Linux kernel mirror (for testing)
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel
os
linux
1// SPDX-License-Identifier: GPL-2.0
2#include <dirent.h>
3#include <errno.h>
4#include <stdlib.h>
5#include <stdio.h>
6#include <string.h>
7#include <linux/capability.h>
8#include <linux/kernel.h>
9#include <linux/mman.h>
10#include <linux/string.h>
11#include <linux/time64.h>
12#include <sys/types.h>
13#include <sys/stat.h>
14#include <sys/param.h>
15#include <fcntl.h>
16#include <unistd.h>
17#include <inttypes.h>
18#include "annotate.h"
19#include "build-id.h"
20#include "cap.h"
21#include "dso.h"
22#include "util.h" // lsdir()
23#include "debug.h"
24#include "event.h"
25#include "machine.h"
26#include "map.h"
27#include "symbol.h"
28#include "map_symbol.h"
29#include "mem-events.h"
30#include "mem-info.h"
31#include "symsrc.h"
32#include "strlist.h"
33#include "intlist.h"
34#include "namespaces.h"
35#include "header.h"
36#include "path.h"
37#include <linux/ctype.h>
38#include <linux/zalloc.h>
39
40#include <elf.h>
41#include <limits.h>
42#include <symbol/kallsyms.h>
43#include <sys/utsname.h>
44
45static int dso__load_kernel_sym(struct dso *dso, struct map *map);
46static int dso__load_guest_kernel_sym(struct dso *dso, struct map *map);
47static bool symbol__is_idle(const char *name);
48
49int vmlinux_path__nr_entries;
50char **vmlinux_path;
51
52struct symbol_conf symbol_conf = {
53 .nanosecs = false,
54 .use_modules = true,
55 .try_vmlinux_path = true,
56 .demangle = true,
57 .demangle_kernel = false,
58 .cumulate_callchain = true,
59 .time_quantum = 100 * NSEC_PER_MSEC, /* 100ms */
60 .show_hist_headers = true,
61 .symfs = "",
62 .event_group = true,
63 .inline_name = true,
64 .res_sample = 0,
65};
66
67struct map_list_node {
68 struct list_head node;
69 struct map *map;
70};
71
72static struct map_list_node *map_list_node__new(void)
73{
74 return malloc(sizeof(struct map_list_node));
75}
76
77static enum dso_binary_type binary_type_symtab[] = {
78 DSO_BINARY_TYPE__KALLSYMS,
79 DSO_BINARY_TYPE__GUEST_KALLSYMS,
80 DSO_BINARY_TYPE__JAVA_JIT,
81 DSO_BINARY_TYPE__DEBUGLINK,
82 DSO_BINARY_TYPE__BUILD_ID_CACHE,
83 DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO,
84 DSO_BINARY_TYPE__FEDORA_DEBUGINFO,
85 DSO_BINARY_TYPE__UBUNTU_DEBUGINFO,
86 DSO_BINARY_TYPE__BUILDID_DEBUGINFO,
87 DSO_BINARY_TYPE__SYSTEM_PATH_DSO,
88 DSO_BINARY_TYPE__GUEST_KMODULE,
89 DSO_BINARY_TYPE__GUEST_KMODULE_COMP,
90 DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE,
91 DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP,
92 DSO_BINARY_TYPE__OPENEMBEDDED_DEBUGINFO,
93 DSO_BINARY_TYPE__MIXEDUP_UBUNTU_DEBUGINFO,
94 DSO_BINARY_TYPE__NOT_FOUND,
95};
96
97#define DSO_BINARY_TYPE__SYMTAB_CNT ARRAY_SIZE(binary_type_symtab)
98
99static bool symbol_type__filter(char symbol_type)
100{
101 symbol_type = toupper(symbol_type);
102 return symbol_type == 'T' || symbol_type == 'W' || symbol_type == 'D' || symbol_type == 'B';
103}
104
105static int prefix_underscores_count(const char *str)
106{
107 const char *tail = str;
108
109 while (*tail == '_')
110 tail++;
111
112 return tail - str;
113}
114
115const char * __weak arch__normalize_symbol_name(const char *name)
116{
117 return name;
118}
119
120int __weak arch__compare_symbol_names(const char *namea, const char *nameb)
121{
122 return strcmp(namea, nameb);
123}
124
125int __weak arch__compare_symbol_names_n(const char *namea, const char *nameb,
126 unsigned int n)
127{
128 return strncmp(namea, nameb, n);
129}
130
131int __weak arch__choose_best_symbol(struct symbol *syma,
132 struct symbol *symb __maybe_unused)
133{
134 /* Avoid "SyS" kernel syscall aliases */
135 if (strlen(syma->name) >= 3 && !strncmp(syma->name, "SyS", 3))
136 return SYMBOL_B;
137 if (strlen(syma->name) >= 10 && !strncmp(syma->name, "compat_SyS", 10))
138 return SYMBOL_B;
139
140 return SYMBOL_A;
141}
142
143static int choose_best_symbol(struct symbol *syma, struct symbol *symb)
144{
145 s64 a;
146 s64 b;
147 size_t na, nb;
148
149 /* Prefer a symbol with non zero length */
150 a = syma->end - syma->start;
151 b = symb->end - symb->start;
152 if ((b == 0) && (a > 0))
153 return SYMBOL_A;
154 else if ((a == 0) && (b > 0))
155 return SYMBOL_B;
156
157 /* Prefer a non weak symbol over a weak one */
158 a = syma->binding == STB_WEAK;
159 b = symb->binding == STB_WEAK;
160 if (b && !a)
161 return SYMBOL_A;
162 if (a && !b)
163 return SYMBOL_B;
164
165 /* Prefer a global symbol over a non global one */
166 a = syma->binding == STB_GLOBAL;
167 b = symb->binding == STB_GLOBAL;
168 if (a && !b)
169 return SYMBOL_A;
170 if (b && !a)
171 return SYMBOL_B;
172
173 /* Prefer a symbol with less underscores */
174 a = prefix_underscores_count(syma->name);
175 b = prefix_underscores_count(symb->name);
176 if (b > a)
177 return SYMBOL_A;
178 else if (a > b)
179 return SYMBOL_B;
180
181 /* Choose the symbol with the longest name */
182 na = strlen(syma->name);
183 nb = strlen(symb->name);
184 if (na > nb)
185 return SYMBOL_A;
186 else if (na < nb)
187 return SYMBOL_B;
188
189 return arch__choose_best_symbol(syma, symb);
190}
191
192void symbols__fixup_duplicate(struct rb_root_cached *symbols)
193{
194 struct rb_node *nd;
195 struct symbol *curr, *next;
196
197 if (symbol_conf.allow_aliases)
198 return;
199
200 nd = rb_first_cached(symbols);
201
202 while (nd) {
203 curr = rb_entry(nd, struct symbol, rb_node);
204again:
205 nd = rb_next(&curr->rb_node);
206 if (!nd)
207 break;
208
209 next = rb_entry(nd, struct symbol, rb_node);
210 if (curr->start != next->start)
211 continue;
212
213 if (choose_best_symbol(curr, next) == SYMBOL_A) {
214 if (next->type == STT_GNU_IFUNC)
215 curr->ifunc_alias = true;
216 rb_erase_cached(&next->rb_node, symbols);
217 symbol__delete(next);
218 goto again;
219 } else {
220 if (curr->type == STT_GNU_IFUNC)
221 next->ifunc_alias = true;
222 nd = rb_next(&curr->rb_node);
223 rb_erase_cached(&curr->rb_node, symbols);
224 symbol__delete(curr);
225 }
226 }
227}
228
229/* Update zero-sized symbols using the address of the next symbol */
230void symbols__fixup_end(struct rb_root_cached *symbols, bool is_kallsyms)
231{
232 struct rb_node *nd, *prevnd = rb_first_cached(symbols);
233 struct symbol *curr, *prev;
234
235 if (prevnd == NULL)
236 return;
237
238 curr = rb_entry(prevnd, struct symbol, rb_node);
239
240 for (nd = rb_next(prevnd); nd; nd = rb_next(nd)) {
241 prev = curr;
242 curr = rb_entry(nd, struct symbol, rb_node);
243
244 /*
245 * On some architecture kernel text segment start is located at
246 * some low memory address, while modules are located at high
247 * memory addresses (or vice versa). The gap between end of
248 * kernel text segment and beginning of first module's text
249 * segment is very big. Therefore do not fill this gap and do
250 * not assign it to the kernel dso map (kallsyms).
251 *
252 * Also BPF code can be allocated separately from text segments
253 * and modules. So the last entry in a module should not fill
254 * the gap too.
255 *
256 * In kallsyms, it determines module symbols using '[' character
257 * like in:
258 * ffffffffc1937000 T hdmi_driver_init [snd_hda_codec_hdmi]
259 */
260 if (prev->end == prev->start) {
261 const char *prev_mod;
262 const char *curr_mod;
263
264 if (!is_kallsyms) {
265 prev->end = curr->start;
266 continue;
267 }
268
269 prev_mod = strchr(prev->name, '[');
270 curr_mod = strchr(curr->name, '[');
271
272 /* Last kernel/module symbol mapped to end of page */
273 if (!prev_mod != !curr_mod)
274 prev->end = roundup(prev->end + 4096, 4096);
275 /* Last symbol in the previous module */
276 else if (prev_mod && strcmp(prev_mod, curr_mod))
277 prev->end = roundup(prev->end + 4096, 4096);
278 else
279 prev->end = curr->start;
280
281 pr_debug4("%s sym:%s end:%#" PRIx64 "\n",
282 __func__, prev->name, prev->end);
283 }
284 }
285
286 /* Last entry */
287 if (curr->end == curr->start)
288 curr->end = roundup(curr->start, 4096) + 4096;
289}
290
291struct symbol *symbol__new(u64 start, u64 len, u8 binding, u8 type, const char *name)
292{
293 size_t namelen = strlen(name) + 1;
294 struct symbol *sym = calloc(1, (symbol_conf.priv_size +
295 sizeof(*sym) + namelen));
296 if (sym == NULL)
297 return NULL;
298
299 if (symbol_conf.priv_size) {
300 if (symbol_conf.init_annotation) {
301 struct annotation *notes = (void *)sym;
302 annotation__init(notes);
303 }
304 sym = ((void *)sym) + symbol_conf.priv_size;
305 }
306
307 sym->start = start;
308 sym->end = len ? start + len : start;
309 sym->type = type;
310 sym->binding = binding;
311 sym->namelen = namelen - 1;
312
313 pr_debug4("%s: %s %#" PRIx64 "-%#" PRIx64 "\n",
314 __func__, name, start, sym->end);
315 memcpy(sym->name, name, namelen);
316
317 return sym;
318}
319
320void symbol__delete(struct symbol *sym)
321{
322 if (symbol_conf.priv_size) {
323 if (symbol_conf.init_annotation) {
324 struct annotation *notes = symbol__annotation(sym);
325
326 annotation__exit(notes);
327 }
328 }
329 free(((void *)sym) - symbol_conf.priv_size);
330}
331
332void symbols__delete(struct rb_root_cached *symbols)
333{
334 struct symbol *pos;
335 struct rb_node *next = rb_first_cached(symbols);
336
337 while (next) {
338 pos = rb_entry(next, struct symbol, rb_node);
339 next = rb_next(&pos->rb_node);
340 rb_erase_cached(&pos->rb_node, symbols);
341 symbol__delete(pos);
342 }
343}
344
345void __symbols__insert(struct rb_root_cached *symbols,
346 struct symbol *sym, bool kernel)
347{
348 struct rb_node **p = &symbols->rb_root.rb_node;
349 struct rb_node *parent = NULL;
350 const u64 ip = sym->start;
351 struct symbol *s;
352 bool leftmost = true;
353
354 if (kernel) {
355 const char *name = sym->name;
356 /*
357 * ppc64 uses function descriptors and appends a '.' to the
358 * start of every instruction address. Remove it.
