xref: /openbmc/linux/tools/perf/util/map.c (revision 41415b8a)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <inttypes.h>
3 #include <limits.h>
4 #include <stdio.h>
5 #include <stdlib.h>
6 #include <string.h>
7 #include <linux/string.h>
8 #include <linux/zalloc.h>
9 #include <uapi/linux/mman.h> /* To get things like MAP_HUGETLB even on older libc headers */
10 #include "debug.h"
11 #include "dso.h"
12 #include "map.h"
13 #include "namespaces.h"
14 #include "srcline.h"
15 #include "symbol.h"
16 #include "thread.h"
17 #include "vdso.h"
18 
19 static inline int is_android_lib(const char *filename)
20 {
21 	return strstarts(filename, "/data/app-lib/") ||
22 	       strstarts(filename, "/system/lib/");
23 }
24 
25 static inline bool replace_android_lib(const char *filename, char *newfilename)
26 {
27 	const char *libname;
28 	char *app_abi;
29 	size_t app_abi_length, new_length;
30 	size_t lib_length = 0;
31 
32 	libname  = strrchr(filename, '/');
33 	if (libname)
34 		lib_length = strlen(libname);
35 
36 	app_abi = getenv("APP_ABI");
37 	if (!app_abi)
38 		return false;
39 
40 	app_abi_length = strlen(app_abi);
41 
42 	if (strstarts(filename, "/data/app-lib/")) {
43 		char *apk_path;
44 
45 		if (!app_abi_length)
46 			return false;
47 
48 		new_length = 7 + app_abi_length + lib_length;
49 
50 		apk_path = getenv("APK_PATH");
51 		if (apk_path) {
52 			new_length += strlen(apk_path) + 1;
53 			if (new_length > PATH_MAX)
54 				return false;
55 			snprintf(newfilename, new_length,
56 				 "%s/libs/%s/%s", apk_path, app_abi, libname);
57 		} else {
58 			if (new_length > PATH_MAX)
59 				return false;
60 			snprintf(newfilename, new_length,
61 				 "libs/%s/%s", app_abi, libname);
62 		}
63 		return true;
64 	}
65 
66 	if (strstarts(filename, "/system/lib/")) {
67 		char *ndk, *app;
68 		const char *arch;
69 		int ndk_length, app_length;
70 
71 		ndk = getenv("NDK_ROOT");
72 		app = getenv("APP_PLATFORM");
73 
74 		if (!(ndk && app))
75 			return false;
76 
77 		ndk_length = strlen(ndk);
78 		app_length = strlen(app);
79 
80 		if (!(ndk_length && app_length && app_abi_length))
81 			return false;
82 
83 		arch = !strncmp(app_abi, "arm", 3) ? "arm" :
84 		       !strncmp(app_abi, "mips", 4) ? "mips" :
85 		       !strncmp(app_abi, "x86", 3) ? "x86" : NULL;
86 
87 		if (!arch)
88 			return false;
89 
90 		new_length = 27 + ndk_length +
91 			     app_length + lib_length
92 			   + strlen(arch);
93 
94 		if (new_length > PATH_MAX)
95 			return false;
96 		snprintf(newfilename, new_length,
97 			"%.*s/platforms/%.*s/arch-%s/usr/lib/%s",
98 			ndk_length, ndk, app_length, app, arch, libname);
99 
100 		return true;
101 	}
102 	return false;
103 }
104 
105 void map__init(struct map *map, u64 start, u64 end, u64 pgoff, struct dso *dso)
106 {
107 	map->start    = start;
108 	map->end      = end;
109 	map->pgoff    = pgoff;
110 	map->reloc    = 0;
111 	map->dso      = dso__get(dso);
112 	map->map_ip   = map__map_ip;
113 	map->unmap_ip = map__unmap_ip;
114 	RB_CLEAR_NODE(&map->rb_node);
115 	map->erange_warned = false;
116 	refcount_set(&map->refcnt, 1);
117 }
118 
119 struct map *map__new(struct machine *machine, u64 start, u64 len,
120 		     u64 pgoff, struct dso_id *id,
121 		     u32 prot, u32 flags, struct build_id *bid,
122 		     char *filename, struct thread *thread)
