1 // SPDX-License-Identifier: GPL-2.0 2 #include <dirent.h> 3 #include <errno.h> 4 #include <stdlib.h> 5 #include <stdio.h> 6 #include <string.h> 7 #include <linux/capability.h> 8 #include <linux/kernel.h> 9 #include <linux/mman.h> 10 #include <linux/string.h> 11 #include <linux/time64.h> 12 #include <sys/types.h> 13 #include <sys/stat.h> 14 #include <sys/param.h> 15 #include <fcntl.h> 16 #include <unistd.h> 17 #include <inttypes.h> 18 #include "annotate.h" 19 #include "build-id.h" 20 #include "cap.h" 21 #include "dso.h" 22 #include "util.h" // lsdir() 23 #include "debug.h" 24 #include "event.h" 25 #include "machine.h" 26 #include "map.h" 27 #include "symbol.h" 28 #include "map_symbol.h" 29 #include "mem-events.h" 30 #include "symsrc.h" 31 #include "strlist.h" 32 #include "intlist.h" 33 #include "namespaces.h" 34 #include "header.h" 35 #include "path.h" 36 #include <linux/ctype.h> 37 #include <linux/zalloc.h> 38 39 #include <elf.h> 40 #include <limits.h> 41 #include <symbol/kallsyms.h> 42 #include <sys/utsname.h> 43 44 static int dso__load_kernel_sym(struct dso *dso, struct map *map); 45 static int dso__load_guest_kernel_sym(struct dso *dso, struct map *map); 46 static bool symbol__is_idle(const char *name); 47 48 int vmlinux_path__nr_entries; 49 char **vmlinux_path; 50 51 struct symbol_conf symbol_conf = { 52 .nanosecs = false, 53 .use_modules = true, 54 .try_vmlinux_path = true, 55 .demangle = true, 56 .demangle_kernel = false, 57 .cumulate_callchain = true, 58 .time_quantum = 100 * NSEC_PER_MSEC, /* 100ms */ 59 .show_hist_headers = true, 60 .symfs = "", 61 .event_group = true, 62 .inline_name = true, 63 .res_sample = 0, 64 }; 65 66 static enum dso_binary_type binary_type_symtab[] = { 67 DSO_BINARY_TYPE__KALLSYMS, 68 DSO_BINARY_TYPE__GUEST_KALLSYMS, 69 DSO_BINARY_TYPE__JAVA_JIT, 70 DSO_BINARY_TYPE__DEBUGLINK, 71 DSO_BINARY_TYPE__BUILD_ID_CACHE, 72 DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO, 73 DSO_BINARY_TYPE__FEDORA_DEBUGINFO, 74 DSO_BINARY_TYPE__UBUNTU_DEBUGINFO, 75 DSO_BINARY_TYPE__BUILDID_DEBUGINFO, 76 DSO_BINARY_TYPE__SYSTEM_PATH_DSO, 77 DSO_BINARY_TYPE__GUEST_KMODULE, 78 DSO_BINARY_TYPE__GUEST_KMODULE_COMP, 79 DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE, 80 DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP, 81 DSO_BINARY_TYPE__OPENEMBEDDED_DEBUGINFO, 82 DSO_BINARY_TYPE__MIXEDUP_UBUNTU_DEBUGINFO, 83 DSO_BINARY_TYPE__NOT_FOUND, 84 }; 85 86 #define DSO_BINARY_TYPE__SYMTAB_CNT ARRAY_SIZE(binary_type_symtab) 87 88 static bool symbol_type__filter(char symbol_type) 89 { 90 symbol_type = toupper(symbol_type); 91 return symbol_type == 'T' || symbol_type == 'W' || symbol_type == 'D' || symbol_type == 'B'; 92 } 93 94 static int prefix_underscores_count(const char *str) 95 { 96 const char *tail = str; 97 98 while (*tail == '_') 99 tail++; 100 101 return tail - str; 102 } 103 104 const char * __weak arch__normalize_symbol_name(const char *name) 105 { 106 return name; 107 } 108 109 int __weak arch__compare_symbol_names(const char *namea, const char *nameb) 110 { 111 return strcmp(namea, nameb); 112 } 113 114 int __weak arch__compare_symbol_names_n(const char *namea, const char *nameb, 115 unsigned int n) 116 { 117 return strncmp(namea, nameb, n); 118 } 119 120 int __weak arch__choose_best_symbol(struct symbol *syma, 121 struct symbol *symb __maybe_unused) 122 { 123 /* Avoid "SyS" kernel syscall aliases */ 124 if (strlen(syma->name) >= 3 && !strncmp(syma->name, "SyS", 3)) 125 return SYMBOL_B; 126 if (strlen(syma->name) >= 10 && !strncmp(syma->name, "compat_SyS", 10)) 127 return SYMBOL_B; 128 129 return SYMBOL_A; 130 } 131 132 static int choose_best_symbol(struct symbol *syma, struct symbol *symb) 133 { 134 s64 a; 135 s64 b; 136 size_t na, nb; 137 138 /* Prefer a symbol with non zero length */ 139 a = syma->end - syma->start; 140 b = symb->end - symb->start; 141 if ((b == 0) && (a > 0)) 142 return SYMBOL_A; 143 else if ((a == 0) && (b > 0)) 144 return SYMBOL_B; 145 146 /* Prefer a non weak symbol over a weak one */ 147 a = syma->binding == STB_WEAK; 148 b = symb->binding == STB_WEAK; 149 if (b && !a) 150 return SYMBOL_A; 151 if (a && !b) 152 return SYMBOL_B; 153 154 /* Prefer a global symbol over a non global one */ 155 a = syma->binding == STB_GLOBAL; 156 b = symb->binding == STB_GLOBAL; 157 if (a && !b) 158 return SYMBOL_A; 159 if (b && !a) 160 return SYMBOL_B; 161 162 /* Prefer a symbol with less underscores */ 163 a = prefix_underscores_count(syma->name); 164 b = prefix_underscores_count(symb->name); 165 if (b > a) 166 return SYMBOL_A; 167 else if (a > b) 168 return SYMBOL_B; 169 170 /* Choose the symbol with the longest name */ 171 na = strlen(syma->name); 172 nb = strlen(symb->name); 173 if (na > nb) 174 return SYMBOL_A; 175 else if (na < nb) 176 return SYMBOL_B; 177 178 return arch__choose_best_symbol(syma, symb); 179 } 180 181 void symbols__fixup_duplicate(struct rb_root_cached *symbols) 182 { 183 struct rb_node *nd; 184 struct symbol *curr, *next; 185 186 if (symbol_conf.allow_aliases) 187 return; 188 189 nd = rb_first_cached(symbols); 190 191 while (nd) { 192 curr = rb_entry(nd, struct symbol, rb_node); 193 again: 194 nd = rb_next(&curr->rb_node); 195 if (!nd) 196 break; 197 198 next = rb_entry(nd, struct symbol, rb_node); 199 if (curr->start != next->start) 200 continue; 201 202 if (choose_best_symbol(curr, next) == SYMBOL_A) { 203 if (next->type == STT_GNU_IFUNC) 204 curr->ifunc_alias = true; 205 rb_erase_cached(&next->rb_node, symbols); 206 symbol__delete(next); 207 goto again; 208 } else { 209 if (curr->type == STT_GNU_IFUNC) 210 next->ifunc_alias = true; 211 nd = rb_next(&curr->rb_node); 212 rb_erase_cached(&curr->rb_node, symbols); 213 symbol__delete(curr); 214 } 215 } 216 } 217 218 /* Update zero-sized symbols using the address of the next symbol */ 219 void symbols__fixup_end(struct rb_root_cached *symbols, bool is_kallsyms) 220 { 221 struct rb_node *nd, *prevnd = rb_first_cached(symbols); 222 struct symbol *curr, *prev; 223 224 if (prevnd == NULL) 225 return; 226 227 curr = rb_entry(prevnd, struct symbol, rb_node); 228 229 for (nd = rb_next(prevnd); nd; nd = rb_next(nd)) { 230 prev = curr; 231 curr = rb_entry(nd, struct symbol, rb_node); 232 233 /* 234 * On some architecture kernel text segment start is located at 235 * some low memory address, while modules are located at high 236 * memory addresses (or vice versa). The gap between end of 237 * kernel text segment and beginning of first module's text 238 * segment is very big. Therefore do not fill this gap and do 239 * not assign it to the kernel dso map (kallsyms). 240 * 241 * In kallsyms, it determines module symbols using '[' character 242 * like in: 243 * ffffffffc1937000 T hdmi_driver_init [snd_hda_codec_hdmi] 244 */ 245 if (prev->end == prev->start) { 246 /* Last kernel/module symbol mapped to end of page */ 247 if (is_kallsyms && (!strchr(prev->name, '[') != 248 !strchr(curr->name, '['))) 249 prev->end = roundup(prev->end + 4096, 4096); 250 else 251 prev->end = curr->start; 252 253 pr_debug4("%s sym:%s end:%#" PRIx64 "\n", 254 __func__, prev->name, prev->end); 255 } 256 } 257 258 /* Last entry */ 259 if (curr->end == curr->start) 260 curr->end = roundup(curr->start, 4096) + 4096; 261 } 262 263 struct symbol *symbol__new(u64 start, u64 len, u8 binding, u8 type, const char *name) 264 { 265 size_t namelen = strlen(name) + 1; 266 struct symbol *sym = calloc(1, (symbol_conf.priv_size + 267 sizeof(*sym) + namelen)); 268 if (sym == NULL) 269 return NULL; 270 271 if (symbol_conf.priv_size) { 272 if (symbol_conf.init_annotation) { 273 struct annotation *notes = (void *)sym; 274 annotation__init(notes); 275 } 276 sym = ((void *)sym) + symbol_conf.priv_size; 277 } 278 279 sym->start = start; 280 sym->end = len ? start + len : start; 281 sym->type = type; 282 sym->binding = binding; 283 sym->namelen = namelen - 1; 284 285 pr_debug4("%s: %s %#" PRIx64 "-%#" PRIx64 "\n", 286 __func__, name, start, sym->end); 287 memcpy(sym->name, name, namelen); 288 289 return sym; 290 } 291 292 void symbol__delete(struct symbol *sym) 293 { 294 if (symbol_conf.priv_size) { 295 if (symbol_conf.init_annotation) { 296 struct annotation *notes = symbol__annotation(sym); 297 298 annotation__exit(notes); 299 } 300 } 301 free(((void *)sym) - symbol_conf.priv_size); 302 } 303 304 void symbols__delete(struct rb_root_cached *symbols) 305 { 306 struct symbol *pos; 307 struct rb_node *next = rb_first_cached(symbols); 308 309 while (next) { 310 pos = rb_entry(next, struct symbol, rb_node); 311 next = rb_next(&pos->rb_node); 312 rb_erase_cached(&pos->rb_node, symbols); 313 symbol__delete(pos); 314 } 315 } 316 317 void __symbols__insert(struct rb_root_cached *symbols, 318 struct symbol *sym, bool kernel) 319 { 320 struct rb_node **p = &symbols->rb_root.rb_node; 321 struct rb_node *parent = NULL; 322 const u64 ip = sym->start; 323 struct symbol *s; 324 bool leftmost = true; 325 326 if (kernel) { 327 const char *name = sym->name; 328 /* 329 * ppc64 uses function descriptors and appends a '.' to the 330 * start of every instruction address. Remove it. 331 */ 332 if (name[0] == '.') 