359 */
360 if (name[0] == '.')
361 name++;
362 sym->idle = symbol__is_idle(name);
363 }
364
365 while (*p != NULL) {
366 parent = *p;
367 s = rb_entry(parent, struct symbol, rb_node);
368 if (ip < s->start)
369 p = &(*p)->rb_left;
370 else {
371 p = &(*p)->rb_right;
372 leftmost = false;
373 }
374 }
375 rb_link_node(&sym->rb_node, parent, p);
376 rb_insert_color_cached(&sym->rb_node, symbols, leftmost);
377}
378
379void symbols__insert(struct rb_root_cached *symbols, struct symbol *sym)
380{
381 __symbols__insert(symbols, sym, false);
382}
383
384static struct symbol *symbols__find(struct rb_root_cached *symbols, u64 ip)
385{
386 struct rb_node *n;
387
388 if (symbols == NULL)
389 return NULL;
390
391 n = symbols->rb_root.rb_node;
392
393 while (n) {
394 struct symbol *s = rb_entry(n, struct symbol, rb_node);
395
396 if (ip < s->start)
397 n = n->rb_left;
398 else if (ip > s->end || (ip == s->end && ip != s->start))
399 n = n->rb_right;
400 else
401 return s;
402 }
403
404 return NULL;
405}
406
407static struct symbol *symbols__first(struct rb_root_cached *symbols)
408{
409 struct rb_node *n = rb_first_cached(symbols);
410
411 if (n)
412 return rb_entry(n, struct symbol, rb_node);
413
414 return NULL;
415}
416
417static struct symbol *symbols__last(struct rb_root_cached *symbols)
418{
419 struct rb_node *n = rb_last(&symbols->rb_root);
420
421 if (n)
422 return rb_entry(n, struct symbol, rb_node);
423
424 return NULL;
425}
426
427static struct symbol *symbols__next(struct symbol *sym)
428{
429 struct rb_node *n = rb_next(&sym->rb_node);
430
431 if (n)
432 return rb_entry(n, struct symbol, rb_node);
433
434 return NULL;
435}
436
437static int symbols__sort_name_cmp(const void *vlhs, const void *vrhs)
438{
439 const struct symbol *lhs = *((const struct symbol **)vlhs);
440 const struct symbol *rhs = *((const struct symbol **)vrhs);
441
442 return strcmp(lhs->name, rhs->name);
443}
444
445static struct symbol **symbols__sort_by_name(struct rb_root_cached *source, size_t *len)
446{
447 struct rb_node *nd;
448 struct symbol **result;
449 size_t i = 0, size = 0;
450
451 for (nd = rb_first_cached(source); nd; nd = rb_next(nd))
452 size++;
453
454 result = malloc(sizeof(*result) * size);
455 if (!result)
456 return NULL;
457
458 for (nd = rb_first_cached(source); nd; nd = rb_next(nd)) {
459 struct symbol *pos = rb_entry(nd, struct symbol, rb_node);
460
461 result[i++] = pos;
462 }
463 qsort(result, size, sizeof(*result), symbols__sort_name_cmp);
464 *len = size;
465 return result;
466}
467
468int symbol__match_symbol_name(const char *name, const char *str,
469 enum symbol_tag_include includes)
470{
471 const char *versioning;
472
473 if (includes == SYMBOL_TAG_INCLUDE__DEFAULT_ONLY &&
474 (versioning = strstr(name, "@@"))) {
475 int len = strlen(str);
476
477 if (len < versioning - name)
478 len = versioning - name;
479
480 return arch__compare_symbol_names_n(name, str, len);
481 } else
482 return arch__compare_symbol_names(name, str);
483}
484
485static struct symbol *symbols__find_by_name(struct symbol *symbols[],
486 size_t symbols_len,
487 const char *name,
488 enum symbol_tag_include includes,
489 size_t *found_idx)
490{
491 size_t i, lower = 0, upper = symbols_len;
492 struct symbol *s = NULL;
493
494 if (found_idx)
495 *found_idx = SIZE_MAX;
496
497 if (!symbols_len)
498 return NULL;
499
500 while (lower < upper) {
501 int cmp;
502
503 i = (lower + upper) / 2;
504 cmp = symbol__match_symbol_name(symbols[i]->name, name, includes);
505
506 if (cmp > 0)
507 upper = i;
508 else if (cmp < 0)
509 lower = i + 1;
510 else {
511 if (found_idx)
512 *found_idx = i;
513 s = symbols[i];
514 break;
515 }
516 }
517 if (s && includes != SYMBOL_TAG_INCLUDE__DEFAULT_ONLY) {
518 /* return first symbol that has same name (if any) */
519 for (; i > 0; i--) {
520 struct symbol *tmp = symbols[i - 1];
521
522 if (!arch__compare_symbol_names(tmp->name, s->name)) {
523 if (found_idx)
524 *found_idx = i - 1;
525 s = tmp;
526 } else
527 break;
528 }
529 }
530 assert(!found_idx || !s || s == symbols[*found_idx]);
531 return s;
532}
533
534void dso__reset_find_symbol_cache(struct dso *dso)
535{
536 dso__set_last_find_result_addr(dso, 0);
537 dso__set_last_find_result_symbol(dso, NULL);
538}
539
540void dso__insert_symbol(struct dso *dso, struct symbol *sym)
541{
542 __symbols__insert(dso__symbols(dso), sym, dso__kernel(dso));
543
544 /* update the symbol cache if necessary */
545 if (dso__last_find_result_addr(dso) >= sym->start &&
546 (dso__last_find_result_addr(dso) < sym->end ||
547 sym->start == sym->end)) {
548 dso__set_last_find_result_symbol(dso, sym);
549 }
550}
551
552void dso__delete_symbol(struct dso *dso, struct symbol *sym)
553{
554 rb_erase_cached(&sym->rb_node, dso__symbols(dso));
555 symbol__delete(sym);
556 dso__reset_find_symbol_cache(dso);
557}
558
559struct symbol *dso__find_symbol(struct dso *dso, u64 addr)
560{
561 if (dso__last_find_result_addr(dso) != addr || dso__last_find_result_symbol(dso) == NULL) {
562 dso__set_last_find_result_addr(dso, addr);
563 dso__set_last_find_result_symbol(dso, symbols__find(dso__symbols(dso), addr));
564 }
565
566 return dso__last_find_result_symbol(dso);
567}
568
569struct symbol *dso__find_symbol_nocache(struct dso *dso, u64 addr)
570{
571 return symbols__find(dso__symbols(dso), addr);
572}
573
574struct symbol *dso__first_symbol(struct dso *dso)
575{
576 return symbols__first(dso__symbols(dso));
577}
578
579struct symbol *dso__last_symbol(struct dso *dso)
580{
581 return symbols__last(dso__symbols(dso));
582}
583
584struct symbol *dso__next_symbol(struct symbol *sym)
585{
586 return symbols__next(sym);
587}
588
589struct symbol *dso__next_symbol_by_name(struct dso *dso, size_t *idx)
590{
591 if (*idx + 1 >= dso__symbol_names_len(dso))
592 return NULL;
593
594 ++*idx;
595 return dso__symbol_names(dso)[*idx];
596}
597
598 /*
599 * Returns first symbol that matched with @name.
600 */
601struct symbol *dso__find_symbol_by_name(struct dso *dso, const char *name, size_t *idx)
602{
603 struct symbol *s = symbols__find_by_name(dso__symbol_names(dso),
604 dso__symbol_names_len(dso),
605 name, SYMBOL_TAG_INCLUDE__NONE, idx);
606 if (!s) {
607 s = symbols__find_by_name(dso__symbol_names(dso), dso__symbol_names_len(dso),
608 name, SYMBOL_TAG_INCLUDE__DEFAULT_ONLY, idx);
609 }
610 return s;
611}
612
613void dso__sort_by_name(struct dso *dso)
614{
615 mutex_lock(dso__lock(dso));
616 if (!dso__sorted_by_name(dso)) {
617 size_t len;
618
619 dso__set_symbol_names(dso, symbols__sort_by_name(dso__symbols(dso), &len));
620 if (dso__symbol_names(dso)) {
621 dso__set_symbol_names_len(dso, len);
622 dso__set_sorted_by_name(dso);
623 }
624 }
625 mutex_unlock(dso__lock(dso));
626}
627
628/*
629 * While we find nice hex chars, build a long_val.
630 * Return number of chars processed.
631 */
632static int hex2u64(const char *ptr, u64 *long_val)
633{
634 char *p;
635
636 *long_val = strtoull(ptr, &p, 16);
637
638 return p - ptr;
639}
640
641
642int modules__parse(const char *filename, void *arg,
643 int (*process_module)(void *arg, const char *name,
644 u64 start, u64 size))
645{
646 char *line = NULL;
647 size_t n;
648 FILE *file;
649 int err = 0;
650
651 file = fopen(filename, "r");
652 if (file == NULL)
653 return -1;
654
655 while (1) {
656 char name[PATH_MAX];
657 u64 start, size;
658 char *sep, *endptr;
659 ssize_t line_len;
660
661 line_len = getline(&line, &n, file);
662 if (line_len < 0) {
663 if (feof(file))
664 break;
665 err = -1;
666 goto out;
667 }
668
669 if (!line) {
670 err = -1;
671 goto out;
672 }
673
674 line[--line_len] = '\0'; /* \n */
675
676 sep = strrchr(line, 'x');
677 if (sep == NULL)
678 continue;
679
680 hex2u64(sep + 1, &start);
681
682 sep = strchr(line, ' ');
683 if (sep == NULL)
684 continue;
685
686 *sep = '\0';
687
688 scnprintf(name, sizeof(name), "[%s]", line);
689
690 size = strtoul(sep + 1, &endptr, 0);
691 if (*endptr != ' ' && *endptr != '\t')
692 continue;
693
694 err = process_module(arg, name, start, size);
695 if (err)
696 break;
697 }
698out:
699 free(line);
700 fclose(file);
701 return err;
702}
703
704/*
705 * These are symbols in the kernel image, so make sure that
706 * sym is from a kernel DSO.
