1 // SPDX-License-Identifier: GPL-2.0 2 #include <dirent.h> 3 #include <errno.h> 4 #include <stdlib.h> 5 #include <stdio.h> 6 #include <string.h> 7 #include <linux/capability.h> 8 #include <linux/kernel.h> 9 #include <linux/mman.h> 10 #include <linux/string.h> 11 #include <linux/time64.h> 12 #include <sys/types.h> 13 #include <sys/stat.h> 14 #include <sys/param.h> 15 #include <fcntl.h> 16 #include <unistd.h> 17 #include <inttypes.h> 18 #include "annotate.h" 19 #include "build-id.h" 20 #include "cap.h" 21 #include "dso.h" 22 #include "util.h" // lsdir() 23 #include "debug.h" 24 #include "event.h" 25 #include "machine.h" 26 #include "map.h" 27 #include "symbol.h" 28 #include "map_symbol.h" 29 #include "mem-events.h" 30 #include "symsrc.h" 31 #include "strlist.h" 32 #include "intlist.h" 33 #include "namespaces.h" 34 #include "header.h" 35 #include "path.h" 36 #include <linux/ctype.h> 37 #include <linux/zalloc.h> 38 39 #include <elf.h> 40 #include <limits.h> 41 #include <symbol/kallsyms.h> 42 #include <sys/utsname.h> 43 44 static int dso__load_kernel_sym(struct dso *dso, struct map *map); 45 static int dso__load_guest_kernel_sym(struct dso *dso, struct map *map); 46 static bool symbol__is_idle(const char *name); 47 48 int vmlinux_path__nr_entries; 49 char **vmlinux_path; 50 51 struct symbol_conf symbol_conf = { 52 .nanosecs = false, 53 .use_modules = true, 54 .try_vmlinux_path = true, 55 .demangle = true, 56 .demangle_kernel = false, 57 .cumulate_callchain = true, 58 .time_quantum = 100 * NSEC_PER_MSEC, /* 100ms */ 59 .show_hist_headers = true, 60 .symfs = "", 61 .event_group = true, 62 .inline_name = true, 63 .res_sample = 0, 64 }; 65 66 static enum dso_binary_type binary_type_symtab[] = { 67 DSO_BINARY_TYPE__KALLSYMS, 68 DSO_BINARY_TYPE__GUEST_KALLSYMS, 69 DSO_BINARY_TYPE__JAVA_JIT, 70 DSO_BINARY_TYPE__DEBUGLINK, 71 DSO_BINARY_TYPE__BUILD_ID_CACHE, 72 DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO, 73 DSO_BINARY_TYPE__FEDORA_DEBUGINFO, 74 DSO_BINARY_TYPE__UBUNTU_DEBUGINFO, 75 DSO_BINARY_TYPE__BUILDID_DEBUGINFO, 76 DSO_BINARY_TYPE__SYSTEM_PATH_DSO, 77 DSO_BINARY_TYPE__GUEST_KMODULE, 78 DSO_BINARY_TYPE__GUEST_KMODULE_COMP, 79 DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE, 80 DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP, 81 DSO_BINARY_TYPE__OPENEMBEDDED_DEBUGINFO, 82 DSO_BINARY_TYPE__MIXEDUP_UBUNTU_DEBUGINFO, 83 DSO_BINARY_TYPE__NOT_FOUND, 84 }; 85 86 #define DSO_BINARY_TYPE__SYMTAB_CNT ARRAY_SIZE(binary_type_symtab) 87 88 static bool symbol_type__filter(char symbol_type) 89 { 90 symbol_type = toupper(symbol_type); 91 return symbol_type == 'T' || symbol_type == 'W' || symbol_type == 'D' || symbol_type == 'B'; 92 } 93 94 static int prefix_underscores_count(const char *str) 95 { 96 const char *tail = str; 97 98 while (*tail == '_') 99 tail++; 100 101 return tail - str; 102 } 103 104 const char * __weak arch__normalize_symbol_name(const char *name) 105 { 106 return name; 107 } 108 109 int __weak arch__compare_symbol_names(const char *namea, const char *nameb) 110 { 111 return strcmp(namea, nameb); 112 } 113 114 int __weak arch__compare_symbol_names_n(const char *namea, const char *nameb, 115 unsigned int n) 116 { 117 return strncmp(namea, nameb, n); 118 } 119 120 int __weak arch__choose_best_symbol(struct symbol *syma, 121 struct symbol *symb __maybe_unused) 122 { 123 /* Avoid "SyS" kernel syscall aliases */ 124 if (strlen(syma->name) >= 3 && !strncmp(syma->name, "SyS", 3)) 125 return SYMBOL_B; 126 if (strlen(syma->name) >= 10 && !strncmp(syma->name, "compat_SyS", 10)) 127 return SYMBOL_B; 128 129 return SYMBOL_A; 130 } 131 132 static int choose_best_symbol(struct symbol *syma, struct symbol *symb) 133 { 134 s64 a; 135 s64 b; 136 size_t na, nb; 137 138 /* Prefer a symbol with non zero length */ 139 a = syma->end - syma->start; 140 b = symb->end - symb->start; 141 if ((b == 0) && (a > 0)) 142 return SYMBOL_A; 143 else if ((a == 0) && (b > 0)) 144 return SYMBOL_B; 145 146 /* Prefer a non weak symbol over a weak one */ 147 a = syma->binding == STB_WEAK; 148 b = symb->binding == STB_WEAK; 149 if (b && !a) 150 return SYMBOL_A; 151 if (a && !b) 152 return SYMBOL_B; 153 154 /* Prefer a global symbol over a non global one */ 155 a = syma->binding == STB_GLOBAL; 156 b = symb->binding == STB_GLOBAL; 157 if (a && !b) 158 return SYMBOL_A; 159 if (b && !a) 160 return SYMBOL_B; 161 162 /* Prefer a symbol with less underscores */ 163 a = prefix_underscores_count(syma->name); 164 b = prefix_underscores_count(symb->name); 165 if (b > a) 166 return SYMBOL_A; 167 else if (a > b) 168 return SYMBOL_B; 169 170 /* Choose the symbol with the longest name */ 171 na = strlen(syma->name); 172 nb = strlen(symb->name); 173 if (na > nb) 174 return SYMBOL_A; 175 else if (na < nb) 176 return SYMBOL_B; 177 178 return arch__choose_best_symbol(syma, symb); 179 } 180 181 void symbols__fixup_duplicate(struct rb_root_cached *symbols) 182 { 183 struct rb_node *nd; 184 struct symbol *curr, *next; 185 186 if (symbol_conf.allow_aliases) 187 return; 188 189 nd = rb_first_cached(symbols); 190 191 while (nd) { 192 curr = rb_entry(nd, struct symbol, rb_node); 193 again: 194 nd = rb_next(&curr->rb_node); 195 next = rb_entry(nd, struct symbol, rb_node); 196 197 if (!nd) 198 break; 199 200 if (curr->start != next->start) 201 continue; 202 203 if (choose_best_symbol(curr, next) == SYMBOL_A) { 204 if (next->type == STT_GNU_IFUNC) 205 curr->ifunc_alias = true; 206 rb_erase_cached(&next->rb_node, symbols); 207 symbol__delete(next); 208 goto again; 209 } else { 210 if (curr->type == STT_GNU_IFUNC) 211 next->ifunc_alias = true; 212 nd = rb_next(&curr->rb_node); 213 rb_erase_cached(&curr->rb_node, symbols); 214 symbol__delete(curr); 215 } 216 } 217 } 218 219 /* Update zero-sized symbols using the address of the next symbol */ 220 void symbols__fixup_end(struct rb_root_cached *symbols, bool is_kallsyms) 221 { 222 struct rb_node *nd, *prevnd = rb_first_cached(symbols); 223 struct symbol *curr, *prev; 224 225 if (prevnd == NULL) 226 return; 227 228 curr = rb_entry(prevnd, struct symbol, rb_node); 229 230 for (nd = rb_next(prevnd); nd; nd = rb_next(nd)) { 231 prev = curr; 232 curr = rb_entry(nd, struct symbol, rb_node); 233 234 /* 235 * On some architecture kernel text segment start is located at 236 * some low memory address, while modules are located at high 237 * memory addresses (or vice versa). The gap between end of 238 * kernel text segment and beginning of first module's text 239 * segment is very big. Therefore do not fill this gap and do 240 * not assign it to the kernel dso map (kallsyms). 241 * 242 * In kallsyms, it determines module symbols using '[' character 243 * like in: 244 * ffffffffc1937000 T hdmi_driver_init [snd_hda_codec_hdmi] 245 */ 246 if (prev->end == prev->start) { 247 /* Last kernel/module symbol mapped to end of page */ 248 if (is_kallsyms && (!strchr(prev->name, '[') != 249 !strchr(curr->name, '['))) 250 prev->end = roundup(prev->end + 4096, 4096); 251 else 252 prev->end = curr->start; 253 254 pr_debug4("%s sym:%s end:%#" PRIx64 "\n", 255 __func__, prev->name, prev->end); 256 } 257 } 258 259 /* Last entry */ 260 if (curr->end == curr->start) 261 curr->end = roundup(curr->start, 4096) + 4096; 262 } 263 264 struct symbol *symbol__new(u64 start, u64 len, u8 binding, u8 type, const char *name) 265 { 266 size_t namelen = strlen(name) + 1; 267 struct symbol *sym = calloc(1, (symbol_conf.priv_size + 268 sizeof(*sym) + namelen)); 269 if (sym == NULL) 270 return NULL; 271 272 if (symbol_conf.priv_size) { 273 if (symbol_conf.init_annotation) { 274 struct annotation *notes = (void *)sym; 275 annotation__init(notes); 276 } 277 sym = ((void *)sym) + symbol_conf.priv_size; 278 } 279 280 sym->start = start; 281 sym->end = len ? start + len : start; 282 sym->type = type; 283 sym->binding = binding; 284 sym->namelen = namelen - 1; 285 286 pr_debug4("%s: %s %#" PRIx64 "-%#" PRIx64 "\n", 287 __func__, name, start, sym->end); 288 memcpy(sym->name, name, namelen); 289 290 return sym; 291 } 292 293 void symbol__delete(struct symbol *sym) 294 { 295 if (symbol_conf.priv_size) { 296 if (symbol_conf.init_annotation) { 297 struct annotation *notes = symbol__annotation(sym); 298 299 annotation__exit(notes); 300 } 301 } 302 free(((void *)sym) - symbol_conf.priv_size); 303 } 304 305 void symbols__delete(struct rb_root_cached *symbols) 306 { 307 struct symbol *pos; 308 struct rb_node *next = rb_first_cached(symbols); 309 310 while (next) { 311 pos = rb_entry(next, struct symbol, rb_node); 312 next = rb_next(&pos->rb_node); 313 rb_erase_cached(&pos->rb_node, symbols); 314 symbol__delete(pos); 315 } 316 } 317 318 void __symbols__insert(struct rb_root_cached *symbols, 319 struct symbol *sym, bool kernel) 320 { 321 struct rb_node **p = &symbols->rb_root.rb_node; 322 struct rb_node *parent = NULL; 323 const u64 ip = sym->start; 324 struct symbol *s; 325 bool leftmost = true; 326 327 if (kernel) { 328 const char *name = sym->name; 329 /* 330 * ppc64 uses function descriptors and appends a '.' to the 331 * start of every instruction address. Remove it. 332 */ 333 if (name[0] == '.') 