Merge tag 'iio-for-4.20a' of git://git.kernel.org/pub/scm/linux/kernel/git/jic23...
[linux-2.6-block.git] / tools / perf / util / symbol.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
5aab621b
ACM
2#include <dirent.h>
3#include <errno.h>
5aab621b
ACM
4#include <stdlib.h>
5#include <stdio.h>
6#include <string.h>
877a7a11 7#include <linux/kernel.h>
e9814df8 8#include <linux/mman.h>
5aab621b
ACM
9#include <sys/types.h>
10#include <sys/stat.h>
11#include <sys/param.h>
12#include <fcntl.h>
13#include <unistd.h>
9486aa38 14#include <inttypes.h>
b01141f4 15#include "annotate.h"
b36f19d5 16#include "build-id.h"
e334c726 17#include "util.h"
8a6c5b26 18#include "debug.h"
69d2591a 19#include "machine.h"
a2928c42 20#include "symbol.h"
5aab621b 21#include "strlist.h"
e03eaa40 22#include "intlist.h"
843ff37b 23#include "namespaces.h"
0a7e6d1b 24#include "header.h"
9a3993d4 25#include "path.h"
3d689ed6 26#include "sane_ctype.h"
a2928c42 27
a2928c42 28#include <elf.h>
f1617b40 29#include <limits.h>
c506c96b 30#include <symbol/kallsyms.h>
439d473b 31#include <sys/utsname.h>
2cdbc46d 32
be39db9f
ACM
33static int dso__load_kernel_sym(struct dso *dso, struct map *map);
34static int dso__load_guest_kernel_sym(struct dso *dso, struct map *map);
608c34de
ACM
35static bool symbol__is_idle(const char *name);
36
3f067dca
ACM
37int vmlinux_path__nr_entries;
38char **vmlinux_path;
439d473b 39
75be6cf4 40struct symbol_conf symbol_conf = {
e511db5e
NK
41 .use_modules = true,
42 .try_vmlinux_path = true,
e511db5e 43 .demangle = true,
763122ad 44 .demangle_kernel = false,
e511db5e 45 .cumulate_callchain = true,
c8302367 46 .show_hist_headers = true,
e511db5e 47 .symfs = "",
1e9abf8b 48 .event_group = true,
d8a88dd2 49 .inline_name = true,
b32d133a
ACM
50};
51
44f24cb3
JO
52static enum dso_binary_type binary_type_symtab[] = {
53 DSO_BINARY_TYPE__KALLSYMS,
54 DSO_BINARY_TYPE__GUEST_KALLSYMS,
55 DSO_BINARY_TYPE__JAVA_JIT,
56 DSO_BINARY_TYPE__DEBUGLINK,
57 DSO_BINARY_TYPE__BUILD_ID_CACHE,
d2396999 58 DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO,
44f24cb3
JO
59 DSO_BINARY_TYPE__FEDORA_DEBUGINFO,
60 DSO_BINARY_TYPE__UBUNTU_DEBUGINFO,
61 DSO_BINARY_TYPE__BUILDID_DEBUGINFO,
62 DSO_BINARY_TYPE__SYSTEM_PATH_DSO,
63 DSO_BINARY_TYPE__GUEST_KMODULE,
c00c48fc 64 DSO_BINARY_TYPE__GUEST_KMODULE_COMP,
44f24cb3 65 DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE,
c00c48fc 66 DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP,
9cd00941 67 DSO_BINARY_TYPE__OPENEMBEDDED_DEBUGINFO,
44f24cb3
JO
68 DSO_BINARY_TYPE__NOT_FOUND,
69};
70
028df767 71#define DSO_BINARY_TYPE__SYMTAB_CNT ARRAY_SIZE(binary_type_symtab)
44f24cb3 72
3183f8ca 73static bool symbol_type__filter(char symbol_type)
6893d4ee 74{
31877908 75 symbol_type = toupper(symbol_type);
2be732c0 76 return symbol_type == 'T' || symbol_type == 'W' || symbol_type == 'D' || symbol_type == 'B';
6893d4ee
ACM
77}
78
694bf407
AB
79static int prefix_underscores_count(const char *str)
80{
81 const char *tail = str;
82
83 while (*tail == '_')
84 tail++;
85
86 return tail - str;
87}
88
4b3a2716
MH
89const char * __weak arch__normalize_symbol_name(const char *name)
90{
91 return name;
92}
93
d8040645
PC
94int __weak arch__compare_symbol_names(const char *namea, const char *nameb)
95{
96 return strcmp(namea, nameb);
97}
98
99int __weak arch__compare_symbol_names_n(const char *namea, const char *nameb,
100 unsigned int n)
101{
102 return strncmp(namea, nameb, n);
103}
104
fb6d5942
NR
105int __weak arch__choose_best_symbol(struct symbol *syma,
106 struct symbol *symb __maybe_unused)
107{
108 /* Avoid "SyS" kernel syscall aliases */
109 if (strlen(syma->name) >= 3 && !strncmp(syma->name, "SyS", 3))
110 return SYMBOL_B;
111 if (strlen(syma->name) >= 10 && !strncmp(syma->name, "compat_SyS", 10))
112 return SYMBOL_B;
113
114 return SYMBOL_A;
115}
694bf407
AB
116
117static int choose_best_symbol(struct symbol *syma, struct symbol *symb)
118{
119 s64 a;
120 s64 b;
3445432b 121 size_t na, nb;
694bf407
AB
122
123 /* Prefer a symbol with non zero length */
124 a = syma->end - syma->start;
125 b = symb->end - symb->start;
126 if ((b == 0) && (a > 0))
127 return SYMBOL_A;
128 else if ((a == 0) && (b > 0))
129 return SYMBOL_B;
130
131 /* Prefer a non weak symbol over a weak one */
132 a = syma->binding == STB_WEAK;
133 b = symb->binding == STB_WEAK;
134 if (b && !a)
135 return SYMBOL_A;
136 if (a && !b)
137 return SYMBOL_B;
138
139 /* Prefer a global symbol over a non global one */
140 a = syma->binding == STB_GLOBAL;
141 b = symb->binding == STB_GLOBAL;
142 if (a && !b)
143 return SYMBOL_A;
144 if (b && !a)
145 return SYMBOL_B;
146
147 /* Prefer a symbol with less underscores */
148 a = prefix_underscores_count(syma->name);
149 b = prefix_underscores_count(symb->name);
150 if (b > a)
151 return SYMBOL_A;
152 else if (a > b)
153 return SYMBOL_B;
154
3445432b
AH
155 /* Choose the symbol with the longest name */
156 na = strlen(syma->name);
157 nb = strlen(symb->name);
158 if (na > nb)
694bf407 159 return SYMBOL_A;
3445432b 160 else if (na < nb)
694bf407 161 return SYMBOL_B;
3445432b 162
fb6d5942 163 return arch__choose_best_symbol(syma, symb);
694bf407
AB
164}
165
e5a1845f 166void symbols__fixup_duplicate(struct rb_root *symbols)
694bf407
AB
167{
168 struct rb_node *nd;
169 struct symbol *curr, *next;
170
c97b40e4
ACM
171 if (symbol_conf.allow_aliases)
172 return;
173
694bf407
AB
174 nd = rb_first(symbols);
175
176 while (nd) {
177 curr = rb_entry(nd, struct symbol, rb_node);
178again:
179 nd = rb_next(&curr->rb_node);
180 next = rb_entry(nd, struct symbol, rb_node);
181
182 if (!nd)
183 break;
184
185 if (curr->start != next->start)
186 continue;
187
188 if (choose_best_symbol(curr, next) == SYMBOL_A) {
189 rb_erase(&next->rb_node, symbols);
d4f74eb8 190 symbol__delete(next);
694bf407
AB
191 goto again;
192 } else {
193 nd = rb_next(&curr->rb_node);
194 rb_erase(&curr->rb_node, symbols);
d4f74eb8 195 symbol__delete(curr);
694bf407
AB
196 }
197 }
198}
199
e5a1845f 200void symbols__fixup_end(struct rb_root *symbols)
af427bf5 201{
aeafcbaf 202 struct rb_node *nd, *prevnd = rb_first(symbols);
2e538c4a 203 struct symbol *curr, *prev;
af427bf5
ACM
204
205 if (prevnd == NULL)
206 return;
207
2e538c4a
ACM
208 curr = rb_entry(prevnd, struct symbol, rb_node);
209
af427bf5 210 for (nd = rb_next(prevnd); nd; nd = rb_next(nd)) {
2e538c4a
ACM
211 prev = curr;
212 curr = rb_entry(nd, struct symbol, rb_node);
af427bf5 213
3b01a413 214 if (prev->end == prev->start && prev->end != curr->start)
2c241bd3 215 prev->end = curr->start;
af427bf5 216 }
2e538c4a
ACM
217
218 /* Last entry */
219 if (curr->end == curr->start)
e7ede72a 220 curr->end = roundup(curr->start, 4096) + 4096;
af427bf5
ACM
221}
222
3183f8ca 223void map_groups__fixup_end(struct map_groups *mg)
af427bf5 224{
3183f8ca 225 struct maps *maps = &mg->maps;
4bb7123d 226 struct map *next, *curr;
af427bf5 227
0a7c74ea 228 down_write(&maps->lock);
6a2ffcdd 229
4bb7123d
ACM
230 curr = maps__first(maps);
231 if (curr == NULL)
6a2ffcdd 232 goto out_unlock;
af427bf5 233
4bb7123d 234 for (next = map__next(curr); next; next = map__next(curr)) {
9ad4652b
TR
235 if (!curr->end)
236 curr->end = next->start;
4bb7123d 237 curr = next;
2e538c4a 238 }
90c83218
ACM
239
240 /*
241 * We still haven't the actual symbols, so guess the
242 * last map final address.
243 */
9ad4652b
TR
244 if (!curr->end)
245 curr->end = ~0ULL;
6a2ffcdd
ACM
246
247out_unlock:
0a7c74ea 248 up_write(&maps->lock);
af427bf5
ACM
249}
250
af30bffa 251struct symbol *symbol__new(u64 start, u64 len, u8 binding, u8 type, const char *name)
a2928c42 252{
0085c954 253 size_t namelen = strlen(name) + 1;
aeafcbaf
ACM
254 struct symbol *sym = calloc(1, (symbol_conf.priv_size +
255 sizeof(*sym) + namelen));
256 if (sym == NULL)
0b73da3f
IM
257 return NULL;
258
b01141f4
ACM
259 if (symbol_conf.priv_size) {
260 if (symbol_conf.init_annotation) {
261 struct annotation *notes = (void *)sym;
262 pthread_mutex_init(&notes->lock, NULL);
263 }
aeafcbaf 264 sym = ((void *)sym) + symbol_conf.priv_size;
b01141f4 265 }
e4204992 266
aeafcbaf 267 sym->start = start;
2c241bd3 268 sym->end = len ? start + len : start;
af30bffa 269 sym->type = type;
aeafcbaf
ACM
270 sym->binding = binding;
271 sym->namelen = namelen - 1;
e4204992 272
aeafcbaf
ACM
273 pr_debug4("%s: %s %#" PRIx64 "-%#" PRIx64 "\n",
274 __func__, name, start, sym->end);
275 memcpy(sym->name, name, namelen);
a2928c42 276
aeafcbaf 277 return sym;
a2928c42
ACM
278}
279
aeafcbaf 280void symbol__delete(struct symbol *sym)
a2928c42 281{
aeafcbaf 282 free(((void *)sym) - symbol_conf.priv_size);
a2928c42
ACM
283}
284
cdd059d7 285void symbols__delete(struct rb_root *symbols)
a2928c42
ACM
286{
287 struct symbol *pos;
aeafcbaf 288 struct rb_node *next = rb_first(symbols);
a2928c42
ACM
289
290 while (next) {
291 pos = rb_entry(next, struct symbol, rb_node);
292 next = rb_next(&pos->rb_node);
aeafcbaf 293 rb_erase(&pos->rb_node, symbols);
00a192b3 294 symbol__delete(pos);
a2928c42
ACM
295 }
296}
297
608c34de 298void __symbols__insert(struct rb_root *symbols, struct symbol *sym, bool kernel)
a2928c42 299{
aeafcbaf 300 struct rb_node **p = &symbols->rb_node;
a2928c42 301 struct rb_node *parent = NULL;
9cffa8d5 302 const u64 ip = sym->start;
a2928c42
ACM
303 struct symbol *s;
304
608c34de
ACM
305 if (kernel) {
306 const char *name = sym->name;
307 /*
308 * ppc64 uses function descriptors and appends a '.' to the
309 * start of every instruction address. Remove it.
