xref: /aosp_15_r20/system/extras/simpleperf/dso.cpp (revision 288bf5226967eb3dac5cce6c939ccc2a7f2b4fe5)
1 /*
2  * Copyright (C) 2015 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "dso.h"
18 
19 #include <stdlib.h>
20 #include <string.h>
21 
22 #include <algorithm>
23 #include <limits>
24 #include <memory>
25 #include <optional>
26 #include <string_view>
27 #include <vector>
28 
29 #include <android-base/file.h>
30 #include <android-base/logging.h>
31 #include <android-base/strings.h>
32 
33 #include "JITDebugReader.h"
34 #include "environment.h"
35 #include "kallsyms.h"
36 #include "read_apk.h"
37 #include "read_dex_file.h"
38 #include "read_elf.h"
39 #include "utils.h"
40 
41 namespace simpleperf {
42 
43 using android::base::EndsWith;
44 using android::base::StartsWith;
45 
46 namespace simpleperf_dso_impl {
47 
RemovePathSeparatorSuffix(const std::string & path)48 std::string RemovePathSeparatorSuffix(const std::string& path) {
49   // Don't remove path separator suffix for '/'.
50   if (EndsWith(path, OS_PATH_SEPARATOR) && path.size() > 1u) {
51     return path.substr(0, path.size() - 1);
52   }
53   return path;
54 }
55 
Reset()56 void DebugElfFileFinder::Reset() {
57   allow_mismatched_build_id_ = false;
58   vdso_64bit_.clear();
59   vdso_32bit_.clear();
60   symfs_dir_.clear();
61   build_id_to_file_map_.clear();
62 }
63 
SetSymFsDir(const std::string & symfs_dir)64 bool DebugElfFileFinder::SetSymFsDir(const std::string& symfs_dir) {
65   symfs_dir_ = RemovePathSeparatorSuffix(symfs_dir);
66   if (!IsDir(symfs_dir_)) {
67     LOG(ERROR) << "Invalid symfs_dir '" << symfs_dir_ << "'";
68     return false;
69   }
70   std::string build_id_list_file = symfs_dir_ + OS_PATH_SEPARATOR + "build_id_list";
71   std::string build_id_list;
72   if (android::base::ReadFileToString(build_id_list_file, &build_id_list)) {
73     for (auto& line : android::base::Split(build_id_list, "\n")) {
74       std::vector<std::string> items = android::base::Split(line, "=");
75       if (items.size() == 2u) {
76         build_id_to_file_map_[items[0]] = symfs_dir_ + OS_PATH_SEPARATOR + items[1];
77       }
78     }
79   }
80   return true;
81 }
82 
AddSymbolDir(const std::string & symbol_dir)83 bool DebugElfFileFinder::AddSymbolDir(const std::string& symbol_dir) {
84   if (!IsDir(symbol_dir)) {
85     LOG(ERROR) << "Invalid symbol dir " << symbol_dir;
86     return false;
87   }
88   std::string dir = RemovePathSeparatorSuffix(symbol_dir);
89   CollectBuildIdInDir(dir);
90   return true;
91 }
92 
CollectBuildIdInDir(const std::string & dir)93 void DebugElfFileFinder::CollectBuildIdInDir(const std::string& dir) {
94   for (const std::string& entry : GetEntriesInDir(dir)) {
95     std::string path = dir + OS_PATH_SEPARATOR + entry;
96     if (IsDir(path)) {
97       CollectBuildIdInDir(path);
98     } else {
99       BuildId build_id;
100       ElfStatus status;
101       auto elf = ElfFile::Open(path, &status);
102       if (status == ElfStatus::NO_ERROR) {
103         if (elf->GetBuildId(&build_id) == ElfStatus::NO_ERROR) {
104           build_id_to_file_map_[build_id.ToString()] = path;
105         } else {
106           no_build_id_files_.emplace_back(std::move(path));
107         }
108       }
109     }
110   }
111 }
112 
SetVdsoFile(const std::string & vdso_file,bool is_64bit)113 void DebugElfFileFinder::SetVdsoFile(const std::string& vdso_file, bool is_64bit) {
114   if (is_64bit) {
115     vdso_64bit_ = vdso_file;
116   } else {
117     vdso_32bit_ = vdso_file;
118   }
119 }
120 
CheckDebugFilePath(const std::string & path,BuildId & build_id,bool report_build_id_mismatch)121 bool DebugElfFileFinder::CheckDebugFilePath(const std::string& path, BuildId& build_id,
122                                             bool report_build_id_mismatch) {
123   ElfStatus status;
124   auto elf = ElfFile::Open(path, &status);
125   if (!elf) {
126     return false;
127   }
128   BuildId debug_build_id;
129   status = elf->GetBuildId(&debug_build_id);
130   if (status != ElfStatus::NO_ERROR && status != ElfStatus::NO_BUILD_ID) {
131     return false;
132   }
133 
134   if (allow_mismatched_build_id_) {
135     return true;
136   }
137 
138   // Native libraries in apks and kernel modules may not have build ids.