334 name++; 335 sym->idle = symbol__is_idle(name); 336 } 337 338 while (*p != NULL) { 339 parent = *p; 340 s = rb_entry(parent, struct symbol, rb_node); 341 if (ip < s->start) 342 p = &(*p)->rb_left; 343 else { 344 p = &(*p)->rb_right; 345 leftmost = false; 346 } 347 } 348 rb_link_node(&sym->rb_node, parent, p); 349 rb_insert_color_cached(&sym->rb_node, symbols, leftmost); 350 } 351 352 void symbols__insert(struct rb_root_cached *symbols, struct symbol *sym) 353 { 354 __symbols__insert(symbols, sym, false); 355 } 356 357 static struct symbol *symbols__find(struct rb_root_cached *symbols, u64 ip) 358 { 359 struct rb_node *n; 360 361 if (symbols == NULL) 362 return NULL; 363 364 n = symbols->rb_root.rb_node; 365 366 while (n) { 367 struct symbol *s = rb_entry(n, struct symbol, rb_node); 368 369 if (ip < s->start) 370 n = n->rb_left; 371 else if (ip > s->end || (ip == s->end && ip != s->start)) 372 n = n->rb_right; 373 else 374 return s; 375 } 376 377 return NULL; 378 } 379 380 static struct symbol *symbols__first(struct rb_root_cached *symbols) 381 { 382 struct rb_node *n = rb_first_cached(symbols); 383 384 if (n) 385 return rb_entry(n, struct symbol, rb_node); 386 387 return NULL; 388 } 389 390 static struct symbol *symbols__last(struct rb_root_cached *symbols) 391 { 392 struct rb_node *n = rb_last(&symbols->rb_root); 393 394 if (n) 395 return rb_entry(n, struct symbol, rb_node); 396 397 return NULL; 398 } 399 400 static struct symbol *symbols__next(struct symbol *sym) 401 { 402 struct rb_node *n = rb_next(&sym->rb_node); 403 404 if (n) 405 return rb_entry(n, struct symbol, rb_node); 406 407 return NULL; 408 } 409 410 static int symbols__sort_name_cmp(const void *vlhs, const void *vrhs) 411 { 412 const struct symbol *lhs = *((const struct symbol **)vlhs); 413 const struct symbol *rhs = *((const struct symbol **)vrhs); 414 415 return strcmp(lhs->name, rhs->name); 416 } 417 418 static struct symbol **symbols__sort_by_name(struct rb_root_cached *source, size_t *len) 419 { 420 struct rb_node *nd; 421 struct symbol **result; 422 size_t i = 0, size = 0; 423 424 for (nd = rb_first_cached(source); nd; nd = rb_next(nd)) 425 size++; 426 427 result = malloc(sizeof(*result) * size); 428 if (!result) 429 return NULL; 430 431 for (nd = rb_first_cached(source); nd; nd = rb_next(nd)) { 432 struct symbol *pos = rb_entry(nd, struct symbol, rb_node); 433 434 result[i++] = pos; 435 } 436 qsort(result, size, sizeof(*result), symbols__sort_name_cmp); 437 *len = size; 438 return result; 439 } 440 441 int symbol__match_symbol_name(const char *name, const char *str, 442 enum symbol_tag_include includes) 443 { 444 const char *versioning; 445 446 if (includes == SYMBOL_TAG_INCLUDE__DEFAULT_ONLY && 447 (versioning = strstr(name, "@@"))) { 448 int len = strlen(str); 449 450 if (len < versioning - name) 451 len = versioning - name; 452 453 return arch__compare_symbol_names_n(name, str, len); 454 } else 455 return arch__compare_symbol_names(name, str); 456 } 457 458 static struct symbol *symbols__find_by_name(struct symbol *symbols[], 459 size_t symbols_len, 460 const char *name, 461 enum symbol_tag_include includes, 462 size_t *found_idx) 463 { 464 size_t i, lower = 0, upper = symbols_len; 465 struct symbol *s = NULL; 466 467 if (found_idx) 468 *found_idx = SIZE_MAX; 469 470 if (!symbols_len) 471 return NULL; 472 473 while (lower < upper) { 474 int cmp; 475 476 i = (lower + upper) / 2; 477 cmp = symbol__match_symbol_name(symbols[i]->name, name, includes); 478 479 if (cmp > 0) 480 upper = i; 481 else if (cmp < 0) 482 lower = i + 1; 483 else { 484 if (found_idx) 485 *found_idx = i; 486 s = symbols[i]; 487 break; 488 } 489 } 490 if (s && includes != SYMBOL_TAG_INCLUDE__DEFAULT_ONLY) { 491 /* return first symbol that has same name (if any) */ 492 for (; i > 0; i--) { 493 struct symbol *tmp = symbols[i - 1]; 494 495 if (!arch__compare_symbol_names(tmp->name, s->name)) { 496 if (found_idx) 497 *found_idx = i - 1; 498 s = tmp; 499 } else 500 break; 501 } 502 } 503 assert(!found_idx || !s || s == symbols[*found_idx]); 504 return s; 505 } 506 507 void dso__reset_find_symbol_cache(struct dso *dso) 508 { 509 dso->last_find_result.addr = 0; 510 dso->last_find_result.symbol = NULL; 511 } 512 513 void dso__insert_symbol(struct dso *dso, struct symbol *sym) 514 { 515 __symbols__insert(&dso->symbols, sym, dso->kernel); 516 517 /* update the symbol cache if necessary */ 518 if (dso->last_find_result.addr >= sym->start && 519 (dso->last_find_result.addr < sym->end || 520 sym->start == sym->end)) { 521 dso->last_find_result.symbol = sym; 522 } 523 } 524 525 void dso__delete_symbol(struct dso *dso, struct symbol *sym) 526 { 527 rb_erase_cached(&sym->rb_node, &dso->symbols); 528 symbol__delete(sym); 529 dso__reset_find_symbol_cache(dso); 530 } 531 532 struct symbol *dso__find_symbol(struct dso *dso, u64 addr) 533 { 534 if (dso->last_find_result.addr != addr || dso->last_find_result.symbol == NULL) { 535 dso->last_find_result.addr = addr; 536 dso->last_find_result.symbol = symbols__find(&dso->symbols, addr); 537 } 538 539 return dso->last_find_result.symbol; 540 } 541 542 struct symbol *dso__find_symbol_nocache(struct dso *dso, u64 addr) 543 { 544 return symbols__find(&dso->symbols, addr); 545 } 546 547 struct symbol *dso__first_symbol(struct dso *dso) 548 { 549 return symbols__first(&dso->symbols); 550 } 551 552 struct symbol *dso__last_symbol(struct dso *dso) 553 { 554 return symbols__last(&dso->symbols); 555 } 556 557 struct symbol *dso__next_symbol(struct symbol *sym) 558 { 559 return symbols__next(sym); 560 } 561 562 struct symbol *dso__next_symbol_by_name(struct dso *dso, size_t *idx) 563 { 564 if (*idx + 1 >= dso->symbol_names_len) 565 return NULL; 566 567 ++*idx; 568 return dso->symbol_names[*idx]; 569 } 570 571 /* 572 * Returns first symbol that matched with @name. 573 */ 574 struct symbol *dso__find_symbol_by_name(struct dso *dso, const char *name, size_t *idx) 575 { 576 struct symbol *s = symbols__find_by_name(dso->symbol_names, dso->symbol_names_len, 577 name, SYMBOL_TAG_INCLUDE__NONE, idx); 578 if (!s) 579 s = symbols__find_by_name(dso->symbol_names, dso->symbol_names_len, 580 name, SYMBOL_TAG_INCLUDE__DEFAULT_ONLY, idx); 581 return s; 582 } 583 584 void dso__sort_by_name(struct dso *dso) 585 { 586 mutex_lock(&dso->lock); 587 if (!dso__sorted_by_name(dso)) { 588 size_t len; 589 590 dso->symbol_names = symbols__sort_by_name(&dso->symbols, &len); 591 if (dso->symbol_names) { 592 dso->symbol_names_len = len; 593 dso__set_sorted_by_name(dso); 594 } 595 } 596 mutex_unlock(&dso->lock); 597 } 598 599 /* 600 * While we find nice hex chars, build a long_val. 601 * Return number of chars processed. 602 */ 603 static int hex2u64(const char *ptr, u64 *long_val) 604 { 605 char *p; 606 607 *long_val = strtoull(ptr, &p, 16); 608 609 return p - ptr; 610 } 611 612 613 int modules__parse(const char *filename, void *arg, 614 int (*process_module)(void *arg, const char *name, 615 u64 start, u64 size)) 616 { 617 char *line = NULL; 618 size_t n; 619 FILE *file; 620 int err = 0; 621 622 file = fopen(filename, "r"); 623 if (file == NULL) 624 return -1; 625 626 while (1) { 627 char name[PATH_MAX]; 628 u64 start, size; 629 char *sep, *endptr; 630 ssize_t line_len; 631 632 line_len = getline(&line, &n, file); 633 if (line_len < 0) { 634 if (feof(file)) 635 break; 636 err = -1; 637 goto out; 638 } 639 640 if (!line) { 641 err = -1; 642 goto out; 643 } 644 645 line[--line_len] = '\0'; /* \n */ 646 647 sep = strrchr(line, 'x'); 648 if (sep == NULL) 649 continue; 650 651 hex2u64(sep + 1, &start); 652 653 sep = strchr(line, ' '); 654 if (sep == NULL) 655 continue; 656 657 *sep = '\0'; 658 659 scnprintf(name, sizeof(name), "[%s]", line); 660 661 size = strtoul(sep + 1, &endptr, 0); 662 if (*endptr != ' ' && *endptr != '\t') 663 continue; 664 665 err = process_module(arg, name, start, size); 666 if (err) 667 break; 668 } 669 out: 670 free(line); 671 fclose(file); 672 return err; 673 } 674 675 /* 676 * These are symbols in the kernel image, so