xref: /openbmc/linux/tools/perf/util/symbol-elf.c (revision 5bd8e16d)
1 #include <fcntl.h>
2 #include <stdio.h>
3 #include <errno.h>
4 #include <string.h>
5 #include <unistd.h>
6 #include <inttypes.h>
7 
8 #include "symbol.h"
9 #include "debug.h"
10 
11 #ifndef NT_GNU_BUILD_ID
12 #define NT_GNU_BUILD_ID 3
13 #endif
14 
15 /**
16  * elf_symtab__for_each_symbol - iterate thru all the symbols
17  *
18  * @syms: struct elf_symtab instance to iterate
19  * @idx: uint32_t idx
20  * @sym: GElf_Sym iterator
21  */
22 #define elf_symtab__for_each_symbol(syms, nr_syms, idx, sym) \
23 	for (idx = 0, gelf_getsym(syms, idx, &sym);\
24 	     idx < nr_syms; \
25 	     idx++, gelf_getsym(syms, idx, &sym))
26 
27 static inline uint8_t elf_sym__type(const GElf_Sym *sym)
28 {
29 	return GELF_ST_TYPE(sym->st_info);
30 }
31 
32 static inline int elf_sym__is_function(const GElf_Sym *sym)
33 {
34 	return elf_sym__type(sym) == STT_FUNC &&
35 	       sym->st_name != 0 &&
36 	       sym->st_shndx != SHN_UNDEF;
37 }
38 
39 static inline bool elf_sym__is_object(const GElf_Sym *sym)
40 {
41 	return elf_sym__type(sym) == STT_OBJECT &&
42 		sym->st_name != 0 &&
43 		sym->st_shndx != SHN_UNDEF;
44 }
45 
46 static inline int elf_sym__is_label(const GElf_Sym *sym)
47 {
48 	return elf_sym__type(sym) == STT_NOTYPE &&
49 		sym->st_name != 0 &&
50 		sym->st_shndx != SHN_UNDEF &&
51 		sym->st_shndx != SHN_ABS;
52 }
53 
54 static bool elf_sym__is_a(GElf_Sym *sym, enum map_type type)
55 {
56 	switch (type) {
57 	case MAP__FUNCTION:
58 		return elf_sym__is_function(sym);
59 	case MAP__VARIABLE:
60 		return elf_sym__is_object(sym);
61 	default:
62 		return false;
63 	}
64 }
65 
66 static inline const char *elf_sym__name(const GElf_Sym *sym,
67 					const Elf_Data *symstrs)
68 {
69 	return symstrs->d_buf + sym->st_name;
70 }
71 
72 static inline const char *elf_sec__name(const GElf_Shdr *shdr,
73 					const Elf_Data *secstrs)
74 {
75 	return secstrs->d_buf + shdr->sh_name;
76 }
77 
78 static inline int elf_sec__is_text(const GElf_Shdr *shdr,
79 					const Elf_Data *secstrs)
80 {
81 	return strstr(elf_sec__name(shdr, secstrs), "text") != NULL;
82 }
83 
84 static inline bool elf_sec__is_data(const GElf_Shdr *shdr,
85 				    const Elf_Data *secstrs)
86 {
87 	return strstr(elf_sec__name(shdr, secstrs), "data") != NULL;
88 }
89 
90 static bool elf_sec__is_a(GElf_Shdr *shdr, Elf_Data *secstrs,
91 			  enum map_type type)
92 {
93 	switch (type) {
94 	case MAP__FUNCTION:
95 		return elf_sec__is_text(shdr, secstrs);
96 	case MAP__VARIABLE:
97 		return elf_sec__is_data(shdr, secstrs);
98 	default:
99 		return false;
100 	}
101 }
102 
103 static size_t elf_addr_to_index(Elf *elf, GElf_Addr addr)
104 {
105 	Elf_Scn *sec = NULL;
106 	GElf_Shdr shdr;
107 	size_t cnt = 1;
108 
109 	while ((sec = elf_nextscn(elf, sec)) != NULL) {
110 		gelf_getshdr(sec, &shdr);
111 
112 		if ((addr >= shdr.sh_addr) &&
113 		    (addr < (shdr.sh_addr + shdr.sh_size)))