333 name++; 334 sym->idle = symbol__is_idle(name); 335 } 336 337 while (*p != NULL) { 338 parent = *p; 339 s = rb_entry(parent, struct symbol, rb_node); 340 if (ip < s->start) 341 p = &(*p)->rb_left; 342 else { 343 p = &(*p)->rb_right; 344 leftmost = false; 345 } 346 } 347 rb_link_node(&sym->rb_node, parent, p); 348 rb_insert_color_cached(&sym->rb_node, symbols, leftmost); 349 } 350 351 void symbols__insert(struct rb_root_cached *symbols, struct symbol *sym) 352 { 353 __symbols__insert(symbols, sym, false); 354 } 355 356 static struct symbol *symbols__find(struct rb_root_cached *symbols, u64 ip) 357 { 358 struct rb_node *n; 359 360 if (symbols == NULL) 361 return NULL; 362 363 n = symbols->rb_root.rb_node; 364 365 while (n) { 366 struct symbol *s = rb_entry(n, struct symbol, rb_node); 367 368 if (ip < s->start) 369 n = n->rb_left; 370 else if (ip > s->end || (ip == s->end && ip != s->start)) 371 n = n->rb_right; 372 else 373 return s; 374 } 375 376 return NULL; 377 } 378 379 static struct symbol *symbols__first(struct rb_root_cached *symbols) 380 { 381 struct rb_node *n = rb_first_cached(symbols); 382 383 if (n) 384 return rb_entry(n, struct symbol, rb_node); 385 386 return NULL; 387 } 388 389 static struct symbol *symbols__last(struct rb_root_cached *symbols) 390 { 391 struct rb_node *n = rb_last(&symbols->rb_root); 392 393 if (n) 394 return rb_entry(n, struct symbol, rb_node); 395 396 return NULL; 397 } 398 399 static struct symbol *symbols__next(struct symbol *sym) 400 { 401 struct rb_node *n = rb_next(&sym->rb_node); 402 403 if (n) 404 return rb_entry(n, struct symbol, rb_node); 405 406 return NULL; 407 } 408 409 static int symbols__sort_name_cmp(const void *vlhs, const void *vrhs) 410 { 411 const struct symbol *lhs = *((const struct symbol **)vlhs); 412 const struct symbol *rhs = *((const struct symbol **)vrhs); 413 414 return strcmp(lhs->name, rhs->name); 415 } 416 417 static struct symbol **symbols__sort_by_name(struct rb_root_cached *source, size_t *len) 418 { 419 struct rb_node *nd; 420 struct symbol **result; 421 size_t i = 0, size = 0; 422 423 for (nd = rb_first_cached(source); nd; nd = rb_next(nd)) 424 size++; 425 426 result = malloc(sizeof(*result) * size); 427 if (!result) 428 return NULL; 429 430 for (nd = rb_first_cached(source); nd; nd = rb_next(nd)) { 431 struct symbol *pos = rb_entry(nd, struct symbol, rb_node); 432 433 result[i++] = pos; 434 } 435 qsort(result, size, sizeof(*result), symbols__sort_name_cmp); 436 *len = size; 437 return result; 438 } 439 440 int symbol__match_symbol_name(const char *name, const char *str, 441 enum symbol_tag_include includes) 442 { 443 const char *versioning; 444 445 if (includes == SYMBOL_TAG_INCLUDE__DEFAULT_ONLY && 446 (versioning = strstr(name, "@@"))) { 447 int len = strlen(str); 448 449 if (len < versioning - name) 450 len = versioning - name; 451 452 return arch__compare_symbol_names_n(name, str, len); 453 } else 454 return arch__compare_symbol_names(name, str); 455 } 456 457 static struct symbol *symbols__find_by_name(struct symbol *symbols[], 458 size_t symbols_len, 459 const char *name, 460 enum symbol_tag_include includes, 461 size_t *found_idx) 462 { 463 size_t i, lower = 0, upper = symbols_len; 464 struct symbol *s = NULL; 465 466 if (found_idx) 467 *found_idx = SIZE_MAX; 468 469 if (!symbols_len) 470 return NULL; 471 472 while (lower < upper) { 473 int cmp; 474 475 i = (lower + upper) / 2; 476 cmp = symbol__match_symbol_name(symbols[i]->name, name, includes); 477 478 if (cmp > 0) 479 upper = i; 480 else if (cmp < 0) 481 lower = i + 1; 482 else { 483 if (found_idx) 484 *found_idx = i; 485 s = symbols[i]; 486 break; 487 } 488 } 489 if (s && includes != SYMBOL_TAG_INCLUDE__DEFAULT_ONLY) { 490 /* return first symbol that has same name (if any) */ 491 for (; i > 0; i--) { 492 struct symbol *tmp = symbols[i - 1]; 493 494 if (!arch__compare_symbol_names(tmp->name, s->name)) { 495 if (found_idx) 496 *found_idx = i - 1; 497 s = tmp; 498 } else 499 break; 500 } 501 } 502 assert(!found_idx || !s || s == symbols[*found_idx]); 503 return s; 504 } 505 506 void dso__reset_find_symbol_cache(struct dso *dso) 507 { 508 dso->last_find_result.addr = 0; 509 dso->last_find_result.symbol = NULL; 510 } 511 512 void dso__insert_symbol(struct dso *dso, struct symbol *sym) 513 { 514 __symbols__insert(&dso->symbols, sym, dso->kernel); 515 516 /* update the symbol cache if necessary */ 517 if (dso->last_find_result.addr >= sym->start && 518 (dso->last_find_result.addr < sym->end || 519 sym->start == sym->end)) { 520 dso->last_find_result.symbol = sym; 521 } 522 } 523 524 void dso__delete_symbol(struct dso *dso, struct symbol *sym) 525 { 526 rb_erase_cached(&sym->rb_node, &dso->symbols); 527 symbol__delete(sym); 528 dso__reset_find_symbol_cache(dso); 529 } 530 531 struct symbol *dso__find_symbol(struct dso *dso, u64 addr) 532 { 533 if (dso->last_find_result.addr != addr || dso->last_find_result.symbol == NULL) { 534 dso->last_find_result.addr = addr; 535 dso->last_find_result.symbol = symbols__find(&dso->symbols, addr); 536 } 537 538 return dso->last_find_result.symbol; 539 } 540 541 struct symbol *dso__find_symbol_nocache(struct dso *dso, u64 addr) 542 { 543 return symbols__find(&dso->symbols, addr); 544 } 545 546 struct symbol *dso__first_symbol(struct dso *dso) 547 { 548 return symbols__first(&dso->symbols); 549 } 550 551 struct symbol *dso__last_symbol(struct dso *dso) 552 { 553 return symbols__last(&dso->symbols); 554 } 555 556 struct symbol *dso__next_symbol(struct symbol *sym) 557 { 558 return symbols__next(sym); 559 } 560 561 struct symbol *dso__next_symbol_by_name(struct dso *dso, size_t *idx) 562 { 563 if (*idx + 1 >= dso->symbol_names_len) 564 return NULL; 565 566 ++*idx; 567 return dso->symbol_names[*idx]; 568 } 569 570 /* 571 * Returns first symbol that matched with @name. 572 */ 573 struct symbol *dso__find_symbol_by_name(struct dso *dso, const char *name, size_t *idx) 574 { 575 struct symbol *s = symbols__find_by_name(dso->symbol_names, dso->symbol_names_len, 576 name, SYMBOL_TAG_INCLUDE__NONE, idx); 577 if (!s) 578 s = symbols__find_by_name(dso->symbol_names, dso->symbol_names_len, 579 name, SYMBOL_TAG_INCLUDE__DEFAULT_ONLY, idx); 580 return s; 581 } 582 583 void dso__sort_by_name(struct dso *dso) 584 { 585 mutex_lock(&dso->lock); 586 if (!dso__sorted_by_name(dso)) { 587 size_t len; 588 589 dso->symbol_names = symbols__sort_by_name(&dso->symbols, &len); 590 if (dso->symbol_names) { 591 dso->symbol_names_len = len; 592 dso__set_sorted_by_name(dso); 593 } 594 } 595 mutex_unlock(&dso->lock); 596 } 597 598 /* 599 * While we find nice hex chars, build a long_val. 600 * Return number of chars processed. 601 */ 602 static int hex2u64(const char *ptr, u64 *long_val) 603 { 604 char *p; 605 606 *long_val = strtoull(ptr, &p, 16); 607 608 return p - ptr; 609 } 610 611 612 int modules__parse(const char *filename, void *arg, 613 int (*process_module)(void *arg, const char *name, 614 u64 start, u64 size)) 615 { 616 char *line = NULL; 617 size_t n; 618 FILE *file; 619 int err = 0; 620 621 file = fopen(filename, "r"); 622 if (file == NULL) 623 return -1; 624 625 while (1) { 626 char name[PATH_MAX]; 627 u64 start, size; 628 char *sep, *endptr; 629 ssize_t line_len; 630 631 line_len = getline(&line, &n, file); 632 if (line_len < 0) { 633 if (feof(file)) 634 break; 635 err = -1; 636 goto out; 637 } 638 639 if (!line) { 640 err = -1; 641 goto out; 642 } 643 644 line[--line_len] = '\0'; /* \n */ 645 646 sep = strrchr(line, 'x'); 647 if (sep == NULL) 648 continue; 649 650 hex2u64(sep + 1, &start); 651 652 sep = strchr(line, ' '); 653 if (sep == NULL) 654 continue; 655 656 *sep = '\0'; 657 658 scnprintf(name, sizeof(name), "[%s]", line); 659 660 size = strtoul(sep + 1, &endptr, 0); 661 if (*endptr != ' ' && *endptr != '\t') 662 continue; 663 664 err = process_module(arg, name, start, size); 665 if (err) 666 break; 667 } 668 out: 669 free(line); 670 fclose(file); 671 return err; 672 } 673 674 /* 675 * These are symbols in the kernel