310 */
311 if (name[0] == '.')
312 name++;
313 sym->idle = symbol__is_idle(name);
314 }
315
a2928c42
ACM
316 while (*p != NULL) {
317 parent = *p;
318 s = rb_entry(parent, struct symbol, rb_node);
319 if (ip < s->start)
320 p = &(*p)->rb_left;
321 else
322 p = &(*p)->rb_right;
323 }
324 rb_link_node(&sym->rb_node, parent, p);
aeafcbaf 325 rb_insert_color(&sym->rb_node, symbols);
a2928c42
ACM
326}
327
608c34de
ACM
328void symbols__insert(struct rb_root *symbols, struct symbol *sym)
329{
330 __symbols__insert(symbols, sym, false);
331}
332
aeafcbaf 333static struct symbol *symbols__find(struct rb_root *symbols, u64 ip)
a2928c42
ACM
334{
335 struct rb_node *n;
336
aeafcbaf 337 if (symbols == NULL)
a2928c42
ACM
338 return NULL;
339
aeafcbaf 340 n = symbols->rb_node;
a2928c42
ACM
341
342 while (n) {
343 struct symbol *s = rb_entry(n, struct symbol, rb_node);
344
345 if (ip < s->start)
346 n = n->rb_left;
9c7b37cd 347 else if (ip > s->end || (ip == s->end && ip != s->start))
a2928c42
ACM
348 n = n->rb_right;
349 else
350 return s;
351 }
352
353 return NULL;
354}
355
8e0cf965
AH
356static struct symbol *symbols__first(struct rb_root *symbols)
357{
358 struct rb_node *n = rb_first(symbols);
359
360 if (n)
361 return rb_entry(n, struct symbol, rb_node);
362
363 return NULL;
364}
365
cd67f99f
AH
366static struct symbol *symbols__last(struct rb_root *symbols)
367{
368 struct rb_node *n = rb_last(symbols);
369
370 if (n)
371 return rb_entry(n, struct symbol, rb_node);
372
373 return NULL;
374}
375
9c00a81b
AH
376static struct symbol *symbols__next(struct symbol *sym)
377{
378 struct rb_node *n = rb_next(&sym->rb_node);
379
380 if (n)
381 return rb_entry(n, struct symbol, rb_node);
382
383 return NULL;
384}
385
aeafcbaf 386static void symbols__insert_by_name(struct rb_root *symbols, struct symbol *sym)
79406cd7 387{
aeafcbaf 388 struct rb_node **p = &symbols->rb_node;
79406cd7 389 struct rb_node *parent = NULL;
02a9d037
RV
390 struct symbol_name_rb_node *symn, *s;
391
392 symn = container_of(sym, struct symbol_name_rb_node, sym);
79406cd7
ACM
393
394 while (*p != NULL) {
395 parent = *p;
396 s = rb_entry(parent, struct symbol_name_rb_node, rb_node);
397 if (strcmp(sym->name, s->sym.name) < 0)
398 p = &(*p)->rb_left;
399 else
400 p = &(*p)->rb_right;
401 }
402 rb_link_node(&symn->rb_node, parent, p);
aeafcbaf 403 rb_insert_color(&symn->rb_node, symbols);
79406cd7
ACM
404}
405
aeafcbaf
ACM
406static void symbols__sort_by_name(struct rb_root *symbols,
407 struct rb_root *source)
79406cd7
ACM
408{
409 struct rb_node *nd;
410
411 for (nd = rb_first(source); nd; nd = rb_next(nd)) {
412 struct symbol *pos = rb_entry(nd, struct symbol, rb_node);
aeafcbaf 413 symbols__insert_by_name(symbols, pos);
79406cd7
ACM
414 }
415}
416
d8040645
PC
417int symbol__match_symbol_name(const char *name, const char *str,
418 enum symbol_tag_include includes)
419{
420 const char *versioning;
421
422 if (includes == SYMBOL_TAG_INCLUDE__DEFAULT_ONLY &&
423 (versioning = strstr(name, "@@"))) {
424 int len = strlen(str);
425
426 if (len < versioning - name)
427 len = versioning - name;
428
429 return arch__compare_symbol_names_n(name, str, len);
430 } else
431 return arch__compare_symbol_names(name, str);
432}
433
aeafcbaf 434static struct symbol *symbols__find_by_name(struct rb_root *symbols,
d8040645
PC
435 const char *name,
436 enum symbol_tag_include includes)
79406cd7
ACM
437{
438 struct rb_node *n;
5bcaaca3 439 struct symbol_name_rb_node *s = NULL;
79406cd7 440
aeafcbaf 441 if (symbols == NULL)
79406cd7
ACM
442 return NULL;
443
aeafcbaf 444 n = symbols->rb_node;
79406cd7
ACM
445
446 while (n) {
79406cd7
ACM
447 int cmp;
448
449 s = rb_entry(n, struct symbol_name_rb_node, rb_node);
d8040645 450 cmp = symbol__match_symbol_name(s->sym.name, name, includes);
79406cd7 451
d8040645 452 if (cmp > 0)
79406cd7 453 n = n->rb_left;
d8040645 454 else if (cmp < 0)
79406cd7
ACM
455 n = n->rb_right;
456 else
de480999 457 break;
79406cd7
ACM
458 }
459
de480999
NK
460 if (n == NULL)
461 return NULL;
462
d8040645
PC
463 if (includes != SYMBOL_TAG_INCLUDE__DEFAULT_ONLY)
464 /* return first symbol that has same name (if any) */
465 for (n = rb_prev(n); n; n = rb_prev(n)) {
466 struct symbol_name_rb_node *tmp;
de480999 467
d8040645
PC
468 tmp = rb_entry(n, struct symbol_name_rb_node, rb_node);
469 if (arch__compare_symbol_names(tmp->sym.name, s->sym.name))
470 break;
de480999 471
d8040645
PC
472 s = tmp;
473 }
de480999
NK
474
475 return &s->sym;
79406cd7
ACM
476}
477
c0b4dffb
ACM
478void dso__reset_find_symbol_cache(struct dso *dso)
479{
3183f8ca
ACM
480 dso->last_find_result.addr = 0;
481 dso->last_find_result.symbol = NULL;
c0b4dffb
ACM
482}
483
3183f8ca 484void dso__insert_symbol(struct dso *dso, struct symbol *sym)
ae93a6c7 485{
3183f8ca 486 __symbols__insert(&dso->symbols, sym, dso->kernel);
ae93a6c7
CP
487
488 /* update the symbol cache if necessary */
3183f8ca
ACM
489 if (dso->last_find_result.addr >= sym->start &&
490 (dso->last_find_result.addr < sym->end ||
ae93a6c7 491 sym->start == sym->end)) {
3183f8ca 492 dso->last_find_result.symbol = sym;
ae93a6c7
CP
493 }
494}
495
3183f8ca 496struct symbol *dso__find_symbol(struct dso *dso, u64 addr)
fcf1203a 497{
3183f8ca
ACM
498 if (dso->last_find_result.addr != addr || dso->last_find_result.symbol == NULL) {
499 dso->last_find_result.addr = addr;
500 dso->last_find_result.symbol = symbols__find(&dso->symbols, addr);
b685ac22
ACM
501 }
502
3183f8ca 503 return dso->last_find_result.symbol;
9c00a81b
AH
504}
505
5cf88a63
ACM
506struct symbol *dso__first_symbol(struct dso *dso)
507{
3183f8ca 508 return symbols__first(&dso->symbols);
cd67f99f
AH
509}
510
5cf88a63
ACM
511struct symbol *dso__last_symbol(struct dso *dso)
512{
3183f8ca 513 return symbols__last(&dso->symbols);
5cf88a63
ACM
514}
515
9c00a81b
AH
516struct symbol *dso__next_symbol(struct symbol *sym)
517{
518 return symbols__next(sym);
8e0cf965
AH
519}
520
18bd7264
ACM
521struct symbol *symbol__next_by_name(struct symbol *sym)
522{
523 struct symbol_name_rb_node *s = container_of(sym, struct symbol_name_rb_node, sym);
524 struct rb_node *n = rb_next(&s->rb_node);
525
526 return n ? &rb_entry(n, struct symbol_name_rb_node, rb_node)->sym : NULL;
527}
528
529 /*
af07eeb0 530 * Returns first symbol that matched with @name.
18bd7264 531 */
3183f8ca 532struct symbol *dso__find_symbol_by_name(struct dso *dso, const char *name)
79406cd7 533{
3183f8ca 534 struct symbol *s = symbols__find_by_name(&dso->symbol_names, name,
d8040645
PC
535 SYMBOL_TAG_INCLUDE__NONE);
536 if (!s)
3183f8ca 537 s = symbols__find_by_name(&dso->symbol_names, name,
d8040645
PC
538 SYMBOL_TAG_INCLUDE__DEFAULT_ONLY);
539 return s;
79406cd7
ACM
540}
541
3183f8ca 542void dso__sort_by_name(struct dso *dso)
79406cd7 543{
3183f8ca
ACM
544 dso__set_sorted_by_name(dso);
545 return symbols__sort_by_name(&dso->symbol_names, &dso->symbols);
79406cd7
ACM
546}
547
316d70d6
AH
548int modules__parse(const char *filename, void *arg,
549 int (*process_module)(void *arg, const char *name,
9ad4652b 550 u64 start, u64 size))
316d70d6
AH
551{
552 char *line = NULL;
553 size_t n;
554 FILE *file;
555 int err = 0;
556
557 file = fopen(filename, "r");
558 if (file == NULL)
559 return -1;
560
561 while (1) {
562 char name[PATH_MAX];
9ad4652b
TR
563 u64 start, size;
564 char *sep, *endptr;
316d70d6
AH
565 ssize_t line_len;
566
567 line_len = getline(&line, &n, file);
568 if (line_len < 0) {
569 if (feof(file))
570 break;
571 err = -1;
572 goto out;
573 }
574
575 if (!line) {
576 err = -1;
577 goto out;
578 }
579
580 line[--line_len] = '\0'; /* \n */
581
582 sep = strrchr(line, 'x');
583 if (sep == NULL)
584 continue;
585
586 hex2u64(sep + 1, &start);
587
588 sep = strchr(line, ' ');
589 if (sep == NULL)
590 continue;
591
592 *sep = '\0';
593
594 scnprintf(name, sizeof(name), "[%s]", line);
595
9ad4652b
TR
596 size = strtoul(sep + 1, &endptr, 0);
597 if (*endptr != ' ' && *endptr != '\t')
598 continue;
599
600 err = process_module(arg, name, start, size);
316d70d6
AH
601 if (err)
602 break;
603 }
604out:
605 free(line);
606 fclose(file);
607 return err;
608}
609
e7110b9f
ACM
610/*
611 * These are symbols in the kernel image, so make sure that
612 * sym is from a kernel DSO.
