1 // SPDX-License-Identifier: GPL-2.0
7 #include <linux/string.h>
8 #include <linux/zalloc.h>
9 #include <uapi/linux/mman.h> /* To get things like MAP_HUGETLB even on older libc headers */
13 #include "namespaces.h"
19 static inline int is_android_lib(const char *filename)
21 return strstarts(filename, "/data/app-lib/") ||
22 strstarts(filename, "/system/lib/");
25 static inline bool replace_android_lib(const char *filename, char *newfilename)
29 size_t app_abi_length, new_length;
30 size_t lib_length = 0;
32 libname = strrchr(filename, '/');
34 lib_length = strlen(libname);
36 app_abi = getenv("APP_ABI");
40 app_abi_length = strlen(app_abi);
42 if (strstarts(filename, "/data/app-lib/")) {
48 new_length = 7 + app_abi_length + lib_length;
50 apk_path = getenv("APK_PATH");
52 new_length += strlen(apk_path) + 1;
53 if (new_length > PATH_MAX)
55 snprintf(newfilename, new_length,
56 "%s/libs/%s/%s", apk_path, app_abi, libname);
58 if (new_length > PATH_MAX)
60 snprintf(newfilename, new_length,
61 "libs/%s/%s", app_abi, libname);
66 if (strstarts(filename, "/system/lib/")) {
69 int ndk_length, app_length;
71 ndk = getenv("NDK_ROOT");
72 app = getenv("APP_PLATFORM");
77 ndk_length = strlen(ndk);
78 app_length = strlen(app);
80 if (!(ndk_length && app_length && app_abi_length))
83 arch = !strncmp(app_abi, "arm", 3) ? "arm" :
84 !strncmp(app_abi, "mips", 4) ? "mips" :
85 !strncmp(app_abi, "x86", 3) ? "x86" : NULL;
90 new_length = 27 + ndk_length +
91 app_length + lib_length
94 if (new_length > PATH_MAX)
96 snprintf(newfilename, new_length,
97 "%.*s/platforms/%.*s/arch-%s/usr/lib/%s",
98 ndk_length, ndk, app_length, app, arch, libname);
105 void map__init(struct map *map, u64 start, u64 end, u64 pgoff, struct dso *dso)
107 map__set_start(map, start);
108 map__set_end(map, end);
109 map__set_pgoff(map, pgoff);
110 map__set_reloc(map, 0);
111 map__set_dso(map, dso__get(dso));
112 map__set_map_ip(map, map__dso_map_ip);
113 map__set_unmap_ip(map, map__dso_unmap_ip);
114 map__set_erange_warned(map, false);
115 refcount_set(map__refcnt(map), 1);
118 struct map *map__new(struct machine *machine, u64 start, u64 len,
119 u64 pgoff, struct dso_id *id,
120 u32 prot, u32 flags, struct build_id *bid,
121 char *filename, struct thread *thread)
125 struct nsinfo *nsi = NULL;
128 map = malloc(sizeof(*map));
129 if (ADD_RC_CHK(result, map)) {
130 char newfilename[PATH_MAX];
131 struct dso *dso, *header_bid_dso;
132 int anon, no_dso, vdso, android;
134 android = is_android_lib(filename);
135 anon = is_anon_memory(filename) || flags & MAP_HUGETLB;
136 vdso = is_vdso_map(filename);
137 no_dso = is_no_dso_memory(filename);
140 nsi = nsinfo__get(thread__nsinfo(thread));
142 if ((anon || no_dso) && nsi && (prot & PROT_EXEC)) {
143 snprintf(newfilename, sizeof(newfilename),
144 "/tmp/perf-%d.map", nsinfo__pid(nsi));
145 filename = newfilename;
149 if (replace_android_lib(filename, newfilename))
150 filename = newfilename;
154 /* The vdso maps are always on the host and not the
155 * container. Ensure that we don't use setns to look
158 nnsi = nsinfo__copy(nsi);
161 nsinfo__clear_need_setns(nnsi);
165 dso = machine__findnew_vdso(machine, thread);
167 dso = machine__findnew_dso_id(machine, filename, id);
172 map__init(result, start, start + len, pgoff, dso);
174 if (anon || no_dso) {
175 map->map_ip = map->unmap_ip = identity__map_ip;
178 * Set memory without DSO as loaded. All map__find_*
179 * functions still return NULL, and we avoid the
180 * unnecessary map__load warning.