image, so make sure that 676 * sym is from a kernel DSO. 677 */ 678 static bool symbol__is_idle(const char *name) 679 { 680 const char * const idle_symbols[] = { 681 "acpi_idle_do_entry", 682 "acpi_processor_ffh_cstate_enter", 683 "arch_cpu_idle", 684 "cpu_idle", 685 "cpu_startup_entry", 686 "idle_cpu", 687 "intel_idle", 688 "intel_idle_ibrs", 689 "default_idle", 690 "native_safe_halt", 691 "enter_idle", 692 "exit_idle", 693 "mwait_idle", 694 "mwait_idle_with_hints", 695 "mwait_idle_with_hints.constprop.0", 696 "poll_idle", 697 "ppc64_runlatch_off", 698 "pseries_dedicated_idle_sleep", 699 "psw_idle", 700 "psw_idle_exit", 701 NULL 702 }; 703 int i; 704 static struct strlist *idle_symbols_list; 705 706 if (idle_symbols_list) 707 return strlist__has_entry(idle_symbols_list, name); 708 709 idle_symbols_list = strlist__new(NULL, NULL); 710 711 for (i = 0; idle_symbols[i]; i++) 712 strlist__add(idle_symbols_list, idle_symbols[i]); 713 714 return strlist__has_entry(idle_symbols_list, name); 715 } 716 717 static int map__process_kallsym_symbol(void *arg, const char *name, 718 char type, u64 start) 719 { 720 struct symbol *sym; 721 struct dso *dso = arg; 722 struct rb_root_cached *root = &dso->symbols; 723 724 if (!symbol_type__filter(type)) 725 return 0; 726 727 /* Ignore local symbols for ARM modules */ 728 if (name[0] == '$') 729 return 0; 730 731 /* 732 * module symbols are not sorted so we add all 733 * symbols, setting length to 0, and rely on 734 * symbols__fixup_end() to fix it up. 735 */ 736 sym = symbol__new(start, 0, kallsyms2elf_binding(type), kallsyms2elf_type(type), name); 737 if (sym == NULL) 738 return -ENOMEM; 739 /* 740 * We will pass the symbols to the filter later, in 741 * map__split_kallsyms, when we have split the maps per module 742 */ 743 __symbols__insert(root, sym, !strchr(name, '[')); 744 745 return 0; 746 } 747 748 /* 749 * Loads the function entries in /proc/kallsyms into kernel_map->dso, 750 * so that we can in the next step set the symbol ->end address and then 751 * call kernel_maps__split_kallsyms. 752 */ 753 static int dso__load_all_kallsyms(struct dso *dso, const char *filename) 754 { 755 return kallsyms__parse(filename, dso, map__process_kallsym_symbol); 756 } 757 758 static int maps__split_kallsyms_for_kcore(struct maps *kmaps, struct dso *dso) 759 { 760 struct map *curr_map; 761 struct symbol *pos; 762 int count = 0; 763 struct rb_root_cached old_root = dso->symbols; 764 struct rb_root_cached *root = &dso->symbols; 765 struct rb_node *next = rb_first_cached(root); 766 767 if (!kmaps) 768 return -1; 769 770 *root = RB_ROOT_CACHED; 771 772 while (next) { 773 struct dso *curr_map_dso; 774 char *module; 775 776 pos = rb_entry(next, struct symbol, rb_node); 777 next = rb_next(&pos->rb_node); 778 779 rb_erase_cached(&pos->rb_node, &old_root); 780 RB_CLEAR_NODE(&pos->rb_node); 781 module = strchr(pos->name, '\t'); 782 if (module) 783 *module = '\0'; 784 785 curr_map = maps__find(kmaps, pos->start); 786 787 if (!curr_map) { 788 symbol__delete(pos); 789 continue; 790 } 791 curr_map_dso = map__dso(curr_map); 792 pos->start -= map__start(curr_map) - map__pgoff(curr_map); 793 if (pos->end > map__end(curr_map)) 794 pos->end = map__end(curr_map); 795 if (pos->end) 796 pos->end -= map__start(curr_map) - map__pgoff(curr_map); 797 symbols__insert(&curr_map_dso->symbols, pos); 798 ++count; 799 } 800 801 /* Symbols have been adjusted */ 802 dso->adjust_symbols = 1; 803 804 return count; 805 } 806 807 /* 808 * Split the symbols into maps, making sure there are no overlaps, i.e. the 809 * kernel range is broken in several maps, named [kernel].N, as we don't have 810 * the original ELF section names vmlinux have. 811 */ 812 static int maps__split_kallsyms(struct maps *kmaps, struct dso *dso, u64 delta, 813 struct map *initial_map) 814 { 815 struct machine *machine; 816 struct map *curr_map = initial_map; 817 struct symbol *pos; 818 int count = 0, moved = 0; 819 struct rb_root_cached *root = &dso->symbols; 820 struct rb_node *next = rb_first_cached(root); 821 int kernel_range = 0; 822 bool x86_64; 823 824 if (!kmaps) 825 return -1; 826 827 machine = maps__machine(kmaps); 828 829 x86_64 = machine__is(machine, "x86_64"); 830 831 while (next) { 832 char *module; 833 834 pos = rb_entry(next, struct symbol, rb_node); 835 next = rb_next(&pos->rb_node); 836 837 module = strchr(pos->name, '\t'); 838 if (module) { 839 struct dso *curr_map_dso; 840 841 if (!symbol_conf.use_modules) 842 goto discard_symbol; 843 844 *module++ = '\0'; 845 curr_map_dso = map__dso(curr_map); 846 if (strcmp(curr_map_dso->short_name, module)) { 847 if (!RC_CHK_EQUAL(curr_map, initial_map) && 848 dso->kernel == DSO_SPACE__KERNEL_GUEST && 849 machine__is_default_guest(machine)) { 850 /* 851 * We assume all symbols of a module are 852 * continuous in * kallsyms, so curr_map 853 * points to a module and all its 854 * symbols are in its kmap. Mark it as 855 * loaded. 856 */ 857 dso__set_loaded(curr_map_dso); 858 } 859 860 curr_map = maps__find_by_name(kmaps, module); 861 if (curr_map == NULL) { 862 pr_debug("%s/proc/{kallsyms,modules} " 863 "inconsistency while looking " 864 "for \"%s\" module!\n", 865 machine->root_dir, module); 866 curr_map = initial_map; 867 goto discard_symbol; 868 } 869 curr_map_dso = map__dso(curr_map); 870 if (curr_map_dso->loaded && 871 !machine__is_default_guest(machine)) 872 goto discard_symbol; 873 } 874 /* 875 * So that we look just like we get from .ko files, 876 * i.e. not prelinked, relative to initial_map->start. 877 */ 878 pos->start = map__map_ip(curr_map, pos->start); 879 pos->end = map__map_ip(curr_map, pos->end); 880 } else if (x86_64 && is_entry_trampoline(pos->name)) { 881 /* 882 * These symbols are not needed anymore since the 883 * trampoline maps refer to the text section and it's 884 * symbols instead. Avoid having to deal with 885 * relocations, and the assumption that the first symbol 886 * is the start of kernel text, by simply removing the 887 * symbols at this point. 888 */ 889 goto discard_symbol; 890 } else if (curr_map != initial_map) { 891 char dso_name[PATH_MAX]; 892 struct dso *ndso; 893 894 if (delta) { 895 /* Kernel was relocated at boot time */ 896 pos->start -= delta; 897 pos->end -= delta; 898 } 899 900 if (count == 0) { 901 curr_map = initial_map; 902 goto add_symbol; 903 } 904 905 if (dso->kernel == DSO_SPACE__KERNEL_GUEST) 906 snprintf(dso_name, sizeof(dso_name), 907 "[guest.kernel].%d", 908 kernel_range++); 909 else 910 snprintf(dso_name, sizeof(dso_name), 911 "[kernel].%d", 912 kernel_range++); 913 914 ndso = dso__new(dso_name); 915 if (ndso == NULL) 916 return -1; 917 918 ndso->kernel = dso->kernel; 919 920 curr_map = map__new2(pos->start, ndso); 921 if (curr_map == NULL) { 922 dso__put(ndso); 923 return -1; 924 } 925 926 map__set_mapping_type(curr_map, MAPPING_TYPE__IDENTITY); 927 if (maps__insert(kmaps, curr_map)) { 928 dso__put(ndso); 929 return -1; 930 } 931 ++kernel_range; 932 } else if (delta) { 933 /* Kernel was relocated at boot time */ 934 pos->start -= delta; 935 pos->end -= delta; 936 } 937 add_symbol: 938 if (curr_map != initial_map) { 939 struct dso *curr_map_dso = map__dso(curr_map); 940 941 rb_erase_cached(&pos->rb_node, root); 942 symbols__insert(&curr_map_dso->symbols, pos); 943 ++moved; 944 } else 945 ++count; 946 947 continue; 948 discard_symbol: 949 rb_erase_cached(&pos->rb_node, root); 950 symbol__delete(pos); 951 } 952 953 if (curr_map != initial_map && 954 dso->kernel == DSO_SPACE__KERNEL_GUEST && 955 machine__is_default_guest(maps__machine(kmaps))) { 956 dso__set_loaded(map__dso(curr_map)); 957 } 958 959 return count + moved; 960 } 961 962 bool symbol__restricted_filename(const char *filename, 963 const char *restricted_filename) 964 { 965 bool restricted = false; 966 967 if (symbol_conf.kptr_restrict) { 968 char *r = realpath(filename, NULL); 969 970 if (r != NULL) { 971 restricted = strcmp(r, restricted_filename) == 0; 972 free(r); 973 return restricted; 974 } 975 } 976 977 return restricted; 978 } 979 980 struct module_info { 981 struct rb_node rb_node; 982 char *name; 983 u64 start; 984 }; 985 986 static void add_module(struct module_info *mi, struct rb_root *modules) 987 { 988 struct rb_node **p = &modules->rb_node; 989 struct rb_node *parent = NULL; 990 struct module_info *m; 991 992 while (*p != NULL) { 993 parent = *p; 994 m = rb_entry(parent, struct module_info, rb_node); 995 if (strcmp(mi->name, m->name) < 0) 996 p = &(*p)->rb_left; 997 else 998 p = &(*p)->rb_right; 999 } 1000 rb_link_node(&mi->rb_node, parent, p); 1001 