blob: 4825ac72646c9e73ea5344f9859464d7e9a8b46f [file] [log] [blame]
/*
* Copyright (C) 2015 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "dso.h"
#include <stdlib.h>
#include <string.h>
#include <algorithm>
#include <limits>
#include <vector>
#include <android-base/file.h>
#include <android-base/logging.h>
#include "environment.h"
#include "read_apk.h"
#include "read_elf.h"
#include "utils.h"
static OneTimeFreeAllocator symbol_name_allocator;
Symbol::Symbol(const std::string& name, uint64_t addr, uint64_t len)
: addr(addr),
len(len),
name_(symbol_name_allocator.AllocateString(name)),
demangled_name_(nullptr),
dump_id_(UINT_MAX) {}
const char* Symbol::DemangledName() const {
if (demangled_name_ == nullptr) {
const std::string s = Dso::Demangle(name_);
if (s == name_) {
demangled_name_ = name_;
} else {
demangled_name_ = symbol_name_allocator.AllocateString(s);
}
}
return demangled_name_;
}
bool Dso::demangle_ = true;
std::string Dso::symfs_dir_;
std::string Dso::vmlinux_;
std::string Dso::kallsyms_;
bool Dso::read_kernel_symbols_from_proc_;
std::unordered_map<std::string, BuildId> Dso::build_id_map_;
size_t Dso::dso_count_;
uint32_t Dso::g_dump_id_;
std::string Dso::vdso_64bit_;
std::string Dso::vdso_32bit_;
void Dso::SetDemangle(bool demangle) { demangle_ = demangle; }
extern "C" char* __cxa_demangle(const char* mangled_name, char* buf, size_t* n,
int* status);
std::string Dso::Demangle(const std::string& name) {
if (!demangle_) {
return name;
}
int status;
bool is_linker_symbol = (name.find(linker_prefix) == 0);
const char* mangled_str = name.c_str();
if (is_linker_symbol) {
mangled_str += linker_prefix.size();
}
std::string result = name;
char* demangled_name = __cxa_demangle(mangled_str, nullptr, nullptr, &status);
if (status == 0) {
if (is_linker_symbol) {
result = std::string("[linker]") + demangled_name;
} else {
result = demangled_name;
}
free(demangled_name);
} else if (is_linker_symbol) {
result = std::string("[linker]") + mangled_str;
}
return result;
}
bool Dso::SetSymFsDir(const std::string& symfs_dir) {
std::string dirname = symfs_dir;
if (!dirname.empty()) {
if (dirname.back() != '/') {
dirname.push_back('/');
}
if (!IsDir(symfs_dir)) {
LOG(ERROR) << "Invalid symfs_dir '" << symfs_dir << "'";
return false;
}
}
symfs_dir_ = dirname;
return true;
}
void Dso::SetVmlinux(const std::string& vmlinux) { vmlinux_ = vmlinux; }
void Dso::SetBuildIds(
const std::vector<std::pair<std::string, BuildId>>& build_ids) {
std::unordered_map<std::string, BuildId> map;
for (auto& pair : build_ids) {
LOG(DEBUG) << "build_id_map: " << pair.first << ", "
<< pair.second.ToString();
map.insert(pair);
}
build_id_map_ = std::move(map);
}
void Dso::SetVdsoFile(const std::string& vdso_file, bool is_64bit) {
if (is_64bit) {
vdso_64bit_ = vdso_file;
} else {
vdso_32bit_ = vdso_file;
}
}
BuildId Dso::FindExpectedBuildIdForPath(const std::string& path) {
auto it = build_id_map_.find(path);
if (it != build_id_map_.end()) {
return it->second;
}
return BuildId();
}
BuildId Dso::GetExpectedBuildId() {
return FindExpectedBuildIdForPath(path_);
}
std::unique_ptr<Dso> Dso::CreateDso(DsoType dso_type, const std::string& dso_path,
bool force_64bit) {
return std::unique_ptr<Dso>(new Dso(dso_type, dso_path, force_64bit));
}
Dso::Dso(DsoType type, const std::string& path, bool force_64bit)
: type_(type),
path_(path),
debug_file_path_(path),
min_vaddr_(std::numeric_limits<uint64_t>::max()),
is_loaded_(false),
dump_id_(UINT_MAX),
symbol_dump_id_(0),
symbol_warning_loglevel_(android::base::WARNING) {
if (type_ == DSO_KERNEL) {
min_vaddr_ = 0;
}
// Check if file matching path_ exists in symfs directory before using it as
// debug_file_path_.