613 */
608c34de 614static bool symbol__is_idle(const char *name)
82d1deb0
DA
615{
616 const char * const idle_symbols[] = {
617 "cpu_idle",
e0336ed6 618 "cpu_startup_entry",
82d1deb0
DA
619 "intel_idle",
620 "default_idle",
621 "native_safe_halt",
622 "enter_idle",
623 "exit_idle",
624 "mwait_idle",
625 "mwait_idle_with_hints",
626 "poll_idle",
627 "ppc64_runlatch_off",
628 "pseries_dedicated_idle_sleep",
629 NULL
630 };
82d1deb0
DA
631 int i;
632
82d1deb0 633 for (i = 0; idle_symbols[i]; i++) {
608c34de 634 if (!strcmp(idle_symbols[i], name))
82d1deb0
DA
635 return true;
636 }
637
638 return false;
639}
640
682b335a 641static int map__process_kallsym_symbol(void *arg, const char *name,
82151520 642 char type, u64 start)
682b335a
ACM
643{
644 struct symbol *sym;
333cc76c
ACM
645 struct dso *dso = arg;
646 struct rb_root *root = &dso->symbols;
682b335a 647
3183f8ca 648 if (!symbol_type__filter(type))
682b335a
ACM
649 return 0;
650
82151520
CS
651 /*
652 * module symbols are not sorted so we add all
653 * symbols, setting length to 0, and rely on
654 * symbols__fixup_end() to fix it up.
655 */
af30bffa 656 sym = symbol__new(start, 0, kallsyms2elf_binding(type), kallsyms2elf_type(type), name);
682b335a
ACM
657 if (sym == NULL)
658 return -ENOMEM;
659 /*
660 * We will pass the symbols to the filter later, in
661 * map__split_kallsyms, when we have split the maps per module
662 */
608c34de 663 __symbols__insert(root, sym, !strchr(name, '['));
a1645ce1 664
682b335a
ACM
665 return 0;
666}
667
668/*
669 * Loads the function entries in /proc/kallsyms into kernel_map->dso,
670 * so that we can in the next step set the symbol ->end address and then
671 * call kernel_maps__split_kallsyms.
672 */
333cc76c 673static int dso__load_all_kallsyms(struct dso *dso, const char *filename)
682b335a 674{
333cc76c 675 return kallsyms__parse(filename, dso, map__process_kallsym_symbol);
682b335a
ACM
676}
677
15e0e2d4 678static int map_groups__split_kallsyms_for_kcore(struct map_groups *kmaps, struct dso *dso)
8e0cf965 679{
8e0cf965
AH
680 struct map *curr_map;
681 struct symbol *pos;
866548dd 682 int count = 0;
3183f8ca
ACM
683 struct rb_root old_root = dso->symbols;
684 struct rb_root *root = &dso->symbols;
8e0cf965
AH
685 struct rb_node *next = rb_first(root);
686
ba92732e
WN
687 if (!kmaps)
688 return -1;
689
866548dd
AH
690 *root = RB_ROOT;
691
8e0cf965
AH
692 while (next) {
693 char *module;
694
695 pos = rb_entry(next, struct symbol, rb_node);
696 next = rb_next(&pos->rb_node);
697
866548dd
AH
698 rb_erase_init(&pos->rb_node, &old_root);
699
8e0cf965
AH
700 module = strchr(pos->name, '\t');
701 if (module)
702 *module = '\0';
703
3183f8ca 704 curr_map = map_groups__find(kmaps, pos->start);
8e0cf965 705
be39db9f 706 if (!curr_map) {
8e0cf965 707 symbol__delete(pos);
866548dd 708 continue;
8e0cf965 709 }
866548dd
AH
710
711 pos->start -= curr_map->start - curr_map->pgoff;
712 if (pos->end)
713 pos->end -= curr_map->start - curr_map->pgoff;
3183f8ca 714 symbols__insert(&curr_map->dso->symbols, pos);
866548dd 715 ++count;
8e0cf965
AH
716 }
717
718 /* Symbols have been adjusted */
719 dso->adjust_symbols = 1;
720
866548dd 721 return count;
8e0cf965
AH
722}
723
2e538c4a
ACM
724/*
725 * Split the symbols into maps, making sure there are no overlaps, i.e. the
726 * kernel range is broken in several maps, named [kernel].N, as we don't have
727 * the original ELF section names vmlinux have.
728 */
15e0e2d4
ACM
729static int map_groups__split_kallsyms(struct map_groups *kmaps, struct dso *dso, u64 delta,
730 struct map *initial_map)
2e538c4a 731{
ba92732e 732 struct machine *machine;
15e0e2d4 733 struct map *curr_map = initial_map;
2e538c4a 734 struct symbol *pos;
48000a1a 735 int count = 0, moved = 0;
3183f8ca 736 struct rb_root *root = &dso->symbols;
4e06255f 737 struct rb_node *next = rb_first(root);
2e538c4a 738 int kernel_range = 0;
4d004365 739 bool x86_64;
2e538c4a 740
ba92732e
WN
741 if (!kmaps)
742 return -1;
743
744 machine = kmaps->machine;
745
4d004365
AH
746 x86_64 = machine__is(machine, "x86_64");
747
2e538c4a
ACM
748 while (next) {
749 char *module;
750
751 pos = rb_entry(next, struct symbol, rb_node);
752 next = rb_next(&pos->rb_node);
753
754 module = strchr(pos->name, '\t');
755 if (module) {
75be6cf4 756 if (!symbol_conf.use_modules)
1de8e245
ACM
757 goto discard_symbol;
758
2e538c4a
ACM
759 *module++ = '\0';
760
b7cece76 761 if (strcmp(curr_map->dso->short_name, module)) {
15e0e2d4 762 if (curr_map != initial_map &&
aeafcbaf 763 dso->kernel == DSO_TYPE_GUEST_KERNEL &&
23346f21 764 machine__is_default_guest(machine)) {
a1645ce1
ZY
765 /*
766 * We assume all symbols of a module are
767 * continuous in * kallsyms, so curr_map
768 * points to a module and all its
769 * symbols are in its kmap. Mark it as
770 * loaded.
771 */
3183f8ca 772 dso__set_loaded(curr_map->dso);
a1645ce1
ZY
773 }
774
3183f8ca 775 curr_map = map_groups__find_by_name(kmaps, module);
4e06255f 776 if (curr_map == NULL) {
2f51903b 777 pr_debug("%s/proc/{kallsyms,modules} "
b7cece76 778 "inconsistency while looking "
a1645ce1 779 "for \"%s\" module!\n",
23346f21 780 machine->root_dir, module);
15e0e2d4 781 curr_map = initial_map;
a1645ce1 782 goto discard_symbol;
af427bf5 783 }
b7cece76 784
a1645ce1 785 if (curr_map->dso->loaded &&
23346f21 786 !machine__is_default_guest(machine))
b7cece76 787 goto discard_symbol;
af427bf5 788 }
2e538c4a
ACM
789 /*
790 * So that we look just like we get from .ko files,
15e0e2d4 791 * i.e. not prelinked, relative to initial_map->start.
2e538c4a 792 */
4e06255f
ACM
793 pos->start = curr_map->map_ip(curr_map, pos->start);
794 pos->end = curr_map->map_ip(curr_map, pos->end);
4d004365
AH
795 } else if (x86_64 && is_entry_trampoline(pos->name)) {
796 /*
797 * These symbols are not needed anymore since the
798 * trampoline maps refer to the text section and it's
799 * symbols instead. Avoid having to deal with
800 * relocations, and the assumption that the first symbol
801 * is the start of kernel text, by simply removing the
802 * symbols at this point.
