xref: /linux/tools/perf/util/symbol.c (revision d163d60258c755845cbc9cfe0e45fca71e649488)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <dirent.h>
3 #include <errno.h>
4 #include <stdlib.h>
5 #include <stdio.h>
6 #include <string.h>
7 #include <linux/capability.h>
8 #include <linux/kernel.h>
9 #include <linux/mman.h>
10 #include <linux/string.h>
11 #include <linux/time64.h>
12 #include <sys/types.h>
13 #include <sys/stat.h>
14 #include <sys/param.h>
15 #include <fcntl.h>
16 #include <unistd.h>
17 #include <inttypes.h>
18 #include "annotate.h"
19 #include "build-id.h"
20 #include "cap.h"
21 #include "dso.h"
22 #include "util.h" // lsdir()
23 #include "debug.h"
24 #include "event.h"
25 #include "machine.h"
26 #include "map.h"
27 #include "symbol.h"
28 #include "map_symbol.h"
29 #include "mem-events.h"
30 #include "mem-info.h"
31 #include "symsrc.h"
32 #include "strlist.h"
33 #include "intlist.h"
34 #include "namespaces.h"
35 #include "header.h"
36 #include "path.h"
37 #include <linux/ctype.h>
38 #include <linux/zalloc.h>
39 
40 #include <elf.h>
41 #include <limits.h>
42 #include <symbol/kallsyms.h>
43 #include <sys/utsname.h>
44 
45 static int dso__load_kernel_sym(struct dso *dso, struct map *map);
46 static int dso__load_guest_kernel_sym(struct dso *dso, struct map *map);
47 static bool symbol__is_idle(const char *name);
48 
49 int vmlinux_path__nr_entries;
50 char **vmlinux_path;
51 
52 struct symbol_conf symbol_conf = {
53 	.nanosecs		= false,
54 	.use_modules		= true,
55 	.try_vmlinux_path	= true,
56 	.demangle		= true,
57 	.demangle_kernel	= false,
58 	.cumulate_callchain	= true,
59 	.time_quantum		= 100 * NSEC_PER_MSEC, /* 100ms */
60 	.show_hist_headers	= true,
61 	.symfs			= "",
62 	.event_group		= true,
63 	.inline_name		= true,
64 	.res_sample		= 0,
65 };
66 
67 struct map_list_node {
68 	struct list_head node;
69 	struct map *map;
70 };
71 
72 static struct map_list_node *map_list_node__new(void)
73 {
74 	return malloc(sizeof(struct map_list_node));
75 }
76 
77 static enum dso_binary_type binary_type_symtab[] = {
78 	DSO_BINARY_TYPE__KALLSYMS,
79 	DSO_BINARY_TYPE__GUEST_KALLSYMS,
80 	DSO_BINARY_TYPE__JAVA_JIT,
81 	DSO_BINARY_TYPE__DEBUGLINK,
82 	DSO_BINARY_TYPE__BUILD_ID_CACHE,
83 	DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO,
84 	DSO_BINARY_TYPE__FEDORA_DEBUGINFO,
85 	DSO_BINARY_TYPE__UBUNTU_DEBUGINFO,
86 	DSO_BINARY_TYPE__BUILDID_DEBUGINFO,
87 	DSO_BINARY_TYPE__SYSTEM_PATH_DSO,
88 	DSO_BINARY_TYPE__GUEST_KMODULE,
89 	DSO_BINARY_TYPE__GUEST_KMODULE_COMP,
90 	DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE,
91 	DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP,
92 	DSO_BINARY_TYPE__OPENEMBEDDED_DEBUGINFO,
93 	DSO_BINARY_TYPE__MIXEDUP_UBUNTU_DEBUGINFO,
94 	DSO_BINARY_TYPE__NOT_FOUND,
95 };
96 
97 #define DSO_BINARY_TYPE__SYMTAB_CNT ARRAY_SIZE(binary_type_symtab)
98 
99 static bool symbol_type__filter(char symbol_type)
100 {
101 	symbol_type = toupper(symbol_type);
102 	return symbol_type == 'T' || symbol_type == 'W' || symbol_type == 'D' || symbol_type == 'B';
103 }
104 
105 static int prefix_underscores_count(const char *str)
106 {
107 	const char *tail = str;
108 
109 	while (*tail == '_')
110 		tail++;
111 
112 	return tail - str;
113 }
114 
115 const char * __weak arch__normalize_symbol_name(const char *name)
116 {
117 	return name;
118 }
119 
120 int __weak arch__compare_symbol_names(const char *namea, const char *nameb)
121 {
122 	return strcmp(namea, nameb);
123 }
124 
125 int __weak arch__compare_symbol_names_n(const char *namea, const char *nameb,
126 					unsigned int n)
127 {
128 	return strncmp(namea, nameb, n);
129 }
130 
131 int __weak arch__choose_best_symbol(struct symbol *syma,
132 				    struct symbol *symb __maybe_unused)
133 {
134 	/* Avoid "SyS" kernel syscall aliases */
135 	if (strlen(syma->name) >= 3 && !strncmp(syma->name, "SyS", 3))
136 		return SYMBOL_B;
137 	if (strlen(syma->name) >= 10 && !strncmp(syma->name, "compat_SyS", 10))
138 		return SYMBOL_B;
139 
140 	return SYMBOL_A;
141 }
142 
143 static int choose_best_symbol(struct symbol *syma, struct symbol *symb)
144 {
145 	s64 a;
146 	s64 b;
147 	size_t na, nb;
148 
149 	/* Prefer a symbol with non zero length */
150 	a = syma->end - syma->start;
151 	b = symb->end - symb->start;
152 	if ((b == 0) && (a > 0))
153 		return SYMBOL_A;
154 	else if ((a == 0) && (b > 0))
155 		return SYMBOL_B;
156 
157 	/* Prefer a non weak symbol over a weak one */
158 	a = syma->binding == STB_WEAK;
159 	b = symb->binding == STB_WEAK;
160 	if (b && !a)
161 		return SYMBOL_A;
162 	if (a && !b)
163 		return SYMBOL_B;
164 
165 	/* Prefer a global symbol over a non global one */
166 	a = syma->binding == STB_GLOBAL;
167 	b = symb->binding == STB_GLOBAL;
168 	if (a && !b)
169 		return SYMBOL_A;
170 	if (b && !a)
171 		return SYMBOL_B;
172 
173 	/* Prefer a symbol with less underscores */
174 	a = prefix_underscores_count(syma->name);
175 	b = prefix_underscores_count(symb->name);
176 	if (b > a)
177 		return SYMBOL_A;
178 	else if (a > b)
179 		return SYMBOL_B;
180 
181 	/* Choose the symbol with the longest name */
182 	na = strlen(syma->name);
183 	nb = strlen(symb->name);
184 	if (na > nb)
185 		return SYMBOL_A;
186 	else if (na < nb)
187 		return SYMBOL_B;
188 
189 	return arch__choose_best_symbol(syma, symb);
190 }
191 
192 void symbols__fixup_duplicate(struct rb_root_cached *symbols)
193 {
194 	struct rb_node *nd;
195 	struct symbol *curr, *next;
196 
197 	if (symbol_conf.allow_aliases)
198 		return;
199 
200 	nd = rb_first_cached(symbols);
201 
202 	while (nd) {
203 		curr = rb_entry(nd, struct symbol, rb_node);
204 again:
205 		nd = rb_next(&curr->rb_node);
206 		if (!nd)
207 			break;
208 
209 		next = rb_entry(nd, struct symbol, rb_node);
210 		if (curr->start != next->start)
211 			continue;
212 
213 		if (choose_best_symbol(curr, next) == SYMBOL_A) {
214 			if (next->type == STT_GNU_IFUNC)
215 				curr->ifunc_alias = true;
216 			rb_erase_cached(&next->rb_node, symbols);
217 			symbol__delete(next);
218 			goto again;
219 		} else {
220 			if (curr->type == STT_GNU_IFUNC)
221 				next->ifunc_alias = true;
222 			nd = rb_next(&curr->rb_node);
223 			rb_erase_cached(&curr->rb_node, symbols);
224 			symbol__delete(curr);
225 		}
226 	}
227 }
228 
229 /* Update zero-sized symbols using the address of the next symbol */
230 void symbols__fixup_end(struct rb_root_cached *symbols, bool is_kallsyms)
231 {
232 	struct rb_node *nd, *prevnd = rb_first_cached(symbols);
233 	struct symbol *curr, *prev;
234 
235 	if (prevnd == NULL)
236 		return;
237 
238 	curr = rb_entry(prevnd, struct symbol, rb_node);
239 
240 	for (nd = rb_next(prevnd); nd; nd = rb_next(nd)) {
241 		prev = curr;
242 		curr = rb_entry(nd, struct symbol, rb_node);
243 
244 		/*
245 		 * On some architecture kernel text segment start is located at
246 		 * some low memory address, while modules are located at high
247 		 * memory addresses (or vice versa).  The gap between end of
248 		 * kernel text segment and beginning of first module's text
249 		 * segment is very big.  Therefore do not fill this gap and do
250 		 * not assign it to the kernel dso map (kallsyms).
251 		 *
252 		 * Also BPF code can be allocated separately from text segments
253 		 * and modules.  So the last entry in a module should not fill
254 		 * the gap too.
255 		 *
256 		 * In kallsyms, it determines module symbols using '[' character
257 		 * like in:
258 		 *   ffffffffc1937000 T hdmi_driver_init  [snd_hda_codec_hdmi]
259 		 */
260 		if (prev->end == prev->start) {
261 			const char *prev_mod;
262 			const char *curr_mod;
263 
264 			if (!is_kallsyms) {
265 				prev->end = curr->start;
266 				continue;
267 			}
268 
269 			prev_mod = strchr(prev->name, '[');
270 			curr_mod = strchr(curr->name, '[');
271 
272 			/* Last kernel/module symbol mapped to end of page */
273 			if (!prev_mod != !curr_mod)
274 				prev->end = roundup(prev->end + 4096, 4096);
275 			/* Last symbol in the previous module */
276 			else if (prev_mod && strcmp(prev_mod, curr_mod))
277 				prev->end = roundup(prev->end + 4096, 4096);
278 			else
279 				prev->end = curr->start;
280 
281 			pr_debug4("%s sym:%s end:%#" PRIx64 "\n",
282 				  __func__, prev->name, prev->end);
283 		}
284 	}
285 
286 	/* Last entry */
287 	if (curr->end == curr->start)
288 		curr->end = roundup(curr->start, 4096) + 4096;
289 }
290 
291 struct symbol *symbol__new(u64 start, u64 len, u8 binding, u8 type, const char *name)
292 {
293 	size_t namelen = strlen(name) + 1;
294 	struct symbol *sym = calloc(1, (symbol_conf.priv_size +
295 					sizeof(*sym) + namelen));
296 	if (sym == NULL)
297 		return NULL;
298 
299 	if (symbol_conf.priv_size) {
300 		if (symbol_conf.init_annotation) {
301 			struct annotation *notes = (void *)sym;
302 			annotation__init(notes);
303 		}
304 		sym = ((void *)sym) + symbol_conf.priv_size;
305 	}
306 
307 	sym->start   = start;
308 	sym->end     = len ? start + len : start;
309 	sym->type    = type;
310 	sym->binding = binding;
311 	sym->namelen = namelen - 1;
312 
313 	pr_debug4("%s: %s %#" PRIx64 "-%#" PRIx64 "\n",
314 		  __func__, name, start, sym->end);
315 	memcpy(sym->name, name, namelen);
316 
317 	return sym;
318 }
319 
320 void symbol__delete(struct symbol *sym)
321 {
322 	if (symbol_conf.priv_size) {
323 		if (symbol_conf.init_annotation) {
324 			struct annotation *notes = symbol__annotation(sym);
325 
326 			annotation__exit(notes);
327 		}
328 	}
329 	free(((void *)sym) - symbol_conf.priv_size);
330 }
331 
332 void symbols__delete(struct rb_root_cached *symbols)
333 {
334 	struct symbol *pos;
335 	struct rb_node *next = rb_first_cached(symbols);
336 
337 	while (next) {
338 		pos = rb_entry(next, struct symbol, rb_node);
339 		next = rb_next(&pos->rb_node);
340 		rb_erase_cached(&pos->rb_node, symbols);
341 		symbol__delete(pos);
342 	}
343 }
344 
345 void __symbols__insert(struct rb_root_cached *symbols,
346 		       struct symbol *sym, bool kernel)
347 {
348 	struct rb_node **p = &symbols->rb_root.rb_node;
349 	struct rb_node *parent = NULL;
350 	const u64 ip = sym->start;
351 	struct symbol *s;
352 	bool leftmost = true;
353 
354 	if (kernel) {
355 		const char *name = sym->name;
356 		/*
357 		 * ppc64 uses function descriptors and appends a '.' to the
358 		 * start of every instruction address. Remove it.
