xref: /linux/tools/perf/util/map.c (revision 55d0969c451159cff86949b38c39171cab962069)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <inttypes.h>
3 #include <limits.h>
4 #include <stdio.h>
5 #include <stdlib.h>
6 #include <string.h>
7 #include <linux/string.h>
8 #include <linux/zalloc.h>
9 #include <uapi/linux/mman.h> /* To get things like MAP_HUGETLB even on older libc headers */
10 #include "debug.h"
11 #include "dso.h"
12 #include "map.h"
13 #include "namespaces.h"
14 #include "srcline.h"
15 #include "symbol.h"
16 #include "thread.h"
17 #include "vdso.h"
18 
19 static inline int is_android_lib(const char *filename)
20 {
21 	return strstarts(filename, "/data/app-lib/") ||
22 	       strstarts(filename, "/system/lib/");
23 }
24 
25 static inline bool replace_android_lib(const char *filename, char *newfilename)
26 {
27 	const char *libname;
28 	char *app_abi;
29 	size_t app_abi_length, new_length;
30 	size_t lib_length = 0;
31 
32 	libname  = strrchr(filename, '/');
33 	if (libname)
34 		lib_length = strlen(libname);
35 
36 	app_abi = getenv("APP_ABI");
37 	if (!app_abi)
38 		return false;
39 
40 	app_abi_length = strlen(app_abi);
41 
42 	if (strstarts(filename, "/data/app-lib/")) {
43 		char *apk_path;
44 
45 		if (!app_abi_length)
46 			return false;
47 
48 		new_length = 7 + app_abi_length + lib_length;
49 
50 		apk_path = getenv("APK_PATH");
51 		if (apk_path) {
52 			new_length += strlen(apk_path) + 1;
53 			if (new_length > PATH_MAX)
54 				return false;
55 			snprintf(newfilename, new_length,
56 				 "%s/libs/%s/%s", apk_path, app_abi, libname);
57 		} else {
58 			if (new_length > PATH_MAX)
59 				return false;
60 			snprintf(newfilename, new_length,
61 				 "libs/%s/%s", app_abi, libname);
62 		}
63 		return true;
64 	}
65 
66 	if (strstarts(filename, "/system/lib/")) {
67 		char *ndk, *app;
68 		const char *arch;
69 		int ndk_length, app_length;
70 
71 		ndk = getenv("NDK_ROOT");
72 		app = getenv("APP_PLATFORM");
73 
74 		if (!(ndk && app))
75 			return false;
76 
77 		ndk_length = strlen(ndk);
78 		app_length = strlen(app);
79 
80 		if (!(ndk_length && app_length && app_abi_length))
81 			return false;
82 
83 		arch = !strncmp(app_abi, "arm", 3) ? "arm" :
84 		       !strncmp(app_abi, "mips", 4) ? "mips" :
85 		       !strncmp(app_abi, "x86", 3) ? "x86" : NULL;
86 
87 		if (!arch)
88 			return false;
89 
90 		new_length = 27 + ndk_length +
91 			     app_length + lib_length
92 			   + strlen(arch);
93 
94 		if (new_length > PATH_MAX)
95 			return false;
96 		snprintf(newfilename, new_length,
97 			"%.*s/platforms/%.*s/arch-%s/usr/lib/%s",
98 			ndk_length, ndk, app_length, app, arch, libname);
99 
100 		return true;
101 	}
102 	return false;
103 }
104 
105 static void map__init(struct map *map, u64 start, u64 end, u64 pgoff,
106 		      struct dso *dso, u32 prot, u32 flags)
107 {
108 	map__set_start(map, start);
109 	map__set_end(map, end);
110 	map__set_pgoff(map, pgoff);
111 	assert(map__reloc(map) == 0);
112 	map__set_dso(map, dso__get(dso));
113 	refcount_set(map__refcnt(map), 1);
114 	RC_CHK_ACCESS(map)->prot = prot;
115 	RC_CHK_ACCESS(map)->flags = flags;
116 	map__set_mapping_type(map, MAPPING_TYPE__DSO);
117 	assert(map__erange_warned(map) == false);
118 	assert(map__priv(map) == false);
119 	assert(map__hit(map) == false);
120 }
121 
122 struct map *map__new(struct machine *machine, u64 start, u64 len,
123 		     u64 pgoff, struct dso_id *id,
124 		     u32 prot, u32 flags, struct build_id *bid,
125 		     char *filename, struct thread *thread)
126 {
127 	struct map *result;
128 	RC_STRUCT(map) *map;
129 	struct nsinfo *nsi = NULL;
130 	struct nsinfo *nnsi;
131 
132 	map = zalloc(sizeof(*map));
133 	if (ADD_RC_CHK(result, map)) {
134 		char newfilename[PATH_MAX];
135 		struct dso *dso, *header_bid_dso;
136 		int anon, no_dso, vdso, android;
137 
138 		android = is_android_lib(filename);
139 		anon = is_anon_memory(filename) || flags & MAP_HUGETLB;
140 		vdso = is_vdso_map(filename);
141 		no_dso = is_no_dso_memory(filename);
142 		nsi = nsinfo__get(thread__nsinfo(thread));
143 
144 		if ((anon || no_dso) && nsi && (prot & PROT_EXEC)) {
145 			snprintf(newfilename, sizeof(newfilename),
146 				 "/tmp/perf-%d.map", nsinfo__pid(nsi));
147 			filename = newfilename;
148 		}
149 
150 		if (android) {
151 			if (replace_android_lib(filename, newfilename))
152 				filename = newfilename;
153 		}
154 
155 		if (vdso) {
156 			/* The vdso maps are always on the host and not the
157 			 * container.  Ensure that we don't use setns to look
158 			 * them up.
