Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Arnaldo Carvalho de Melo | 872 | 32.17% | 43 | 42.57% |
Michael Lentine | 404 | 14.90% | 1 | 0.99% |
Adrian Hunter | 375 | 13.83% | 10 | 9.90% |
Jiri Olsa | 184 | 6.79% | 11 | 10.89% |
Frédéric Weisbecker | 147 | 5.42% | 1 | 0.99% |
Wang Nan | 133 | 4.91% | 3 | 2.97% |
Ian Rogers | 130 | 4.80% | 5 | 4.95% |
Namhyung Kim | 86 | 3.17% | 5 | 4.95% |
James Clark | 69 | 2.55% | 1 | 0.99% |
Akihiro Nagai | 67 | 2.47% | 2 | 1.98% |
Krister Johansen | 62 | 2.29% | 2 | 1.98% |
Song Liu | 52 | 1.92% | 1 | 0.99% |
Andi Kleen | 28 | 1.03% | 2 | 1.98% |
Kirill Smelkov | 27 | 1.00% | 1 | 0.99% |
Don Zickus | 18 | 0.66% | 1 | 0.99% |
Masami Hiramatsu | 16 | 0.59% | 2 | 1.98% |
Nick Desaulniers | 11 | 0.41% | 1 | 0.99% |
Ingo Molnar | 8 | 0.30% | 2 | 1.98% |
Yanmin Zhang | 7 | 0.26% | 1 | 0.99% |
Davidlohr Bueso A | 6 | 0.22% | 1 | 0.99% |
Elena Reshetova | 3 | 0.11% | 1 | 0.99% |
Feng Tang | 2 | 0.07% | 1 | 0.99% |
David Ahern | 2 | 0.07% | 1 | 0.99% |
Greg Kroah-Hartman | 1 | 0.04% | 1 | 0.99% |
Stéphane Eranian | 1 | 0.04% | 1 | 0.99% |
Total | 2711 | 101 |
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594
// SPDX-License-Identifier: GPL-2.0 #include <inttypes.h> #include <limits.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <linux/string.h> #include <linux/zalloc.h> #include <uapi/linux/mman.h> /* To get things like MAP_HUGETLB even on older libc headers */ #include "debug.h" #include "dso.h" #include "map.h" #include "namespaces.h" #include "srcline.h" #include "symbol.h" #include "thread.h" #include "vdso.h" static inline int is_android_lib(const char *filename) { return strstarts(filename, "/data/app-lib/") || strstarts(filename, "/system/lib/"); } static inline bool replace_android_lib(const char *filename, char *newfilename) { const char *libname; char *app_abi; size_t app_abi_length, new_length; size_t lib_length = 0; libname = strrchr(filename, '/'); if (libname) lib_length = strlen(libname); app_abi = getenv("APP_ABI"); if (!app_abi) return false; app_abi_length = strlen(app_abi); if (strstarts(filename, "/data/app-lib/")) { char *apk_path; if (!app_abi_length) return false; new_length = 7 + app_abi_length + lib_length; apk_path = getenv("APK_PATH"); if (apk_path) { new_length += strlen(apk_path) + 1; if (new_length > PATH_MAX) return false; snprintf(newfilename, new_length, "%s/libs/%s/%s", apk_path, app_abi, libname); } else { if (new_length > PATH_MAX) return false; snprintf(newfilename, new_length, "libs/%s/%s", app_abi, libname); } return true; } if (strstarts(filename, "/system/lib/")) { char *ndk, *app; const char *arch; int ndk_length, app_length; ndk = getenv("NDK_ROOT"); app = getenv("APP_PLATFORM"); if (!(ndk && app)) return false; ndk_length = strlen(ndk); app_length = strlen(app); if (!(ndk_length && app_length && app_abi_length)) return false; arch = !strncmp(app_abi, "arm", 3) ? "arm" : !strncmp(app_abi, "mips", 4) ? "mips" : !strncmp(app_abi, "x86", 3) ? "x86" : NULL; if (!arch) return false; new_length = 27 + ndk_length + app_length + lib_length + strlen(arch); if (new_length > PATH_MAX) return false; snprintf(newfilename, new_length, "%.*s/platforms/%.