114 			return cnt;
115 
116 		++cnt;
117 	}
118 
119 	return -1;
120 }
121 
122 static Elf_Scn *elf_section_by_name(Elf *elf, GElf_Ehdr *ep,
123 				    GElf_Shdr *shp, const char *name,
124 				    size_t *idx)
125 {
126 	Elf_Scn *sec = NULL;
127 	size_t cnt = 1;
128 
129 	/* Elf is corrupted/truncated, avoid calling elf_strptr. */
130 	if (!elf_rawdata(elf_getscn(elf, ep->e_shstrndx), NULL))
131 		return NULL;
132 
133 	while ((sec = elf_nextscn(elf, sec)) != NULL) {
134 		char *str;
135 
136 		gelf_getshdr(sec, shp);
137 		str = elf_strptr(elf, ep->e_shstrndx, shp->sh_name);
138 		if (!strcmp(name, str)) {
139 			if (idx)
140 				*idx = cnt;
141 			break;
142 		}
143 		++cnt;
144 	}
145 
146 	return sec;
147 }
148 
149 #define elf_section__for_each_rel(reldata, pos, pos_mem, idx, nr_entries) \
150 	for (idx = 0, pos = gelf_getrel(reldata, 0, &pos_mem); \
151 	     idx < nr_entries; \
152 	     ++idx, pos = gelf_getrel(reldata, idx, &pos_mem))
153 
154 #define elf_section__for_each_rela(reldata, pos, pos_mem, idx, nr_entries) \
155 	for (idx = 0, pos = gelf_getrela(reldata, 0, &pos_mem); \
156 	     idx < nr_entries; \
157 	     ++idx, pos = gelf_getrela(reldata, idx, &pos_mem))
158 
159 /*
160  * We need to check if we have a .dynsym, so that we can handle the
161  * .plt, synthesizing its symbols, that aren't on the symtabs (be it
162  * .dynsym or .symtab).
163  * And always look at the original dso, not at debuginfo packages, that
164  * have the PLT data stripped out (shdr_rel_plt.sh_type == SHT_NOBITS).
165  */
166 int dso__synthesize_plt_symbols(struct dso *dso, struct symsrc *ss, struct map *map,
167 				symbol_filter_t filter)
168 {
169 	uint32_t nr_rel_entries, idx;
170 	GElf_Sym sym;
171 	u64 plt_offset;
172 	GElf_Shdr shdr_plt;
173 	struct symbol *f;
174 	GElf_Shdr shdr_rel_plt, shdr_dynsym;
175 	Elf_Data *reldata, *syms, *symstrs;
176 	Elf_Scn *scn_plt_rel, *scn_symstrs, *scn_dynsym;
177 	size_t dynsym_idx;
178 	GElf_Ehdr ehdr;
179 	char sympltname[1024];
180 	Elf *elf;
181 	int nr = 0, symidx, err = 0;
182 
183 	if (!ss->dynsym)
184 		return 0;
185 
186 	elf = ss->elf;
187 	ehdr = ss->ehdr;
188 
189 	scn_dynsym = ss->dynsym;
190 	shdr_dynsym = ss->dynshdr;
191 	dynsym_idx = ss->dynsym_idx;
192 
193 	if (scn_dynsym == NULL)
194 		goto out_elf_end;
195 
196 	scn_plt_rel = elf_section_by_name(elf, &ehdr, &shdr_rel_plt,
197 					  ".rela.plt", NULL);
198 	if (scn_plt_rel == NULL) {
199 		scn_plt_rel = elf_section_by_name(elf, &ehdr, &shdr_rel_plt,
200 						  ".rel.plt", NULL);
201 		if (scn_plt_rel == NULL)
202 			goto out_elf_end;
203 	}
204 
205 	err = -1;
206 
207 	if (shdr_rel_plt.sh_link != dynsym_idx)
208 		goto out_elf_end;
209 
210 	if (elf_section_by_name(elf, &ehdr, &shdr_plt, ".plt", NULL) == NULL)
211 		goto out_elf_end;
212 
213 	/*
214 	 * Fetch the relocation section to find the idxes to the GOT
215 	 * and the symbols in the .dynsym they refer to.