139   // So build_id and debug_build_id can either be empty, or have the same value.
140   bool match = build_id == debug_build_id;
141   if (!match && report_build_id_mismatch) {
142     LOG(WARNING) << path << " isn't used because of build id mismatch: expected " << build_id
143                  << ", real " << debug_build_id;
144   }
145   return match;
146 }
147 
FindDebugFile(const std::string & dso_path,bool force_64bit,BuildId & build_id)148 std::string DebugElfFileFinder::FindDebugFile(const std::string& dso_path, bool force_64bit,
149                                               BuildId& build_id) {
150   if (dso_path == "[vdso]") {
151     if (force_64bit && !vdso_64bit_.empty()) {
152       return vdso_64bit_;
153     } else if (!force_64bit && !vdso_32bit_.empty()) {
154       return vdso_32bit_;
155     }
156   }
157   if (build_id.IsEmpty()) {
158     // Try reading build id from file if we don't already have one.
159     GetBuildIdFromDsoPath(dso_path, &build_id);
160   }
161 
162   // 1. Try build_id_to_file_map.
163   if (!build_id_to_file_map_.empty()) {
164     if (!build_id.IsEmpty()) {
165       auto it = build_id_to_file_map_.find(build_id.ToString());
166       if (it != build_id_to_file_map_.end() && CheckDebugFilePath(it->second, build_id, false)) {
167         return it->second;
168       }
169     }
170   }
171   if (allow_mismatched_build_id_) {
172     std::optional<std::string> s = SearchFileMapByPath(dso_path);
173     if (s.has_value()) {
174       return s.value();
175     }
176   }
177   if (!symfs_dir_.empty()) {
178     // 2. Try concatenating symfs_dir and dso_path.
179     std::string path = GetPathInSymFsDir(dso_path);
180     if (CheckDebugFilePath(path, build_id, true)) {
181       return path;
182     }
183     if (EndsWith(dso_path, ".apk") && IsRegularFile(path)) {
184       return path;
185     }
186     // 3. Try concatenating symfs_dir and basename of dso_path.
187     path = symfs_dir_ + OS_PATH_SEPARATOR + android::base::Basename(dso_path);
188     if (CheckDebugFilePath(path, build_id, false)) {
189       return path;
190     }
191   }
192   // 4. Try concatenating /usr/lib/debug and dso_path.
193   // Linux host can store debug shared libraries in /usr/lib/debug.
194   if (CheckDebugFilePath("/usr/lib/debug" + dso_path, build_id, false)) {
195     return "/usr/lib/debug" + dso_path;
196   }
197   return dso_path;
198 }
199 
GetPathInSymFsDir(const std::string & path)200 std::string DebugElfFileFinder::GetPathInSymFsDir(const std::string& path) {
201   auto add_symfs_prefix = [&](const std::string& path) {
202     if (StartsWith(path, OS_PATH_SEPARATOR)) {
203       return symfs_dir_ + path;
204     }
205     return symfs_dir_ + OS_PATH_SEPARATOR + path;
206   };
207   if (OS_PATH_SEPARATOR == '/') {
208     return add_symfs_prefix(path);
209   }
210   // Paths in recorded perf.data uses '/' as path separator. When reporting on Windows, it needs
211   // to be converted to '\\'.