707 */
708static bool symbol__is_idle(const char *name)
709{
710 const char * const idle_symbols[] = {
711 "acpi_idle_do_entry",
712 "acpi_processor_ffh_cstate_enter",
713 "arch_cpu_idle",
714 "cpu_idle",
715 "cpu_startup_entry",
716 "idle_cpu",
717 "intel_idle",
718 "intel_idle_ibrs",
719 "default_idle",
720 "native_safe_halt",
721 "enter_idle",
722 "exit_idle",
723 "mwait_idle",
724 "mwait_idle_with_hints",
725 "mwait_idle_with_hints.constprop.0",
726 "poll_idle",
727 "ppc64_runlatch_off",
728 "pseries_dedicated_idle_sleep",
729 "psw_idle",
730 "psw_idle_exit",
731 NULL
732 };
733 int i;
734 static struct strlist *idle_symbols_list;
735
736 if (idle_symbols_list)
737 return strlist__has_entry(idle_symbols_list, name);
738
739 idle_symbols_list = strlist__new(NULL, NULL);
740
741 for (i = 0; idle_symbols[i]; i++)
742 strlist__add(idle_symbols_list, idle_symbols[i]);
743
744 return strlist__has_entry(idle_symbols_list, name);
745}
746
747static int map__process_kallsym_symbol(void *arg, const char *name,
748 char type, u64 start)
749{
750 struct symbol *sym;
751 struct dso *dso = arg;
752 struct rb_root_cached *root = dso__symbols(dso);
753
754 if (!symbol_type__filter(type))
755 return 0;
756
757 /* Ignore local symbols for ARM modules */
758 if (name[0] == '$')
759 return 0;
760
761 /*
762 * module symbols are not sorted so we add all
763 * symbols, setting length to 0, and rely on
764 * symbols__fixup_end() to fix it up.
765 */
766 sym = symbol__new(start, 0, kallsyms2elf_binding(type), kallsyms2elf_type(type), name);
767 if (sym == NULL)
768 return -ENOMEM;
769 /*
770 * We will pass the symbols to the filter later, in
771 * map__split_kallsyms, when we have split the maps per module
772 */
773 __symbols__insert(root, sym, !strchr(name, '['));
774
775 return 0;
776}
777
778/*
779 * Loads the function entries in /proc/kallsyms into kernel_map->dso,
780 * so that we can in the next step set the symbol ->end address and then
781 * call kernel_maps__split_kallsyms.
782 */
783static int dso__load_all_kallsyms(struct dso *dso, const char *filename)
784{
785 return kallsyms__parse(filename, dso, map__process_kallsym_symbol);
786}
787
788static int maps__split_kallsyms_for_kcore(struct maps *kmaps, struct dso *dso)
789{
790 struct symbol *pos;
791 int count = 0;
792 struct rb_root_cached *root = dso__symbols(dso);
793 struct rb_root_cached old_root = *root;
794 struct rb_node *next = rb_first_cached(root);
795
796 if (!kmaps)
797 return -1;
798
799 *root = RB_ROOT_CACHED;
800
801 while (next) {
802 struct map *curr_map;
803 struct dso *curr_map_dso;
804 char *module;
805
806 pos = rb_entry(next, struct symbol, rb_node);
807 next = rb_next(&pos->rb_node);
808
809 rb_erase_cached(&pos->rb_node, &old_root);
810 RB_CLEAR_NODE(&pos->rb_node);
811 module = strchr(pos->name, '\t');
812 if (module)
813 *module = '\0';
814
815 curr_map = maps__find(kmaps, pos->start);
816
817 if (!curr_map) {
818 symbol__delete(pos);
819 continue;
820 }
821 curr_map_dso = map__dso(curr_map);
822 pos->start -= map__start(curr_map) - map__pgoff(curr_map);
823 if (pos->end > map__end(curr_map))
824 pos->end = map__end(curr_map);
825 if (pos->end)
826 pos->end -= map__start(curr_map) - map__pgoff(curr_map);
827 symbols__insert(dso__symbols(curr_map_dso), pos);
828 ++count;
829 map__put(curr_map);
830 }
831
832 /* Symbols have been adjusted */
833 dso__set_adjust_symbols(dso, true);
834
835 return count;
836}
837
838/*
839 * Split the symbols into maps, making sure there are no overlaps, i.e. the
840 * kernel range is broken in several maps, named [kernel].N, as we don't have
841 * the original ELF section names vmlinux have.
842 */
843static int maps__split_kallsyms(struct maps *kmaps, struct dso *dso, u64 delta,
844 struct map *initial_map)
845{
846 struct machine *machine;
847 struct map *curr_map = map__get(initial_map);
848 struct symbol *pos;
849 int count = 0, moved = 0;
850 struct rb_root_cached *root = dso__symbols(dso);
851 struct rb_node *next = rb_first_cached(root);
852 int kernel_range = 0;
853 bool x86_64;
854
855 if (!kmaps)
856 return -1;
857
858 machine = maps__machine(kmaps);
859
860 x86_64 = machine__is(machine, "x86_64");
861
862 while (next) {
863 char *module;
864
865 pos = rb_entry(next, struct symbol, rb_node);
866 next = rb_next(&pos->rb_node);
867
868 module = strchr(pos->name, '\t');
869 if (module) {
870 struct dso *curr_map_dso;
871
872 if (!symbol_conf.use_modules)
873 goto discard_symbol;
874
875 *module++ = '\0';
876 curr_map_dso = map__dso(curr_map);
877 if (strcmp(dso__short_name(curr_map_dso), module)) {
878 if (!RC_CHK_EQUAL(curr_map, initial_map) &&
879 dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST &&
880 machine__is_default_guest(machine)) {
881 /*
882 * We assume all symbols of a module are
883 * continuous in * kallsyms, so curr_map
884 * points to a module and all its
885 * symbols are in its kmap. Mark it as
886 * loaded.
887 */
888 dso__set_loaded(curr_map_dso);
889 }
890
891 map__zput(curr_map);
892 curr_map = maps__find_by_name(kmaps, module);
893 if (curr_map == NULL) {
894 pr_debug("%s/proc/{kallsyms,modules} "
895 "inconsistency while looking "
896 "for \"%s\" module!\n",
897 machine->root_dir, module);
898 curr_map = map__get(initial_map);
899 goto discard_symbol;
900 }
901 curr_map_dso = map__dso(curr_map);
902 if (dso__loaded(curr_map_dso) &&
903 !machine__is_default_guest(machine))
904 goto discard_symbol;
905 }
906 /*
907 * So that we look just like we get from .ko files,
908 * i.e. not prelinked, relative to initial_map->start.
909 */
910 pos->start = map__map_ip(curr_map, pos->start);
911 pos->end = map__map_ip(curr_map, pos->end);
912 } else if (x86_64 && is_entry_trampoline(pos->name)) {
913 /*
914 * These symbols are not needed anymore since the
915 * trampoline maps refer to the text section and it's
916 * symbols instead. Avoid having to deal with
917 * relocations, and the assumption that the first symbol
918 * is the start of kernel text, by simply removing the
919 * symbols at this point.
920 */
921 goto discard_symbol;
922 } else if (!RC_CHK_EQUAL(curr_map, initial_map)) {
923 char dso_name[PATH_MAX];
924 struct dso *ndso;
925
926 if (delta) {
927 /* Kernel was relocated at boot time */
928 pos->start -= delta;
929 pos->end -= delta;
930 }
931
932 if (count == 0) {
933 map__zput(curr_map);
934 curr_map = map__get(initial_map);
935 goto add_symbol;
936 }
937
938 if (dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST)
939 snprintf(dso_name, sizeof(dso_name),
940 "[guest.kernel].%d",
941 kernel_range++);
942 else
943 snprintf(dso_name, sizeof(dso_name),
944 "[kernel].%d",
945 kernel_range++);
946
947 ndso = dso__new(dso_name);
948 map__zput(curr_map);
949 if (ndso == NULL)
950 return -1;
951
952 dso__set_kernel(ndso, dso__kernel(dso));
953
954 curr_map = map__new2(pos->start, ndso);
955 if (curr_map == NULL) {
956 dso__put(ndso);
957 return -1;
958 }
959
960 map__set_mapping_type(curr_map, MAPPING_TYPE__IDENTITY);
961 if (maps__insert(kmaps, curr_map)) {
962 map__zput(curr_map);
963 dso__put(ndso);
964 return -1;
965 }
966 ++kernel_range;
967 } else if (delta) {
968 /* Kernel was relocated at boot time */
969 pos->start -= delta;
970 pos->end -= delta;
971 }
972add_symbol:
973 if (!RC_CHK_EQUAL(curr_map, initial_map)) {
974 struct dso *curr_map_dso = map__dso(curr_map);
975
976 rb_erase_cached(&pos->rb_node, root);
977 symbols__insert(dso__symbols(curr_map_dso), pos);
978 ++moved;
979 } else
980 ++count;
981
982 continue;
983discard_symbol:
984 rb_erase_cached(&pos->rb_node, root);
985 symbol__delete(pos);
986 }
987
988 if (!RC_CHK_EQUAL(curr_map, initial_map) &&
989 dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST &&
990 machine__is_default_guest(maps__machine(kmaps))) {
991 dso__set_loaded(map__dso(curr_map));
992 }
993 map__put(curr_map);
994 return count + moved;
995}
996
997bool symbol__restricted_filename(const char *filename,
998 const char *restricted_filename)
999{
1000 bool restricted = false;
1001
1002 if (symbol_conf.kptr_restrict) {
1003 char *r = realpath(filename, NULL);
1004
1005 if (r != NULL) {
1006 restricted = strcmp(r, restricted_filename) == 0;
1007 free(r);
1008 return restricted;
1009 }
1010 }
1011
1012 return restricted;
1013}
1014
1015struct module_info {
1016 struct rb_node rb_node;
1017 char *name;
1018 u64 start;
1019};
1020
1021static void add_module(struct module_info *mi, struct rb_root *modules)
1022{
1023 struct rb_node **p = &modules->rb_node;
1024 struct rb_node *parent = NULL;
1025 struct module_info *m;
1026
1027 while (*p != NULL) {
1028 parent = *p;
1029 m = rb_entry(parent, struct module_info, rb_node);
1030 if (strcmp(mi->name, m->name) < 0)
1031 p = &(*p)->rb_left;
1032 else
1033 p = &(*p)->rb_right;
1034 }
1035 rb_link_node(&mi->rb_node, parent, p);
1036 rb_insert_color(&mi->rb_node, modules);
1037}
1038
1039static void delete_modules(struct rb_root *modules)
1040{
1041 struct module_info *mi;
1042 struct rb_node *next = rb_first(modules);
1043
1044 while (next) {
1045 mi = rb_entry(next, struct module_info, rb_node);
1046 next = rb_next(&mi->rb_node);
1047 rb_erase(&mi->rb_node, modules);
1048 zfree(&mi->name);
1049 free(mi);
1050 }
1051}
1052