159 			 */
160 			nnsi = nsinfo__copy(nsi);
161 			if (nnsi) {
162 				nsinfo__put(nsi);
163 				nsinfo__clear_need_setns(nnsi);
164 				nsi = nnsi;
165 			}
166 			pgoff = 0;
167 			dso = machine__findnew_vdso(machine, thread);
168 		} else
169 			dso = machine__findnew_dso_id(machine, filename, id);
170 
171 		if (dso == NULL)
172 			goto out_delete;
173 
174 		assert(!dso__kernel(dso));
175 		map__init(result, start, start + len, pgoff, dso, prot, flags);
176 
177 		if (anon || no_dso) {
178 			map->mapping_type = MAPPING_TYPE__IDENTITY;
179 
180 			/*
181 			 * Set memory without DSO as loaded. All map__find_*
182 			 * functions still return NULL, and we avoid the
183 			 * unnecessary map__load warning.
184 			 */
185 			if (!(prot & PROT_EXEC))
186 				dso__set_loaded(dso);
187 		}
188 		mutex_lock(dso__lock(dso));
189 		dso__set_nsinfo(dso, nsi);
190 		mutex_unlock(dso__lock(dso));
191 
192 		if (build_id__is_defined(bid)) {
193 			dso__set_build_id(dso, bid);
194 		} else {
195 			/*
196 			 * If the mmap event had no build ID, search for an existing dso from the
197 			 * build ID header by name. Otherwise only the dso loaded at the time of
198 			 * reading the header will have the build ID set and all future mmaps will
199 			 * have it missing.
200 			 */
201 			header_bid_dso = dsos__find(&machine->dsos, filename, false);
202 			if (header_bid_dso && dso__header_build_id(header_bid_dso)) {
203 				dso__set_build_id(dso, dso__bid(header_bid_dso));
204 				dso__set_header_build_id(dso, 1);
205 			}
206 			dso__put(header_bid_dso);
207 		}
208 		dso__put(dso);
209 	}
210 	return result;
211 out_delete:
212 	nsinfo__put(nsi);
213 	RC_CHK_FREE(result);
214 	return NULL;
215 }
216 
217 /*
218  * Constructor variant for modules (where we know from /proc/modules where
219  * they are loaded) and for vmlinux, where only after we load all the
220  * symbols we'll know where it starts and ends.
221  */
222 struct map *map__new2(u64 start, struct dso *dso)
223 {
224 	struct map *result;
225 	RC_STRUCT(map) *map;
226 
227 	map = calloc(1, sizeof(*map) + (dso__kernel(dso) ? sizeof(struct kmap) : 0));
228 	if (ADD_RC_CHK(result, map)) {
229 		/* ->end will be filled after we load all the symbols. */
230 		map__init(result, start, /*end=*/0, /*pgoff=*/0, dso, /*prot=*/0, /*flags=*/0);
231 	}
232 
233 	return result;
234 }
235 
236 bool __map__is_kernel(const struct map *map)
237 {
238 	if (!dso__kernel(map__dso(map)))
239 		return false;
240 	return machine__kernel_map(maps__machine(map__kmaps((struct map *)map))) == map;
241 }
242 
243 bool __map__is_extra_kernel_map(const struct map *map)
244 {
245 	struct kmap *kmap = __map__kmap((struct map *)map);
246 
247 	return kmap && kmap->name[0];
248 }
249 
250 bool __map__is_bpf_prog(const struct map *map)
251 {
252 	const char *name;
253 	struct dso *dso = map__dso(map);
254 
255 	if (dso__binary_type(dso) == DSO_BINARY_TYPE__BPF_PROG_INFO)
256 		return true;
257 
258 	/*
259 	 * If PERF_RECORD_BPF_EVENT is not included, the dso will not have
260 	 * type of DSO_BINARY_TYPE__BPF_PROG_INFO. In such cases, we can
261 	 * guess the type based on name.