if (!symfs_dir_.empty()) {
std::string path_in_symfs = symfs_dir_ + path_;
std::tuple<bool, std::string, std::string> tuple =
SplitUrlInApk(path_in_symfs);
std::string file_path =
std::get<0>(tuple) ? std::get<1>(tuple) : path_in_symfs;
if (IsRegularFile(file_path)) {
debug_file_path_ = path_in_symfs;
}
} else if (path == "[vdso]") {
if (force_64bit && !vdso_64bit_.empty()) {
debug_file_path_ = vdso_64bit_;
} else if (!force_64bit && !vdso_32bit_.empty()) {
debug_file_path_ = vdso_32bit_;
}
}
size_t pos = path.find_last_of("/\\");
if (pos != std::string::npos) {
file_name_ = path.substr(pos + 1);
} else {
file_name_ = path;
}
dso_count_++;
}
Dso::~Dso() {
if (--dso_count_ == 0) {
// Clean up global variables when no longer used.
symbol_name_allocator.Clear();
demangle_ = true;
symfs_dir_.clear();
vmlinux_.clear();
kallsyms_.clear();
read_kernel_symbols_from_proc_ = false;
build_id_map_.clear();
g_dump_id_ = 0;
}
}
uint32_t Dso::CreateDumpId() {
CHECK(!HasDumpId());
return dump_id_ = g_dump_id_++;
}
uint32_t Dso::CreateSymbolDumpId(const Symbol* symbol) {
CHECK(!symbol->HasDumpId());
symbol->dump_id_ = symbol_dump_id_++;
return symbol->dump_id_;
}
const Symbol* Dso::FindSymbol(uint64_t vaddr_in_dso) {
if (!is_loaded_) {
Load();
}
if (!symbols_.empty()) {
auto it = std::upper_bound(symbols_.begin(), symbols_.end(),
Symbol("", vaddr_in_dso, 0),
Symbol::CompareValueByAddr);
if (it != symbols_.begin()) {
--it;
if (it->addr <= vaddr_in_dso && (it->addr + it->len > vaddr_in_dso)) {
return &*it;
}
}
}
if (!unknown_symbols_.empty()) {
auto it = unknown_symbols_.find(vaddr_in_dso);
if (it != unknown_symbols_.end()) {
return &it->second;
}
}
return nullptr;
}
const std::vector<Symbol>& Dso::GetSymbols() {
if (!is_loaded_) {
Load();
}
return symbols_;
}
void Dso::SetSymbols(std::vector<Symbol>* symbols) {
symbols_ = std::move(*symbols);
symbols->clear();
}
void Dso::AddUnknownSymbol(uint64_t vaddr_in_dso, const std::string& name) {
unknown_symbols_.insert(std::make_pair(vaddr_in_dso, Symbol(name, vaddr_in_dso, 1)));
}
uint64_t Dso::MinVirtualAddress() {
if (min_vaddr_ == std::numeric_limits<uint64_t>::max()) {
min_vaddr_ = 0;
if (type_ == DSO_ELF_FILE) {
BuildId build_id = GetExpectedBuildId();
uint64_t addr;
ElfStatus result = ReadMinExecutableVirtualAddressFromElfFile(
GetDebugFilePath(), build_id, &addr);
if (result != ElfStatus::NO_ERROR) {
LOG(WARNING) << "failed to read min virtual address of "
<< GetDebugFilePath() << ": " << result;
} else {
min_vaddr_ = addr;
}
}
}
return min_vaddr_;
}
static std::vector<Symbol> MergeSortedSymbols(const std::vector<Symbol>& s1,
const std::vector<Symbol>& s2) {
std::vector<Symbol> result;
std::set_union(s1.begin(), s1.end(), s2.begin(), s2.end(), std::back_inserter(result),
Symbol::CompareValueByAddr);
return result;
}
void Dso::Load() {
is_loaded_ = true;
std::vector<Symbol> dumped_symbols;
if (!symbols_.empty()) {
// If symbols has been read from file feature section of perf.data, move it to
// dumped_symbols, so later we can merge them with symbols read from file system.