212   auto tuple = SplitUrlInApk(path);
213   if (std::get<0>(tuple)) {
214     std::string apk_path = std::get<1>(tuple);
215     std::string entry_path = std::get<2>(tuple);
216     std::replace(apk_path.begin(), apk_path.end(), '/', OS_PATH_SEPARATOR);
217     return GetUrlInApk(add_symfs_prefix(apk_path), entry_path);
218   }
219   std::string elf_path = path;
220   std::replace(elf_path.begin(), elf_path.end(), '/', OS_PATH_SEPARATOR);
221   return add_symfs_prefix(elf_path);
222 }
223 
SearchFileMapByPath(std::string_view path)224 std::optional<std::string> DebugElfFileFinder::SearchFileMapByPath(std::string_view path) {
225   if (path == "[kernel.kallsyms]") {
226     path = "vmlinux";
227   }
228   std::string_view filename;
229   if (size_t pos = path.rfind('/'); pos != path.npos) {
230     filename = path.substr(pos + 1);
231   } else {
232     filename = path;
233   }
234   std::string best_elf_file;
235   size_t best_match_length = 0;
236   auto check_file = [&](const std::string& elf_file) {
237     if (EndsWith(elf_file, filename)) {
238       size_t i = elf_file.size();
239       size_t j = path.size();
240       while (i > 0 && j > 0 && elf_file[i - 1] == path[j - 1]) {
241         i--;
242         j--;
243       }
244       size_t match_length = elf_file.size() - i;
245       if (match_length > best_match_length) {
246         best_elf_file = elf_file;
247         best_match_length = match_length;
248       }
249     }
250   };
251 
252   for (const auto& p : build_id_to_file_map_) {
253     check_file(p.second);
254   }
255   for (const auto& elf_file : no_build_id_files_) {
256     check_file(elf_file);
257   }
258   if (!best_elf_file.empty()) {
259     LOG(INFO) << "Found " << best_elf_file << " for " << path << " by filename";
260     return best_elf_file;
261   }
262   return std::nullopt;
263 }
264 
265 }  // namespace simpleperf_dso_impl
266 
267 static OneTimeFreeAllocator symbol_name_allocator;
268 
Symbol(std::string_view name,uint64_t addr,uint64_t len)269 Symbol::Symbol(std::string_view name, uint64_t addr, uint64_t len)
270     : addr(addr),
271       len(len),
272       name_(symbol_name_allocator.AllocateString(name)),
273       demangled_name_(nullptr),
274       dump_id_(UINT_MAX) {}
275 
DemangledName() const276 const char* Symbol::DemangledName() const {
277   if (demangled_name_ == nullptr) {
278     const std::string s = Dso::Demangle(name_);
279     SetDemangledName(s);
280   }
281   return demangled_name_;
282 }
283 
SetDemangledName(std::string_view name) const284 void Symbol::SetDemangledName(std::string_view name) const {
285   if (name == name_) {
286     demangled_name_ = name_;
287   } else {
288     demangled_name_ = symbol_name_allocator.AllocateString(name);
289   }
290 }
291 
FunctionName() const292 std::string_view Symbol::FunctionName() const {
293   // Name with signature is like "void ctep.v(cteo, ctgc, ctbn)".
