1 // SPDX-License-Identifier: GPL-2.0 2 #include <inttypes.h> 3 #include <limits.h> 4 #include <stdio.h> 5 #include <stdlib.h> 6 #include <string.h> 7 #include <linux/string.h> 8 #include <linux/zalloc.h> 9 #include <uapi/linux/mman.h> /* To get things like MAP_HUGETLB even on older libc headers */ 10 #include "debug.h" 11 #include "dso.h" 12 #include "map.h" 13 #include "namespaces.h" 14 #include "srcline.h" 15 #include "symbol.h" 16 #include "thread.h" 17 #include "vdso.h" 18 19 static inline int is_android_lib(const char *filename) 20 { 21 return strstarts(filename, "/data/app-lib/") || 22 strstarts(filename, "/system/lib/"); 23 } 24 25 static inline bool replace_android_lib(const char *filename, char *newfilename) 26 { 27 const char *libname; 28 char *app_abi; 29 size_t app_abi_length, new_length; 30 size_t lib_length = 0; 31 32 libname = strrchr(filename, '/'); 33 if (libname) 34 lib_length = strlen(libname); 35 36 app_abi = getenv("APP_ABI"); 37 if (!app_abi) 38 return false; 39 40 app_abi_length = strlen(app_abi); 41 42 if (strstarts(filename, "/data/app-lib/")) { 43 char *apk_path; 44 45 if (!app_abi_length) 46 return false; 47 48 new_length = 7 + app_abi_length + lib_length; 49 50 apk_path = getenv("APK_PATH"); 51 if (apk_path) { 52 new_length += strlen(apk_path) + 1; 53 if (new_length > PATH_MAX) 54 return false; 55 snprintf(newfilename, new_length, 56 "%s/libs/%s/%s", apk_path, app_abi, libname); 57 } else { 58 if (new_length > PATH_MAX) 59 return false; 60 snprintf(newfilename, new_length, 61 "libs/%s/%s", app_abi, libname); 62 } 63 return true; 64 } 65 66 if (strstarts(filename, "/system/lib/")) { 67 char *ndk, *app; 68 const char *arch; 69 int ndk_length, app_length; 70 71 ndk = getenv("NDK_ROOT"); 72 app = getenv("APP_PLATFORM"); 73 74 if (!(ndk && app)) 75 return false; 76 77 ndk_length = strlen(ndk); 78 app_length = strlen(app); 79 80 if (!(ndk_length && app_length && app_abi_length)) 81 return false; 82 83 arch = !strncmp(app_abi, "arm", 3) ? "arm" : 84 !strncmp(app_abi, "mips", 4) ? "mips" : 85 !strncmp(app_abi, "x86", 3) ? "x86" : NULL; 86 87 if (!arch) 88 return false; 89 90 new_length = 27 + ndk_length + 91 app_length + lib_length 92 + strlen(arch); 93 94 if (new_length > PATH_MAX) 95 return false; 96 snprintf(newfilename, new_length, 97 "%.*s/platforms/%.*s/arch-%s/usr/lib/%s", 98 ndk_length, ndk, app_length, app, arch, libname); 99 100 return true; 101 } 102 return false; 103 } 104 105 void map__init(struct map *map, u64 start, u64 end, u64 pgoff, struct dso *dso) 106 { 107 map->start = start; 108 map->end = end; 109 map->pgoff = pgoff; 110 map->reloc = 0; 111 map->dso = dso__get(dso); 112 map->map_ip = map__map_ip; 113 map->unmap_ip = map__unmap_ip; 114 RB_CLEAR_NODE(&map->rb_node); 115 map->erange_warned = false; 116 refcount_set(&map->refcnt, 1); 117 } 118 119 struct map *map__new(struct machine *machine, u64 start, u64 len, 120 u64 pgoff, struct dso_id *id, 121 u32 prot, u32 flags, struct build_id *bid, 122 char *filename, struct thread *thread) 123 { 124 struct map *map = malloc(sizeof(*map)); 125 struct nsinfo *nsi = NULL; 126 struct nsinfo *nnsi; 127 128 if (map != NULL) { 129 char newfilename[PATH_MAX]; 130 struct dso *dso; 131 int anon, no_dso, vdso, android; 132 133 android = is_android_lib(filename); 134 anon = is_anon_memory(filename) || flags & MAP_HUGETLB; 135 vdso = is_vdso_map(filename); 136 no_dso = is_no_dso_memory(filename); 137 map->prot = prot; 138 map->flags = flags; 139 nsi = nsinfo__get(thread->nsinfo); 140 141 if ((anon || no_dso) && nsi && (prot & PROT_EXEC)) { 142 snprintf(newfilename, sizeof(newfilename), 143 "/tmp/perf-%d.map", nsinfo__pid(nsi)); 144 filename = newfilename; 145 } 146 147 if (android) { 