*s/arch-%s/usr/lib/%s", ndk_length, ndk, app_length, app, arch, libname); return true; } return false; } void map__init(struct map *map, u64 start, u64 end, u64 pgoff, struct dso *dso) { map->start = start; map->end = end; map->pgoff = pgoff; map->reloc = 0; map->dso = dso__get(dso); map->map_ip = map__map_ip; map->unmap_ip = map__unmap_ip; RB_CLEAR_NODE(&map->rb_node); map->erange_warned = false; refcount_set(&map->refcnt, 1); } struct map *map__new(struct machine *machine, u64 start, u64 len, u64 pgoff, struct dso_id *id, u32 prot, u32 flags, struct build_id *bid, char *filename, struct thread *thread) { struct map *map = malloc(sizeof(*map)); struct nsinfo *nsi = NULL; struct nsinfo *nnsi; if (map != NULL) { char newfilename[PATH_MAX]; struct dso *dso, *header_bid_dso; int anon, no_dso, vdso, android; android = is_android_lib(filename); anon = is_anon_memory(filename) || flags & MAP_HUGETLB; vdso = is_vdso_map(filename); no_dso = is_no_dso_memory(filename); map->prot = prot; map->flags = flags; nsi = nsinfo__get(thread->nsinfo); if ((anon || no_dso) && nsi && (prot & PROT_EXEC)) { snprintf(newfilename, sizeof(newfilename), "/tmp/perf-%d.map", nsinfo__pid(nsi)); filename = newfilename; } if (android) { if (replace_android_lib(filename, newfilename)) filename = newfilename; } if (vdso) { /* The vdso maps are always on the host and not the * container. Ensure that we don't use setns to look * them up. */ nnsi = nsinfo__copy(nsi); if (nnsi) { nsinfo__put(nsi); nsinfo__clear_need_setns(nnsi); nsi = nnsi; } pgoff = 0; dso = machine__findnew_vdso(machine, thread); } else dso = machine__findnew_dso_id(machine, filename, id); if (dso == NULL) goto out_delete; map__init(map, start, start + len, pgoff, dso); if (anon || no_dso) { map->map_ip = map->unmap_ip = identity__map_ip; /* * Set memory without DSO as loaded. All map__find_* * functions still return NULL, and we avoid the * unnecessary map__load warning. */ if (!(prot & PROT_EXEC)) dso__set_loaded(dso); } mutex_lock(&dso->lock); nsinfo__put(dso->nsinfo); dso->nsinfo = nsi; mutex_unlock(&dso->lock); if (build_id__is_defined(bid)) { dso__set_build_id(dso, bid); } else { /* * If the mmap event had no build ID, search for an existing dso from the * build ID header by name. Otherwise only the dso loaded at the time of * reading the header will have the build ID set and all future mmaps will * have it missing. */ down_read(&machine->dsos.lock); header_bid_dso = __dsos__find(&machine->dsos, filename, false); up_read(&machine->dsos.lock); if (header_bid_dso && header_bid_dso->header_build_id) { dso__set_build_id(dso, &header_bid_dso->bid); dso->header_build_id = 1; } } dso__put(dso); } return map; out_delete: nsinfo__put(nsi); free(map); return NULL; } /* * Constructor variant for modules (where we know from /proc/modules where * they are loaded) and for vmlinux, where only after we load all the * symbols we'll know where it starts and ends. */ struct map *map__new2(u64 start, struct dso *dso) { struct map *map = calloc(1, (sizeof(*map) + (dso->kernel ? sizeof(struct kmap) : 0))); if (map != NULL) { /* * ->end will be filled after we load all the symbols */ map__init(map, start, 0, 0, dso); } return map; } bool __map__is_kernel(const struct map *map) { if (!map->dso->kernel) return false; return machine__kernel_map(map__kmaps((struct map *)map)->machine) == map; } bool __map__is_extra_kernel_map(const struct map *map) { struct kmap *kmap = __map__kmap((struct map *)map); return kmap && kmap->name[0]; } bool __map__is_bpf_prog(const struct map *map) { const char *name; if (map->dso->binary_type == DSO_BINARY_TYPE__BPF_PROG_INFO) return true; /* * If PERF_RECORD_BPF_EVENT is not included, the dso will not have * type of DSO_BINARY_TYPE__BPF_PROG_INFO. In such cases, we can * guess the type based on name. */ name = map->dso->short_name; return name && (strstr(name, "bpf_prog_") == name); } bool __map__is_bpf_image(const struct map *map) { const char *name; if (map->dso->binary_type == DSO_BINARY_TYPE__BPF_IMAGE) return true; /* * If