1053static struct module_info *find_module(const char *name,
1054 struct rb_root *modules)
1055{
1056 struct rb_node *n = modules->rb_node;
1057
1058 while (n) {
1059 struct module_info *m;
1060 int cmp;
1061
1062 m = rb_entry(n, struct module_info, rb_node);
1063 cmp = strcmp(name, m->name);
1064 if (cmp < 0)
1065 n = n->rb_left;
1066 else if (cmp > 0)
1067 n = n->rb_right;
1068 else
1069 return m;
1070 }
1071
1072 return NULL;
1073}
1074
1075static int __read_proc_modules(void *arg, const char *name, u64 start,
1076 u64 size __maybe_unused)
1077{
1078 struct rb_root *modules = arg;
1079 struct module_info *mi;
1080
1081 mi = zalloc(sizeof(struct module_info));
1082 if (!mi)
1083 return -ENOMEM;
1084
1085 mi->name = strdup(name);
1086 mi->start = start;
1087
1088 if (!mi->name) {
1089 free(mi);
1090 return -ENOMEM;
1091 }
1092
1093 add_module(mi, modules);
1094
1095 return 0;
1096}
1097
1098static int read_proc_modules(const char *filename, struct rb_root *modules)
1099{
1100 if (symbol__restricted_filename(filename, "/proc/modules"))
1101 return -1;
1102
1103 if (modules__parse(filename, modules, __read_proc_modules)) {
1104 delete_modules(modules);
1105 return -1;
1106 }
1107
1108 return 0;
1109}
1110
1111int compare_proc_modules(const char *from, const char *to)
1112{
1113 struct rb_root from_modules = RB_ROOT;
1114 struct rb_root to_modules = RB_ROOT;
1115 struct rb_node *from_node, *to_node;
1116 struct module_info *from_m, *to_m;
1117 int ret = -1;
1118
1119 if (read_proc_modules(from, &from_modules))
1120 return -1;
1121
1122 if (read_proc_modules(to, &to_modules))
1123 goto out_delete_from;
1124
1125 from_node = rb_first(&from_modules);
1126 to_node = rb_first(&to_modules);
1127 while (from_node) {
1128 if (!to_node)
1129 break;
1130
1131 from_m = rb_entry(from_node, struct module_info, rb_node);
1132 to_m = rb_entry(to_node, struct module_info, rb_node);
1133
1134 if (from_m->start != to_m->start ||
1135 strcmp(from_m->name, to_m->name))
1136 break;
1137
1138 from_node = rb_next(from_node);
1139 to_node = rb_next(to_node);
1140 }
1141
1142 if (!from_node && !to_node)
1143 ret = 0;
1144
1145 delete_modules(&to_modules);
1146out_delete_from:
1147 delete_modules(&from_modules);
1148
1149 return ret;
1150}
1151
1152static int do_validate_kcore_modules_cb(struct map *old_map, void *data)
1153{
1154 struct rb_root *modules = data;
1155 struct module_info *mi;
1156 struct dso *dso;
1157
1158 if (!__map__is_kmodule(old_map))
1159 return 0;
1160
1161 dso = map__dso(old_map);
1162 /* Module must be in memory at the same address */
1163 mi = find_module(dso__short_name(dso), modules);
1164 if (!mi || mi->start != map__start(old_map))
1165 return -EINVAL;
1166
1167 return 0;
1168}
1169
1170static int do_validate_kcore_modules(const char *filename, struct maps *kmaps)
1171{
1172 struct rb_root modules = RB_ROOT;
1173 int err;
1174
1175 err = read_proc_modules(filename, &modules);
1176 if (err)
1177 return err;
1178
1179 err = maps__for_each_map(kmaps, do_validate_kcore_modules_cb, &modules);
1180
1181 delete_modules(&modules);
1182 return err;
1183}
1184
1185/*
1186 * If kallsyms is referenced by name then we look for filename in the same
1187 * directory.
1188 */
1189static bool filename_from_kallsyms_filename(char *filename,
1190 const char *base_name,
1191 const char *kallsyms_filename)
1192{
1193 char *name;
1194
1195 strcpy(filename, kallsyms_filename);
1196 name = strrchr(filename, '/');
1197 if (!name)
1198 return false;
1199
1200 name += 1;
1201
1202 if (!strcmp(name, "kallsyms")) {
1203 strcpy(name, base_name);
1204 return true;
1205 }
1206
1207 return false;
1208}
1209
1210static int validate_kcore_modules(const char *kallsyms_filename,
1211 struct map *map)
1212{
1213 struct maps *kmaps = map__kmaps(map);
1214 char modules_filename[PATH_MAX];
1215
1216 if (!kmaps)
1217 return -EINVAL;
1218
1219 if (!filename_from_kallsyms_filename(modules_filename, "modules",
1220 kallsyms_filename))
1221 return -EINVAL;
1222
1223 if (do_validate_kcore_modules(modules_filename, kmaps))
1224 return -EINVAL;
1225
1226 return 0;
1227}
1228
1229static int validate_kcore_addresses(const char *kallsyms_filename,
1230 struct map *map)
1231{
1232 struct kmap *kmap = map__kmap(map);
1233
1234 if (!kmap)
1235 return -EINVAL;
1236
1237 if (kmap->ref_reloc_sym && kmap->ref_reloc_sym->name) {
1238 u64 start;
1239
1240 if (kallsyms__get_function_start(kallsyms_filename,
1241 kmap->ref_reloc_sym->name, &start))
1242 return -ENOENT;
1243 if (start != kmap->ref_reloc_sym->addr)
1244 return -EINVAL;
1245 }
1246
1247 return validate_kcore_modules(kallsyms_filename, map);
1248}
1249
1250struct kcore_mapfn_data {
1251 struct dso *dso;
1252 struct list_head maps;
1253};
1254
1255static int kcore_mapfn(u64 start, u64 len, u64 pgoff, void *data)
1256{
1257 struct kcore_mapfn_data *md = data;
1258 struct map_list_node *list_node = map_list_node__new();
1259
1260 if (!list_node)
1261 return -ENOMEM;
1262
1263 list_node->map = map__new2(start, md->dso);
1264 if (!list_node->map) {
1265 free(list_node);
1266 return -ENOMEM;
1267 }
1268
1269 map__set_end(list_node->map, map__start(list_node->map) + len);
1270 map__set_pgoff(list_node->map, pgoff);
1271
1272 list_add(&list_node->node, &md->maps);
1273
1274 return 0;
1275}
1276
1277static bool remove_old_maps(struct map *map, void *data)
1278{
1279 const struct map *map_to_save = data;
1280
1281 /*
1282 * We need to preserve eBPF maps even if they are covered by kcore,
1283 * because we need to access eBPF dso for source data.
1284 */
1285 return !RC_CHK_EQUAL(map, map_to_save) && !__map__is_bpf_prog(map);
1286}
1287
1288static int dso__load_kcore(struct dso *dso, struct map *map,
1289 const char *kallsyms_filename)
1290{
1291 struct maps *kmaps = map__kmaps(map);
1292 struct kcore_mapfn_data md;
1293 struct map *map_ref, *replacement_map = NULL;
1294 struct machine *machine;
1295 bool is_64_bit;
1296 int err, fd;
1297 char kcore_filename[PATH_MAX];
1298 u64 stext;
1299
1300 if (!kmaps)
1301 return -EINVAL;
1302
1303 machine = maps__machine(kmaps);
1304
1305 /* This function requires that the map is the kernel map */
1306 if (!__map__is_kernel(map))
1307 return -EINVAL;
1308
1309 if (!filename_from_kallsyms_filename(kcore_filename, "kcore",
1310 kallsyms_filename))
1311 return -EINVAL;
1312
1313 /* Modules and kernel must be present at their original addresses */
1314 if (validate_kcore_addresses(kallsyms_filename, map))
1315 return -EINVAL;
1316
1317 md.dso = dso;
1318 INIT_LIST_HEAD(&md.maps);
1319
1320 fd = open(kcore_filename, O_RDONLY);
1321 if (fd < 0) {
1322 pr_debug("Failed to open %s. Note /proc/kcore requires CAP_SYS_RAWIO capability to access.\n",
1323 kcore_filename);
1324 return -EINVAL;
1325 }
1326
1327 /* Read new maps into temporary lists */
1328 err = file__read_maps(fd, map__prot(map) & PROT_EXEC, kcore_mapfn, &md,
1329 &is_64_bit);
1330 if (err)
1331 goto out_err;
1332 dso__set_is_64_bit(dso, is_64_bit);
1333
1334 if (list_empty(&md.maps)) {
1335 err = -EINVAL;
1336 goto out_err;
1337 }
1338
1339 /* Remove old maps */
1340 maps__remove_maps(kmaps, remove_old_maps, map);
1341 machine->trampolines_mapped = false;
1342
1343 /* Find the kernel map using the '_stext' symbol */
1344 if (!kallsyms__get_function_start(kallsyms_filename, "_stext", &stext)) {
1345 u64 replacement_size = 0;
1346 struct map_list_node *new_node;
1347
1348 list_for_each_entry(new_node, &md.maps, node) {
1349 struct map *new_map = new_node->map;
1350 u64 new_size = map__size(new_map);
1351
1352 if (!(stext >= map__start(new_map) && stext < map__end(new_map)))
1353 continue;
1354
1355 /*
1356 * On some architectures, ARM64 for example, the kernel
1357 * text can get allocated inside of the vmalloc segment.
1358 * Select the smallest matching segment, in case stext
1359 * falls within more than one in the list.
1360 */
1361 if (!replacement_map || new_size < replacement_size) {
1362 replacement_map = new_map;
1363 replacement_size = new_size;
1364 }
1365 }
1366 }
1367
1368 if (!replacement_map)
1369 replacement_map = list_entry(md.maps.next, struct map_list_node, node)->map;
1370
1371 /*
1372 * Update addresses of vmlinux map. Re-insert it to ensure maps are
1373 * correctly ordered. Do this before using maps__merge_in() for the
1374 * remaining maps so vmlinux gets split if necessary.
1375 */
1376 map_ref = map__get(map);
1377 maps__remove(kmaps, map_ref);
1378
1379 map__set_start(map_ref, map__start(replacement_map));
1380 map__set_end(map_ref, map__end(replacement_map));
1381 map__set_pgoff(map_ref, map__pgoff(replacement_map));
1382 map__set_mapping_type(map_ref, map__mapping_type(replacement_map));
1383
1384 err = maps__insert(kmaps, map_ref);
1385 map__put(map_ref);
1386 if (err)
1387 goto out_err;
1388
1389 /* Add new maps */
1390 while (!list_empty(&md.maps)) {
1391 struct map_list_node *new_node = list_entry(md.maps.next, struct map_list_node, node);
1392 struct map *new_map = new_node->map;
1393
1394 list_del_init(&new_node->node);
1395
1396 /* skip if replacement_map, already inserted above */
1397 if (!RC_CHK_EQUAL(new_map, replacement_map)) {
1398 /*
1399 * Merge kcore map into existing maps,
1400 * and ensure that current maps (eBPF)
1401 * stay intact.