803 */
804 goto discard_symbol;
15e0e2d4 805 } else if (curr_map != initial_map) {
2e538c4a 806 char dso_name[PATH_MAX];
aeafcbaf 807 struct dso *ndso;
2e538c4a 808
d9b62aba
AH
809 if (delta) {
810 /* Kernel was relocated at boot time */
811 pos->start -= delta;
812 pos->end -= delta;
813 }
814
8a953312 815 if (count == 0) {
15e0e2d4 816 curr_map = initial_map;
be39db9f 817 goto add_symbol;
8a953312
ACM
818 }
819
aeafcbaf 820 if (dso->kernel == DSO_TYPE_GUEST_KERNEL)
a1645ce1
ZY
821 snprintf(dso_name, sizeof(dso_name),
822 "[guest.kernel].%d",
823 kernel_range++);
824 else
825 snprintf(dso_name, sizeof(dso_name),
826 "[kernel].%d",
827 kernel_range++);
2e538c4a 828
aeafcbaf
ACM
829 ndso = dso__new(dso_name);
830 if (ndso == NULL)
2e538c4a
ACM
831 return -1;
832
aeafcbaf 833 ndso->kernel = dso->kernel;
a1645ce1 834
3183f8ca 835 curr_map = map__new2(pos->start, ndso);
37fe5fcb 836 if (curr_map == NULL) {
d3a7c489 837 dso__put(ndso);
2e538c4a
ACM
838 return -1;
839 }
a2928c42 840
4e06255f 841 curr_map->map_ip = curr_map->unmap_ip = identity__map_ip;
9de89fe7 842 map_groups__insert(kmaps, curr_map);
2e538c4a 843 ++kernel_range;
d9b62aba
AH
844 } else if (delta) {
845 /* Kernel was relocated at boot time */
846 pos->start -= delta;
847 pos->end -= delta;
2e538c4a 848 }
be39db9f 849add_symbol:
15e0e2d4 850 if (curr_map != initial_map) {
be39db9f 851 rb_erase(&pos->rb_node, root);
3183f8ca 852 symbols__insert(&curr_map->dso->symbols, pos);
be39db9f
ACM
853 ++moved;
854 } else
855 ++count;
856
857 continue;
858discard_symbol:
859 rb_erase(&pos->rb_node, root);
860 symbol__delete(pos);
a2928c42
ACM
861 }
862
15e0e2d4 863 if (curr_map != initial_map &&
aeafcbaf 864 dso->kernel == DSO_TYPE_GUEST_KERNEL &&
23346f21 865 machine__is_default_guest(kmaps->machine)) {
3183f8ca 866 dso__set_loaded(curr_map->dso);
a1645ce1
ZY
867 }
868
8a953312 869 return count + moved;
2e538c4a 870}
a2928c42 871
3f067dca
ACM
872bool symbol__restricted_filename(const char *filename,
873 const char *restricted_filename)
ec80fde7
ACM
874{
875 bool restricted = false;
876
877 if (symbol_conf.kptr_restrict) {
878 char *r = realpath(filename, NULL);
879
880 if (r != NULL) {
881 restricted = strcmp(r, restricted_filename) == 0;
882 free(r);
883 return restricted;
884 }
885 }
886
887 return restricted;
888}
889
52afdaf9
AH
890struct module_info {
891 struct rb_node rb_node;
892 char *name;
893 u64 start;
8e0cf965
AH
894};
895
52afdaf9 896static void add_module(struct module_info *mi, struct rb_root *modules)
8e0cf965 897{
52afdaf9
AH
898 struct rb_node **p = &modules->rb_node;
899 struct rb_node *parent = NULL;
900 struct module_info *m;
8e0cf965 901
52afdaf9
AH
902 while (*p != NULL) {
903 parent = *p;
904 m = rb_entry(parent, struct module_info, rb_node);
905 if (strcmp(mi->name, m->name) < 0)
906 p = &(*p)->rb_left;
907 else
908 p = &(*p)->rb_right;
909 }
910 rb_link_node(&mi->rb_node, parent, p);
911 rb_insert_color(&mi->rb_node, modules);
912}
913
914static void delete_modules(struct rb_root *modules)
915{
916 struct module_info *mi;
917 struct rb_node *next = rb_first(modules);
918
919 while (next) {
920 mi = rb_entry(next, struct module_info, rb_node);
921 next = rb_next(&mi->rb_node);
922 rb_erase(&mi->rb_node, modules);
74cf249d 923 zfree(&mi->name);
52afdaf9
AH
924 free(mi);
925 }
926}
927
928static struct module_info *find_module(const char *name,
929 struct rb_root *modules)
930{
931 struct rb_node *n = modules->rb_node;
932
933 while (n) {
934 struct module_info *m;
935 int cmp;
936
937 m = rb_entry(n, struct module_info, rb_node);
938 cmp = strcmp(name, m->name);
939 if (cmp < 0)
940 n = n->rb_left;
941 else if (cmp > 0)
942 n = n->rb_right;
943 else
944 return m;
945 }
946
947 return NULL;
948}
949
9ad4652b
TR
950static int __read_proc_modules(void *arg, const char *name, u64 start,
951 u64 size __maybe_unused)
52afdaf9
AH
952{
953 struct rb_root *modules = arg;
954 struct module_info *mi;
955
956 mi = zalloc(sizeof(struct module_info));
957 if (!mi)
8e0cf965
AH
958 return -ENOMEM;
959
52afdaf9
AH
960 mi->name = strdup(name);
961 mi->start = start;
8e0cf965 962
52afdaf9
AH
963 if (!mi->name) {
964 free(mi);
965 return -ENOMEM;
966 }
967
968 add_module(mi, modules);
969
970 return 0;
971}
972
973static int read_proc_modules(const char *filename, struct rb_root *modules)
974{
975 if (symbol__restricted_filename(filename, "/proc/modules"))
976 return -1;
977
978 if (modules__parse(filename, modules, __read_proc_modules)) {
979 delete_modules(modules);
980 return -1;
981 }
8e0cf965
AH
982
983 return 0;
984}
985
fc1b691d
AH
986int compare_proc_modules(const char *from, const char *to)
987{
988 struct rb_root from_modules = RB_ROOT;
989 struct rb_root to_modules = RB_ROOT;
990 struct rb_node *from_node, *to_node;
991 struct module_info *from_m, *to_m;
992 int ret = -1;
993
994 if (read_proc_modules(from, &from_modules))
995 return -1;
996
997 if (read_proc_modules(to, &to_modules))
998 goto out_delete_from;
999
1000 from_node = rb_first(&from_modules);
1001 to_node = rb_first(&to_modules);
1002 while (from_node) {
1003 if (!to_node)
1004 break;
1005
1006 from_m = rb_entry(from_node, struct module_info, rb_node);
1007 to_m = rb_entry(to_node, struct module_info, rb_node);
1008
1009 if (from_m->start != to_m->start ||
1010 strcmp(from_m->name, to_m->name))
1011 break;
1012
1013 from_node = rb_next(from_node);
1014 to_node = rb_next(to_node);
1015 }
1016
1017 if (!from_node && !to_node)
1018 ret = 0;
1019
1020 delete_modules(&to_modules);
1021out_delete_from:
1022 delete_modules(&from_modules);
1023
1024 return ret;
1025}
1026
dce0478b
ACM
1027struct map *map_groups__first(struct map_groups *mg)
1028{
3183f8ca 1029 return maps__first(&mg->maps);
dce0478b
ACM
1030}
1031
5759a682 1032static int do_validate_kcore_modules(const char *filename,
52afdaf9
AH
1033 struct map_groups *kmaps)
1034{
1035 struct rb_root modules = RB_ROOT;
1036 struct map *old_map;
1037 int err;
1038
1039 err = read_proc_modules(filename, &modules);
1040 if (err)
1041 return err;
1042
3183f8ca 1043 old_map = map_groups__first(kmaps);
52afdaf9
AH
1044 while (old_map) {
1045 struct map *next = map_groups__next(old_map);
1046 struct module_info *mi;
1047
5759a682 1048 if (!__map__is_kmodule(old_map)) {
52afdaf9
AH
1049 old_map = next;
1050 continue;
1051 }
1052
1053 /* Module must be in memory at the same address */
1054 mi = find_module(old_map->dso->short_name, &modules);
1055 if (!mi || mi->start != old_map->start) {
1056 err = -EINVAL;
1057 goto out;
1058 }
1059
1060 old_map = next;
1061 }
1062out:
1063 delete_modules(&modules);
1064 return err;
1065}
1066
8e0cf965 1067/*
52afdaf9 1068 * If kallsyms is referenced by name then we look for filename in the same
8e0cf965
AH
1069 * directory.
1070 */
52afdaf9
AH
1071static bool filename_from_kallsyms_filename(char *filename,
1072 const char *base_name,
1073 const char *kallsyms_filename)
8e0cf965
AH
1074{
1075 char *name;
1076
52afdaf9
AH
1077 strcpy(filename, kallsyms_filename);
1078 name = strrchr(filename, '/');
8e0cf965
AH
1079 if (!name)
1080 return false;
1081
52afdaf9
AH
1082 name += 1;
1083
1084 if (!strcmp(name, "kallsyms")) {
1085 strcpy(name, base_name);
8e0cf965
AH
1086 return true;
1087 }
1088
1089 return false;
1090}
1091
52afdaf9
AH
1092static int validate_kcore_modules(const char *kallsyms_filename,
1093 struct map *map)
1094{
ba92732e 1095 struct map_groups *kmaps = map__kmaps(map);
52afdaf9
AH
1096 char modules_filename[PATH_MAX];
1097
ba92732e
WN
1098 if (!kmaps)
1099 return -EINVAL;
1100
52afdaf9
AH
1101 if (!filename_from_kallsyms_filename(modules_filename, "modules",
1102 kallsyms_filename))
1103 return -EINVAL;
1104
5759a682 1105 if (do_validate_kcore_modules(modules_filename, kmaps))
52afdaf9
AH
1106 return -EINVAL;
1107
1108 return 0;
1109}
1110
a00d28cb
AH
1111static int validate_kcore_addresses(const char *kallsyms_filename,
1112 struct map *map)
1113{
1114 struct kmap *kmap = map__kmap(map);
1115
ba92732e
WN
1116 if (!kmap)
1117 return -EINVAL;
1118
a00d28cb
AH
1119 if (kmap->ref_reloc_sym && kmap->ref_reloc_sym->name) {
1120 u64 start;
1121
b843f62a
ACM
1122 if (kallsyms__get_function_start(kallsyms_filename,
1123 kmap->ref_reloc_sym->name, &start))
1124 return -ENOENT;
a00d28cb
AH
1125 if (start != kmap->ref_reloc_sym->addr)
1126 return -EINVAL;
1127 }
1128
1129 return validate_kcore_modules(kallsyms_filename, map);
1130}
1131
52afdaf9
AH
1132struct kcore_mapfn_data {
1133 struct dso *dso;
52afdaf9
AH
1134 struct list_head maps;
1135};
1136
1137static int kcore_mapfn(u64 start, u64 len, u64 pgoff, void *data)
1138{
1139 struct kcore_mapfn_data *md = data;
1140 struct map *map;
1141
3183f8ca 1142 map = map__new2(start, md->dso);
52afdaf9
AH
1143 if (map == NULL)
1144 return -ENOMEM;
1145
1146 map->end = map->start + len;
1147 map->pgoff = pgoff;
1148
1149 list_add(&map->node, &md->maps);
1150
1151 return 0;
1152}
1153
8e0cf965
AH
1154static int dso__load_kcore(struct dso *dso, struct map *map,
1155 const char *kallsyms_filename)
1156{
ba92732e 1157 struct map_groups *kmaps = map__kmaps(map);
8e0cf965
AH
1158 struct kcore_mapfn_data md;
1159 struct map *old_map, *new_map, *replacement_map = NULL;
1c5aae77 1160 struct machine *machine;
8e0cf965
AH
1161 bool is_64_bit;
1162 int err, fd;
1163 char kcore_filename[PATH_MAX];
56549978 1164 u64 stext;
8e0cf965 1165
ba92732e
WN
1166 if (!kmaps)
1167 return -EINVAL;
1168
1c5aae77
AH
1169 machine = kmaps->machine;
1170
8e0cf965 1171 /* This function requires that the map is the kernel map */
efdd5c6b 1172 if (!__map__is_kernel(map))
8e0cf965
AH
1173 return -EINVAL;
1174
52afdaf9
AH
1175 if (!filename_from_kallsyms_filename(kcore_filename, "kcore",
1176 kallsyms_filename))
1177 return -EINVAL;
1178
a00d28cb
AH
1179 /* Modules and kernel must be present at their original addresses */
1180 if (validate_kcore_addresses(kallsyms_filename, map))
8e0cf965
AH
1181 return -EINVAL;
1182
1183 md.dso = dso;
8e0cf965
AH
1184 INIT_LIST_HEAD(&md.maps);
1185
1186 fd = open(kcore_filename, O_RDONLY);
36c8bb56 1187 if (fd < 0) {
133de940
AH
1188 pr_debug("Failed to open %s. Note /proc/kcore requires CAP_SYS_RAWIO capability to access.\n",
1189 kcore_filename);
8e0cf965 1190 return -EINVAL;
36c8bb56 1191 }
8e0cf965
AH
1192
1193 /* Read new maps into temporary lists */
e9814df8 1194 err = file__read_maps(fd, map->prot & PROT_EXEC, kcore_mapfn, &md,
8e0cf965
AH
1195 &is_64_bit);
1196 if (err)
1197 goto out_err;
c6d8f2a4 1198 dso->is_64_bit = is_64_bit;
8e0cf965
AH
1199
1200 if (list_empty(&md.maps)) {
1201 err = -EINVAL;
1202 goto out_err;
1203 }
1204
1205 /* Remove old maps */
3183f8ca 1206 old_map = map_groups__first(kmaps);
8e0cf965
AH
1207 while (old_map) {
1208 struct map *next = map_groups__next(old_map);
1209
1210 if (old_map != map)
1211 map_groups__remove(kmaps, old_map);
1212 old_map = next;
1213 }
1c5aae77 1214 machine->trampolines_mapped = false;
8e0cf965 1215
56549978
AH
1216 /* Find the kernel map using the '_stext' symbol */
1217 if (!kallsyms__get_function_start(kallsyms_filename, "_stext", &stext)) {
1218 list_for_each_entry(new_map, &md.maps, node) {
1219 if (stext >= new_map->start && stext < new_map->end) {
1220 replacement_map = new_map;
1221 break;
1222 }
8e0cf965
AH
1223 }
1224 }
1225
1226 if (!replacement_map)
1227 replacement_map = list_entry(md.maps.next, struct map, node);
1228
1229 /* Add new maps */
1230 while (!list_empty(&md.maps)) {
1231 new_map = list_entry(md.maps.next, struct map, node);
facf3f06 1232 list_del_init(&new_map->node);
8e0cf965
AH
1233 if (new_map == replacement_map) {
1234 map->start = new_map->start;
1235 map->end = new_map->end;
1236 map->pgoff = new_map->pgoff;
1237 map->map_ip = new_map->map_ip;
1238 map->unmap_ip = new_map->unmap_ip;
8e0cf965 1239 /* Ensure maps are correctly ordered */
84c2cafa 1240 map__get(map);
8e0cf965
AH
1241 map_groups__remove(kmaps, map);
1242 map_groups__insert(kmaps, map);
84c2cafa 1243 map__put(map);
8e0cf965
AH
1244 } else {
1245 map_groups__insert(kmaps, new_map);
1246 }
84c2cafa
ACM
1247
1248 map__put(new_map);
8e0cf965
AH
1249 }
1250
1c5aae77
AH
1251 if (machine__is(machine, "x86_64")) {
1252 u64 addr;
1253
1254 /*
1255 * If one of the corresponding symbols is there, assume the
1256 * entry trampoline maps are too.