294   std::string_view name = DemangledName();
295   auto brace_pos = name.find('(');
296   if (brace_pos != name.npos) {
297     name = name.substr(0, brace_pos);
298     auto space_pos = name.rfind(' ');
299     if (space_pos != name.npos) {
300       name = name.substr(space_pos + 1);
301     }
302   }
303   return name;
304 }
305 
CompareSymbolToAddr(const Symbol & s,uint64_t addr)306 static bool CompareSymbolToAddr(const Symbol& s, uint64_t addr) {
307   return s.addr < addr;
308 }
309 
CompareAddrToSymbol(uint64_t addr,const Symbol & s)310 static bool CompareAddrToSymbol(uint64_t addr, const Symbol& s) {
311   return addr < s.addr;
312 }
313 
314 bool Dso::demangle_ = true;
315 std::string Dso::vmlinux_;
316 std::string Dso::kallsyms_;
317 std::unordered_map<std::string, BuildId> Dso::build_id_map_;
318 size_t Dso::dso_count_;
319 uint32_t Dso::g_dump_id_;
320 simpleperf_dso_impl::DebugElfFileFinder Dso::debug_elf_file_finder_;
321 
SetDemangle(bool demangle)322 void Dso::SetDemangle(bool demangle) {
323   demangle_ = demangle;
324 }
325 
326 extern "C" char* __cxa_demangle(const char* mangled_name, char* buf, size_t* n, int* status);
327 #if defined(__linux__) || defined(__darwin__)
328 extern "C" char* rustc_demangle(const char* mangled, char* out, size_t* len, int* status);
329 #endif
330 
Demangle(const std::string & name)331 std::string Dso::Demangle(const std::string& name) {
332   if (!demangle_) {
333     return name;
334   }
335   int status;
336   bool is_linker_symbol = (name.find(linker_prefix) == 0);
337   const char* mangled_str = name.c_str();
338   if (is_linker_symbol) {
339     mangled_str += linker_prefix.size();
340   }
341 
342   if (mangled_str[0] == '_') {
343     char* demangled_name = nullptr;
344     int status = -2;  // -2 means name didn't demangle.
345     if (mangled_str[1] == 'Z') {
346       demangled_name = __cxa_demangle(mangled_str, nullptr, nullptr, &status);
347 #if defined(__linux__) || defined(__darwin__)
348     } else if (mangled_str[1] == 'R') {
349       demangled_name = rustc_demangle(mangled_str, nullptr, nullptr, &status);
350 #endif
351     }
352     if (status == 0) {
353       // demangled successfully
354       std::string result;
355       if (is_linker_symbol) {
356         result = std::string("[linker]") + demangled_name;
357       } else {
358         result = demangled_name;
359       }
360       free(demangled_name);
361       return result;
362     }
363   }
364 
365   // failed to demangle
366   if (is_linker_symbol) {
367     return std::string("[linker]") + mangled_str;
368   }
369   return name;
370 }
371 
SetSymFsDir(const std::string & symfs_dir)372 bool Dso::SetSymFsDir(const std::string& symfs_dir) {
373   return debug_elf_file_finder_.SetSymFsDir(symfs_dir);
374 }
375 
AddSymbolDir(const std::string & symbol_dir)376 bool Dso::AddSymbolDir(const std::string& symbol_dir) {
377   return debug_elf_file_finder_.AddSymbolDir(symbol_dir);
378 }
379 
AllowMismatchedBuildId()380 void Dso::AllowMismatchedBuildId() {
381   return debug_elf_file_finder_.AllowMismatchedBuildId();
382 }
383 
SetVmlinux(const std::string & vmlinux)384 void Dso::SetVmlinux(const std::string& vmlinux) {
385   vmlinux_ = vmlinux;
386 }
387 
SetBuildIds(const std::vector<std::pair<std::string,BuildId>> & build_ids)388 void Dso::SetBuildIds(const std::vector<std::pair<std::string, BuildId>>& build_ids) {
389   std::unordered_map<std::string, BuildId> map;
390   for (auto& pair : build_ids) {
391     LOG(DEBUG) << "build_id_map: " << pair.first << ", " << pair.second.ToString();
392     map.insert(pair);
393   }
394   build_id_map_ = std::move(map);
395 }
396 
SetVdsoFile(const std::string & vdso_file,bool is_64bit)397 void Dso::SetVdsoFile(const std::string& vdso_file, bool is_64bit) {
398   debug_elf_file_finder_.SetVdsoFile(vdso_file, is_64bit);
399 }
400 
FindExpectedBuildIdForPath(const std::string & path)401 BuildId Dso::FindExpectedBuildIdForPath(const std::string& path) {
402   auto it = build_id_map_.find(path);
403   if (it != build_id_map_.end()) {
404     return it->second;
405   }
406   return BuildId();
407 }
408 
GetExpectedBuildId() const409 BuildId Dso::GetExpectedBuildId() const {
410   return FindExpectedBuildIdForPath(path_);
411 }
412 
Dso(DsoType type,const std::string & path)413 Dso::Dso(DsoType type, const std::string& path)
414     : type_(type),
415       path_(path),
416       is_loaded_(false),
417       dump_id_(UINT_MAX),
418       symbol_dump_id_(0),
419       symbol_warning_loglevel_(android::base::WARNING) {
420   size_t pos = path.find_last_of("/\\");
421   if (pos != std::string::npos) {
422     file_name_ = path.substr(pos + 1);
423   } else {
424     file_name_ = path;
425   }
426   dso_count_++;
427 }
428 
~Dso()429 Dso::~Dso() {
430   if (--dso_count_ == 0) {
431     // Clean up global variables when no longer used.