359 		 */
360 		if (name[0] == '.')
361 			name++;
362 		sym->idle = symbol__is_idle(name);
363 	}
364 
365 	while (*p != NULL) {
366 		parent = *p;
367 		s = rb_entry(parent, struct symbol, rb_node);
368 		if (ip < s->start)
369 			p = &(*p)->rb_left;
370 		else {
371 			p = &(*p)->rb_right;
372 			leftmost = false;
373 		}
374 	}
375 	rb_link_node(&sym->rb_node, parent, p);
376 	rb_insert_color_cached(&sym->rb_node, symbols, leftmost);
377 }
378 
379 void symbols__insert(struct rb_root_cached *symbols, struct symbol *sym)
380 {
381 	__symbols__insert(symbols, sym, false);
382 }
383 
384 static struct symbol *symbols__find(struct rb_root_cached *symbols, u64 ip)
385 {
386 	struct rb_node *n;
387 
388 	if (symbols == NULL)
389 		return NULL;
390 
391 	n = symbols->rb_root.rb_node;
392 
393 	while (n) {
394 		struct symbol *s = rb_entry(n, struct symbol, rb_node);
395 
396 		if (ip < s->start)
397 			n = n->rb_left;
398 		else if (ip > s->end || (ip == s->end && ip != s->start))
399 			n = n->rb_right;
400 		else
401 			return s;
402 	}
403 
404 	return NULL;
405 }
406 
407 static struct symbol *symbols__first(struct rb_root_cached *symbols)
408 {
409 	struct rb_node *n = rb_first_cached(symbols);
410 
411 	if (n)
412 		return rb_entry(n, struct symbol, rb_node);
413 
414 	return NULL;
415 }
416 
417 static struct symbol *symbols__last(struct rb_root_cached *symbols)
418 {
419 	struct rb_node *n = rb_last(&symbols->rb_root);
420 
421 	if (n)
422 		return rb_entry(n, struct symbol, rb_node);
423 
424 	return NULL;
425 }
426 
427 static struct symbol *symbols__next(struct symbol *sym)
428 {
429 	struct rb_node *n = rb_next(&sym->rb_node);
430 
431 	if (n)
432 		return rb_entry(n, struct symbol, rb_node);
433 
434 	return NULL;
435 }
436 
437 static int symbols__sort_name_cmp(const void *vlhs, const void *vrhs)
438 {
439 	const struct symbol *lhs = *((const struct symbol **)vlhs);
440 	const struct symbol *rhs = *((const struct symbol **)vrhs);
441 
442 	return strcmp(lhs->name, rhs->name);
443 }
444 
445 static struct symbol **symbols__sort_by_name(struct rb_root_cached *source, size_t *len)
446 {
447 	struct rb_node *nd;
448 	struct symbol **result;
449 	size_t i = 0, size = 0;
450 
451 	for (nd = rb_first_cached(source); nd; nd = rb_next(nd))
452 		size++;
453 
454 	result = malloc(sizeof(*result) * size);
455 	if (!result)
456 		return NULL;
457 
458 	for (nd = rb_first_cached(source); nd; nd = rb_next(nd)) {
459 		struct symbol *pos = rb_entry(nd, struct symbol, rb_node);
460 
461 		result[i++] = pos;
462 	}
463 	qsort(result, size, sizeof(*result), symbols__sort_name_cmp);
464 	*len = size;
465 	return result;
466 }
467 
468 int symbol__match_symbol_name(const char *name, const char *str,
469 			      enum symbol_tag_include includes)
470 {
471 	const char *versioning;
472 
473 	if (includes == SYMBOL_TAG_INCLUDE__DEFAULT_ONLY &&
474 	    (versioning = strstr(name, "@@"))) {
475 		int len = strlen(str);
476 
477 		if (len < versioning - name)
478 			len = versioning - name;
479 
480 		return arch__compare_symbol_names_n(name, str, len);
481 	} else
482 		return arch__compare_symbol_names(name, str);
483 }
484 
485 static struct symbol *symbols__find_by_name(struct symbol *symbols[],
486 					    size_t symbols_len,
487 					    const char *name,
488 					    enum symbol_tag_include includes,
489 					    size_t *found_idx)
490 {
491 	size_t i, lower = 0, upper = symbols_len;
492 	struct symbol *s = NULL;
493 
494 	if (found_idx)
495 		*found_idx = SIZE_MAX;
496 
497 	if (!symbols_len)
498 		return NULL;
499 
500 	while (lower < upper) {
501 		int cmp;
502 
503 		i = (lower + upper) / 2;
504 		cmp = symbol__match_symbol_name(symbols[i]->name, name, includes);
505 
506 		if (cmp > 0)
507 			upper = i;
508 		else if (cmp < 0)
509 			lower = i + 1;
510 		else {
511 			if (found_idx)
512 				*found_idx = i;
513 			s = symbols[i];
514 			break;
515 		}
516 	}
517 	if (s && includes != SYMBOL_TAG_INCLUDE__DEFAULT_ONLY) {
518 		/* return first symbol that has same name (if any) */
519 		for (; i > 0; i--) {
520 			struct symbol *tmp = symbols[i - 1];
521 
522 			if (!arch__compare_symbol_names(tmp->name, s->name)) {
523 				if (found_idx)
524 					*found_idx = i - 1;
525 				s = tmp;
526 			} else
527 				break;
528 		}
529 	}
530 	assert(!found_idx || !s || s == symbols[*found_idx]);
531 	return s;
532 }
533 
534 void dso__reset_find_symbol_cache(struct dso *dso)
535 {
536 	dso__set_last_find_result_addr(dso, 0);
537 	dso__set_last_find_result_symbol(dso, NULL);
538 }
539 
540 void dso__insert_symbol(struct dso *dso, struct symbol *sym)
541 {
542 	__symbols__insert(dso__symbols(dso), sym, dso__kernel(dso));
543 
544 	/* update the symbol cache if necessary */
545 	if (dso__last_find_result_addr(dso) >= sym->start &&
546 	    (dso__last_find_result_addr(dso) < sym->end ||
547 	    sym->start == sym->end)) {
548 		dso__set_last_find_result_symbol(dso, sym);
549 	}
550 }
551 
552 void dso__delete_symbol(struct dso *dso, struct symbol *sym)
553 {
554 	rb_erase_cached(&sym->rb_node, dso__symbols(dso));
555 	symbol__delete(sym);
556 	dso__reset_find_symbol_cache(dso);
557 }
558 
559 struct symbol *dso__find_symbol(struct dso *dso, u64 addr)
560 {
561 	if (dso__last_find_result_addr(dso) != addr || dso__last_find_result_symbol(dso) == NULL) {
562 		dso__set_last_find_result_addr(dso, addr);
563 		dso__set_last_find_result_symbol(dso, symbols__find(dso__symbols(dso), addr));
564 	}
565 
566 	return dso__last_find_result_symbol(dso);
567 }
568 
569 struct symbol *dso__find_symbol_nocache(struct dso *dso, u64 addr)
570 {
571 	return symbols__find(dso__symbols(dso), addr);
572 }
573 
574 struct symbol *dso__first_symbol(struct dso *dso)
575 {
576 	return symbols__first(dso__symbols(dso));
577 }
578 
579 struct symbol *dso__last_symbol(struct dso *dso)
580 {
581 	return symbols__last(dso__symbols(dso));
582 }
583 
584 struct symbol *dso__next_symbol(struct symbol *sym)
585 {
586 	return symbols__next(sym);
587 }
588 
589 struct symbol *dso__next_symbol_by_name(struct dso *dso, size_t *idx)
590 {
591 	if (*idx + 1 >= dso__symbol_names_len(dso))
592 		return NULL;
593 
594 	++*idx;
595 	return dso__symbol_names(dso)[*idx];
596 }
597 
598  /*
599   * Returns first symbol that matched with @name.
600   */
601 struct symbol *dso__find_symbol_by_name(struct dso *dso, const char *name, size_t *idx)
602 {
603 	struct symbol *s = symbols__find_by_name(dso__symbol_names(dso),
604 						 dso__symbol_names_len(dso),
605 						 name, SYMBOL_TAG_INCLUDE__NONE, idx);
606 	if (!s) {
607 		s = symbols__find_by_name(dso__symbol_names(dso), dso__symbol_names_len(dso),
608 					  name, SYMBOL_TAG_INCLUDE__DEFAULT_ONLY, idx);
609 	}
610 	return s;
611 }
612 
613 void dso__sort_by_name(struct dso *dso)
614 {
615 	mutex_lock(dso__lock(dso));
616 	if (!dso__sorted_by_name(dso)) {
617 		size_t len;
618 
619 		dso__set_symbol_names(dso, symbols__sort_by_name(dso__symbols(dso), &len));
620 		if (dso__symbol_names(dso)) {
621 			dso__set_symbol_names_len(dso, len);
622 			dso__set_sorted_by_name(dso);
623 		}
624 	}
625 	mutex_unlock(dso__lock(dso));
626 }
627 
628 /*
629  * While we find nice hex chars, build a long_val.
630  * Return number of chars processed.
631  */
632 static int hex2u64(const char *ptr, u64 *long_val)
633 {
634 	char *p;
635 
636 	*long_val = strtoull(ptr, &p, 16);
637 
638 	return p - ptr;
639 }
640 
641 
642 int modules__parse(const char *filename, void *arg,
643 		   int (*process_module)(void *arg, const char *name,
644 					 u64 start, u64 size))
645 {
646 	char *line = NULL;
647 	size_t n;
648 	FILE *file;
649 	int err = 0;
650 
651 	file = fopen(filename, "r");
652 	if (file == NULL)
653 		return -1;
654 
655 	while (1) {
656 		char name[PATH_MAX];
657 		u64 start, size;
658 		char *sep, *endptr;
659 		ssize_t line_len;
660 
661 		line_len = getline(&line, &n, file);
662 		if (line_len < 0) {
663 			if (feof(file))
664 				break;
665 			err = -1;
666 			goto out;
667 		}
668 
669 		if (!line) {
670 			err = -1;
671 			goto out;
672 		}
673 
674 		line[--line_len] = '\0'; /* \n */
675 
676 		sep = strrchr(line, 'x');
677 		if (sep == NULL)
678 			continue;
679 
680 		hex2u64(sep + 1, &start);
681 
682 		sep = strchr(line, ' ');
683 		if (sep == NULL)
684 			continue;
685 
686 		*sep = '\0';
687 
688 		scnprintf(name, sizeof(name), "[%s]", line);
689 
690 		size = strtoul(sep + 1, &endptr, 0);
691 		if (*endptr != ' ' && *endptr != '\t')
692 			continue;
693 
694 		err = process_module(arg, name, start, size);
695 		if (err)
696 			break;
697 	}
698 out:
699 	free(line);
700 	fclose(file);
701 	return err;
702 }
703 
704 /*
705  * These are symbols in the kernel image, so make sure that
706  * sym is from a kernel DSO.