1257 */
1258 if (!kallsyms__get_function_start(kallsyms_filename,
1259 ENTRY_TRAMPOLINE_NAME,
1260 &addr))
1261 machine->trampolines_mapped = true;
1262 }
1263
8e0cf965
AH
1264 /*
1265 * Set the data type and long name so that kcore can be read via
1266 * dso__data_read_addr().
1267 */
1268 if (dso->kernel == DSO_TYPE_GUEST_KERNEL)
5f70619d 1269 dso->binary_type = DSO_BINARY_TYPE__GUEST_KCORE;
8e0cf965 1270 else
5f70619d 1271 dso->binary_type = DSO_BINARY_TYPE__KCORE;
7e155d4d 1272 dso__set_long_name(dso, strdup(kcore_filename), true);
8e0cf965
AH
1273
1274 close(fd);
1275
e9814df8 1276 if (map->prot & PROT_EXEC)
8e0cf965
AH
1277 pr_debug("Using %s for kernel object code\n", kcore_filename);
1278 else
1279 pr_debug("Using %s for kernel data\n", kcore_filename);
1280
1281 return 0;
1282
1283out_err:
1284 while (!list_empty(&md.maps)) {
1285 map = list_entry(md.maps.next, struct map, node);
facf3f06 1286 list_del_init(&map->node);
84c2cafa 1287 map__put(map);
8e0cf965
AH
1288 }
1289 close(fd);
1290 return -EINVAL;
1291}
1292
d9b62aba
AH
1293/*
1294 * If the kernel is relocated at boot time, kallsyms won't match. Compute the
1295 * delta based on the relocation reference symbol.
1296 */
019c6820 1297static int kallsyms__delta(struct kmap *kmap, const char *filename, u64 *delta)
d9b62aba 1298{
d9b62aba
AH
1299 u64 addr;
1300
1301 if (!kmap->ref_reloc_sym || !kmap->ref_reloc_sym->name)
1302 return 0;
1303
b843f62a 1304 if (kallsyms__get_function_start(filename, kmap->ref_reloc_sym->name, &addr))
d9b62aba
AH
1305 return -1;
1306
1307 *delta = addr - kmap->ref_reloc_sym->addr;
1308 return 0;
1309}
1310
e02092b9 1311int __dso__load_kallsyms(struct dso *dso, const char *filename,
be39db9f 1312 struct map *map, bool no_kcore)
2e538c4a 1313{
019c6820 1314 struct kmap *kmap = map__kmap(map);
d9b62aba
AH
1315 u64 delta = 0;
1316
ec80fde7
ACM
1317 if (symbol__restricted_filename(filename, "/proc/kallsyms"))
1318 return -1;
1319
019c6820
ACM
1320 if (!kmap || !kmap->kmaps)
1321 return -1;
1322
333cc76c 1323 if (dso__load_all_kallsyms(dso, filename) < 0)
2e538c4a
ACM
1324 return -1;
1325
019c6820 1326 if (kallsyms__delta(kmap, filename, &delta))
d9b62aba
AH
1327 return -1;
1328
3183f8ca
ACM
1329 symbols__fixup_end(&dso->symbols);
1330 symbols__fixup_duplicate(&dso->symbols);
3f5a4272 1331
aeafcbaf 1332 if (dso->kernel == DSO_TYPE_GUEST_KERNEL)
44f24cb3 1333 dso->symtab_type = DSO_BINARY_TYPE__GUEST_KALLSYMS;
a1645ce1 1334 else
44f24cb3 1335 dso->symtab_type = DSO_BINARY_TYPE__KALLSYMS;
2e538c4a 1336
e02092b9 1337 if (!no_kcore && !dso__load_kcore(dso, map, filename))
15e0e2d4 1338 return map_groups__split_kallsyms_for_kcore(kmap->kmaps, dso);
8e0cf965 1339 else
15e0e2d4 1340 return map_groups__split_kallsyms(kmap->kmaps, dso, delta, map);
af427bf5
ACM
1341}
1342
e02092b9 1343int dso__load_kallsyms(struct dso *dso, const char *filename,
be39db9f 1344 struct map *map)
e02092b9 1345{
be39db9f 1346 return __dso__load_kallsyms(dso, filename, map, false);
e02092b9
ACM
1347}
1348
3183f8ca 1349static int dso__load_perf_map(const char *map_path, struct dso *dso)
80d496be
PE
1350{
1351 char *line = NULL;
1352 size_t n;
1353 FILE *file;
1354 int nr_syms = 0;
1355
bf2e710b 1356 file = fopen(map_path, "r");
80d496be
PE
1357 if (file == NULL)
1358 goto out_failure;
1359
1360 while (!feof(file)) {
9cffa8d5 1361 u64 start, size;
80d496be
PE
1362 struct symbol *sym;
1363 int line_len, len;
1364
1365 line_len = getline(&line, &n, file);
1366 if (line_len < 0)
1367 break;
1368
1369 if (!line)
1370 goto out_failure;
1371
1372 line[--line_len] = '\0'; /* \n */
1373
1374 len = hex2u64(line, &start);
1375
1376 len++;
1377 if (len + 2 >= line_len)
1378 continue;
1379
1380 len += hex2u64(line + len, &size);
1381
1382 len++;
1383 if (len + 2 >= line_len)
1384 continue;
1385
af30bffa 1386 sym = symbol__new(start, size, STB_GLOBAL, STT_FUNC, line + len);
80d496be
PE
1387
1388 if (sym == NULL)
1389 goto out_delete_line;
1390
3183f8ca 1391 symbols__insert(&dso->symbols, sym);
be39db9f 1392 nr_syms++;
80d496be
PE
1393 }
1394
1395 free(line);
1396 fclose(file);
1397
1398 return nr_syms;
1399
1400out_delete_line:
1401 free(line);
1402out_failure:
1403 return -1;
1404}
1405
1029f9fe
NK
1406static bool dso__is_compatible_symtab_type(struct dso *dso, bool kmod,
1407 enum dso_binary_type type)
1408{
1409 switch (type) {
1410 case DSO_BINARY_TYPE__JAVA_JIT:
1411 case DSO_BINARY_TYPE__DEBUGLINK:
1412 case DSO_BINARY_TYPE__SYSTEM_PATH_DSO:
1413 case DSO_BINARY_TYPE__FEDORA_DEBUGINFO:
1414 case DSO_BINARY_TYPE__UBUNTU_DEBUGINFO:
1415 case DSO_BINARY_TYPE__BUILDID_DEBUGINFO:
1416 case DSO_BINARY_TYPE__OPENEMBEDDED_DEBUGINFO:
1417 return !kmod && dso->kernel == DSO_TYPE_USER;
1418
1419 case DSO_BINARY_TYPE__KALLSYMS:
1420 case DSO_BINARY_TYPE__VMLINUX:
1421 case DSO_BINARY_TYPE__KCORE:
1422 return dso->kernel == DSO_TYPE_KERNEL;
1423
1424 case DSO_BINARY_TYPE__GUEST_KALLSYMS:
1425 case DSO_BINARY_TYPE__GUEST_VMLINUX:
1426 case DSO_BINARY_TYPE__GUEST_KCORE:
1427 return dso->kernel == DSO_TYPE_GUEST_KERNEL;
1428
1429 case DSO_BINARY_TYPE__GUEST_KMODULE:
c00c48fc 1430 case DSO_BINARY_TYPE__GUEST_KMODULE_COMP:
1029f9fe 1431 case DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE:
c00c48fc 1432 case DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP:
1029f9fe
NK
1433 /*
1434 * kernel modules know their symtab type - it's set when
9f2de315 1435 * creating a module dso in machine__findnew_module_map().
1029f9fe
NK
1436 */
1437 return kmod && dso->symtab_type == type;
1438
1439 case DSO_BINARY_TYPE__BUILD_ID_CACHE:
d2396999 1440 case DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO:
1029f9fe
NK
1441 return true;
1442
1443 case DSO_BINARY_TYPE__NOT_FOUND:
1444 default:
1445 return false;
1446 }
1447}
1448
bf2e710b
KJ
1449/* Checks for the existence of the perf-<pid>.map file in two different
1450 * locations. First, if the process is a separate mount namespace, check in
1451 * that namespace using the pid of the innermost pid namespace. If's not in a
1452 * namespace, or the file can't be found there, try in the mount namespace of
1453 * the tracing process using our view of its pid.