make sure that 677 * sym is from a kernel DSO. 678 */ 679 static bool symbol__is_idle(const char *name) 680 { 681 const char * const idle_symbols[] = { 682 "acpi_idle_do_entry", 683 "acpi_processor_ffh_cstate_enter", 684 "arch_cpu_idle", 685 "cpu_idle", 686 "cpu_startup_entry", 687 "idle_cpu", 688 "intel_idle", 689 "default_idle", 690 "native_safe_halt", 691 "enter_idle", 692 "exit_idle", 693 "mwait_idle", 694 "mwait_idle_with_hints", 695 "mwait_idle_with_hints.constprop.0", 696 "poll_idle", 697 "ppc64_runlatch_off", 698 "pseries_dedicated_idle_sleep", 699 "psw_idle", 700 "psw_idle_exit", 701 NULL 702 }; 703 int i; 704 static struct strlist *idle_symbols_list; 705 706 if (idle_symbols_list) 707 return strlist__has_entry(idle_symbols_list, name); 708 709 idle_symbols_list = strlist__new(NULL, NULL); 710 711 for (i = 0; idle_symbols[i]; i++) 712 strlist__add(idle_symbols_list, idle_symbols[i]); 713 714 return strlist__has_entry(idle_symbols_list, name); 715 } 716 717 static int map__process_kallsym_symbol(void *arg, const char *name, 718 char type, u64 start) 719 { 720 struct symbol *sym; 721 struct dso *dso = arg; 722 struct rb_root_cached *root = &dso->symbols; 723 724 if (!symbol_type__filter(type)) 725 return 0; 726 727 /* Ignore local symbols for ARM modules */ 728 if (name[0] == '$') 729 return 0; 730 731 /* 732 * module symbols are not sorted so we add all 733 * symbols, setting length to 0, and rely on 734 * symbols__fixup_end() to fix it up. 735 */ 736 sym = symbol__new(start, 0, kallsyms2elf_binding(type), kallsyms2elf_type(type), name); 737 if (sym == NULL) 738 return -ENOMEM; 739 /* 740 * We will pass the symbols to the filter later, in 741 * map__split_kallsyms, when we have split the maps per module 742 */ 743 __symbols__insert(root, sym, !strchr(name, '[')); 744 745 return 0; 746 } 747 748 /* 749 * Loads the function entries in /proc/kallsyms into kernel_map->dso, 750 * so that we can in the next step set the symbol ->end address and then 751 * call kernel_maps__split_kallsyms. 752 */ 753 static int dso__load_all_kallsyms(struct dso *dso, const char *filename) 754 { 755 return kallsyms__parse(filename, dso, map__process_kallsym_symbol); 756 } 757 758 static int maps__split_kallsyms_for_kcore(struct maps *kmaps, struct dso *dso) 759 { 760 struct map *curr_map; 761 struct symbol *pos; 762 int count = 0; 763 struct rb_root_cached old_root = dso->symbols; 764 struct rb_root_cached *root = &dso->symbols; 765 struct rb_node *next = rb_first_cached(root); 766 767 if (!kmaps) 768 return -1; 769 770 *root = RB_ROOT_CACHED; 771 772 while (next) { 773 struct dso *curr_map_dso; 774 char *module; 775 776 pos = rb_entry(next, struct symbol, rb_node); 777 next = rb_next(&pos->rb_node); 778 779 rb_erase_cached(&pos->rb_node, &old_root); 780 RB_CLEAR_NODE(&pos->rb_node); 781 module = strchr(pos->name, '\t'); 782 if (module) 783 *module = '\0'; 784 785 curr_map = maps__find(kmaps, pos->start); 786 787 if (!curr_map) { 788 symbol__delete(pos); 789 continue; 790 } 791 curr_map_dso = map__dso(curr_map); 792 pos->start -= map__start(curr_map) - map__pgoff(curr_map); 793 if (pos->end > map__end(curr_map)) 794 pos->end = map__end(curr_map); 795 if (pos->end) 796 pos->end -= map__start(curr_map) - map__pgoff(curr_map); 797 symbols__insert(&curr_map_dso->symbols, pos); 798 ++count; 799 } 800 801 /* Symbols have been adjusted */ 802 dso->adjust_symbols = 1; 803 804 return count; 805 } 806 807 /* 808 * Split the symbols into maps, making sure there are no overlaps, i.e. the 809 * kernel range is broken in several maps, named [kernel].N, as we don't have 810 * the original ELF section names vmlinux have. 811 */ 812 static int maps__split_kallsyms(struct maps *kmaps, struct dso *dso, u64 delta, 813 struct map *initial_map) 814 { 815 struct machine *machine; 816 struct map *curr_map = initial_map; 817 struct symbol *pos; 818 int count = 0, moved = 0; 819 struct rb_root_cached *root = &dso->symbols; 820 struct rb_node *next = rb_first_cached(root); 821 int kernel_range = 0; 822 bool x86_64; 823 824 if (!kmaps) 825 return -1; 826 827 machine = maps__machine(kmaps); 828 829 x86_64 = machine__is(machine, "x86_64"); 830 831 while (next) { 832 char *module; 833 834 pos = rb_entry(next, struct symbol, rb_node); 835 next = rb_next(&pos->rb_node); 836 837 module = strchr(pos->name, '\t'); 838 if (module) { 839 struct dso *curr_map_dso; 840 841 if (!symbol_conf.use_modules) 842 goto discard_symbol; 843 844 *module++ = '\0'; 845 curr_map_dso = map__dso(curr_map); 846 if (strcmp(curr_map_dso->short_name, module)) { 847 if (RC_CHK_ACCESS(curr_map) != RC_CHK_ACCESS(initial_map) && 848 dso->kernel == DSO_SPACE__KERNEL_GUEST && 849 machine__is_default_guest(machine)) { 850 /* 851 * We assume all symbols of a module are 852 * continuous in * kallsyms, so curr_map 853 * points to a module and all its 854 * symbols are in its kmap. Mark it as 855 * loaded. 856 */ 857 dso__set_loaded(curr_map_dso); 858 } 859 860 curr_map = maps__find_by_name(kmaps, module); 861 if (curr_map == NULL) { 862 pr_debug("%s/proc/{kallsyms,modules} " 863 "inconsistency while looking " 864 "for \"%s\" module!\n", 865 machine->root_dir, module); 866 curr_map = initial_map; 867 goto discard_symbol; 868 } 869 curr_map_dso = map__dso(curr_map); 870 if (curr_map_dso->loaded && 871 !machine__is_default_guest(machine)) 872 goto discard_symbol; 873 } 874 /* 875 * So that we look just like we get from .ko files, 876 * i.e. not prelinked, relative to initial_map->start. 877 */ 878 pos->start = map__map_ip(curr_map, pos->start); 879 pos->end = map__map_ip(curr_map, pos->end); 880 } else if (x86_64 && is_entry_trampoline(pos->name)) { 881 /* 882 * These symbols are not needed anymore since the 883 * trampoline maps refer to the text section and it's 884 * symbols instead. Avoid having to deal with 885 * relocations, and the assumption that the first symbol 886 * is the start of kernel text, by simply removing the 887 * symbols at this point. 888 */ 889 goto discard_symbol; 890 } else if (curr_map != initial_map) { 891 char dso_name[PATH_MAX]; 892 struct dso *ndso; 893 894 if (delta) { 895 /* Kernel was relocated at boot time */ 896 pos->start -= delta; 897 pos->end -= delta; 898 } 899 900 if (count == 0) { 901 curr_map = initial_map; 902 goto add_symbol; 903 } 904 905 if (dso->kernel == DSO_SPACE__KERNEL_GUEST) 906 snprintf(dso_name, sizeof(dso_name), 907 "[guest.kernel].%d", 908 kernel_range++); 909 else 910 snprintf(dso_name, sizeof(dso_name), 911 "[kernel].%d", 912 kernel_range++); 913 914 ndso = dso__new(dso_name); 915 if (ndso == NULL) 916 return -1; 917 918 ndso->kernel = dso->kernel; 919 920 curr_map = map__new2(pos->start, ndso); 921 if (curr_map == NULL) { 922 dso__put(ndso); 923 return -1; 924 } 925 926 map__set_map_ip(curr_map, identity__map_ip); 927 map__set_unmap_ip(curr_map, identity__map_ip); 928 if (maps__insert(kmaps, curr_map)) { 929 dso__put(ndso); 930 return -1; 931 } 932 ++kernel_range; 933 } else if (delta) { 934 /* Kernel was relocated at boot time */ 935 pos->start -= delta; 936 pos->end -= delta; 937 } 938 add_symbol: 939 if (curr_map != initial_map) { 940 struct dso *curr_map_dso = map__dso(curr_map); 941 942 rb_erase_cached(&pos->rb_node, root); 943 symbols__insert(&curr_map_dso->symbols, pos); 944 ++moved; 945 } else 946 ++count; 947 948 continue; 949 discard_symbol: 950 rb_erase_cached(&pos->rb_node, root); 951 symbol__delete(pos); 952 } 953 954 if (curr_map != initial_map && 955 dso->kernel == DSO_SPACE__KERNEL_GUEST && 956 machine__is_default_guest(maps__machine(kmaps))) { 957 dso__set_loaded(map__dso(curr_map)); 958 } 959 960 return count + moved; 961 } 962 963 bool symbol__restricted_filename(const char *filename, 964 const char *restricted_filename) 965 { 966 bool restricted = false; 967 968 if (symbol_conf.kptr_restrict) { 969 char *r = realpath(filename, NULL); 970 971 if (r != NULL) { 972 restricted = strcmp(r, restricted_filename) == 0; 973 free(r); 974 return restricted; 975 } 976 } 977 978 return restricted; 979 } 980 981 struct module_info { 982 struct rb_node rb_node; 983 char *name; 984 u64 start; 985 }; 986 987 static void add_module(struct module_info *mi, struct rb_root *modules) 988 { 989 struct rb_node **p = &modules->rb_node; 990 struct rb_node *parent = NULL; 991 struct module_info *m; 992 993 while (*p != NULL) { 994 parent = *p; 995 m = rb_entry(parent, struct module_info, rb_node); 996 if (strcmp(mi->name, m->name) < 0) 997 p = &(*p)->rb_left; 998 else 999 p = &(*p)->rb_right; 1000 } 1001 rb_link_node(&mi->rb_node, parent, p); 