1402 */
1403 if (maps__merge_in(kmaps, new_map)) {
1404 err = -EINVAL;
1405 goto out_err;
1406 }
1407 }
1408 free(new_node);
1409 }
1410
1411 if (machine__is(machine, "x86_64")) {
1412 u64 addr;
1413
1414 /*
1415 * If one of the corresponding symbols is there, assume the
1416 * entry trampoline maps are too.
1417 */
1418 if (!kallsyms__get_function_start(kallsyms_filename,
1419 ENTRY_TRAMPOLINE_NAME,
1420 &addr))
1421 machine->trampolines_mapped = true;
1422 }
1423
1424 /*
1425 * Set the data type and long name so that kcore can be read via
1426 * dso__data_read_addr().
1427 */
1428 if (dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST)
1429 dso__set_binary_type(dso, DSO_BINARY_TYPE__GUEST_KCORE);
1430 else
1431 dso__set_binary_type(dso, DSO_BINARY_TYPE__KCORE);
1432 dso__set_long_name(dso, strdup(kcore_filename), true);
1433
1434 close(fd);
1435
1436 if (map__prot(map) & PROT_EXEC)
1437 pr_debug("Using %s for kernel object code\n", kcore_filename);
1438 else
1439 pr_debug("Using %s for kernel data\n", kcore_filename);
1440
1441 return 0;
1442
1443out_err:
1444 while (!list_empty(&md.maps)) {
1445 struct map_list_node *list_node;
1446
1447 list_node = list_entry(md.maps.next, struct map_list_node, node);
1448 list_del_init(&list_node->node);
1449 map__zput(list_node->map);
1450 free(list_node);
1451 }
1452 close(fd);
1453 return err;
1454}
1455
1456/*
1457 * If the kernel is relocated at boot time, kallsyms won't match. Compute the
1458 * delta based on the relocation reference symbol.
1459 */
1460static int kallsyms__delta(struct kmap *kmap, const char *filename, u64 *delta)
1461{
1462 u64 addr;
1463
1464 if (!kmap->ref_reloc_sym || !kmap->ref_reloc_sym->name)
1465 return 0;
1466
1467 if (kallsyms__get_function_start(filename, kmap->ref_reloc_sym->name, &addr))
1468 return -1;
1469
1470 *delta = addr - kmap->ref_reloc_sym->addr;
1471 return 0;
1472}
1473
1474int __dso__load_kallsyms(struct dso *dso, const char *filename,
1475 struct map *map, bool no_kcore)
1476{
1477 struct kmap *kmap = map__kmap(map);
1478 u64 delta = 0;
1479
1480 if (symbol__restricted_filename(filename, "/proc/kallsyms"))
1481 return -1;
1482
1483 if (!kmap || !kmap->kmaps)
1484 return -1;
1485
1486 if (dso__load_all_kallsyms(dso, filename) < 0)
1487 return -1;
1488
1489 if (kallsyms__delta(kmap, filename, &delta))
1490 return -1;
1491
1492 symbols__fixup_end(dso__symbols(dso), true);
1493 symbols__fixup_duplicate(dso__symbols(dso));
1494
1495 if (dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST)
1496 dso__set_symtab_type(dso, DSO_BINARY_TYPE__GUEST_KALLSYMS);
1497 else
1498 dso__set_symtab_type(dso, DSO_BINARY_TYPE__KALLSYMS);
1499
1500 if (!no_kcore && !dso__load_kcore(dso, map, filename))
1501 return maps__split_kallsyms_for_kcore(kmap->kmaps, dso);
1502 else
1503 return maps__split_kallsyms(kmap->kmaps, dso, delta, map);
1504}
1505
1506int dso__load_kallsyms(struct dso *dso, const char *filename,
1507 struct map *map)
1508{
1509 return __dso__load_kallsyms(dso, filename, map, false);
1510}
1511
1512static int dso__load_perf_map(const char *map_path, struct dso *dso)
1513{
1514 char *line = NULL;
1515 size_t n;
1516 FILE *file;
1517 int nr_syms = 0;
1518
1519 file = fopen(map_path, "r");
1520 if (file == NULL)
1521 goto out_failure;
1522
1523 while (!feof(file)) {
1524 u64 start, size;
1525 struct symbol *sym;
1526 int line_len, len;
1527
1528 line_len = getline(&line, &n, file);
1529 if (line_len < 0)
1530 break;
1531
1532 if (!line)
1533 goto out_failure;
1534
1535 line[--line_len] = '\0'; /* \n */
1536
1537 len = hex2u64(line, &start);
1538
1539 len++;
1540 if (len + 2 >= line_len)
1541 continue;
1542
1543 len += hex2u64(line + len, &size);
1544
1545 len++;
1546 if (len + 2 >= line_len)
1547 continue;
1548
1549 sym = symbol__new(start, size, STB_GLOBAL, STT_FUNC, line + len);
1550
1551 if (sym == NULL)
1552 goto out_delete_line;
1553
1554 symbols__insert(dso__symbols(dso), sym);
1555 nr_syms++;
1556 }
1557
1558 free(line);
1559 fclose(file);
1560
1561 return nr_syms;
1562
1563out_delete_line:
1564 free(line);
1565out_failure:
1566 return -1;
1567}
1568
1569#ifdef HAVE_LIBBFD_SUPPORT
1570#define PACKAGE 'perf'
1571#include <bfd.h>
1572
1573static int bfd_symbols__cmpvalue(const void *a, const void *b)
1574{
1575 const asymbol *as = *(const asymbol **)a, *bs = *(const asymbol **)b;
1576
1577 if (bfd_asymbol_value(as) != bfd_asymbol_value(bs))
1578 return bfd_asymbol_value(as) - bfd_asymbol_value(bs);
1579
1580 return bfd_asymbol_name(as)[0] - bfd_asymbol_name(bs)[0];
1581}
1582
1583static int bfd2elf_binding(asymbol *symbol)
1584{
1585 if (symbol->flags & BSF_WEAK)
1586 return STB_WEAK;
1587 if (symbol->flags & BSF_GLOBAL)
1588 return STB_GLOBAL;
1589 if (symbol->flags & BSF_LOCAL)
1590 return STB_LOCAL;
1591 return -1;
1592}
1593
1594int dso__load_bfd_symbols(struct dso *dso, const char *debugfile)
1595{
1596 int err = -1;
1597 long symbols_size, symbols_count, i;
1598 asection *section;
1599 asymbol **symbols, *sym;
1600 struct symbol *symbol;
1601 bfd *abfd;
1602 u64 start, len;
1603
1604 abfd = bfd_openr(debugfile, NULL);
1605 if (!abfd)
1606 return -1;
1607
1608 if (!bfd_check_format(abfd, bfd_object)) {
1609 pr_debug2("%s: cannot read %s bfd file.\n", __func__,
1610 dso->long_name);
1611 goto out_close;
1612 }
1613
1614 if (bfd_get_flavour(abfd) == bfd_target_elf_flavour)
1615 goto out_close;
1616
1617 symbols_size = bfd_get_symtab_upper_bound(abfd);
1618 if (symbols_size == 0) {
1619 bfd_close(abfd);
1620 return 0;
1621 }
1622
1623 if (symbols_size < 0)
1624 goto out_close;
1625
1626 symbols = malloc(symbols_size);
1627 if (!symbols)
1628 goto out_close;
1629
1630 symbols_count = bfd_canonicalize_symtab(abfd, symbols);
1631 if (symbols_count < 0)
1632 goto out_free;
1633
1634 section = bfd_get_section_by_name(abfd, ".text");
1635 if (section) {
1636 for (i = 0; i < symbols_count; ++i) {
1637 if (!strcmp(bfd_asymbol_name(symbols[i]), "__ImageBase") ||
1638 !strcmp(bfd_asymbol_name(symbols[i]), "__image_base__"))
1639 break;
1640 }
1641 if (i < symbols_count) {
1642 /* PE symbols can only have 4 bytes, so use .text high bits */
1643 dso->text_offset = section->vma - (u32)section->vma;
1644 dso->text_offset += (u32)bfd_asymbol_value(symbols[i]);
1645 dso->text_end = (section->vma - dso->text_offset) + section->size;
1646 } else {
1647 dso->text_offset = section->vma - section->filepos;
1648 dso->text_end = section->filepos + section->size;
1649 }
1650 }
1651
1652 qsort(symbols, symbols_count, sizeof(asymbol *), bfd_symbols__cmpvalue);
1653
1654#ifdef bfd_get_section
1655#define bfd_asymbol_section bfd_get_section
1656#endif
1657 for (i = 0; i < symbols_count; ++i) {
1658 sym = symbols[i];
1659 section = bfd_asymbol_section(sym);
1660 if (bfd2elf_binding(sym) < 0)
1661 continue;
1662
1663 while (i + 1 < symbols_count &&
1664 bfd_asymbol_section(symbols[i + 1]) == section &&
1665 bfd2elf_binding(symbols[i + 1]) < 0)
1666 i++;
1667
1668 if (i + 1 < symbols_count &&
1669 bfd_asymbol_section(symbols[i + 1]) == section)
1670 len = symbols[i + 1]->value - sym->value;
1671 else
1672 len = section->size - sym->value;
1673
1674 start = bfd_asymbol_value(sym) - dso->text_offset;
1675 symbol = symbol__new(start, len, bfd2elf_binding(sym), STT_FUNC,
1676 bfd_asymbol_name(sym));
1677 if (!symbol)
1678 goto out_free;
1679
1680 symbols__insert(dso__symbols(dso), symbol);
1681 }
1682#ifdef bfd_get_section
1683#undef bfd_asymbol_section
1684#endif
1685
1686 symbols__fixup_end(dso__symbols(dso), false);
1687 symbols__fixup_duplicate(dso__symbols(dso));
1688 dso__set_adjust_symbols(dso, true);
1689
1690 err = 0;
1691out_free:
1692 free(symbols);
1693out_close:
1694 bfd_close(abfd);
1695 return err;
1696}
1697#endif
1698
1699static bool dso__is_compatible_symtab_type(struct dso *dso, bool kmod,
1700 enum dso_binary_type type)
1701{
1702 switch (type) {
1703 case DSO_BINARY_TYPE__JAVA_JIT:
1704 case DSO_BINARY_TYPE__DEBUGLINK:
1705 case DSO_BINARY_TYPE__SYSTEM_PATH_DSO:
1706 case DSO_BINARY_TYPE__FEDORA_DEBUGINFO:
1707 case DSO_BINARY_TYPE__UBUNTU_DEBUGINFO:
1708 case DSO_BINARY_TYPE__MIXEDUP_UBUNTU_DEBUGINFO:
1709 case DSO_BINARY_TYPE__BUILDID_DEBUGINFO:
1710 case DSO_BINARY_TYPE__OPENEMBEDDED_DEBUGINFO:
1711 return !kmod && dso__kernel(dso) == DSO_SPACE__USER;
1712
1713 case DSO_BINARY_TYPE__KALLSYMS:
1714 case DSO_BINARY_TYPE__VMLINUX:
1715 case DSO_BINARY_TYPE__KCORE:
1716 return dso__kernel(dso) == DSO_SPACE__KERNEL;
1717
1718 case DSO_BINARY_TYPE__GUEST_KALLSYMS:
1719 case DSO_BINARY_TYPE__GUEST_VMLINUX:
1720 case DSO_BINARY_TYPE__GUEST_KCORE:
1721 return dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST;
1722
1723 case DSO_BINARY_TYPE__GUEST_KMODULE:
1724 case DSO_BINARY_TYPE__GUEST_KMODULE_COMP:
1725 case DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE:
1726 case DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP:
1727 /*
1728 * kernel modules know their symtab type - it's set when
1729 * creating a module dso in machine__addnew_module_map().