262 	 */
263 	name = dso__short_name(dso);
264 	return name && (strstr(name, "bpf_prog_") == name);
265 }
266 
267 bool __map__is_bpf_image(const struct map *map)
268 {
269 	const char *name;
270 	struct dso *dso = map__dso(map);
271 
272 	if (dso__binary_type(dso) == DSO_BINARY_TYPE__BPF_IMAGE)
273 		return true;
274 
275 	/*
276 	 * If PERF_RECORD_KSYMBOL is not included, the dso will not have
277 	 * type of DSO_BINARY_TYPE__BPF_IMAGE. In such cases, we can
278 	 * guess the type based on name.
279 	 */
280 	name = dso__short_name(dso);
281 	return name && is_bpf_image(name);
282 }
283 
284 bool __map__is_ool(const struct map *map)
285 {
286 	const struct dso *dso = map__dso(map);
287 
288 	return dso && dso__binary_type(dso) == DSO_BINARY_TYPE__OOL;
289 }
290 
291 bool map__has_symbols(const struct map *map)
292 {
293 	return dso__has_symbols(map__dso(map));
294 }
295 
296 static void map__exit(struct map *map)
297 {
298 	BUG_ON(refcount_read(map__refcnt(map)) != 0);
299 	dso__zput(RC_CHK_ACCESS(map)->dso);
300 }
301 
302 void map__delete(struct map *map)
303 {
304 	map__exit(map);
305 	RC_CHK_FREE(map);
306 }
307 
308 void map__put(struct map *map)
309 {
310 	if (map && refcount_dec_and_test(map__refcnt(map)))
311 		map__delete(map);
312 	else
313 		RC_CHK_PUT(map);
314 }
315 
316 void map__fixup_start(struct map *map)
317 {
318 	struct dso *dso = map__dso(map);
319 	struct rb_root_cached *symbols = dso__symbols(dso);
320 	struct rb_node *nd = rb_first_cached(symbols);
321 
322 	if (nd != NULL) {
323 		struct symbol *sym = rb_entry(nd, struct symbol, rb_node);
324 
325 		map__set_start(map, sym->start);
326 	}
327 }
328 
329 void map__fixup_end(struct map *map)
330 {
331 	struct dso *dso = map__dso(map);
332 	struct rb_root_cached *symbols = dso__symbols(dso);
333 	struct rb_node *nd = rb_last(&symbols->rb_root);
334 
335 	if (nd != NULL) {
336 		struct symbol *sym = rb_entry(nd, struct symbol, rb_node);
337 		map__set_end(map, sym->end);
338 	}
339 }
340 
341 #define DSO__DELETED "(deleted)"
342 
343 int map__load(struct map *map)
344 {
345 	struct dso *dso = map__dso(map);
346 	const char *name = dso__long_name(dso);
347 	int nr;
348 
349 	if (dso__loaded(dso))
350 		return 0;
351 
352 	nr = dso__load(dso, map);
353 	if (nr < 0) {
354 		if (dso__has_build_id(dso)) {
355 			char sbuild_id[SBUILD_ID_SIZE];
356 
357 			build_id__sprintf(dso__bid(dso), sbuild_id);
358 			pr_debug("%s with build id %s not found", name, sbuild_id);
359 		} else
360 			pr_debug("Failed to open %s", name);
361 
362 		pr_debug(", continuing without symbols\n");
363 		return -1;
364 	} else if (nr == 0) {
365 #ifdef HAVE_LIBELF_SUPPORT
366 		const size_t len = strlen(name);
367 		const size_t real_len = len - sizeof(DSO__DELETED);
368 
369 		if (len > sizeof(DSO__DELETED) &&
370 		    strcmp(name + real_len + 1, DSO__DELETED) == 0) {
371 			pr_debug("%.*s was updated (is prelink enabled?). "
372 				"Restart the long running apps that use it!\n",
373 				   (int)real_len, name);
374 		} else {
375 			pr_debug("no symbols found in %s, maybe install a debug package?\n", name);
376 		}
377 #endif
378 		return -1;
379 	}
380 
381 	return 0;
382 }
383 
384 struct symbol *map__find_symbol(struct map *map, u64 addr)
385 {
386 	if (map__load(map) < 0)
387 		return NULL;
388 
389 	return dso__find_symbol(map__dso(map), addr);
390 }
391 
392 struct symbol *map__find_symbol_by_name_idx(struct map *map, const char *name, size_t *idx)