1002 rb_insert_color(&mi->rb_node, modules); 1003 } 1004 1005 static void delete_modules(struct rb_root *modules) 1006 { 1007 struct module_info *mi; 1008 struct rb_node *next = rb_first(modules); 1009 1010 while (next) { 1011 mi = rb_entry(next, struct module_info, rb_node); 1012 next = rb_next(&mi->rb_node); 1013 rb_erase(&mi->rb_node, modules); 1014 zfree(&mi->name); 1015 free(mi); 1016 } 1017 } 1018 1019 static struct module_info *find_module(const char *name, 1020 struct rb_root *modules) 1021 { 1022 struct rb_node *n = modules->rb_node; 1023 1024 while (n) { 1025 struct module_info *m; 1026 int cmp; 1027 1028 m = rb_entry(n, struct module_info, rb_node); 1029 cmp = strcmp(name, m->name); 1030 if (cmp < 0) 1031 n = n->rb_left; 1032 else if (cmp > 0) 1033 n = n->rb_right; 1034 else 1035 return m; 1036 } 1037 1038 return NULL; 1039 } 1040 1041 static int __read_proc_modules(void *arg, const char *name, u64 start, 1042 u64 size __maybe_unused) 1043 { 1044 struct rb_root *modules = arg; 1045 struct module_info *mi; 1046 1047 mi = zalloc(sizeof(struct module_info)); 1048 if (!mi) 1049 return -ENOMEM; 1050 1051 mi->name = strdup(name); 1052 mi->start = start; 1053 1054 if (!mi->name) { 1055 free(mi); 1056 return -ENOMEM; 1057 } 1058 1059 add_module(mi, modules); 1060 1061 return 0; 1062 } 1063 1064 static int read_proc_modules(const char *filename, struct rb_root *modules) 1065 { 1066 if (symbol__restricted_filename(filename, "/proc/modules")) 1067 return -1; 1068 1069 if (modules__parse(filename, modules, __read_proc_modules)) { 1070 delete_modules(modules); 1071 return -1; 1072 } 1073 1074 return 0; 1075 } 1076 1077 int compare_proc_modules(const char *from, const char *to) 1078 { 1079 struct rb_root from_modules = RB_ROOT; 1080 struct rb_root to_modules = RB_ROOT; 1081 struct rb_node *from_node, *to_node; 1082 struct module_info *from_m, *to_m; 1083 int ret = -1; 1084 1085 if (read_proc_modules(from, &from_modules)) 1086 return -1; 1087 1088 if (read_proc_modules(to, &to_modules)) 1089 goto out_delete_from; 1090 1091 from_node = rb_first(&from_modules); 1092 to_node = rb_first(&to_modules); 1093 while (from_node) { 1094 if (!to_node) 1095 break; 1096 1097 from_m = rb_entry(from_node, struct module_info, rb_node); 1098 to_m = rb_entry(to_node, struct module_info, rb_node); 1099 1100 if (from_m->start != to_m->start || 1101 strcmp(from_m->name, to_m->name)) 1102 break; 1103 1104 from_node = rb_next(from_node); 1105 to_node = rb_next(to_node); 1106 } 1107 1108 if (!from_node && !to_node) 1109 ret = 0; 1110 1111 delete_modules(&to_modules); 1112 out_delete_from: 1113 delete_modules(&from_modules); 1114 1115 return ret; 1116 } 1117 1118 static int do_validate_kcore_modules(const char *filename, struct maps *kmaps) 1119 { 1120 struct rb_root modules = RB_ROOT; 1121 struct map_rb_node *old_node; 1122 int err; 1123 1124 err = read_proc_modules(filename, &modules); 1125 if (err) 1126 return err; 1127 1128 maps__for_each_entry(kmaps, old_node) { 1129 struct map *old_map = old_node->map; 1130 struct module_info *mi; 1131 struct dso *dso; 1132 1133 if (!__map__is_kmodule(old_map)) { 1134 continue; 1135 } 1136 dso = map__dso(old_map); 1137 /* Module must be in memory at the same address */ 1138 mi = find_module(dso->short_name, &modules); 1139 if (!mi || mi->start != map__start(old_map)) { 1140 err = -EINVAL; 1141 goto out; 1142 } 1143 } 1144 out: 1145 delete_modules(&modules); 1146 return err; 1147 } 1148 1149 /* 1150 * If kallsyms is referenced by name then we look for filename in the same 1151 * directory. 1152 */ 1153 static bool filename_from_kallsyms_filename(char *filename, 1154 const char *base_name, 1155 const char *kallsyms_filename) 1156 { 1157 char *name; 1158 1159 strcpy(filename, kallsyms_filename); 1160 name = strrchr(filename, '/'); 1161 if (!name) 1162 return false; 1163 1164 name += 1; 1165 1166 if (!strcmp(name, "kallsyms")) { 1167 strcpy(name, base_name); 1168 return true; 1169 } 1170 1171 return false; 1172 } 1173 1174 static int validate_kcore_modules(const char *kallsyms_filename, 1175 struct map *map) 1176 { 1177 struct maps *kmaps = map__kmaps(map); 1178 char modules_filename[PATH_MAX]; 1179 1180 if (!kmaps) 1181 return -EINVAL; 1182 1183 if (!filename_from_kallsyms_filename(modules_filename, "modules", 1184 kallsyms_filename)) 1185 return -EINVAL; 1186 1187 if (do_validate_kcore_modules(modules_filename, kmaps)) 1188 return -EINVAL; 1189 1190 return 0; 1191 } 1192 1193 static int validate_kcore_addresses(const char *kallsyms_filename, 1194 struct map *map) 1195 { 1196 struct kmap *kmap = map__kmap(map); 1197 1198 if (!kmap) 1199 return -EINVAL; 1200 1201 if (kmap->ref_reloc_sym && kmap->ref_reloc_sym->name) { 1202 u64 start; 1203 1204 if (kallsyms__get_function_start(kallsyms_filename, 1205 kmap->ref_reloc_sym->name, &start)) 1206 return -ENOENT; 1207 if (start != kmap->ref_reloc_sym->addr) 1208 return -EINVAL; 1209 } 1210 1211 return validate_kcore_modules(kallsyms_filename, map); 1212 } 1213 1214 struct kcore_mapfn_data { 1215 struct dso *dso; 1216 struct list_head maps; 1217 }; 1218 1219 static int kcore_mapfn(u64 start, u64 len, u64 pgoff, void *data) 1220 { 1221 struct kcore_mapfn_data *md = data; 1222 struct map_list_node *list_node = map_list_node__new(); 1223 1224 if (!list_node) 1225 return -ENOMEM; 1226 1227 list_node->map = map__new2(start, md->dso); 1228 if (!list_node->map) { 1229 free(list_node); 1230 return -ENOMEM; 1231 } 1232 1233 map__set_end(list_node->map, map__start(list_node->map) + len); 1234 map__set_pgoff(list_node->map, pgoff); 1235 1236 list_add(&list_node->node, &md->maps); 1237 1238 return 0; 1239 } 1240 1241 static int dso__load_kcore(struct dso *dso, struct map *map, 1242 const char *kallsyms_filename) 1243 { 1244 struct maps *kmaps = map__kmaps(map); 1245 struct kcore_mapfn_data md; 1246 struct map *replacement_map = NULL; 1247 struct map_rb_node *old_node, *next; 1248 struct machine *machine; 1249 bool is_64_bit; 1250 int err, fd; 1251 char kcore_filename[PATH_MAX]; 1252 u64 stext; 1253 1254 if (!kmaps) 1255 return -EINVAL; 1256 1257 machine = maps__machine(kmaps); 1258 1259 /* This function requires that the map is the kernel map */ 1260 if (!__map__is_kernel(map)) 1261 return -EINVAL; 1262 1263 if (!filename_from_kallsyms_filename(kcore_filename, "kcore", 1264 kallsyms_filename)) 1265 return -EINVAL; 1266 1267 /* Modules and kernel must be present at their original addresses */ 1268 if (validate_kcore_addresses(kallsyms_filename, map)) 1269 return -EINVAL; 1270 1271 md.dso = dso; 1272 INIT_LIST_HEAD(&md.maps); 1273 1274 fd = open(kcore_filename, O_RDONLY); 1275 if (fd < 0) { 1276 pr_debug("Failed to open %s. Note /proc/kcore requires CAP_SYS_RAWIO capability to access.\n", 1277 kcore_filename); 1278 return -EINVAL; 1279 } 1280 1281 /* Read new maps into temporary lists */ 1282 err = file__read_maps(fd, map__prot(map) & PROT_EXEC, kcore_mapfn, &md, 1283 &is_64_bit); 1284 if (err) 1285 goto out_err; 1286 dso->is_64_bit = is_64_bit; 1287 1288 if (list_empty(&md.maps)) { 1289 err = -EINVAL; 1290 goto out_err; 1291 } 1292 1293 /* Remove old maps */ 1294 maps__for_each_entry_safe(kmaps, old_node, next) { 1295 struct map *old_map = old_node->map; 1296 1297 /* 1298 * We need to preserve eBPF maps even if they are 1299 * covered by kcore, because we need to access 1300 * eBPF dso for source data. 1301 */ 1302 if (old_map != map && !__map__is_bpf_prog(old_map)) 1303 maps__remove(kmaps, old_map); 1304 } 1305 machine->trampolines_mapped = false; 1306 1307 /* Find the kernel map using the '_stext' symbol */ 1308 if (!kallsyms__get_function_start(kallsyms_filename, "_stext", &stext)) { 1309 u64 replacement_size = 0; 1310 struct map_list_node *new_node; 1311 1312 list_for_each_entry(new_node, &md.maps, node) { 1313 struct map *new_map = new_node->map; 1314 u64 new_size = map__size(new_map); 1315 1316 if (!(stext >= map__start(new_map) && stext < map__end(new_map))) 1317 continue; 1318 1319 /* 1320 * On some architectures, ARM64 for example, the kernel 1321 * text can get allocated inside of the vmalloc segment. 