1730 */
1731 return kmod && dso__symtab_type(dso) == type;
1732
1733 case DSO_BINARY_TYPE__BUILD_ID_CACHE:
1734 case DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO:
1735 return true;
1736
1737 case DSO_BINARY_TYPE__BPF_PROG_INFO:
1738 case DSO_BINARY_TYPE__BPF_IMAGE:
1739 case DSO_BINARY_TYPE__OOL:
1740 case DSO_BINARY_TYPE__NOT_FOUND:
1741 default:
1742 return false;
1743 }
1744}
1745
1746/* Checks for the existence of the perf-<pid>.map file in two different
1747 * locations. First, if the process is a separate mount namespace, check in
1748 * that namespace using the pid of the innermost pid namespace. If's not in a
1749 * namespace, or the file can't be found there, try in the mount namespace of
1750 * the tracing process using our view of its pid.
1751 */
1752static int dso__find_perf_map(char *filebuf, size_t bufsz,
1753 struct nsinfo **nsip)
1754{
1755 struct nscookie nsc;
1756 struct nsinfo *nsi;
1757 struct nsinfo *nnsi;
1758 int rc = -1;
1759
1760 nsi = *nsip;
1761
1762 if (nsinfo__need_setns(nsi)) {
1763 snprintf(filebuf, bufsz, "/tmp/perf-%d.map", nsinfo__nstgid(nsi));
1764 nsinfo__mountns_enter(nsi, &nsc);
1765 rc = access(filebuf, R_OK);
1766 nsinfo__mountns_exit(&nsc);
1767 if (rc == 0)
1768 return rc;
1769 }
1770
1771 nnsi = nsinfo__copy(nsi);
1772 if (nnsi) {
1773 nsinfo__put(nsi);
1774
1775 nsinfo__clear_need_setns(nnsi);
1776 snprintf(filebuf, bufsz, "/tmp/perf-%d.map", nsinfo__tgid(nnsi));
1777 *nsip = nnsi;
1778 rc = 0;
1779 }
1780
1781 return rc;
1782}
1783
1784int dso__load(struct dso *dso, struct map *map)
1785{
1786 char *name;
1787 int ret = -1;
1788 u_int i;
1789 struct machine *machine = NULL;
1790 char *root_dir = (char *) "";
1791 int ss_pos = 0;
1792 struct symsrc ss_[2];
1793 struct symsrc *syms_ss = NULL, *runtime_ss = NULL;
1794 bool kmod;
1795 bool perfmap;
1796 struct build_id bid;
1797 struct nscookie nsc;
1798 char newmapname[PATH_MAX];
1799 const char *map_path = dso__long_name(dso);
1800
1801 mutex_lock(dso__lock(dso));
1802 perfmap = strncmp(dso__name(dso), "/tmp/perf-", 10) == 0;
1803 if (perfmap) {
1804 if (dso__nsinfo(dso) &&
1805 (dso__find_perf_map(newmapname, sizeof(newmapname),
1806 dso__nsinfo_ptr(dso)) == 0)) {
1807 map_path = newmapname;
1808 }
1809 }
1810
1811 nsinfo__mountns_enter(dso__nsinfo(dso), &nsc);
1812
1813 /* check again under the dso->lock */
1814 if (dso__loaded(dso)) {
1815 ret = 1;
1816 goto out;
1817 }
1818
1819 kmod = dso__symtab_type(dso) == DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE ||
1820 dso__symtab_type(dso) == DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP ||
1821 dso__symtab_type(dso) == DSO_BINARY_TYPE__GUEST_KMODULE ||
1822 dso__symtab_type(dso) == DSO_BINARY_TYPE__GUEST_KMODULE_COMP;
1823
1824 if (dso__kernel(dso) && !kmod) {
1825 if (dso__kernel(dso) == DSO_SPACE__KERNEL)
1826 ret = dso__load_kernel_sym(dso, map);
1827 else if (dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST)
1828 ret = dso__load_guest_kernel_sym(dso, map);
1829
1830 machine = maps__machine(map__kmaps(map));
1831 if (machine__is(machine, "x86_64"))
1832 machine__map_x86_64_entry_trampolines(machine, dso);
1833 goto out;
1834 }
1835
1836 dso__set_adjust_symbols(dso, false);
1837
1838 if (perfmap) {
1839 ret = dso__load_perf_map(map_path, dso);
1840 dso__set_symtab_type(dso, ret > 0
1841 ? DSO_BINARY_TYPE__JAVA_JIT
1842 : DSO_BINARY_TYPE__NOT_FOUND);
1843 goto out;
1844 }
1845
1846 if (machine)
1847 root_dir = machine->root_dir;
1848
1849 name = malloc(PATH_MAX);
1850 if (!name)
1851 goto out;
1852
1853 /*
1854 * Read the build id if possible. This is required for
1855 * DSO_BINARY_TYPE__BUILDID_DEBUGINFO to work
1856 */
1857 if (!dso__has_build_id(dso) &&
1858 is_regular_file(dso__long_name(dso))) {
1859 __symbol__join_symfs(name, PATH_MAX, dso__long_name(dso));
1860 if (filename__read_build_id(name, &bid) > 0)
1861 dso__set_build_id(dso, &bid);
1862 }
1863
1864 /*
1865 * Iterate over candidate debug images.
1866 * Keep track of "interesting" ones (those which have a symtab, dynsym,
1867 * and/or opd section) for processing.
1868 */
1869 for (i = 0; i < DSO_BINARY_TYPE__SYMTAB_CNT; i++) {
1870 struct symsrc *ss = &ss_[ss_pos];
1871 bool next_slot = false;
1872 bool is_reg;
1873 bool nsexit;
1874 int bfdrc = -1;
1875 int sirc = -1;
1876
1877 enum dso_binary_type symtab_type = binary_type_symtab[i];
1878
1879 nsexit = (symtab_type == DSO_BINARY_TYPE__BUILD_ID_CACHE ||
1880 symtab_type == DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO);
1881
1882 if (!dso__is_compatible_symtab_type(dso, kmod, symtab_type))
1883 continue;
1884
1885 if (dso__read_binary_type_filename(dso, symtab_type,
1886 root_dir, name, PATH_MAX))
1887 continue;
1888
1889 if (nsexit)
1890 nsinfo__mountns_exit(&nsc);
1891
1892 is_reg = is_regular_file(name);
1893 if (!is_reg && errno == ENOENT && dso__nsinfo(dso)) {
1894 char *new_name = dso__filename_with_chroot(dso, name);
1895 if (new_name) {
1896 is_reg = is_regular_file(new_name);
1897 strlcpy(name, new_name, PATH_MAX);
1898 free(new_name);
1899 }
1900 }
1901
1902#ifdef HAVE_LIBBFD_SUPPORT
1903 if (is_reg)
1904 bfdrc = dso__load_bfd_symbols(dso, name);
1905#endif
1906 if (is_reg && bfdrc < 0)
1907 sirc = symsrc__init(ss, dso, name, symtab_type);
1908
1909 if (nsexit)
1910 nsinfo__mountns_enter(dso__nsinfo(dso), &nsc);
1911
1912 if (bfdrc == 0) {
1913 ret = 0;
1914 break;
1915 }
1916
1917 if (!is_reg || sirc < 0)
1918 continue;
1919
1920 if (!syms_ss && symsrc__has_symtab(ss)) {
1921 syms_ss = ss;
1922 next_slot = true;
1923 if (!dso__symsrc_filename(dso))
1924 dso__set_symsrc_filename(dso, strdup(name));
1925 }
1926
1927 if (!runtime_ss && symsrc__possibly_runtime(ss)) {
1928 runtime_ss = ss;
1929 next_slot = true;
1930 }
1931
1932 if (next_slot) {
1933 ss_pos++;
1934
1935 if (syms_ss && runtime_ss)
1936 break;
1937 } else {
1938 symsrc__destroy(ss);
1939 }
1940
1941 }
1942
1943 if (!runtime_ss && !syms_ss)
1944 goto out_free;
1945
1946 if (runtime_ss && !syms_ss) {
1947 syms_ss = runtime_ss;
1948 }
1949
1950 /* We'll have to hope for the best */
1951 if (!runtime_ss && syms_ss)
1952 runtime_ss = syms_ss;
1953
1954 if (syms_ss)
1955 ret = dso__load_sym(dso, map, syms_ss, runtime_ss, kmod);
1956 else
1957 ret = -1;
1958
1959 if (ret > 0) {
1960 int nr_plt;
1961
1962 nr_plt = dso__synthesize_plt_symbols(dso, runtime_ss);
1963 if (nr_plt > 0)
1964 ret += nr_plt;
1965 }
1966
1967 for (; ss_pos > 0; ss_pos--)
1968 symsrc__destroy(&ss_[ss_pos - 1]);
1969out_free:
1970 free(name);
1971 if (ret < 0 && strstr(dso__name(dso), " (deleted)") != NULL)
1972 ret = 0;
1973out:
1974 dso__set_loaded(dso);
1975 mutex_unlock(dso__lock(dso));
1976 nsinfo__mountns_exit(&nsc);
1977
1978 return ret;
1979}
1980
1981/*
1982 * Always takes ownership of vmlinux when vmlinux_allocated == true, even if
1983 * it returns an error.