PERF_RECORD_KSYMBOL is not included, the dso will not have * type of DSO_BINARY_TYPE__BPF_IMAGE. In such cases, we can * guess the type based on name. */ name = map->dso->short_name; return name && is_bpf_image(name); } bool __map__is_ool(const struct map *map) { return map->dso && map->dso->binary_type == DSO_BINARY_TYPE__OOL; } bool map__has_symbols(const struct map *map) { return dso__has_symbols(map->dso); } static void map__exit(struct map *map) { BUG_ON(refcount_read(&map->refcnt) != 0); dso__zput(map->dso); } void map__delete(struct map *map) { map__exit(map); free(map); } void map__put(struct map *map) { if (map && refcount_dec_and_test(&map->refcnt)) map__delete(map); } void map__fixup_start(struct map *map) { struct rb_root_cached *symbols = &map->dso->symbols; struct rb_node *nd = rb_first_cached(symbols); if (nd != NULL) { struct symbol *sym = rb_entry(nd, struct symbol, rb_node); map->start = sym->start; } } void map__fixup_end(struct map *map) { struct rb_root_cached *symbols = &map->dso->symbols; struct rb_node *nd = rb_last(&symbols->rb_root); if (nd != NULL) { struct symbol *sym = rb_entry(nd, struct symbol, rb_node); map->end = sym->end; } } #define DSO__DELETED "(deleted)" int map__load(struct map *map) { const char *name = map->dso->long_name; int nr; if (dso__loaded(map->dso)) return 0; nr = dso__load(map->dso, map); if (nr < 0) { if (map->dso->has_build_id) { char sbuild_id[SBUILD_ID_SIZE]; build_id__sprintf(&map->dso->bid, sbuild_id); pr_debug("%s with build id %s not found", name, sbuild_id); } else pr_debug("Failed to open %s", name); pr_debug(", continuing without symbols\n"); return -1; } else if (nr == 0) { #ifdef HAVE_LIBELF_SUPPORT const size_t len = strlen(name); const size_t real_len = len - sizeof(DSO__DELETED); if (len > sizeof(DSO__DELETED) && strcmp(name + real_len + 1, DSO__DELETED) == 0) { pr_debug("%.*s was updated (is prelink enabled?). " "Restart the long running apps that use it!\n", (int)real_len, name); } else { pr_debug("no symbols found in %s, maybe install a debug package?\n", name); } #endif return -1; } return 0; } struct symbol *map__find_symbol(struct map *map, u64 addr) { if (map__load(map) < 0) return NULL; return dso__find_symbol(map->dso, addr); } struct symbol *map__find_symbol_by_name(struct map *map, const char *name) { if (map__load(map) < 0) return NULL; if (!dso__sorted_by_name(map->dso)) dso__sort_by_name(map->dso); return dso__find_symbol_by_name(map->dso, name); } struct map *map__clone(struct map *from) { size_t size = sizeof(struct map); struct map *map; if (from->dso && from->dso->kernel) size += sizeof(struct kmap); map = memdup(from, size); if (map != NULL) { refcount_set(&map->refcnt, 1); RB_CLEAR_NODE(&map->rb_node); dso__get(map->dso); } return map; } size_t map__fprintf(struct map *map, FILE *fp) { return fprintf(fp, " %" PRIx64 "-%" PRIx64 " %" PRIx64 " %s\n", map->start, map->end, map->pgoff, map->dso->name); } size_t map__fprintf_dsoname(struct map *map, FILE *fp) { char buf[symbol_conf.pad_output_len_dso + 1]; const char *dsoname = "[unknown]"; if (map && map->dso) { if (symbol_conf.show_kernel_path && map->dso->long_name) dsoname = map->dso->long_name; else dsoname = map->dso->name; } if (symbol_conf.pad_output_len_dso) { scnprintf_pad(buf, symbol_conf.pad_output_len_dso, "%s", dsoname); dsoname = buf; } return fprintf(fp, "%s", dsoname); } char *map__srcline(struct map *map, u64 addr, struct symbol *sym) { if (map == NULL) return SRCLINE_UNKNOWN; return get_srcline(map->dso, map__rip_2objdump(map, addr), sym, true, true, addr); } int map__fprintf_srcline(struct map *map, u64 addr, const