148 if (replace_android_lib(filename, newfilename)) 149 filename = newfilename; 150 } 151 152 if (vdso) { 153 /* The vdso maps are always on the host and not the 154 * container. Ensure that we don't use setns to look 155 * them up. 156 */ 157 nnsi = nsinfo__copy(nsi); 158 if (nnsi) { 159 nsinfo__put(nsi); 160 nsinfo__clear_need_setns(nnsi); 161 nsi = nnsi; 162 } 163 pgoff = 0; 164 dso = machine__findnew_vdso(machine, thread); 165 } else 166 dso = machine__findnew_dso_id(machine, filename, id); 167 168 if (dso == NULL) 169 goto out_delete; 170 171 map__init(map, start, start + len, pgoff, dso); 172 173 if (anon || no_dso) { 174 map->map_ip = map->unmap_ip = identity__map_ip; 175 176 /* 177 * Set memory without DSO as loaded. All map__find_* 178 * functions still return NULL, and we avoid the 179 * unnecessary map__load warning. 180 */ 181 if (!(prot & PROT_EXEC)) 182 dso__set_loaded(dso); 183 } 184 dso->nsinfo = nsi; 185 186 if (build_id__is_defined(bid)) 187 dso__set_build_id(dso, bid); 188 189 dso__put(dso); 190 } 191 return map; 192 out_delete: 193 nsinfo__put(nsi); 194 free(map); 195 return NULL; 196 } 197 198 /* 199 * Constructor variant for modules (where we know from /proc/modules where 200 * they are loaded) and for vmlinux, where only after we load all the 201 * symbols we'll know where it starts and ends. 202 */ 203 struct map *map__new2(u64 start, struct dso *dso) 204 { 205 struct map *map = calloc(1, (sizeof(*map) + 206 (dso->kernel ? sizeof(struct kmap) : 0))); 207 if (map != NULL) { 208 /* 209 * ->end will be filled after we load all the symbols 210 */ 211 map__init(map, start, 0, 0, dso); 212 } 213 214 return map; 215 } 216 217 bool __map__is_kernel(const struct map *map) 218 { 219 if (!map->dso->kernel) 220 return false; 221 return machine__kernel_map(map__kmaps((struct map *)map)->machine) == map; 222 } 223 224 bool __map__is_extra_kernel_map(const struct map *map) 225 { 226 struct kmap *kmap = __map__kmap((struct map *)map); 227 228 return kmap && kmap->name[0]; 229 } 230 231 bool __map__is_bpf_prog(const struct map *map) 232 { 233 const char *name; 234 235 if (map->dso->binary_type == DSO_BINARY_TYPE__BPF_PROG_INFO) 236 return true; 237 238 /* 239 * If PERF_RECORD_BPF_EVENT is not included, the dso will not have 240 * type of DSO_BINARY_TYPE__BPF_PROG_INFO. In such cases, we can 241 * guess the type based on name. 242 */ 243 name = map->dso->short_name; 244 return name && (strstr(name, "bpf_prog_") == name); 245 } 246 247 bool __map__is_bpf_image(const struct map *map) 248 { 249 const char *name; 250 251 if (map->dso->binary_type == DSO_BINARY_TYPE__BPF_IMAGE) 252 return true; 253 254 /* 255 * If PERF_RECORD_KSYMBOL is not included, the dso will not have 256 * type of DSO_BINARY_TYPE__BPF_IMAGE. In such cases, we can 257 * guess the type based on name. 258 */ 259 name = map->dso->short_name; 260 return name && is_bpf_image(name); 261 } 262 263 bool __map__is_ool(const struct map *map) 264 { 265 return map->dso && map->dso->binary_type == DSO_BINARY_TYPE__OOL; 266 } 267 268 bool map__has_symbols(const struct map *map) 269 { 270 return dso__has_symbols(map->dso); 271 } 272 273 static void map__exit(struct map *map) 274 { 275 BUG_ON(refcount_read(&map->refcnt) != 0); 276 dso__zput(map->dso); 277 } 278 279 void map__delete(struct map *map) 280 { 281 map__exit(map); 282 free(map); 283 } 284 285 void map__put(struct map *map) 286 { 287 if (map && refcount_dec_and_test(&map->refcnt)) 288 map__delete(map); 289 } 290 291 void map__fixup_start(struct map *map) 292 { 293 struct rb_root_cached *symbols = &map->dso->symbols; 294 struct rb_node *nd = rb_first_cached(symbols); 295 if (nd != NULL) { 296 struct symbol *sym = rb_entry(nd, struct