cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

map.c (14056B)


      1// SPDX-License-Identifier: GPL-2.0
      2#include <inttypes.h>
      3#include <limits.h>
      4#include <stdio.h>
      5#include <stdlib.h>
      6#include <string.h>
      7#include <linux/string.h>
      8#include <linux/zalloc.h>
      9#include <uapi/linux/mman.h> /* To get things like MAP_HUGETLB even on older libc headers */
     10#include "debug.h"
     11#include "dso.h"
     12#include "map.h"
     13#include "namespaces.h"
     14#include "srcline.h"
     15#include "symbol.h"
     16#include "thread.h"
     17#include "vdso.h"
     18
     19static inline int is_android_lib(const char *filename)
     20{
     21	return strstarts(filename, "/data/app-lib/") ||
     22	       strstarts(filename, "/system/lib/");
     23}
     24
     25static inline bool replace_android_lib(const char *filename, char *newfilename)
     26{
     27	const char *libname;
     28	char *app_abi;
     29	size_t app_abi_length, new_length;
     30	size_t lib_length = 0;
     31
     32	libname  = strrchr(filename, '/');
     33	if (libname)
     34		lib_length = strlen(libname);
     35
     36	app_abi = getenv("APP_ABI");
     37	if (!app_abi)
     38		return false;
     39
     40	app_abi_length = strlen(app_abi);
     41
     42	if (strstarts(filename, "/data/app-lib/")) {
     43		char *apk_path;
     44
     45		if (!app_abi_length)
     46			return false;
     47
     48		new_length = 7 + app_abi_length + lib_length;
     49
     50		apk_path = getenv("APK_PATH");
     51		if (apk_path) {
     52			new_length += strlen(apk_path) + 1;
     53			if (new_length > PATH_MAX)
     54				return false;
     55			snprintf(newfilename, new_length,
     56				 "%s/libs/%s/%s", apk_path, app_abi, libname);
     57		} else {
     58			if (new_length > PATH_MAX)
     59				return false;
     60			snprintf(newfilename, new_length,
     61				 "libs/%s/%s", app_abi, libname);
     62		}
     63		return true;
     64	}
     65
     66	if (strstarts(filename, "/system/lib/")) {
     67		char *ndk, *app;
     68		const char *arch;
     69		int ndk_length, app_length;
     70
     71		ndk = getenv("NDK_ROOT");
     72		app = getenv("APP_PLATFORM");
     73
     74		if (!(ndk && app))
     75			return false;
     76
     77		ndk_length = strlen(ndk);
     78		app_length = strlen(app);
     79
     80		if (!(ndk_length && app_length && app_abi_length))
     81			return false;
     82
     83		arch = !strncmp(app_abi, "arm", 3) ? "arm" :
     84		       !strncmp(app_abi, "mips", 4) ? "mips" :
     85		       !strncmp(app_abi, "x86", 3) ? "x86" : NULL;
     86
     87		if (!arch)
     88			return false;
     89
     90		new_length = 27 + ndk_length +
     91			     app_length + lib_length
     92			   + strlen(arch);
     93
     94		if (new_length > PATH_MAX)
     95			return false;
     96		snprintf(newfilename, new_length,
     97			"%.*s/platforms/%.*s/arch-%s/usr/lib/%s",
     98			ndk_length, ndk, app_length, app, arch, libname);
     99
    100		return true;
    101	}
    102	return false;
    103}
    104
    105void map__init(struct map *map, u64 start, u64 end, u64 pgoff, struct dso *dso)
    106{
    107	map->start    = start;
    108	map->end      = end;
    109	map->pgoff    = pgoff;
    110	map->reloc    = 0;
    111	map->dso      = dso__get(dso);
    112	map->map_ip   = map__map_ip;
    113	map->unmap_ip = map__unmap_ip;