182 if (!(prot & PROT_EXEC))
183 dso__set_loaded(dso);
185 mutex_lock(&dso->lock);
186 nsinfo__put(dso->nsinfo);
188 mutex_unlock(&dso->lock);
190 if (build_id__is_defined(bid)) {
191 dso__set_build_id(dso, bid);
194 * If the mmap event had no build ID, search for an existing dso from the
195 * build ID header by name. Otherwise only the dso loaded at the time of
196 * reading the header will have the build ID set and all future mmaps will
199 down_read(&machine->dsos.lock);
200 header_bid_dso = __dsos__find(&machine->dsos, filename, false);
201 up_read(&machine->dsos.lock);
202 if (header_bid_dso && header_bid_dso->header_build_id) {
203 dso__set_build_id(dso, &header_bid_dso->bid);
204 dso->header_build_id = 1;
217 * Constructor variant for modules (where we know from /proc/modules where
218 * they are loaded) and for vmlinux, where only after we load all the
219 * symbols we'll know where it starts and ends.
221 struct map *map__new2(u64 start, struct dso *dso)
226 map = calloc(1, sizeof(*map) + (dso->kernel ? sizeof(struct kmap) : 0));
227 if (ADD_RC_CHK(result, map)) {
229 * ->end will be filled after we load all the symbols
231 map__init(result, start, 0, 0, dso);
237 bool __map__is_kernel(const struct map *map)
239 if (!map__dso(map)->kernel)
241 return machine__kernel_map(maps__machine(map__kmaps((struct map *)map))) == map;
244 bool __map__is_extra_kernel_map(const struct map *map)
246 struct kmap *kmap = __map__kmap((struct map *)map);
248 return kmap && kmap->name[0];
251 bool __map__is_bpf_prog(const struct map *map)
254 struct dso *dso = map__dso(map);
256 if (dso->binary_type == DSO_BINARY_TYPE__BPF_PROG_INFO)
260 * If PERF_RECORD_BPF_EVENT is not included, the dso will not have
261 * type of DSO_BINARY_TYPE__BPF_PROG_INFO. In such cases, we can
262 * guess the type based on name.
264 name = dso->short_name;
265 return name && (strstr(name, "bpf_prog_") == name);
268 bool __map__is_bpf_image(const struct map *map)
271 struct dso *dso = map__dso(map);
273 if (dso->binary_type == DSO_BINARY_TYPE__BPF_IMAGE)
277 * If PERF_RECORD_KSYMBOL is not included, the dso will not have
278 * type of DSO_BINARY_TYPE__BPF_IMAGE. In such cases, we can
279 * guess the type based on name.
281 name = dso->short_name;
282 return name && is_bpf_image(name);
285 bool __map__is_ool(const struct map *map)
287 const struct dso *dso = map__dso(map);
289 return dso && dso->binary_type == DSO_BINARY_TYPE__OOL;
292 bool map__has_symbols(const struct map *map)
294 return dso__has_symbols(map__dso(map));
297 static void map__exit(struct map *map)
299 BUG_ON(refcount_read(map__refcnt(map)) != 0);
300 dso__zput(RC_CHK_ACCESS(map)->dso);
303 void map__delete(struct map *map)
309 void map__put(struct map *map)
311 if (map && refcount_dec_and_test(map__refcnt(map)))
317 void map__fixup_start(struct map *map)
319 struct dso *dso = map__dso(map);
320 struct rb_root_cached *symbols = &dso->symbols;
321 struct rb_node *nd = rb_first_cached(symbols);
324 struct symbol *sym = rb_entry(nd, struct symbol, rb_node);
326 map__set_start(map, sym->start);
330 void map__fixup_end(struct map *map)
332 struct dso *dso = map__dso(map);
333 struct rb_root_cached *symbols = &dso->symbols;
334 struct rb_node *nd = rb_last(&symbols->rb_root);
337 struct symbol *sym = rb_entry(nd, struct symbol, rb_node);
338 map__set_end(map, sym->end);
342 #define DSO__DELETED "(deleted)"
344 int map__load(struct map *map)
346 struct dso *dso = map__dso(map);
347 const char *name = dso->long_name;
350 if (dso__loaded(dso))
353 nr = dso__load(dso, map);
