xref: /linux/tools/perf/util/symbol.c (revision 41fd3cacd29f47f6b9c6474b27c5b0513786c4e9)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <dirent.h>
3 #include <errno.h>
4 #include <stdlib.h>
5 #include <stdio.h>
6 #include <string.h>
7 #include <linux/capability.h>
8 #include <linux/kernel.h>
9 #include <linux/mman.h>
10 #include <linux/string.h>
11 #include <linux/time64.h>
12 #include <sys/types.h>
13 #include <sys/stat.h>
14 #include <sys/param.h>
15 #include <fcntl.h>
16 #include <unistd.h>
17 #include <inttypes.h>
18 #include "annotate.h"
19 #include "build-id.h"
20 #include "cap.h"
21 #include "dso.h"
22 #include "util.h" // lsdir()
23 #include "debug.h"
24 #include "event.h"
25 #include "machine.h"
26 #include "map.h"
27 #include "symbol.h"
28 #include "map_symbol.h"
29 #include "mem-events.h"
30 #include "symsrc.h"
31 #include "strlist.h"
32 #include "intlist.h"
33 #include "namespaces.h"
34 #include "header.h"
35 #include "path.h"
36 #include <linux/ctype.h>
37 #include <linux/zalloc.h>
38 
39 #include <elf.h>
40 #include <limits.h>
41 #include <symbol/kallsyms.h>
42 #include <sys/utsname.h>
43 
44 static int dso__load_kernel_sym(struct dso *dso, struct map *map);
45 static int dso__load_guest_kernel_sym(struct dso *dso, struct map *map);
46 static bool symbol__is_idle(const char *name);
47 
48 int vmlinux_path__nr_entries;
49 char **vmlinux_path;
50 
51 struct symbol_conf symbol_conf = {
52 	.nanosecs		= false,
53 	.use_modules		= true,
54 	.try_vmlinux_path	= true,
55 	.demangle		= true,
56 	.demangle_kernel	= false,
57 	.cumulate_callchain	= true,
58 	.time_quantum		= 100 * NSEC_PER_MSEC, /* 100ms */
59 	.show_hist_headers	= true,
60 	.symfs			= "",
61 	.event_group		= true,
62 	.inline_name		= true,
63 	.res_sample		= 0,
64 };
65 
66 static enum dso_binary_type binary_type_symtab[] = {
67 	DSO_BINARY_TYPE__KALLSYMS,
68 	DSO_BINARY_TYPE__GUEST_KALLSYMS,
69 	DSO_BINARY_TYPE__JAVA_JIT,
70 	DSO_BINARY_TYPE__DEBUGLINK,
71 	DSO_BINARY_TYPE__BUILD_ID_CACHE,
72 	DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO,
73 	DSO_BINARY_TYPE__FEDORA_DEBUGINFO,
74 	DSO_BINARY_TYPE__UBUNTU_DEBUGINFO,
75 	DSO_BINARY_TYPE__BUILDID_DEBUGINFO,
76 	DSO_BINARY_TYPE__SYSTEM_PATH_DSO,
77 	DSO_BINARY_TYPE__GUEST_KMODULE,
78 	DSO_BINARY_TYPE__GUEST_KMODULE_COMP,
79 	DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE,
80 	DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP,
81 	DSO_BINARY_TYPE__OPENEMBEDDED_DEBUGINFO,
82 	DSO_BINARY_TYPE__MIXEDUP_UBUNTU_DEBUGINFO,
83 	DSO_BINARY_TYPE__NOT_FOUND,
84 };
85 
86 #define DSO_BINARY_TYPE__SYMTAB_CNT ARRAY_SIZE(binary_type_symtab)
87 
88 static bool symbol_type__filter(char symbol_type)
89 {
90 	symbol_type = toupper(symbol_type);
91 	return symbol_type == 'T' || symbol_type == 'W' || symbol_type == 'D' || symbol_type == 'B';
92 }
93 
94 static int prefix_underscores_count(const char *str)
95 {
96 	const char *tail = str;
97 
98 	while (*tail == '_')
99 		tail++;
100 
101 	return tail - str;
102 }
103 
104 const char * __weak arch__normalize_symbol_name(const char *name)
105 {
106 	return name;
107 }
108 
109 int __weak arch__compare_symbol_names(const char *namea, const char *nameb)
110 {
111 	return strcmp(namea, nameb);
112 }
113 
114 int __weak arch__compare_symbol_names_n(const char *namea, const char *nameb,
115 					unsigned int n)
116 {
117 	return strncmp(namea, nameb, n);
118 }
119 
120 int __weak arch__choose_best_symbol(struct symbol *syma,
121 				    struct symbol *symb __maybe_unused)
122 {
123 	/* Avoid "SyS" kernel syscall aliases */
124 	if (strlen(syma->name) >= 3 && !strncmp(syma->name, "SyS", 3))
125 		return SYMBOL_B;
126 	if (strlen(syma->name) >= 10 && !strncmp(syma->name, "compat_SyS", 10))
127 		return SYMBOL_B;
128 
129 	return SYMBOL_A;
130 }
131 
132 static int choose_best_symbol(struct symbol *syma, struct symbol *symb)
133 {
134 	s64 a;
135 	s64 b;
136 	size_t na, nb;
137 
138 	/* Prefer a symbol with non zero length */
139 	a = syma->end - syma->start;
140 	b = symb->end - symb->start;
141 	if ((b == 0) && (a > 0))
142 		return SYMBOL_A;
143 	else if ((a == 0) && (b > 0))
144 		return SYMBOL_B;
145 
146 	/* Prefer a non weak symbol over a weak one */
147 	a = syma->binding == STB_WEAK;
148 	b = symb->binding == STB_WEAK;
149 	if (b && !a)
150 		return SYMBOL_A;
151 	if (a && !b)
152 		return SYMBOL_B;
153 
154 	/* Prefer a global symbol over a non global one */
155 	a = syma->binding == STB_GLOBAL;
156 	b = symb->binding == STB_GLOBAL;
157 	if (a && !b)
158 		return SYMBOL_A;
159 	if (b && !a)
160 		return SYMBOL_B;
161 
162 	/* Prefer a symbol with less underscores */
163 	a = prefix_underscores_count(syma->name);
164 	b = prefix_underscores_count(symb->name);
165 	if (b > a)
166 		return SYMBOL_A;
167 	else if (a > b)
168 		return SYMBOL_B;
169 
170 	/* Choose the symbol with the longest name */
171 	na = strlen(syma->name);
172 	nb = strlen(symb->name);
173 	if (na > nb)
174 		return SYMBOL_A;
175 	else if (na < nb)
176 		return SYMBOL_B;
177 
178 	return arch__choose_best_symbol(syma, symb);
179 }
180 
181 void symbols__fixup_duplicate(struct rb_root_cached *symbols)
182 {
183 	struct rb_node *nd;
184 	struct symbol *curr, *next;
185 
186 	if (symbol_conf.allow_aliases)
187 		return;
188 
189 	nd = rb_first_cached(symbols);
190 
191 	while (nd) {
192 		curr = rb_entry(nd, struct symbol, rb_node);
193 again:
194 		nd = rb_next(&curr->rb_node);
195 		if (!nd)
196 			break;
197 
198 		next = rb_entry(nd, struct symbol, rb_node);
199 		if (curr->start != next->start)
200 			continue;
201 
202 		if (choose_best_symbol(curr, next) == SYMBOL_A) {
203 			if (next->type == STT_GNU_IFUNC)
204 				curr->ifunc_alias = true;
205 			rb_erase_cached(&next->rb_node, symbols);
206 			symbol__delete(next);
207 			goto again;
208 		} else {
209 			if (curr->type == STT_GNU_IFUNC)
210 				next->ifunc_alias = true;
211 			nd = rb_next(&curr->rb_node);
212 			rb_erase_cached(&curr->rb_node, symbols);
213 			symbol__delete(curr);
214 		}
215 	}
216 }
217 
218 /* Update zero-sized symbols using the address of the next symbol */
219 void symbols__fixup_end(struct rb_root_cached *symbols, bool is_kallsyms)
220 {
221 	struct rb_node *nd, *prevnd = rb_first_cached(symbols);
222 	struct symbol *curr, *prev;
223 
224 	if (prevnd == NULL)
225 		return;
226 
227 	curr = rb_entry(prevnd, struct symbol, rb_node);
228 
229 	for (nd = rb_next(prevnd); nd; nd = rb_next(nd)) {
230 		prev = curr;
231 		curr = rb_entry(nd, struct symbol, rb_node);
232 
233 		/*
234 		 * On some architecture kernel text segment start is located at
235 		 * some low memory address, while modules are located at high
236 		 * memory addresses (or vice versa).  The gap between end of
237 		 * kernel text segment and beginning of first module's text
238 		 * segment is very big.  Therefore do not fill this gap and do
239 		 * not assign it to the kernel dso map (kallsyms).
240 		 *
241 		 * In kallsyms, it determines module symbols using '[' character
242 		 * like in:
243 		 *   ffffffffc1937000 T hdmi_driver_init  [snd_hda_codec_hdmi]
244 		 */
245 		if (prev->end == prev->start) {
246 			/* Last kernel/module symbol mapped to end of page */
247 			if (is_kallsyms && (!strchr(prev->name, '[') !=
248 					    !strchr(curr->name, '[')))
249 				prev->end = roundup(prev->end + 4096, 4096);
250 			else
251 				prev->end = curr->start;
252 
253 			pr_debug4("%s sym:%s end:%#" PRIx64 "\n",
254 				  __func__, prev->name, prev->end);
255 		}
256 	}
257 
258 	/* Last entry */
259 	if (curr->end == curr->start)
260 		curr->end = roundup(curr->start, 4096) + 4096;
261 }
262 
263 struct symbol *symbol__new(u64 start, u64 len, u8 binding, u8 type, const char *name)
264 {
265 	size_t namelen = strlen(name) + 1;
266 	struct symbol *sym = calloc(1, (symbol_conf.priv_size +
267 					sizeof(*sym) + namelen));
268 	if (sym == NULL)
269 		return NULL;
270 
271 	if (symbol_conf.priv_size) {
272 		if (symbol_conf.init_annotation) {
273 			struct annotation *notes = (void *)sym;
274 			annotation__init(notes);
275 		}
276 		sym = ((void *)sym) + symbol_conf.priv_size;
277 	}
278 
279 	sym->start   = start;
280 	sym->end     = len ? start + len : start;
281 	sym->type    = type;
282 	sym->binding = binding;
283 	sym->namelen = namelen - 1;
284 
285 	pr_debug4("%s: %s %#" PRIx64 "-%#" PRIx64 "\n",
286 		  __func__, name, start, sym->end);
287 	memcpy(sym->name, name, namelen);
288 
289 	return sym;
290 }
291 
292 void symbol__delete(struct symbol *sym)
293 {
294 	if (symbol_conf.priv_size) {
295 		if (symbol_conf.init_annotation) {
296 			struct annotation *notes = symbol__annotation(sym);
297 
298 			annotation__exit(notes);
299 		}
300 	}
301 	free(((void *)sym) - symbol_conf.priv_size);
302 }
303 
304 void symbols__delete(struct rb_root_cached *symbols)
305 {
306 	struct symbol *pos;
307 	struct rb_node *next = rb_first_cached(symbols);
308 
309 	while (next) {
310 		pos = rb_entry(next, struct symbol, rb_node);
311 		next = rb_next(&pos->rb_node);
312 		rb_erase_cached(&pos->rb_node, symbols);
313 		symbol__delete(pos);
314 	}
315 }
316 
317 void __symbols__insert(struct rb_root_cached *symbols,
318 		       struct symbol *sym, bool kernel)
319 {
320 	struct rb_node **p = &symbols->rb_root.rb_node;
321 	struct rb_node *parent = NULL;
322 	const u64 ip = sym->start;
323 	struct symbol *s;
324 	bool leftmost = true;
325 
326 	if (kernel) {
327 		const char *name = sym->name;
328 		/*
329 		 * ppc64 uses function descriptors and appends a '.' to the
330 		 * start of every instruction address. Remove it.