707  */
708 static bool symbol__is_idle(const char *name)
709 {
710 	const char * const idle_symbols[] = {
711 		"acpi_idle_do_entry",
712 		"acpi_processor_ffh_cstate_enter",
713 		"arch_cpu_idle",
714 		"cpu_idle",
715 		"cpu_startup_entry",
716 		"idle_cpu",
717 		"intel_idle",
718 		"intel_idle_ibrs",
719 		"default_idle",
720 		"native_safe_halt",
721 		"enter_idle",
722 		"exit_idle",
723 		"mwait_idle",
724 		"mwait_idle_with_hints",
725 		"mwait_idle_with_hints.constprop.0",
726 		"poll_idle",
727 		"ppc64_runlatch_off",
728 		"pseries_dedicated_idle_sleep",
729 		"psw_idle",
730 		"psw_idle_exit",
731 		NULL
732 	};
733 	int i;
734 	static struct strlist *idle_symbols_list;
735 
736 	if (idle_symbols_list)
737 		return strlist__has_entry(idle_symbols_list, name);
738 
739 	idle_symbols_list = strlist__new(NULL, NULL);
740 
741 	for (i = 0; idle_symbols[i]; i++)
742 		strlist__add(idle_symbols_list, idle_symbols[i]);
743 
744 	return strlist__has_entry(idle_symbols_list, name);
745 }
746 
747 static int map__process_kallsym_symbol(void *arg, const char *name,
748 				       char type, u64 start)
749 {
750 	struct symbol *sym;
751 	struct dso *dso = arg;
752 	struct rb_root_cached *root = dso__symbols(dso);
753 
754 	if (!symbol_type__filter(type))
755 		return 0;
756 
757 	/* Ignore local symbols for ARM modules */
758 	if (name[0] == '$')
759 		return 0;
760 
761 	/*
762 	 * module symbols are not sorted so we add all
763 	 * symbols, setting length to 0, and rely on
764 	 * symbols__fixup_end() to fix it up.
765 	 */
766 	sym = symbol__new(start, 0, kallsyms2elf_binding(type), kallsyms2elf_type(type), name);
767 	if (sym == NULL)
768 		return -ENOMEM;
769 	/*
770 	 * We will pass the symbols to the filter later, in
771 	 * map__split_kallsyms, when we have split the maps per module
772 	 */
773 	__symbols__insert(root, sym, !strchr(name, '['));
774 
775 	return 0;
776 }
777 
778 /*
779  * Loads the function entries in /proc/kallsyms into kernel_map->dso,
780  * so that we can in the next step set the symbol ->end address and then
781  * call kernel_maps__split_kallsyms.
782  */
783 static int dso__load_all_kallsyms(struct dso *dso, const char *filename)
784 {
785 	return kallsyms__parse(filename, dso, map__process_kallsym_symbol);
786 }
787 
788 static int maps__split_kallsyms_for_kcore(struct maps *kmaps, struct dso *dso)
789 {
790 	struct symbol *pos;
791 	int count = 0;
792 	struct rb_root_cached *root = dso__symbols(dso);
793 	struct rb_root_cached old_root = *root;
794 	struct rb_node *next = rb_first_cached(root);
795 
796 	if (!kmaps)
797 		return -1;
798 
799 	*root = RB_ROOT_CACHED;
800 
801 	while (next) {
802 		struct map *curr_map;
803 		struct dso *curr_map_dso;
804 		char *module;
805 
806 		pos = rb_entry(next, struct symbol, rb_node);
807 		next = rb_next(&pos->rb_node);
808 
809 		rb_erase_cached(&pos->rb_node, &old_root);
810 		RB_CLEAR_NODE(&pos->rb_node);
811 		module = strchr(pos->name, '\t');
812 		if (module)
813 			*module = '\0';
814 
815 		curr_map = maps__find(kmaps, pos->start);
816 
817 		if (!curr_map) {
818 			symbol__delete(pos);
819 			continue;
820 		}
821 		curr_map_dso = map__dso(curr_map);
822 		pos->start -= map__start(curr_map) - map__pgoff(curr_map);
823 		if (pos->end > map__end(curr_map))
824 			pos->end = map__end(curr_map);
825 		if (pos->end)
826 			pos->end -= map__start(curr_map) - map__pgoff(curr_map);
827 		symbols__insert(dso__symbols(curr_map_dso), pos);
828 		++count;
829 		map__put(curr_map);
830 	}
831 
832 	/* Symbols have been adjusted */
833 	dso__set_adjust_symbols(dso, true);
834 
835 	return count;
836 }
837 
838 /*
839  * Split the symbols into maps, making sure there are no overlaps, i.e. the
840  * kernel range is broken in several maps, named [kernel].N, as we don't have
841  * the original ELF section names vmlinux have.
842  */
843 static int maps__split_kallsyms(struct maps *kmaps, struct dso *dso, u64 delta,
844 				struct map *initial_map)
845 {
846 	struct machine *machine;
847 	struct map *curr_map = map__get(initial_map);
848 	struct symbol *pos;
849 	int count = 0, moved = 0;
850 	struct rb_root_cached *root = dso__symbols(dso);
851 	struct rb_node *next = rb_first_cached(root);
852 	int kernel_range = 0;
853 	bool x86_64;
854 
855 	if (!kmaps)
856 		return -1;
857 
858 	machine = maps__machine(kmaps);
859 
860 	x86_64 = machine__is(machine, "x86_64");
861 
862 	while (next) {
863 		char *module;
864 
865 		pos = rb_entry(next, struct symbol, rb_node);
866 		next = rb_next(&pos->rb_node);
867 
868 		module = strchr(pos->name, '\t');
869 		if (module) {
870 			struct dso *curr_map_dso;
871 
872 			if (!symbol_conf.use_modules)
873 				goto discard_symbol;
874 
875 			*module++ = '\0';
876 			curr_map_dso = map__dso(curr_map);
877 			if (strcmp(dso__short_name(curr_map_dso), module)) {
878 				if (!RC_CHK_EQUAL(curr_map, initial_map) &&
879 				    dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST &&
880 				    machine__is_default_guest(machine)) {
881 					/*
882 					 * We assume all symbols of a module are
883 					 * continuous in * kallsyms, so curr_map
884 					 * points to a module and all its
885 					 * symbols are in its kmap. Mark it as
886 					 * loaded.
887 					 */
888 					dso__set_loaded(curr_map_dso);
889 				}
890 
891 				map__zput(curr_map);
892 				curr_map = maps__find_by_name(kmaps, module);
893 				if (curr_map == NULL) {
894 					pr_debug("%s/proc/{kallsyms,modules} "
895 					         "inconsistency while looking "
896 						 "for \"%s\" module!\n",
897 						 machine->root_dir, module);
898 					curr_map = map__get(initial_map);
899 					goto discard_symbol;
900 				}
901 				curr_map_dso = map__dso(curr_map);
902 				if (dso__loaded(curr_map_dso) &&
903 				    !machine__is_default_guest(machine))
904 					goto discard_symbol;
905 			}
906 			/*
907 			 * So that we look just like we get from .ko files,
908 			 * i.e. not prelinked, relative to initial_map->start.
909 			 */
910 			pos->start = map__map_ip(curr_map, pos->start);
911 			pos->end   = map__map_ip(curr_map, pos->end);
912 		} else if (x86_64 && is_entry_trampoline(pos->name)) {
913 			/*
914 			 * These symbols are not needed anymore since the
915 			 * trampoline maps refer to the text section and it's
916 			 * symbols instead. Avoid having to deal with
917 			 * relocations, and the assumption that the first symbol
918 			 * is the start of kernel text, by simply removing the
919 			 * symbols at this point.
920 			 */
921 			goto discard_symbol;
922 		} else if (!RC_CHK_EQUAL(curr_map, initial_map)) {
923 			char dso_name[PATH_MAX];
924 			struct dso *ndso;
925 
926 			if (delta) {
927 				/* Kernel was relocated at boot time */
928 				pos->start -= delta;
929 				pos->end -= delta;
930 			}
931 
932 			if (count == 0) {
933 				map__zput(curr_map);
934 				curr_map = map__get(initial_map);
935 				goto add_symbol;
936 			}
937 
938 			if (dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST)
939 				snprintf(dso_name, sizeof(dso_name),
940 					"[guest.kernel].%d",
941 					kernel_range++);
942 			else
943 				snprintf(dso_name, sizeof(dso_name),
944 					"[kernel].%d",
945 					kernel_range++);
946 
947 			ndso = dso__new(dso_name);
948 			map__zput(curr_map);
949 			if (ndso == NULL)
950 				return -1;
951 
952 			dso__set_kernel(ndso, dso__kernel(dso));
953 
954 			curr_map = map__new2(pos->start, ndso);
955 			if (curr_map == NULL) {
956 				dso__put(ndso);
957 				return -1;
958 			}
959 
960 			map__set_mapping_type(curr_map, MAPPING_TYPE__IDENTITY);
961 			if (maps__insert(kmaps, curr_map)) {
962 				map__zput(curr_map);
963 				dso__put(ndso);
964 				return -1;
965 			}
966 			++kernel_range;
967 		} else if (delta) {
968 			/* Kernel was relocated at boot time */
969 			pos->start -= delta;
970 			pos->end -= delta;
971 		}
972 add_symbol:
973 		if (!RC_CHK_EQUAL(curr_map, initial_map)) {
974 			struct dso *curr_map_dso = map__dso(curr_map);
975 
976 			rb_erase_cached(&pos->rb_node, root);
977 			symbols__insert(dso__symbols(curr_map_dso), pos);
978 			++moved;
979 		} else
980 			++count;
981 
982 		continue;
983 discard_symbol:
984 		rb_erase_cached(&pos->rb_node, root);
985 		symbol__delete(pos);
986 	}
987 
988 	if (!RC_CHK_EQUAL(curr_map, initial_map) &&
989 	    dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST &&
990 	    machine__is_default_guest(maps__machine(kmaps))) {
991 		dso__set_loaded(map__dso(curr_map));
992 	}
993 	map__put(curr_map);
994 	return count + moved;
995 }
996 
997 bool symbol__restricted_filename(const char *filename,
998 				 const char *restricted_filename)
999 {
1000 	bool restricted = false;
1001 
1002 	if (symbol_conf.kptr_restrict) {
1003 		char *r = realpath(filename, NULL);
1004 
1005 		if (r != NULL) {
1006 			restricted = strcmp(r, restricted_filename) == 0;
1007 			free(r);
1008 			return restricted;
1009 		}
1010 	}
1011 
1012 	return restricted;
1013 }
1014 
1015 struct module_info {
1016 	struct rb_node rb_node;
1017 	char *name;
1018 	u64 start;
1019 };
1020 
1021 static void add_module(struct module_info *mi, struct rb_root *modules)
1022 {
1023 	struct rb_node **p = &modules->rb_node;
1024 	struct rb_node *parent = NULL;
1025 	struct module_info *m;
1026 
1027 	while (*p != NULL) {
1028 		parent = *p;
1029 		m = rb_entry(parent, struct module_info, rb_node);
1030 		if (strcmp(mi->name, m->name) < 0)