355 if (dso->has_build_id) {
356 char sbuild_id[SBUILD_ID_SIZE];
358 build_id__sprintf(&dso->bid, sbuild_id);
359 pr_debug("%s with build id %s not found", name, sbuild_id);
361 pr_debug("Failed to open %s", name);
363 pr_debug(", continuing without symbols\n");
365 } else if (nr == 0) {
366 #ifdef HAVE_LIBELF_SUPPORT
367 const size_t len = strlen(name);
368 const size_t real_len = len - sizeof(DSO__DELETED);
370 if (len > sizeof(DSO__DELETED) &&
371 strcmp(name + real_len + 1, DSO__DELETED) == 0) {
372 pr_debug("%.*s was updated (is prelink enabled?). "
373 "Restart the long running apps that use it!\n",
374 (int)real_len, name);
376 pr_debug("no symbols found in %s, maybe install a debug package?\n", name);
385 struct symbol *map__find_symbol(struct map *map, u64 addr)
387 if (map__load(map) < 0)
390 return dso__find_symbol(map__dso(map), addr);
393 struct symbol *map__find_symbol_by_name_idx(struct map *map, const char *name, size_t *idx)
397 if (map__load(map) < 0)
401 dso__sort_by_name(dso);
403 return dso__find_symbol_by_name(dso, name, idx);
406 struct symbol *map__find_symbol_by_name(struct map *map, const char *name)
410 return map__find_symbol_by_name_idx(map, name, &idx);
413 struct map *map__clone(struct map *from)
417 size_t size = sizeof(RC_STRUCT(map));
418 struct dso *dso = map__dso(from);
420 if (dso && dso->kernel)
421 size += sizeof(struct kmap);
423 map = memdup(RC_CHK_ACCESS(from), size);
424 if (ADD_RC_CHK(result, map)) {
425 refcount_set(&map->refcnt, 1);
426 map->dso = dso__get(dso);
432 size_t map__fprintf(struct map *map, FILE *fp)
434 const struct dso *dso = map__dso(map);
436 return fprintf(fp, " %" PRIx64 "-%" PRIx64 " %" PRIx64 " %s\n",
437 map__start(map), map__end(map), map__pgoff(map), dso->name);
440 static bool prefer_dso_long_name(const struct dso *dso, bool print_off)
442 return dso->long_name &&
443 (symbol_conf.show_kernel_path ||
444 (print_off && (dso->name[0] == '[' || dso__is_kcore(dso))));
447 static size_t __map__fprintf_dsoname(struct map *map, bool print_off, FILE *fp)
449 char buf[symbol_conf.pad_output_len_dso + 1];
450 const char *dsoname = "[unknown]";
451 const struct dso *dso = map ? map__dso(map) : NULL;
454 if (prefer_dso_long_name(dso, print_off))
455 dsoname = dso->long_name;
460 if (symbol_conf.pad_output_len_dso) {
461 scnprintf_pad(buf, symbol_conf.pad_output_len_dso, "%s", dsoname);
465 return fprintf(fp, "%s", dsoname);
468 size_t map__fprintf_dsoname(struct map *map, FILE *fp)
470 return __map__fprintf_dsoname(map, false, fp);
473 size_t map__fprintf_dsoname_dsoff(struct map *map, bool print_off, u64 addr, FILE *fp)
475 const struct dso *dso = map ? map__dso(map) : NULL;
478 if (print_off && (!dso || !dso__is_object_file(dso)))
480 printed += fprintf(fp, " (");
481 printed += __map__fprintf_dsoname(map, print_off, fp);
483 printed += fprintf(fp, "+0x%" PRIx64, addr);
484 printed += fprintf(fp, ")");
489 char *map__srcline(struct map *map, u64 addr, struct symbol *sym)
492 return SRCLINE_UNKNOWN;
494 return get_srcline(map__dso(map), map__rip_2objdump(map, addr), sym, true, true, addr);
497 int map__fprintf_srcline(struct map *map, u64 addr, const char *prefix,
500 const struct dso *dso = map ? map__dso(map) : NULL;
504 char *srcline = map__srcline(map, addr, NULL);
505 if (srcline != SRCLINE_UNKNOWN)
506 ret = fprintf(fp, "%s%s", prefix, srcline);
507 zfree_srcline(&srcline);
512 void srccode_state_free(struct srccode_state *state)
514 zfree(&state->srcfile);
519 * map__rip_2objdump - convert symbol start address to objdump address.