rb_insert_color(&mi->rb_node, modules); 1002 } 1003 1004 static void delete_modules(struct rb_root *modules) 1005 { 1006 struct module_info *mi; 1007 struct rb_node *next = rb_first(modules); 1008 1009 while (next) { 1010 mi = rb_entry(next, struct module_info, rb_node); 1011 next = rb_next(&mi->rb_node); 1012 rb_erase(&mi->rb_node, modules); 1013 zfree(&mi->name); 1014 free(mi); 1015 } 1016 } 1017 1018 static struct module_info *find_module(const char *name, 1019 struct rb_root *modules) 1020 { 1021 struct rb_node *n = modules->rb_node; 1022 1023 while (n) { 1024 struct module_info *m; 1025 int cmp; 1026 1027 m = rb_entry(n, struct module_info, rb_node); 1028 cmp = strcmp(name, m->name); 1029 if (cmp < 0) 1030 n = n->rb_left; 1031 else if (cmp > 0) 1032 n = n->rb_right; 1033 else 1034 return m; 1035 } 1036 1037 return NULL; 1038 } 1039 1040 static int __read_proc_modules(void *arg, const char *name, u64 start, 1041 u64 size __maybe_unused) 1042 { 1043 struct rb_root *modules = arg; 1044 struct module_info *mi; 1045 1046 mi = zalloc(sizeof(struct module_info)); 1047 if (!mi) 1048 return -ENOMEM; 1049 1050 mi->name = strdup(name); 1051 mi->start = start; 1052 1053 if (!mi->name) { 1054 free(mi); 1055 return -ENOMEM; 1056 } 1057 1058 add_module(mi, modules); 1059 1060 return 0; 1061 } 1062 1063 static int read_proc_modules(const char *filename, struct rb_root *modules) 1064 { 1065 if (symbol__restricted_filename(filename, "/proc/modules")) 1066 return -1; 1067 1068 if (modules__parse(filename, modules, __read_proc_modules)) { 1069 delete_modules(modules); 1070 return -1; 1071 } 1072 1073 return 0; 1074 } 1075 1076 int compare_proc_modules(const char *from, const char *to) 1077 { 1078 struct rb_root from_modules = RB_ROOT; 1079 struct rb_root to_modules = RB_ROOT; 1080 struct rb_node *from_node, *to_node; 1081 struct module_info *from_m, *to_m; 1082 int ret = -1; 1083 1084 if (read_proc_modules(from, &from_modules)) 1085 return -1; 1086 1087 if (read_proc_modules(to, &to_modules)) 1088 goto out_delete_from; 1089 1090 from_node = rb_first(&from_modules); 1091 to_node = rb_first(&to_modules); 1092 while (from_node) { 1093 if (!to_node) 1094 break; 1095 1096 from_m = rb_entry(from_node, struct module_info, rb_node); 1097 to_m = rb_entry(to_node, struct module_info, rb_node); 1098 1099 if (from_m->start != to_m->start || 1100 strcmp(from_m->name, to_m->name)) 1101 break; 1102 1103 from_node = rb_next(from_node); 1104 to_node = rb_next(to_node); 1105 } 1106 1107 if (!from_node && !to_node) 1108 ret = 0; 1109 1110 delete_modules(&to_modules); 1111 out_delete_from: 1112 delete_modules(&from_modules); 1113 1114 return ret; 1115 } 1116 1117 static int do_validate_kcore_modules(const char *filename, struct maps *kmaps) 1118 { 1119 struct rb_root modules = RB_ROOT; 1120 struct map_rb_node *old_node; 1121 int err; 1122 1123 err = read_proc_modules(filename, &modules); 1124 if (err) 1125 return err; 1126 1127 maps__for_each_entry(kmaps, old_node) { 1128 struct map *old_map = old_node->map; 1129 struct module_info *mi; 1130 struct dso *dso; 1131 1132 if (!__map__is_kmodule(old_map)) { 1133 continue; 1134 } 1135 dso = map__dso(old_map); 1136 /* Module must be in memory at the same address */ 1137 mi = find_module(dso->short_name, &modules); 1138 if (!mi || mi->start != map__start(old_map)) { 1139 err = -EINVAL; 1140 goto out; 1141 } 1142 } 1143 out: 1144 delete_modules(&modules); 1145 return err; 1146 } 1147 1148 /* 1149 * If kallsyms is referenced by name then we look for filename in the same 1150 * directory. 1151 */ 1152 static bool filename_from_kallsyms_filename(char *filename, 1153 const char *base_name, 1154 const char *kallsyms_filename) 1155 { 1156 char *name; 1157 1158 strcpy(filename, kallsyms_filename); 1159 name = strrchr(filename, '/'); 1160 if (!name) 1161 return false; 1162 1163 name += 1; 1164 1165 if (!strcmp(name, "kallsyms")) { 1166 strcpy(name, base_name); 1167 return true; 1168 } 1169 1170 return false; 1171 } 1172 1173 static int validate_kcore_modules(const char *kallsyms_filename, 1174 struct map *map) 1175 { 1176 struct maps *kmaps = map__kmaps(map); 1177 char modules_filename[PATH_MAX]; 1178 1179 if (!kmaps) 1180 return -EINVAL; 1181 1182 if (!filename_from_kallsyms_filename(modules_filename, "modules", 1183 kallsyms_filename)) 1184 return -EINVAL; 1185 1186 if (do_validate_kcore_modules(modules_filename, kmaps)) 1187 return -EINVAL; 1188 1189 return 0; 1190 } 1191 1192 static int validate_kcore_addresses(const char *kallsyms_filename, 1193 struct map *map) 1194 { 1195 struct kmap *kmap = map__kmap(map); 1196 1197 if (!kmap) 1198 return -EINVAL; 1199 1200 if (kmap->ref_reloc_sym && kmap->ref_reloc_sym->name) { 1201 u64 start; 1202 1203 if (kallsyms__get_function_start(kallsyms_filename, 1204 kmap->ref_reloc_sym->name, &start)) 1205 return -ENOENT; 1206 if (start != kmap->ref_reloc_sym->addr) 1207 return -EINVAL; 1208 } 1209 1210 return validate_kcore_modules(kallsyms_filename, map); 1211 } 1212 1213 struct kcore_mapfn_data { 1214 struct dso *dso; 1215 struct list_head maps; 1216 }; 1217 1218 static int kcore_mapfn(u64 start, u64 len, u64 pgoff, void *data) 1219 { 1220 struct kcore_mapfn_data *md = data; 1221 struct map_list_node *list_node = map_list_node__new(); 1222 1223 if (!list_node) 1224 return -ENOMEM; 1225 1226 list_node->map = map__new2(start, md->dso); 1227 if (!list_node->map) { 1228 free(list_node); 1229 return -ENOMEM; 1230 } 1231 1232 map__set_end(list_node->map, map__start(list_node->map) + len); 1233 map__set_pgoff(list_node->map, pgoff); 1234 1235 list_add(&list_node->node, &md->maps); 1236 1237 return 0; 1238 } 1239 1240 static int dso__load_kcore(struct dso *dso, struct map *map, 1241 const char *kallsyms_filename) 1242 { 1243 struct maps *kmaps = map__kmaps(map); 1244 struct kcore_mapfn_data md; 1245 struct map *replacement_map = NULL; 1246 struct map_rb_node *old_node, *next; 1247 struct machine *machine; 1248 bool is_64_bit; 1249 int err, fd; 1250 char kcore_filename[PATH_MAX]; 1251 u64 stext; 1252 1253 if (!kmaps) 1254 return -EINVAL; 1255 1256 machine = maps__machine(kmaps); 1257 1258 /* This function requires that the map is the kernel map */ 1259 if (!__map__is_kernel(map)) 1260 return -EINVAL; 1261 1262 if (!filename_from_kallsyms_filename(kcore_filename, "kcore", 1263 kallsyms_filename)) 1264 return -EINVAL; 1265 1266 /* Modules and kernel must be present at their original addresses */ 1267 if (validate_kcore_addresses(kallsyms_filename, map)) 1268 return -EINVAL; 1269 1270 md.dso = dso; 1271 INIT_LIST_HEAD(&md.maps); 1272 1273 fd = open(kcore_filename, O_RDONLY); 1274 if (fd < 0) { 1275 pr_debug("Failed to open %s. Note /proc/kcore requires CAP_SYS_RAWIO capability to access.\n", 1276 kcore_filename); 1277 return -EINVAL; 1278 } 1279 1280 /* Read new maps into temporary lists */ 1281 err = file__read_maps(fd, map__prot(map) & PROT_EXEC, kcore_mapfn, &md, 1282 &is_64_bit); 1283 if (err) 1284 goto out_err; 1285 dso->is_64_bit = is_64_bit; 1286 1287 if (list_empty(&md.maps)) { 1288 err = -EINVAL; 1289 goto out_err; 1290 } 1291 1292 /* Remove old maps */ 1293 maps__for_each_entry_safe(kmaps, old_node, next) { 1294 struct map *old_map = old_node->map; 1295 1296 /* 1297 * We need to preserve eBPF maps even if they are 1298 * covered by kcore, because we need to access 1299 * eBPF dso for source data. 1300 */ 1301 if (old_map != map && !__map__is_bpf_prog(old_map)) 1302 maps__remove(kmaps, old_map); 1303 } 1304 machine->trampolines_mapped = false; 1305 1306 /* Find the kernel map using the '_stext' symbol */ 1307 if (!kallsyms__get_function_start(kallsyms_filename, "_stext", &stext)) { 1308 u64 replacement_size = 0; 1309 struct map_list_node *new_node; 1310 1311 list_for_each_entry(new_node, &md.maps, node) { 1312 struct map *new_map = new_node->map; 1313 u64 new_size = map__size(new_map); 1314 1315 if (!(stext >= map__start(new_map) && stext < map__end(new_map))) 1316 continue; 1317 1318 /* 1319 * On some architectures, ARM64 for example, the kernel 1320 * text can get allocated inside of the vmalloc segment. 