dumped_symbols = std::move(symbols_);
symbols_.clear();
// Don't warn missing symbol table if we have dumped symbols in perf.data.
symbol_warning_loglevel_ = android::base::DEBUG;
}
bool result = false;
switch (type_) {
case DSO_KERNEL:
result = LoadKernel();
break;
case DSO_KERNEL_MODULE:
result = LoadKernelModule();
break;
case DSO_ELF_FILE: {
if (std::get<0>(SplitUrlInApk(path_))) {
result = LoadEmbeddedElfFile();
} else {
result = LoadElfFile();
}
break;
}
}
if (result) {
std::sort(symbols_.begin(), symbols_.end(), Symbol::CompareValueByAddr);
FixupSymbolLength();
} else {
symbols_.clear();
}
if (symbols_.empty()) {
symbols_ = std::move(dumped_symbols);
} else if (!dumped_symbols.empty()) {
symbols_ = MergeSortedSymbols(symbols_, dumped_symbols);
}
if (symbols_.empty()) {
LOG(DEBUG) << "failed to load dso: " << path_;
}
}
static bool IsKernelFunctionSymbol(const KernelSymbol& symbol) {
return (symbol.type == 'T' || symbol.type == 't' || symbol.type == 'W' ||
symbol.type == 'w');
}
static bool KernelSymbolCallback(const KernelSymbol& kernel_symbol,
std::vector<Symbol>* symbols) {
if (IsKernelFunctionSymbol(kernel_symbol)) {
symbols->emplace_back(Symbol(kernel_symbol.name, kernel_symbol.addr, 0));
}
return false;
}
static void VmlinuxSymbolCallback(const ElfFileSymbol& elf_symbol,
std::vector<Symbol>* symbols) {
if (elf_symbol.is_func) {
symbols->emplace_back(
Symbol(elf_symbol.name, elf_symbol.vaddr, elf_symbol.len));
}
}
bool Dso::CheckReadSymbolResult(ElfStatus result, const std::string& filename) {
if (result == ElfStatus::NO_ERROR) {
LOG(VERBOSE) << "Read symbols from " << filename << " successfully";
return true;
} else if (result == ElfStatus::NO_SYMBOL_TABLE) {
if (path_ == "[vdso]") {
// Vdso only contains dynamic symbol table, and we can't change that.
return true;
}
// Lacking symbol table isn't considered as an error but worth reporting.
LOG(symbol_warning_loglevel_) << filename << " doesn't contain symbol table";
return true;
} else {
LOG(symbol_warning_loglevel_) << "failed to read symbols from " << filename << ": " << result;
return false;
}
}
bool Dso::LoadKernel() {
BuildId build_id = GetExpectedBuildId();
if (!vmlinux_.empty()) {
ElfStatus result = ParseSymbolsFromElfFile(vmlinux_, build_id,
std::bind(VmlinuxSymbolCallback, std::placeholders::_1, &symbols_));
return CheckReadSymbolResult(result, vmlinux_);
} else if (!kallsyms_.empty()) {
ProcessKernelSymbols(kallsyms_, std::bind(&KernelSymbolCallback,
std::placeholders::_1, &symbols_));
bool all_zero = true;
for (const auto& symbol : symbols_) {
if (symbol.addr != 0) {
all_zero = false;
break;
}
}
if (all_zero) {
LOG(symbol_warning_loglevel_)
<< "Symbol addresses in /proc/kallsyms on device are all zero. "
"`echo 0 >/proc/sys/kernel/kptr_restrict` if possible.";
symbols_.clear();
return false;
}
} else if (read_kernel_symbols_from_proc_ || !build_id.IsEmpty()) {
// Try /proc/kallsyms only when asked to do so, or when build id matches.