1031 			p = &(*p)->rb_left;
1032 		else
1033 			p = &(*p)->rb_right;
1034 	}
1035 	rb_link_node(&mi->rb_node, parent, p);
1036 	rb_insert_color(&mi->rb_node, modules);
1037 }
1038 
1039 static void delete_modules(struct rb_root *modules)
1040 {
1041 	struct module_info *mi;
1042 	struct rb_node *next = rb_first(modules);
1043 
1044 	while (next) {
1045 		mi = rb_entry(next, struct module_info, rb_node);
1046 		next = rb_next(&mi->rb_node);
1047 		rb_erase(&mi->rb_node, modules);
1048 		zfree(&mi->name);
1049 		free(mi);
1050 	}
1051 }
1052 
1053 static struct module_info *find_module(const char *name,
1054 				       struct rb_root *modules)
1055 {
1056 	struct rb_node *n = modules->rb_node;
1057 
1058 	while (n) {
1059 		struct module_info *m;
1060 		int cmp;
1061 
1062 		m = rb_entry(n, struct module_info, rb_node);
1063 		cmp = strcmp(name, m->name);
1064 		if (cmp < 0)
1065 			n = n->rb_left;
1066 		else if (cmp > 0)
1067 			n = n->rb_right;
1068 		else
1069 			return m;
1070 	}
1071 
1072 	return NULL;
1073 }
1074 
1075 static int __read_proc_modules(void *arg, const char *name, u64 start,
1076 			       u64 size __maybe_unused)
1077 {
1078 	struct rb_root *modules = arg;
1079 	struct module_info *mi;
1080 
1081 	mi = zalloc(sizeof(struct module_info));
1082 	if (!mi)
1083 		return -ENOMEM;
1084 
1085 	mi->name = strdup(name);
1086 	mi->start = start;
1087 
1088 	if (!mi->name) {
1089 		free(mi);
1090 		return -ENOMEM;
1091 	}
1092 
1093 	add_module(mi, modules);
1094 
1095 	return 0;
1096 }
1097 
1098 static int read_proc_modules(const char *filename, struct rb_root *modules)
1099 {
1100 	if (symbol__restricted_filename(filename, "/proc/modules"))
1101 		return -1;
1102 
1103 	if (modules__parse(filename, modules, __read_proc_modules)) {
1104 		delete_modules(modules);
1105 		return -1;
1106 	}
1107 
1108 	return 0;
1109 }
1110 
1111 int compare_proc_modules(const char *from, const char *to)
1112 {
1113 	struct rb_root from_modules = RB_ROOT;
1114 	struct rb_root to_modules = RB_ROOT;
1115 	struct rb_node *from_node, *to_node;
1116 	struct module_info *from_m, *to_m;
1117 	int ret = -1;
1118 
1119 	if (read_proc_modules(from, &from_modules))
1120 		return -1;
1121 
1122 	if (read_proc_modules(to, &to_modules))
1123 		goto out_delete_from;
1124 
1125 	from_node = rb_first(&from_modules);
1126 	to_node = rb_first(&to_modules);
1127 	while (from_node) {
1128 		if (!to_node)
1129 			break;
1130 
1131 		from_m = rb_entry(from_node, struct module_info, rb_node);
1132 		to_m = rb_entry(to_node, struct module_info, rb_node);
1133 
1134 		if (from_m->start != to_m->start ||
1135 		    strcmp(from_m->name, to_m->name))
1136 			break;
1137 
1138 		from_node = rb_next(from_node);
1139 		to_node = rb_next(to_node);
1140 	}
1141 
1142 	if (!from_node && !to_node)
1143 		ret = 0;
1144 
1145 	delete_modules(&to_modules);
1146 out_delete_from:
1147 	delete_modules(&from_modules);
1148 
1149 	return ret;
1150 }
1151 
1152 static int do_validate_kcore_modules_cb(struct map *old_map, void *data)
1153 {
1154 	struct rb_root *modules = data;
1155 	struct module_info *mi;
1156 	struct dso *dso;
1157 
1158 	if (!__map__is_kmodule(old_map))
1159 		return 0;
1160 
1161 	dso = map__dso(old_map);
1162 	/* Module must be in memory at the same address */
1163 	mi = find_module(dso__short_name(dso), modules);
1164 	if (!mi || mi->start != map__start(old_map))
1165 		return -EINVAL;
1166 
1167 	return 0;
1168 }
1169 
1170 static int do_validate_kcore_modules(const char *filename, struct maps *kmaps)
1171 {
1172 	struct rb_root modules = RB_ROOT;
1173 	int err;
1174 
1175 	err = read_proc_modules(filename, &modules);
1176 	if (err)
1177 		return err;
1178 
1179 	err = maps__for_each_map(kmaps, do_validate_kcore_modules_cb, &modules);
1180 
1181 	delete_modules(&modules);
1182 	return err;
1183 }
1184 
1185 /*
1186  * If kallsyms is referenced by name then we look for filename in the same
1187  * directory.
1188  */
1189 static bool filename_from_kallsyms_filename(char *filename,
1190 					    const char *base_name,
1191 					    const char *kallsyms_filename)
1192 {
1193 	char *name;
1194 
1195 	strcpy(filename, kallsyms_filename);
1196 	name = strrchr(filename, '/');
1197 	if (!name)
1198 		return false;
1199 
1200 	name += 1;
1201 
1202 	if (!strcmp(name, "kallsyms")) {
1203 		strcpy(name, base_name);
1204 		return true;
1205 	}
1206 
1207 	return false;
1208 }
1209 
1210 static int validate_kcore_modules(const char *kallsyms_filename,
1211 				  struct map *map)
1212 {
1213 	struct maps *kmaps = map__kmaps(map);
1214 	char modules_filename[PATH_MAX];
1215 
1216 	if (!kmaps)
1217 		return -EINVAL;
1218 
1219 	if (!filename_from_kallsyms_filename(modules_filename, "modules",
1220 					     kallsyms_filename))
1221 		return -EINVAL;
1222 
1223 	if (do_validate_kcore_modules(modules_filename, kmaps))
1224 		return -EINVAL;
1225 
1226 	return 0;
1227 }
1228 
1229 static int validate_kcore_addresses(const char *kallsyms_filename,
1230 				    struct map *map)
1231 {
1232 	struct kmap *kmap = map__kmap(map);
1233 
1234 	if (!kmap)
1235 		return -EINVAL;
1236 
1237 	if (kmap->ref_reloc_sym && kmap->ref_reloc_sym->name) {
1238 		u64 start;
1239 
1240 		if (kallsyms__get_function_start(kallsyms_filename,
1241 						 kmap->ref_reloc_sym->name, &start))
1242 			return -ENOENT;
1243 		if (start != kmap->ref_reloc_sym->addr)
1244 			return -EINVAL;
1245 	}
1246 
1247 	return validate_kcore_modules(kallsyms_filename, map);
1248 }
1249 
1250 struct kcore_mapfn_data {
1251 	struct dso *dso;
1252 	struct list_head maps;
1253 };
1254 
1255 static int kcore_mapfn(u64 start, u64 len, u64 pgoff, void *data)
1256 {
1257 	struct kcore_mapfn_data *md = data;
1258 	struct map_list_node *list_node = map_list_node__new();
1259 
1260 	if (!list_node)
1261 		return -ENOMEM;
1262 
1263 	list_node->map = map__new2(start, md->dso);
1264 	if (!list_node->map) {
1265 		free(list_node);
1266 		return -ENOMEM;
1267 	}
1268 
1269 	map__set_end(list_node->map, map__start(list_node->map) + len);
1270 	map__set_pgoff(list_node->map, pgoff);
1271 
1272 	list_add(&list_node->node, &md->maps);
1273 
1274 	return 0;
1275 }
1276 
1277 static bool remove_old_maps(struct map *map, void *data)
1278 {
1279 	const struct map *map_to_save = data;
1280 
1281 	/*
1282 	 * We need to preserve eBPF maps even if they are covered by kcore,
1283 	 * because we need to access eBPF dso for source data.
1284 	 */
1285 	return !RC_CHK_EQUAL(map, map_to_save) && !__map__is_bpf_prog(map);
1286 }
1287 
1288 static int dso__load_kcore(struct dso *dso, struct map *map,
1289 			   const char *kallsyms_filename)
1290 {
1291 	struct maps *kmaps = map__kmaps(map);
1292 	struct kcore_mapfn_data md;
1293 	struct map *map_ref, *replacement_map = NULL;
1294 	struct machine *machine;
1295 	bool is_64_bit;
1296 	int err, fd;
1297 	char kcore_filename[PATH_MAX];
1298 	u64 stext;
1299 
1300 	if (!kmaps)
1301 		return -EINVAL;
1302 
1303 	machine = maps__machine(kmaps);
1304 
1305 	/* This function requires that the map is the kernel map */
1306 	if (!__map__is_kernel(map))
1307 		return -EINVAL;
1308 
1309 	if (!filename_from_kallsyms_filename(kcore_filename, "kcore",
1310 					     kallsyms_filename))
1311 		return -EINVAL;
1312 
1313 	/* Modules and kernel must be present at their original addresses */
1314 	if (validate_kcore_addresses(kallsyms_filename, map))
1315 		return -EINVAL;
1316 
1317 	md.dso = dso;
1318 	INIT_LIST_HEAD(&md.maps);
1319 
1320 	fd = open(kcore_filename, O_RDONLY);
1321 	if (fd < 0) {
1322 		pr_debug("Failed to open %s. Note /proc/kcore requires CAP_SYS_RAWIO capability to access.\n",
1323 			 kcore_filename);
1324 		return -EINVAL;
1325 	}
1326 
1327 	/* Read new maps into temporary lists */
1328 	err = file__read_maps(fd, map__prot(map) & PROT_EXEC, kcore_mapfn, &md,
1329 			      &is_64_bit);
1330 	if (err)
1331 		goto out_err;
1332 	dso__set_is_64_bit(dso, is_64_bit);
1333 
1334 	if (list_empty(&md.maps)) {
1335 		err = -EINVAL;
1336 		goto out_err;
1337 	}
1338 
1339 	/* Remove old maps */
1340 	maps__remove_maps(kmaps, remove_old_maps, map);
1341 	machine->trampolines_mapped = false;
1342 
1343 	/* Find the kernel map using the '_stext' symbol */
1344 	if (!kallsyms__get_function_start(kallsyms_filename, "_stext", &stext)) {
1345 		u64 replacement_size = 0;
1346 		struct map_list_node *new_node;
1347 
1348 		list_for_each_entry(new_node, &md.maps, node) {
1349 			struct map *new_map = new_node->map;
1350 			u64 new_size = map__size(new_map);
1351 
1352 			if (!(stext >= map__start(new_map) && stext < map__end(new_map)))
1353 				continue;
1354 
1355 			/*
1356 			 * On some architectures, ARM64 for example, the kernel
1357 			 * text can get allocated inside of the vmalloc segment.
1358 			 * Select the smallest matching segment, in case stext
1359 			 * falls within more than one in the list.
1360 			 */
1361 			if (!replacement_map || new_size < replacement_size) {
1362 				replacement_map = new_map;
1363 				replacement_size = new_size;
1364 			}
1365 		}
1366 	}
1367 
1368 	if (!replacement_map)
1369 		replacement_map = list_entry(md.maps.next, struct map_list_node, node)->map;
1370 
1371 	/*
1372 	 * Update addresses of vmlinux map. Re-insert it to ensure maps are
1373 	 * correctly ordered. Do this before using maps__merge_in() for the
1374 	 * remaining maps so vmlinux gets split if necessary.