331 		 */
332 		if (name[0] == '.')
333 			name++;
334 		sym->idle = symbol__is_idle(name);
335 	}
336 
337 	while (*p != NULL) {
338 		parent = *p;
339 		s = rb_entry(parent, struct symbol, rb_node);
340 		if (ip < s->start)
341 			p = &(*p)->rb_left;
342 		else {
343 			p = &(*p)->rb_right;
344 			leftmost = false;
345 		}
346 	}
347 	rb_link_node(&sym->rb_node, parent, p);
348 	rb_insert_color_cached(&sym->rb_node, symbols, leftmost);
349 }
350 
351 void symbols__insert(struct rb_root_cached *symbols, struct symbol *sym)
352 {
353 	__symbols__insert(symbols, sym, false);
354 }
355 
356 static struct symbol *symbols__find(struct rb_root_cached *symbols, u64 ip)
357 {
358 	struct rb_node *n;
359 
360 	if (symbols == NULL)
361 		return NULL;
362 
363 	n = symbols->rb_root.rb_node;
364 
365 	while (n) {
366 		struct symbol *s = rb_entry(n, struct symbol, rb_node);
367 
368 		if (ip < s->start)
369 			n = n->rb_left;
370 		else if (ip > s->end || (ip == s->end && ip != s->start))
371 			n = n->rb_right;
372 		else
373 			return s;
374 	}
375 
376 	return NULL;
377 }
378 
379 static struct symbol *symbols__first(struct rb_root_cached *symbols)
380 {
381 	struct rb_node *n = rb_first_cached(symbols);
382 
383 	if (n)
384 		return rb_entry(n, struct symbol, rb_node);
385 
386 	return NULL;
387 }
388 
389 static struct symbol *symbols__last(struct rb_root_cached *symbols)
390 {
391 	struct rb_node *n = rb_last(&symbols->rb_root);
392 
393 	if (n)
394 		return rb_entry(n, struct symbol, rb_node);
395 
396 	return NULL;
397 }
398 
399 static struct symbol *symbols__next(struct symbol *sym)
400 {
401 	struct rb_node *n = rb_next(&sym->rb_node);
402 
403 	if (n)
404 		return rb_entry(n, struct symbol, rb_node);
405 
406 	return NULL;
407 }
408 
409 static int symbols__sort_name_cmp(const void *vlhs, const void *vrhs)
410 {
411 	const struct symbol *lhs = *((const struct symbol **)vlhs);
412 	const struct symbol *rhs = *((const struct symbol **)vrhs);
413 
414 	return strcmp(lhs->name, rhs->name);
415 }
416 
417 static struct symbol **symbols__sort_by_name(struct rb_root_cached *source, size_t *len)
418 {
419 	struct rb_node *nd;
420 	struct symbol **result;
421 	size_t i = 0, size = 0;
422 
423 	for (nd = rb_first_cached(source); nd; nd = rb_next(nd))
424 		size++;
425 
426 	result = malloc(sizeof(*result) * size);
427 	if (!result)
428 		return NULL;
429 
430 	for (nd = rb_first_cached(source); nd; nd = rb_next(nd)) {
431 		struct symbol *pos = rb_entry(nd, struct symbol, rb_node);
432 
433 		result[i++] = pos;
434 	}
435 	qsort(result, size, sizeof(*result), symbols__sort_name_cmp);
436 	*len = size;
437 	return result;
438 }
439 
440 int symbol__match_symbol_name(const char *name, const char *str,
441 			      enum symbol_tag_include includes)
442 {
443 	const char *versioning;
444 
445 	if (includes == SYMBOL_TAG_INCLUDE__DEFAULT_ONLY &&
446 	    (versioning = strstr(name, "@@"))) {
447 		int len = strlen(str);
448 
449 		if (len < versioning - name)
450 			len = versioning - name;
451 
452 		return arch__compare_symbol_names_n(name, str, len);
453 	} else
454 		return arch__compare_symbol_names(name, str);
455 }
456 
457 static struct symbol *symbols__find_by_name(struct symbol *symbols[],
458 					    size_t symbols_len,
459 					    const char *name,
460 					    enum symbol_tag_include includes,
461 					    size_t *found_idx)
462 {
463 	size_t i, lower = 0, upper = symbols_len;
464 	struct symbol *s = NULL;
465 
466 	if (found_idx)
467 		*found_idx = SIZE_MAX;
468 
469 	if (!symbols_len)
470 		return NULL;
471 
472 	while (lower < upper) {
473 		int cmp;
474 
475 		i = (lower + upper) / 2;
476 		cmp = symbol__match_symbol_name(symbols[i]->name, name, includes);
477 
478 		if (cmp > 0)
479 			upper = i;
480 		else if (cmp < 0)
481 			lower = i + 1;
482 		else {
483 			if (found_idx)
484 				*found_idx = i;
485 			s = symbols[i];
486 			break;
487 		}
488 	}
489 	if (s && includes != SYMBOL_TAG_INCLUDE__DEFAULT_ONLY) {
490 		/* return first symbol that has same name (if any) */
491 		for (; i > 0; i--) {
492 			struct symbol *tmp = symbols[i - 1];
493 
494 			if (!arch__compare_symbol_names(tmp->name, s->name)) {
495 				if (found_idx)
496 					*found_idx = i - 1;
497 				s = tmp;
498 			} else
499 				break;
500 		}
501 	}
502 	assert(!found_idx || !s || s == symbols[*found_idx]);
503 	return s;
504 }
505 
506 void dso__reset_find_symbol_cache(struct dso *dso)
507 {
508 	dso->last_find_result.addr   = 0;
509 	dso->last_find_result.symbol = NULL;
510 }
511 
512 void dso__insert_symbol(struct dso *dso, struct symbol *sym)
513 {
514 	__symbols__insert(&dso->symbols, sym, dso->kernel);
515 
516 	/* update the symbol cache if necessary */
517 	if (dso->last_find_result.addr >= sym->start &&
518 	    (dso->last_find_result.addr < sym->end ||
519 	    sym->start == sym->end)) {
520 		dso->last_find_result.symbol = sym;
521 	}
522 }
523 
524 void dso__delete_symbol(struct dso *dso, struct symbol *sym)
525 {
526 	rb_erase_cached(&sym->rb_node, &dso->symbols);
527 	symbol__delete(sym);
528 	dso__reset_find_symbol_cache(dso);
529 }
530 
531 struct symbol *dso__find_symbol(struct dso *dso, u64 addr)
532 {
533 	if (dso->last_find_result.addr != addr || dso->last_find_result.symbol == NULL) {
534 		dso->last_find_result.addr   = addr;
535 		dso->last_find_result.symbol = symbols__find(&dso->symbols, addr);
536 	}
537 
538 	return dso->last_find_result.symbol;
539 }
540 
541 struct symbol *dso__find_symbol_nocache(struct dso *dso, u64 addr)
542 {
543 	return symbols__find(&dso->symbols, addr);
544 }
545 
546 struct symbol *dso__first_symbol(struct dso *dso)
547 {
548 	return symbols__first(&dso->symbols);
549 }
550 
551 struct symbol *dso__last_symbol(struct dso *dso)
552 {
553 	return symbols__last(&dso->symbols);
554 }
555 
556 struct symbol *dso__next_symbol(struct symbol *sym)
557 {
558 	return symbols__next(sym);
559 }
560 
561 struct symbol *dso__next_symbol_by_name(struct dso *dso, size_t *idx)
562 {
563 	if (*idx + 1 >= dso->symbol_names_len)
564 		return NULL;
565 
566 	++*idx;
567 	return dso->symbol_names[*idx];
568 }
569 
570  /*
571   * Returns first symbol that matched with @name.
572   */
573 struct symbol *dso__find_symbol_by_name(struct dso *dso, const char *name, size_t *idx)
574 {
575 	struct symbol *s = symbols__find_by_name(dso->symbol_names, dso->symbol_names_len,
576 						name, SYMBOL_TAG_INCLUDE__NONE, idx);
577 	if (!s)
578 		s = symbols__find_by_name(dso->symbol_names, dso->symbol_names_len,
579 					name, SYMBOL_TAG_INCLUDE__DEFAULT_ONLY, idx);
580 	return s;
581 }
582 
583 void dso__sort_by_name(struct dso *dso)
584 {
585 	mutex_lock(&dso->lock);
586 	if (!dso__sorted_by_name(dso)) {
587 		size_t len;
588 
589 		dso->symbol_names = symbols__sort_by_name(&dso->symbols, &len);
590 		if (dso->symbol_names) {
591 			dso->symbol_names_len = len;
592 			dso__set_sorted_by_name(dso);
593 		}
594 	}
595 	mutex_unlock(&dso->lock);
596 }
597 
598 /*
599  * While we find nice hex chars, build a long_val.
600  * Return number of chars processed.
601  */
602 static int hex2u64(const char *ptr, u64 *long_val)
603 {
604 	char *p;
605 
606 	*long_val = strtoull(ptr, &p, 16);
607 
608 	return p - ptr;
609 }
610 
611 
612 int modules__parse(const char *filename, void *arg,
613 		   int (*process_module)(void *arg, const char *name,
614 					 u64 start, u64 size))
615 {
616 	char *line = NULL;
617 	size_t n;
618 	FILE *file;
619 	int err = 0;
620 
621 	file = fopen(filename, "r");
622 	if (file == NULL)
623 		return -1;
624 
625 	while (1) {
626 		char name[PATH_MAX];
627 		u64 start, size;
628 		char *sep, *endptr;
629 		ssize_t line_len;
630 
631 		line_len = getline(&line, &n, file);
632 		if (line_len < 0) {
633 			if (feof(file))
634 				break;
635 			err = -1;
636 			goto out;
637 		}
638 
639 		if (!line) {
640 			err = -1;
641 			goto out;
642 		}
643 
644 		line[--line_len] = '\0'; /* \n */
645 
646 		sep = strrchr(line, 'x');
647 		if (sep == NULL)
648 			continue;
649 
650 		hex2u64(sep + 1, &start);
651 
652 		sep = strchr(line, ' ');
653 		if (sep == NULL)
654 			continue;
655 
656 		*sep = '\0';
657 
658 		scnprintf(name, sizeof(name), "[%s]", line);
659 
660 		size = strtoul(sep + 1, &endptr, 0);
661 		if (*endptr != ' ' && *endptr != '\t')
662 			continue;
663 
664 		err = process_module(arg, name, start, size);
665 		if (err)
666 			break;
667 	}
668 out:
669 	free(line);
670 	fclose(file);
671 	return err;
672 }
673 
674 /*
675  * These are symbols in the kernel image, so make sure that
676  * sym is from a kernel DSO.