123 {
124 	struct map *map = malloc(sizeof(*map));
125 	struct nsinfo *nsi = NULL;
126 	struct nsinfo *nnsi;
127 
128 	if (map != NULL) {
129 		char newfilename[PATH_MAX];
130 		struct dso *dso;
131 		int anon, no_dso, vdso, android;
132 
133 		android = is_android_lib(filename);
134 		anon = is_anon_memory(filename) || flags & MAP_HUGETLB;
135 		vdso = is_vdso_map(filename);
136 		no_dso = is_no_dso_memory(filename);
137 		map->prot = prot;
138 		map->flags = flags;
139 		nsi = nsinfo__get(thread->nsinfo);
140 
141 		if ((anon || no_dso) && nsi && (prot & PROT_EXEC)) {
142 			snprintf(newfilename, sizeof(newfilename),
143 				 "/tmp/perf-%d.map", nsinfo__pid(nsi));
144 			filename = newfilename;
145 		}
146 
147 		if (android) {
148 			if (replace_android_lib(filename, newfilename))
149 				filename = newfilename;
150 		}
151 
152 		if (vdso) {
153 			/* The vdso maps are always on the host and not the
154 			 * container.  Ensure that we don't use setns to look
155 			 * them up.
156 			 */
157 			nnsi = nsinfo__copy(nsi);
158 			if (nnsi) {
159 				nsinfo__put(nsi);
160 				nsinfo__clear_need_setns(nnsi);
161 				nsi = nnsi;
162 			}
163 			pgoff = 0;
164 			dso = machine__findnew_vdso(machine, thread);
165 		} else
166 			dso = machine__findnew_dso_id(machine, filename, id);
167 
168 		if (dso == NULL)
169 			goto out_delete;
170 
171 		map__init(map, start, start + len, pgoff, dso);
172 
173 		if (anon || no_dso) {
174 			map->map_ip = map->unmap_ip = identity__map_ip;
175 
176 			/*
177 			 * Set memory without DSO as loaded. All map__find_*
178 			 * functions still return NULL, and we avoid the
179 			 * unnecessary map__load warning.
180 			 */
181 			if (!(prot & PROT_EXEC))
182 				dso__set_loaded(dso);
183 		}
184 		dso->nsinfo = nsi;
185 
186 		if (build_id__is_defined(bid))
187 			dso__set_build_id(dso, bid);
188 
189 		dso__put(dso);
190 	}
191 	return map;
192 out_delete:
193 	nsinfo__put(nsi);
194 	free(map);
195 	return NULL;
196 }
197 
198 /*
199  * Constructor variant for modules (where we know from /proc/modules where
200  * they are loaded) and for vmlinux, where only after we load all the
201  * symbols we'll know where it starts and ends.
202  */
203 struct map *map__new2(u64 start, struct dso *dso)
204 {
205 	struct map *map = calloc(1, (sizeof(*map) +
206 				     (dso->kernel ? sizeof(struct kmap) : 0)));
207 	if (map != NULL) {
208 		/*
209 		 * ->end will be filled after we load all the symbols
210 		 */
211 		map__init(map, start, 0, 0, dso);
212 	}
213 
214 	return map;
215 }
216 
217 bool __map__is_kernel(const struct map *map)
218 {
219 	if (!map->dso->kernel)
220 		return false;
221 	return machine__kernel_map(map__kmaps((struct map *)map)->machine) == map;
222 }
223 
224 bool __map__is_extra_kernel_map(const struct map *map)
225 {
226 	struct kmap *kmap = __map__kmap((struct map *)map);
227 
228 	return kmap && kmap->name[0];
229 }
230 
231 bool __map__is_bpf_prog(const struct map *map)
232 {
233 	const char *name;
234 
235 	if (map->dso->binary_type == DSO_BINARY_TYPE__BPF_PROG_INFO)
236 		return true;
237 
238 	/*
239 	 * If PERF_RECORD_BPF_EVENT is not included, the dso will not have
240 	 * type of DSO_BINARY_TYPE__BPF_PROG_INFO. In such cases, we can
241 	 * guess the type based on name.