393 {
394 	struct dso *dso;
395 
396 	if (map__load(map) < 0)
397 		return NULL;
398 
399 	dso = map__dso(map);
400 	dso__sort_by_name(dso);
401 
402 	return dso__find_symbol_by_name(dso, name, idx);
403 }
404 
405 struct symbol *map__find_symbol_by_name(struct map *map, const char *name)
406 {
407 	size_t idx;
408 
409 	return map__find_symbol_by_name_idx(map, name, &idx);
410 }
411 
412 struct map *map__clone(struct map *from)
413 {
414 	struct map *result;
415 	RC_STRUCT(map) *map;
416 	size_t size = sizeof(RC_STRUCT(map));
417 	struct dso *dso = map__dso(from);
418 
419 	if (dso && dso__kernel(dso))
420 		size += sizeof(struct kmap);
421 
422 	map = memdup(RC_CHK_ACCESS(from), size);
423 	if (ADD_RC_CHK(result, map)) {
424 		refcount_set(&map->refcnt, 1);
425 		map->dso = dso__get(dso);
426 	}
427 
428 	return result;
429 }
430 
431 size_t map__fprintf(struct map *map, FILE *fp)
432 {
433 	const struct dso *dso = map__dso(map);
434 
435 	return fprintf(fp, " %" PRIx64 "-%" PRIx64 " %" PRIx64 " %s\n",
436 		       map__start(map), map__end(map), map__pgoff(map), dso__name(dso));
437 }
438 
439 static bool prefer_dso_long_name(const struct dso *dso, bool print_off)
440 {
441 	return dso__long_name(dso) &&
442 	       (symbol_conf.show_kernel_path ||
443 		(print_off && (dso__name(dso)[0] == '[' || dso__is_kcore(dso))));
444 }
445 
446 static size_t __map__fprintf_dsoname(struct map *map, bool print_off, FILE *fp)
447 {
448 	char buf[symbol_conf.pad_output_len_dso + 1];
449 	const char *dsoname = "[unknown]";
450 	const struct dso *dso = map ? map__dso(map) : NULL;
451 
452 	if (dso) {
453 		if (prefer_dso_long_name(dso, print_off))
454 			dsoname = dso__long_name(dso);
455 		else
456 			dsoname = dso__name(dso);
457 	}
458 
459 	if (symbol_conf.pad_output_len_dso) {
460 		scnprintf_pad(buf, symbol_conf.pad_output_len_dso, "%s", dsoname);
461 		dsoname = buf;
462 	}
463 
464 	return fprintf(fp, "%s", dsoname);
465 }
466 
467 size_t map__fprintf_dsoname(struct map *map, FILE *fp)
468 {
469 	return __map__fprintf_dsoname(map, false, fp);
470 }
471 
472 size_t map__fprintf_dsoname_dsoff(struct map *map, bool print_off, u64 addr, FILE *fp)
473 {
474 	const struct dso *dso = map ? map__dso(map) : NULL;
475 	int printed = 0;
476 
477 	if (print_off && (!dso || !dso__is_object_file(dso)))
478 		print_off = false;
479 	printed += fprintf(fp, " (");
480 	printed += __map__fprintf_dsoname(map, print_off, fp);
481 	if (print_off)
482 		printed += fprintf(fp, "+0x%" PRIx64, addr);
483 	printed += fprintf(fp, ")");
484 
485 	return printed;
486 }
487 
488 char *map__srcline(struct map *map, u64 addr, struct symbol *sym)
489 {
490 	if (map == NULL)
491 		return SRCLINE_UNKNOWN;
492 
493 	return get_srcline(map__dso(map), map__rip_2objdump(map, addr), sym, true, true, addr);
494 }
495 
496 int map__fprintf_srcline(struct map *map, u64 addr, const char *prefix,
497 			 FILE *fp)
498 {
499 	const struct dso *dso = map ? map__dso(map) : NULL;
500 	int ret = 0;
501 
502 	if (dso) {
503 		char *srcline = map__srcline(map, addr, NULL);
504 		if (srcline != SRCLINE_UNKNOWN)
505 			ret = fprintf(fp, "%s%s", prefix, srcline);
506 		zfree_srcline(&srcline);
507 	}
508 	return ret;
509 }
510 
511 void srccode_state_free(struct srccode_state *state)
512 {
513 	zfree(&state->srcfile);
514 	state->line = 0;
515 }
516 
517 /**
518  * map__rip_2objdump - convert symbol start address to objdump address.