// Otherwise, it is likely to use /proc/kallsyms on host for perf.data recorded on device.
if (!build_id.IsEmpty()) {
BuildId real_build_id;
if (!GetKernelBuildId(&real_build_id)) {
return false;
}
bool match = (build_id == real_build_id);
if (!match) {
LOG(symbol_warning_loglevel_) << "failed to read symbols from /proc/kallsyms: Build id "
<< "mismatch";
return false;
}
}
std::string kallsyms;
if (!android::base::ReadFileToString("/proc/kallsyms", &kallsyms)) {
LOG(DEBUG) << "failed to read /proc/kallsyms";
return false;
}
ProcessKernelSymbols(kallsyms, std::bind(&KernelSymbolCallback,
std::placeholders::_1, &symbols_));
bool all_zero = true;
for (const auto& symbol : symbols_) {
if (symbol.addr != 0) {
all_zero = false;
break;
}
}
if (all_zero) {
LOG(symbol_warning_loglevel_) << "Symbol addresses in /proc/kallsyms are all zero. "
"`echo 0 >/proc/sys/kernel/kptr_restrict` if possible.";
symbols_.clear();
return false;
}
}
return true;
}
static void ElfFileSymbolCallback(const ElfFileSymbol& elf_symbol,
bool (*filter)(const ElfFileSymbol&),
std::vector<Symbol>* symbols) {
if (filter(elf_symbol)) {
symbols->emplace_back(elf_symbol.name, elf_symbol.vaddr, elf_symbol.len);
}
}
static bool SymbolFilterForKernelModule(const ElfFileSymbol& elf_symbol) {
// TODO: Parse symbol outside of .text section.
return (elf_symbol.is_func && elf_symbol.is_in_text_section);
}
bool Dso::LoadKernelModule() {
BuildId build_id = GetExpectedBuildId();
ElfStatus result = ParseSymbolsFromElfFile(GetDebugFilePath(), build_id,
std::bind(ElfFileSymbolCallback, std::placeholders::_1,
SymbolFilterForKernelModule, &symbols_));
return CheckReadSymbolResult(result, GetDebugFilePath());
}
static bool SymbolFilterForDso(const ElfFileSymbol& elf_symbol) {
return elf_symbol.is_func ||
(elf_symbol.is_label && elf_symbol.is_in_text_section);
}
bool Dso::LoadElfFile() {
BuildId build_id = GetExpectedBuildId();
if (symfs_dir_.empty()) {
// Linux host can store debug shared libraries in /usr/lib/debug.
ElfStatus result = ParseSymbolsFromElfFile(
"/usr/lib/debug" + path_, build_id,
std::bind(ElfFileSymbolCallback, std::placeholders::_1,
SymbolFilterForDso, &symbols_));
if (result == ElfStatus::NO_ERROR) {
return CheckReadSymbolResult(result, "/usr/lib/debug" + path_);
}
}
// TODO: load std::vector<Symbol> directly from ParseSymbolsFromElfFile
// instead of needing to call a callback function for each symbol.
ElfStatus result = ParseSymbolsFromElfFile(
GetDebugFilePath(), build_id,
std::bind(ElfFileSymbolCallback, std::placeholders::_1,
SymbolFilterForDso, &symbols_));
return CheckReadSymbolResult(result, GetDebugFilePath());
}
bool Dso::LoadEmbeddedElfFile() {
BuildId build_id = GetExpectedBuildId();
auto tuple = SplitUrlInApk(GetDebugFilePath());
CHECK(std::get<0>(tuple));
ElfStatus result = ParseSymbolsFromApkFile(
std::get<1>(tuple), std::get<2>(tuple), build_id,
std::bind(ElfFileSymbolCallback, std::placeholders::_1,
SymbolFilterForDso, &symbols_));
return CheckReadSymbolResult(result, GetDebugFilePath());
}
void Dso::FixupSymbolLength() {
Symbol* prev_symbol = nullptr;
for (auto& symbol : symbols_) {
if (prev_symbol != nullptr && prev_symbol->len == 0) {
prev_symbol->len = symbol.addr - prev_symbol->addr;
}
prev_symbol = &symbol;
}
if (prev_symbol != nullptr && prev_symbol->len == 0) {
prev_symbol->len = std::numeric_limits<uint64_t>::max() - prev_symbol->addr;
}
}
const char* DsoTypeToString(DsoType dso_type) {
switch (dso_type) {
case DSO_KERNEL:
return "dso_kernel";
case DSO_KERNEL_MODULE:
return "dso_kernel_module";
case DSO_ELF_FILE:
return "dso_elf_file";
default:
return "unknown";
}
}