    114	RB_CLEAR_NODE(&map->rb_node);
    115	map->erange_warned = false;
    116	refcount_set(&map->refcnt, 1);
    117}
    118
    119struct map *map__new(struct machine *machine, u64 start, u64 len,
    120		     u64 pgoff, struct dso_id *id,
    121		     u32 prot, u32 flags, struct build_id *bid,
    122		     char *filename, struct thread *thread)
    123{
    124	struct map *map = malloc(sizeof(*map));
    125	struct nsinfo *nsi = NULL;
    126	struct nsinfo *nnsi;
    127
    128	if (map != NULL) {
    129		char newfilename[PATH_MAX];
    130		struct dso *dso, *header_bid_dso;
    131		int anon, no_dso, vdso, android;
    132
    133		android = is_android_lib(filename);
    134		anon = is_anon_memory(filename) || flags & MAP_HUGETLB;
    135		vdso = is_vdso_map(filename);
    136		no_dso = is_no_dso_memory(filename);
    137		map->prot = prot;
    138		map->flags = flags;
    139		nsi = nsinfo__get(thread->nsinfo);
    140
    141		if ((anon || no_dso) && nsi && (prot & PROT_EXEC)) {
    142			snprintf(newfilename, sizeof(newfilename),
    143				 "/tmp/perf-%d.map", nsinfo__pid(nsi));
    144			filename = newfilename;
    145		}
    146
    147		if (android) {
    148			if (replace_android_lib(filename, newfilename))
    149				filename = newfilename;
    150		}
    151
    152		if (vdso) {
    153			/* The vdso maps are always on the host and not the
    154			 * container.  Ensure that we don't use setns to look
    155			 * them up.
    156			 */
    157			nnsi = nsinfo__copy(nsi);
    158			if (nnsi) {
    159				nsinfo__put(nsi);
    160				nsinfo__clear_need_setns(nnsi);
    161				nsi = nnsi;
    162			}
    163			pgoff = 0;
    164			dso = machine__findnew_vdso(machine, thread);
    165		} else
    166			dso = machine__findnew_dso_id(machine, filename, id);
    167
    168		if (dso == NULL)
    169			goto out_delete;
    170
    171		map__init(map, start, start + len, pgoff, dso);
    172
    173		if (anon || no_dso) {
    174			map->map_ip = map->unmap_ip = identity__map_ip;
    175
    176			/*
    177			 * Set memory without DSO as loaded. All map__find_*
    178			 * functions still return NULL, and we avoid the
    179			 * unnecessary map__load warning.
    180			 */
    181			if (!(prot & PROT_EXEC))
    182				dso__set_loaded(dso);
    183		}
    184		dso->nsinfo = nsi;
    185
    186		if (build_id__is_defined(bid)) {
    187			dso__set_build_id(dso, bid);
    188		} else {
    189			/*
    190			 * If the mmap event had no build ID, search for an existing dso from the
    191			 * build ID header by name. Otherwise only the dso loaded at the time of
    192			 * reading the header will have the build ID set and all future mmaps will
    193			 * have it missing.
    194			 */
    195			down_read(&machine->dsos.lock);
    196			header_bid_dso = __dsos__find(&machine->dsos, filename, false);
    197			up_read(&machine->dsos.lock);
    198			if (header_bid_dso && header_bid_dso->header_build_id) {
    199				dso__set_build_id(dso, &header_bid_dso->bid);
    200				dso->header_build_id = 1;
    201			}
    202		}
    203		dso__put(dso);
    204	}
    205	return map;
    206out_delete:
    207	nsinfo__put(nsi);
    208	free(map);
    209	return NULL;
    210}
    211
    212/*
    213 * Constructor variant for modules (where we know from /proc/modules where
    214 * they are loaded) and for vmlinux, where only after we load all the
    215 * symbols we'll know where it starts and ends.