216 	 */
217 	reldata = elf_getdata(scn_plt_rel, NULL);
218 	if (reldata == NULL)
219 		goto out_elf_end;
220 
221 	syms = elf_getdata(scn_dynsym, NULL);
222 	if (syms == NULL)
223 		goto out_elf_end;
224 
225 	scn_symstrs = elf_getscn(elf, shdr_dynsym.sh_link);
226 	if (scn_symstrs == NULL)
227 		goto out_elf_end;
228 
229 	symstrs = elf_getdata(scn_symstrs, NULL);
230 	if (symstrs == NULL)
231 		goto out_elf_end;
232 
233 	if (symstrs->d_size == 0)
234 		goto out_elf_end;
235 
236 	nr_rel_entries = shdr_rel_plt.sh_size / shdr_rel_plt.sh_entsize;
237 	plt_offset = shdr_plt.sh_offset;
238 
239 	if (shdr_rel_plt.sh_type == SHT_RELA) {
240 		GElf_Rela pos_mem, *pos;
241 
242 		elf_section__for_each_rela(reldata, pos, pos_mem, idx,
243 					   nr_rel_entries) {
244 			symidx = GELF_R_SYM(pos->r_info);
245 			plt_offset += shdr_plt.sh_entsize;
246 			gelf_getsym(syms, symidx, &sym);
247 			snprintf(sympltname, sizeof(sympltname),
248 				 "%s@plt", elf_sym__name(&sym, symstrs));
249 
250 			f = symbol__new(plt_offset, shdr_plt.sh_entsize,
251 					STB_GLOBAL, sympltname);
252 			if (!f)
253 				goto out_elf_end;
254 
255 			if (filter && filter(map, f))
256 				symbol__delete(f);
257 			else {
258 				symbols__insert(&dso->symbols[map->type], f);
259 				++nr;
260 			}
261 		}
262 	} else if (shdr_rel_plt.sh_type == SHT_REL) {
263 		GElf_Rel pos_mem, *pos;
264 		elf_section__for_each_rel(reldata, pos, pos_mem, idx,
265 					  nr_rel_entries) {
266 			symidx = GELF_R_SYM(pos->r_info);
267 			plt_offset += shdr_plt.sh_entsize;
268 			gelf_getsym(syms, symidx, &sym);
269 			snprintf(sympltname, sizeof(sympltname),
270 				 "%s@plt", elf_sym__name(&sym, symstrs));
271 
272 			f = symbol__new(plt_offset, shdr_plt.sh_entsize,
273 					STB_GLOBAL, sympltname);
274 			if (!f)
275 				goto out_elf_end;
276 
277 			if (filter && filter(map, f))
278 				symbol__delete(f);
279 			else {
280 				symbols__insert(&dso->symbols[map->type], f);
281 				++nr;
282 			}
283 		}
284 	}
285 
286 	err = 0;
287 out_elf_end:
288 	if (err == 0)
289 		return nr;
290 	pr_debug("%s: problems reading %s PLT info.\n",
291 		 __func__, dso->long_name);
292 	return 0;
293 }
294 
295 /*
296  * Align offset to 4 bytes as needed for note name and descriptor data.
297  */
298 #define NOTE_ALIGN(n) (((n) + 3) & -4U)
299 
300 static int elf_read_build_id(Elf *elf, void *bf, size_t size)
301 {
302 	int err = -1;
303 	GElf_Ehdr ehdr;
304 	GElf_Shdr shdr;
305 	Elf_Data *data;
306 	Elf_Scn *sec;
307 	Elf_Kind ek;
308 	void *ptr;
309 
310 	if (size < BUILD_ID_SIZE)
311 		goto out;
312 
313 	ek = elf_kind(elf);
314 	if (ek != ELF_K_ELF)
315 		goto out;
316 
317 	if (gelf_getehdr(elf, &ehdr) == NULL) {
318 		pr_err("%s: cannot get elf header.\n", __func__);
319 		goto out;
320 	}
321 
322 	/*
323 	 * Check following sections for notes:
324 	 *   '.note.gnu.build-id'
325 	 *   '.notes'
326 	 *   '.note' (VDSO specific)
327 	 */
328 	do {
329 		sec = elf_section_by_name(elf, &ehdr, &shdr,
330 					  ".note.gnu.build-id", NULL);
331 		if (sec)
332 			break;
333 
334 		sec = elf_section_by_name(elf, &ehdr, &shdr,
335 					  ".notes", NULL);
336 		if (sec)
337 			break;
338 
339 		sec = elf_section_by_name(elf, &ehdr, &shdr,
340 					  ".note", NULL);
341 		if (sec)
342 			break;
343 
344 		return err;
345 
346 	} while (0);
347 
348 	data = elf_getdata(sec, NULL);
349 	if (data == NULL)
350 		goto out;
351 
352 	ptr = data->d_buf;
353 	while (ptr < (data->d_buf + data->d_size)) {
354 		GElf_Nhdr *nhdr = ptr;
355 		size_t namesz = NOTE_ALIGN(nhdr->n_namesz),