1322 * Select the smallest matching segment, in case stext 1323 * falls within more than one in the list. 1324 */ 1325 if (!replacement_map || new_size < replacement_size) { 1326 replacement_map = new_map; 1327 replacement_size = new_size; 1328 } 1329 } 1330 } 1331 1332 if (!replacement_map) 1333 replacement_map = list_entry(md.maps.next, struct map_list_node, node)->map; 1334 1335 /* Add new maps */ 1336 while (!list_empty(&md.maps)) { 1337 struct map_list_node *new_node = list_entry(md.maps.next, struct map_list_node, node); 1338 struct map *new_map = new_node->map; 1339 1340 list_del_init(&new_node->node); 1341 1342 if (RC_CHK_ACCESS(new_map) == RC_CHK_ACCESS(replacement_map)) { 1343 struct map *map_ref; 1344 1345 map__set_start(map, map__start(new_map)); 1346 map__set_end(map, map__end(new_map)); 1347 map__set_pgoff(map, map__pgoff(new_map)); 1348 map__set_map_ip(map, map__map_ip_ptr(new_map)); 1349 map__set_unmap_ip(map, map__unmap_ip_ptr(new_map)); 1350 /* Ensure maps are correctly ordered */ 1351 map_ref = map__get(map); 1352 maps__remove(kmaps, map_ref); 1353 err = maps__insert(kmaps, map_ref); 1354 map__put(map_ref); 1355 map__put(new_map); 1356 if (err) 1357 goto out_err; 1358 } else { 1359 /* 1360 * Merge kcore map into existing maps, 1361 * and ensure that current maps (eBPF) 1362 * stay intact. 1363 */ 1364 if (maps__merge_in(kmaps, new_map)) { 1365 err = -EINVAL; 1366 goto out_err; 1367 } 1368 } 1369 free(new_node); 1370 } 1371 1372 if (machine__is(machine, "x86_64")) { 1373 u64 addr; 1374 1375 /* 1376 * If one of the corresponding symbols is there, assume the 1377 * entry trampoline maps are too. 1378 */ 1379 if (!kallsyms__get_function_start(kallsyms_filename, 1380 ENTRY_TRAMPOLINE_NAME, 1381 &addr)) 1382 machine->trampolines_mapped = true; 1383 } 1384 1385 /* 1386 * Set the data type and long name so that kcore can be read via 1387 * dso__data_read_addr(). 1388 */ 1389 if (dso->kernel == DSO_SPACE__KERNEL_GUEST) 1390 dso->binary_type = DSO_BINARY_TYPE__GUEST_KCORE; 1391 else 1392 dso->binary_type = DSO_BINARY_TYPE__KCORE; 1393 dso__set_long_name(dso, strdup(kcore_filename), true); 1394 1395 close(fd); 1396 1397 if (map__prot(map) & PROT_EXEC) 1398 pr_debug("Using %s for kernel object code\n", kcore_filename); 1399 else 1400 pr_debug("Using %s for kernel data\n", kcore_filename); 1401 1402 return 0; 1403 1404 out_err: 1405 while (!list_empty(&md.maps)) { 1406 struct map_list_node *list_node; 1407 1408 list_node = list_entry(md.maps.next, struct map_list_node, node); 1409 list_del_init(&list_node->node); 1410 map__zput(list_node->map); 1411 free(list_node); 1412 } 1413 close(fd); 1414 return err; 1415 } 1416 1417 /* 1418 * If the kernel is relocated at boot time, kallsyms won't match. Compute the 1419 * delta based on the relocation reference symbol. 1420 */ 1421 static int kallsyms__delta(struct kmap *kmap, const char *filename, u64 *delta) 1422 { 1423 u64 addr; 1424 1425 if (!kmap->ref_reloc_sym || !kmap->ref_reloc_sym->name) 1426 return 0; 1427 1428 if (kallsyms__get_function_start(filename, kmap->ref_reloc_sym->name, &addr)) 1429 return -1; 1430 1431 *delta = addr - kmap->ref_reloc_sym->addr; 1432 return 0; 1433 } 1434 1435 int __dso__load_kallsyms(struct dso *dso, const char *filename, 1436 struct map *map, bool no_kcore) 1437 { 1438 struct kmap *kmap = map__kmap(map); 1439 u64 delta = 0; 1440 1441 if (symbol__restricted_filename(filename, "/proc/kallsyms")) 1442 return -1; 1443 1444 if (!kmap || !kmap->kmaps) 1445 return -1; 1446 1447 if (dso__load_all_kallsyms(dso, filename) < 0) 1448 return -1; 1449 1450 if (kallsyms__delta(kmap, filename, &delta)) 1451 return -1; 1452 1453 symbols__fixup_end(&dso->symbols, true); 1454 symbols__fixup_duplicate(&dso->symbols); 1455 1456 if (dso->kernel == DSO_SPACE__KERNEL_GUEST) 1457 dso->symtab_type = DSO_BINARY_TYPE__GUEST_KALLSYMS; 1458 else 1459 dso->symtab_type = DSO_BINARY_TYPE__KALLSYMS; 1460 1461 if (!no_kcore && !dso__load_kcore(dso, map, filename)) 1462 return maps__split_kallsyms_for_kcore(kmap->kmaps, dso); 1463 else 1464 return maps__split_kallsyms(kmap->kmaps, dso, delta, map); 1465 } 1466 1467 int dso__load_kallsyms(struct dso *dso, const char *filename, 1468 struct map *map) 1469 { 1470 return __dso__load_kallsyms(dso, filename, map, false); 1471 } 1472 1473 static int dso__load_perf_map(const char *map_path, struct dso *dso) 1474 { 1475 char *line = NULL; 1476 size_t n; 1477 FILE *file; 1478 int nr_syms = 0; 1479 1480 file = fopen(map_path, "r"); 1481 if (file == NULL) 1482 goto out_failure; 1483 1484 while (!feof(file)) { 1485 u64 start, size; 1486 struct symbol *sym; 1487 int line_len, len; 1488 1489 line_len = getline(&line, &n, file); 1490 if (line_len < 0) 1491 break; 1492 1493 if (!line) 1494 goto out_failure; 1495 1496 line[--line_len] = '\0'; /* \n */ 1497 1498 len = hex2u64(line, &start); 1499 1500 len++; 1501 if (len + 2 >= line_len) 1502 continue; 1503 1504 len += hex2u64(line + len, &size); 1505 1506 len++; 1507 if (len + 2 >= line_len) 1508 continue; 1509 1510 sym = symbol__new(start, size, STB_GLOBAL, STT_FUNC, line + len); 1511 1512 if (sym == NULL) 1513 goto out_delete_line; 1514 1515 symbols__insert(&dso->symbols, sym); 1516 nr_syms++; 1517 } 1518 1519 free(line); 1520 fclose(file); 1521 1522 return nr_syms; 1523 1524 out_delete_line: 1525 free(line); 1526 out_failure: 1527 return -1; 1528 } 1529 1530 #ifdef HAVE_LIBBFD_SUPPORT 1531 #define PACKAGE 'perf' 1532 #include <bfd.h> 1533 1534 static int bfd_symbols__cmpvalue(const void *a, const void *b) 1535 { 1536 const asymbol *as = *(const asymbol **)a, *bs = *(const asymbol **)b; 1537 1538 if (bfd_asymbol_value(as) != bfd_asymbol_value(bs)) 1539 return bfd_asymbol_value(as) - bfd_asymbol_value(bs); 1540 1541 return bfd_asymbol_name(as)[0] - bfd_asymbol_name(bs)[0]; 1542 } 1543 1544 static int bfd2elf_binding(asymbol *symbol) 1545 { 1546 if (symbol->flags & BSF_WEAK) 1547 return STB_WEAK; 1548 if (symbol->flags & BSF_GLOBAL) 1549 return STB_GLOBAL; 1550 if (symbol->flags & BSF_LOCAL) 1551 return STB_LOCAL; 1552 return -1; 1553 } 1554 1555 int dso__load_bfd_symbols(struct dso *dso, const char *debugfile) 1556 { 1557 int err = -1; 1558 long symbols_size, symbols_count, i; 1559 asection *section; 1560 asymbol **symbols, *sym; 1561 struct symbol *symbol; 1562 bfd *abfd; 1563 u64 start, len; 1564 1565 abfd = bfd_openr(debugfile, NULL); 1566 if (!abfd) 1567 return -1; 1568 1569 if (!bfd_check_format(abfd, bfd_object)) { 1570 pr_debug2("%s: cannot read %s bfd file.\n", __func__, 1571 dso->long_name); 1572 goto out_close; 1573 } 1574 1575 if (bfd_get_flavour(abfd) == bfd_target_elf_flavour) 1576 goto out_close; 1577 1578 symbols_size = bfd_get_symtab_upper_bound(abfd); 1579 if (symbols_size == 0) { 1580 bfd_close(abfd); 1581 return 0; 1582 } 1583 1584 if (symbols_size < 0) 1585 goto out_close; 1586 1587 symbols = malloc(symbols_size); 1588 if (!symbols) 1589 goto out_close; 1590 1591 symbols_count = bfd_canonicalize_symtab(abfd, symbols); 1592 if (symbols_count < 0) 1593 goto out_free; 1594 1595 section = bfd_get_section_by_name(abfd, ".text"); 1596 if (section) { 1597 for (i = 0; i < symbols_count; ++i) { 1598 if (!strcmp(bfd_asymbol_name(symbols[i]), "__ImageBase") || 1599 !strcmp(bfd_asymbol_name(symbols[i]), "__image_base__")) 1600 break; 1601 } 1602 if (i < symbols_count) { 1603 /* PE symbols can only have 4 bytes, so use .text high bits */ 1604 dso->text_offset = section->vma - (u32)section->vma; 1605 dso->text_offset += (u32)bfd_asymbol_value(symbols[i]); 1606 } else { 1607 dso->text_offset = section->vma - section->filepos; 1608 } 1609 } 1610 1611 qsort(symbols, symbols_count, sizeof(asymbol *), bfd_symbols__cmpvalue); 1612 1613 #ifdef bfd_get_section 1614 #define bfd_asymbol_section bfd_get_section 1615 #endif 1616 for (i = 0; i < symbols_count; ++i) { 1617 sym = symbols[i]; 1618 section = bfd_asymbol_section(sym); 1619 if (bfd2elf_binding(sym) < 0) 1620 continue; 1621 1622 while (i + 1 < symbols_count && 1623 bfd_asymbol_section(symbols[i + 1]) == section && 1624 bfd2elf_binding(symbols[i + 1]) < 0) 1625 i++; 1626 1627 if (i + 1 < symbols_count && 1628 bfd_asymbol_section(symbols[i + 1]) == section) 1629 len = symbols[i + 1]->value - sym->value; 1630 else 1631 len = section->size - sym->value; 1632 1633 start = bfd_asymbol_value(sym) - dso->text_offset; 1634 symbol = symbol__new(start, len, bfd2elf_binding(sym), STT_FUNC, 1635 bfd_asymbol_name(sym)); 1636 if (!symbol) 1637 goto out_free; 1638 1639 symbols__insert(&dso->symbols, symbol); 1640 } 1641 #ifdef bfd_get_section 1642 #undef bfd_asymbol_section 1643 #endif 1644 1645 symbols__fixup_end(&dso->symbols, false); 1646 symbols__fixup_duplicate(&dso->symbols); 1647 dso->adjust_symbols = 1; 1648 1649 err = 0; 1650 out_free: 1651 free(symbols); 1652 out_close: 1653 bfd_close(abfd); 1654 return err; 1655 } 1656 #endif 1657 1658 static bool dso__is_compatible_symtab_type(struct dso *dso, bool kmod, 1659 enum dso_binary_type type) 1660 { 1661 switch (type) { 1662 case DSO_BINARY_TYPE__JAVA_JIT: 1663 case DSO_BINARY_TYPE__DEBUGLINK: 1664 case DSO_BINARY_TYPE__SYSTEM_PATH_DSO: 1665 case DSO_BINARY_TYPE__FEDORA_DEBUGINFO: 1666 case DSO_BINARY_TYPE__UBUNTU_DEBUGINFO: 1667 case DSO_BINARY_TYPE__MIXEDUP_UBUNTU_DEBUGINFO: 1668 case DSO_BINARY_TYPE__BUILDID_DEBUGINFO: 1669 case DSO_BINARY_TYPE__OPENEMBEDDED_DEBUGINFO: 1670 return !kmod && dso->kernel == DSO_SPACE__USER; 1671 1672 case DSO_BINARY_TYPE__KALLSYMS: 1673 case DSO_BINARY_TYPE__VMLINUX: 1674 case DSO_BINARY_TYPE__KCORE: 1675 return dso->kernel == DSO_SPACE__KERNEL; 1676 1677 case DSO_BINARY_TYPE__GUEST_KALLSYMS: 1678 case DSO_BINARY_TYPE__GUEST_VMLINUX: 1679 case DSO_BINARY_TYPE__GUEST_KCORE: 1680 return dso->kernel == DSO_SPACE__KERNEL_GUEST; 1681 1682 case DSO_BINARY_TYPE__GUEST_KMODULE: 1683 case DSO_BINARY_TYPE__GUEST_KMODULE_COMP: 1684 case DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE: 1685 case DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP: 1686 /* 1687 * kernel modules know their symtab type - it's set when 1688 * creating a module dso in machine__addnew_module_map(). 