432     symbol_name_allocator.Clear();
433     demangle_ = true;
434     vmlinux_.clear();
435     kallsyms_.clear();
436     build_id_map_.clear();
437     g_dump_id_ = 0;
438     debug_elf_file_finder_.Reset();
439   }
440 }
441 
CreateDumpId()442 uint32_t Dso::CreateDumpId() {
443   CHECK(!HasDumpId());
444   return dump_id_ = g_dump_id_++;
445 }
446 
CreateSymbolDumpId(const Symbol * symbol)447 uint32_t Dso::CreateSymbolDumpId(const Symbol* symbol) {
448   CHECK(!symbol->HasDumpId());
449   symbol->dump_id_ = symbol_dump_id_++;
450   return symbol->dump_id_;
451 }
452 
IpToFileOffset(uint64_t ip,uint64_t map_start,uint64_t map_pgoff)453 std::optional<uint64_t> Dso::IpToFileOffset(uint64_t ip, uint64_t map_start, uint64_t map_pgoff) {
454   return ip - map_start + map_pgoff;
455 }
456 
FindSymbol(uint64_t vaddr_in_dso)457 const Symbol* Dso::FindSymbol(uint64_t vaddr_in_dso) {
458   if (!is_loaded_) {
459     LoadSymbols();
460   }
461   auto it = std::upper_bound(symbols_.begin(), symbols_.end(), vaddr_in_dso, CompareAddrToSymbol);
462   if (it != symbols_.begin()) {
463     --it;
464     if (it->addr <= vaddr_in_dso && (it->addr + it->len > vaddr_in_dso)) {
465       return &*it;
466     }
467   }
468   if (!unknown_symbols_.empty()) {
469     auto it = unknown_symbols_.find(vaddr_in_dso);
470     if (it != unknown_symbols_.end()) {
471       return &it->second;
472     }
473   }
474   return nullptr;
475 }
476 
SetSymbols(std::vector<Symbol> * symbols)477 void Dso::SetSymbols(std::vector<Symbol>* symbols) {
478   symbols_ = std::move(*symbols);
479   symbols->clear();
480 }
481 
AddUnknownSymbol(uint64_t vaddr_in_dso,const std::string & name)482 void Dso::AddUnknownSymbol(uint64_t vaddr_in_dso, const std::string& name) {
483   unknown_symbols_.insert(std::make_pair(vaddr_in_dso, Symbol(name, vaddr_in_dso, 1)));
484 }
485 
IsForJavaMethod() const486 bool Dso::IsForJavaMethod() const {
487   if (type_ == DSO_DEX_FILE) {
488     return true;
489   }
490   if (type_ == DSO_ELF_FILE) {
491     if (JITDebugReader::IsPathInJITSymFile(path_)) {
492       return true;
493     }
494     // JITDebugReader in old versions generates symfiles in 'TemporaryFile-XXXXXX'.