356 		       descsz = NOTE_ALIGN(nhdr->n_descsz);
357 		const char *name;
358 
359 		ptr += sizeof(*nhdr);
360 		name = ptr;
361 		ptr += namesz;
362 		if (nhdr->n_type == NT_GNU_BUILD_ID &&
363 		    nhdr->n_namesz == sizeof("GNU")) {
364 			if (memcmp(name, "GNU", sizeof("GNU")) == 0) {
365 				size_t sz = min(size, descsz);
366 				memcpy(bf, ptr, sz);
367 				memset(bf + sz, 0, size - sz);
368 				err = descsz;
369 				break;
370 			}
371 		}
372 		ptr += descsz;
373 	}
374 
375 out:
376 	return err;
377 }
378 
379 int filename__read_build_id(const char *filename, void *bf, size_t size)
380 {
381 	int fd, err = -1;
382 	Elf *elf;
383 
384 	if (size < BUILD_ID_SIZE)
385 		goto out;
386 
387 	fd = open(filename, O_RDONLY);
388 	if (fd < 0)
389 		goto out;
390 
391 	elf = elf_begin(fd, PERF_ELF_C_READ_MMAP, NULL);
392 	if (elf == NULL) {
393 		pr_debug2("%s: cannot read %s ELF file.\n", __func__, filename);
394 		goto out_close;
395 	}
396 
397 	err = elf_read_build_id(elf, bf, size);
398 
399 	elf_end(elf);
400 out_close:
401 	close(fd);
402 out:
403 	return err;
404 }
405 
406 int sysfs__read_build_id(const char *filename, void *build_id, size_t size)
407 {
408 	int fd, err = -1;
409 
410 	if (size < BUILD_ID_SIZE)
411 		goto out;
412 
413 	fd = open(filename, O_RDONLY);
414 	if (fd < 0)
415 		goto out;
416 
417 	while (1) {
418 		char bf[BUFSIZ];
419 		GElf_Nhdr nhdr;
420 		size_t namesz, descsz;
421 
422 		if (read(fd, &nhdr, sizeof(nhdr)) != sizeof(nhdr))
423 			break;
424 
425 		namesz = NOTE_ALIGN(nhdr.n_namesz);
426 		descsz = NOTE_ALIGN(nhdr.n_descsz);
427 		if (nhdr.n_type == NT_GNU_BUILD_ID &&
428 		    nhdr.n_namesz == sizeof("GNU")) {
429 			if (read(fd, bf, namesz) != (ssize_t)namesz)
430 				break;
431 			if (memcmp(bf, "GNU", sizeof("GNU")) == 0) {
432 				size_t sz = min(descsz, size);
433 				if (read(fd, build_id, sz) == (ssize_t)sz) {
434 					memset(build_id + sz, 0, size - sz);
435 					err = 0;
436 					break;
437 				}
438 			} else if (read(fd, bf, descsz) != (ssize_t)descsz)
439 				break;
440 		} else {
441 			int n = namesz + descsz;
442 			if (read(fd, bf, n) != n)
443 				break;
444 		}
445 	}
446 	close(fd);
447 out:
448 	return err;
449 }
450 
451 int filename__read_debuglink(const char *filename, char *debuglink,
452 			     size_t size)
453 {
454 	int fd, err = -1;
455 	Elf *elf;
456 	GElf_Ehdr ehdr;
457 	GElf_Shdr shdr;
458 	Elf_Data *data;
459 	Elf_Scn *sec;
460 	Elf_Kind ek;
461 
462 	fd = open(filename, O_RDONLY);
463 	if (fd < 0)
464 		goto out;
465 
466 	elf = elf_begin(fd, PERF_ELF_C_READ_MMAP, NULL);
467 	if (elf == NULL) {
468 		pr_debug2("%s: cannot read %s ELF file.\n", __func__, filename);
469 		goto out_close;
470 	}
471 
472 	ek = elf_kind(elf);
473 	if (ek != ELF_K_ELF)
474 		goto out_close;
475 
476 	if (gelf_getehdr(elf, &ehdr) == NULL) {
477 		pr_err("%s: cannot get elf header.\n", __func__);
478 		goto out_close;
479 	}
480 
481 	sec = elf_section_by_name(elf, &ehdr, &shdr,
482 				  ".gnu_debuglink", NULL);
483 	if (sec == NULL)
484 		goto out_close;
485 
486 	data = elf_getdata(sec, NULL);
487 	if (data == NULL)
488 		goto out_close;
489 
490 	/* the start of this section is a zero-terminated string */
491 	strncpy(debuglink, data->d_buf, size);
492 
493 	elf_end(elf);
494 
495 out_close:
496 	close(fd);
497 out:
498 	return err;
499 }
500 
501 static int dso__swap_init(struct dso *dso, unsigned char eidata)
502 {
503 	static unsigned int const endian = 1;
504 
505 	dso->needs_swap = DSO_SWAP__NO;
506 
507 	switch (eidata) {
508 	case ELFDATA2LSB:
509 		/* We are big endian, DSO is little endian. */
510 		if (*(unsigned char const *)&endian != 1)
511 			dso->needs_swap = DSO_SWAP__YES;
512 		break;
513 
514 	case ELFDATA2MSB:
515 		/* We are little endian, DSO is big endian. */
516 		if (*(unsigned char const *)&endian != 0)
517 			dso->needs_swap = DSO_SWAP__YES;
518 		break;
519 
520 	default:
521 		pr_err("unrecognized DSO data encoding %d\n", eidata);
522 		return -EINVAL;
523 	}
524 
525 	return 0;
526 }
527 
528 bool symsrc__possibly_runtime(struct symsrc *ss)
529 {
530 	return ss->dynsym || ss->opdsec;
531 }
532 
533 bool symsrc__has_symtab(struct symsrc *ss)
534 {
535 	return ss->symtab != NULL;
536 }
537 
538 void symsrc__destroy(struct symsrc *ss)
539 {
540 	free(ss->name);
541 	elf_end(ss->elf);
542 	close(ss->fd);
543 }
544 
545 int symsrc__init(struct symsrc *ss, struct dso *dso, const char *name,
546 		 enum dso_binary_type type)
547 {
548 	int err = -1;
549 	GElf_Ehdr ehdr;
550 	Elf *elf;
551 	int fd;
552 
553 	fd = open(name, O_RDONLY);
554 	if (fd < 0)
555 		return -1;
556 
557 	elf = elf_begin(fd, PERF_ELF_C_READ_MMAP, NULL);
558 	if (elf == NULL) {
559 		pr_debug("%s: cannot read %s ELF file.\n", __func__, name);
560 		goto out_close;
561 	}
562 
563 	if (gelf_getehdr(elf, &ehdr) == NULL) {
564 		pr_debug("%s: cannot get elf header.\n", __func__);
565 		goto out_elf_end;
566 	}
567 
568 	if (dso__swap_init(dso, ehdr.e_ident[EI_DATA]))
569 		goto out_elf_end;
570 
571 	/* Always reject images with a mismatched build-id: */
572 	if (dso->has_build_id) {
573 		u8 build_id[BUILD_ID_SIZE];
574 
575 		if (elf_read_build_id(elf, build_id, BUILD_ID_SIZE) < 0)
576 			goto out_elf_end;
577 
578 		if (!dso__build_id_equal(dso, build_id))
579 			goto out_elf_end;
580 	}
581 
582 	ss->symtab = elf_section_by_name(elf, &ehdr, &ss->symshdr, ".symtab",
583 			NULL);
584 	if (ss->symshdr.sh_type != SHT_SYMTAB)
585 		ss->symtab = NULL;
586 
587 	ss->dynsym_idx = 0;
588 	ss->dynsym = elf_section_by_name(elf, &ehdr, &ss->dynshdr, ".dynsym",
589 			&ss->dynsym_idx);
590 	if (ss->dynshdr.sh_type != SHT_DYNSYM)
591 		ss->dynsym = NULL;
592 
593 	ss->opdidx = 0;
594 	ss->opdsec = elf_section_by_name(elf, &ehdr, &ss->opdshdr, ".opd",
595 			&ss->opdidx);
596 	if (ss->opdshdr.sh_type != SHT_PROGBITS)
597 		ss->opdsec = NULL;
598 
599 	if (dso->kernel == DSO_TYPE_USER) {
600 		GElf_Shdr shdr;
601 		ss->adjust_symbols = (ehdr.e_type == ET_EXEC ||
602 				ehdr.e_type == ET_REL ||
603 				elf_section_by_name(elf, &ehdr, &shdr,
604 						     ".gnu.prelink_undo",
605 						     NULL) != NULL);
606 	} else {
607 		ss->adjust_symbols = ehdr.e_type == ET_EXEC ||
608 				     ehdr.e_type == ET_REL;
609 	}
610 
611 	ss->name   = strdup(name);
612 	if (!ss->name)
613 		goto out_elf_end;
614 
615 	ss->elf    = elf;
616 	ss->fd     = fd;
617 	ss->ehdr   = ehdr;
618 	ss->type   = type;
619 
620 	return 0;
621 
622 out_elf_end:
623 	elf_end(elf);
624 out_close:
625 	close(fd);
626 	return err;
627 }
628 
629 /**
630  * ref_reloc_sym_not_found - has kernel relocation symbol been found.
631  * @kmap: kernel maps and relocation reference symbol
632  *
633  * This function returns %true if we are dealing with the kernel maps and the
634  * relocation reference symbol has not yet been found.  Otherwise %false is
635  * returned.
636  */
637 static bool ref_reloc_sym_not_found(struct kmap *kmap)
638 {
639 	return kmap && kmap->ref_reloc_sym && kmap->ref_reloc_sym->name &&
640 	       !kmap->ref_reloc_sym->unrelocated_addr;
641 }
642 
643 /**
644  * ref_reloc - kernel relocation offset.