symbol, rb_node); 297 map->start = sym->start; 298 } 299 } 300 301 void map__fixup_end(struct map *map) 302 { 303 struct rb_root_cached *symbols = &map->dso->symbols; 304 struct rb_node *nd = rb_last(&symbols->rb_root); 305 if (nd != NULL) { 306 struct symbol *sym = rb_entry(nd, struct symbol, rb_node); 307 map->end = sym->end; 308 } 309 } 310 311 #define DSO__DELETED "(deleted)" 312 313 int map__load(struct map *map) 314 { 315 const char *name = map->dso->long_name; 316 int nr; 317 318 if (dso__loaded(map->dso)) 319 return 0; 320 321 nr = dso__load(map->dso, map); 322 if (nr < 0) { 323 if (map->dso->has_build_id) { 324 char sbuild_id[SBUILD_ID_SIZE]; 325 326 build_id__sprintf(&map->dso->bid, sbuild_id); 327 pr_debug("%s with build id %s not found", name, sbuild_id); 328 } else 329 pr_debug("Failed to open %s", name); 330 331 pr_debug(", continuing without symbols\n"); 332 return -1; 333 } else if (nr == 0) { 334 #ifdef HAVE_LIBELF_SUPPORT 335 const size_t len = strlen(name); 336 const size_t real_len = len - sizeof(DSO__DELETED); 337 338 if (len > sizeof(DSO__DELETED) && 339 strcmp(name + real_len + 1, DSO__DELETED) == 0) { 340 pr_debug("%.*s was updated (is prelink enabled?). " 341 "Restart the long running apps that use it!\n", 342 (int)real_len, name); 343 } else { 344 pr_debug("no symbols found in %s, maybe install a debug package?\n", name); 345 } 346 #endif 347 return -1; 348 } 349 350 return 0; 351 } 352 353 struct symbol *map__find_symbol(struct map *map, u64 addr) 354 { 355 if (map__load(map) < 0) 356 return NULL; 357 358 return dso__find_symbol(map->dso, addr); 359 } 360 361 struct symbol *map__find_symbol_by_name(struct map *map, const char *name) 362 { 363 if (map__load(map) < 0) 364 return NULL; 365 366 if (!dso__sorted_by_name(map->dso)) 367 dso__sort_by_name(map->dso); 368 369 return dso__find_symbol_by_name(map->dso, name); 370 } 371 372 struct map *map__clone(struct map *from) 373 { 374 size_t size = sizeof(struct map); 375 struct map *map; 376 377 if (from->dso && from->dso->kernel) 378 size += sizeof(struct kmap); 379 380 map = memdup(from, size); 381 if (map != NULL) { 382 refcount_set(&map->refcnt, 1); 383 RB_CLEAR_NODE(&map->rb_node); 384 dso__get(map->dso); 385 } 386 387 return map; 388 } 389 390 size_t map__fprintf(struct map *map, FILE *fp) 391 { 392 return fprintf(fp, " %" PRIx64 "-%" PRIx64 " %" PRIx64 " %s\n", 393 map->start, map->end, map->pgoff, map->dso->name); 394 } 395 396 size_t map__fprintf_dsoname(struct map *map, FILE *fp) 397 { 398 char buf[symbol_conf.pad_output_len_dso + 1]; 399 const char *dsoname = "[unknown]"; 400 401 if (map && map->dso) { 402 if (symbol_conf.show_kernel_path && map->dso->long_name) 403 dsoname = map->dso->long_name; 404 else 405 dsoname = map->dso->name; 406 } 407 408 if (symbol_conf.pad_output_len_dso) { 409 scnprintf_pad(buf, symbol_conf.pad_output_len_dso, "%s", dsoname); 410 dsoname = buf; 411 } 412 413 return fprintf(fp, "%s", dsoname); 414 } 415 416 char *map__srcline(struct map *map, u64 addr, struct symbol *sym) 417 { 418 if (map == NULL) 419 return SRCLINE_UNKNOWN; 420 return get_srcline(map->dso, map__rip_2objdump(map, addr), sym, true, true, addr); 421 } 422 423 int map__fprintf_srcline(struct map *map, u64 addr, const char *prefix, 424 FILE *fp) 425 { 426 int ret = 0; 427 428 if (map && map->dso) { 429 char *srcline = map__srcline(map, addr, NULL); 430 if (strncmp(srcline, SRCLINE_UNKNOWN, strlen(SRCLINE_UNKNOWN)) != 0) 431 ret = fprintf(fp, "%s%s", prefix, srcline); 432 free_srcline(srcline); 433 } 434 return ret; 435 } 436 437 void srccode_state_free(struct srccode_state *state) 438 { 439 zfree(&state->srcfile); 440 state->line = 0; 441 } 442 443 /** 444 * map__rip_2objdump - convert symbol start address to objdump address. 