521 * @rip: symbol start address
523 * objdump wants/reports absolute IPs for ET_EXEC, and RIPs for ET_DYN.
524 * map->dso->adjust_symbols==1 for ET_EXEC-like cases except ET_REL which is
525 * relative to section start.
527 * Return: Address suitable for passing to "objdump --start-address="
529 u64 map__rip_2objdump(struct map *map, u64 rip)
531 struct kmap *kmap = __map__kmap(map);
532 const struct dso *dso = map__dso(map);
535 * vmlinux does not have program headers for PTI entry trampolines and
536 * kcore may not either. However the trampoline object code is on the
537 * main kernel map, so just use that instead.
539 if (kmap && is_entry_trampoline(kmap->name) && kmap->kmaps) {
540 struct machine *machine = maps__machine(kmap->kmaps);
543 struct map *kernel_map = machine__kernel_map(machine);
550 if (!dso->adjust_symbols)
554 return rip - map__pgoff(map);
557 * kernel modules also have DSO_TYPE_USER in dso->kernel,
558 * but all kernel modules are ET_REL, so won't get here.
560 if (dso->kernel == DSO_SPACE__USER)
561 return rip + dso->text_offset;
563 return map__unmap_ip(map, rip) - map__reloc(map);
567 * map__objdump_2mem - convert objdump address to a memory address.
569 * @ip: objdump address
571 * Closely related to map__rip_2objdump(), this function takes an address from
572 * objdump and converts it to a memory address. Note this assumes that @map
573 * contains the address. To be sure the result is valid, check it forwards
574 * e.g. map__rip_2objdump(map__map_ip(map, map__objdump_2mem(map, ip))) == ip
576 * Return: Memory address.
578 u64 map__objdump_2mem(struct map *map, u64 ip)
580 const struct dso *dso = map__dso(map);
582 if (!dso->adjust_symbols)
583 return map__unmap_ip(map, ip);
586 return map__unmap_ip(map, ip + map__pgoff(map));
589 * kernel modules also have DSO_TYPE_USER in dso->kernel,
590 * but all kernel modules are ET_REL, so won't get here.
592 if (dso->kernel == DSO_SPACE__USER)
593 return map__unmap_ip(map, ip - dso->text_offset);
595 return ip + map__reloc(map);
598 bool map__contains_symbol(const struct map *map, const struct symbol *sym)
600 u64 ip = map__unmap_ip(map, sym->start);
602 return ip >= map__start(map) && ip < map__end(map);
605 struct kmap *__map__kmap(struct map *map)
607 const struct dso *dso = map__dso(map);
609 if (!dso || !dso->kernel)
611 return (struct kmap *)(&RC_CHK_ACCESS(map)[1]);
614 struct kmap *map__kmap(struct map *map)
616 struct kmap *kmap = __map__kmap(map);
619 pr_err("Internal error: map__kmap with a non-kernel map\n");
623 struct maps *map__kmaps(struct map *map)
625 struct kmap *kmap = map__kmap(map);
627 if (!kmap || !kmap->kmaps) {
628 pr_err("Internal error: map__kmaps with a non-kernel map\n");
634 u64 map__dso_map_ip(const struct map *map, u64 ip)
636 return ip - map__start(map) + map__pgoff(map);
639 u64 map__dso_unmap_ip(const struct map *map, u64 ip)
641 return ip + map__start(map) - map__pgoff(map);
644 u64 identity__map_ip(const struct map *map __maybe_unused, u64 ip)