645  * @kmap: kernel maps and relocation reference symbol
646  *
647  * This function returns the offset of kernel addresses as determined by using
648  * the relocation reference symbol i.e. if the kernel has not been relocated
649  * then the return value is zero.
650  */
651 static u64 ref_reloc(struct kmap *kmap)
652 {
653 	if (kmap && kmap->ref_reloc_sym &&
654 	    kmap->ref_reloc_sym->unrelocated_addr)
655 		return kmap->ref_reloc_sym->addr -
656 		       kmap->ref_reloc_sym->unrelocated_addr;
657 	return 0;
658 }
659 
660 int dso__load_sym(struct dso *dso, struct map *map,
661 		  struct symsrc *syms_ss, struct symsrc *runtime_ss,
662 		  symbol_filter_t filter, int kmodule)
663 {
664 	struct kmap *kmap = dso->kernel ? map__kmap(map) : NULL;
665 	struct map *curr_map = map;
666 	struct dso *curr_dso = dso;
667 	Elf_Data *symstrs, *secstrs;
668 	uint32_t nr_syms;
669 	int err = -1;
670 	uint32_t idx;
671 	GElf_Ehdr ehdr;
672 	GElf_Shdr shdr;
673 	Elf_Data *syms, *opddata = NULL;
674 	GElf_Sym sym;
675 	Elf_Scn *sec, *sec_strndx;
676 	Elf *elf;
677 	int nr = 0;
678 	bool remap_kernel = false, adjust_kernel_syms = false;
679 
680 	dso->symtab_type = syms_ss->type;
681 	dso->rel = syms_ss->ehdr.e_type == ET_REL;
682 
683 	/*
684 	 * Modules may already have symbols from kallsyms, but those symbols
685 	 * have the wrong values for the dso maps, so remove them.
686 	 */
687 	if (kmodule && syms_ss->symtab)
688 		symbols__delete(&dso->symbols[map->type]);
689 
690 	if (!syms_ss->symtab) {
691 		syms_ss->symtab  = syms_ss->dynsym;
692 		syms_ss->symshdr = syms_ss->dynshdr;
693 	}
694 
695 	elf = syms_ss->elf;
696 	ehdr = syms_ss->ehdr;
697 	sec = syms_ss->symtab;
698 	shdr = syms_ss->symshdr;
699 
700 	if (runtime_ss->opdsec)
701 		opddata = elf_rawdata(runtime_ss->opdsec, NULL);
702 
703 	syms = elf_getdata(sec, NULL);
704 	if (syms == NULL)
705 		goto out_elf_end;
706 
707 	sec = elf_getscn(elf, shdr.sh_link);
708 	if (sec == NULL)
709 		goto out_elf_end;
710 
711 	symstrs = elf_getdata(sec, NULL);
712 	if (symstrs == NULL)
713 		goto out_elf_end;
714 
715 	sec_strndx = elf_getscn(elf, ehdr.e_shstrndx);
716 	if (sec_strndx == NULL)
717 		goto out_elf_end;
718 
719 	secstrs = elf_getdata(sec_strndx, NULL);
720 	if (secstrs == NULL)
721 		goto out_elf_end;
722 
723 	nr_syms = shdr.sh_size / shdr.sh_entsize;
724 
725 	memset(&sym, 0, sizeof(sym));
726 
727 	/*
728 	 * The kernel relocation symbol is needed in advance in order to adjust
729 	 * kernel maps correctly.
730 	 */
731 	if (ref_reloc_sym_not_found(kmap)) {
732 		elf_symtab__for_each_symbol(syms, nr_syms, idx, sym) {
733 			const char *elf_name = elf_sym__name(&sym, symstrs);
734 
735 			if (strcmp(elf_name, kmap->ref_reloc_sym->name))
736 				continue;
737 			kmap->ref_reloc_sym->unrelocated_addr = sym.st_value;
738 			break;
739 		}
740 	}
741 
742 	dso->adjust_symbols = runtime_ss->adjust_symbols || ref_reloc(kmap);
743 	/*
744 	 * Initial kernel and module mappings do not map to the dso.  For
745 	 * function mappings, flag the fixups.