1454 */
1455static int dso__find_perf_map(char *filebuf, size_t bufsz,
1456 struct nsinfo **nsip)
1457{
1458 struct nscookie nsc;
1459 struct nsinfo *nsi;
1460 struct nsinfo *nnsi;
1461 int rc = -1;
1462
1463 nsi = *nsip;
1464
1465 if (nsi->need_setns) {
1466 snprintf(filebuf, bufsz, "/tmp/perf-%d.map", nsi->nstgid);
1467 nsinfo__mountns_enter(nsi, &nsc);
1468 rc = access(filebuf, R_OK);
1469 nsinfo__mountns_exit(&nsc);
1470 if (rc == 0)
1471 return rc;
1472 }
1473
1474 nnsi = nsinfo__copy(nsi);
1475 if (nnsi) {
1476 nsinfo__put(nsi);
1477
1478 nnsi->need_setns = false;
1479 snprintf(filebuf, bufsz, "/tmp/perf-%d.map", nnsi->tgid);
1480 *nsip = nnsi;
1481 rc = 0;
1482 }
1483
1484 return rc;
1485}
1486
be39db9f 1487int dso__load(struct dso *dso, struct map *map)
a2928c42 1488{
c338aee8 1489 char *name;
a2928c42 1490 int ret = -1;
44f24cb3 1491 u_int i;
23346f21 1492 struct machine *machine;
44f24cb3 1493 char *root_dir = (char *) "";
3aafe5ae
CS
1494 int ss_pos = 0;
1495 struct symsrc ss_[2];
1496 struct symsrc *syms_ss = NULL, *runtime_ss = NULL;
1029f9fe 1497 bool kmod;
bf2e710b 1498 bool perfmap;
5baecbcd 1499 unsigned char build_id[BUILD_ID_SIZE];
843ff37b 1500 struct nscookie nsc;
bf2e710b
KJ
1501 char newmapname[PATH_MAX];
1502 const char *map_path = dso->long_name;
1503
1504 perfmap = strncmp(dso->name, "/tmp/perf-", 10) == 0;
1505 if (perfmap) {
1506 if (dso->nsinfo && (dso__find_perf_map(newmapname,
1507 sizeof(newmapname), &dso->nsinfo) == 0)) {
1508 map_path = newmapname;
1509 }
1510 }
a2928c42 1511
843ff37b 1512 nsinfo__mountns_enter(dso->nsinfo, &nsc);
4a936edc
NK
1513 pthread_mutex_lock(&dso->lock);
1514
1515 /* check again under the dso->lock */
3183f8ca 1516 if (dso__loaded(dso)) {
4a936edc
NK
1517 ret = 1;
1518 goto out;
1519 }
66bd8424 1520
4d99e413
AH
1521 if (map->groups && map->groups->machine)
1522 machine = map->groups->machine;
1523 else
1524 machine = NULL;
1525
4a936edc
NK
1526 if (dso->kernel) {
1527 if (dso->kernel == DSO_TYPE_KERNEL)
be39db9f 1528 ret = dso__load_kernel_sym(dso, map);
4a936edc 1529 else if (dso->kernel == DSO_TYPE_GUEST_KERNEL)
be39db9f 1530 ret = dso__load_guest_kernel_sym(dso, map);
4a936edc 1531
4d99e413
AH
1532 if (machine__is(machine, "x86_64"))
1533 machine__map_x86_64_entry_trampolines(machine, dso);
4a936edc
NK
1534 goto out;
1535 }
a1645ce1 1536
aeafcbaf 1537 dso->adjust_symbols = 0;
f5812a7a 1538
bf2e710b 1539 if (perfmap) {
981c1252
PE
1540 struct stat st;
1541
bf2e710b 1542 if (lstat(map_path, &st) < 0)
4a936edc 1543 goto out;
981c1252 1544
2059fc7a 1545 if (!symbol_conf.force && st.st_uid && (st.st_uid != geteuid())) {
981c1252 1546 pr_warning("File %s not owned by current user or root, "
bf2e710b 1547 "ignoring it (use -f to override).\n", map_path);
4a936edc 1548 goto out;
981c1252
PE
1549 }
1550
3183f8ca 1551 ret = dso__load_perf_map(map_path, dso);
44f24cb3
JO
1552 dso->symtab_type = ret > 0 ? DSO_BINARY_TYPE__JAVA_JIT :
1553 DSO_BINARY_TYPE__NOT_FOUND;
4a936edc 1554 goto out;
94cb9e38
ACM
1555 }
1556
44f24cb3
JO
1557 if (machine)
1558 root_dir = machine->root_dir;
1559
164c800e
DA
1560 name = malloc(PATH_MAX);
1561 if (!name)
4a936edc 1562 goto out;
164c800e 1563
1029f9fe 1564 kmod = dso->symtab_type == DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE ||
c00c48fc
NK
1565 dso->symtab_type == DSO_BINARY_TYPE__SYSTEM_PATH_KMODULE_COMP ||
1566 dso->symtab_type == DSO_BINARY_TYPE__GUEST_KMODULE ||
1567 dso->symtab_type == DSO_BINARY_TYPE__GUEST_KMODULE_COMP;
1029f9fe 1568
5baecbcd
DK
1569
1570 /*
1571 * Read the build id if possible. This is required for
1572 * DSO_BINARY_TYPE__BUILDID_DEBUGINFO to work
1573 */
ed6c166c 1574 if (!dso->has_build_id &&
9b200653
VK
1575 is_regular_file(dso->long_name)) {
1576 __symbol__join_symfs(name, PATH_MAX, dso->long_name);
1577 if (filename__read_build_id(name, build_id, BUILD_ID_SIZE) > 0)
5baecbcd 1578 dso__set_build_id(dso, build_id);
9b200653 1579 }
5baecbcd 1580
1029f9fe
NK
1581 /*
1582 * Iterate over candidate debug images.
3aafe5ae
CS
1583 * Keep track of "interesting" ones (those which have a symtab, dynsym,
1584 * and/or opd section) for processing.
6da80ce8 1585 */
44f24cb3 1586 for (i = 0; i < DSO_BINARY_TYPE__SYMTAB_CNT; i++) {
3aafe5ae
CS
1587 struct symsrc *ss = &ss_[ss_pos];
1588 bool next_slot = false;
f045b8c4 1589 bool is_reg;
d2396999 1590 bool nsexit;
c3962961 1591 int sirc = -1;
6da80ce8 1592
005f9294 1593 enum dso_binary_type symtab_type = binary_type_symtab[i];
ec5761ea 1594
d2396999
KJ
1595 nsexit = (symtab_type == DSO_BINARY_TYPE__BUILD_ID_CACHE ||
1596 symtab_type == DSO_BINARY_TYPE__BUILD_ID_CACHE_DEBUGINFO);
1597
1029f9fe
NK
1598 if (!dso__is_compatible_symtab_type(dso, kmod, symtab_type))
1599 continue;
1600
ee4e9625
ACM
1601 if (dso__read_binary_type_filename(dso, symtab_type,
1602 root_dir, name, PATH_MAX))
44f24cb3 1603 continue;
6da80ce8 1604
d2396999 1605 if (nsexit)
f045b8c4
KJ
1606 nsinfo__mountns_exit(&nsc);
1607
1608 is_reg = is_regular_file(name);
c3962961
JO
1609 if (is_reg)
1610 sirc = symsrc__init(ss, dso, name, symtab_type);
40356721 1611
d2396999 1612 if (nsexit)
f045b8c4
KJ
1613 nsinfo__mountns_enter(dso->nsinfo, &nsc);
1614
c3962961 1615 if (!is_reg || sirc < 0)
6da80ce8 1616 continue;
a2928c42 1617
3aafe5ae
CS
1618 if (!syms_ss && symsrc__has_symtab(ss)) {
1619 syms_ss = ss;
1620 next_slot = true;
0058aef6
AH
1621 if (!dso->symsrc_filename)
1622 dso->symsrc_filename = strdup(name);
d26cd12b
CS
1623 }
1624
3aafe5ae
CS
1625 if (!runtime_ss && symsrc__possibly_runtime(ss)) {
1626 runtime_ss = ss;
1627 next_slot = true;
a44f605b 1628 }
a2928c42 1629
3aafe5ae
CS
1630 if (next_slot) {
1631 ss_pos++;
33ff581e 1632
3aafe5ae
CS
1633 if (syms_ss && runtime_ss)
1634 break;
98e9f03b
NK
1635 } else {
1636 symsrc__destroy(ss);
6da80ce8 1637 }
3aafe5ae 1638
a25e46c4 1639 }
6da80ce8 1640
3aafe5ae
CS
1641 if (!runtime_ss && !syms_ss)
1642 goto out_free;
1643
1644 if (runtime_ss && !syms_ss) {
1645 syms_ss = runtime_ss;
1646 }
1647
1648 /* We'll have to hope for the best */
1649 if (!runtime_ss && syms_ss)
1650 runtime_ss = syms_ss;
1651
1029f9fe 1652 if (syms_ss)
be39db9f 1653 ret = dso__load_sym(dso, map, syms_ss, runtime_ss, kmod);
1029f9fe 1654 else
3aafe5ae
CS
1655 ret = -1;
1656
f47b58b7 1657 if (ret > 0) {
3aafe5ae
CS
1658 int nr_plt;
1659
3183f8ca 1660 nr_plt = dso__synthesize_plt_symbols(dso, runtime_ss);
3aafe5ae
CS
1661 if (nr_plt > 0)
1662 ret += nr_plt;
60e4b10c
ACM
1663 }
1664
3aafe5ae
CS
1665 for (; ss_pos > 0; ss_pos--)
1666 symsrc__destroy(&ss_[ss_pos - 1]);
1667out_free:
a2928c42 1668 free(name);
aeafcbaf 1669 if (ret < 0 && strstr(dso->name, " (deleted)") != NULL)
4a936edc
NK
1670 ret = 0;
1671out:
3183f8ca 1672 dso__set_loaded(dso);
4a936edc 1673 pthread_mutex_unlock(&dso->lock);
843ff37b 1674 nsinfo__mountns_exit(&nsc);
4a936edc 1675
a2928c42
ACM
1676 return ret;
1677}
1678
3183f8ca 1679struct map *map_groups__find_by_name(struct map_groups *mg, const char *name)
439d473b 1680{
3183f8ca 1681 struct maps *maps = &mg->maps;
4bb7123d 1682 struct map *map;
439d473b 1683
0a7c74ea 1684 down_read(&maps->lock);
6a2ffcdd 1685
4bb7123d 1686 for (map = maps__first(maps); map; map = map__next(map)) {
b7cece76 1687 if (map->dso && strcmp(map->dso->short_name, name) == 0)
6a2ffcdd 1688 goto out_unlock;
439d473b
ACM
1689 }
1690
6a2ffcdd
ACM
1691 map = NULL;
1692
1693out_unlock:
0a7c74ea 1694 up_read(&maps->lock);
6a2ffcdd 1695 return map;
439d473b
ACM
1696}
1697
aeafcbaf 1698int dso__load_vmlinux(struct dso *dso, struct map *map,
be39db9f 1699 const char *vmlinux, bool vmlinux_allocated)
a2928c42 1700{
b68e2f91
CS
1701 int err = -1;
1702 struct symsrc ss;
ec5761ea 1703 char symfs_vmlinux[PATH_MAX];
005f9294 1704 enum dso_binary_type symtab_type;
a2928c42 1705
5698d2c9
NK
1706 if (vmlinux[0] == '/')
1707 snprintf(symfs_vmlinux, sizeof(symfs_vmlinux), "%s", vmlinux);
1708 else
972f393b 1709 symbol__join_symfs(symfs_vmlinux, vmlinux);
a2928c42 1710
21ea4539 1711 if (dso->kernel == DSO_TYPE_GUEST_KERNEL)
005f9294 1712 symtab_type = DSO_BINARY_TYPE__GUEST_VMLINUX;
21ea4539 1713 else