1375 	 */
1376 	map_ref = map__get(map);
1377 	maps__remove(kmaps, map_ref);
1378 
1379 	map__set_start(map_ref, map__start(replacement_map));
1380 	map__set_end(map_ref, map__end(replacement_map));
1381 	map__set_pgoff(map_ref, map__pgoff(replacement_map));
1382 	map__set_mapping_type(map_ref, map__mapping_type(replacement_map));
1383 
1384 	err = maps__insert(kmaps, map_ref);
1385 	map__put(map_ref);
1386 	if (err)
1387 		goto out_err;
1388 
1389 	/* Add new maps */
1390 	while (!list_empty(&md.maps)) {
1391 		struct map_list_node *new_node = list_entry(md.maps.next, struct map_list_node, node);
1392 		struct map *new_map = new_node->map;
1393 
1394 		list_del_init(&new_node->node);
1395 
1396 		/* skip if replacement_map, already inserted above */
1397 		if (!RC_CHK_EQUAL(new_map, replacement_map)) {
1398 			/*
1399 			 * Merge kcore map into existing maps,
1400 			 * and ensure that current maps (eBPF)
1401 			 * stay intact.
1402 			 */
1403 			if (maps__merge_in(kmaps, new_map)) {
1404 				err = -EINVAL;
1405 				goto out_err;
1406 			}
1407 		}
1408 		free(new_node);
1409 	}
1410 
1411 	if (machine__is(machine, "x86_64")) {
1412 		u64 addr;
1413 
1414 		/*
1415 		 * If one of the corresponding symbols is there, assume the
1416 		 * entry trampoline maps are too.
1417 		 */
1418 		if (!kallsyms__get_function_start(kallsyms_filename,
1419 						  ENTRY_TRAMPOLINE_NAME,
1420 						  &addr))
1421 			machine->trampolines_mapped = true;
1422 	}
1423 
1424 	/*
1425 	 * Set the data type and long name so that kcore can be read via
1426 	 * dso__data_read_addr().
1427 	 */
1428 	if (dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST)
1429 		dso__set_binary_type(dso, DSO_BINARY_TYPE__GUEST_KCORE);
1430 	else
1431 		dso__set_binary_type(dso, DSO_BINARY_TYPE__KCORE);
1432 	dso__set_long_name(dso, strdup(kcore_filename), true);
1433 
1434 	close(fd);
1435 
1436 	if (map__prot(map) & PROT_EXEC)
1437 		pr_debug("Using %s for kernel object code\n", kcore_filename);
1438 	else
1439 		pr_debug("Using %s for kernel data\n", kcore_filename);
1440 
1441 	return 0;
1442 
1443 out_err:
1444 	while (!list_empty(&md.maps)) {
1445 		struct map_list_node *list_node;
1446 
1447 		list_node = list_entry(md.maps.next, struct map_list_node, node);
1448 		list_del_init(&list_node->node);
1449 		map__zput(list_node->map);
1450 		free(list_node);
1451 	}
1452 	close(fd);
1453 	return err;
1454 }
1455 
1456 /*
1457  * If the kernel is relocated at boot time, kallsyms won't match.  Compute the
1458  * delta based on the relocation reference symbol.
1459  */
1460 static int kallsyms__delta(struct kmap *kmap, const char *filename, u64 *delta)
1461 {
1462 	u64 addr;
1463 
1464 	if (!kmap->ref_reloc_sym || !kmap->ref_reloc_sym->name)
1465 		return 0;
1466 
1467 	if (kallsyms__get_function_start(filename, kmap->ref_reloc_sym->name, &addr))
1468 		return -1;
1469 
1470 	*delta = addr - kmap->ref_reloc_sym->addr;
1471 	return 0;
1472 }
1473 
1474 int __dso__load_kallsyms(struct dso *dso, const char *filename,
1475 			 struct map *map, bool no_kcore)
1476 {
1477 	struct kmap *kmap = map__kmap(map);
1478 	u64 delta = 0;
1479 
1480 	if (symbol__restricted_filename(filename, "/proc/kallsyms"))
1481 		return -1;
1482 
1483 	if (!kmap || !kmap->kmaps)
1484 		return -1;
1485 
1486 	if (dso__load_all_kallsyms(dso, filename) < 0)
1487 		return -1;
1488 
1489 	if (kallsyms__delta(kmap, filename, &delta))
1490 		return -1;
1491 
1492 	symbols__fixup_end(dso__symbols(dso), true);
1493 	symbols__fixup_duplicate(dso__symbols(dso));
1494 
1495 	if (dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST)
1496 		dso__set_symtab_type(dso, DSO_BINARY_TYPE__GUEST_KALLSYMS);
1497 	else
1498 		dso__set_symtab_type(dso, DSO_BINARY_TYPE__KALLSYMS);
1499 
1500 	if (!no_kcore && !dso__load_kcore(dso, map, filename))
1501 		return maps__split_kallsyms_for_kcore(kmap->kmaps, dso);
1502 	else
1503 		return maps__split_kallsyms(kmap->kmaps, dso, delta, map);
1504 }
1505 
1506 int dso__load_kallsyms(struct dso *dso, const char *filename,
1507 		       struct map *map)
1508 {
1509 	return __dso__load_kallsyms(dso, filename, map, false);
1510 }
1511 
1512 static int dso__load_perf_map(const char *map_path, struct dso *dso)
1513 {
1514 	char *line = NULL;
1515 	size_t n;
1516 	FILE *file;
1517 	int nr_syms = 0;
1518 
1519 	file = fopen(map_path, "r");
1520 	if (file == NULL)
1521 		goto out_failure;
1522 
1523 	while (!feof(file)) {
1524 		u64 start, size;
1525 		struct symbol *sym;
1526 		int line_len, len;
1527 
1528 		line_len = getline(&line, &n, file);
1529 		if (line_len < 0)
1530 			break;
1531 
1532 		if (!line)
1533 			goto out_failure;
1534 
1535 		line[--line_len] = '\0'; /* \n */
1536 
1537 		len = hex2u64(line, &start);
1538 
1539 		len++;
1540 		if (len + 2 >= line_len)
1541 			continue;
1542 
1543 		len += hex2u64(line + len, &size);
1544 
1545 		len++;
1546 		if (len + 2 >= line_len)
1547 			continue;
1548 
1549 		sym = symbol__new(start, size, STB_GLOBAL, STT_FUNC, line + len);
1550 
1551 		if (sym == NULL)
1552 			goto out_delete_line;
1553 
1554 		symbols__insert(dso__symbols(dso), sym);
1555 		nr_syms++;
1556 	}
1557 
1558 	free(line);
1559 	fclose(file);
1560 
1561 	return nr_syms;
1562 
1563 out_delete_line:
1564 	free(line);
1565 out_failure:
1566 	return -1;
1567 }
1568 
1569 #ifdef HAVE_LIBBFD_SUPPORT
1570 #define PACKAGE 'perf'
1571 #include <bfd.h>
1572 
1573 static int bfd_symbols__cmpvalue(const void *a, const void *b)
1574 {
1575 	const asymbol *as = *(const asymbol **)a, *bs = *(const asymbol **)b;
1576 
1577 	if (bfd_asymbol_value(as) != bfd_asymbol_value(bs))
1578 		return bfd_asymbol_value(as) - bfd_asymbol_value(bs);
1579 
1580 	return bfd_asymbol_name(as)[0] - bfd_asymbol_name(bs)[0];
1581 }
1582 
1583 static int bfd2elf_binding(asymbol *symbol)
1584 {
1585 	if (symbol->flags & BSF_WEAK)
1586 		return STB_WEAK;
1587 	if (symbol->flags & BSF_GLOBAL)
1588 		return STB_GLOBAL;
1589 	if (symbol->flags & BSF_LOCAL)
1590 		return STB_LOCAL;
1591 	return -1;
1592 }
1593 
1594 int dso__load_bfd_symbols(struct dso *dso, const char *debugfile)
1595 {
1596 	int err = -1;
1597 	long symbols_size, symbols_count, i;
1598 	asection *section;
1599 	asymbol **symbols, *sym;
1600 	struct symbol *symbol;
1601 	bfd *abfd;
1602 	u64 start, len;
1603 
1604 	abfd = bfd_openr(debugfile, NULL);
1605 	if (!abfd)
1606 		return -1;
1607 
1608 	if (!bfd_check_format(abfd, bfd_object)) {
1609 		pr_debug2("%s: cannot read %s bfd file.\n", __func__,
1610 			  dso->long_name);
1611 		goto out_close;
1612 	}
1613 
1614 	if (bfd_get_flavour(abfd) == bfd_target_elf_flavour)
1615 		goto out_close;
1616 
1617 	symbols_size = bfd_get_symtab_upper_bound(abfd);
1618 	if (symbols_size == 0) {
1619 		bfd_close(abfd);
1620 		return 0;
1621 	}
1622 
1623 	if (symbols_size < 0)
1624 		goto out_close;
1625 
1626 	symbols = malloc(symbols_size);
1627 	if (!symbols)
1628 		goto out_close;
1629 
1630 	symbols_count = bfd_canonicalize_symtab(abfd, symbols);
1631 	if (symbols_count < 0)
1632 		goto out_free;
1633 
1634 	section = bfd_get_section_by_name(abfd, ".text");
1635 	if (section) {
1636 		for (i = 0; i < symbols_count; ++i) {
1637 			if (!strcmp(bfd_asymbol_name(symbols[i]), "__ImageBase") ||
1638 			    !strcmp(bfd_asymbol_name(symbols[i]), "__image_base__"))
1639 				break;
1640 		}
1641 		if (i < symbols_count) {
1642 			/* PE symbols can only have 4 bytes, so use .text high bits */
1643 			dso->text_offset = section->vma - (u32)section->vma;
1644 			dso->text_offset += (u32)bfd_asymbol_value(symbols[i]);
1645 			dso->text_end = (section->vma - dso->text_offset) + section->size;
1646 		} else {
1647 			dso->text_offset = section->vma - section->filepos;
1648 			dso->text_end = section->filepos + section->size;
1649 		}
1650 	}
1651 
1652 	qsort(symbols, symbols_count, sizeof(asymbol *), bfd_symbols__cmpvalue);
1653 
1654 #ifdef bfd_get_section
1655 #define bfd_asymbol_section bfd_get_section
1656 #endif
1657 	for (i = 0; i < symbols_count; ++i) {
1658 		sym = symbols[i];
1659 		section = bfd_asymbol_section(sym);
1660 		if (bfd2elf_binding(sym) < 0)
1661 			continue;
1662 
1663 		while (i + 1 < symbols_count &&
1664 		       bfd_asymbol_section(symbols[i + 1]) == section &&
1665 		       bfd2elf_binding(symbols[i + 1]) < 0)
1666 			i++;
1667 
1668 		if (i + 1 < symbols_count &&
1669 		    bfd_asymbol_section(symbols[i + 1]) == section)
1670 			len = symbols[i + 1]->value - sym->value;
1671 		else
1672 			len = section->size - sym->value;
1673 
1674 		start = bfd_asymbol_value(sym) - dso->text_offset;
1675 		symbol = symbol__new(start, len, bfd2elf_binding(sym), STT_FUNC,
1676 				     bfd_asymbol_name(sym));
1677 		if (!symbol)
1678 			goto out_free;
1679 
1680 		symbols__insert(dso__symbols(dso), symbol);
1681 	}
1682 #ifdef bfd_get_section
1683 #undef bfd_asymbol_section
1684 #endif
1685 
1686 	symbols__fixup_end(dso__symbols(dso), false);
1687 	symbols__fixup_duplicate(dso__symbols(dso));
1688 	dso__set_adjust_symbols(dso, true);
1689 
1690 	err = 0;
1691 out_free:
1692 	free(symbols);
1693 out_close:
1694 	bfd_close(abfd);
1695 	return err;
1696 }
1697 #endif
1698 
1699 static bool dso__is_compatible_symtab_type(struct dso *dso, bool kmod,
1700 					   enum dso_binary_type type)
1701 {
1702 	switch (type) {
1703 	case DSO_BINARY_TYPE__JAVA_JIT:
1704 	case DSO_BINARY_TYPE__DEBUGLINK:
1705 	case DSO_BINARY_TYPE__SYSTEM_PATH_DSO:
1706 	case DSO_BINARY_TYPE__FEDORA_DEBUGINFO:
1707 	case DSO_BINARY_TYPE__UBUNTU_DEBUGINFO:
1708 	case DSO_BINARY_TYPE__MIXEDUP_UBUNTU_DEBUGINFO:
1709 	case DSO_BINARY_TYPE__BUILDID_DEBUGINFO:
1710 	case DSO_BINARY_TYPE__OPENEMBEDDED_DEBUGINFO:
1711 		return !kmod && dso__kernel(dso) == DSO_SPACE__USER;
1712 
1713 	case DSO_BINARY_TYPE__KALLSYMS:
1714 	case DSO_BINARY_TYPE__VMLINUX:
1715 	case DSO_BINARY_TYPE__KCORE:
1716 		return dso__kernel(dso) == DSO_SPACE__KERNEL;
1717 
1718 	case DSO_BINARY_TYPE__GUEST_KALLSYMS:
1719 	case DSO_BINARY_TYPE__GUEST_VMLINUX:
1720 	case DSO_BINARY_TYPE__GUEST_KCORE:
1721 		return dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST;
1722 
1723 	case DSO_BINARY_TYPE__GUEST_KMODULE:
1724 	case DSO_BINARY_TYPE__GUEST_KMODULE_COMP:
1725 	case DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE:
1726 	case DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP:
1727 		/*
1728 		 * kernel modules know their symtab type - it's set when
1729 		 * creating a module dso in machine__addnew_module_map().