677  */
678 static bool symbol__is_idle(const char *name)
679 {
680 	const char * const idle_symbols[] = {
681 		"acpi_idle_do_entry",
682 		"acpi_processor_ffh_cstate_enter",
683 		"arch_cpu_idle",
684 		"cpu_idle",
685 		"cpu_startup_entry",
686 		"idle_cpu",
687 		"intel_idle",
688 		"intel_idle_ibrs",
689 		"default_idle",
690 		"native_safe_halt",
691 		"enter_idle",
692 		"exit_idle",
693 		"mwait_idle",
694 		"mwait_idle_with_hints",
695 		"mwait_idle_with_hints.constprop.0",
696 		"poll_idle",
697 		"ppc64_runlatch_off",
698 		"pseries_dedicated_idle_sleep",
699 		"psw_idle",
700 		"psw_idle_exit",
701 		NULL
702 	};
703 	int i;
704 	static struct strlist *idle_symbols_list;
705 
706 	if (idle_symbols_list)
707 		return strlist__has_entry(idle_symbols_list, name);
708 
709 	idle_symbols_list = strlist__new(NULL, NULL);
710 
711 	for (i = 0; idle_symbols[i]; i++)
712 		strlist__add(idle_symbols_list, idle_symbols[i]);
713 
714 	return strlist__has_entry(idle_symbols_list, name);
715 }
716 
717 static int map__process_kallsym_symbol(void *arg, const char *name,
718 				       char type, u64 start)
719 {
720 	struct symbol *sym;
721 	struct dso *dso = arg;
722 	struct rb_root_cached *root = &dso->symbols;
723 
724 	if (!symbol_type__filter(type))
725 		return 0;
726 
727 	/* Ignore local symbols for ARM modules */
728 	if (name[0] == '$')
729 		return 0;
730 
731 	/*
732 	 * module symbols are not sorted so we add all
733 	 * symbols, setting length to 0, and rely on
734 	 * symbols__fixup_end() to fix it up.
735 	 */
736 	sym = symbol__new(start, 0, kallsyms2elf_binding(type), kallsyms2elf_type(type), name);
737 	if (sym == NULL)
738 		return -ENOMEM;
739 	/*
740 	 * We will pass the symbols to the filter later, in
741 	 * map__split_kallsyms, when we have split the maps per module
742 	 */
743 	__symbols__insert(root, sym, !strchr(name, '['));
744 
745 	return 0;
746 }
747 
748 /*
749  * Loads the function entries in /proc/kallsyms into kernel_map->dso,
750  * so that we can in the next step set the symbol ->end address and then
751  * call kernel_maps__split_kallsyms.
752  */
753 static int dso__load_all_kallsyms(struct dso *dso, const char *filename)
754 {
755 	return kallsyms__parse(filename, dso, map__process_kallsym_symbol);
756 }
757 
758 static int maps__split_kallsyms_for_kcore(struct maps *kmaps, struct dso *dso)
759 {
760 	struct map *curr_map;
761 	struct symbol *pos;
762 	int count = 0;
763 	struct rb_root_cached old_root = dso->symbols;
764 	struct rb_root_cached *root = &dso->symbols;
765 	struct rb_node *next = rb_first_cached(root);
766 
767 	if (!kmaps)
768 		return -1;
769 
770 	*root = RB_ROOT_CACHED;
771 
772 	while (next) {
773 		struct dso *curr_map_dso;
774 		char *module;
775 
776 		pos = rb_entry(next, struct symbol, rb_node);
777 		next = rb_next(&pos->rb_node);
778 
779 		rb_erase_cached(&pos->rb_node, &old_root);
780 		RB_CLEAR_NODE(&pos->rb_node);
781 		module = strchr(pos->name, '\t');
782 		if (module)
783 			*module = '\0';
784 
785 		curr_map = maps__find(kmaps, pos->start);
786 
787 		if (!curr_map) {
788 			symbol__delete(pos);
789 			continue;
790 		}
791 		curr_map_dso = map__dso(curr_map);
792 		pos->start -= map__start(curr_map) - map__pgoff(curr_map);
793 		if (pos->end > map__end(curr_map))
794 			pos->end = map__end(curr_map);
795 		if (pos->end)
796 			pos->end -= map__start(curr_map) - map__pgoff(curr_map);
797 		symbols__insert(&curr_map_dso->symbols, pos);
798 		++count;
799 	}
800 
801 	/* Symbols have been adjusted */
802 	dso->adjust_symbols = 1;
803 
804 	return count;
805 }
806 
807 /*
808  * Split the symbols into maps, making sure there are no overlaps, i.e. the
809  * kernel range is broken in several maps, named [kernel].N, as we don't have
810  * the original ELF section names vmlinux have.
811  */
812 static int maps__split_kallsyms(struct maps *kmaps, struct dso *dso, u64 delta,
813 				struct map *initial_map)
814 {
815 	struct machine *machine;
816 	struct map *curr_map = initial_map;
817 	struct symbol *pos;
818 	int count = 0, moved = 0;
819 	struct rb_root_cached *root = &dso->symbols;
820 	struct rb_node *next = rb_first_cached(root);
821 	int kernel_range = 0;
822 	bool x86_64;
823 
824 	if (!kmaps)
825 		return -1;
826 
827 	machine = maps__machine(kmaps);
828 
829 	x86_64 = machine__is(machine, "x86_64");
830 
831 	while (next) {
832 		char *module;
833 
834 		pos = rb_entry(next, struct symbol, rb_node);
835 		next = rb_next(&pos->rb_node);
836 
837 		module = strchr(pos->name, '\t');
838 		if (module) {
839 			struct dso *curr_map_dso;
840 
841 			if (!symbol_conf.use_modules)
842 				goto discard_symbol;
843 
844 			*module++ = '\0';
845 			curr_map_dso = map__dso(curr_map);
846 			if (strcmp(curr_map_dso->short_name, module)) {
847 				if (!RC_CHK_EQUAL(curr_map, initial_map) &&
848 				    dso->kernel == DSO_SPACE__KERNEL_GUEST &&
849 				    machine__is_default_guest(machine)) {
850 					/*
851 					 * We assume all symbols of a module are
852 					 * continuous in * kallsyms, so curr_map
853 					 * points to a module and all its
854 					 * symbols are in its kmap. Mark it as
855 					 * loaded.
856 					 */
857 					dso__set_loaded(curr_map_dso);
858 				}
859 
860 				curr_map = maps__find_by_name(kmaps, module);
861 				if (curr_map == NULL) {
862 					pr_debug("%s/proc/{kallsyms,modules} "
863 					         "inconsistency while looking "
864 						 "for \"%s\" module!\n",
865 						 machine->root_dir, module);
866 					curr_map = initial_map;
867 					goto discard_symbol;
868 				}
869 				curr_map_dso = map__dso(curr_map);
870 				if (curr_map_dso->loaded &&
871 				    !machine__is_default_guest(machine))
872 					goto discard_symbol;
873 			}
874 			/*
875 			 * So that we look just like we get from .ko files,
876 			 * i.e. not prelinked, relative to initial_map->start.
877 			 */
878 			pos->start = map__map_ip(curr_map, pos->start);
879 			pos->end   = map__map_ip(curr_map, pos->end);
880 		} else if (x86_64 && is_entry_trampoline(pos->name)) {
881 			/*
882 			 * These symbols are not needed anymore since the
883 			 * trampoline maps refer to the text section and it's
884 			 * symbols instead. Avoid having to deal with
885 			 * relocations, and the assumption that the first symbol
886 			 * is the start of kernel text, by simply removing the
887 			 * symbols at this point.
888 			 */
889 			goto discard_symbol;
890 		} else if (curr_map != initial_map) {
891 			char dso_name[PATH_MAX];
892 			struct dso *ndso;
893 
894 			if (delta) {
895 				/* Kernel was relocated at boot time */
896 				pos->start -= delta;
897 				pos->end -= delta;
898 			}
899 
900 			if (count == 0) {
901 				curr_map = initial_map;
902 				goto add_symbol;
903 			}
904 
905 			if (dso->kernel == DSO_SPACE__KERNEL_GUEST)
906 				snprintf(dso_name, sizeof(dso_name),
907 					"[guest.kernel].%d",
908 					kernel_range++);
909 			else
910 				snprintf(dso_name, sizeof(dso_name),
911 					"[kernel].%d",
912 					kernel_range++);
913 
914 			ndso = dso__new(dso_name);
915 			if (ndso == NULL)
916 				return -1;
917 
918 			ndso->kernel = dso->kernel;
919 
920 			curr_map = map__new2(pos->start, ndso);
921 			if (curr_map == NULL) {
922 				dso__put(ndso);
923 				return -1;
924 			}
925 
926 			map__set_mapping_type(curr_map, MAPPING_TYPE__IDENTITY);
927 			if (maps__insert(kmaps, curr_map)) {
928 				dso__put(ndso);
929 				return -1;
930 			}
931 			++kernel_range;
932 		} else if (delta) {
933 			/* Kernel was relocated at boot time */
934 			pos->start -= delta;
935 			pos->end -= delta;
936 		}
937 add_symbol:
938 		if (curr_map != initial_map) {
939 			struct dso *curr_map_dso = map__dso(curr_map);
940 
941 			rb_erase_cached(&pos->rb_node, root);
942 			symbols__insert(&curr_map_dso->symbols, pos);
943 			++moved;
944 		} else
945 			++count;
946 
947 		continue;
948 discard_symbol:
949 		rb_erase_cached(&pos->rb_node, root);
950 		symbol__delete(pos);
951 	}
952 
953 	if (curr_map != initial_map &&
954 	    dso->kernel == DSO_SPACE__KERNEL_GUEST &&
955 	    machine__is_default_guest(maps__machine(kmaps))) {
956 		dso__set_loaded(map__dso(curr_map));
957 	}
958 
959 	return count + moved;
960 }
961 
962 bool symbol__restricted_filename(const char *filename,
963 				 const char *restricted_filename)
964 {
965 	bool restricted = false;
966 
967 	if (symbol_conf.kptr_restrict) {
968 		char *r = realpath(filename, NULL);
969 
970 		if (r != NULL) {
971 			restricted = strcmp(r, restricted_filename) == 0;
972 			free(r);
973 			return restricted;
974 		}
975 	}
976 
977 	return restricted;
978 }
979 
980 struct module_info {
981 	struct rb_node rb_node;
982 	char *name;
983 	u64 start;
984 };
985 
986 static void add_module(struct module_info *mi, struct rb_root *modules)
987 {
988 	struct rb_node **p = &modules->rb_node;
989 	struct rb_node *parent = NULL;
990 	struct module_info *m;
991 
992 	while (*p != NULL) {
993 		parent = *p;
994 		m = rb_entry(parent, struct module_info, rb_node);
995 		if (strcmp(mi->name, m->name) < 0)
996 			p = &(*p)->rb_left;
997 		else
998 			p = &(*p)->rb_right;
999 	}
1000 	rb_link_node(&mi->rb_node, parent, p);
1001 	rb_insert_color(&mi->rb_node, modules);
1002 }
1003 
1004 static void delete_modules(struct rb_root *modules)
1005 {
1006 	struct module_info *mi;
1007 	struct rb_node *next = rb_first(modules);
1008 
1009 	while (next) {
1010 		mi = rb_entry(next, struct module_info, rb_node);
1011 		next = rb_next(&mi->rb_node);
1012 		rb_erase(&mi->rb_node, modules);
1013 		zfree(&mi->name);
1014 		free(mi);
1015 	}
1016 }
1017 
1018 static struct module_info *find_module(const char *name,
1019 				       struct rb_root *modules)
1020 {