    216 */
    217struct map *map__new2(u64 start, struct dso *dso)
    218{
    219	struct map *map = calloc(1, (sizeof(*map) +
    220				     (dso->kernel ? sizeof(struct kmap) : 0)));
    221	if (map != NULL) {
    222		/*
    223		 * ->end will be filled after we load all the symbols
    224		 */
    225		map__init(map, start, 0, 0, dso);
    226	}
    227
    228	return map;
    229}
    230
    231bool __map__is_kernel(const struct map *map)
    232{
    233	if (!map->dso->kernel)
    234		return false;
    235	return machine__kernel_map(map__kmaps((struct map *)map)->machine) == map;
    236}
    237
    238bool __map__is_extra_kernel_map(const struct map *map)
    239{
    240	struct kmap *kmap = __map__kmap((struct map *)map);
    241
    242	return kmap && kmap->name[0];
    243}
    244
    245bool __map__is_bpf_prog(const struct map *map)
    246{
    247	const char *name;
    248
    249	if (map->dso->binary_type == DSO_BINARY_TYPE__BPF_PROG_INFO)
    250		return true;
    251
    252	/*
    253	 * If PERF_RECORD_BPF_EVENT is not included, the dso will not have
    254	 * type of DSO_BINARY_TYPE__BPF_PROG_INFO. In such cases, we can
    255	 * guess the type based on name.
    256	 */
    257	name = map->dso->short_name;
    258	return name && (strstr(name, "bpf_prog_") == name);
    259}
    260
    261bool __map__is_bpf_image(const struct map *map)
    262{
    263	const char *name;
    264
    265	if (map->dso->binary_type == DSO_BINARY_TYPE__BPF_IMAGE)
    266		return true;
    267
    268	/*
    269	 * If PERF_RECORD_KSYMBOL is not included, the dso will not have
    270	 * type of DSO_BINARY_TYPE__BPF_IMAGE. In such cases, we can
    271	 * guess the type based on name.
    272	 */
    273	name = map->dso->short_name;
    274	return name && is_bpf_image(name);
    275}
    276
    277bool __map__is_ool(const struct map *map)
    278{
    279	return map->dso && map->dso->binary_type == DSO_BINARY_TYPE__OOL;
    280}
    281
    282bool map__has_symbols(const struct map *map)
    283{
    284	return dso__has_symbols(map->dso);
    285}
    286
    287static void map__exit(struct map *map)
    288{
    289	BUG_ON(refcount_read(&map->refcnt) != 0);
    290	dso__zput(map->dso);
    291}
    292
    293void map__delete(struct map *map)
    294{
    295	map__exit(map);
    296	free(map);
    297}
    298
    299void map__put(struct map *map)
    300{
    301	if (map && refcount_dec_and_test(&map->refcnt))
    302		map__delete(map);
    303}
    304
    305void map__fixup_start(struct map *map)
    306{
    307	struct rb_root_cached *symbols = &map->dso->symbols;
    308	struct rb_node *nd = rb_first_cached(symbols);
    309	if (nd != NULL) {
    310		struct symbol *sym = rb_entry(nd, struct symbol, rb_node);
    311		map->start = sym->start;
    312	}
    313}
    314
    315void map__fixup_end(struct map *map)
    316{
    317	struct rb_root_cached *symbols = &map->dso->symbols;
    318	struct rb_node *nd = rb_last(&symbols->rb_root);
    319	if (nd != NULL) {
    320		struct symbol *sym = rb_entry(nd, struct symbol, rb_node);
    321		map->end = sym->end;
    322	}
    323}
    324
    325#define DSO__DELETED "(deleted)"
    326
    327int map__load(struct map *map)
    328{
    329	const char *name = map->dso->long_name;
    330	int nr;
    331
    332	if (dso__loaded(map->dso))
    333		return 0;
    334
    335	nr = dso__load(map->dso, map);
    336	if (nr < 0) {
    337		if (map->dso->has_build_id) {
    338			char sbuild_id[SBUILD_ID_SIZE];
    339
    340			build_id__sprintf(&map->dso->bid, sbuild_id);
    341			pr_debug("%s with build id %s not found", name, sbuild_id);
    342		} else
    343			pr_debug("Failed to open %s", name);
    344
    345		pr_debug(", continuing without symbols\n");
    346		return -1;
    347	} else if (nr == 0) {
    348#ifdef HAVE_LIBELF_SUPPORT
    349		const size_t len = strlen(name);