1984 */
1985int dso__load_vmlinux(struct dso *dso, struct map *map,
1986 const char *vmlinux, bool vmlinux_allocated)
1987{
1988 int err = -1;
1989 struct symsrc ss;
1990 char symfs_vmlinux[PATH_MAX];
1991 enum dso_binary_type symtab_type;
1992
1993 if (vmlinux[0] == '/')
1994 snprintf(symfs_vmlinux, sizeof(symfs_vmlinux), "%s", vmlinux);
1995 else
1996 symbol__join_symfs(symfs_vmlinux, vmlinux);
1997
1998 if (dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST)
1999 symtab_type = DSO_BINARY_TYPE__GUEST_VMLINUX;
2000 else
2001 symtab_type = DSO_BINARY_TYPE__VMLINUX;
2002
2003 if (symsrc__init(&ss, dso, symfs_vmlinux, symtab_type)) {
2004 if (vmlinux_allocated)
2005 free((char *) vmlinux);
2006 return -1;
2007 }
2008
2009 /*
2010 * dso__load_sym() may copy 'dso' which will result in the copies having
2011 * an incorrect long name unless we set it here first.
2012 */
2013 dso__set_long_name(dso, vmlinux, vmlinux_allocated);
2014 if (dso__kernel(dso) == DSO_SPACE__KERNEL_GUEST)
2015 dso__set_binary_type(dso, DSO_BINARY_TYPE__GUEST_VMLINUX);
2016 else
2017 dso__set_binary_type(dso, DSO_BINARY_TYPE__VMLINUX);
2018
2019 err = dso__load_sym(dso, map, &ss, &ss, 0);
2020 symsrc__destroy(&ss);
2021
2022 if (err > 0) {
2023 dso__set_loaded(dso);
2024 pr_debug("Using %s for symbols\n", symfs_vmlinux);
2025 }
2026
2027 return err;
2028}
2029
2030int dso__load_vmlinux_path(struct dso *dso, struct map *map)
2031{
2032 int i, err = 0;
2033 char *filename = NULL;
2034
2035 pr_debug("Looking at the vmlinux_path (%d entries long)\n",
2036 vmlinux_path__nr_entries + 1);
2037
2038 for (i = 0; i < vmlinux_path__nr_entries; ++i) {
2039 err = dso__load_vmlinux(dso, map, vmlinux_path[i], false);
2040 if (err > 0)
2041 goto out;
2042 }
2043
2044 if (!symbol_conf.ignore_vmlinux_buildid)
2045 filename = dso__build_id_filename(dso, NULL, 0, false);
2046 if (filename != NULL) {
2047 err = dso__load_vmlinux(dso, map, filename, true);
2048 if (err > 0)
2049 goto out;
2050 }
2051out:
2052 return err;
2053}
2054
2055static bool visible_dir_filter(const char *name, struct dirent *d)
2056{
2057 if (d->d_type != DT_DIR)
2058 return false;
2059 return lsdir_no_dot_filter(name, d);
2060}
2061
2062static int find_matching_kcore(struct map *map, char *dir, size_t dir_sz)
2063{
2064 char kallsyms_filename[PATH_MAX];
2065 int ret = -1;
2066 struct strlist *dirs;
2067 struct str_node *nd;
2068
2069 dirs = lsdir(dir, visible_dir_filter);
2070 if (!dirs)
2071 return -1;
2072
2073 strlist__for_each_entry(nd, dirs) {
2074 scnprintf(kallsyms_filename, sizeof(kallsyms_filename),
2075 "%s/%s/kallsyms", dir, nd->s);
2076 if (!validate_kcore_addresses(kallsyms_filename, map)) {
2077 strlcpy(dir, kallsyms_filename, dir_sz);
2078 ret = 0;
2079 break;
2080 }
2081 }
2082
2083 strlist__delete(dirs);
2084
2085 return ret;
2086}
2087
2088/*
2089 * Use open(O_RDONLY) to check readability directly instead of access(R_OK)
2090 * since access(R_OK) only checks with real UID/GID but open() use effective
2091 * UID/GID and actual capabilities (e.g. /proc/kcore requires CAP_SYS_RAWIO).
2092 */
2093static bool filename__readable(const char *file)
2094{
2095 int fd = open(file, O_RDONLY);
2096 if (fd < 0)
2097 return false;
2098 close(fd);
2099 return true;
2100}
2101
2102static char *dso__find_kallsyms(struct dso *dso, struct map *map)
2103{
2104 struct build_id bid;
2105 char sbuild_id[SBUILD_ID_SIZE];
2106 bool is_host = false;
2107 char path[PATH_MAX];
2108
2109 if (!dso__has_build_id(dso)) {
2110 /*
2111 * Last resort, if we don't have a build-id and couldn't find
2112 * any vmlinux file, try the running kernel kallsyms table.
2113 */
2114 goto proc_kallsyms;
2115 }
2116
2117 if (sysfs__read_build_id("/sys/kernel/notes", &bid) == 0)
2118 is_host = dso__build_id_equal(dso, &bid);
2119
2120 /* Try a fast path for /proc/kallsyms if possible */
2121 if (is_host) {
2122 /*
2123 * Do not check the build-id cache, unless we know we cannot use
2124 * /proc/kcore or module maps don't match to /proc/kallsyms.
2125 * To check readability of /proc/kcore, do not use access(R_OK)
2126 * since /proc/kcore requires CAP_SYS_RAWIO to read and access
2127 * can't check it.
2128 */
2129 if (filename__readable("/proc/kcore") &&
2130 !validate_kcore_addresses("/proc/kallsyms", map))
2131 goto proc_kallsyms;
2132 }
2133
2134 build_id__sprintf(dso__bid(dso), sbuild_id);
2135
2136 /* Find kallsyms in build-id cache with kcore */
2137 scnprintf(path, sizeof(path), "%s/%s/%s",
2138 buildid_dir, DSO__NAME_KCORE, sbuild_id);
2139
2140 if (!find_matching_kcore(map, path, sizeof(path)))
2141 return strdup(path);
2142
2143 /* Use current /proc/kallsyms if possible */
2144 if (is_host) {
2145proc_kallsyms:
2146 return strdup("/proc/kallsyms");
2147 }
2148
2149 /* Finally, find a cache of kallsyms */
2150 if (!build_id_cache__kallsyms_path(sbuild_id, path, sizeof(path))) {
2151 pr_err("No kallsyms or vmlinux with build-id %s was found\n",
2152 sbuild_id);
2153 return NULL;
2154 }
2155
2156 return strdup(path);
2157}
2158
2159static int dso__load_kernel_sym(struct dso *dso, struct map *map)
2160{
2161 int err;
2162 const char *kallsyms_filename = NULL;
2163 char *kallsyms_allocated_filename = NULL;
2164 char *filename = NULL;
2165
2166 /*
2167 * Step 1: if the user specified a kallsyms or vmlinux filename, use
2168 * it and only it, reporting errors to the user if it cannot be used.
2169 *
2170 * For instance, try to analyse an ARM perf.data file _without_ a
2171 * build-id, or if the user specifies the wrong path to the right
2172 * vmlinux file, obviously we can't fallback to another vmlinux (a
2173 * x86_86 one, on the machine where analysis is being performed, say),
2174 * or worse, /proc/kallsyms.
2175 *
2176 * If the specified file _has_ a build-id and there is a build-id
2177 * section in the perf.data file, we will still do the expected
2178 * validation in dso__load_vmlinux and will bail out if they don't
2179 * match.
2180 */
2181 if (symbol_conf.kallsyms_name != NULL) {
2182 kallsyms_filename = symbol_conf.kallsyms_name;
2183 goto do_kallsyms;
2184 }
2185
2186 if (!symbol_conf.ignore_vmlinux && symbol_conf.vmlinux_name != NULL) {
2187 return dso__load_vmlinux(dso, map, symbol_conf.vmlinux_name, false);
2188 }
2189
2190 /*
2191 * Before checking on common vmlinux locations, check if it's
2192 * stored as standard build id binary (not kallsyms) under
2193 * .debug cache.
2194 */
2195 if (!symbol_conf.ignore_vmlinux_buildid)
2196 filename = __dso__build_id_filename(dso, NULL, 0, false, false);
2197 if (filename != NULL) {
2198 err = dso__load_vmlinux(dso, map, filename, true);
2199 if (err > 0)
2200 return err;
2201 }
2202
2203 if (!symbol_conf.ignore_vmlinux && vmlinux_path != NULL) {
2204 err = dso__load_vmlinux_path(dso, map);
2205 if (err > 0)
2206 return err;
2207 }
2208
2209 /* do not try local files if a symfs was given */
2210 if (symbol_conf.symfs[0] != 0)
2211 return -1;
2212
2213 kallsyms_allocated_filename = dso__find_kallsyms(dso, map);
2214 if (!kallsyms_allocated_filename)
2215 return -1;
2216
2217 kallsyms_filename = kallsyms_allocated_filename;
2218
2219do_kallsyms:
2220 err = dso__load_kallsyms(dso, kallsyms_filename, map);
2221 if (err > 0)
2222 pr_debug("Using %s for symbols\n", kallsyms_filename);
2223 free(kallsyms_allocated_filename);
2224
2225 if (err > 0 && !dso__is_kcore(dso)) {
2226 dso__set_binary_type(dso, DSO_BINARY_TYPE__KALLSYMS);
2227 dso__set_long_name(dso, DSO__NAME_KALLSYMS, false);
2228 map__fixup_start(map);
2229 map__fixup_end(map);
2230 }
2231
2232 return err;
2233}
2234
2235static int dso__load_guest_kernel_sym(struct dso *dso, struct map *map)
2236{
2237 int err;
2238 const char *kallsyms_filename;
2239 struct machine *machine = maps__machine(map__kmaps(map));
2240 char path[PATH_MAX];
2241
2242 if (machine->kallsyms_filename) {
2243 kallsyms_filename = machine->kallsyms_filename;
2244 } else if (machine__is_default_guest(machine)) {
2245 /*
2246 * if the user specified a vmlinux filename, use it and only
2247 * it, reporting errors to the user if it cannot be used.