519  * @map: memory map
520  * @rip: symbol start address
521  *
522  * objdump wants/reports absolute IPs for ET_EXEC, and RIPs for ET_DYN.
523  * map->dso->adjust_symbols==1 for ET_EXEC-like cases except ET_REL which is
524  * relative to section start.
525  *
526  * Return: Address suitable for passing to "objdump --start-address="
527  */
528 u64 map__rip_2objdump(struct map *map, u64 rip)
529 {
530 	struct kmap *kmap = __map__kmap(map);
531 	const struct dso *dso = map__dso(map);
532 
533 	/*
534 	 * vmlinux does not have program headers for PTI entry trampolines and
535 	 * kcore may not either. However the trampoline object code is on the
536 	 * main kernel map, so just use that instead.
537 	 */
538 	if (kmap && is_entry_trampoline(kmap->name) && kmap->kmaps) {
539 		struct machine *machine = maps__machine(kmap->kmaps);
540 
541 		if (machine) {
542 			struct map *kernel_map = machine__kernel_map(machine);
543 
544 			if (kernel_map)
545 				map = kernel_map;
546 		}
547 	}
548 
549 	if (!dso__adjust_symbols(dso))
550 		return rip;
551 
552 	if (dso__rel(dso))
553 		return rip - map__pgoff(map);
554 
555 	if (dso__kernel(dso) == DSO_SPACE__USER)
556 		return rip + dso__text_offset(dso);
557 
558 	return map__unmap_ip(map, rip) - map__reloc(map);
559 }
560 
561 /**
562  * map__objdump_2mem - convert objdump address to a memory address.
563  * @map: memory map
564  * @ip: objdump address
565  *
566  * Closely related to map__rip_2objdump(), this function takes an address from
567  * objdump and converts it to a memory address.  Note this assumes that @map
568  * contains the address.  To be sure the result is valid, check it forwards
569  * e.g. map__rip_2objdump(map__map_ip(map, map__objdump_2mem(map, ip))) == ip
570  *
571  * Return: Memory address.
572  */
573 u64 map__objdump_2mem(struct map *map, u64 ip)
574 {
575 	const struct dso *dso = map__dso(map);
576 
577 	if (!dso__adjust_symbols(dso))
578 		return map__unmap_ip(map, ip);
579 
580 	if (dso__rel(dso))
581 		return map__unmap_ip(map, ip + map__pgoff(map));
582 
583 	if (dso__kernel(dso) == DSO_SPACE__USER)
584 		return map__unmap_ip(map, ip - dso__text_offset(dso));
585 
586 	return ip + map__reloc(map);
587 }
588 
589 /* convert objdump address to relative address.  (To be removed) */
590 u64 map__objdump_2rip(struct map *map, u64 ip)
591 {
592 	const struct dso *dso = map__dso(map);
593 
594 	if (!dso__adjust_symbols(dso))
595 		return ip;
596 
597 	if (dso__rel(dso))
598 		return ip + map__pgoff(map);
599 
600 	if (dso__kernel(dso) == DSO_SPACE__USER)
601 		return ip - dso__text_offset(dso);
602 
603 	return map__map_ip(map, ip + map__reloc(map));
604 }
605 
606 bool map__contains_symbol(const struct map *map, const struct symbol *sym)
607 {
608 	u64 ip = map__unmap_ip(map, sym->start);
609 
610 	return ip >= map__start(map) && ip < map__end(map);
611 }
612 
613 struct kmap *__map__kmap(struct map *map)
614 {
615 	const struct dso *dso = map__dso(map);
616 
617 	if (!dso || !dso__kernel(dso))
618 		return NULL;
619 	return (struct kmap *)(&RC_CHK_ACCESS(map)[1]);
620 }
621 
622 struct kmap *map__kmap(struct map *map)
623 {
624 	struct kmap *kmap = __map__kmap(map);
625 
626 	if (!kmap)
627 		pr_err("Internal error: map__kmap with a non-kernel map\n");
628 	return kmap;
629 }
630 
631 struct maps *map__kmaps(struct map *map)
632 {
633 	struct kmap *kmap = map__kmap(map);
634 
635 	if (!kmap || !kmap->kmaps) {
636 		pr_err("Internal error: map__kmaps with a non-kernel map\n");
637 		return NULL;
638 	}
639 	return kmap->kmaps;
640 }
641