1689 */ 1690 return kmod && dso->symtab_type == type; 1691 1692 case DSO_BINARY_TYPE__BUILD_ID_CACHE: 1693 case DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO: 1694 return true; 1695 1696 case DSO_BINARY_TYPE__BPF_PROG_INFO: 1697 case DSO_BINARY_TYPE__BPF_IMAGE: 1698 case DSO_BINARY_TYPE__OOL: 1699 case DSO_BINARY_TYPE__NOT_FOUND: 1700 default: 1701 return false; 1702 } 1703 } 1704 1705 /* Checks for the existence of the perf-<pid>.map file in two different 1706 * locations. First, if the process is a separate mount namespace, check in 1707 * that namespace using the pid of the innermost pid namespace. If's not in a 1708 * namespace, or the file can't be found there, try in the mount namespace of 1709 * the tracing process using our view of its pid. 1710 */ 1711 static int dso__find_perf_map(char *filebuf, size_t bufsz, 1712 struct nsinfo **nsip) 1713 { 1714 struct nscookie nsc; 1715 struct nsinfo *nsi; 1716 struct nsinfo *nnsi; 1717 int rc = -1; 1718 1719 nsi = *nsip; 1720 1721 if (nsinfo__need_setns(nsi)) { 1722 snprintf(filebuf, bufsz, "/tmp/perf-%d.map", nsinfo__nstgid(nsi)); 1723 nsinfo__mountns_enter(nsi, &nsc); 1724 rc = access(filebuf, R_OK); 1725 nsinfo__mountns_exit(&nsc); 1726 if (rc == 0) 1727 return rc; 1728 } 1729 1730 nnsi = nsinfo__copy(nsi); 1731 if (nnsi) { 1732 nsinfo__put(nsi); 1733 1734 nsinfo__clear_need_setns(nnsi); 1735 snprintf(filebuf, bufsz, "/tmp/perf-%d.map", nsinfo__tgid(nnsi)); 1736 *nsip = nnsi; 1737 rc = 0; 1738 } 1739 1740 return rc; 1741 } 1742 1743 int dso__load(struct dso *dso, struct map *map) 1744 { 1745 char *name; 1746 int ret = -1; 1747 u_int i; 1748 struct machine *machine = NULL; 1749 char *root_dir = (char *) ""; 1750 int ss_pos = 0; 1751 struct symsrc ss_[2]; 1752 struct symsrc *syms_ss = NULL, *runtime_ss = NULL; 1753 bool kmod; 1754 bool perfmap; 1755 struct build_id bid; 1756 struct nscookie nsc; 1757 char newmapname[PATH_MAX]; 1758 const char *map_path = dso->long_name; 1759 1760 mutex_lock(&dso->lock); 1761 perfmap = strncmp(dso->name, "/tmp/perf-", 10) == 0; 1762 if (perfmap) { 1763 if (dso->nsinfo && (dso__find_perf_map(newmapname, 1764 sizeof(newmapname), &dso->nsinfo) == 0)) { 1765 map_path = newmapname; 1766 } 1767 } 1768 1769 nsinfo__mountns_enter(dso->nsinfo, &nsc); 1770 1771 /* check again under the dso->lock */ 1772 if (dso__loaded(dso)) { 1773 ret = 1; 1774 goto out; 1775 } 1776 1777 kmod = dso->symtab_type == DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE || 1778 dso->symtab_type == DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP || 1779 dso->symtab_type == DSO_BINARY_TYPE__GUEST_KMODULE || 1780 dso->symtab_type == DSO_BINARY_TYPE__GUEST_KMODULE_COMP; 1781 1782 if (dso->kernel && !kmod) { 1783 if (dso->kernel == DSO_SPACE__KERNEL) 1784 ret = dso__load_kernel_sym(dso, map); 1785 else if (dso->kernel == DSO_SPACE__KERNEL_GUEST) 1786 ret = dso__load_guest_kernel_sym(dso, map); 1787 1788 machine = maps__machine(map__kmaps(map)); 1789 if (machine__is(machine, "x86_64")) 1790 machine__map_x86_64_entry_trampolines(machine, dso); 1791 goto out; 1792 } 1793 1794 dso->adjust_symbols = 0; 1795 1796 if (perfmap) { 1797 ret = dso__load_perf_map(map_path, dso); 1798 dso->symtab_type = ret > 0 ? DSO_BINARY_TYPE__JAVA_JIT : 1799 DSO_BINARY_TYPE__NOT_FOUND; 1800 goto out; 1801 } 1802 1803 if (machine) 1804 root_dir = machine->root_dir; 1805 1806 name = malloc(PATH_MAX); 1807 if (!name) 1808 goto out; 1809 1810 /* 1811 * Read the build id if possible. This is required for 1812 * DSO_BINARY_TYPE__BUILDID_DEBUGINFO to work 1813 */ 1814 if (!dso->has_build_id && 1815 is_regular_file(dso->long_name)) { 1816 __symbol__join_symfs(name, PATH_MAX, dso->long_name); 1817 if (filename__read_build_id(name, &bid) > 0) 1818 dso__set_build_id(dso, &bid); 1819 } 1820 1821 /* 1822 * Iterate over candidate debug images. 1823 * Keep track of "interesting" ones (those which have a symtab, dynsym, 1824 * and/or opd section) for processing. 1825 */ 1826 for (i = 0; i < DSO_BINARY_TYPE__SYMTAB_CNT; i++) { 1827 struct symsrc *ss = &ss_[ss_pos]; 1828 bool next_slot = false; 1829 bool is_reg; 1830 bool nsexit; 1831 int bfdrc = -1; 1832 int sirc = -1; 1833 1834 enum dso_binary_type symtab_type = binary_type_symtab[i]; 1835 1836 nsexit = (symtab_type == DSO_BINARY_TYPE__BUILD_ID_CACHE || 1837 symtab_type == DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO); 1838 1839 if (!dso__is_compatible_symtab_type(dso, kmod, symtab_type)) 1840 continue; 1841 1842 if (dso__read_binary_type_filename(dso, symtab_type, 1843 root_dir, name, PATH_MAX)) 1844 continue; 1845 1846 if (nsexit) 1847 nsinfo__mountns_exit(&nsc); 1848 1849 is_reg = is_regular_file(name); 1850 if (!is_reg && errno == ENOENT && dso->nsinfo) { 1851 char *new_name = dso__filename_with_chroot(dso, name); 1852 if (new_name) { 1853 is_reg = is_regular_file(new_name); 1854 strlcpy(name, new_name, PATH_MAX); 1855 free(new_name); 1856 } 1857 } 1858 1859 #ifdef HAVE_LIBBFD_SUPPORT 1860 if (is_reg) 1861 bfdrc = dso__load_bfd_symbols(dso, name); 1862 #endif 1863 if (is_reg && bfdrc < 0) 1864 sirc = symsrc__init(ss, dso, name, symtab_type); 1865 1866 if (nsexit) 1867 nsinfo__mountns_enter(dso->nsinfo, &nsc); 1868 1869 if (bfdrc == 0) { 1870 ret = 0; 1871 break; 1872 } 1873 1874 if (!is_reg || sirc < 0) 1875 continue; 1876 1877 if (!syms_ss && symsrc__has_symtab(ss)) { 1878 syms_ss = ss; 1879 next_slot = true; 1880 if (!dso->symsrc_filename) 1881 dso->symsrc_filename = strdup(name); 1882 } 1883 1884 if (!runtime_ss && symsrc__possibly_runtime(ss)) { 1885 runtime_ss = ss; 1886 next_slot = true; 1887 } 1888 1889 if (next_slot) { 1890 ss_pos++; 1891 1892 if (syms_ss && runtime_ss) 1893 break; 1894 } else { 1895 symsrc__destroy(ss); 1896 } 1897 1898 } 1899 1900 if (!runtime_ss && !syms_ss) 1901 goto out_free; 1902 1903 if (runtime_ss && !syms_ss) { 1904 syms_ss = runtime_ss; 1905 } 1906 1907 /* We'll have to hope for the best */ 1908 if (!runtime_ss && syms_ss) 1909 runtime_ss = syms_ss; 1910 1911 if (syms_ss) 1912 ret = dso__load_sym(dso, map, syms_ss, runtime_ss, kmod); 1913 else 1914 ret = -1; 1915 1916 if (ret > 0) { 1917 int nr_plt; 1918 1919 nr_plt = dso__synthesize_plt_symbols(dso, runtime_ss); 1920 if (nr_plt > 0) 1921 ret += nr_plt; 1922 } 1923 1924 for (; ss_pos > 0; ss_pos--) 1925 symsrc__destroy(&ss_[ss_pos - 1]); 1926 out_free: 1927 free(name); 1928 if (ret < 0 && strstr(dso->name, " (deleted)") != NULL) 1929 ret = 0; 1930 out: 1931 dso__set_loaded(dso); 1932 mutex_unlock(&dso->lock); 1933 nsinfo__mountns_exit(&nsc); 1934 1935 return ret; 1936 } 1937 1938 /* 1939 * Always takes ownership of vmlinux when vmlinux_allocated == true, even if 1940 * it returns an error. 1941 */ 1942 int dso__load_vmlinux(struct dso *dso, struct map *map, 1943 const char *vmlinux, bool vmlinux_allocated) 1944 { 1945 int err = -1; 1946 struct symsrc ss; 1947 char symfs_vmlinux[PATH_MAX]; 1948 enum dso_binary_type symtab_type; 1949 1950 if (vmlinux[0] == '/') 1951 snprintf(symfs_vmlinux, sizeof(symfs_vmlinux), "%s", vmlinux); 1952 else 1953 symbol__join_symfs(symfs_vmlinux, vmlinux); 1954 1955 if (dso->kernel == DSO_SPACE__KERNEL_GUEST) 1956 symtab_type = DSO_BINARY_TYPE__GUEST_VMLINUX; 1957 else 1958 symtab_type = DSO_BINARY_TYPE__VMLINUX; 1959 1960 if (symsrc__init(&ss, dso, symfs_vmlinux, symtab_type)) { 1961 if (vmlinux_allocated) 1962 free((char *) vmlinux); 1963 return -1; 1964 } 1965 1966 /* 1967 * dso__load_sym() may copy 'dso' which will result in the copies having 1968 * an incorrect long name unless we set it here first. 