495     size_t pos = path_.rfind('/');
496     pos = (pos == std::string::npos) ? 0 : pos + 1;
497     return StartsWith(std::string_view(&path_[pos], path_.size() - pos), "TemporaryFile");
498   }
499   return false;
500 }
501 
LoadSymbols()502 void Dso::LoadSymbols() {
503   if (!is_loaded_) {
504     is_loaded_ = true;
505     std::vector<Symbol> symbols = LoadSymbolsImpl();
506     if (symbols_.empty()) {
507       symbols_ = std::move(symbols);
508     } else {
509       std::vector<Symbol> merged_symbols;
510       std::set_union(symbols_.begin(), symbols_.end(), symbols.begin(), symbols.end(),
511                      std::back_inserter(merged_symbols), Symbol::CompareValueByAddr);
512       symbols_ = std::move(merged_symbols);
513     }
514   }
515 }
516 
ReportReadElfSymbolResult(ElfStatus result,const std::string & path,const std::string & debug_file_path,android::base::LogSeverity warning_loglevel=android::base::WARNING)517 static void ReportReadElfSymbolResult(
518     ElfStatus result, const std::string& path, const std::string& debug_file_path,
519     android::base::LogSeverity warning_loglevel = android::base::WARNING) {
520   if (result == ElfStatus::NO_ERROR) {
521     LOG(VERBOSE) << "Read symbols from " << debug_file_path << " successfully";
522   } else if (result == ElfStatus::NO_SYMBOL_TABLE) {
523     if (path == "[vdso]") {
524       // Vdso only contains dynamic symbol table, and we can't change that.
525       return;
526     }
527     // Lacking symbol table isn't considered as an error but worth reporting.
528     LOG(warning_loglevel) << debug_file_path << " doesn't contain symbol table";
529   } else {
530     LOG(warning_loglevel) << "failed to read symbols from " << debug_file_path << ": " << result;
531   }
532 }
533 
SortAndFixSymbols(std::vector<Symbol> & symbols)534 static void SortAndFixSymbols(std::vector<Symbol>& symbols) {
535   std::sort(symbols.begin(), symbols.end(), Symbol::CompareValueByAddr);
536   Symbol* prev_symbol = nullptr;
537   for (auto& symbol : symbols) {
538     if (prev_symbol != nullptr && prev_symbol->len == 0) {
539       prev_symbol->len = symbol.addr - prev_symbol->addr;
540     }
541     prev_symbol = &symbol;
542   }
543 }
544 
545 class DexFileDso : public Dso {
546  public:
DexFileDso(const std::string & path)547   DexFileDso(const std::string& path) : Dso(DSO_DEX_FILE, path) {}
548 
AddDexFileOffset(uint64_t dex_file_offset)549   void AddDexFileOffset(uint64_t dex_file_offset) override {
550     auto it = std::lower_bound(dex_file_offsets_.begin(), dex_file_offsets_.end(), dex_file_offset);
551     if (it != dex_file_offsets_.end() && *it == dex_file_offset) {
552       return;
553     }
554     dex_file_offsets_.insert(it, dex_file_offset);
555   }
556 
DexFileOffsets()557   const std::vector<uint64_t>* DexFileOffsets() override { return &dex_file_offsets_; }
558 
IpToVaddrInFile(uint64_t ip,uint64_t map_start,uint64_t map_pgoff)559   uint64_t IpToVaddrInFile(uint64_t ip, uint64_t map_start, uint64_t map_pgoff) override {
560     return ip - map_start + map_pgoff;
561   }
562 
LoadSymbolsImpl()563   std::vector<Symbol> LoadSymbolsImpl() override {
564     std::vector<Symbol> symbols;
565     if (StartsWith(path_, kDexFileInMemoryPrefix)) {
566       // For dex file in memory, the symbols should already be set via SetSymbols().
567       return symbols;
568     }
569 
570     const std::string& debug_file_path = GetDebugFilePath();
571     auto tuple = SplitUrlInApk(debug_file_path);
572     // Symbols of dex files are collected on device. If the dex file doesn't exist, probably
573     // we are reporting on host, and there is no need to report warning of missing dex files.