    350		const size_t real_len = len - sizeof(DSO__DELETED);
    351
    352		if (len > sizeof(DSO__DELETED) &&
    353		    strcmp(name + real_len + 1, DSO__DELETED) == 0) {
    354			pr_debug("%.*s was updated (is prelink enabled?). "
    355				"Restart the long running apps that use it!\n",
    356				   (int)real_len, name);
    357		} else {
    358			pr_debug("no symbols found in %s, maybe install a debug package?\n", name);
    359		}
    360#endif
    361		return -1;
    362	}
    363
    364	return 0;
    365}
    366
    367struct symbol *map__find_symbol(struct map *map, u64 addr)
    368{
    369	if (map__load(map) < 0)
    370		return NULL;
    371
    372	return dso__find_symbol(map->dso, addr);
    373}
    374
    375struct symbol *map__find_symbol_by_name(struct map *map, const char *name)
    376{
    377	if (map__load(map) < 0)
    378		return NULL;
    379
    380	if (!dso__sorted_by_name(map->dso))
    381		dso__sort_by_name(map->dso);
    382
    383	return dso__find_symbol_by_name(map->dso, name);
    384}
    385
    386struct map *map__clone(struct map *from)
    387{
    388	size_t size = sizeof(struct map);
    389	struct map *map;
    390
    391	if (from->dso && from->dso->kernel)
    392		size += sizeof(struct kmap);
    393
    394	map = memdup(from, size);
    395	if (map != NULL) {
    396		refcount_set(&map->refcnt, 1);
    397		RB_CLEAR_NODE(&map->rb_node);
    398		dso__get(map->dso);
    399	}
    400
    401	return map;
    402}
    403
    404size_t map__fprintf(struct map *map, FILE *fp)
    405{
    406	return fprintf(fp, " %" PRIx64 "-%" PRIx64 " %" PRIx64 " %s\n",
    407		       map->start, map->end, map->pgoff, map->dso->name);
    408}
    409
    410size_t map__fprintf_dsoname(struct map *map, FILE *fp)
    411{
    412	char buf[symbol_conf.pad_output_len_dso + 1];
    413	const char *dsoname = "[unknown]";
    414
    415	if (map && map->dso) {
    416		if (symbol_conf.show_kernel_path && map->dso->long_name)
    417			dsoname = map->dso->long_name;
    418		else
    419			dsoname = map->dso->name;
    420	}
    421
    422	if (symbol_conf.pad_output_len_dso) {
    423		scnprintf_pad(buf, symbol_conf.pad_output_len_dso, "%s", dsoname);
    424		dsoname = buf;
    425	}
    426
    427	return fprintf(fp, "%s", dsoname);
    428}
    429
    430char *map__srcline(struct map *map, u64 addr, struct symbol *sym)
    431{
    432	if (map == NULL)
    433		return SRCLINE_UNKNOWN;
    434	return get_srcline(map->dso, map__rip_2objdump(map, addr), sym, true, true, addr);
    435}
    436
    437int map__fprintf_srcline(struct map *map, u64 addr, const char *prefix,
    438			 FILE *fp)
    439{
    440	int ret = 0;
    441
    442	if (map && map->dso) {
    443		char *srcline = map__srcline(map, addr, NULL);
    444		if (strncmp(srcline, SRCLINE_UNKNOWN, strlen(SRCLINE_UNKNOWN)) != 0)
    445			ret = fprintf(fp, "%s%s", prefix, srcline);
    446		free_srcline(srcline);
    447	}
    448	return ret;
    449}
    450
    451void srccode_state_free(struct srccode_state *state)
    452{
    453	zfree(&state->srcfile);
    454	state->line = 0;
    455}
    456
    457/**
    458 * map__rip_2objdump - convert symbol start address to objdump address.
    459 * @map: memory map
    460 * @rip: symbol start address
    461 *
    462 * objdump wants/reports absolute IPs for ET_EXEC, and RIPs for ET_DYN.
    463 * map->dso->adjust_symbols==1 for ET_EXEC-like cases except ET_REL which is
    464 * relative to section start.
    465 *
    466 * Return: Address suitable for passing to "objdump --start-address="
    467 */
    468u64 map__rip_2objdump(struct map *map, u64 rip)
    469{
    470	struct kmap *kmap = __map__kmap(map);
    471
    472	/*
    473	 * vmlinux does not have program headers for PTI entry trampolines and
    474	 * kcore may not either. However the trampoline object code is on the
    475	 * main kernel map, so just use that instead.