1021 	struct rb_node *n = modules->rb_node;
1022 
1023 	while (n) {
1024 		struct module_info *m;
1025 		int cmp;
1026 
1027 		m = rb_entry(n, struct module_info, rb_node);
1028 		cmp = strcmp(name, m->name);
1029 		if (cmp < 0)
1030 			n = n->rb_left;
1031 		else if (cmp > 0)
1032 			n = n->rb_right;
1033 		else
1034 			return m;
1035 	}
1036 
1037 	return NULL;
1038 }
1039 
1040 static int __read_proc_modules(void *arg, const char *name, u64 start,
1041 			       u64 size __maybe_unused)
1042 {
1043 	struct rb_root *modules = arg;
1044 	struct module_info *mi;
1045 
1046 	mi = zalloc(sizeof(struct module_info));
1047 	if (!mi)
1048 		return -ENOMEM;
1049 
1050 	mi->name = strdup(name);
1051 	mi->start = start;
1052 
1053 	if (!mi->name) {
1054 		free(mi);
1055 		return -ENOMEM;
1056 	}
1057 
1058 	add_module(mi, modules);
1059 
1060 	return 0;
1061 }
1062 
1063 static int read_proc_modules(const char *filename, struct rb_root *modules)
1064 {
1065 	if (symbol__restricted_filename(filename, "/proc/modules"))
1066 		return -1;
1067 
1068 	if (modules__parse(filename, modules, __read_proc_modules)) {
1069 		delete_modules(modules);
1070 		return -1;
1071 	}
1072 
1073 	return 0;
1074 }
1075 
1076 int compare_proc_modules(const char *from, const char *to)
1077 {
1078 	struct rb_root from_modules = RB_ROOT;
1079 	struct rb_root to_modules = RB_ROOT;
1080 	struct rb_node *from_node, *to_node;
1081 	struct module_info *from_m, *to_m;
1082 	int ret = -1;
1083 
1084 	if (read_proc_modules(from, &from_modules))
1085 		return -1;
1086 
1087 	if (read_proc_modules(to, &to_modules))
1088 		goto out_delete_from;
1089 
1090 	from_node = rb_first(&from_modules);
1091 	to_node = rb_first(&to_modules);
1092 	while (from_node) {
1093 		if (!to_node)
1094 			break;
1095 
1096 		from_m = rb_entry(from_node, struct module_info, rb_node);
1097 		to_m = rb_entry(to_node, struct module_info, rb_node);
1098 
1099 		if (from_m->start != to_m->start ||
1100 		    strcmp(from_m->name, to_m->name))
1101 			break;
1102 
1103 		from_node = rb_next(from_node);
1104 		to_node = rb_next(to_node);
1105 	}
1106 
1107 	if (!from_node && !to_node)
1108 		ret = 0;
1109 
1110 	delete_modules(&to_modules);
1111 out_delete_from:
1112 	delete_modules(&from_modules);
1113 
1114 	return ret;
1115 }
1116 
1117 static int do_validate_kcore_modules(const char *filename, struct maps *kmaps)
1118 {
1119 	struct rb_root modules = RB_ROOT;
1120 	struct map_rb_node *old_node;
1121 	int err;
1122 
1123 	err = read_proc_modules(filename, &modules);
1124 	if (err)
1125 		return err;
1126 
1127 	maps__for_each_entry(kmaps, old_node) {
1128 		struct map *old_map = old_node->map;
1129 		struct module_info *mi;
1130 		struct dso *dso;
1131 
1132 		if (!__map__is_kmodule(old_map)) {
1133 			continue;
1134 		}
1135 		dso = map__dso(old_map);
1136 		/* Module must be in memory at the same address */
1137 		mi = find_module(dso->short_name, &modules);
1138 		if (!mi || mi->start != map__start(old_map)) {
1139 			err = -EINVAL;
1140 			goto out;
1141 		}
1142 	}
1143 out:
1144 	delete_modules(&modules);
1145 	return err;
1146 }
1147 
1148 /*
1149  * If kallsyms is referenced by name then we look for filename in the same
1150  * directory.
1151  */
1152 static bool filename_from_kallsyms_filename(char *filename,
1153 					    const char *base_name,
1154 					    const char *kallsyms_filename)
1155 {
1156 	char *name;
1157 
1158 	strcpy(filename, kallsyms_filename);
1159 	name = strrchr(filename, '/');
1160 	if (!name)
1161 		return false;
1162 
1163 	name += 1;
1164 
1165 	if (!strcmp(name, "kallsyms")) {
1166 		strcpy(name, base_name);
1167 		return true;
1168 	}
1169 
1170 	return false;
1171 }
1172 
1173 static int validate_kcore_modules(const char *kallsyms_filename,
1174 				  struct map *map)
1175 {
1176 	struct maps *kmaps = map__kmaps(map);
1177 	char modules_filename[PATH_MAX];
1178 
1179 	if (!kmaps)
1180 		return -EINVAL;
1181 
1182 	if (!filename_from_kallsyms_filename(modules_filename, "modules",
1183 					     kallsyms_filename))
1184 		return -EINVAL;
1185 
1186 	if (do_validate_kcore_modules(modules_filename, kmaps))
1187 		return -EINVAL;
1188 
1189 	return 0;
1190 }
1191 
1192 static int validate_kcore_addresses(const char *kallsyms_filename,
1193 				    struct map *map)
1194 {
1195 	struct kmap *kmap = map__kmap(map);
1196 
1197 	if (!kmap)
1198 		return -EINVAL;
1199 
1200 	if (kmap->ref_reloc_sym && kmap->ref_reloc_sym->name) {
1201 		u64 start;
1202 
1203 		if (kallsyms__get_function_start(kallsyms_filename,
1204 						 kmap->ref_reloc_sym->name, &start))
1205 			return -ENOENT;
1206 		if (start != kmap->ref_reloc_sym->addr)
1207 			return -EINVAL;
1208 	}
1209 
1210 	return validate_kcore_modules(kallsyms_filename, map);
1211 }
1212 
1213 struct kcore_mapfn_data {
1214 	struct dso *dso;
1215 	struct list_head maps;
1216 };
1217 
1218 static int kcore_mapfn(u64 start, u64 len, u64 pgoff, void *data)
1219 {
1220 	struct kcore_mapfn_data *md = data;
1221 	struct map_list_node *list_node = map_list_node__new();
1222 
1223 	if (!list_node)
1224 		return -ENOMEM;
1225 
1226 	list_node->map = map__new2(start, md->dso);
1227 	if (!list_node->map) {
1228 		free(list_node);
1229 		return -ENOMEM;
1230 	}
1231 
1232 	map__set_end(list_node->map, map__start(list_node->map) + len);
1233 	map__set_pgoff(list_node->map, pgoff);
1234 
1235 	list_add(&list_node->node, &md->maps);
1236 
1237 	return 0;
1238 }
1239 
1240 static int dso__load_kcore(struct dso *dso, struct map *map,
1241 			   const char *kallsyms_filename)
1242 {
1243 	struct maps *kmaps = map__kmaps(map);
1244 	struct kcore_mapfn_data md;
1245 	struct map *replacement_map = NULL;
1246 	struct map_rb_node *old_node, *next;
1247 	struct machine *machine;
1248 	bool is_64_bit;
1249 	int err, fd;
1250 	char kcore_filename[PATH_MAX];
1251 	u64 stext;
1252 
1253 	if (!kmaps)
1254 		return -EINVAL;
1255 
1256 	machine = maps__machine(kmaps);
1257 
1258 	/* This function requires that the map is the kernel map */
1259 	if (!__map__is_kernel(map))
1260 		return -EINVAL;
1261 
1262 	if (!filename_from_kallsyms_filename(kcore_filename, "kcore",
1263 					     kallsyms_filename))
1264 		return -EINVAL;
1265 
1266 	/* Modules and kernel must be present at their original addresses */
1267 	if (validate_kcore_addresses(kallsyms_filename, map))
1268 		return -EINVAL;
1269 
1270 	md.dso = dso;
1271 	INIT_LIST_HEAD(&md.maps);
1272 
1273 	fd = open(kcore_filename, O_RDONLY);
1274 	if (fd < 0) {
1275 		pr_debug("Failed to open %s. Note /proc/kcore requires CAP_SYS_RAWIO capability to access.\n",
1276 			 kcore_filename);
1277 		return -EINVAL;
1278 	}
1279 
1280 	/* Read new maps into temporary lists */
1281 	err = file__read_maps(fd, map__prot(map) & PROT_EXEC, kcore_mapfn, &md,
1282 			      &is_64_bit);
1283 	if (err)
1284 		goto out_err;
1285 	dso->is_64_bit = is_64_bit;
1286 
1287 	if (list_empty(&md.maps)) {
1288 		err = -EINVAL;
1289 		goto out_err;
1290 	}
1291 
1292 	/* Remove old maps */
1293 	maps__for_each_entry_safe(kmaps, old_node, next) {
1294 		struct map *old_map = old_node->map;
1295 
1296 		/*
1297 		 * We need to preserve eBPF maps even if they are
1298 		 * covered by kcore, because we need to access
1299 		 * eBPF dso for source data.
1300 		 */
1301 		if (old_map != map && !__map__is_bpf_prog(old_map))
1302 			maps__remove(kmaps, old_map);
1303 	}
1304 	machine->trampolines_mapped = false;
1305 
1306 	/* Find the kernel map using the '_stext' symbol */
1307 	if (!kallsyms__get_function_start(kallsyms_filename, "_stext", &stext)) {
1308 		u64 replacement_size = 0;
1309 		struct map_list_node *new_node;
1310 
1311 		list_for_each_entry(new_node, &md.maps, node) {
1312 			struct map *new_map = new_node->map;
1313 			u64 new_size = map__size(new_map);
1314 
1315 			if (!(stext >= map__start(new_map) && stext < map__end(new_map)))
1316 				continue;
1317 
1318 			/*
1319 			 * On some architectures, ARM64 for example, the kernel
1320 			 * text can get allocated inside of the vmalloc segment.
1321 			 * Select the smallest matching segment, in case stext
1322 			 * falls within more than one in the list.
1323 			 */
1324 			if (!replacement_map || new_size < replacement_size) {
1325 				replacement_map = new_map;
1326 				replacement_size = new_size;
1327 			}
1328 		}
1329 	}
1330 
1331 	if (!replacement_map)
1332 		replacement_map = list_entry(md.maps.next, struct map_list_node, node)->map;
1333 
1334 	/* Add new maps */
1335 	while (!list_empty(&md.maps)) {
1336 		struct map_list_node *new_node = list_entry(md.maps.next, struct map_list_node, node);
1337 		struct map *new_map = new_node->map;
1338 
1339 		list_del_init(&new_node->node);
1340 
1341 		if (RC_CHK_EQUAL(new_map, replacement_map)) {
1342 			struct map *map_ref;
1343 
1344 			map__set_start(map, map__start(new_map));
1345 			map__set_end(map, map__end(new_map));
1346 			map__set_pgoff(map, map__pgoff(new_map));
1347 			map__set_mapping_type(map, map__mapping_type(new_map));
1348 			/* Ensure maps are correctly ordered */
1349 			map_ref = map__get(map);
1350 			maps__remove(kmaps, map_ref);
1351 			err = maps__insert(kmaps, map_ref);
1352 			map__put(map_ref);
1353 			map__put(new_map);
1354 			if (err)
1355 				goto out_err;
1356 		} else {
1357 			/*
1358 			 * Merge kcore map into existing maps,
1359 			 * and ensure that current maps (eBPF)
1360 			 * stay intact.
1361 			 */
1362 			if (maps__merge_in(kmaps, new_map)) {
1363 				err = -EINVAL;
1364 				goto out_err;
1365 			}
1366 		}
1367 		free(new_node);
1368 	}
1369 
1370 	if (machine__is(machine, "x86_64")) {
1371 		u64 addr;
1372 
1373 		/*
1374 		 * If one of the corresponding symbols is there, assume the
1375 		 * entry trampoline maps are too.