445 * @map: memory map 446 * @rip: symbol start address 447 * 448 * objdump wants/reports absolute IPs for ET_EXEC, and RIPs for ET_DYN. 449 * map->dso->adjust_symbols==1 for ET_EXEC-like cases except ET_REL which is 450 * relative to section start. 451 * 452 * Return: Address suitable for passing to "objdump --start-address=" 453 */ 454 u64 map__rip_2objdump(struct map *map, u64 rip) 455 { 456 struct kmap *kmap = __map__kmap(map); 457 458 /* 459 * vmlinux does not have program headers for PTI entry trampolines and 460 * kcore may not either. However the trampoline object code is on the 461 * main kernel map, so just use that instead. 462 */ 463 if (kmap && is_entry_trampoline(kmap->name) && kmap->kmaps && kmap->kmaps->machine) { 464 struct map *kernel_map = machine__kernel_map(kmap->kmaps->machine); 465 466 if (kernel_map) 467 map = kernel_map; 468 } 469 470 if (!map->dso->adjust_symbols) 471 return rip; 472 473 if (map->dso->rel) 474 return rip - map->pgoff; 475 476 /* 477 * kernel modules also have DSO_TYPE_USER in dso->kernel, 478 * but all kernel modules are ET_REL, so won't get here. 479 */ 480 if (map->dso->kernel == DSO_SPACE__USER) 481 return rip + map->dso->text_offset; 482 483 return map->unmap_ip(map, rip) - map->reloc; 484 } 485 486 /** 487 * map__objdump_2mem - convert objdump address to a memory address. 488 * @map: memory map 489 * @ip: objdump address 490 * 491 * Closely related to map__rip_2objdump(), this function takes an address from 492 * objdump and converts it to a memory address. Note this assumes that @map 493 * contains the address. To be sure the result is valid, check it forwards 494 * e.g. map__rip_2objdump(map->map_ip(map, map__objdump_2mem(map, ip))) == ip 495 * 496 * Return: Memory address. 497 */ 498 u64 map__objdump_2mem(struct map *map, u64 ip) 499 { 500 if (!map->dso->adjust_symbols) 501 return map->unmap_ip(map, ip); 502 503 if (map->dso->rel) 504 return map->unmap_ip(map, ip + map->pgoff); 505 506 /* 507 * kernel modules also have DSO_TYPE_USER in dso->kernel, 508 * but all kernel modules are ET_REL, so won't get here. 509 */ 510 if (map->dso->kernel == DSO_SPACE__USER) 511 return map->unmap_ip(map, ip - map->dso->text_offset); 512 513 return ip + map->reloc; 514 } 515 516 bool map__contains_symbol(const struct map *map, const struct symbol *sym) 517 { 518 u64 ip = map->unmap_ip(map, sym->start); 519 520 return ip >= map->start && ip < map->end; 521 } 522 523 static struct map *__map__next(struct map *map) 524 { 525 struct rb_node *next = rb_next(&map->rb_node); 526 527 if (next) 528 return rb_entry(next, struct map, rb_node); 529 return NULL; 530 } 531 532 struct map *map__next(struct map *map) 533 { 534 return map ? __map__next(map) : NULL; 535 } 536 537 struct kmap *__map__kmap(struct map *map) 538 { 539 if (!map->dso || !map->dso->kernel) 540 return NULL; 541 return (struct kmap *)(map + 1); 542 } 543 544 struct kmap *map__kmap(struct map *map) 545 { 546 struct kmap *kmap = __map__kmap(map); 547 548 if (!kmap) 549 pr_err("Internal error: map__kmap with a non-kernel map\n"); 550 return kmap; 551 } 552 553 struct maps *map__kmaps(struct map *map) 554 { 555 struct kmap *kmap = map__kmap(map); 556 557 if (!kmap || !kmap->kmaps) { 558 pr_err("Internal error: map__kmaps with a non-kernel map\n"); 559 return NULL; 560 } 561 return kmap->kmaps; 562 } 563 564 u64 map__map_ip(const struct map *map, u64 ip) 565 { 566 return ip - map->start + map->pgoff; 567 } 568 569 u64 map__unmap_ip(const struct map *map, u64 ip) 570 { 571 return ip + map->start - map->pgoff; 572 } 573 574 u64 identity__map_ip(const struct map *map __maybe_unused, u64 ip) 575 { 576 return ip; 577 } 578