242 	 */
243 	name = map->dso->short_name;
244 	return name && (strstr(name, "bpf_prog_") == name);
245 }
246 
247 bool __map__is_bpf_image(const struct map *map)
248 {
249 	const char *name;
250 
251 	if (map->dso->binary_type == DSO_BINARY_TYPE__BPF_IMAGE)
252 		return true;
253 
254 	/*
255 	 * If PERF_RECORD_KSYMBOL is not included, the dso will not have
256 	 * type of DSO_BINARY_TYPE__BPF_IMAGE. In such cases, we can
257 	 * guess the type based on name.
258 	 */
259 	name = map->dso->short_name;
260 	return name && is_bpf_image(name);
261 }
262 
263 bool __map__is_ool(const struct map *map)
264 {
265 	return map->dso && map->dso->binary_type == DSO_BINARY_TYPE__OOL;
266 }
267 
268 bool map__has_symbols(const struct map *map)
269 {
270 	return dso__has_symbols(map->dso);
271 }
272 
273 static void map__exit(struct map *map)
274 {
275 	BUG_ON(refcount_read(&map->refcnt) != 0);
276 	dso__zput(map->dso);
277 }
278 
279 void map__delete(struct map *map)
280 {
281 	map__exit(map);
282 	free(map);
283 }
284 
285 void map__put(struct map *map)
286 {
287 	if (map && refcount_dec_and_test(&map->refcnt))
288 		map__delete(map);
289 }
290 
291 void map__fixup_start(struct map *map)
292 {
293 	struct rb_root_cached *symbols = &map->dso->symbols;
294 	struct rb_node *nd = rb_first_cached(symbols);
295 	if (nd != NULL) {
296 		struct symbol *sym = rb_entry(nd, struct symbol, rb_node);
297 		map->start = sym->start;
298 	}
299 }
300 
301 void map__fixup_end(struct map *map)
302 {
303 	struct rb_root_cached *symbols = &map->dso->symbols;
304 	struct rb_node *nd = rb_last(&symbols->rb_root);
305 	if (nd != NULL) {
306 		struct symbol *sym = rb_entry(nd, struct symbol, rb_node);
307 		map->end = sym->end;
308 	}
309 }
310 
311 #define DSO__DELETED "(deleted)"
312 
313 int map__load(struct map *map)
314 {
315 	const char *name = map->dso->long_name;
316 	int nr;
317 
318 	if (dso__loaded(map->dso))
319 		return 0;
320 
321 	nr = dso__load(map->dso, map);
322 	if (nr < 0) {
323 		if (map->dso->has_build_id) {
324 			char sbuild_id[SBUILD_ID_SIZE];
325 
326 			build_id__sprintf(&map->dso->bid, sbuild_id);
327 			pr_debug("%s with build id %s not found", name, sbuild_id);
328 		} else
329 			pr_debug("Failed to open %s", name);
330 
331 		pr_debug(", continuing without symbols\n");
332 		return -1;
333 	} else if (nr == 0) {
334 #ifdef HAVE_LIBELF_SUPPORT
335 		const size_t len = strlen(name);
336 		const size_t real_len = len - sizeof(DSO__DELETED);
337 
338 		if (len > sizeof(DSO__DELETED) &&
339 		    strcmp(name + real_len + 1, DSO__DELETED) == 0) {
340 			pr_debug("%.*s was updated (is prelink enabled?). "
341 				"Restart the long running apps that use it!\n",
342 				   (int)real_len, name);
343 		} else {
344 			pr_debug("no symbols found in %s, maybe install a debug package?\n", name);
345 		}
346 #endif
347 		return -1;
348 	}
349 
350 	return 0;
351 }
352 
353 struct symbol *map__find_symbol(struct map *map, u64 addr)
354 {
355 	if (map__load(map) < 0)