1376 		 */
1377 		if (!kallsyms__get_function_start(kallsyms_filename,
1378 						  ENTRY_TRAMPOLINE_NAME,
1379 						  &addr))
1380 			machine->trampolines_mapped = true;
1381 	}
1382 
1383 	/*
1384 	 * Set the data type and long name so that kcore can be read via
1385 	 * dso__data_read_addr().
1386 	 */
1387 	if (dso->kernel == DSO_SPACE__KERNEL_GUEST)
1388 		dso->binary_type = DSO_BINARY_TYPE__GUEST_KCORE;
1389 	else
1390 		dso->binary_type = DSO_BINARY_TYPE__KCORE;
1391 	dso__set_long_name(dso, strdup(kcore_filename), true);
1392 
1393 	close(fd);
1394 
1395 	if (map__prot(map) & PROT_EXEC)
1396 		pr_debug("Using %s for kernel object code\n", kcore_filename);
1397 	else
1398 		pr_debug("Using %s for kernel data\n", kcore_filename);
1399 
1400 	return 0;
1401 
1402 out_err:
1403 	while (!list_empty(&md.maps)) {
1404 		struct map_list_node *list_node;
1405 
1406 		list_node = list_entry(md.maps.next, struct map_list_node, node);
1407 		list_del_init(&list_node->node);
1408 		map__zput(list_node->map);
1409 		free(list_node);
1410 	}
1411 	close(fd);
1412 	return err;
1413 }
1414 
1415 /*
1416  * If the kernel is relocated at boot time, kallsyms won't match.  Compute the
1417  * delta based on the relocation reference symbol.
1418  */
1419 static int kallsyms__delta(struct kmap *kmap, const char *filename, u64 *delta)
1420 {
1421 	u64 addr;
1422 
1423 	if (!kmap->ref_reloc_sym || !kmap->ref_reloc_sym->name)
1424 		return 0;
1425 
1426 	if (kallsyms__get_function_start(filename, kmap->ref_reloc_sym->name, &addr))
1427 		return -1;
1428 
1429 	*delta = addr - kmap->ref_reloc_sym->addr;
1430 	return 0;
1431 }
1432 
1433 int __dso__load_kallsyms(struct dso *dso, const char *filename,
1434 			 struct map *map, bool no_kcore)
1435 {
1436 	struct kmap *kmap = map__kmap(map);
1437 	u64 delta = 0;
1438 
1439 	if (symbol__restricted_filename(filename, "/proc/kallsyms"))
1440 		return -1;
1441 
1442 	if (!kmap || !kmap->kmaps)
1443 		return -1;
1444 
1445 	if (dso__load_all_kallsyms(dso, filename) < 0)
1446 		return -1;
1447 
1448 	if (kallsyms__delta(kmap, filename, &delta))
1449 		return -1;
1450 
1451 	symbols__fixup_end(&dso->symbols, true);
1452 	symbols__fixup_duplicate(&dso->symbols);
1453 
1454 	if (dso->kernel == DSO_SPACE__KERNEL_GUEST)
1455 		dso->symtab_type = DSO_BINARY_TYPE__GUEST_KALLSYMS;
1456 	else
1457 		dso->symtab_type = DSO_BINARY_TYPE__KALLSYMS;
1458 
1459 	if (!no_kcore && !dso__load_kcore(dso, map, filename))
1460 		return maps__split_kallsyms_for_kcore(kmap->kmaps, dso);
1461 	else
1462 		return maps__split_kallsyms(kmap->kmaps, dso, delta, map);
1463 }
1464 
1465 int dso__load_kallsyms(struct dso *dso, const char *filename,
1466 		       struct map *map)
1467 {
1468 	return __dso__load_kallsyms(dso, filename, map, false);
1469 }
1470 
1471 static int dso__load_perf_map(const char *map_path, struct dso *dso)
1472 {
1473 	char *line = NULL;
1474 	size_t n;
1475 	FILE *file;
1476 	int nr_syms = 0;
1477 
1478 	file = fopen(map_path, "r");
1479 	if (file == NULL)
1480 		goto out_failure;
1481 
1482 	while (!feof(file)) {
1483 		u64 start, size;
1484 		struct symbol *sym;
1485 		int line_len, len;
1486 
1487 		line_len = getline(&line, &n, file);
1488 		if (line_len < 0)
1489 			break;
1490 
1491 		if (!line)
1492 			goto out_failure;
1493 
1494 		line[--line_len] = '\0'; /* \n */
1495 
1496 		len = hex2u64(line, &start);
1497 
1498 		len++;
1499 		if (len + 2 >= line_len)
1500 			continue;
1501 
1502 		len += hex2u64(line + len, &size);
1503 
1504 		len++;
1505 		if (len + 2 >= line_len)
1506 			continue;
1507 
1508 		sym = symbol__new(start, size, STB_GLOBAL, STT_FUNC, line + len);
1509 
1510 		if (sym == NULL)
1511 			goto out_delete_line;
1512 
1513 		symbols__insert(&dso->symbols, sym);
1514 		nr_syms++;
1515 	}
1516 
1517 	free(line);
1518 	fclose(file);
1519 
1520 	return nr_syms;
1521 
1522 out_delete_line:
1523 	free(line);
1524 out_failure:
1525 	return -1;
1526 }
1527 
1528 #ifdef HAVE_LIBBFD_SUPPORT
1529 #define PACKAGE 'perf'
1530 #include <bfd.h>
1531 
1532 static int bfd_symbols__cmpvalue(const void *a, const void *b)
1533 {
1534 	const asymbol *as = *(const asymbol **)a, *bs = *(const asymbol **)b;
1535 
1536 	if (bfd_asymbol_value(as) != bfd_asymbol_value(bs))
1537 		return bfd_asymbol_value(as) - bfd_asymbol_value(bs);
1538 
1539 	return bfd_asymbol_name(as)[0] - bfd_asymbol_name(bs)[0];
1540 }
1541 
1542 static int bfd2elf_binding(asymbol *symbol)
1543 {
1544 	if (symbol->flags & BSF_WEAK)
1545 		return STB_WEAK;
1546 	if (symbol->flags & BSF_GLOBAL)
1547 		return STB_GLOBAL;
1548 	if (symbol->flags & BSF_LOCAL)
1549 		return STB_LOCAL;
1550 	return -1;
1551 }
1552 
1553 int dso__load_bfd_symbols(struct dso *dso, const char *debugfile)
1554 {
1555 	int err = -1;
1556 	long symbols_size, symbols_count, i;
1557 	asection *section;
1558 	asymbol **symbols, *sym;
1559 	struct symbol *symbol;
1560 	bfd *abfd;
1561 	u64 start, len;
1562 
1563 	abfd = bfd_openr(debugfile, NULL);
1564 	if (!abfd)
1565 		return -1;
1566 
1567 	if (!bfd_check_format(abfd, bfd_object)) {
1568 		pr_debug2("%s: cannot read %s bfd file.\n", __func__,
1569 			  dso->long_name);
1570 		goto out_close;
1571 	}
1572 
1573 	if (bfd_get_flavour(abfd) == bfd_target_elf_flavour)
1574 		goto out_close;
1575 
1576 	symbols_size = bfd_get_symtab_upper_bound(abfd);
1577 	if (symbols_size == 0) {
1578 		bfd_close(abfd);
1579 		return 0;
1580 	}
1581 
1582 	if (symbols_size < 0)
1583 		goto out_close;
1584 
1585 	symbols = malloc(symbols_size);
1586 	if (!symbols)
1587 		goto out_close;
1588 
1589 	symbols_count = bfd_canonicalize_symtab(abfd, symbols);
1590 	if (symbols_count < 0)
1591 		goto out_free;
1592 
1593 	section = bfd_get_section_by_name(abfd, ".text");
1594 	if (section) {
1595 		for (i = 0; i < symbols_count; ++i) {
1596 			if (!strcmp(bfd_asymbol_name(symbols[i]), "__ImageBase") ||
1597 			    !strcmp(bfd_asymbol_name(symbols[i]), "__image_base__"))
1598 				break;
1599 		}
1600 		if (i < symbols_count) {
1601 			/* PE symbols can only have 4 bytes, so use .text high bits */
1602 			dso->text_offset = section->vma - (u32)section->vma;
1603 			dso->text_offset += (u32)bfd_asymbol_value(symbols[i]);
1604 			dso->text_end = (section->vma - dso->text_offset) + section->size;
1605 		} else {
1606 			dso->text_offset = section->vma - section->filepos;
1607 			dso->text_end = section->filepos + section->size;
1608 		}
1609 	}
1610 
1611 	qsort(symbols, symbols_count, sizeof(asymbol *), bfd_symbols__cmpvalue);
1612 
1613 #ifdef bfd_get_section
1614 #define bfd_asymbol_section bfd_get_section
1615 #endif
1616 	for (i = 0; i < symbols_count; ++i) {
1617 		sym = symbols[i];
1618 		section = bfd_asymbol_section(sym);
1619 		if (bfd2elf_binding(sym) < 0)
1620 			continue;
1621 
1622 		while (i + 1 < symbols_count &&
1623 		       bfd_asymbol_section(symbols[i + 1]) == section &&
1624 		       bfd2elf_binding(symbols[i + 1]) < 0)
1625 			i++;
1626 
1627 		if (i + 1 < symbols_count &&
1628 		    bfd_asymbol_section(symbols[i + 1]) == section)
1629 			len = symbols[i + 1]->value - sym->value;
1630 		else
1631 			len = section->size - sym->value;
1632 
1633 		start = bfd_asymbol_value(sym) - dso->text_offset;
1634 		symbol = symbol__new(start, len, bfd2elf_binding(sym), STT_FUNC,
1635 				     bfd_asymbol_name(sym));
1636 		if (!symbol)
1637 			goto out_free;
1638 
1639 		symbols__insert(&dso->symbols, symbol);
1640 	}
1641 #ifdef bfd_get_section
1642 #undef bfd_asymbol_section
1643 #endif
1644 
1645 	symbols__fixup_end(&dso->symbols, false);
1646 	symbols__fixup_duplicate(&dso->symbols);
1647 	dso->adjust_symbols = 1;
1648 
1649 	err = 0;
1650 out_free:
1651 	free(symbols);
1652 out_close:
1653 	bfd_close(abfd);
1654 	return err;
1655 }
1656 #endif
1657 
1658 static bool dso__is_compatible_symtab_type(struct dso *dso, bool kmod,
1659 					   enum dso_binary_type type)
1660 {
1661 	switch (type) {
1662 	case DSO_BINARY_TYPE__JAVA_JIT:
1663 	case DSO_BINARY_TYPE__DEBUGLINK:
1664 	case DSO_BINARY_TYPE__SYSTEM_PATH_DSO:
1665 	case DSO_BINARY_TYPE__FEDORA_DEBUGINFO:
1666 	case DSO_BINARY_TYPE__UBUNTU_DEBUGINFO:
1667 	case DSO_BINARY_TYPE__MIXEDUP_UBUNTU_DEBUGINFO:
1668 	case DSO_BINARY_TYPE__BUILDID_DEBUGINFO:
1669 	case DSO_BINARY_TYPE__OPENEMBEDDED_DEBUGINFO:
1670 		return !kmod && dso->kernel == DSO_SPACE__USER;
1671 
1672 	case DSO_BINARY_TYPE__KALLSYMS:
1673 	case DSO_BINARY_TYPE__VMLINUX:
1674 	case DSO_BINARY_TYPE__KCORE:
1675 		return dso->kernel == DSO_SPACE__KERNEL;
1676 
1677 	case DSO_BINARY_TYPE__GUEST_KALLSYMS:
1678 	case DSO_BINARY_TYPE__GUEST_VMLINUX:
1679 	case DSO_BINARY_TYPE__GUEST_KCORE:
1680 		return dso->kernel == DSO_SPACE__KERNEL_GUEST;
1681 
1682 	case DSO_BINARY_TYPE__GUEST_KMODULE:
1683 	case DSO_BINARY_TYPE__GUEST_KMODULE_COMP:
1684 	case DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE:
1685 	case DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP:
1686 		/*
1687 		 * kernel modules know their symtab type - it's set when
1688 		 * creating a module dso in machine__addnew_module_map().