574     if (!IsRegularFile(std::get<0>(tuple) ? std::get<1>(tuple) : debug_file_path)) {
575       LOG(DEBUG) << "skip reading symbols from non-exist dex_file " << debug_file_path;
576       return symbols;
577     }
578     bool status = false;
579     auto symbol_callback = [&](DexFileSymbol* symbol) {
580       symbols.emplace_back(symbol->name, symbol->addr, symbol->size);
581     };
582     if (std::get<0>(tuple)) {
583       std::unique_ptr<ArchiveHelper> ahelper = ArchiveHelper::CreateInstance(std::get<1>(tuple));
584       ZipEntry entry;
585       std::vector<uint8_t> data;
586       if (ahelper && ahelper->FindEntry(std::get<2>(tuple), &entry) &&
587           ahelper->GetEntryData(entry, &data)) {
588         status = ReadSymbolsFromDexFileInMemory(data.data(), data.size(), debug_file_path,
589                                                 dex_file_offsets_, symbol_callback);
590       }
591     } else {
592       status = ReadSymbolsFromDexFile(debug_file_path, dex_file_offsets_, symbol_callback);
593     }
594     if (!status) {
595       android::base::LogSeverity level =
596           symbols_.empty() ? android::base::WARNING : android::base::DEBUG;
597       LOG(level) << "Failed to read symbols from dex_file " << debug_file_path;
598       return symbols;
599     }
600     LOG(VERBOSE) << "Read symbols from dex_file " << debug_file_path << " successfully";
601     SortAndFixSymbols(symbols);
602     return symbols;
603   }
604 
605  private:
606   std::vector<uint64_t> dex_file_offsets_;
607 };
608 
609 class ElfDso : public Dso {
610  public:
ElfDso(const std::string & path,bool force_64bit)611   ElfDso(const std::string& path, bool force_64bit)
612       : Dso(DSO_ELF_FILE, path), force_64bit_(force_64bit) {}
613 
GetReportPath() const614   std::string_view GetReportPath() const override {
615     if (JITDebugReader::IsPathInJITSymFile(path_)) {
616       if (path_.find(kJITAppCacheFile) != path_.npos) {
617         return "[JIT app cache]";
618       }
619       return "[JIT zygote cache]";
620     }
621     return path_;
622   }
623 
SetMinExecutableVaddr(uint64_t min_vaddr,uint64_t file_offset)624   void SetMinExecutableVaddr(uint64_t min_vaddr, uint64_t file_offset) override {
625     min_vaddr_ = min_vaddr;
626     file_offset_of_min_vaddr_ = file_offset;
627   }
628 
GetMinExecutableVaddr(uint64_t * min_vaddr,uint64_t * file_offset)629   void GetMinExecutableVaddr(uint64_t* min_vaddr, uint64_t* file_offset) override {
630     if (type_ == DSO_DEX_FILE) {
631       return dex_file_dso_->GetMinExecutableVaddr(min_vaddr, file_offset);
632     }
633     if (min_vaddr_ == uninitialized_value) {
634       min_vaddr_ = 0;
635       BuildId build_id = GetExpectedBuildId();
636 
637       ElfStatus status;
638       auto elf = ElfFile::Open(GetDebugFilePath(), &build_id, &status);
639       if (elf) {
640         min_vaddr_ = elf->ReadMinExecutableVaddr(&file_offset_of_min_vaddr_);
641       } else {
642         // This is likely to be a file wrongly thought of as an ELF file, due to stack unwinding.
643         // No need to report it by default.
644         LOG(DEBUG) << "failed to read min virtual address of " << GetDebugFilePath() << ": "
645                    << status;
646       }
647     }
648     *min_vaddr = min_vaddr_;
649     *file_offset = file_offset_of_min_vaddr_;
650   }
651 
IpToVaddrInFile(uint64_t ip,uint64_t map_start,uint64_t map_pgoff)652   uint64_t IpToVaddrInFile(uint64_t ip, uint64_t map_start, uint64_t map_pgoff) override {
653     if (type_ == DSO_DEX_FILE) {
654       return dex_file_dso_->IpToVaddrInFile(ip, map_start, map_pgoff);
655     }
656     uint64_t min_vaddr;
657     uint64_t file_offset_of_min_vaddr;
658     GetMinExecutableVaddr(&min_vaddr, &file_offset_of_min_vaddr);
659     if (file_offset_of_min_vaddr == uninitialized_value) {
660       return ip - map_start + min_vaddr;
661     }
662     // Apps may make part of the executable segment of a shared library writeable, which can
663     // generate multiple executable segments at runtime. So use map_pgoff to calculate
664     // vaddr_in_file.