1321 * Select the smallest matching segment, in case stext 1322 * falls within more than one in the list. 1323 */ 1324 if (!replacement_map || new_size < replacement_size) { 1325 replacement_map = new_map; 1326 replacement_size = new_size; 1327 } 1328 } 1329 } 1330 1331 if (!replacement_map) 1332 replacement_map = list_entry(md.maps.next, struct map_list_node, node)->map; 1333 1334 /* Add new maps */ 1335 while (!list_empty(&md.maps)) { 1336 struct map_list_node *new_node = list_entry(md.maps.next, struct map_list_node, node); 1337 struct map *new_map = new_node->map; 1338 1339 list_del_init(&new_node->node); 1340 1341 if (RC_CHK_EQUAL(new_map, replacement_map)) { 1342 struct map *map_ref; 1343 1344 map__set_start(map, map__start(new_map)); 1345 map__set_end(map, map__end(new_map)); 1346 map__set_pgoff(map, map__pgoff(new_map)); 1347 map__set_mapping_type(map, map__mapping_type(new_map)); 1348 /* Ensure maps are correctly ordered */ 1349 map_ref = map__get(map); 1350 maps__remove(kmaps, map_ref); 1351 err = maps__insert(kmaps, map_ref); 1352 map__put(map_ref); 1353 map__put(new_map); 1354 if (err) 1355 goto out_err; 1356 } else { 1357 /* 1358 * Merge kcore map into existing maps, 1359 * and ensure that current maps (eBPF) 1360 * stay intact. 1361 */ 1362 if (maps__merge_in(kmaps, new_map)) { 1363 err = -EINVAL; 1364 goto out_err; 1365 } 1366 } 1367 free(new_node); 1368 } 1369 1370 if (machine__is(machine, "x86_64")) { 1371 u64 addr; 1372 1373 /* 1374 * If one of the corresponding symbols is there, assume the 1375 * entry trampoline maps are too. 1376 */ 1377 if (!kallsyms__get_function_start(kallsyms_filename, 1378 ENTRY_TRAMPOLINE_NAME, 1379 &addr)) 1380 machine->trampolines_mapped = true; 1381 } 1382 1383 /* 1384 * Set the data type and long name so that kcore can be read via 1385 * dso__data_read_addr(). 1386 */ 1387 if (dso->kernel == DSO_SPACE__KERNEL_GUEST) 1388 dso->binary_type = DSO_BINARY_TYPE__GUEST_KCORE; 1389 else 1390 dso->binary_type = DSO_BINARY_TYPE__KCORE; 1391 dso__set_long_name(dso, strdup(kcore_filename), true); 1392 1393 close(fd); 1394 1395 if (map__prot(map) & PROT_EXEC) 1396 pr_debug("Using %s for kernel object code\n", kcore_filename); 1397 else 1398 pr_debug("Using %s for kernel data\n", kcore_filename); 1399 1400 return 0; 1401 1402 out_err: 1403 while (!list_empty(&md.maps)) { 1404 struct map_list_node *list_node; 1405 1406 list_node = list_entry(md.maps.next, struct map_list_node, node); 1407 list_del_init(&list_node->node); 1408 map__zput(list_node->map); 1409 free(list_node); 1410 } 1411 close(fd); 1412 return err; 1413 } 1414 1415 /* 1416 * If the kernel is relocated at boot time, kallsyms won't match. Compute the 1417 * delta based on the relocation reference symbol. 1418 */ 1419 static int kallsyms__delta(struct kmap *kmap, const char *filename, u64 *delta) 1420 { 1421 u64 addr; 1422 1423 if (!kmap->ref_reloc_sym || !kmap->ref_reloc_sym->name) 1424 return 0; 1425 1426 if (kallsyms__get_function_start(filename, kmap->ref_reloc_sym->name, &addr)) 1427 return -1; 1428 1429 *delta = addr - kmap->ref_reloc_sym->addr; 1430 return 0; 1431 } 1432 1433 int __dso__load_kallsyms(struct dso *dso, const char *filename, 1434 struct map *map, bool no_kcore) 1435 { 1436 struct kmap *kmap = map__kmap(map); 1437 u64 delta = 0; 1438 1439 if (symbol__restricted_filename(filename, "/proc/kallsyms")) 1440 return -1; 1441 1442 if (!kmap || !kmap->kmaps) 1443 return -1; 1444 1445 if (dso__load_all_kallsyms(dso, filename) < 0) 1446 return -1; 1447 1448 if (kallsyms__delta(kmap, filename, &delta)) 1449 return -1; 1450 1451 symbols__fixup_end(&dso->symbols, true); 1452 symbols__fixup_duplicate(&dso->symbols); 1453 1454 if (dso->kernel == DSO_SPACE__KERNEL_GUEST) 1455 dso->symtab_type = DSO_BINARY_TYPE__GUEST_KALLSYMS; 1456 else 1457 dso->symtab_type = DSO_BINARY_TYPE__KALLSYMS; 1458 1459 if (!no_kcore && !dso__load_kcore(dso, map, filename)) 1460 return maps__split_kallsyms_for_kcore(kmap->kmaps, dso); 1461 else 1462 return maps__split_kallsyms(kmap->kmaps, dso, delta, map); 1463 } 1464 1465 int dso__load_kallsyms(struct dso *dso, const char *filename, 1466 struct map *map) 1467 { 1468 return __dso__load_kallsyms(dso, filename, map, false); 1469 } 1470 1471 static int dso__load_perf_map(const char *map_path, struct dso *dso) 1472 { 1473 char *line = NULL; 1474 size_t n; 1475 FILE *file; 1476 int nr_syms = 0; 1477 1478 file = fopen(map_path, "r"); 1479 if (file == NULL) 1480 goto out_failure; 1481 1482 while (!feof(file)) { 1483 u64 start, size; 1484 struct symbol *sym; 1485 int line_len, len; 1486 1487 line_len = getline(&line, &n, file); 1488 if (line_len < 0) 1489 break; 1490 1491 if (!line) 1492 goto out_failure; 1493 1494 line[--line_len] = '\0'; /* \n */ 1495 1496 len = hex2u64(line, &start); 1497 1498 len++; 1499 if (len + 2 >= line_len) 1500 continue; 1501 1502 len += hex2u64(line + len, &size); 1503 1504 len++; 1505 if (len + 2 >= line_len) 1506 continue; 1507 1508 sym = symbol__new(start, size, STB_GLOBAL, STT_FUNC, line + len); 1509 1510 if (sym == NULL) 1511 goto out_delete_line; 1512 1513 symbols__insert(&dso->symbols, sym); 1514 nr_syms++; 1515 } 1516 1517 free(line); 1518 fclose(file); 1519 1520 return nr_syms; 1521 1522 out_delete_line: 1523 free(line); 1524 out_failure: 1525 return -1; 1526 } 1527 1528 #ifdef HAVE_LIBBFD_SUPPORT 1529 #define PACKAGE 'perf' 1530 #include <bfd.h> 1531 1532 static int bfd_symbols__cmpvalue(const void *a, const void *b) 1533 { 1534 const asymbol *as = *(const asymbol **)a, *bs = *(const asymbol **)b; 1535 1536 if (bfd_asymbol_value(as) != bfd_asymbol_value(bs)) 1537 return bfd_asymbol_value(as) - bfd_asymbol_value(bs); 1538 1539 return bfd_asymbol_name(as)[0] - bfd_asymbol_name(bs)[0]; 1540 } 1541 1542 static int bfd2elf_binding(asymbol *symbol) 1543 { 1544 if (symbol->flags & BSF_WEAK) 1545 return STB_WEAK; 1546 if (symbol->flags & BSF_GLOBAL) 1547 return STB_GLOBAL; 1548 if (symbol->flags & BSF_LOCAL) 1549 return STB_LOCAL; 1550 return -1; 1551 } 1552 1553 int dso__load_bfd_symbols(struct dso *dso, const char *debugfile) 1554 { 1555 int err = -1; 1556 long symbols_size, symbols_count, i; 1557 asection *section; 1558 asymbol **symbols, *sym; 1559 struct symbol *symbol; 1560 bfd *abfd; 1561 u64 start, len; 1562 1563 abfd = bfd_openr(debugfile, NULL); 1564 if (!abfd) 1565 return -1; 1566 1567 if (!bfd_check_format(abfd, bfd_object)) { 1568 pr_debug2("%s: cannot read %s bfd file.\n", __func__, 1569 dso->long_name); 1570 goto out_close; 1571 } 1572 1573 if (bfd_get_flavour(abfd) == bfd_target_elf_flavour) 1574 goto out_close; 1575 1576 symbols_size = bfd_get_symtab_upper_bound(abfd); 1577 if (symbols_size == 0) { 1578 bfd_close(abfd); 1579 return 0; 1580 } 1581 1582 if (symbols_size < 0) 1583 goto out_close; 1584 1585 symbols = malloc(symbols_size); 1586 if (!symbols) 1587 goto out_close; 1588 1589 symbols_count = bfd_canonicalize_symtab(abfd, symbols); 1590 if (symbols_count < 0) 1591 goto out_free; 1592 1593 section = bfd_get_section_by_name(abfd, ".text"); 1594 if (section) { 1595 for (i = 0; i < symbols_count; ++i) { 1596 if (!strcmp(bfd_asymbol_name(symbols[i]), "__ImageBase") || 1597 !strcmp(bfd_asymbol_name(symbols[i]), "__image_base__")) 1598 break; 1599 } 1600 if (i < symbols_count) { 1601 /* PE symbols can only have 4 bytes, so use .text high bits */ 1602 dso->text_offset = section->vma - (u32)section->vma; 1603 dso->text_offset += (u32)bfd_asymbol_value(symbols[i]); 1604 dso->text_end = (section->vma - dso->text_offset) + section->size; 1605 } else { 1606 dso->text_offset = section->vma - section->filepos; 1607 dso->text_end = section->filepos + section->size; 1608 } 1609 } 1610 1611 qsort(symbols, symbols_count, sizeof(asymbol *), bfd_symbols__cmpvalue); 1612 1613 #ifdef bfd_get_section 1614 #define bfd_asymbol_section bfd_get_section 1615 #endif 1616 for (i = 0; i < symbols_count; ++i) { 1617 sym = symbols[i]; 1618 section = bfd_asymbol_section(sym); 1619 if (bfd2elf_binding(sym) < 0) 1620 continue; 1621 1622 while (i + 1 < symbols_count && 1623 bfd_asymbol_section(symbols[i + 1]) == section && 1624 bfd2elf_binding(symbols[i + 1]) < 0) 1625 i++; 1626 1627 if (i + 1 < symbols_count && 1628 bfd_asymbol_section(symbols[i + 1]) == section) 1629 len = symbols[i + 1]->value - sym->value; 1630 else 1631 len = section->size - sym->value; 1632 1633 start = bfd_asymbol_value(sym) - dso->text_offset; 1634 symbol = symbol__new(start, len, bfd2elf_binding(sym), STT_FUNC, 1635 bfd_asymbol_name(sym)); 1636 if (!symbol) 1637 goto out_free; 1638 1639 symbols__insert(&dso->symbols, symbol); 1640 } 1641 #ifdef bfd_get_section 1642 #undef bfd_asymbol_section 1643 #endif 1644 1645 symbols__fixup_end(&dso->symbols, false); 1646 symbols__fixup_duplicate(&dso->symbols); 1647 dso->adjust_symbols = 1; 1648 1649 err = 0; 1650 out_free: 1651 free(symbols); 1652 out_close: 1653 bfd_close(abfd); 1654 return err; 1655 } 1656 #endif 1657 1658 static bool dso__is_compatible_symtab_type(struct dso *dso, bool kmod, 1659 enum dso_binary_type type) 1660 { 1661 switch (type) { 1662 case DSO_BINARY_TYPE__JAVA_JIT: 1663 case DSO_BINARY_TYPE__DEBUGLINK: 1664 case DSO_BINARY_TYPE__SYSTEM_PATH_DSO: 1665 case DSO_BINARY_TYPE__FEDORA_DEBUGINFO: 1666 case DSO_BINARY_TYPE__UBUNTU_DEBUGINFO: 1667 case DSO_BINARY_TYPE__MIXEDUP_UBUNTU_DEBUGINFO: 1668 case DSO_BINARY_TYPE__BUILDID_DEBUGINFO: 1669 case DSO_BINARY_TYPE__OPENEMBEDDED_DEBUGINFO: 1670 return !kmod && dso->kernel == DSO_SPACE__USER; 1671 1672 case DSO_BINARY_TYPE__KALLSYMS: 1673 case DSO_BINARY_TYPE__VMLINUX: 1674 case DSO_BINARY_TYPE__KCORE: 1675 return dso->kernel == DSO_SPACE__KERNEL; 1676 1677 case DSO_BINARY_TYPE__GUEST_KALLSYMS: 1678 case DSO_BINARY_TYPE__GUEST_VMLINUX: 1679 case DSO_BINARY_TYPE__GUEST_KCORE: 1680 return dso->kernel == DSO_SPACE__KERNEL_GUEST; 1681 1682 case DSO_BINARY_TYPE__GUEST_KMODULE: 1683 case DSO_BINARY_TYPE__GUEST_KMODULE_COMP: 1684 case DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE: 1685 case DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP: 1686 /* 1687 * kernel modules know their symtab type - it's set when 1688 * creating a module dso in machine__addnew_module_map(). 