005f9294 1714 symtab_type = DSO_BINARY_TYPE__VMLINUX;
21ea4539 1715
005f9294 1716 if (symsrc__init(&ss, dso, symfs_vmlinux, symtab_type))
b68e2f91
CS
1717 return -1;
1718
be39db9f 1719 err = dso__load_sym(dso, map, &ss, &ss, 0);
b68e2f91 1720 symsrc__destroy(&ss);
a2928c42 1721
515850e4 1722 if (err > 0) {
39b12f78 1723 if (dso->kernel == DSO_TYPE_GUEST_KERNEL)
5f70619d 1724 dso->binary_type = DSO_BINARY_TYPE__GUEST_VMLINUX;
39b12f78 1725 else
5f70619d 1726 dso->binary_type = DSO_BINARY_TYPE__VMLINUX;
bf4414ae 1727 dso__set_long_name(dso, vmlinux, vmlinux_allocated);
3183f8ca 1728 dso__set_loaded(dso);
ec5761ea 1729 pr_debug("Using %s for symbols\n", symfs_vmlinux);
515850e4 1730 }
3846df2e 1731
a2928c42
ACM
1732 return err;
1733}
1734
be39db9f 1735int dso__load_vmlinux_path(struct dso *dso, struct map *map)
a19afe46
ACM
1736{
1737 int i, err = 0;
00dc8657 1738 char *filename = NULL;
a19afe46 1739
dc38218e
ACM
1740 pr_debug("Looking at the vmlinux_path (%d entries long)\n",
1741 vmlinux_path__nr_entries + 1);
1742
1743 for (i = 0; i < vmlinux_path__nr_entries; ++i) {
be39db9f 1744 err = dso__load_vmlinux(dso, map, vmlinux_path[i], false);
dc38218e
ACM
1745 if (err > 0)
1746 goto out;
1747 }
1748
00dc8657 1749 if (!symbol_conf.ignore_vmlinux_buildid)
d2396999 1750 filename = dso__build_id_filename(dso, NULL, 0, false);
5ad90e4e 1751 if (filename != NULL) {
be39db9f 1752 err = dso__load_vmlinux(dso, map, filename, true);
5230fb7d 1753 if (err > 0)
5ad90e4e 1754 goto out;
5ad90e4e
ACM
1755 free(filename);
1756 }
5ad90e4e 1757out:
a19afe46
ACM
1758 return err;
1759}
1760
c48903b8
MH
1761static bool visible_dir_filter(const char *name, struct dirent *d)
1762{
1763 if (d->d_type != DT_DIR)
1764 return false;
1765 return lsdir_no_dot_filter(name, d);
1766}
1767
0544d422
AH
1768static int find_matching_kcore(struct map *map, char *dir, size_t dir_sz)
1769{
1770 char kallsyms_filename[PATH_MAX];
0544d422 1771 int ret = -1;
c48903b8
MH
1772 struct strlist *dirs;
1773 struct str_node *nd;
0544d422 1774
c48903b8
MH
1775 dirs = lsdir(dir, visible_dir_filter);
1776 if (!dirs)
0544d422
AH
1777 return -1;
1778
602a1f4d 1779 strlist__for_each_entry(nd, dirs) {
0544d422 1780 scnprintf(kallsyms_filename, sizeof(kallsyms_filename),
c48903b8 1781 "%s/%s/kallsyms", dir, nd->s);
a00d28cb 1782 if (!validate_kcore_addresses(kallsyms_filename, map)) {
0544d422
AH
1783 strlcpy(dir, kallsyms_filename, dir_sz);
1784 ret = 0;
1785 break;
1786 }
1787 }
1788
c48903b8 1789 strlist__delete(dirs);
0544d422
AH
1790
1791 return ret;
1792}
1793
11870d71
MH
1794/*
1795 * Use open(O_RDONLY) to check readability directly instead of access(R_OK)
1796 * since access(R_OK) only checks with real UID/GID but open() use effective
1797 * UID/GID and actual capabilities (e.g. /proc/kcore requires CAP_SYS_RAWIO).
1798 */
1799static bool filename__readable(const char *file)
1800{
1801 int fd = open(file, O_RDONLY);
1802 if (fd < 0)
1803 return false;
1804 close(fd);
1805 return true;
1806}
1807
0544d422
AH
1808static char *dso__find_kallsyms(struct dso *dso, struct map *map)
1809{
1810 u8 host_build_id[BUILD_ID_SIZE];
b5d8bbe8 1811 char sbuild_id[SBUILD_ID_SIZE];
0544d422
AH
1812 bool is_host = false;
1813 char path[PATH_MAX];
1814
1815 if (!dso->has_build_id) {
1816 /*
1817 * Last resort, if we don't have a build-id and couldn't find
1818 * any vmlinux file, try the running kernel kallsyms table.
1819 */
1820 goto proc_kallsyms;
1821 }
1822
1823 if (sysfs__read_build_id("/sys/kernel/notes", host_build_id,
1824 sizeof(host_build_id)) == 0)
1825 is_host = dso__build_id_equal(dso, host_build_id);
1826
4e4b6c06 1827 /* Try a fast path for /proc/kallsyms if possible */
0544d422 1828 if (is_host) {
0544d422 1829 /*
11870d71
MH
1830 * Do not check the build-id cache, unless we know we cannot use
1831 * /proc/kcore or module maps don't match to /proc/kallsyms.
1832 * To check readability of /proc/kcore, do not use access(R_OK)
1833 * since /proc/kcore requires CAP_SYS_RAWIO to read and access
1834 * can't check it.
0544d422 1835 */
11870d71
MH
1836 if (filename__readable("/proc/kcore") &&
1837 !validate_kcore_addresses("/proc/kallsyms", map))
1838 goto proc_kallsyms;
0544d422
AH
1839 }
1840
4e4b6c06
MH
1841 build_id__sprintf(dso->build_id, sizeof(dso->build_id), sbuild_id);
1842
449867e3 1843 /* Find kallsyms in build-id cache with kcore */
4e4b6c06
MH
1844 scnprintf(path, sizeof(path), "%s/%s/%s",
1845 buildid_dir, DSO__NAME_KCORE, sbuild_id);
1846
449867e3
AH
1847 if (!find_matching_kcore(map, path, sizeof(path)))
1848 return strdup(path);
1849
4e4b6c06
MH
1850 /* Use current /proc/kallsyms if possible */
1851 if (is_host) {
1852proc_kallsyms:
1853 return strdup("/proc/kallsyms");
1854 }
1855
1856 /* Finally, find a cache of kallsyms */
01412261 1857 if (!build_id_cache__kallsyms_path(sbuild_id, path, sizeof(path))) {
0544d422
AH
1858 pr_err("No kallsyms or vmlinux with build-id %s was found\n",
1859 sbuild_id);
1860 return NULL;
1861 }
1862
1863 return strdup(path);
0544d422
AH
1864}
1865
be39db9f 1866static int dso__load_kernel_sym(struct dso *dso, struct map *map)
a827c875 1867{
cc612d81 1868 int err;
9e201442
ACM
1869 const char *kallsyms_filename = NULL;
1870 char *kallsyms_allocated_filename = NULL;
dc8d6ab2 1871 /*
b226a5a7
DA
1872 * Step 1: if the user specified a kallsyms or vmlinux filename, use
1873 * it and only it, reporting errors to the user if it cannot be used.
dc8d6ab2
ACM
1874 *
1875 * For instance, try to analyse an ARM perf.data file _without_ a
1876 * build-id, or if the user specifies the wrong path to the right
1877 * vmlinux file, obviously we can't fallback to another vmlinux (a
1878 * x86_86 one, on the machine where analysis is being performed, say),
1879 * or worse, /proc/kallsyms.
1880 *
1881 * If the specified file _has_ a build-id and there is a build-id
1882 * section in the perf.data file, we will still do the expected
1883 * validation in dso__load_vmlinux and will bail out if they don't
1884 * match.
1885 */
b226a5a7
DA
1886 if (symbol_conf.kallsyms_name != NULL) {
1887 kallsyms_filename = symbol_conf.kallsyms_name;
1888 goto do_kallsyms;
1889 }
1890
fc2be696 1891 if (!symbol_conf.ignore_vmlinux && symbol_conf.vmlinux_name != NULL) {
be39db9f 1892 return dso__load_vmlinux(dso, map, symbol_conf.vmlinux_name, false);
dc8d6ab2 1893 }
cc612d81 1894
fc2be696 1895 if (!symbol_conf.ignore_vmlinux && vmlinux_path != NULL) {
be39db9f 1896 err = dso__load_vmlinux_path(dso, map);
a19afe46 1897 if (err > 0)
39b12f78 1898 return err;
cc612d81
ACM
1899 }
1900
ec5761ea
DA
1901 /* do not try local files if a symfs was given */
1902 if (symbol_conf.symfs[0] != 0)
1903 return -1;
1904
0544d422
AH
1905 kallsyms_allocated_filename = dso__find_kallsyms(dso, map);
1906 if (!kallsyms_allocated_filename)
1907 return -1;
19fc2ded 1908
0544d422 1909 kallsyms_filename = kallsyms_allocated_filename;
439d473b 1910
cc612d81 1911do_kallsyms:
be39db9f 1912 err = dso__load_kallsyms(dso, kallsyms_filename, map);
3846df2e
ACM
1913 if (err > 0)
1914 pr_debug("Using %s for symbols\n", kallsyms_filename);
dc8d6ab2 1915 free(kallsyms_allocated_filename);
439d473b 1916
8e0cf965 1917 if (err > 0 && !dso__is_kcore(dso)) {
bdac0bcf 1918 dso->binary_type = DSO_BINARY_TYPE__KALLSYMS;
0a77582f 1919 dso__set_long_name(dso, DSO__NAME_KALLSYMS, false);
6a4694a4
ACM
1920 map__fixup_start(map);
1921 map__fixup_end(map);
439d473b 1922 }
94cb9e38 1923
a827c875
ACM
1924 return err;
1925}
1926
be39db9f 1927static int dso__load_guest_kernel_sym(struct dso *dso, struct map *map)
a1645ce1
ZY
1928{
1929 int err;
1930 const char *kallsyms_filename = NULL;
23346f21 1931 struct machine *machine;
a1645ce1
ZY
1932 char path[PATH_MAX];
1933
1934 if (!map->groups) {
1935 pr_debug("Guest kernel map hasn't the point to groups\n");
1936 return -1;
1937 }
23346f21 1938 machine = map->groups->machine;
a1645ce1 1939
23346f21 1940 if (machine__is_default_guest(machine)) {
a1645ce1
ZY
1941 /*
1942 * if the user specified a vmlinux filename, use it and only
1943 * it, reporting errors to the user if it cannot be used.