746 	 */
747 	if (map->type == MAP__FUNCTION && (dso->kernel || kmodule)) {
748 		remap_kernel = true;
749 		adjust_kernel_syms = dso->adjust_symbols;
750 	}
751 	elf_symtab__for_each_symbol(syms, nr_syms, idx, sym) {
752 		struct symbol *f;
753 		const char *elf_name = elf_sym__name(&sym, symstrs);
754 		char *demangled = NULL;
755 		int is_label = elf_sym__is_label(&sym);
756 		const char *section_name;
757 		bool used_opd = false;
758 
759 		if (!is_label && !elf_sym__is_a(&sym, map->type))
760 			continue;
761 
762 		/* Reject ARM ELF "mapping symbols": these aren't unique and
763 		 * don't identify functions, so will confuse the profile
764 		 * output: */
765 		if (ehdr.e_machine == EM_ARM) {
766 			if (!strcmp(elf_name, "$a") ||
767 			    !strcmp(elf_name, "$d") ||
768 			    !strcmp(elf_name, "$t"))
769 				continue;
770 		}
771 
772 		if (runtime_ss->opdsec && sym.st_shndx == runtime_ss->opdidx) {
773 			u32 offset = sym.st_value - syms_ss->opdshdr.sh_addr;
774 			u64 *opd = opddata->d_buf + offset;
775 			sym.st_value = DSO__SWAP(dso, u64, *opd);
776 			sym.st_shndx = elf_addr_to_index(runtime_ss->elf,
777 					sym.st_value);
778 			used_opd = true;
779 		}
780 		/*
781 		 * When loading symbols in a data mapping, ABS symbols (which
782 		 * has a value of SHN_ABS in its st_shndx) failed at
783 		 * elf_getscn().  And it marks the loading as a failure so
784 		 * already loaded symbols cannot be fixed up.
785 		 *
786 		 * I'm not sure what should be done. Just ignore them for now.
787 		 * - Namhyung Kim
788 		 */
789 		if (sym.st_shndx == SHN_ABS)
790 			continue;
791 
792 		sec = elf_getscn(runtime_ss->elf, sym.st_shndx);
793 		if (!sec)
794 			goto out_elf_end;
795 
796 		gelf_getshdr(sec, &shdr);
797 
798 		if (is_label && !elf_sec__is_a(&shdr, secstrs, map->type))
799 			continue;
800 
801 		section_name = elf_sec__name(&shdr, secstrs);
802 
803 		/* On ARM, symbols for thumb functions have 1 added to
804 		 * the symbol address as a flag - remove it */
805 		if ((ehdr.e_machine == EM_ARM) &&
806 		    (map->type == MAP__FUNCTION) &&
807 		    (sym.st_value & 1))
808 			--sym.st_value;
809 
810 		if (dso->kernel || kmodule) {
811 			char dso_name[PATH_MAX];
812 
813 			/* Adjust symbol to map to file offset */
814 			if (adjust_kernel_syms)
815 				sym.st_value -= shdr.sh_addr - shdr.sh_offset;
816 
817 			if (strcmp(section_name,
818 				   (curr_dso->short_name +
819 				    dso->short_name_len)) == 0)
820 				goto new_symbol;
821 
822 			if (strcmp(section_name, ".text") == 0) {
823 				/*
824 				 * The initial kernel mapping is based on
825 				 * kallsyms and identity maps.  Overwrite it to
826 				 * map to the kernel dso.
827 				 */
828 				if (remap_kernel && dso->kernel) {
829 					remap_kernel = false;
830 					map->start = shdr.sh_addr +
831 						     ref_reloc(kmap);
832 					map->end = map->start + shdr.sh_size;
833 					map->pgoff = shdr.sh_offset;
834 					map->map_ip = map__map_ip;
835 					map->unmap_ip = map__unmap_ip;
836 					/* Ensure maps are correctly ordered */
837 					map_groups__remove(kmap->kmaps, map);
838 					map_groups__insert(kmap->kmaps, map);
839 				}
840 
841 				/*
842 				 * The initial module mapping is based on
843 				 * /proc/modules mapped to offset zero.
844 				 * Overwrite it to map to the module dso.