1969 */ 1970 dso__set_long_name(dso, vmlinux, vmlinux_allocated); 1971 if (dso->kernel == DSO_SPACE__KERNEL_GUEST) 1972 dso->binary_type = DSO_BINARY_TYPE__GUEST_VMLINUX; 1973 else 1974 dso->binary_type = DSO_BINARY_TYPE__VMLINUX; 1975 1976 err = dso__load_sym(dso, map, &ss, &ss, 0); 1977 symsrc__destroy(&ss); 1978 1979 if (err > 0) { 1980 dso__set_loaded(dso); 1981 pr_debug("Using %s for symbols\n", symfs_vmlinux); 1982 } 1983 1984 return err; 1985 } 1986 1987 int dso__load_vmlinux_path(struct dso *dso, struct map *map) 1988 { 1989 int i, err = 0; 1990 char *filename = NULL; 1991 1992 pr_debug("Looking at the vmlinux_path (%d entries long)\n", 1993 vmlinux_path__nr_entries + 1); 1994 1995 for (i = 0; i < vmlinux_path__nr_entries; ++i) { 1996 err = dso__load_vmlinux(dso, map, vmlinux_path[i], false); 1997 if (err > 0) 1998 goto out; 1999 } 2000 2001 if (!symbol_conf.ignore_vmlinux_buildid) 2002 filename = dso__build_id_filename(dso, NULL, 0, false); 2003 if (filename != NULL) { 2004 err = dso__load_vmlinux(dso, map, filename, true); 2005 if (err > 0) 2006 goto out; 2007 } 2008 out: 2009 return err; 2010 } 2011 2012 static bool visible_dir_filter(const char *name, struct dirent *d) 2013 { 2014 if (d->d_type != DT_DIR) 2015 return false; 2016 return lsdir_no_dot_filter(name, d); 2017 } 2018 2019 static int find_matching_kcore(struct map *map, char *dir, size_t dir_sz) 2020 { 2021 char kallsyms_filename[PATH_MAX]; 2022 int ret = -1; 2023 struct strlist *dirs; 2024 struct str_node *nd; 2025 2026 dirs = lsdir(dir, visible_dir_filter); 2027 if (!dirs) 2028 return -1; 2029 2030 strlist__for_each_entry(nd, dirs) { 2031 scnprintf(kallsyms_filename, sizeof(kallsyms_filename), 2032 "%s/%s/kallsyms", dir, nd->s); 2033 if (!validate_kcore_addresses(kallsyms_filename, map)) { 2034 strlcpy(dir, kallsyms_filename, dir_sz); 2035 ret = 0; 2036 break; 2037 } 2038 } 2039 2040 strlist__delete(dirs); 2041 2042 return ret; 2043 } 2044 2045 /* 2046 * Use open(O_RDONLY) to check readability directly instead of access(R_OK) 2047 * since access(R_OK) only checks with real UID/GID but open() use effective 2048 * UID/GID and actual capabilities (e.g. /proc/kcore requires CAP_SYS_RAWIO). 2049 */ 2050 static bool filename__readable(const char *file) 2051 { 2052 int fd = open(file, O_RDONLY); 2053 if (fd < 0) 2054 return false; 2055 close(fd); 2056 return true; 2057 } 2058 2059 static char *dso__find_kallsyms(struct dso *dso, struct map *map) 2060 { 2061 struct build_id bid; 2062 char sbuild_id[SBUILD_ID_SIZE]; 2063 bool is_host = false; 2064 char path[PATH_MAX]; 2065 2066 if (!dso->has_build_id) { 2067 /* 2068 * Last resort, if we don't have a build-id and couldn't find 2069 * any vmlinux file, try the running kernel kallsyms table. 2070 */ 2071 goto proc_kallsyms; 2072 } 2073 2074 if (sysfs__read_build_id("/sys/kernel/notes", &bid) == 0) 2075 is_host = dso__build_id_equal(dso, &bid); 2076 2077 /* Try a fast path for /proc/kallsyms if possible */ 2078 if (is_host) { 2079 /* 2080 * Do not check the build-id cache, unless we know we cannot use 2081 * /proc/kcore or module maps don't match to /proc/kallsyms. 2082 * To check readability of /proc/kcore, do not use access(R_OK) 2083 * since /proc/kcore requires CAP_SYS_RAWIO to read and access 2084 * can't check it. 2085 */ 2086 if (filename__readable("/proc/kcore") && 2087 !validate_kcore_addresses("/proc/kallsyms", map)) 2088 goto proc_kallsyms; 2089 } 2090 2091 build_id__sprintf(&dso->bid, sbuild_id); 2092 2093 /* Find kallsyms in build-id cache with kcore */ 2094 scnprintf(path, sizeof(path), "%s/%s/%s", 2095 buildid_dir, DSO__NAME_KCORE, sbuild_id); 2096 2097 if (!find_matching_kcore(map, path, sizeof(path))) 2098 return strdup(path); 2099 2100 /* Use current /proc/kallsyms if possible */ 2101 if (is_host) { 2102 proc_kallsyms: 2103 return strdup("/proc/kallsyms"); 2104 } 2105 2106 /* Finally, find a cache of kallsyms */ 2107 if (!build_id_cache__kallsyms_path(sbuild_id, path, sizeof(path))) { 2108 pr_err("No kallsyms or vmlinux with build-id %s was found\n", 2109 sbuild_id); 2110 return NULL; 2111 } 2112 2113 return strdup(path); 2114 } 2115 2116 static int dso__load_kernel_sym(struct dso *dso, struct map *map) 2117 { 2118 int err; 2119 const char *kallsyms_filename = NULL; 2120 char *kallsyms_allocated_filename = NULL; 2121 char *filename = NULL; 2122 2123 /* 2124 * Step 1: if the user specified a kallsyms or vmlinux filename, use 2125 * it and only it, reporting errors to the user if it cannot be used. 2126 * 2127 * For instance, try to analyse an ARM perf.data file _without_ a 2128 * build-id, or if the user specifies the wrong path to the right 2129 * vmlinux file, obviously we can't fallback to another vmlinux (a 2130 * x86_86 one, on the machine where analysis is being performed, say), 2131 * or worse, /proc/kallsyms. 2132 * 2133 * If the specified file _has_ a build-id and there is a build-id 2134 * section in the perf.data file, we will still do the expected 2135 * validation in dso__load_vmlinux and will bail out if they don't 2136 * match. 2137 */ 2138 if (symbol_conf.kallsyms_name != NULL) { 2139 kallsyms_filename = symbol_conf.kallsyms_name; 2140 goto do_kallsyms; 2141 } 2142 2143 if (!symbol_conf.ignore_vmlinux && symbol_conf.vmlinux_name != NULL) { 2144 return dso__load_vmlinux(dso, map, symbol_conf.vmlinux_name, false); 2145 } 2146 2147 /* 2148 * Before checking on common vmlinux locations, check if it's 2149 * stored as standard build id binary (not kallsyms) under 2150 * .debug cache. 2151 */ 2152 if (!symbol_conf.ignore_vmlinux_buildid) 2153 filename = __dso__build_id_filename(dso, NULL, 0, false, false); 2154 if (filename != NULL) { 2155 err = dso__load_vmlinux(dso, map, filename, true); 2156 if (err > 0) 2157 return err; 2158 } 2159 2160 if (!symbol_conf.ignore_vmlinux && vmlinux_path != NULL) { 2161 err = dso__load_vmlinux_path(dso, map); 2162 if (err > 0) 2163 return err; 2164 } 2165 2166 /* do not try local files if a symfs was given */ 2167 if (symbol_conf.symfs[0] != 0) 2168 return -1; 2169 2170 kallsyms_allocated_filename = dso__find_kallsyms(dso, map); 2171 if (!kallsyms_allocated_filename) 2172 return -1; 2173 2174 kallsyms_filename = kallsyms_allocated_filename; 2175 2176 do_kallsyms: 2177 err = dso__load_kallsyms(dso, kallsyms_filename, map); 2178 if (err > 0) 2179 pr_debug("Using %s for symbols\n", kallsyms_filename); 2180 free(kallsyms_allocated_filename); 2181 2182 if (err > 0 && !dso__is_kcore(dso)) { 2183 dso->binary_type = DSO_BINARY_TYPE__KALLSYMS; 2184 dso__set_long_name(dso, DSO__NAME_KALLSYMS, false); 2185 map__fixup_start(map); 2186 map__fixup_end(map); 2187 } 2188 2189 return err; 2190 } 2191 2192 static int dso__load_guest_kernel_sym(struct dso *dso, struct map *map) 2193 { 2194 int err; 2195 const char *kallsyms_filename; 2196 struct machine *machine = maps__machine(map__kmaps(map)); 2197 char path[PATH_MAX]; 2198 2199 if (machine->kallsyms_filename) { 2200 kallsyms_filename = machine->kallsyms_filename; 2201 } else if (machine__is_default_guest(machine)) { 2202 /* 2203 * if the user specified a vmlinux filename, use it and only 2204 * it, reporting errors to the user if it cannot be used. 2205 * Or use file guest_kallsyms inputted by user on commandline 2206 */ 2207 if (symbol_conf.default_guest_vmlinux_name != NULL) { 2208 err = dso__load_vmlinux(dso, map, 2209 symbol_conf.default_guest_vmlinux_name, 2210 false); 2211 return err; 2212 } 2213 2214 kallsyms_filename = symbol_conf.default_guest_kallsyms; 2215 if (!kallsyms_filename) 2216 return -1; 2217 } else { 2218 sprintf(path, "%s/proc/kallsyms", machine->root_dir); 2219 kallsyms_filename = path; 2220 } 2221 2222 err = dso__load_kallsyms(dso, kallsyms_filename, map); 2223 if (err > 0) 2224 pr_debug("Using %s for symbols\n", kallsyms_filename); 2225 if (err > 0 && !dso__is_kcore(dso)) { 2226 dso->binary_type = DSO_BINARY_TYPE__GUEST_KALLSYMS; 2227 dso__set_long_name(dso, machine->mmap_name, false); 2228 map__fixup_start(map); 2229 map__fixup_end(map); 2230 } 2231 2232 return err; 2233 } 2234 2235 static void vmlinux_path__exit(void) 2236 { 2237 while (--vmlinux_path__nr_entries >= 0) 2238 zfree(&vmlinux_path[vmlinux_path__nr_entries]); 2239 vmlinux_path__nr_entries = 0; 2240 2241 zfree(&vmlinux_path); 2242 } 2243 2244 static const char * const vmlinux_paths[] = { 2245 "vmlinux", 2246 "/boot/vmlinux" 2247 }; 2248 2249 static const char * const vmlinux_paths_upd[] = { 2250 "/boot/vmlinux-%s", 2251 "/usr/lib/debug/boot/vmlinux-%s", 2252 "/lib/modules/%s/build/vmlinux", 2253 "/usr/lib/debug/lib/modules/%s/vmlinux", 2254 "/usr/lib/debug/boot/vmlinux-%s.debug" 2255 }; 2256 2257 static int vmlinux_path__add(const char *new_entry) 2258 { 2259 vmlinux_path[vmlinux_path__nr_entries] = strdup(new_entry); 2260 if (vmlinux_path[vmlinux_path__nr_entries] == NULL) 2261 return -1; 2262 ++vmlinux_path__nr_entries; 2263 2264 return 0; 2265 } 2266 2267 static int vmlinux_path__init(struct perf_env *env) 2268 { 2269 struct utsname uts; 2270 char bf[PATH_MAX]; 2271 char *kernel_version; 2272 unsigned int i; 2273 2274 vmlinux_path = malloc(sizeof(char *) * (ARRAY_SIZE(vmlinux_paths) + 2275 ARRAY_SIZE(vmlinux_paths_upd))); 2276 if (vmlinux_path == NULL) 2277 return -1; 2278 2279 for (i = 0; i < ARRAY_SIZE(vmlinux_paths); i++) 2280 if (vmlinux_path__add(vmlinux_paths[i]) < 0) 2281 goto out_fail; 2282 2283 /* only try kernel version if no symfs was given */ 2284 if (symbol_conf.symfs[0] != 0) 2285 return 0; 2286 2287 if (env) { 2288 kernel_version = env->os_release; 2289 } else { 2290 if (uname(&uts) < 0) 2291 goto out_fail; 2292 2293 kernel_version = uts.release; 2294 } 2295 2296 for (i = 0; i < ARRAY_SIZE(vmlinux_paths_upd); i++) { 2297 snprintf(bf, sizeof(bf), vmlinux_paths_upd[i], kernel_version); 2298 if (vmlinux_path__add(bf) < 0) 2299 goto out_fail; 2300 } 2301 2302 return 0; 2303 2304 out_fail: 2305 vmlinux_path__exit(); 2306 return -1; 2307 } 2308 2309 int setup_list(struct strlist **list, const char *list_str, 2310 const char *list_name) 2311 { 2312 if (list_str == NULL) 2313 return 0; 2314 2315 *list = strlist__new(list_str, NULL); 2316 if (!*list) { 2317 pr_err("problems parsing %s list\n", list_name); 2318 return -1; 2319 } 2320 2321 symbol_conf.has_filter = true; 2322 return 0; 2323 } 2324 2325 int setup_intlist(struct intlist **list, const char *list_str, 2326 const char *list_name) 2327 { 2328 if (list_str == NULL) 2329 return 0; 2330 2331 *list = intlist__new(list_str); 2332 if (!*list) { 2333 pr_err("problems parsing %s list\n", list_name); 2334 return -1; 2335 } 2336 return 0; 2337 } 2338 2339 static int setup_addrlist(struct intlist **addr_list, struct strlist *sym_list) 2340 { 2341 struct str_node *pos, *tmp; 2342 unsigned long val; 2343 char *sep; 2344 const char *end; 2345 int i = 0, err; 2346 2347 *addr_list = intlist__new(NULL); 2348 if (!*addr_list) 2349 return -1; 2350 2351 strlist__for_each_entry_safe(pos, tmp, sym_list) { 2352 errno = 0; 2353 val = strtoul(pos->s, &sep, 16); 2354 if (errno || (sep == pos->s)) 2355 continue; 2356 2357 if (*sep != '\0') { 2358 end = pos->s + strlen(pos->s) - 1; 2359 while (end >= sep && isspace(*end)) 2360 end--; 2361 2362 if (end >= sep) 2363 continue; 2364 } 2365 2366 err = intlist__add(*addr_list, val); 2367 if (err) 2368 break; 2369 2370 strlist__remove(sym_list, pos); 2371 i++; 2372 } 2373 2374 if (i == 0) { 2375 intlist__delete(*addr_list); 2376 *addr_list = NULL; 2377 } 2378 2379 return 0; 2380 } 2381 2382 static bool symbol__read_kptr_restrict(void) 2383 { 2384 bool value = false; 2385 FILE *fp = fopen("/proc/sys/kernel/kptr_restrict", "r"); 2386 2387 if (fp != NULL) { 2388 char line[8]; 2389 2390 if (fgets(line, sizeof(line), fp) != NULL) 2391 value = perf_cap__capable(CAP_SYSLOG) ? 2392 (atoi(line) >= 2) : 2393 (atoi(line) != 0); 2394 2395 fclose(fp); 2396 } 2397 2398 /* Per kernel/kallsyms.c: 2399 * we also restrict when perf_event_paranoid > 1 w/o CAP_SYSLOG 2400 */ 2401 if (perf_event_paranoid() > 1 && !perf_cap__capable(CAP_SYSLOG)) 2402 value = true; 2403 2404 return value; 2405 } 2406 2407 int symbol__annotation_init(void) 2408 { 2409 if (symbol_conf.init_annotation) 2410 return 0; 2411 2412 if (symbol_conf.initialized) { 2413 pr_err("Annotation needs to be init before symbol__init()\n"); 2414 return -1; 2415 } 2416 2417 symbol_conf.priv_size += sizeof(struct annotation); 2418 symbol_conf.init_annotation = true; 2419 return 0; 2420 } 2421 2422 int symbol__init(struct perf_env *env) 2423 { 2424 const char *symfs; 2425 2426 if (symbol_conf.initialized) 2427 return 0; 2428 2429 symbol_conf.priv_size = PERF_ALIGN(symbol_conf.priv_size, sizeof(u64)); 2430 2431 symbol__elf_init(); 2432 2433 if (symbol_conf.try_vmlinux_path && vmlinux_path__init(env) < 0) 2434 return -1; 2435 2436 if (symbol_conf.field_sep && *symbol_conf.field_sep == '.') { 2437 pr_err("'.' is the only non valid --field-separator argument\n"); 2438 return -1; 2439 } 2440 2441 if (setup_list(&symbol_conf.dso_list, 2442 symbol_conf.dso_list_str, "dso") < 0) 2443 return -1; 2444 2445 if (setup_list(&symbol_conf.comm_list, 2446 symbol_conf.comm_list_str, "comm") < 0) 2447 goto out_free_dso_list; 2448 2449 if (setup_intlist(&symbol_conf.pid_list, 2450 symbol_conf.pid_list_str, "pid") < 0) 2451 goto out_free_comm_list; 2452 2453 if (setup_intlist(&symbol_conf.tid_list, 2454 symbol_conf.tid_list_str, "tid") < 0) 2455 goto out_free_pid_list; 2456 2457 if (setup_list(&symbol_conf.sym_list, 2458 symbol_conf.sym_list_str, "symbol") < 0) 2459 goto out_free_tid_list; 2460 2461 if (symbol_conf.sym_list && 2462 setup_addrlist(&symbol_conf.addr_list, symbol_conf.sym_list) < 0) 2463 goto out_free_sym_list; 2464 2465 if (setup_list(&symbol_conf.bt_stop_list, 2466 symbol_conf.bt_stop_list_str, "symbol") < 0) 2467 goto out_free_sym_list; 2468 2469 /* 2470 * A path to symbols of "/" is identical to "" 2471 * reset here for simplicity. 2472 */ 2473 symfs = realpath(symbol_conf.symfs, NULL); 2474 if (symfs == NULL) 2475 symfs = symbol_conf.symfs; 2476 if (strcmp(symfs, "/") == 0) 2477 symbol_conf.symfs = ""; 2478 if (symfs != symbol_conf.symfs) 2479 free((void *)symfs); 2480 2481 symbol_conf.kptr_restrict = symbol__read_kptr_restrict(); 2482 2483 symbol_conf.initialized = true; 2484 return 0; 2485 2486 out_free_sym_list: 2487 strlist__delete(symbol_conf.sym_list); 2488 intlist__delete(symbol_conf.addr_list); 2489 out_free_tid_list: 2490 intlist__delete(symbol_conf.tid_list); 2491 out_free_pid_list: 2492 intlist__delete(symbol_conf.pid_list); 2493 out_free_comm_list: 2494 strlist__delete(symbol_conf.comm_list); 2495 out_free_dso_list: 2496 strlist__delete(symbol_conf.dso_list); 2497 return -1; 2498 } 2499 2500 void symbol__exit(void) 2501 { 2502 if (!symbol_conf.initialized) 2503 return; 2504 strlist__delete(symbol_conf.bt_stop_list); 2505 strlist__delete(symbol_conf.sym_list); 2506 strlist__delete(symbol_conf.dso_list); 2507 strlist__delete(symbol_conf.comm_list); 2508 intlist__delete(symbol_conf.tid_list); 2509 intlist__delete(symbol_conf.pid_list); 2510 intlist__delete(symbol_conf.addr_list); 2511 vmlinux_path__exit(); 2512 symbol_conf.sym_list = symbol_conf.dso_list = symbol_conf.comm_list = NULL; 2513 symbol_conf.bt_stop_list = NULL; 2514 symbol_conf.initialized = false; 2515 } 2516 2517 int symbol__config_symfs(const struct option *opt __maybe_unused, 2518 const char *dir, int unset __maybe_unused) 2519 { 2520 char *bf = NULL; 2521 int ret; 2522 2523 symbol_conf.symfs = strdup(dir); 2524 if (symbol_conf.symfs == NULL) 2525 return -ENOMEM; 2526 2527 /* skip the locally configured cache if a symfs is given, and 2528 * config buildid dir to symfs/.debug 2529 */ 2530 ret = asprintf(&bf, "%s/%s", dir, ".debug"); 2531 if (ret < 0) 2532 return -ENOMEM; 2533 2534 set_buildid_dir(bf); 2535 2536 free(bf); 2537 return 0; 2538 } 2539 2540 struct mem_info *mem_info__get(struct mem_info *mi) 2541 { 2542 if (mi) 2543 refcount_inc(&mi->refcnt); 2544 return mi; 2545 } 2546 2547 void mem_info__put(struct mem_info *mi) 2548 { 2549 if (mi && refcount_dec_and_test(&mi->refcnt)) 2550 free(mi); 2551 } 2552 2553 struct mem_info *mem_info__new(void) 2554 { 2555 struct mem_info *mi = zalloc(sizeof(*mi)); 2556 2557 if (mi) 2558 refcount_set(&mi->refcnt, 1); 2559 return mi; 2560 } 2561 2562 /* 2563 * Checks that user supplied symbol kernel files are accessible because 2564 * the default mechanism for accessing elf files fails silently. i.e. if 2565 * debug syms for a build ID aren't found perf carries on normally. When 2566 * they are user supplied we should assume that the user doesn't want to 2567 * silently fail. 2568 */ 2569 int symbol__validate_sym_arguments(void) 2570 { 2571 if (symbol_conf.vmlinux_name && 2572 access(symbol_conf.vmlinux_name, R_OK)) { 2573 pr_err("Invalid file: %s\n", symbol_conf.vmlinux_name); 2574 return -EINVAL; 2575 } 2576 if (symbol_conf.kallsyms_name && 2577 access(symbol_conf.kallsyms_name, R_OK)) { 2578 pr_err("Invalid file: %s\n", symbol_conf.kallsyms_name); 2579 return -EINVAL; 2580 } 2581 return 0; 2582 } 2583