1689 */ 1690 return kmod && dso->symtab_type == type; 1691 1692 case DSO_BINARY_TYPE__BUILD_ID_CACHE: 1693 case DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO: 1694 return true; 1695 1696 case DSO_BINARY_TYPE__BPF_PROG_INFO: 1697 case DSO_BINARY_TYPE__BPF_IMAGE: 1698 case DSO_BINARY_TYPE__OOL: 1699 case DSO_BINARY_TYPE__NOT_FOUND: 1700 default: 1701 return false; 1702 } 1703 } 1704 1705 /* Checks for the existence of the perf-<pid>.map file in two different 1706 * locations. First, if the process is a separate mount namespace, check in 1707 * that namespace using the pid of the innermost pid namespace. If's not in a 1708 * namespace, or the file can't be found there, try in the mount namespace of 1709 * the tracing process using our view of its pid. 1710 */ 1711 static int dso__find_perf_map(char *filebuf, size_t bufsz, 1712 struct nsinfo **nsip) 1713 { 1714 struct nscookie nsc; 1715 struct nsinfo *nsi; 1716 struct nsinfo *nnsi; 1717 int rc = -1; 1718 1719 nsi = *nsip; 1720 1721 if (nsinfo__need_setns(nsi)) { 1722 snprintf(filebuf, bufsz, "/tmp/perf-%d.map", nsinfo__nstgid(nsi)); 1723 nsinfo__mountns_enter(nsi, &nsc); 1724 rc = access(filebuf, R_OK); 1725 nsinfo__mountns_exit(&nsc); 1726 if (rc == 0) 1727 return rc; 1728 } 1729 1730 nnsi = nsinfo__copy(nsi); 1731 if (nnsi) { 1732 nsinfo__put(nsi); 1733 1734 nsinfo__clear_need_setns(nnsi); 1735 snprintf(filebuf, bufsz, "/tmp/perf-%d.map", nsinfo__tgid(nnsi)); 1736 *nsip = nnsi; 1737 rc = 0; 1738 } 1739 1740 return rc; 1741 } 1742 1743 int dso__load(struct dso *dso, struct map *map) 1744 { 1745 char *name; 1746 int ret = -1; 1747 u_int i; 1748 struct machine *machine = NULL; 1749 char *root_dir = (char *) ""; 1750 int ss_pos = 0; 1751 struct symsrc ss_[2]; 1752 struct symsrc *syms_ss = NULL, *runtime_ss = NULL; 1753 bool kmod; 1754 bool perfmap; 1755 struct build_id bid; 1756 struct nscookie nsc; 1757 char newmapname[PATH_MAX]; 1758 const char *map_path = dso->long_name; 1759 1760 mutex_lock(&dso->lock); 1761 perfmap = strncmp(dso->name, "/tmp/perf-", 10) == 0; 1762 if (perfmap) { 1763 if (dso->nsinfo && (dso__find_perf_map(newmapname, 1764 sizeof(newmapname), &dso->nsinfo) == 0)) { 1765 map_path = newmapname; 1766 } 1767 } 1768 1769 nsinfo__mountns_enter(dso->nsinfo, &nsc); 1770 1771 /* check again under the dso->lock */ 1772 if (dso__loaded(dso)) { 1773 ret = 1; 1774 goto out; 1775 } 1776 1777 kmod = dso->symtab_type == DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE || 1778 dso->symtab_type == DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP || 1779 dso->symtab_type == DSO_BINARY_TYPE__GUEST_KMODULE || 1780 dso->symtab_type == DSO_BINARY_TYPE__GUEST_KMODULE_COMP; 1781 1782 if (dso->kernel && !kmod) { 1783 if (dso->kernel == DSO_SPACE__KERNEL) 1784 ret = dso__load_kernel_sym(dso, map); 1785 else if (dso->kernel == DSO_SPACE__KERNEL_GUEST) 1786 ret = dso__load_guest_kernel_sym(dso, map); 1787 1788 machine = maps__machine(map__kmaps(map)); 1789 if (machine__is(machine, "x86_64")) 1790 machine__map_x86_64_entry_trampolines(machine, dso); 1791 goto out; 1792 } 1793 1794 dso->adjust_symbols = 0; 1795 1796 if (perfmap) { 1797 ret = dso__load_perf_map(map_path, dso); 1798 dso->symtab_type = ret > 0 ? DSO_BINARY_TYPE__JAVA_JIT : 1799 DSO_BINARY_TYPE__NOT_FOUND; 1800 goto out; 1801 } 1802 1803 if (machine) 1804 root_dir = machine->root_dir; 1805 1806 name = malloc(PATH_MAX); 1807 if (!name) 1808 goto out; 1809 1810 /* 1811 * Read the build id if possible. This is required for 1812 * DSO_BINARY_TYPE__BUILDID_DEBUGINFO to work 1813 */ 1814 if (!dso->has_build_id && 1815 is_regular_file(dso->long_name)) { 1816 __symbol__join_symfs(name, PATH_MAX, dso->long_name); 1817 if (filename__read_build_id(name, &bid) > 0) 1818 dso__set_build_id(dso, &bid); 1819 } 1820 1821 /* 1822 * Iterate over candidate debug images. 1823 * Keep track of "interesting" ones (those which have a symtab, dynsym, 1824 * and/or opd section) for processing. 1825 */ 1826 for (i = 0; i < DSO_BINARY_TYPE__SYMTAB_CNT; i++) { 1827 struct symsrc *ss = &ss_[ss_pos]; 1828 bool next_slot = false; 1829 bool is_reg; 1830 bool nsexit; 1831 int bfdrc = -1; 1832 int sirc = -1; 1833 1834 enum dso_binary_type symtab_type = binary_type_symtab[i]; 1835 1836 nsexit = (symtab_type == DSO_BINARY_TYPE__BUILD_ID_CACHE || 1837 symtab_type == DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO); 1838 1839 if (!dso__is_compatible_symtab_type(dso, kmod, symtab_type)) 1840 continue; 1841 1842 if (dso__read_binary_type_filename(dso, symtab_type, 1843 root_dir, name, PATH_MAX)) 1844 continue; 1845 1846 if (nsexit) 1847 nsinfo__mountns_exit(&nsc); 1848 1849 is_reg = is_regular_file(name); 1850 if (!is_reg && errno == ENOENT && dso->nsinfo) { 1851 char *new_name = dso__filename_with_chroot(dso, name); 1852 if (new_name) { 1853 is_reg = is_regular_file(new_name); 1854 strlcpy(name, new_name, PATH_MAX); 1855 free(new_name); 1856 } 1857 } 1858 1859 #ifdef HAVE_LIBBFD_SUPPORT 1860 if (is_reg) 1861 bfdrc = dso__load_bfd_symbols(dso, name); 1862 #endif 1863 if (is_reg && bfdrc < 0) 1864 sirc = symsrc__init(ss, dso, name, symtab_type); 1865 1866 if (nsexit) 1867 nsinfo__mountns_enter(dso->nsinfo, &nsc); 1868 1869 if (bfdrc == 0) { 1870 ret = 0; 1871 break; 1872 } 1873 1874 if (!is_reg || sirc < 0) 1875 continue; 1876 1877 if (!syms_ss && symsrc__has_symtab(ss)) { 1878 syms_ss = ss; 1879 next_slot = true; 1880 if (!dso->symsrc_filename) 1881 dso->symsrc_filename = strdup(name); 1882 } 1883 1884 if (!runtime_ss && symsrc__possibly_runtime(ss)) { 1885 runtime_ss = ss; 1886 next_slot = true; 1887 } 1888 1889 if (next_slot) { 1890 ss_pos++; 1891 1892 if (syms_ss && runtime_ss) 1893 break; 1894 } else { 1895 symsrc__destroy(ss); 1896 } 1897 1898 } 1899 1900 if (!runtime_ss && !syms_ss) 1901 goto out_free; 1902 1903 if (runtime_ss && !syms_ss) { 1904 syms_ss = runtime_ss; 1905 } 1906 1907 /* We'll have to hope for the best */ 1908 if (!runtime_ss && syms_ss) 1909 runtime_ss = syms_ss; 1910 1911 if (syms_ss) 1912 ret = dso__load_sym(dso, map, syms_ss, runtime_ss, kmod); 1913 else 1914 ret = -1; 1915 1916 if (ret > 0) { 1917 int nr_plt; 1918 1919 nr_plt = dso__synthesize_plt_symbols(dso, runtime_ss); 1920 if (nr_plt > 0) 1921 ret += nr_plt; 1922 } 1923 1924 for (; ss_pos > 0; ss_pos--) 1925 symsrc__destroy(&ss_[ss_pos - 1]); 1926 out_free: 1927 free(name); 1928 if (ret < 0 && strstr(dso->name, " (deleted)") != NULL) 1929 ret = 0; 1930 out: 1931 dso__set_loaded(dso); 1932 mutex_unlock(&dso->lock); 1933 nsinfo__mountns_exit(&nsc); 1934 1935 return ret; 1936 } 1937 1938 int dso__load_vmlinux(struct dso *dso, struct map *map, 1939 const char *vmlinux, bool vmlinux_allocated) 1940 { 1941 int err = -1; 1942 struct symsrc ss; 1943 char symfs_vmlinux[PATH_MAX]; 1944 enum dso_binary_type symtab_type; 1945 1946 if (vmlinux[0] == '/') 1947 snprintf(symfs_vmlinux, sizeof(symfs_vmlinux), "%s", vmlinux); 1948 else 1949 symbol__join_symfs(symfs_vmlinux, vmlinux); 1950 1951 if (dso->kernel == DSO_SPACE__KERNEL_GUEST) 1952 symtab_type = DSO_BINARY_TYPE__GUEST_VMLINUX; 1953 else 1954 symtab_type = DSO_BINARY_TYPE__VMLINUX; 1955 1956 if (symsrc__init(&ss, dso, symfs_vmlinux, symtab_type)) 1957 return -1; 1958 1959 /* 1960 * dso__load_sym() may copy 'dso' which will result in the copies having 1961 * an incorrect long name unless we set it here first. 