845 				 */
846 				if (remap_kernel && kmodule) {
847 					remap_kernel = false;
848 					map->pgoff = shdr.sh_offset;
849 				}
850 
851 				curr_map = map;
852 				curr_dso = dso;
853 				goto new_symbol;
854 			}
855 
856 			if (!kmap)
857 				goto new_symbol;
858 
859 			snprintf(dso_name, sizeof(dso_name),
860 				 "%s%s", dso->short_name, section_name);
861 
862 			curr_map = map_groups__find_by_name(kmap->kmaps, map->type, dso_name);
863 			if (curr_map == NULL) {
864 				u64 start = sym.st_value;
865 
866 				if (kmodule)
867 					start += map->start + shdr.sh_offset;
868 
869 				curr_dso = dso__new(dso_name);
870 				if (curr_dso == NULL)
871 					goto out_elf_end;
872 				curr_dso->kernel = dso->kernel;
873 				curr_dso->long_name = dso->long_name;
874 				curr_dso->long_name_len = dso->long_name_len;
875 				curr_map = map__new2(start, curr_dso,
876 						     map->type);
877 				if (curr_map == NULL) {
878 					dso__delete(curr_dso);
879 					goto out_elf_end;
880 				}
881 				if (adjust_kernel_syms) {
882 					curr_map->start = shdr.sh_addr +
883 							  ref_reloc(kmap);
884 					curr_map->end = curr_map->start +
885 							shdr.sh_size;
886 					curr_map->pgoff = shdr.sh_offset;
887 				} else {
888 					curr_map->map_ip = identity__map_ip;
889 					curr_map->unmap_ip = identity__map_ip;
890 				}
891 				curr_dso->symtab_type = dso->symtab_type;
892 				map_groups__insert(kmap->kmaps, curr_map);
893 				dsos__add(&dso->node, curr_dso);
894 				dso__set_loaded(curr_dso, map->type);
895 			} else
896 				curr_dso = curr_map->dso;
897 
898 			goto new_symbol;
899 		}
900 
901 		if ((used_opd && runtime_ss->adjust_symbols)
902 				|| (!used_opd && syms_ss->adjust_symbols)) {
903 			pr_debug4("%s: adjusting symbol: st_value: %#" PRIx64 " "
904 				  "sh_addr: %#" PRIx64 " sh_offset: %#" PRIx64 "\n", __func__,
905 				  (u64)sym.st_value, (u64)shdr.sh_addr,
906 				  (u64)shdr.sh_offset);
907 			sym.st_value -= shdr.sh_addr - shdr.sh_offset;
908 		}
909 		/*
910 		 * We need to figure out if the object was created from C++ sources
911 		 * DWARF DW_compile_unit has this, but we don't always have access
912 		 * to it...
913 		 */
914 		if (symbol_conf.demangle) {
915 			demangled = bfd_demangle(NULL, elf_name,
916 						 DMGL_PARAMS | DMGL_ANSI);
917 			if (demangled != NULL)
918 				elf_name = demangled;
919 		}
920 new_symbol:
921 		f = symbol__new(sym.st_value, sym.st_size,
922 				GELF_ST_BIND(sym.st_info), elf_name);
923 		free(demangled);
924 		if (!f)
925 			goto out_elf_end;
926 
927 		if (filter && filter(curr_map, f))
928 			symbol__delete(f);
929 		else {
930 			symbols__insert(&curr_dso->symbols[curr_map->type], f);
931 			nr++;
932 		}
933 	}
934 
935 	/*
936 	 * For misannotated, zeroed, ASM function sizes.
937 	 */
938 	if (nr > 0) {
939 		symbols__fixup_duplicate(&dso->symbols[map->type]);
940 		symbols__fixup_end(&dso->symbols[map->type]);
941 		if (kmap) {
942 			/*
943 			 * We need to fixup this here too because we create new
944 			 * maps here, for things like vsyscall sections.
945 			 */
946 			__map_groups__fixup_end(kmap->kmaps, map->type);
947 		}
948 	}
949 	err = nr;
950 out_elf_end:
951 	return err;
952 }
953 
954 static int elf_read_maps(Elf *elf, bool exe, mapfn_t mapfn, void *data)
955 {
956 	GElf_Phdr phdr;
957 	size_t i, phdrnum;
958 	int err;
959 	u64 sz;
960 
961 	if (elf_getphdrnum(elf, &phdrnum))
962 		return -1;
963 
964 	for (i = 0; i < phdrnum; i++) {
965 		if (gelf_getphdr(elf, i, &phdr) == NULL)
966 			return -1;
967 		if (phdr.p_type != PT_LOAD)
968 			continue;
969 		if (exe) {
970 			if (!(phdr.p_flags & PF_X))
971 				continue;
972 		} else {
973 			if (!(phdr.p_flags & PF_R))
974 				continue;
975 		}
976 		sz = min(phdr.p_memsz, phdr.p_filesz);
977 		if (!sz)
978 			continue;
979 		err = mapfn(phdr.p_vaddr, sz, phdr.p_offset, data);
980 		if (err)
981 			return err;
982 	}
983 	return 0;
984 }
985 
986 int file__read_maps(int fd, bool exe, mapfn_t mapfn, void *data,
987 		    bool *is_64_bit)
988 {
989 	int err;
990 	Elf *elf;
991 
992 	elf = elf_begin(fd, PERF_ELF_C_READ_MMAP, NULL);
993 	if (elf == NULL)
994 		return -1;
995 
996 	if (is_64_bit)
997 		*is_64_bit = (gelf_getclass(elf) == ELFCLASS64);
998 
999 	err = elf_read_maps(elf, exe, mapfn, data);
1000 
1001 	elf_end(elf);
1002 	return err;
1003 }
1004 
1005 void symbol__elf_init(void)
1006 {
1007 	elf_version(EV_CURRENT);
1008 }
1009