356 		return NULL;
357 
358 	return dso__find_symbol(map->dso, addr);
359 }
360 
361 struct symbol *map__find_symbol_by_name(struct map *map, const char *name)
362 {
363 	if (map__load(map) < 0)
364 		return NULL;
365 
366 	if (!dso__sorted_by_name(map->dso))
367 		dso__sort_by_name(map->dso);
368 
369 	return dso__find_symbol_by_name(map->dso, name);
370 }
371 
372 struct map *map__clone(struct map *from)
373 {
374 	size_t size = sizeof(struct map);
375 	struct map *map;
376 
377 	if (from->dso && from->dso->kernel)
378 		size += sizeof(struct kmap);
379 
380 	map = memdup(from, size);
381 	if (map != NULL) {
382 		refcount_set(&map->refcnt, 1);
383 		RB_CLEAR_NODE(&map->rb_node);
384 		dso__get(map->dso);
385 	}
386 
387 	return map;
388 }
389 
390 size_t map__fprintf(struct map *map, FILE *fp)
391 {
392 	return fprintf(fp, " %" PRIx64 "-%" PRIx64 " %" PRIx64 " %s\n",
393 		       map->start, map->end, map->pgoff, map->dso->name);
394 }
395 
396 size_t map__fprintf_dsoname(struct map *map, FILE *fp)
397 {
398 	char buf[symbol_conf.pad_output_len_dso + 1];
399 	const char *dsoname = "[unknown]";
400 
401 	if (map && map->dso) {
402 		if (symbol_conf.show_kernel_path && map->dso->long_name)
403 			dsoname = map->dso->long_name;
404 		else
405 			dsoname = map->dso->name;
406 	}
407 
408 	if (symbol_conf.pad_output_len_dso) {
409 		scnprintf_pad(buf, symbol_conf.pad_output_len_dso, "%s", dsoname);
410 		dsoname = buf;
411 	}
412 
413 	return fprintf(fp, "%s", dsoname);
414 }
415 
416 char *map__srcline(struct map *map, u64 addr, struct symbol *sym)
417 {
418 	if (map == NULL)
419 		return SRCLINE_UNKNOWN;
420 	return get_srcline(map->dso, map__rip_2objdump(map, addr), sym, true, true, addr);
421 }
422 
423 int map__fprintf_srcline(struct map *map, u64 addr, const char *prefix,
424 			 FILE *fp)
425 {
426 	int ret = 0;
427 
428 	if (map && map->dso) {
429 		char *srcline = map__srcline(map, addr, NULL);
430 		if (strncmp(srcline, SRCLINE_UNKNOWN, strlen(SRCLINE_UNKNOWN)) != 0)
431 			ret = fprintf(fp, "%s%s", prefix, srcline);
432 		free_srcline(srcline);
433 	}
434 	return ret;
435 }
436 
437 void srccode_state_free(struct srccode_state *state)
438 {
439 	zfree(&state->srcfile);
440 	state->line = 0;
441 }
442 
443 /**
444  * map__rip_2objdump - convert symbol start address to objdump address.
445  * @map: memory map
446  * @rip: symbol start address
447  *
448  * objdump wants/reports absolute IPs for ET_EXEC, and RIPs for ET_DYN.
449  * map->dso->adjust_symbols==1 for ET_EXEC-like cases except ET_REL which is
450  * relative to section start.
451  *
452  * Return: Address suitable for passing to "objdump --start-address="
453  */
454 u64 map__rip_2objdump(struct map *map, u64 rip)
455 {
456 	struct kmap *kmap = __map__kmap(map);
457 
458 	/*
459 	 * vmlinux does not have program headers for PTI entry trampolines and
460 	 * kcore may not either. However the trampoline object code is on the
461 	 * main kernel map, so just use that instead.