char *prefix, FILE *fp) { int ret = 0; if (map && map->dso) { char *srcline = map__srcline(map, addr, NULL); if (strncmp(srcline, SRCLINE_UNKNOWN, strlen(SRCLINE_UNKNOWN)) != 0) ret = fprintf(fp, "%s%s", prefix, srcline); free_srcline(srcline); } return ret; } void srccode_state_free(struct srccode_state *state) { zfree(&state->srcfile); state->line = 0; } /** * map__rip_2objdump - convert symbol start address to objdump address. * @map: memory map * @rip: symbol start address * * objdump wants/reports absolute IPs for ET_EXEC, and RIPs for ET_DYN. * map->dso->adjust_symbols==1 for ET_EXEC-like cases except ET_REL which is * relative to section start. * * Return: Address suitable for passing to "objdump --start-address=" */ u64 map__rip_2objdump(struct map *map, u64 rip) { struct kmap *kmap = __map__kmap(map); /* * vmlinux does not have program headers for PTI entry trampolines and * kcore may not either. However the trampoline object code is on the * main kernel map, so just use that instead. */ if (kmap && is_entry_trampoline(kmap->name) && kmap->kmaps && kmap->kmaps->machine) { struct map *kernel_map = machine__kernel_map(kmap->kmaps->machine); if (kernel_map) map = kernel_map; } if (!map->dso->adjust_symbols) return rip; if (map->dso->rel) return rip - map->pgoff; /* * kernel modules also have DSO_TYPE_USER in dso->kernel, * but all kernel modules are ET_REL, so won't get here. */ if (map->dso->kernel == DSO_SPACE__USER) return rip + map->dso->text_offset; return map->unmap_ip(map, rip) - map->reloc; } /** * map__objdump_2mem - convert objdump address to a memory address. * @map: memory map * @ip: objdump address * * Closely related to map__rip_2objdump(), this function takes an address from * objdump and converts it to a memory address. Note this assumes that @map * contains the address. To be sure the result is valid, check it forwards * e.g. map__rip_2objdump(map->map_ip(map, map__objdump_2mem(map, ip))) == ip * * Return: Memory address. */ u64 map__objdump_2mem(struct map *map, u64 ip) { if (!map->dso->adjust_symbols) return map->unmap_ip(map, ip); if (map->dso->rel) return map->unmap_ip(map, ip + map->pgoff); /* * kernel modules also have DSO_TYPE_USER in dso->kernel, * but all kernel modules are ET_REL, so won't get here. */ if (map->dso->kernel == DSO_SPACE__USER) return map->unmap_ip(map, ip - map->dso->text_offset); return ip + map->reloc; } bool map__contains_symbol(const struct map *map, const struct symbol *sym) { u64 ip = map->unmap_ip(map, sym->start); return ip >= map->start && ip < map->end; } static struct map *__map__next(struct map *map) { struct rb_node *next = rb_next(&map->rb_node); if (next) return rb_entry(next, struct map, rb_node); return NULL; } struct map *map__next(struct map *map) { return map ? __map__next(map) : NULL; } struct kmap *__map__kmap(struct map *map) { if (!map->dso || !map->dso->kernel) return NULL; return (struct kmap *)(map + 1); } struct kmap *map__kmap(struct map *map) { struct kmap *kmap = __map__kmap(map); if (!kmap) pr_err("Internal error: map__kmap with a non-kernel map\n"); return kmap; } struct maps *map__kmaps(struct map *map) { struct kmap *kmap = map__kmap(map); if (!kmap || !kmap->kmaps) { pr_err("Internal error: map__kmaps with a non-kernel map\n"); return NULL; } return kmap->kmaps; } u64 map__map_ip(const struct map *map, u64 ip) { return ip - map->start + map->pgoff; } u64 map__unmap_ip(const struct map *map, u64 ip) { return ip + map->start - map->pgoff; } u64 identity__map_ip(const struct map *map __maybe_unused, u64 ip) { return ip; }
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1