1962 */ 1963 dso__set_long_name(dso, vmlinux, vmlinux_allocated); 1964 if (dso->kernel == DSO_SPACE__KERNEL_GUEST) 1965 dso->binary_type = DSO_BINARY_TYPE__GUEST_VMLINUX; 1966 else 1967 dso->binary_type = DSO_BINARY_TYPE__VMLINUX; 1968 1969 err = dso__load_sym(dso, map, &ss, &ss, 0); 1970 symsrc__destroy(&ss); 1971 1972 if (err > 0) { 1973 dso__set_loaded(dso); 1974 pr_debug("Using %s for symbols\n", symfs_vmlinux); 1975 } 1976 1977 return err; 1978 } 1979 1980 int dso__load_vmlinux_path(struct dso *dso, struct map *map) 1981 { 1982 int i, err = 0; 1983 char *filename = NULL; 1984 1985 pr_debug("Looking at the vmlinux_path (%d entries long)\n", 1986 vmlinux_path__nr_entries + 1); 1987 1988 for (i = 0; i < vmlinux_path__nr_entries; ++i) { 1989 err = dso__load_vmlinux(dso, map, vmlinux_path[i], false); 1990 if (err > 0) 1991 goto out; 1992 } 1993 1994 if (!symbol_conf.ignore_vmlinux_buildid) 1995 filename = dso__build_id_filename(dso, NULL, 0, false); 1996 if (filename != NULL) { 1997 err = dso__load_vmlinux(dso, map, filename, true); 1998 if (err > 0) 1999 goto out; 2000 free(filename); 2001 } 2002 out: 2003 return err; 2004 } 2005 2006 static bool visible_dir_filter(const char *name, struct dirent *d) 2007 { 2008 if (d->d_type != DT_DIR) 2009 return false; 2010 return lsdir_no_dot_filter(name, d); 2011 } 2012 2013 static int find_matching_kcore(struct map *map, char *dir, size_t dir_sz) 2014 { 2015 char kallsyms_filename[PATH_MAX]; 2016 int ret = -1; 2017 struct strlist *dirs; 2018 struct str_node *nd; 2019 2020 dirs = lsdir(dir, visible_dir_filter); 2021 if (!dirs) 2022 return -1; 2023 2024 strlist__for_each_entry(nd, dirs) { 2025 scnprintf(kallsyms_filename, sizeof(kallsyms_filename), 2026 "%s/%s/kallsyms", dir, nd->s); 2027 if (!validate_kcore_addresses(kallsyms_filename, map)) { 2028 strlcpy(dir, kallsyms_filename, dir_sz); 2029 ret = 0; 2030 break; 2031 } 2032 } 2033 2034 strlist__delete(dirs); 2035 2036 return ret; 2037 } 2038 2039 /* 2040 * Use open(O_RDONLY) to check readability directly instead of access(R_OK) 2041 * since access(R_OK) only checks with real UID/GID but open() use effective 2042 * UID/GID and actual capabilities (e.g. /proc/kcore requires CAP_SYS_RAWIO). 2043 */ 2044 static bool filename__readable(const char *file) 2045 { 2046 int fd = open(file, O_RDONLY); 2047 if (fd < 0) 2048 return false; 2049 close(fd); 2050 return true; 2051 } 2052 2053 static char *dso__find_kallsyms(struct dso *dso, struct map *map) 2054 { 2055 struct build_id bid; 2056 char sbuild_id[SBUILD_ID_SIZE]; 2057 bool is_host = false; 2058 char path[PATH_MAX]; 2059 2060 if (!dso->has_build_id) { 2061 /* 2062 * Last resort, if we don't have a build-id and couldn't find 2063 * any vmlinux file, try the running kernel kallsyms table. 2064 */ 2065 goto proc_kallsyms; 2066 } 2067 2068 if (sysfs__read_build_id("/sys/kernel/notes", &bid) == 0) 2069 is_host = dso__build_id_equal(dso, &bid); 2070 2071 /* Try a fast path for /proc/kallsyms if possible */ 2072 if (is_host) { 2073 /* 2074 * Do not check the build-id cache, unless we know we cannot use 2075 * /proc/kcore or module maps don't match to /proc/kallsyms. 2076 * To check readability of /proc/kcore, do not use access(R_OK) 2077 * since /proc/kcore requires CAP_SYS_RAWIO to read and access 2078 * can't check it. 2079 */ 2080 if (filename__readable("/proc/kcore") && 2081 !validate_kcore_addresses("/proc/kallsyms", map)) 2082 goto proc_kallsyms; 2083 } 2084 2085 build_id__sprintf(&dso->bid, sbuild_id); 2086 2087 /* Find kallsyms in build-id cache with kcore */ 2088 scnprintf(path, sizeof(path), "%s/%s/%s", 2089 buildid_dir, DSO__NAME_KCORE, sbuild_id); 2090 2091 if (!find_matching_kcore(map, path, sizeof(path))) 2092 return strdup(path); 2093 2094 /* Use current /proc/kallsyms if possible */ 2095 if (is_host) { 2096 proc_kallsyms: 2097 return strdup("/proc/kallsyms"); 2098 } 2099 2100 /* Finally, find a cache of kallsyms */ 2101 if (!build_id_cache__kallsyms_path(sbuild_id, path, sizeof(path))) { 2102 pr_err("No kallsyms or vmlinux with build-id %s was found\n", 2103 sbuild_id); 2104 return NULL; 2105 } 2106 2107 return strdup(path); 2108 } 2109 2110 static int dso__load_kernel_sym(struct dso *dso, struct map *map) 2111 { 2112 int err; 2113 const char *kallsyms_filename = NULL; 2114 char *kallsyms_allocated_filename = NULL; 2115 char *filename = NULL; 2116 2117 /* 2118 * Step 1: if the user specified a kallsyms or vmlinux filename, use 2119 * it and only it, reporting errors to the user if it cannot be used. 2120 * 2121 * For instance, try to analyse an ARM perf.data file _without_ a 2122 * build-id, or if the user specifies the wrong path to the right 2123 * vmlinux file, obviously we can't fallback to another vmlinux (a 2124 * x86_86 one, on the machine where analysis is being performed, say), 2125 * or worse, /proc/kallsyms. 2126 * 2127 * If the specified file _has_ a build-id and there is a build-id 2128 * section in the perf.data file, we will still do the expected 2129 * validation in dso__load_vmlinux and will bail out if they don't 2130 * match. 2131 */ 2132 if (symbol_conf.kallsyms_name != NULL) { 2133 kallsyms_filename = symbol_conf.kallsyms_name; 2134 goto do_kallsyms; 2135 } 2136 2137 if (!symbol_conf.ignore_vmlinux && symbol_conf.vmlinux_name != NULL) { 2138 return dso__load_vmlinux(dso, map, symbol_conf.vmlinux_name, false); 2139 } 2140 2141 /* 2142 * Before checking on common vmlinux locations, check if it's 2143 * stored as standard build id binary (not kallsyms) under 2144 * .debug cache. 2145 */ 2146 if (!symbol_conf.ignore_vmlinux_buildid) 2147 filename = __dso__build_id_filename(dso, NULL, 0, false, false); 2148 if (filename != NULL) { 2149 err = dso__load_vmlinux(dso, map, filename, true); 2150 if (err > 0) 2151 return err; 2152 free(filename); 2153 } 2154 2155 if (!symbol_conf.ignore_vmlinux && vmlinux_path != NULL) { 2156 err = dso__load_vmlinux_path(dso, map); 2157 if (err > 0) 2158 return err; 2159 } 2160 2161 /* do not try local files if a symfs was given */ 2162 if (symbol_conf.symfs[0] != 0) 2163 return -1; 2164 2165 kallsyms_allocated_filename = dso__find_kallsyms(dso, map); 2166 if (!kallsyms_allocated_filename) 2167 return -1; 2168 2169 kallsyms_filename = kallsyms_allocated_filename; 2170 2171 do_kallsyms: 2172 err = dso__load_kallsyms(dso, kallsyms_filename, map); 2173 if (err > 0) 2174 pr_debug("Using %s for symbols\n", kallsyms_filename); 2175 free(kallsyms_allocated_filename); 2176 2177 if (err > 0 && !dso__is_kcore(dso)) { 2178 dso->binary_type = DSO_BINARY_TYPE__KALLSYMS; 2179 dso__set_long_name(dso, DSO__NAME_KALLSYMS, false); 2180 map__fixup_start(map); 2181 map__fixup_end(map); 2182 } 2183 2184 return err; 2185 } 2186 2187 static int dso__load_guest_kernel_sym(struct dso *dso, struct map *map) 2188 { 2189 int err; 2190 const char *kallsyms_filename; 2191 struct machine *machine = maps__machine(map__kmaps(map)); 2192 char path[PATH_MAX]; 2193 2194 if (machine->kallsyms_filename) { 2195 kallsyms_filename = machine->kallsyms_filename; 2196 } else if (machine__is_default_guest(machine)) { 2197 /* 2198 * if the user specified a vmlinux filename, use it and only 2199 * it, reporting errors to the user if it cannot be used. 2200 * Or use file guest_kallsyms inputted by user on commandline 2201 */ 2202 if (symbol_conf.default_guest_vmlinux_name != NULL) { 2203 err = dso__load_vmlinux(dso, map, 2204 symbol_conf.default_guest_vmlinux_name, 2205 false); 2206 return err; 2207 } 2208 2209 kallsyms_filename = symbol_conf.default_guest_kallsyms; 2210 if (!kallsyms_filename) 2211 return -1; 2212 } else { 2213 sprintf(path, "%s/proc/kallsyms", machine->root_dir); 2214 kallsyms_filename = path; 2215 } 2216 2217 err = dso__load_kallsyms(dso, kallsyms_filename, map); 2218 if (err > 0) 2219 pr_debug("Using %s for symbols\n", kallsyms_filename); 2220 if (err > 0 && !dso__is_kcore(dso)) { 2221 dso->binary_type = DSO_BINARY_TYPE__GUEST_KALLSYMS; 2222 dso__set_long_name(dso, machine->mmap_name, false); 2223 map__fixup_start(map); 2224 map__fixup_end(map); 2225 } 2226 2227 return err; 2228 } 2229 2230 static void vmlinux_path__exit(void) 2231 { 2232 while (--vmlinux_path__nr_entries >= 0) 2233 zfree(&vmlinux_path[vmlinux_path__nr_entries]); 2234 vmlinux_path__nr_entries = 0; 2235 2236 zfree(&vmlinux_path); 2237 } 2238 2239 static const char * const vmlinux_paths[] = { 2240 "vmlinux", 2241 "/boot/vmlinux" 2242 }; 2243 2244 static const char * const vmlinux_paths_upd[] = { 2245 "/boot/vmlinux-%s", 2246 "/usr/lib/debug/boot/vmlinux-%s", 2247 "/lib/modules/%s/build/vmlinux", 2248 "/usr/lib/debug/lib/modules/%s/vmlinux", 