2248 * Or use file guest_kallsyms inputted by user on commandline
2249 */
2250 if (symbol_conf.default_guest_vmlinux_name != NULL) {
2251 err = dso__load_vmlinux(dso, map,
2252 symbol_conf.default_guest_vmlinux_name,
2253 false);
2254 return err;
2255 }
2256
2257 kallsyms_filename = symbol_conf.default_guest_kallsyms;
2258 if (!kallsyms_filename)
2259 return -1;
2260 } else {
2261 sprintf(path, "%s/proc/kallsyms", machine->root_dir);
2262 kallsyms_filename = path;
2263 }
2264
2265 err = dso__load_kallsyms(dso, kallsyms_filename, map);
2266 if (err > 0)
2267 pr_debug("Using %s for symbols\n", kallsyms_filename);
2268 if (err > 0 && !dso__is_kcore(dso)) {
2269 dso__set_binary_type(dso, DSO_BINARY_TYPE__GUEST_KALLSYMS);
2270 dso__set_long_name(dso, machine->mmap_name, false);
2271 map__fixup_start(map);
2272 map__fixup_end(map);
2273 }
2274
2275 return err;
2276}
2277
2278static void vmlinux_path__exit(void)
2279{
2280 while (--vmlinux_path__nr_entries >= 0)
2281 zfree(&vmlinux_path[vmlinux_path__nr_entries]);
2282 vmlinux_path__nr_entries = 0;
2283
2284 zfree(&vmlinux_path);
2285}
2286
2287static const char * const vmlinux_paths[] = {
2288 "vmlinux",
2289 "/boot/vmlinux"
2290};
2291
2292static const char * const vmlinux_paths_upd[] = {
2293 "/boot/vmlinux-%s",
2294 "/usr/lib/debug/boot/vmlinux-%s",
2295 "/lib/modules/%s/build/vmlinux",
2296 "/usr/lib/debug/lib/modules/%s/vmlinux",
2297 "/usr/lib/debug/boot/vmlinux-%s.debug"
2298};
2299
2300static int vmlinux_path__add(const char *new_entry)
2301{
2302 vmlinux_path[vmlinux_path__nr_entries] = strdup(new_entry);
2303 if (vmlinux_path[vmlinux_path__nr_entries] == NULL)
2304 return -1;
2305 ++vmlinux_path__nr_entries;
2306
2307 return 0;
2308}
2309
2310static int vmlinux_path__init(struct perf_env *env)
2311{
2312 struct utsname uts;
2313 char bf[PATH_MAX];
2314 char *kernel_version;
2315 unsigned int i;
2316
2317 vmlinux_path = malloc(sizeof(char *) * (ARRAY_SIZE(vmlinux_paths) +
2318 ARRAY_SIZE(vmlinux_paths_upd)));
2319 if (vmlinux_path == NULL)
2320 return -1;
2321
2322 for (i = 0; i < ARRAY_SIZE(vmlinux_paths); i++)
2323 if (vmlinux_path__add(vmlinux_paths[i]) < 0)
2324 goto out_fail;
2325
2326 /* only try kernel version if no symfs was given */
2327 if (symbol_conf.symfs[0] != 0)
2328 return 0;
2329
2330 if (env) {
2331 kernel_version = env->os_release;
2332 } else {
2333 if (uname(&uts) < 0)
2334 goto out_fail;
2335
2336 kernel_version = uts.release;
2337 }
2338
2339 for (i = 0; i < ARRAY_SIZE(vmlinux_paths_upd); i++) {
2340 snprintf(bf, sizeof(bf), vmlinux_paths_upd[i], kernel_version);
2341 if (vmlinux_path__add(bf) < 0)
2342 goto out_fail;
2343 }
2344
2345 return 0;
2346
2347out_fail:
2348 vmlinux_path__exit();
2349 return -1;
2350}
2351
2352int setup_list(struct strlist **list, const char *list_str,
2353 const char *list_name)
2354{
2355 if (list_str == NULL)
2356 return 0;
2357
2358 *list = strlist__new(list_str, NULL);
2359 if (!*list) {
2360 pr_err("problems parsing %s list\n", list_name);
2361 return -1;
2362 }
2363
2364 symbol_conf.has_filter = true;
2365 return 0;
2366}
2367
2368int setup_intlist(struct intlist **list, const char *list_str,
2369 const char *list_name)
2370{
2371 if (list_str == NULL)
2372 return 0;
2373
2374 *list = intlist__new(list_str);
2375 if (!*list) {
2376 pr_err("problems parsing %s list\n", list_name);
2377 return -1;
2378 }
2379 return 0;
2380}
2381
2382static int setup_addrlist(struct intlist **addr_list, struct strlist *sym_list)
2383{
2384 struct str_node *pos, *tmp;
2385 unsigned long val;
2386 char *sep;
2387 const char *end;
2388 int i = 0, err;
2389
2390 *addr_list = intlist__new(NULL);
2391 if (!*addr_list)
2392 return -1;
2393
2394 strlist__for_each_entry_safe(pos, tmp, sym_list) {
2395 errno = 0;
2396 val = strtoul(pos->s, &sep, 16);
2397 if (errno || (sep == pos->s))
2398 continue;
2399
2400 if (*sep != '\0') {
2401 end = pos->s + strlen(pos->s) - 1;
2402 while (end >= sep && isspace(*end))
2403 end--;
2404
2405 if (end >= sep)
2406 continue;
2407 }
2408
2409 err = intlist__add(*addr_list, val);
2410 if (err)
2411 break;
2412
2413 strlist__remove(sym_list, pos);
2414 i++;
2415 }
2416
2417 if (i == 0) {
2418 intlist__delete(*addr_list);
2419 *addr_list = NULL;
2420 }
2421
2422 return 0;
2423}
2424
2425static bool symbol__read_kptr_restrict(void)
2426{
2427 bool value = false;
2428 FILE *fp = fopen("/proc/sys/kernel/kptr_restrict", "r");
2429
2430 if (fp != NULL) {
2431 char line[8];
2432
2433 if (fgets(line, sizeof(line), fp) != NULL)
2434 value = perf_cap__capable(CAP_SYSLOG) ?
2435 (atoi(line) >= 2) :
2436 (atoi(line) != 0);
2437
2438 fclose(fp);
2439 }
2440
2441 /* Per kernel/kallsyms.c:
2442 * we also restrict when perf_event_paranoid > 1 w/o CAP_SYSLOG
2443 */
2444 if (perf_event_paranoid() > 1 && !perf_cap__capable(CAP_SYSLOG))
2445 value = true;
2446
2447 return value;
2448}
2449
2450int symbol__annotation_init(void)
2451{
2452 if (symbol_conf.init_annotation)
2453 return 0;
2454
2455 if (symbol_conf.initialized) {
2456 pr_err("Annotation needs to be init before symbol__init()\n");
2457 return -1;
2458 }
2459
2460 symbol_conf.priv_size += sizeof(struct annotation);
2461 symbol_conf.init_annotation = true;
2462 return 0;
2463}
2464
2465int symbol__init(struct perf_env *env)
2466{
2467 const char *symfs;
2468
2469 if (symbol_conf.initialized)
2470 return 0;
2471
2472 symbol_conf.priv_size = PERF_ALIGN(symbol_conf.priv_size, sizeof(u64));
2473
2474 symbol__elf_init();
2475
2476 if (symbol_conf.try_vmlinux_path && vmlinux_path__init(env) < 0)
2477 return -1;
2478
2479 if (symbol_conf.field_sep && *symbol_conf.field_sep == '.') {
2480 pr_err("'.' is the only non valid --field-separator argument\n");
2481 return -1;
2482 }
2483
2484 if (setup_list(&symbol_conf.dso_list,
2485 symbol_conf.dso_list_str, "dso") < 0)
2486 return -1;
2487
2488 if (setup_list(&symbol_conf.comm_list,
2489 symbol_conf.comm_list_str, "comm") < 0)
2490 goto out_free_dso_list;
2491
2492 if (setup_intlist(&symbol_conf.pid_list,
2493 symbol_conf.pid_list_str, "pid") < 0)
2494 goto out_free_comm_list;
2495
2496 if (setup_intlist(&symbol_conf.tid_list,
2497 symbol_conf.tid_list_str, "tid") < 0)
2498 goto out_free_pid_list;
2499
2500 if (setup_list(&symbol_conf.sym_list,
2501 symbol_conf.sym_list_str, "symbol") < 0)
2502 goto out_free_tid_list;
2503
2504 if (symbol_conf.sym_list &&
2505 setup_addrlist(&symbol_conf.addr_list, symbol_conf.sym_list) < 0)
2506 goto out_free_sym_list;
2507
2508 if (setup_list(&symbol_conf.bt_stop_list,
2509 symbol_conf.bt_stop_list_str, "symbol") < 0)
2510 goto out_free_sym_list;
2511
2512 /*
2513 * A path to symbols of "/" is identical to ""
2514 * reset here for simplicity.
2515 */
2516 symfs = realpath(symbol_conf.symfs, NULL);
2517 if (symfs == NULL)
2518 symfs = symbol_conf.symfs;
2519 if (strcmp(symfs, "/") == 0)
2520 symbol_conf.symfs = "";
2521 if (symfs != symbol_conf.symfs)
2522 free((void *)symfs);
2523
2524 symbol_conf.kptr_restrict = symbol__read_kptr_restrict();
2525
2526 symbol_conf.initialized = true;
2527 return 0;
2528
2529out_free_sym_list:
2530 strlist__delete(symbol_conf.sym_list);
2531 intlist__delete(symbol_conf.addr_list);
2532out_free_tid_list:
2533 intlist__delete(symbol_conf.tid_list);
2534out_free_pid_list:
2535 intlist__delete(symbol_conf.pid_list);
2536out_free_comm_list:
2537 strlist__delete(symbol_conf.comm_list);
2538out_free_dso_list:
2539 strlist__delete(symbol_conf.dso_list);
2540 return -1;
2541}
2542
2543void symbol__exit(void)
2544{
2545 if (!symbol_conf.initialized)
2546 return;
2547 strlist__delete(symbol_conf.bt_stop_list);
2548 strlist__delete(symbol_conf.sym_list);
2549 strlist__delete(symbol_conf.dso_list);
2550 strlist__delete(symbol_conf.comm_list);
2551 intlist__delete(symbol_conf.tid_list);
2552 intlist__delete(symbol_conf.pid_list);
2553 intlist__delete(symbol_conf.addr_list);
2554 vmlinux_path__exit();
2555 symbol_conf.sym_list = symbol_conf.dso_list = symbol_conf.comm_list = NULL;
2556 symbol_conf.bt_stop_list = NULL;
2557 symbol_conf.initialized = false;
2558}
2559
2560int symbol__config_symfs(const struct option *opt __maybe_unused,
2561 const char *dir, int unset __maybe_unused)
2562{
2563 char *bf = NULL;
2564 int ret;
2565
2566 symbol_conf.symfs = strdup(dir);
2567 if (symbol_conf.symfs == NULL)
2568 return -ENOMEM;
2569
2570 /* skip the locally configured cache if a symfs is given, and
2571 * config buildid dir to symfs/.debug
2572 */
2573 ret = asprintf(&bf, "%s/%s", dir, ".debug");
2574 if (ret < 0)
2575 return -ENOMEM;
2576
2577 set_buildid_dir(bf);
2578
2579 free(bf);
2580 return 0;
2581}
2582
2583/*
2584 * Checks that user supplied symbol kernel files are accessible because
2585 * the default mechanism for accessing elf files fails silently. i.e. if
2586 * debug syms for a build ID aren't found perf carries on normally. When
2587 * they are user supplied we should assume that the user doesn't want to
2588 * silently fail.
2589 */
2590int symbol__validate_sym_arguments(void)
2591{
2592 if (symbol_conf.vmlinux_name &&
2593 access(symbol_conf.vmlinux_name, R_OK)) {
2594 pr_err("Invalid file: %s\n", symbol_conf.vmlinux_name);
2595 return -EINVAL;
2596 }
2597 if (symbol_conf.kallsyms_name &&
2598 access(symbol_conf.kallsyms_name, R_OK)) {
2599 pr_err("Invalid file: %s\n", symbol_conf.kallsyms_name);
2600 return -EINVAL;
2601 }
2602 return 0;
2603}