1689 		 */
1690 		return kmod && dso->symtab_type == type;
1691 
1692 	case DSO_BINARY_TYPE__BUILD_ID_CACHE:
1693 	case DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO:
1694 		return true;
1695 
1696 	case DSO_BINARY_TYPE__BPF_PROG_INFO:
1697 	case DSO_BINARY_TYPE__BPF_IMAGE:
1698 	case DSO_BINARY_TYPE__OOL:
1699 	case DSO_BINARY_TYPE__NOT_FOUND:
1700 	default:
1701 		return false;
1702 	}
1703 }
1704 
1705 /* Checks for the existence of the perf-<pid>.map file in two different
1706  * locations.  First, if the process is a separate mount namespace, check in
1707  * that namespace using the pid of the innermost pid namespace.  If's not in a
1708  * namespace, or the file can't be found there, try in the mount namespace of
1709  * the tracing process using our view of its pid.
1710  */
1711 static int dso__find_perf_map(char *filebuf, size_t bufsz,
1712 			      struct nsinfo **nsip)
1713 {
1714 	struct nscookie nsc;
1715 	struct nsinfo *nsi;
1716 	struct nsinfo *nnsi;
1717 	int rc = -1;
1718 
1719 	nsi = *nsip;
1720 
1721 	if (nsinfo__need_setns(nsi)) {
1722 		snprintf(filebuf, bufsz, "/tmp/perf-%d.map", nsinfo__nstgid(nsi));
1723 		nsinfo__mountns_enter(nsi, &nsc);
1724 		rc = access(filebuf, R_OK);
1725 		nsinfo__mountns_exit(&nsc);
1726 		if (rc == 0)
1727 			return rc;
1728 	}
1729 
1730 	nnsi = nsinfo__copy(nsi);
1731 	if (nnsi) {
1732 		nsinfo__put(nsi);
1733 
1734 		nsinfo__clear_need_setns(nnsi);
1735 		snprintf(filebuf, bufsz, "/tmp/perf-%d.map", nsinfo__tgid(nnsi));
1736 		*nsip = nnsi;
1737 		rc = 0;
1738 	}
1739 
1740 	return rc;
1741 }
1742 
1743 int dso__load(struct dso *dso, struct map *map)
1744 {
1745 	char *name;
1746 	int ret = -1;
1747 	u_int i;
1748 	struct machine *machine = NULL;
1749 	char *root_dir = (char *) "";
1750 	int ss_pos = 0;
1751 	struct symsrc ss_[2];
1752 	struct symsrc *syms_ss = NULL, *runtime_ss = NULL;
1753 	bool kmod;
1754 	bool perfmap;
1755 	struct build_id bid;
1756 	struct nscookie nsc;
1757 	char newmapname[PATH_MAX];
1758 	const char *map_path = dso->long_name;
1759 
1760 	mutex_lock(&dso->lock);
1761 	perfmap = strncmp(dso->name, "/tmp/perf-", 10) == 0;
1762 	if (perfmap) {
1763 		if (dso->nsinfo && (dso__find_perf_map(newmapname,
1764 		    sizeof(newmapname), &dso->nsinfo) == 0)) {
1765 			map_path = newmapname;
1766 		}
1767 	}
1768 
1769 	nsinfo__mountns_enter(dso->nsinfo, &nsc);
1770 
1771 	/* check again under the dso->lock */
1772 	if (dso__loaded(dso)) {
1773 		ret = 1;
1774 		goto out;
1775 	}
1776 
1777 	kmod = dso->symtab_type == DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE ||
1778 		dso->symtab_type == DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP ||
1779 		dso->symtab_type == DSO_BINARY_TYPE__GUEST_KMODULE ||
1780 		dso->symtab_type == DSO_BINARY_TYPE__GUEST_KMODULE_COMP;
1781 
1782 	if (dso->kernel && !kmod) {
1783 		if (dso->kernel == DSO_SPACE__KERNEL)
1784 			ret = dso__load_kernel_sym(dso, map);
1785 		else if (dso->kernel == DSO_SPACE__KERNEL_GUEST)
1786 			ret = dso__load_guest_kernel_sym(dso, map);
1787 
1788 		machine = maps__machine(map__kmaps(map));
1789 		if (machine__is(machine, "x86_64"))
1790 			machine__map_x86_64_entry_trampolines(machine, dso);
1791 		goto out;
1792 	}
1793 
1794 	dso->adjust_symbols = 0;
1795 
1796 	if (perfmap) {
1797 		ret = dso__load_perf_map(map_path, dso);
1798 		dso->symtab_type = ret > 0 ? DSO_BINARY_TYPE__JAVA_JIT :
1799 					     DSO_BINARY_TYPE__NOT_FOUND;
1800 		goto out;
1801 	}
1802 
1803 	if (machine)
1804 		root_dir = machine->root_dir;
1805 
1806 	name = malloc(PATH_MAX);
1807 	if (!name)
1808 		goto out;
1809 
1810 	/*
1811 	 * Read the build id if possible. This is required for
1812 	 * DSO_BINARY_TYPE__BUILDID_DEBUGINFO to work
1813 	 */
1814 	if (!dso->has_build_id &&
1815 	    is_regular_file(dso->long_name)) {
1816 	    __symbol__join_symfs(name, PATH_MAX, dso->long_name);
1817 		if (filename__read_build_id(name, &bid) > 0)
1818 			dso__set_build_id(dso, &bid);
1819 	}
1820 
1821 	/*
1822 	 * Iterate over candidate debug images.
1823 	 * Keep track of "interesting" ones (those which have a symtab, dynsym,
1824 	 * and/or opd section) for processing.
1825 	 */
1826 	for (i = 0; i < DSO_BINARY_TYPE__SYMTAB_CNT; i++) {
1827 		struct symsrc *ss = &ss_[ss_pos];
1828 		bool next_slot = false;
1829 		bool is_reg;
1830 		bool nsexit;
1831 		int bfdrc = -1;
1832 		int sirc = -1;
1833 
1834 		enum dso_binary_type symtab_type = binary_type_symtab[i];
1835 
1836 		nsexit = (symtab_type == DSO_BINARY_TYPE__BUILD_ID_CACHE ||
1837 		    symtab_type == DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO);
1838 
1839 		if (!dso__is_compatible_symtab_type(dso, kmod, symtab_type))
1840 			continue;
1841 
1842 		if (dso__read_binary_type_filename(dso, symtab_type,
1843 						   root_dir, name, PATH_MAX))
1844 			continue;
1845 
1846 		if (nsexit)
1847 			nsinfo__mountns_exit(&nsc);
1848 
1849 		is_reg = is_regular_file(name);
1850 		if (!is_reg && errno == ENOENT && dso->nsinfo) {
1851 			char *new_name = dso__filename_with_chroot(dso, name);
1852 			if (new_name) {
1853 				is_reg = is_regular_file(new_name);
1854 				strlcpy(name, new_name, PATH_MAX);
1855 				free(new_name);
1856 			}
1857 		}
1858 
1859 #ifdef HAVE_LIBBFD_SUPPORT
1860 		if (is_reg)
1861 			bfdrc = dso__load_bfd_symbols(dso, name);
1862 #endif
1863 		if (is_reg && bfdrc < 0)
1864 			sirc = symsrc__init(ss, dso, name, symtab_type);
1865 
1866 		if (nsexit)
1867 			nsinfo__mountns_enter(dso->nsinfo, &nsc);
1868 
1869 		if (bfdrc == 0) {
1870 			ret = 0;
1871 			break;
1872 		}
1873 
1874 		if (!is_reg || sirc < 0)
1875 			continue;
1876 
1877 		if (!syms_ss && symsrc__has_symtab(ss)) {
1878 			syms_ss = ss;
1879 			next_slot = true;
1880 			if (!dso->symsrc_filename)
1881 				dso->symsrc_filename = strdup(name);
1882 		}
1883 
1884 		if (!runtime_ss && symsrc__possibly_runtime(ss)) {
1885 			runtime_ss = ss;
1886 			next_slot = true;
1887 		}
1888 
1889 		if (next_slot) {
1890 			ss_pos++;
1891 
1892 			if (syms_ss && runtime_ss)
1893 				break;
1894 		} else {
1895 			symsrc__destroy(ss);
1896 		}
1897 
1898 	}
1899 
1900 	if (!runtime_ss && !syms_ss)
1901 		goto out_free;
1902 
1903 	if (runtime_ss && !syms_ss) {
1904 		syms_ss = runtime_ss;
1905 	}
1906 
1907 	/* We'll have to hope for the best */
1908 	if (!runtime_ss && syms_ss)
1909 		runtime_ss = syms_ss;
1910 
1911 	if (syms_ss)
1912 		ret = dso__load_sym(dso, map, syms_ss, runtime_ss, kmod);
1913 	else
1914 		ret = -1;
1915 
1916 	if (ret > 0) {
1917 		int nr_plt;
1918 
1919 		nr_plt = dso__synthesize_plt_symbols(dso, runtime_ss);
1920 		if (nr_plt > 0)
1921 			ret += nr_plt;
1922 	}
1923 
1924 	for (; ss_pos > 0; ss_pos--)
1925 		symsrc__destroy(&ss_[ss_pos - 1]);
1926 out_free:
1927 	free(name);
1928 	if (ret < 0 && strstr(dso->name, " (deleted)") != NULL)
1929 		ret = 0;
1930 out:
1931 	dso__set_loaded(dso);
1932 	mutex_unlock(&dso->lock);
1933 	nsinfo__mountns_exit(&nsc);
1934 
1935 	return ret;
1936 }
1937 
1938 int dso__load_vmlinux(struct dso *dso, struct map *map,
1939 		      const char *vmlinux, bool vmlinux_allocated)
1940 {
1941 	int err = -1;
1942 	struct symsrc ss;
1943 	char symfs_vmlinux[PATH_MAX];
1944 	enum dso_binary_type symtab_type;
1945 
1946 	if (vmlinux[0] == '/')
1947 		snprintf(symfs_vmlinux, sizeof(symfs_vmlinux), "%s", vmlinux);
1948 	else
1949 		symbol__join_symfs(symfs_vmlinux, vmlinux);
1950 
1951 	if (dso->kernel == DSO_SPACE__KERNEL_GUEST)
1952 		symtab_type = DSO_BINARY_TYPE__GUEST_VMLINUX;
1953 	else
1954 		symtab_type = DSO_BINARY_TYPE__VMLINUX;
1955 
1956 	if (symsrc__init(&ss, dso, symfs_vmlinux, symtab_type))
1957 		return -1;
1958 
1959 	/*
1960 	 * dso__load_sym() may copy 'dso' which will result in the copies having
1961 	 * an incorrect long name unless we set it here first.
