm64toh(kd, ph->p_memsz) -
|
|
|
|
(va - _kvm64toh(kd, ph->p_vaddr)));
|
2010-07-10 15:15:00 +00:00
|
|
|
}
|
|
|
|
|
2015-11-27 18:58:26 +00:00
|
|
|
static void
|
|
|
|
_powerpc64_freevtop(kvm_t *kd)
|
2010-07-10 15:15:00 +00:00
|
|
|
{
|
|
|
|
struct vmstate *vm = kd->vmst;
|
|
|
|
|
2015-11-27 18:58:26 +00:00
|
|
|
if (vm->eh != MAP_FAILED)
|
2010-07-10 15:15:00 +00:00
|
|
|
munmap(vm->eh, vm->mapsz);
|
|
|
|
free(vm);
|
|
|
|
kd->vmst = NULL;
|
|
|
|
}
|
|
|
|
|
2015-11-27 18:58:26 +00:00
|
|
|
static int
|
|
|
|
_powerpc64_probe(kvm_t *kd)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (_kvm_probe_elf_kernel(kd, ELFCLASS64, EM_PPC64) &&
|
|
|
|
kd->nlehdr.e_ident[EI_DATA] == ELFDATA2MSB);
|
|
|
|
}
|
|
|
|
|
2020-09-23 02:11:24 +00:00
|
|
|
static int
|
|
|
|
_powerpc64le_probe(kvm_t *kd)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (_kvm_probe_elf_kernel(kd, ELFCLASS64, EM_PPC64) &&
|
|
|
|
kd->nlehdr.e_ident[EI_DATA] == ELFDATA2LSB);
|
|
|
|
}
|
|
|
|
|
2015-11-27 18:58:26 +00:00
|
|
|
static int
|
|
|
|
_powerpc64_initvtop(kvm_t *kd)
|
2010-07-10 15:15:00 +00:00
|
|
|
{
|
|
|
|
|
|
|
|
kd->vmst = (struct vmstate *)_kvm_malloc(kd, sizeof(*kd->vmst));
|
2015-11-27 18:58:26 +00:00
|
|
|
if (kd->vmst == NULL)
|
2010-07-10 15:15:00 +00:00
|
|
|
return (-1);
|
2015-11-27 18:58:26 +00:00
|
|
|
|
|
|
|
if (powerpc_maphdrs(kd) == -1)
|
2010-07-10 15:15:00 +00:00
|
|
|
return (-1);
|
2015-11-27 18:58:26 +00:00
|
|
|
|
2010-07-10 15:15:00 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2015-11-27 18:58:26 +00:00
|
|
|
static int
|
|
|
|
_powerpc64_kvatop(kvm_t *kd, kvaddr_t va, off_t *ofs)
|
2010-07-10 15:15:00 +00:00
|
|
|
{
|
|
|
|
struct vmstate *vm;
|
|
|
|
|
|
|
|
vm = kd->vmst;
|
2020-09-23 02:11:24 +00:00
|
|
|
if (_kvm64toh(kd, vm->ph->p_paddr) == 0xffffffffffffffff)
|
2010-07-10 15:15:00 +00:00
|
|
|
return ((int)powerpc64_va2off(kd, va, ofs));
|
|
|
|
|
|
|
|
_kvm_err(kd, kd->program, "Raw corefile not supported");
|
|
|
|
return (0);
|
|
|
|
}
|
2015-11-27 18:58:26 +00:00
|
|
|
|
|
|
|
static int
|
2017-03-22 02:42:00 +00:00
|
|
|
_powerpc64_native(kvm_t *kd __unused)
|
2015-11-27 18:58:26 +00:00
|
|
|
{
|
|
|
|
|
2020-09-23 02:11:24 +00:00
|
|
|
#if defined(__powerpc64__) && BYTE_ORDER == BIG_ENDIAN
|
|
|
|
return (1);
|
|
|
|
#else
|
|
|
|
return (0);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
_powerpc64le_native(kvm_t *kd __unused)
|
|
|
|
{
|
|
|
|
|
|
|
|
#if defined(__powerpc64__) && BYTE_ORDER == LITTLE_ENDIAN
|
2015-11-27 18:58:26 +00:00
|
|
|
return (1);
|
|
|
|
#else
|
|
|
|
return (0);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2017-03-22 02:42:00 +00:00
|
|
|
static struct kvm_arch kvm_powerpc64 = {
|
2015-11-27 18:58:26 +00:00
|
|
|
.ka_probe = _powerpc64_probe,
|
|
|
|
.ka_initvtop = _powerpc64_initvtop,
|
|
|
|
.ka_freevtop = _powerpc64_freevtop,
|
|
|
|
.ka_kvatop = _powerpc64_kvatop,
|
|
|
|
.ka_native = _powerpc64_native,
|
|
|
|
};
|
|
|
|
|
2020-09-23 02:11:24 +00:00
|
|
|
static struct kvm_arch kvm_powerpc64le = {
|
|
|
|
.ka_probe = _powerpc64le_probe,
|
|
|
|
.ka_initvtop = _powerpc64_initvtop,
|
|
|
|
.ka_freevtop = _powerpc64_freevtop,
|
|
|
|
.ka_kvatop = _powerpc64_kvatop,
|
|
|
|
.ka_native = _powerpc64le_native,
|
|
|
|
};
|
|
|
|
|
2015-11-27 18:58:26 +00:00
|
|
|
KVM_ARCH(kvm_powerpc64);
|
2020-09-23 02:11:24 +00:00
|
|
|
KVM_ARCH(kvm_powerpc64le);
|