462 	 */
463 	if (kmap && is_entry_trampoline(kmap->name) && kmap->kmaps && kmap->kmaps->machine) {
464 		struct map *kernel_map = machine__kernel_map(kmap->kmaps->machine);
465 
466 		if (kernel_map)
467 			map = kernel_map;
468 	}
469 
470 	if (!map->dso->adjust_symbols)
471 		return rip;
472 
473 	if (map->dso->rel)
474 		return rip - map->pgoff;
475 
476 	/*
477 	 * kernel modules also have DSO_TYPE_USER in dso->kernel,
478 	 * but all kernel modules are ET_REL, so won't get here.
479 	 */
480 	if (map->dso->kernel == DSO_SPACE__USER)
481 		return rip + map->dso->text_offset;
482 
483 	return map->unmap_ip(map, rip) - map->reloc;
484 }
485 
486 /**
487  * map__objdump_2mem - convert objdump address to a memory address.
488  * @map: memory map
489  * @ip: objdump address
490  *
491  * Closely related to map__rip_2objdump(), this function takes an address from
492  * objdump and converts it to a memory address.  Note this assumes that @map
493  * contains the address.  To be sure the result is valid, check it forwards
494  * e.g. map__rip_2objdump(map->map_ip(map, map__objdump_2mem(map, ip))) == ip
495  *
496  * Return: Memory address.
497  */
498 u64 map__objdump_2mem(struct map *map, u64 ip)
499 {
500 	if (!map->dso->adjust_symbols)
501 		return map->unmap_ip(map, ip);
502 
503 	if (map->dso->rel)
504 		return map->unmap_ip(map, ip + map->pgoff);
505 
506 	/*
507 	 * kernel modules also have DSO_TYPE_USER in dso->kernel,
508 	 * but all kernel modules are ET_REL, so won't get here.
509 	 */
510 	if (map->dso->kernel == DSO_SPACE__USER)
511 		return map->unmap_ip(map, ip - map->dso->text_offset);
512 
513 	return ip + map->reloc;
514 }
515 
516 bool map__contains_symbol(const struct map *map, const struct symbol *sym)
517 {
518 	u64 ip = map->unmap_ip(map, sym->start);
519 
520 	return ip >= map->start && ip < map->end;
521 }
522 
523 static struct map *__map__next(struct map *map)
524 {
525 	struct rb_node *next = rb_next(&map->rb_node);
526 
527 	if (next)
528 		return rb_entry(next, struct map, rb_node);
529 	return NULL;
530 }
531 
532 struct map *map__next(struct map *map)
533 {
534 	return map ? __map__next(map) : NULL;
535 }
536 
537 struct kmap *__map__kmap(struct map *map)
538 {
539 	if (!map->dso || !map->dso->kernel)
540 		return NULL;
541 	return (struct kmap *)(map + 1);
542 }
543 
544 struct kmap *map__kmap(struct map *map)
545 {
546 	struct kmap *kmap = __map__kmap(map);
547 
548 	if (!kmap)
549 		pr_err("Internal error: map__kmap with a non-kernel map\n");
550 	return kmap;
551 }
552 
553 struct maps *map__kmaps(struct map *map)
554 {
555 	struct kmap *kmap = map__kmap(map);
556 
557 	if (!kmap || !kmap->kmaps) {
558 		pr_err("Internal error: map__kmaps with a non-kernel map\n");
559 		return NULL;
560 	}
561 	return kmap->kmaps;
562 }
563 
564 u64 map__map_ip(const struct map *map, u64 ip)
565 {
566 	return ip - map->start + map->pgoff;
567 }
568 
569 u64 map__unmap_ip(const struct map *map, u64 ip)
570 {
571 	return ip + map->start - map->pgoff;
572 }
573 
574 u64 identity__map_ip(const struct map *map __maybe_unused, u64 ip)
575 {
576 	return ip;
577 }
578