2249 "/usr/lib/debug/boot/vmlinux-%s.debug" 2250 }; 2251 2252 static int vmlinux_path__add(const char *new_entry) 2253 { 2254 vmlinux_path[vmlinux_path__nr_entries] = strdup(new_entry); 2255 if (vmlinux_path[vmlinux_path__nr_entries] == NULL) 2256 return -1; 2257 ++vmlinux_path__nr_entries; 2258 2259 return 0; 2260 } 2261 2262 static int vmlinux_path__init(struct perf_env *env) 2263 { 2264 struct utsname uts; 2265 char bf[PATH_MAX]; 2266 char *kernel_version; 2267 unsigned int i; 2268 2269 vmlinux_path = malloc(sizeof(char *) * (ARRAY_SIZE(vmlinux_paths) + 2270 ARRAY_SIZE(vmlinux_paths_upd))); 2271 if (vmlinux_path == NULL) 2272 return -1; 2273 2274 for (i = 0; i < ARRAY_SIZE(vmlinux_paths); i++) 2275 if (vmlinux_path__add(vmlinux_paths[i]) < 0) 2276 goto out_fail; 2277 2278 /* only try kernel version if no symfs was given */ 2279 if (symbol_conf.symfs[0] != 0) 2280 return 0; 2281 2282 if (env) { 2283 kernel_version = env->os_release; 2284 } else { 2285 if (uname(&uts) < 0) 2286 goto out_fail; 2287 2288 kernel_version = uts.release; 2289 } 2290 2291 for (i = 0; i < ARRAY_SIZE(vmlinux_paths_upd); i++) { 2292 snprintf(bf, sizeof(bf), vmlinux_paths_upd[i], kernel_version); 2293 if (vmlinux_path__add(bf) < 0) 2294 goto out_fail; 2295 } 2296 2297 return 0; 2298 2299 out_fail: 2300 vmlinux_path__exit(); 2301 return -1; 2302 } 2303 2304 int setup_list(struct strlist **list, const char *list_str, 2305 const char *list_name) 2306 { 2307 if (list_str == NULL) 2308 return 0; 2309 2310 *list = strlist__new(list_str, NULL); 2311 if (!*list) { 2312 pr_err("problems parsing %s list\n", list_name); 2313 return -1; 2314 } 2315 2316 symbol_conf.has_filter = true; 2317 return 0; 2318 } 2319 2320 int setup_intlist(struct intlist **list, const char *list_str, 2321 const char *list_name) 2322 { 2323 if (list_str == NULL) 2324 return 0; 2325 2326 *list = intlist__new(list_str); 2327 if (!*list) { 2328 pr_err("problems parsing %s list\n", list_name); 2329 return -1; 2330 } 2331 return 0; 2332 } 2333 2334 static int setup_addrlist(struct intlist **addr_list, struct strlist *sym_list) 2335 { 2336 struct str_node *pos, *tmp; 2337 unsigned long val; 2338 char *sep; 2339 const char *end; 2340 int i = 0, err; 2341 2342 *addr_list = intlist__new(NULL); 2343 if (!*addr_list) 2344 return -1; 2345 2346 strlist__for_each_entry_safe(pos, tmp, sym_list) { 2347 errno = 0; 2348 val = strtoul(pos->s, &sep, 16); 2349 if (errno || (sep == pos->s)) 2350 continue; 2351 2352 if (*sep != '\0') { 2353 end = pos->s + strlen(pos->s) - 1; 2354 while (end >= sep && isspace(*end)) 2355 end--; 2356 2357 if (end >= sep) 2358 continue; 2359 } 2360 2361 err = intlist__add(*addr_list, val); 2362 if (err) 2363 break; 2364 2365 strlist__remove(sym_list, pos); 2366 i++; 2367 } 2368 2369 if (i == 0) { 2370 intlist__delete(*addr_list); 2371 *addr_list = NULL; 2372 } 2373 2374 return 0; 2375 } 2376 2377 static bool symbol__read_kptr_restrict(void) 2378 { 2379 bool value = false; 2380 FILE *fp = fopen("/proc/sys/kernel/kptr_restrict", "r"); 2381 2382 if (fp != NULL) { 2383 char line[8]; 2384 2385 if (fgets(line, sizeof(line), fp) != NULL) 2386 value = perf_cap__capable(CAP_SYSLOG) ? 2387 (atoi(line) >= 2) : 2388 (atoi(line) != 0); 2389 2390 fclose(fp); 2391 } 2392 2393 /* Per kernel/kallsyms.c: 2394 * we also restrict when perf_event_paranoid > 1 w/o CAP_SYSLOG 2395 */ 2396 if (perf_event_paranoid() > 1 && !perf_cap__capable(CAP_SYSLOG)) 2397 value = true; 2398 2399 return value; 2400 } 2401 2402 int symbol__annotation_init(void) 2403 { 2404 if (symbol_conf.init_annotation) 2405 return 0; 2406 2407 if (symbol_conf.initialized) { 2408 pr_err("Annotation needs to be init before symbol__init()\n"); 2409 return -1; 2410 } 2411 2412 symbol_conf.priv_size += sizeof(struct annotation); 2413 symbol_conf.init_annotation = true; 2414 return 0; 2415 } 2416 2417 int symbol__init(struct perf_env *env) 2418 { 2419 const char *symfs; 2420 2421 if (symbol_conf.initialized) 2422 return 0; 2423 2424 symbol_conf.priv_size = PERF_ALIGN(symbol_conf.priv_size, sizeof(u64)); 2425 2426 symbol__elf_init(); 2427 2428 if (symbol_conf.try_vmlinux_path && vmlinux_path__init(env) < 0) 2429 return -1; 2430 2431 if (symbol_conf.field_sep && *symbol_conf.field_sep == '.') { 2432 pr_err("'.' is the only non valid --field-separator argument\n"); 2433 return -1; 2434 } 2435 2436 if (setup_list(&symbol_conf.dso_list, 2437 symbol_conf.dso_list_str, "dso") < 0) 2438 return -1; 2439 2440 if (setup_list(&symbol_conf.comm_list, 2441 symbol_conf.comm_list_str, "comm") < 0) 2442 goto out_free_dso_list; 2443 2444 if (setup_intlist(&symbol_conf.pid_list, 2445 symbol_conf.pid_list_str, "pid") < 0) 2446 goto out_free_comm_list; 2447 2448 if (setup_intlist(&symbol_conf.tid_list, 2449 symbol_conf.tid_list_str, "tid") < 0) 2450 goto out_free_pid_list; 2451 2452 if (setup_list(&symbol_conf.sym_list, 2453 symbol_conf.sym_list_str, "symbol") < 0) 2454 goto out_free_tid_list; 2455 2456 if (symbol_conf.sym_list && 2457 setup_addrlist(&symbol_conf.addr_list, symbol_conf.sym_list) < 0) 2458 goto out_free_sym_list; 2459 2460 if (setup_list(&symbol_conf.bt_stop_list, 2461 symbol_conf.bt_stop_list_str, "symbol") < 0) 2462 goto out_free_sym_list; 2463 2464 /* 2465 * A path to symbols of "/" is identical to "" 2466 * reset here for simplicity. 2467 */ 2468 symfs = realpath(symbol_conf.symfs, NULL); 2469 if (symfs == NULL) 2470 symfs = symbol_conf.symfs; 2471 if (strcmp(symfs, "/") == 0) 2472 symbol_conf.symfs = ""; 2473 if (symfs != symbol_conf.symfs) 2474 free((void *)symfs); 2475 2476 symbol_conf.kptr_restrict = symbol__read_kptr_restrict(); 2477 2478 symbol_conf.initialized = true; 2479 return 0; 2480 2481 out_free_sym_list: 2482 strlist__delete(symbol_conf.sym_list); 2483 intlist__delete(symbol_conf.addr_list); 2484 out_free_tid_list: 2485 intlist__delete(symbol_conf.tid_list); 2486 out_free_pid_list: 2487 intlist__delete(symbol_conf.pid_list); 2488 out_free_comm_list: 2489 strlist__delete(symbol_conf.comm_list); 2490 out_free_dso_list: 2491 strlist__delete(symbol_conf.dso_list); 2492 return -1; 2493 } 2494 2495 void symbol__exit(void) 2496 { 2497 if (!symbol_conf.initialized) 2498 return; 2499 strlist__delete(symbol_conf.bt_stop_list); 2500 strlist__delete(symbol_conf.sym_list); 2501 strlist__delete(symbol_conf.dso_list); 2502 strlist__delete(symbol_conf.comm_list); 2503 intlist__delete(symbol_conf.tid_list); 2504 intlist__delete(symbol_conf.pid_list); 2505 intlist__delete(symbol_conf.addr_list); 2506 vmlinux_path__exit(); 2507 symbol_conf.sym_list = symbol_conf.dso_list = symbol_conf.comm_list = NULL; 2508 symbol_conf.bt_stop_list = NULL; 2509 symbol_conf.initialized = false; 2510 } 2511 2512 int symbol__config_symfs(const struct option *opt __maybe_unused, 2513 const char *dir, int unset __maybe_unused) 2514 { 2515 char *bf = NULL; 2516 int ret; 2517 2518 symbol_conf.symfs = strdup(dir); 2519 if (symbol_conf.symfs == NULL) 2520 return -ENOMEM; 2521 2522 /* skip the locally configured cache if a symfs is given, and 2523 * config buildid dir to symfs/.debug 2524 */ 2525 ret = asprintf(&bf, "%s/%s", dir, ".debug"); 2526 if (ret < 0) 2527 return -ENOMEM; 2528 2529 set_buildid_dir(bf); 2530 2531 free(bf); 2532 return 0; 2533 } 2534 2535 struct mem_info *mem_info__get(struct mem_info *mi) 2536 { 2537 if (mi) 2538 refcount_inc(&mi->refcnt); 2539 return mi; 2540 } 2541 2542 void mem_info__put(struct mem_info *mi) 2543 { 2544 if (mi && refcount_dec_and_test(&mi->refcnt)) { 2545 addr_map_symbol__exit(&mi->iaddr); 2546 addr_map_symbol__exit(&mi->daddr); 2547 free(mi); 2548 } 2549 } 2550 2551 struct mem_info *mem_info__new(void) 2552 { 2553 struct mem_info *mi = zalloc(sizeof(*mi)); 2554 2555 if (mi) 2556 refcount_set(&mi->refcnt, 1); 2557 return mi; 2558 } 2559 2560 /* 2561 * Checks that user supplied symbol kernel files are accessible because 2562 * the default mechanism for accessing elf files fails silently. i.e. if 2563 * debug syms for a build ID aren't found perf carries on normally. When 2564 * they are user supplied we should assume that the user doesn't want to 2565 * silently fail. 2566 */ 2567 int symbol__validate_sym_arguments(void) 2568 { 2569 if (symbol_conf.vmlinux_name && 2570 access(symbol_conf.vmlinux_name, R_OK)) { 2571 pr_err("Invalid file: %s\n", symbol_conf.vmlinux_name); 2572 return -EINVAL; 2573 } 2574 if (symbol_conf.kallsyms_name && 2575 access(symbol_conf.kallsyms_name, R_OK)) { 2576 pr_err("Invalid file: %s\n", symbol_conf.kallsyms_name); 2577 return -EINVAL; 2578 } 2579 return 0; 2580 } 2581