1962 	 */
1963 	dso__set_long_name(dso, vmlinux, vmlinux_allocated);
1964 	if (dso->kernel == DSO_SPACE__KERNEL_GUEST)
1965 		dso->binary_type = DSO_BINARY_TYPE__GUEST_VMLINUX;
1966 	else
1967 		dso->binary_type = DSO_BINARY_TYPE__VMLINUX;
1968 
1969 	err = dso__load_sym(dso, map, &ss, &ss, 0);
1970 	symsrc__destroy(&ss);
1971 
1972 	if (err > 0) {
1973 		dso__set_loaded(dso);
1974 		pr_debug("Using %s for symbols\n", symfs_vmlinux);
1975 	}
1976 
1977 	return err;
1978 }
1979 
1980 int dso__load_vmlinux_path(struct dso *dso, struct map *map)
1981 {
1982 	int i, err = 0;
1983 	char *filename = NULL;
1984 
1985 	pr_debug("Looking at the vmlinux_path (%d entries long)\n",
1986 		 vmlinux_path__nr_entries + 1);
1987 
1988 	for (i = 0; i < vmlinux_path__nr_entries; ++i) {
1989 		err = dso__load_vmlinux(dso, map, vmlinux_path[i], false);
1990 		if (err > 0)
1991 			goto out;
1992 	}
1993 
1994 	if (!symbol_conf.ignore_vmlinux_buildid)
1995 		filename = dso__build_id_filename(dso, NULL, 0, false);
1996 	if (filename != NULL) {
1997 		err = dso__load_vmlinux(dso, map, filename, true);
1998 		if (err > 0)
1999 			goto out;
2000 		free(filename);
2001 	}
2002 out:
2003 	return err;
2004 }
2005 
2006 static bool visible_dir_filter(const char *name, struct dirent *d)
2007 {
2008 	if (d->d_type != DT_DIR)
2009 		return false;
2010 	return lsdir_no_dot_filter(name, d);
2011 }
2012 
2013 static int find_matching_kcore(struct map *map, char *dir, size_t dir_sz)
2014 {
2015 	char kallsyms_filename[PATH_MAX];
2016 	int ret = -1;
2017 	struct strlist *dirs;
2018 	struct str_node *nd;
2019 
2020 	dirs = lsdir(dir, visible_dir_filter);
2021 	if (!dirs)
2022 		return -1;
2023 
2024 	strlist__for_each_entry(nd, dirs) {
2025 		scnprintf(kallsyms_filename, sizeof(kallsyms_filename),
2026 			  "%s/%s/kallsyms", dir, nd->s);
2027 		if (!validate_kcore_addresses(kallsyms_filename, map)) {
2028 			strlcpy(dir, kallsyms_filename, dir_sz);
2029 			ret = 0;
2030 			break;
2031 		}
2032 	}
2033 
2034 	strlist__delete(dirs);
2035 
2036 	return ret;
2037 }
2038 
2039 /*
2040  * Use open(O_RDONLY) to check readability directly instead of access(R_OK)
2041  * since access(R_OK) only checks with real UID/GID but open() use effective
2042  * UID/GID and actual capabilities (e.g. /proc/kcore requires CAP_SYS_RAWIO).
2043  */
2044 static bool filename__readable(const char *file)
2045 {
2046 	int fd = open(file, O_RDONLY);
2047 	if (fd < 0)
2048 		return false;
2049 	close(fd);
2050 	return true;
2051 }
2052 
2053 static char *dso__find_kallsyms(struct dso *dso, struct map *map)
2054 {
2055 	struct build_id bid;
2056 	char sbuild_id[SBUILD_ID_SIZE];
2057 	bool is_host = false;
2058 	char path[PATH_MAX];
2059 
2060 	if (!dso->has_build_id) {
2061 		/*
2062 		 * Last resort, if we don't have a build-id and couldn't find
2063 		 * any vmlinux file, try the running kernel kallsyms table.
2064 		 */
2065 		goto proc_kallsyms;
2066 	}
2067 
2068 	if (sysfs__read_build_id("/sys/kernel/notes", &bid) == 0)
2069 		is_host = dso__build_id_equal(dso, &bid);
2070 
2071 	/* Try a fast path for /proc/kallsyms if possible */
2072 	if (is_host) {
2073 		/*
2074 		 * Do not check the build-id cache, unless we know we cannot use
2075 		 * /proc/kcore or module maps don't match to /proc/kallsyms.
2076 		 * To check readability of /proc/kcore, do not use access(R_OK)
2077 		 * since /proc/kcore requires CAP_SYS_RAWIO to read and access
2078 		 * can't check it.
2079 		 */
2080 		if (filename__readable("/proc/kcore") &&
2081 		    !validate_kcore_addresses("/proc/kallsyms", map))
2082 			goto proc_kallsyms;
2083 	}
2084 
2085 	build_id__sprintf(&dso->bid, sbuild_id);
2086 
2087 	/* Find kallsyms in build-id cache with kcore */
2088 	scnprintf(path, sizeof(path), "%s/%s/%s",
2089 		  buildid_dir, DSO__NAME_KCORE, sbuild_id);
2090 
2091 	if (!find_matching_kcore(map, path, sizeof(path)))
2092 		return strdup(path);
2093 
2094 	/* Use current /proc/kallsyms if possible */
2095 	if (is_host) {
2096 proc_kallsyms:
2097 		return strdup("/proc/kallsyms");
2098 	}
2099 
2100 	/* Finally, find a cache of kallsyms */
2101 	if (!build_id_cache__kallsyms_path(sbuild_id, path, sizeof(path))) {
2102 		pr_err("No kallsyms or vmlinux with build-id %s was found\n",
2103 		       sbuild_id);
2104 		return NULL;
2105 	}
2106 
2107 	return strdup(path);
2108 }
2109 
2110 static int dso__load_kernel_sym(struct dso *dso, struct map *map)
2111 {
2112 	int err;
2113 	const char *kallsyms_filename = NULL;
2114 	char *kallsyms_allocated_filename = NULL;
2115 	char *filename = NULL;
2116 
2117 	/*
2118 	 * Step 1: if the user specified a kallsyms or vmlinux filename, use
2119 	 * it and only it, reporting errors to the user if it cannot be used.
2120 	 *
2121 	 * For instance, try to analyse an ARM perf.data file _without_ a
2122 	 * build-id, or if the user specifies the wrong path to the right
2123 	 * vmlinux file, obviously we can't fallback to another vmlinux (a
2124 	 * x86_86 one, on the machine where analysis is being performed, say),
2125 	 * or worse, /proc/kallsyms.
2126 	 *
2127 	 * If the specified file _has_ a build-id and there is a build-id
2128 	 * section in the perf.data file, we will still do the expected
2129 	 * validation in dso__load_vmlinux and will bail out if they don't
2130 	 * match.
2131 	 */
2132 	if (symbol_conf.kallsyms_name != NULL) {
2133 		kallsyms_filename = symbol_conf.kallsyms_name;
2134 		goto do_kallsyms;
2135 	}
2136 
2137 	if (!symbol_conf.ignore_vmlinux && symbol_conf.vmlinux_name != NULL) {
2138 		return dso__load_vmlinux(dso, map, symbol_conf.vmlinux_name, false);
2139 	}
2140 
2141 	/*
2142 	 * Before checking on common vmlinux locations, check if it's
2143 	 * stored as standard build id binary (not kallsyms) under
2144 	 * .debug cache.
2145 	 */
2146 	if (!symbol_conf.ignore_vmlinux_buildid)
2147 		filename = __dso__build_id_filename(dso, NULL, 0, false, false);
2148 	if (filename != NULL) {
2149 		err = dso__load_vmlinux(dso, map, filename, true);
2150 		if (err > 0)
2151 			return err;
2152 		free(filename);
2153 	}
2154 
2155 	if (!symbol_conf.ignore_vmlinux && vmlinux_path != NULL) {
2156 		err = dso__load_vmlinux_path(dso, map);
2157 		if (err > 0)
2158 			return err;
2159 	}
2160 
2161 	/* do not try local files if a symfs was given */
2162 	if (symbol_conf.symfs[0] != 0)
2163 		return -1;
2164 
2165 	kallsyms_allocated_filename = dso__find_kallsyms(dso, map);
2166 	if (!kallsyms_allocated_filename)
2167 		return -1;
2168 
2169 	kallsyms_filename = kallsyms_allocated_filename;
2170 
2171 do_kallsyms:
2172 	err = dso__load_kallsyms(dso, kallsyms_filename, map);
2173 	if (err > 0)
2174 		pr_debug("Using %s for symbols\n", kallsyms_filename);
2175 	free(kallsyms_allocated_filename);
2176 
2177 	if (err > 0 && !dso__is_kcore(dso)) {
2178 		dso->binary_type = DSO_BINARY_TYPE__KALLSYMS;
2179 		dso__set_long_name(dso, DSO__NAME_KALLSYMS, false);
2180 		map__fixup_start(map);
2181 		map__fixup_end(map);
2182 	}
2183 
2184 	return err;
2185 }
2186 
2187 static int dso__load_guest_kernel_sym(struct dso *dso, struct map *map)
2188 {
2189 	int err;
2190 	const char *kallsyms_filename;
2191 	struct machine *machine = maps__machine(map__kmaps(map));
2192 	char path[PATH_MAX];
2193 
2194 	if (machine->kallsyms_filename) {
2195 		kallsyms_filename = machine->kallsyms_filename;
2196 	} else if (machine__is_default_guest(machine)) {
2197 		/*
2198 		 * if the user specified a vmlinux filename, use it and only
2199 		 * it, reporting errors to the user if it cannot be used.