1730 		 */
1731 		return kmod && dso__symtab_type(dso) == type;
1732 
1733 	case DSO_BINARY_TYPE__BUILD_ID_CACHE:
1734 	case DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO:
1735 		return true;
1736 
1737 	case DSO_BINARY_TYPE__BPF_PROG_INFO:
1738 	case DSO_BINARY_TYPE__BPF_IMAGE:
1739 	case DSO_BINARY_TYPE__OOL:
1740 	case DSO_BINARY_TYPE__NOT_FOUND:
1741 	default:
1742 		return false;
1743 	}
1744 }
1745 
1746 /* Checks for the existence of the perf-<pid>.map file in two different
1747  * locations.  First, if the process is a separate mount namespace, check in
1748  * that namespace using the pid of the innermost pid namespace.  If's not in a
1749  * namespace, or the file can't be found there, try in the mount namespace of
1750  * the tracing process using our view of its pid.
1751  */
1752 static int dso__find_perf_map(char *filebuf, size_t bufsz,
1753 			      struct nsinfo **nsip)
1754 {
1755 	struct nscookie nsc;
1756 	struct nsinfo *nsi;
1757 	struct nsinfo *nnsi;
1758 	int rc = -1;
1759 
1760 	nsi = *nsip;
1761 
1762 	if (nsinfo__need_setns(nsi)) {
1763 		snprintf(filebuf, bufsz, "/tmp/perf-%d.map", nsinfo__nstgid(nsi));
1764 		nsinfo__mountns_enter(nsi, &nsc);
1765 		rc = access(filebuf, R_OK);
1766 		nsinfo__mountns_exit(&nsc);
1767 		if (rc == 0)
1768 			return rc;
1769 	}
1770 
1771 	nnsi = nsinfo__copy(nsi);
1772 	if (nnsi) {
1773 		nsinfo__put(nsi);
1774 
1775 		nsinfo__clear_need_setns(nnsi);
1776 		snprintf(filebuf, bufsz, "/tmp/perf-%d.map", nsinfo__tgid(nnsi));
1777 		*nsip = nnsi;
1778 		rc = 0;
1779 	}
1780 
1781 	return rc;
1782 }
1783 
1784 int dso__load(struct dso *dso, struct map *map)
1785 {
1786 	char *name;
1787 	int ret = -1;
1788 	u_int i;
1789 	struct machine *machine = NULL;
1790 	char *root_dir = (char *) "";
1791 	int ss_pos = 0;
1792 	struct symsrc ss_[2];
1793 	struct symsrc *syms_ss = NULL, *runtime_ss = NULL;
1794 	bool kmod;
1795 	bool perfmap;
1796 	struct build_id bid;
1797 	struct nscookie nsc;
1798 	char newmapname[PATH_MAX];
1799 	const char *map_path = dso__long_name(dso);
1800 
1801 	mutex_lock(dso__lock(dso));
1802 	perfmap = strncmp(dso__name(dso), "/tmp/perf-", 10) == 0;
1803 	if (perfmap) {
1804 		if (dso__nsinfo(dso) &&
1805 		    (dso__find_perf_map(newmapname, sizeof(newmapname),
1806 					dso__nsinfo_ptr(dso)) == 0)) {
1807 			map_path = newmapname;
1808 		}
1809 	}
1810 
1811 	nsinfo__mountns_enter(dso__nsinfo(dso), &nsc);
1812 
1813 	/* check again under the dso->lock */
1814 	if (dso__loaded(dso)) {
1815 		ret = 1;
1816 		goto out;
1817 	}
1818 
1819 	kmod = dso__symtab_type(dso) == DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE ||
1820 		dso__symtab_type(dso) == DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP ||
1821 		dso__symtab_type(dso) == DSO_BINARY_TYPE__GUEST_KMODULE ||
1822 		dso__symtab_type(dso) == DSO_BINARY_TYPE__GUEST_KMODULE_COMP;
1823 
1824 	if (dso__kernel(dso) && !kmod) {
1825 		if (dso__kernel(dso) == DSO_SPACE__KERNEL)
1826 			ret = dso__load_kernel_sym(dso, map);
1827 		else if (dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST)
1828 			ret = dso__load_guest_kernel_sym(dso, map);
1829 
1830 		machine = maps__machine(map__kmaps(map));
1831 		if (machine__is(machine, "x86_64"))
1832 			machine__map_x86_64_entry_trampolines(machine, dso);
1833 		goto out;
1834 	}
1835 
1836 	dso__set_adjust_symbols(dso, false);
1837 
1838 	if (perfmap) {
1839 		ret = dso__load_perf_map(map_path, dso);
1840 		dso__set_symtab_type(dso, ret > 0
1841 				? DSO_BINARY_TYPE__JAVA_JIT
1842 				: DSO_BINARY_TYPE__NOT_FOUND);
1843 		goto out;
1844 	}
1845 
1846 	if (machine)
1847 		root_dir = machine->root_dir;
1848 
1849 	name = malloc(PATH_MAX);
1850 	if (!name)
1851 		goto out;
1852 
1853 	/*
1854 	 * Read the build id if possible. This is required for
1855 	 * DSO_BINARY_TYPE__BUILDID_DEBUGINFO to work
1856 	 */
1857 	if (!dso__has_build_id(dso) &&
1858 	    is_regular_file(dso__long_name(dso))) {
1859 		__symbol__join_symfs(name, PATH_MAX, dso__long_name(dso));
1860 		if (filename__read_build_id(name, &bid) > 0)
1861 			dso__set_build_id(dso, &bid);
1862 	}
1863 
1864 	/*
1865 	 * Iterate over candidate debug images.
1866 	 * Keep track of "interesting" ones (those which have a symtab, dynsym,
1867 	 * and/or opd section) for processing.
1868 	 */
1869 	for (i = 0; i < DSO_BINARY_TYPE__SYMTAB_CNT; i++) {
1870 		struct symsrc *ss = &ss_[ss_pos];
1871 		bool next_slot = false;
1872 		bool is_reg;
1873 		bool nsexit;
1874 		int bfdrc = -1;
1875 		int sirc = -1;
1876 
1877 		enum dso_binary_type symtab_type = binary_type_symtab[i];
1878 
1879 		nsexit = (symtab_type == DSO_BINARY_TYPE__BUILD_ID_CACHE ||
1880 		    symtab_type == DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO);
1881 
1882 		if (!dso__is_compatible_symtab_type(dso, kmod, symtab_type))
1883 			continue;
1884 
1885 		if (dso__read_binary_type_filename(dso, symtab_type,
1886 						   root_dir, name, PATH_MAX))
1887 			continue;
1888 
1889 		if (nsexit)
1890 			nsinfo__mountns_exit(&nsc);
1891 
1892 		is_reg = is_regular_file(name);
1893 		if (!is_reg && errno == ENOENT && dso__nsinfo(dso)) {
1894 			char *new_name = dso__filename_with_chroot(dso, name);
1895 			if (new_name) {
1896 				is_reg = is_regular_file(new_name);
1897 				strlcpy(name, new_name, PATH_MAX);
1898 				free(new_name);
1899 			}
1900 		}
1901 
1902 #ifdef HAVE_LIBBFD_SUPPORT
1903 		if (is_reg)
1904 			bfdrc = dso__load_bfd_symbols(dso, name);
1905 #endif
1906 		if (is_reg && bfdrc < 0)
1907 			sirc = symsrc__init(ss, dso, name, symtab_type);
1908 
1909 		if (nsexit)
1910 			nsinfo__mountns_enter(dso__nsinfo(dso), &nsc);
1911 
1912 		if (bfdrc == 0) {
1913 			ret = 0;
1914 			break;
1915 		}
1916 
1917 		if (!is_reg || sirc < 0)
1918 			continue;
1919 
1920 		if (!syms_ss && symsrc__has_symtab(ss)) {
1921 			syms_ss = ss;
1922 			next_slot = true;
1923 			if (!dso__symsrc_filename(dso))
1924 				dso__set_symsrc_filename(dso, strdup(name));
1925 		}
1926 
1927 		if (!runtime_ss && symsrc__possibly_runtime(ss)) {
1928 			runtime_ss = ss;
1929 			next_slot = true;
1930 		}
1931 
1932 		if (next_slot) {
1933 			ss_pos++;
1934 
1935 			if (syms_ss && runtime_ss)
1936 				break;
1937 		} else {
1938 			symsrc__destroy(ss);
1939 		}
1940 
1941 	}
1942 
1943 	if (!runtime_ss && !syms_ss)
1944 		goto out_free;
1945 
1946 	if (runtime_ss && !syms_ss) {
1947 		syms_ss = runtime_ss;
1948 	}
1949 
1950 	/* We'll have to hope for the best */
1951 	if (!runtime_ss && syms_ss)
1952 		runtime_ss = syms_ss;
1953 
1954 	if (syms_ss)
1955 		ret = dso__load_sym(dso, map, syms_ss, runtime_ss, kmod);
1956 	else
1957 		ret = -1;
1958 
1959 	if (ret > 0) {
1960 		int nr_plt;
1961 
1962 		nr_plt = dso__synthesize_plt_symbols(dso, runtime_ss);
1963 		if (nr_plt > 0)
1964 			ret += nr_plt;
1965 	}
1966 
1967 	for (; ss_pos > 0; ss_pos--)
1968 		symsrc__destroy(&ss_[ss_pos - 1]);
1969 out_free:
1970 	free(name);
1971 	if (ret < 0 && strstr(dso__name(dso), " (deleted)") != NULL)
1972 		ret = 0;
1973 out:
1974 	dso__set_loaded(dso);
1975 	mutex_unlock(dso__lock(dso));
1976 	nsinfo__mountns_exit(&nsc);
1977 
1978 	return ret;
1979 }
1980 
1981 /*
1982  * Always takes ownership of vmlinux when vmlinux_allocated == true, even if
1983  * it returns an error.