1944 * Or use file guest_kallsyms inputted by user on commandline
1945 */
1946 if (symbol_conf.default_guest_vmlinux_name != NULL) {
aeafcbaf 1947 err = dso__load_vmlinux(dso, map,
5230fb7d 1948 symbol_conf.default_guest_vmlinux_name,
be39db9f 1949 false);
39b12f78 1950 return err;
a1645ce1
ZY
1951 }
1952
1953 kallsyms_filename = symbol_conf.default_guest_kallsyms;
1954 if (!kallsyms_filename)
1955 return -1;
1956 } else {
23346f21 1957 sprintf(path, "%s/proc/kallsyms", machine->root_dir);
a1645ce1
ZY
1958 kallsyms_filename = path;
1959 }
1960
be39db9f 1961 err = dso__load_kallsyms(dso, kallsyms_filename, map);
8e0cf965 1962 if (err > 0)
39b12f78 1963 pr_debug("Using %s for symbols\n", kallsyms_filename);
8e0cf965 1964 if (err > 0 && !dso__is_kcore(dso)) {
bdac0bcf 1965 dso->binary_type = DSO_BINARY_TYPE__GUEST_KALLSYMS;
8c7f1bb3 1966 dso__set_long_name(dso, machine->mmap_name, false);
a1645ce1
ZY
1967 map__fixup_start(map);
1968 map__fixup_end(map);
1969 }
1970
1971 return err;
1972}
cd84c2ac 1973
cc612d81
ACM
1974static void vmlinux_path__exit(void)
1975{
04662523
ACM
1976 while (--vmlinux_path__nr_entries >= 0)
1977 zfree(&vmlinux_path[vmlinux_path__nr_entries]);
c4f03547 1978 vmlinux_path__nr_entries = 0;
cc612d81 1979
04662523 1980 zfree(&vmlinux_path);
cc612d81
ACM
1981}
1982
aac48647
ET
1983static const char * const vmlinux_paths[] = {
1984 "vmlinux",
1985 "/boot/vmlinux"
1986};
1987
1988static const char * const vmlinux_paths_upd[] = {
1989 "/boot/vmlinux-%s",
1990 "/usr/lib/debug/boot/vmlinux-%s",
1991 "/lib/modules/%s/build/vmlinux",
f55ae954
ET
1992 "/usr/lib/debug/lib/modules/%s/vmlinux",
1993 "/usr/lib/debug/boot/vmlinux-%s.debug"
aac48647
ET
1994};
1995
1996static int vmlinux_path__add(const char *new_entry)
1997{
1998 vmlinux_path[vmlinux_path__nr_entries] = strdup(new_entry);
1999 if (vmlinux_path[vmlinux_path__nr_entries] == NULL)
2000 return -1;
2001 ++vmlinux_path__nr_entries;
2002
2003 return 0;
2004}
2005
ce80d3be 2006static int vmlinux_path__init(struct perf_env *env)
cc612d81
ACM
2007{
2008 struct utsname uts;
2009 char bf[PATH_MAX];
0a7e6d1b 2010 char *kernel_version;
aac48647 2011 unsigned int i;
cc612d81 2012
aac48647
ET
2013 vmlinux_path = malloc(sizeof(char *) * (ARRAY_SIZE(vmlinux_paths) +
2014 ARRAY_SIZE(vmlinux_paths_upd)));
cc612d81
ACM
2015 if (vmlinux_path == NULL)
2016 return -1;
2017
aac48647
ET
2018 for (i = 0; i < ARRAY_SIZE(vmlinux_paths); i++)
2019 if (vmlinux_path__add(vmlinux_paths[i]) < 0)
2020 goto out_fail;
ec5761ea 2021
0a7e6d1b 2022 /* only try kernel version if no symfs was given */
ec5761ea
DA
2023 if (symbol_conf.symfs[0] != 0)
2024 return 0;
2025
0a7e6d1b
NK
2026 if (env) {
2027 kernel_version = env->os_release;
2028 } else {
2029 if (uname(&uts) < 0)
2030 goto out_fail;
2031
2032 kernel_version = uts.release;
2033 }
ec5761ea 2034
aac48647
ET
2035 for (i = 0; i < ARRAY_SIZE(vmlinux_paths_upd); i++) {
2036 snprintf(bf, sizeof(bf), vmlinux_paths_upd[i], kernel_version);
2037 if (vmlinux_path__add(bf) < 0)
2038 goto out_fail;
2039 }
cc612d81
ACM
2040
2041 return 0;
2042
2043out_fail:
2044 vmlinux_path__exit();
2045 return -1;
2046}
2047
3bfe5f81 2048int setup_list(struct strlist **list, const char *list_str,
655000e7
ACM
2049 const char *list_name)
2050{
2051 if (list_str == NULL)
2052 return 0;
2053
4a77e218 2054 *list = strlist__new(list_str, NULL);
655000e7
ACM
2055 if (!*list) {
2056 pr_err("problems parsing %s list\n", list_name);
2057 return -1;
2058 }
0bc2f2f7
ACM
2059
2060 symbol_conf.has_filter = true;
655000e7
ACM
2061 return 0;
2062}
2063
e03eaa40
DA
2064int setup_intlist(struct intlist **list, const char *list_str,
2065 const char *list_name)
2066{
2067 if (list_str == NULL)
2068 return 0;
2069
2070 *list = intlist__new(list_str);
2071 if (!*list) {
2072 pr_err("problems parsing %s list\n", list_name);
2073 return -1;
2074 }
2075 return 0;
2076}
2077
ec80fde7
ACM
2078static bool symbol__read_kptr_restrict(void)
2079{
2080 bool value = false;
38272dc4 2081 FILE *fp = fopen("/proc/sys/kernel/kptr_restrict", "r");
ec80fde7 2082
38272dc4
WN
2083 if (fp != NULL) {
2084 char line[8];
ec80fde7 2085
38272dc4 2086 if (fgets(line, sizeof(line), fp) != NULL)
3dbe46c5 2087 value = ((geteuid() != 0) || (getuid() != 0)) ?
38272dc4
WN
2088 (atoi(line) != 0) :
2089 (atoi(line) == 2);
ec80fde7 2090
38272dc4 2091 fclose(fp);
ec80fde7
ACM
2092 }
2093
2094 return value;
2095}
2096
b01141f4
ACM
2097int symbol__annotation_init(void)
2098{
7b366142
ACM
2099 if (symbol_conf.init_annotation)
2100 return 0;
2101
b01141f4
ACM
2102 if (symbol_conf.initialized) {
2103 pr_err("Annotation needs to be init before symbol__init()\n");
2104 return -1;
2105 }
2106
b01141f4
ACM
2107 symbol_conf.priv_size += sizeof(struct annotation);
2108 symbol_conf.init_annotation = true;
2109 return 0;
2110}
2111
ce80d3be 2112int symbol__init(struct perf_env *env)
2446042c 2113{
ec5761ea
DA
2114 const char *symfs;
2115
85e00b55
JZ
2116 if (symbol_conf.initialized)
2117 return 0;
2118
9ac3e487 2119 symbol_conf.priv_size = PERF_ALIGN(symbol_conf.priv_size, sizeof(u64));
4d439517 2120
166ccc9c
NK
2121 symbol__elf_init();
2122
75be6cf4
ACM
2123 if (symbol_conf.sort_by_name)
2124 symbol_conf.priv_size += (sizeof(struct symbol_name_rb_node) -
2125 sizeof(struct symbol));
b32d133a 2126
0a7e6d1b 2127 if (symbol_conf.try_vmlinux_path && vmlinux_path__init(env) < 0)
2446042c
ACM
2128 return -1;
2129
c410a338
ACM
2130 if (symbol_conf.field_sep && *symbol_conf.field_sep == '.') {
2131 pr_err("'.' is the only non valid --field-separator argument\n");
2132 return -1;
2133 }
2134
655000e7
ACM
2135 if (setup_list(&symbol_conf.dso_list,
2136 symbol_conf.dso_list_str, "dso") < 0)
2137 return -1;
2138
2139 if (setup_list(&symbol_conf.comm_list,
2140 symbol_conf.comm_list_str, "comm") < 0)
2141 goto out_free_dso_list;
2142
e03eaa40
DA
2143 if (setup_intlist(&symbol_conf.pid_list,
2144 symbol_conf.pid_list_str, "pid") < 0)
2145 goto out_free_comm_list;
2146
2147 if (setup_intlist(&symbol_conf.tid_list,
2148 symbol_conf.tid_list_str, "tid") < 0)
2149 goto out_free_pid_list;
2150
655000e7
ACM
2151 if (setup_list(&symbol_conf.sym_list,
2152 symbol_conf.sym_list_str, "symbol") < 0)
e03eaa40 2153 goto out_free_tid_list;
655000e7 2154
64eff7d9
DA
2155 if (setup_list(&symbol_conf.bt_stop_list,
2156 symbol_conf.bt_stop_list_str, "symbol") < 0)
2157 goto out_free_sym_list;
2158
ec5761ea
DA
2159 /*
2160 * A path to symbols of "/" is identical to ""
2161 * reset here for simplicity.
2162 */
2163 symfs = realpath(symbol_conf.symfs, NULL);
2164 if (symfs == NULL)
2165 symfs = symbol_conf.symfs;
2166 if (strcmp(symfs, "/") == 0)
2167 symbol_conf.symfs = "";
2168 if (symfs != symbol_conf.symfs)
2169 free((void *)symfs);
2170
ec80fde7
ACM
2171 symbol_conf.kptr_restrict = symbol__read_kptr_restrict();
2172
85e00b55 2173 symbol_conf.initialized = true;
4aa65636 2174 return 0;
655000e7 2175
64eff7d9
DA
2176out_free_sym_list:
2177 strlist__delete(symbol_conf.sym_list);
e03eaa40
DA
2178out_free_tid_list:
2179 intlist__delete(symbol_conf.tid_list);
2180out_free_pid_list:
2181 intlist__delete(symbol_conf.pid_list);
655000e7
ACM
2182out_free_comm_list:
2183 strlist__delete(symbol_conf.comm_list);
d74c896b
NK
2184out_free_dso_list:
2185 strlist__delete(symbol_conf.dso_list);
655000e7 2186 return -1;
4aa65636
ACM
2187}
2188
d65a458b
ACM
2189void symbol__exit(void)
2190{
85e00b55
JZ
2191 if (!symbol_conf.initialized)
2192 return;
64eff7d9 2193 strlist__delete(symbol_conf.bt_stop_list);
d65a458b
ACM
2194 strlist__delete(symbol_conf.sym_list);
2195 strlist__delete(symbol_conf.dso_list);
2196 strlist__delete(symbol_conf.comm_list);
e03eaa40
DA
2197 intlist__delete(symbol_conf.tid_list);
2198 intlist__delete(symbol_conf.pid_list);
d65a458b
ACM
2199 vmlinux_path__exit();
2200 symbol_conf.sym_list = symbol_conf.dso_list = symbol_conf.comm_list = NULL;
64eff7d9 2201 symbol_conf.bt_stop_list = NULL;
85e00b55 2202 symbol_conf.initialized = false;
d65a458b 2203}
a7066709
HK
2204
2205int symbol__config_symfs(const struct option *opt __maybe_unused,
2206 const char *dir, int unset __maybe_unused)
2207{
2208 char *bf = NULL;
2209 int ret;
2210
2211 symbol_conf.symfs = strdup(dir);
2212 if (symbol_conf.symfs == NULL)
2213 return -ENOMEM;
2214
2215 /* skip the locally configured cache if a symfs is given, and
2216 * config buildid dir to symfs/.debug
2217 */
2218 ret = asprintf(&bf, "%s/%s", dir, ".debug");
2219 if (ret < 0)
2220 return -ENOMEM;
2221
2222 set_buildid_dir(bf);
2223
2224 free(bf);
2225 return 0;
2226}
9f87498f
JO
2227
2228struct mem_info *mem_info__get(struct mem_info *mi)
2229{
2230 if (mi)
2231 refcount_inc(&mi->refcnt);
2232 return mi;
2233}
2234
2235void mem_info__put(struct mem_info *mi)
2236{
2237 if (mi && refcount_dec_and_test(&mi->refcnt))
2238 free(mi);
2239}
2240
2241struct mem_info *mem_info__new(void)
2242{
2243 struct mem_info *mi = zalloc(sizeof(*mi));
2244
2245 if (mi)
2246 refcount_set(&mi->refcnt, 1);
2247 return mi;
2248}