2200 		 * Or use file guest_kallsyms inputted by user on commandline
2201 		 */
2202 		if (symbol_conf.default_guest_vmlinux_name != NULL) {
2203 			err = dso__load_vmlinux(dso, map,
2204 						symbol_conf.default_guest_vmlinux_name,
2205 						false);
2206 			return err;
2207 		}
2208 
2209 		kallsyms_filename = symbol_conf.default_guest_kallsyms;
2210 		if (!kallsyms_filename)
2211 			return -1;
2212 	} else {
2213 		sprintf(path, "%s/proc/kallsyms", machine->root_dir);
2214 		kallsyms_filename = path;
2215 	}
2216 
2217 	err = dso__load_kallsyms(dso, kallsyms_filename, map);
2218 	if (err > 0)
2219 		pr_debug("Using %s for symbols\n", kallsyms_filename);
2220 	if (err > 0 && !dso__is_kcore(dso)) {
2221 		dso->binary_type = DSO_BINARY_TYPE__GUEST_KALLSYMS;
2222 		dso__set_long_name(dso, machine->mmap_name, false);
2223 		map__fixup_start(map);
2224 		map__fixup_end(map);
2225 	}
2226 
2227 	return err;
2228 }
2229 
2230 static void vmlinux_path__exit(void)
2231 {
2232 	while (--vmlinux_path__nr_entries >= 0)
2233 		zfree(&vmlinux_path[vmlinux_path__nr_entries]);
2234 	vmlinux_path__nr_entries = 0;
2235 
2236 	zfree(&vmlinux_path);
2237 }
2238 
2239 static const char * const vmlinux_paths[] = {
2240 	"vmlinux",
2241 	"/boot/vmlinux"
2242 };
2243 
2244 static const char * const vmlinux_paths_upd[] = {
2245 	"/boot/vmlinux-%s",
2246 	"/usr/lib/debug/boot/vmlinux-%s",
2247 	"/lib/modules/%s/build/vmlinux",
2248 	"/usr/lib/debug/lib/modules/%s/vmlinux",
2249 	"/usr/lib/debug/boot/vmlinux-%s.debug"
2250 };
2251 
2252 static int vmlinux_path__add(const char *new_entry)
2253 {
2254 	vmlinux_path[vmlinux_path__nr_entries] = strdup(new_entry);
2255 	if (vmlinux_path[vmlinux_path__nr_entries] == NULL)
2256 		return -1;
2257 	++vmlinux_path__nr_entries;
2258 
2259 	return 0;
2260 }
2261 
2262 static int vmlinux_path__init(struct perf_env *env)
2263 {
2264 	struct utsname uts;
2265 	char bf[PATH_MAX];
2266 	char *kernel_version;
2267 	unsigned int i;
2268 
2269 	vmlinux_path = malloc(sizeof(char *) * (ARRAY_SIZE(vmlinux_paths) +
2270 			      ARRAY_SIZE(vmlinux_paths_upd)));
2271 	if (vmlinux_path == NULL)
2272 		return -1;
2273 
2274 	for (i = 0; i < ARRAY_SIZE(vmlinux_paths); i++)
2275 		if (vmlinux_path__add(vmlinux_paths[i]) < 0)
2276 			goto out_fail;
2277 
2278 	/* only try kernel version if no symfs was given */
2279 	if (symbol_conf.symfs[0] != 0)
2280 		return 0;
2281 
2282 	if (env) {
2283 		kernel_version = env->os_release;
2284 	} else {
2285 		if (uname(&uts) < 0)
2286 			goto out_fail;
2287 
2288 		kernel_version = uts.release;
2289 	}
2290 
2291 	for (i = 0; i < ARRAY_SIZE(vmlinux_paths_upd); i++) {
2292 		snprintf(bf, sizeof(bf), vmlinux_paths_upd[i], kernel_version);
2293 		if (vmlinux_path__add(bf) < 0)
2294 			goto out_fail;
2295 	}
2296 
2297 	return 0;
2298 
2299 out_fail:
2300 	vmlinux_path__exit();
2301 	return -1;
2302 }
2303 
2304 int setup_list(struct strlist **list, const char *list_str,
2305 		      const char *list_name)
2306 {
2307 	if (list_str == NULL)
2308 		return 0;
2309 
2310 	*list = strlist__new(list_str, NULL);
2311 	if (!*list) {
2312 		pr_err("problems parsing %s list\n", list_name);
2313 		return -1;
2314 	}
2315 
2316 	symbol_conf.has_filter = true;
2317 	return 0;
2318 }
2319 
2320 int setup_intlist(struct intlist **list, const char *list_str,
2321 		  const char *list_name)
2322 {
2323 	if (list_str == NULL)
2324 		return 0;
2325 
2326 	*list = intlist__new(list_str);
2327 	if (!*list) {
2328 		pr_err("problems parsing %s list\n", list_name);
2329 		return -1;
2330 	}
2331 	return 0;
2332 }
2333 
2334 static int setup_addrlist(struct intlist **addr_list, struct strlist *sym_list)
2335 {
2336 	struct str_node *pos, *tmp;
2337 	unsigned long val;
2338 	char *sep;
2339 	const char *end;
2340 	int i = 0, err;
2341 
2342 	*addr_list = intlist__new(NULL);
2343 	if (!*addr_list)
2344 		return -1;
2345 
2346 	strlist__for_each_entry_safe(pos, tmp, sym_list) {
2347 		errno = 0;
2348 		val = strtoul(pos->s, &sep, 16);
2349 		if (errno || (sep == pos->s))
2350 			continue;
2351 
2352 		if (*sep != '\0') {
2353 			end = pos->s + strlen(pos->s) - 1;
2354 			while (end >= sep && isspace(*end))
2355 				end--;
2356 
2357 			if (end >= sep)
2358 				continue;
2359 		}
2360 
2361 		err = intlist__add(*addr_list, val);
2362 		if (err)
2363 			break;
2364 
2365 		strlist__remove(sym_list, pos);
2366 		i++;
2367 	}
2368 
2369 	if (i == 0) {
2370 		intlist__delete(*addr_list);
2371 		*addr_list = NULL;
2372 	}
2373 
2374 	return 0;
2375 }
2376 
2377 static bool symbol__read_kptr_restrict(void)
2378 {
2379 	bool value = false;
2380 	FILE *fp = fopen("/proc/sys/kernel/kptr_restrict", "r");
2381 
2382 	if (fp != NULL) {
2383 		char line[8];
2384 
2385 		if (fgets(line, sizeof(line), fp) != NULL)
2386 			value = perf_cap__capable(CAP_SYSLOG) ?
2387 					(atoi(line) >= 2) :
2388 					(atoi(line) != 0);
2389 
2390 		fclose(fp);
2391 	}
2392 
2393 	/* Per kernel/kallsyms.c:
2394 	 * we also restrict when perf_event_paranoid > 1 w/o CAP_SYSLOG
2395 	 */
2396 	if (perf_event_paranoid() > 1 && !perf_cap__capable(CAP_SYSLOG))
2397 		value = true;
2398 
2399 	return value;
2400 }
2401 
2402 int symbol__annotation_init(void)
2403 {
2404 	if (symbol_conf.init_annotation)
2405 		return 0;
2406 
2407 	if (symbol_conf.initialized) {
2408 		pr_err("Annotation needs to be init before symbol__init()\n");
2409 		return -1;
2410 	}
2411 
2412 	symbol_conf.priv_size += sizeof(struct annotation);
2413 	symbol_conf.init_annotation = true;
2414 	return 0;
2415 }
2416 
2417 int symbol__init(struct perf_env *env)
2418 {
2419 	const char *symfs;
2420 
2421 	if (symbol_conf.initialized)
2422 		return 0;
2423 
2424 	symbol_conf.priv_size = PERF_ALIGN(symbol_conf.priv_size, sizeof(u64));
2425 
2426 	symbol__elf_init();
2427 
2428 	if (symbol_conf.try_vmlinux_path && vmlinux_path__init(env) < 0)
2429 		return -1;
2430 
2431 	if (symbol_conf.field_sep && *symbol_conf.field_sep == '.') {
2432 		pr_err("'.' is the only non valid --field-separator argument\n");
2433 		return -1;
2434 	}
2435 
2436 	if (setup_list(&symbol_conf.dso_list,
2437 		       symbol_conf.dso_list_str, "dso") < 0)
2438 		return -1;
2439 
2440 	if (setup_list(&symbol_conf.comm_list,
2441 		       symbol_conf.comm_list_str, "comm") < 0)
2442 		goto out_free_dso_list;
2443 
2444 	if (setup_intlist(&symbol_conf.pid_list,
2445 		       symbol_conf.pid_list_str, "pid") < 0)
2446 		goto out_free_comm_list;
2447 
2448 	if (setup_intlist(&symbol_conf.tid_list,
2449 		       symbol_conf.tid_list_str, "tid") < 0)
2450 		goto out_free_pid_list;
2451 
2452 	if (setup_list(&symbol_conf.sym_list,
2453 		       symbol_conf.sym_list_str, "symbol") < 0)
2454 		goto out_free_tid_list;
2455 
2456 	if (symbol_conf.sym_list &&
2457 	    setup_addrlist(&symbol_conf.addr_list, symbol_conf.sym_list) < 0)
2458 		goto out_free_sym_list;
2459 
2460 	if (setup_list(&symbol_conf.bt_stop_list,
2461 		       symbol_conf.bt_stop_list_str, "symbol") < 0)
2462 		goto out_free_sym_list;
2463 
2464 	/*
2465 	 * A path to symbols of "/" is identical to ""
2466 	 * reset here for simplicity.
2467 	 */
2468 	symfs = realpath(symbol_conf.symfs, NULL);
2469 	if (symfs == NULL)
2470 		symfs = symbol_conf.symfs;
2471 	if (strcmp(symfs, "/") == 0)
2472 		symbol_conf.symfs = "";
2473 	if (symfs != symbol_conf.symfs)
2474 		free((void *)symfs);
2475 
2476 	symbol_conf.kptr_restrict = symbol__read_kptr_restrict();
2477 
2478 	symbol_conf.initialized = true;
2479 	return 0;
2480 
2481 out_free_sym_list:
2482 	strlist__delete(symbol_conf.sym_list);
2483 	intlist__delete(symbol_conf.addr_list);
2484 out_free_tid_list:
2485 	intlist__delete(symbol_conf.tid_list);
2486 out_free_pid_list:
2487 	intlist__delete(symbol_conf.pid_list);
2488 out_free_comm_list:
2489 	strlist__delete(symbol_conf.comm_list);
2490 out_free_dso_list:
2491 	strlist__delete(symbol_conf.dso_list);
2492 	return -1;
2493 }
2494 
2495 void symbol__exit(void)
2496 {
2497 	if (!symbol_conf.initialized)
2498 		return;
2499 	strlist__delete(symbol_conf.bt_stop_list);
2500 	strlist__delete(symbol_conf.sym_list);
2501 	strlist__delete(symbol_conf.dso_list);
2502 	strlist__delete(symbol_conf.comm_list);
2503 	intlist__delete(symbol_conf.tid_list);
2504 	intlist__delete(symbol_conf.pid_list);
2505 	intlist__delete(symbol_conf.addr_list);
2506 	vmlinux_path__exit();
2507 	symbol_conf.sym_list = symbol_conf.dso_list = symbol_conf.comm_list = NULL;
2508 	symbol_conf.bt_stop_list = NULL;
2509 	symbol_conf.initialized = false;
2510 }
2511 
2512 int symbol__config_symfs(const struct option *opt __maybe_unused,
2513 			 const char *dir, int unset __maybe_unused)
2514 {
2515 	char *bf = NULL;
2516 	int ret;
2517 
2518 	symbol_conf.symfs = strdup(dir);
2519 	if (symbol_conf.symfs == NULL)
2520 		return -ENOMEM;
2521 
2522 	/* skip the locally configured cache if a symfs is given, and
2523 	 * config buildid dir to symfs/.debug
2524 	 */
2525 	ret = asprintf(&bf, "%s/%s", dir, ".debug");
2526 	if (ret < 0)
2527 		return -ENOMEM;
2528 
2529 	set_buildid_dir(bf);
2530 
2531 	free(bf);
2532 	return 0;
2533 }
2534 
2535 struct mem_info *mem_info__get(struct mem_info *mi)
2536 {
2537 	if (mi)
2538 		refcount_inc(&mi->refcnt);
2539 	return mi;
2540 }
2541 
2542 void mem_info__put(struct mem_info *mi)
2543 {
2544 	if (mi && refcount_dec_and_test(&mi->refcnt)) {
2545 		addr_map_symbol__exit(&mi->iaddr);
2546 		addr_map_symbol__exit(&mi->daddr);
2547 		free(mi);
2548 	}
2549 }
2550 
2551 struct mem_info *mem_info__new(void)
2552 {
2553 	struct mem_info *mi = zalloc(sizeof(*mi));
2554 
2555 	if (mi)
2556 		refcount_set(&mi->refcnt, 1);
2557 	return mi;
2558 }
2559 
2560 /*
2561  * Checks that user supplied symbol kernel files are accessible because
2562  * the default mechanism for accessing elf files fails silently. i.e. if
2563  * debug syms for a build ID aren't found perf carries on normally. When
2564  * they are user supplied we should assume that the user doesn't want to
2565  * silently fail.
2566  */
2567 int symbol__validate_sym_arguments(void)
2568 {
2569 	if (symbol_conf.vmlinux_name &&
2570 	    access(symbol_conf.vmlinux_name, R_OK)) {
2571 		pr_err("Invalid file: %s\n", symbol_conf.vmlinux_name);
2572 		return -EINVAL;
2573 	}
2574 	if (symbol_conf.kallsyms_name &&
2575 	    access(symbol_conf.kallsyms_name, R_OK)) {
2576 		pr_err("Invalid file: %s\n", symbol_conf.kallsyms_name);
2577 		return -EINVAL;
2578 	}
2579 	return 0;
2580 }
2581