1984  */
1985 int dso__load_vmlinux(struct dso *dso, struct map *map,
1986 		      const char *vmlinux, bool vmlinux_allocated)
1987 {
1988 	int err = -1;
1989 	struct symsrc ss;
1990 	char symfs_vmlinux[PATH_MAX];
1991 	enum dso_binary_type symtab_type;
1992 
1993 	if (vmlinux[0] == '/')
1994 		snprintf(symfs_vmlinux, sizeof(symfs_vmlinux), "%s", vmlinux);
1995 	else
1996 		symbol__join_symfs(symfs_vmlinux, vmlinux);
1997 
1998 	if (dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST)
1999 		symtab_type = DSO_BINARY_TYPE__GUEST_VMLINUX;
2000 	else
2001 		symtab_type = DSO_BINARY_TYPE__VMLINUX;
2002 
2003 	if (symsrc__init(&ss, dso, symfs_vmlinux, symtab_type)) {
2004 		if (vmlinux_allocated)
2005 			free((char *) vmlinux);
2006 		return -1;
2007 	}
2008 
2009 	/*
2010 	 * dso__load_sym() may copy 'dso' which will result in the copies having
2011 	 * an incorrect long name unless we set it here first.
2012 	 */
2013 	dso__set_long_name(dso, vmlinux, vmlinux_allocated);
2014 	if (dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST)
2015 		dso__set_binary_type(dso, DSO_BINARY_TYPE__GUEST_VMLINUX);
2016 	else
2017 		dso__set_binary_type(dso, DSO_BINARY_TYPE__VMLINUX);
2018 
2019 	err = dso__load_sym(dso, map, &ss, &ss, 0);
2020 	symsrc__destroy(&ss);
2021 
2022 	if (err > 0) {
2023 		dso__set_loaded(dso);
2024 		pr_debug("Using %s for symbols\n", symfs_vmlinux);
2025 	}
2026 
2027 	return err;
2028 }
2029 
2030 int dso__load_vmlinux_path(struct dso *dso, struct map *map)
2031 {
2032 	int i, err = 0;
2033 	char *filename = NULL;
2034 
2035 	pr_debug("Looking at the vmlinux_path (%d entries long)\n",
2036 		 vmlinux_path__nr_entries + 1);
2037 
2038 	for (i = 0; i < vmlinux_path__nr_entries; ++i) {
2039 		err = dso__load_vmlinux(dso, map, vmlinux_path[i], false);
2040 		if (err > 0)
2041 			goto out;
2042 	}
2043 
2044 	if (!symbol_conf.ignore_vmlinux_buildid)
2045 		filename = dso__build_id_filename(dso, NULL, 0, false);
2046 	if (filename != NULL) {
2047 		err = dso__load_vmlinux(dso, map, filename, true);
2048 		if (err > 0)
2049 			goto out;
2050 	}
2051 out:
2052 	return err;
2053 }
2054 
2055 static bool visible_dir_filter(const char *name, struct dirent *d)
2056 {
2057 	if (d->d_type != DT_DIR)
2058 		return false;
2059 	return lsdir_no_dot_filter(name, d);
2060 }
2061 
2062 static int find_matching_kcore(struct map *map, char *dir, size_t dir_sz)
2063 {
2064 	char kallsyms_filename[PATH_MAX];
2065 	int ret = -1;
2066 	struct strlist *dirs;
2067 	struct str_node *nd;
2068 
2069 	dirs = lsdir(dir, visible_dir_filter);
2070 	if (!dirs)
2071 		return -1;
2072 
2073 	strlist__for_each_entry(nd, dirs) {
2074 		scnprintf(kallsyms_filename, sizeof(kallsyms_filename),
2075 			  "%s/%s/kallsyms", dir, nd->s);
2076 		if (!validate_kcore_addresses(kallsyms_filename, map)) {
2077 			strlcpy(dir, kallsyms_filename, dir_sz);
2078 			ret = 0;
2079 			break;
2080 		}
2081 	}
2082 
2083 	strlist__delete(dirs);
2084 
2085 	return ret;
2086 }
2087 
2088 /*
2089  * Use open(O_RDONLY) to check readability directly instead of access(R_OK)
2090  * since access(R_OK) only checks with real UID/GID but open() use effective
2091  * UID/GID and actual capabilities (e.g. /proc/kcore requires CAP_SYS_RAWIO).
2092  */
2093 static bool filename__readable(const char *file)
2094 {
2095 	int fd = open(file, O_RDONLY);
2096 	if (fd < 0)
2097 		return false;
2098 	close(fd);
2099 	return true;
2100 }
2101 
2102 static char *dso__find_kallsyms(struct dso *dso, struct map *map)
2103 {
2104 	struct build_id bid;
2105 	char sbuild_id[SBUILD_ID_SIZE];
2106 	bool is_host = false;
2107 	char path[PATH_MAX];
2108 
2109 	if (!dso__has_build_id(dso)) {
2110 		/*
2111 		 * Last resort, if we don't have a build-id and couldn't find
2112 		 * any vmlinux file, try the running kernel kallsyms table.
2113 		 */
2114 		goto proc_kallsyms;
2115 	}
2116 
2117 	if (sysfs__read_build_id("/sys/kernel/notes", &bid) == 0)
2118 		is_host = dso__build_id_equal(dso, &bid);
2119 
2120 	/* Try a fast path for /proc/kallsyms if possible */
2121 	if (is_host) {
2122 		/*
2123 		 * Do not check the build-id cache, unless we know we cannot use
2124 		 * /proc/kcore or module maps don't match to /proc/kallsyms.
2125 		 * To check readability of /proc/kcore, do not use access(R_OK)
2126 		 * since /proc/kcore requires CAP_SYS_RAWIO to read and access
2127 		 * can't check it.
2128 		 */
2129 		if (filename__readable("/proc/kcore") &&
2130 		    !validate_kcore_addresses("/proc/kallsyms", map))
2131 			goto proc_kallsyms;
2132 	}
2133 
2134 	build_id__sprintf(dso__bid(dso), sbuild_id);
2135 
2136 	/* Find kallsyms in build-id cache with kcore */
2137 	scnprintf(path, sizeof(path), "%s/%s/%s",
2138 		  buildid_dir, DSO__NAME_KCORE, sbuild_id);
2139 
2140 	if (!find_matching_kcore(map, path, sizeof(path)))
2141 		return strdup(path);
2142 
2143 	/* Use current /proc/kallsyms if possible */
2144 	if (is_host) {
2145 proc_kallsyms:
2146 		return strdup("/proc/kallsyms");
2147 	}
2148 
2149 	/* Finally, find a cache of kallsyms */
2150 	if (!build_id_cache__kallsyms_path(sbuild_id, path, sizeof(path))) {
2151 		pr_err("No kallsyms or vmlinux with build-id %s was found\n",
2152 		       sbuild_id);
2153 		return NULL;
2154 	}
2155 
2156 	return strdup(path);
2157 }
2158 
2159 static int dso__load_kernel_sym(struct dso *dso, struct map *map)
2160 {
2161 	int err;
2162 	const char *kallsyms_filename = NULL;
2163 	char *kallsyms_allocated_filename = NULL;
2164 	char *filename = NULL;
2165 
2166 	/*
2167 	 * Step 1: if the user specified a kallsyms or vmlinux filename, use
2168 	 * it and only it, reporting errors to the user if it cannot be used.
2169 	 *
2170 	 * For instance, try to analyse an ARM perf.data file _without_ a
2171 	 * build-id, or if the user specifies the wrong path to the right
2172 	 * vmlinux file, obviously we can't fallback to another vmlinux (a
2173 	 * x86_86 one, on the machine where analysis is being performed, say),
2174 	 * or worse, /proc/kallsyms.
2175 	 *
2176 	 * If the specified file _has_ a build-id and there is a build-id
2177 	 * section in the perf.data file, we will still do the expected
2178 	 * validation in dso__load_vmlinux and will bail out if they don't
2179 	 * match.
2180 	 */
2181 	if (symbol_conf.kallsyms_name != NULL) {
2182 		kallsyms_filename = symbol_conf.kallsyms_name;
2183 		goto do_kallsyms;
2184 	}
2185 
2186 	if (!symbol_conf.ignore_vmlinux && symbol_conf.vmlinux_name != NULL) {
2187 		return dso__load_vmlinux(dso, map, symbol_conf.vmlinux_name, false);
2188 	}
2189 
2190 	/*
2191 	 * Before checking on common vmlinux locations, check if it's
2192 	 * stored as standard build id binary (not kallsyms) under
2193 	 * .debug cache.
2194 	 */
2195 	if (!symbol_conf.ignore_vmlinux_buildid)
2196 		filename = __dso__build_id_filename(dso, NULL, 0, false, false);
2197 	if (filename != NULL) {
2198 		err = dso__load_vmlinux(dso, map, filename, true);
2199 		if (err > 0)
2200 			return err;
2201 	}
2202 
2203 	if (!symbol_conf.ignore_vmlinux && vmlinux_path != NULL) {
2204 		err = dso__load_vmlinux_path(dso, map);
2205 		if (err > 0)
2206 			return err;
2207 	}
2208 
2209 	/* do not try local files if a symfs was given */
2210 	if (symbol_conf.symfs[0] != 0)
2211 		return -1;
2212 
2213 	kallsyms_allocated_filename = dso__find_kallsyms(dso, map);
2214 	if (!kallsyms_allocated_filename)
2215 		return -1;
2216 
2217 	kallsyms_filename = kallsyms_allocated_filename;
2218 
2219 do_kallsyms:
2220 	err = dso__load_kallsyms(dso, kallsyms_filename, map);
2221 	if (err > 0)
2222 		pr_debug("Using %s for symbols\n", kallsyms_filename);
2223 	free(kallsyms_allocated_filename);
2224 
2225 	if (err > 0 && !dso__is_kcore(dso)) {
2226 		dso__set_binary_type(dso, DSO_BINARY_TYPE__KALLSYMS);
2227 		dso__set_long_name(dso, DSO__NAME_KALLSYMS, false);
2228 		map__fixup_start(map);
2229 		map__fixup_end(map);
2230 	}
2231 
2232 	return err;
2233 }
2234 
2235 static int dso__load_guest_kernel_sym(struct dso *dso, struct map *map)
2236 {
2237 	int err;
2238 	const char *kallsyms_filename;
2239 	struct machine *machine = maps__machine(map__kmaps(map));
2240 	char path[PATH_MAX];
2241 
2242 	if (machine->kallsyms_filename) {
2243 		kallsyms_filename = machine->kallsyms_filename;
2244 	} else if (machine__is_default_guest(machine)) {
2245 		/*
2246 		 * if the user specified a vmlinux filename, use it and only
2247 		 * it, reporting errors to the user if it cannot be used.