    476	 */
    477	if (kmap && is_entry_trampoline(kmap->name) && kmap->kmaps && kmap->kmaps->machine) {
    478		struct map *kernel_map = machine__kernel_map(kmap->kmaps->machine);
    479
    480		if (kernel_map)
    481			map = kernel_map;
    482	}
    483
    484	if (!map->dso->adjust_symbols)
    485		return rip;
    486
    487	if (map->dso->rel)
    488		return rip - map->pgoff;
    489
    490	/*
    491	 * kernel modules also have DSO_TYPE_USER in dso->kernel,
    492	 * but all kernel modules are ET_REL, so won't get here.
    493	 */
    494	if (map->dso->kernel == DSO_SPACE__USER)
    495		return rip + map->dso->text_offset;
    496
    497	return map->unmap_ip(map, rip) - map->reloc;
    498}
    499
    500/**
    501 * map__objdump_2mem - convert objdump address to a memory address.
    502 * @map: memory map
    503 * @ip: objdump address
    504 *
    505 * Closely related to map__rip_2objdump(), this function takes an address from
    506 * objdump and converts it to a memory address.  Note this assumes that @map
    507 * contains the address.  To be sure the result is valid, check it forwards
    508 * e.g. map__rip_2objdump(map->map_ip(map, map__objdump_2mem(map, ip))) == ip
    509 *
    510 * Return: Memory address.
    511 */
    512u64 map__objdump_2mem(struct map *map, u64 ip)
    513{
    514	if (!map->dso->adjust_symbols)
    515		return map->unmap_ip(map, ip);
    516
    517	if (map->dso->rel)
    518		return map->unmap_ip(map, ip + map->pgoff);
    519
    520	/*
    521	 * kernel modules also have DSO_TYPE_USER in dso->kernel,
    522	 * but all kernel modules are ET_REL, so won't get here.
    523	 */
    524	if (map->dso->kernel == DSO_SPACE__USER)
    525		return map->unmap_ip(map, ip - map->dso->text_offset);
    526
    527	return ip + map->reloc;
    528}
    529
    530bool map__contains_symbol(const struct map *map, const struct symbol *sym)
    531{
    532	u64 ip = map->unmap_ip(map, sym->start);
    533
    534	return ip >= map->start && ip < map->end;
    535}
    536
    537static struct map *__map__next(struct map *map)
    538{
    539	struct rb_node *next = rb_next(&map->rb_node);
    540
    541	if (next)
    542		return rb_entry(next, struct map, rb_node);
    543	return NULL;
    544}
    545
    546struct map *map__next(struct map *map)
    547{
    548	return map ? __map__next(map) : NULL;
    549}
    550
    551struct kmap *__map__kmap(struct map *map)
    552{
    553	if (!map->dso || !map->dso->kernel)
    554		return NULL;
    555	return (struct kmap *)(map + 1);
    556}
    557
    558struct kmap *map__kmap(struct map *map)
    559{
    560	struct kmap *kmap = __map__kmap(map);
    561
    562	if (!kmap)
    563		pr_err("Internal error: map__kmap with a non-kernel map\n");
    564	return kmap;
    565}
    566
    567struct maps *map__kmaps(struct map *map)
    568{
    569	struct kmap *kmap = map__kmap(map);
    570
    571	if (!kmap || !kmap->kmaps) {
    572		pr_err("Internal error: map__kmaps with a non-kernel map\n");
    573		return NULL;
    574	}
    575	return kmap->kmaps;
    576}
    577
    578u64 map__map_ip(const struct map *map, u64 ip)
    579{
    580	return ip - map->start + map->pgoff;
    581}
    582
    583u64 map__unmap_ip(const struct map *map, u64 ip)
    584{
    585	return ip + map->start - map->pgoff;
    586}
    587
    588u64 identity__map_ip(const struct map *map __maybe_unused, u64 ip)
    589{
    590	return ip;
    591}