2248 		 * Or use file guest_kallsyms inputted by user on commandline
2249 		 */
2250 		if (symbol_conf.default_guest_vmlinux_name != NULL) {
2251 			err = dso__load_vmlinux(dso, map,
2252 						symbol_conf.default_guest_vmlinux_name,
2253 						false);
2254 			return err;
2255 		}
2256 
2257 		kallsyms_filename = symbol_conf.default_guest_kallsyms;
2258 		if (!kallsyms_filename)
2259 			return -1;
2260 	} else {
2261 		sprintf(path, "%s/proc/kallsyms", machine->root_dir);
2262 		kallsyms_filename = path;
2263 	}
2264 
2265 	err = dso__load_kallsyms(dso, kallsyms_filename, map);
2266 	if (err > 0)
2267 		pr_debug("Using %s for symbols\n", kallsyms_filename);
2268 	if (err > 0 && !dso__is_kcore(dso)) {
2269 		dso__set_binary_type(dso, DSO_BINARY_TYPE__GUEST_KALLSYMS);
2270 		dso__set_long_name(dso, machine->mmap_name, false);
2271 		map__fixup_start(map);
2272 		map__fixup_end(map);
2273 	}
2274 
2275 	return err;
2276 }
2277 
2278 static void vmlinux_path__exit(void)
2279 {
2280 	while (--vmlinux_path__nr_entries >= 0)
2281 		zfree(&vmlinux_path[vmlinux_path__nr_entries]);
2282 	vmlinux_path__nr_entries = 0;
2283 
2284 	zfree(&vmlinux_path);
2285 }
2286 
2287 static const char * const vmlinux_paths[] = {
2288 	"vmlinux",
2289 	"/boot/vmlinux"
2290 };
2291 
2292 static const char * const vmlinux_paths_upd[] = {
2293 	"/boot/vmlinux-%s",
2294 	"/usr/lib/debug/boot/vmlinux-%s",
2295 	"/lib/modules/%s/build/vmlinux",
2296 	"/usr/lib/debug/lib/modules/%s/vmlinux",
2297 	"/usr/lib/debug/boot/vmlinux-%s.debug"
2298 };
2299 
2300 static int vmlinux_path__add(const char *new_entry)
2301 {
2302 	vmlinux_path[vmlinux_path__nr_entries] = strdup(new_entry);
2303 	if (vmlinux_path[vmlinux_path__nr_entries] == NULL)
2304 		return -1;
2305 	++vmlinux_path__nr_entries;
2306 
2307 	return 0;
2308 }
2309 
2310 static int vmlinux_path__init(struct perf_env *env)
2311 {
2312 	struct utsname uts;
2313 	char bf[PATH_MAX];
2314 	char *kernel_version;
2315 	unsigned int i;
2316 
2317 	vmlinux_path = malloc(sizeof(char *) * (ARRAY_SIZE(vmlinux_paths) +
2318 			      ARRAY_SIZE(vmlinux_paths_upd)));
2319 	if (vmlinux_path == NULL)
2320 		return -1;
2321 
2322 	for (i = 0; i < ARRAY_SIZE(vmlinux_paths); i++)
2323 		if (vmlinux_path__add(vmlinux_paths[i]) < 0)
2324 			goto out_fail;
2325 
2326 	/* only try kernel version if no symfs was given */
2327 	if (symbol_conf.symfs[0] != 0)
2328 		return 0;
2329 
2330 	if (env) {
2331 		kernel_version = env->os_release;
2332 	} else {
2333 		if (uname(&uts) < 0)
2334 			goto out_fail;
2335 
2336 		kernel_version = uts.release;
2337 	}
2338 
2339 	for (i = 0; i < ARRAY_SIZE(vmlinux_paths_upd); i++) {
2340 		snprintf(bf, sizeof(bf), vmlinux_paths_upd[i], kernel_version);
2341 		if (vmlinux_path__add(bf) < 0)
2342 			goto out_fail;
2343 	}
2344 
2345 	return 0;
2346 
2347 out_fail:
2348 	vmlinux_path__exit();
2349 	return -1;
2350 }
2351 
2352 int setup_list(struct strlist **list, const char *list_str,
2353 		      const char *list_name)
2354 {
2355 	if (list_str == NULL)
2356 		return 0;
2357 
2358 	*list = strlist__new(list_str, NULL);
2359 	if (!*list) {
2360 		pr_err("problems parsing %s list\n", list_name);
2361 		return -1;
2362 	}
2363 
2364 	symbol_conf.has_filter = true;
2365 	return 0;
2366 }
2367 
2368 int setup_intlist(struct intlist **list, const char *list_str,
2369 		  const char *list_name)
2370 {
2371 	if (list_str == NULL)
2372 		return 0;
2373 
2374 	*list = intlist__new(list_str);
2375 	if (!*list) {
2376 		pr_err("problems parsing %s list\n", list_name);
2377 		return -1;
2378 	}
2379 	return 0;
2380 }
2381 
2382 static int setup_addrlist(struct intlist **addr_list, struct strlist *sym_list)
2383 {
2384 	struct str_node *pos, *tmp;
2385 	unsigned long val;
2386 	char *sep;
2387 	const char *end;
2388 	int i = 0, err;
2389 
2390 	*addr_list = intlist__new(NULL);
2391 	if (!*addr_list)
2392 		return -1;
2393 
2394 	strlist__for_each_entry_safe(pos, tmp, sym_list) {
2395 		errno = 0;
2396 		val = strtoul(pos->s, &sep, 16);
2397 		if (errno || (sep == pos->s))
2398 			continue;
2399 
2400 		if (*sep != '\0') {
2401 			end = pos->s + strlen(pos->s) - 1;
2402 			while (end >= sep && isspace(*end))
2403 				end--;
2404 
2405 			if (end >= sep)
2406 				continue;
2407 		}
2408 
2409 		err = intlist__add(*addr_list, val);
2410 		if (err)
2411 			break;
2412 
2413 		strlist__remove(sym_list, pos);
2414 		i++;
2415 	}
2416 
2417 	if (i == 0) {
2418 		intlist__delete(*addr_list);
2419 		*addr_list = NULL;
2420 	}
2421 
2422 	return 0;
2423 }
2424 
2425 static bool symbol__read_kptr_restrict(void)
2426 {
2427 	bool value = false;
2428 	FILE *fp = fopen("/proc/sys/kernel/kptr_restrict", "r");
2429 
2430 	if (fp != NULL) {
2431 		char line[8];
2432 
2433 		if (fgets(line, sizeof(line), fp) != NULL)
2434 			value = perf_cap__capable(CAP_SYSLOG) ?
2435 					(atoi(line) >= 2) :
2436 					(atoi(line) != 0);
2437 
2438 		fclose(fp);
2439 	}
2440 
2441 	/* Per kernel/kallsyms.c:
2442 	 * we also restrict when perf_event_paranoid > 1 w/o CAP_SYSLOG
2443 	 */
2444 	if (perf_event_paranoid() > 1 && !perf_cap__capable(CAP_SYSLOG))
2445 		value = true;
2446 
2447 	return value;
2448 }
2449 
2450 int symbol__annotation_init(void)
2451 {
2452 	if (symbol_conf.init_annotation)
2453 		return 0;
2454 
2455 	if (symbol_conf.initialized) {
2456 		pr_err("Annotation needs to be init before symbol__init()\n");
2457 		return -1;
2458 	}
2459 
2460 	symbol_conf.priv_size += sizeof(struct annotation);
2461 	symbol_conf.init_annotation = true;
2462 	return 0;
2463 }
2464 
2465 int symbol__init(struct perf_env *env)
2466 {
2467 	const char *symfs;
2468 
2469 	if (symbol_conf.initialized)
2470 		return 0;
2471 
2472 	symbol_conf.priv_size = PERF_ALIGN(symbol_conf.priv_size, sizeof(u64));
2473 
2474 	symbol__elf_init();
2475 
2476 	if (symbol_conf.try_vmlinux_path && vmlinux_path__init(env) < 0)
2477 		return -1;
2478 
2479 	if (symbol_conf.field_sep && *symbol_conf.field_sep == '.') {
2480 		pr_err("'.' is the only non valid --field-separator argument\n");
2481 		return -1;
2482 	}
2483 
2484 	if (setup_list(&symbol_conf.dso_list,
2485 		       symbol_conf.dso_list_str, "dso") < 0)
2486 		return -1;
2487 
2488 	if (setup_list(&symbol_conf.comm_list,
2489 		       symbol_conf.comm_list_str, "comm") < 0)
2490 		goto out_free_dso_list;
2491 
2492 	if (setup_intlist(&symbol_conf.pid_list,
2493 		       symbol_conf.pid_list_str, "pid") < 0)
2494 		goto out_free_comm_list;
2495 
2496 	if (setup_intlist(&symbol_conf.tid_list,
2497 		       symbol_conf.tid_list_str, "tid") < 0)
2498 		goto out_free_pid_list;
2499 
2500 	if (setup_list(&symbol_conf.sym_list,
2501 		       symbol_conf.sym_list_str, "symbol") < 0)
2502 		goto out_free_tid_list;
2503 
2504 	if (symbol_conf.sym_list &&
2505 	    setup_addrlist(&symbol_conf.addr_list, symbol_conf.sym_list) < 0)
2506 		goto out_free_sym_list;
2507 
2508 	if (setup_list(&symbol_conf.bt_stop_list,
2509 		       symbol_conf.bt_stop_list_str, "symbol") < 0)
2510 		goto out_free_sym_list;
2511 
2512 	/*
2513 	 * A path to symbols of "/" is identical to ""
2514 	 * reset here for simplicity.
2515 	 */
2516 	symfs = realpath(symbol_conf.symfs, NULL);
2517 	if (symfs == NULL)
2518 		symfs = symbol_conf.symfs;
2519 	if (strcmp(symfs, "/") == 0)
2520 		symbol_conf.symfs = "";
2521 	if (symfs != symbol_conf.symfs)
2522 		free((void *)symfs);
2523 
2524 	symbol_conf.kptr_restrict = symbol__read_kptr_restrict();
2525 
2526 	symbol_conf.initialized = true;
2527 	return 0;
2528 
2529 out_free_sym_list:
2530 	strlist__delete(symbol_conf.sym_list);
2531 	intlist__delete(symbol_conf.addr_list);
2532 out_free_tid_list:
2533 	intlist__delete(symbol_conf.tid_list);
2534 out_free_pid_list:
2535 	intlist__delete(symbol_conf.pid_list);
2536 out_free_comm_list:
2537 	strlist__delete(symbol_conf.comm_list);
2538 out_free_dso_list:
2539 	strlist__delete(symbol_conf.dso_list);
2540 	return -1;
2541 }
2542 
2543 void symbol__exit(void)
2544 {
2545 	if (!symbol_conf.initialized)
2546 		return;
2547 	strlist__delete(symbol_conf.bt_stop_list);
2548 	strlist__delete(symbol_conf.sym_list);
2549 	strlist__delete(symbol_conf.dso_list);
2550 	strlist__delete(symbol_conf.comm_list);
2551 	intlist__delete(symbol_conf.tid_list);
2552 	intlist__delete(symbol_conf.pid_list);
2553 	intlist__delete(symbol_conf.addr_list);
2554 	vmlinux_path__exit();
2555 	symbol_conf.sym_list = symbol_conf.dso_list = symbol_conf.comm_list = NULL;
2556 	symbol_conf.bt_stop_list = NULL;
2557 	symbol_conf.initialized = false;
2558 }
2559 
2560 int symbol__config_symfs(const struct option *opt __maybe_unused,
2561 			 const char *dir, int unset __maybe_unused)
2562 {
2563 	char *bf = NULL;
2564 	int ret;
2565 
2566 	symbol_conf.symfs = strdup(dir);
2567 	if (symbol_conf.symfs == NULL)
2568 		return -ENOMEM;
2569 
2570 	/* skip the locally configured cache if a symfs is given, and
2571 	 * config buildid dir to symfs/.debug
2572 	 */
2573 	ret = asprintf(&bf, "%s/%s", dir, ".debug");
2574 	if (ret < 0)
2575 		return -ENOMEM;
2576 
2577 	set_buildid_dir(bf);
2578 
2579 	free(bf);
2580 	return 0;
2581 }
2582 
2583 /*
2584  * Checks that user supplied symbol kernel files are accessible because
2585  * the default mechanism for accessing elf files fails silently. i.e. if
2586  * debug syms for a build ID aren't found perf carries on normally. When
2587  * they are user supplied we should assume that the user doesn't want to
2588  * silently fail.
2589  */
2590 int symbol__validate_sym_arguments(void)
2591 {
2592 	if (symbol_conf.vmlinux_name &&
2593 	    access(symbol_conf.vmlinux_name, R_OK)) {
2594 		pr_err("Invalid file: %s\n", symbol_conf.vmlinux_name);
2595 		return -EINVAL;
2596 	}
2597 	if (symbol_conf.kallsyms_name &&
2598 	    access(symbol_conf.kallsyms_name, R_OK)) {
2599 		pr_err("Invalid file: %s\n", symbol_conf.kallsyms_name);
2600 		return -EINVAL;
2601 	}
2602 	return 0;
2603 }
2604