665     return ip - map_start + map_pgoff - file_offset_of_min_vaddr + min_vaddr;
666   }
667 
AddDexFileOffset(uint64_t dex_file_offset)668   void AddDexFileOffset(uint64_t dex_file_offset) override {
669     if (type_ == DSO_ELF_FILE) {
670       // When simpleperf does unwinding while recording, it processes mmap records before reading
671       // dex file linked list (via JITDebugReader). To process mmap records, it creates Dso
672       // objects of type ELF_FILE. Then after reading dex file linked list, it realizes some
673       // ELF_FILE Dso objects should actually be DEX_FILE, because they have dex file offsets.
674       // So here converts ELF_FILE Dso into DEX_FILE Dso.
675       type_ = DSO_DEX_FILE;
676       dex_file_dso_.reset(new DexFileDso(path_));
677     }
678     dex_file_dso_->AddDexFileOffset(dex_file_offset);
679   }
680 
DexFileOffsets()681   const std::vector<uint64_t>* DexFileOffsets() override {
682     return dex_file_dso_ ? dex_file_dso_->DexFileOffsets() : nullptr;
683   }
684 
685  protected:
FindDebugFilePath() const686   std::string FindDebugFilePath() const override {
687     BuildId build_id = GetExpectedBuildId();
688     return debug_elf_file_finder_.FindDebugFile(path_, force_64bit_, build_id);
689   }
690 
LoadSymbolsImpl()691   std::vector<Symbol> LoadSymbolsImpl() override {
692     if (dex_file_dso_) {
693       return dex_file_dso_->LoadSymbolsImpl();
694     }
695     std::vector<Symbol> symbols;
696     BuildId build_id = GetExpectedBuildId();
697     auto symbol_callback = [&](const ElfFileSymbol& symbol) {
698       if (symbol.is_func || (symbol.is_label && symbol.is_in_text_section)) {
699         symbols.emplace_back(symbol.name, symbol.vaddr, symbol.len);
700       }
701     };
702     ElfStatus status;
703     auto elf = ElfFile::Open(GetDebugFilePath(), &build_id, &status);
704     if (elf) {
705       status = elf->ParseSymbols(symbol_callback);
706     }
707     android::base::LogSeverity log_level = android::base::WARNING;
708     if (!symbols_.empty() || !symbols.empty()) {
709       // We already have some symbols when recording.
710       log_level = android::base::DEBUG;
711     }
712     if ((status == ElfStatus::FILE_NOT_FOUND || status == ElfStatus::FILE_MALFORMED) &&
713         build_id.IsEmpty()) {
714       // This is likely to be a file wrongly thought of as an ELF file, due to stack unwinding.
715       log_level = android::base::DEBUG;
716     }
717     ReportReadElfSymbolResult(status, path_, GetDebugFilePath(), log_level);
718     SortAndFixSymbols(symbols);
719     return symbols;
720   }
721 
722  private:
723   static constexpr uint64_t uninitialized_value = std::numeric_limits<uint64_t>::max();
724 
725   bool force_64bit_;
726   uint64_t min_vaddr_ = uninitialized_value;
727   uint64_t file_offset_of_min_vaddr_ = uninitialized_value;
728   std::unique_ptr<DexFileDso> dex_file_dso_;
729 };
730 
731 class KernelDso : public Dso {
732  public:
KernelDso(const std::string & path)733   KernelDso(const std::string& path) : Dso(DSO_KERNEL, path) {}
734 
735   // IpToVaddrInFile() and LoadSymbols() must be consistent in fixing addresses changed by kernel
736   // address space layout randomization.
IpToVaddrInFile(uint64_t ip,uint64_t map_start,uint64_t)737   uint64_t IpToVaddrInFile(uint64_t ip, uint64_t map_start, uint64_t) override {
738     if (map_start != 0 && GetKernelStartAddr() != 0) {
739       // Fix kernel addresses changed by kernel address randomization.
740       fix_kernel_address_randomization_ = true;
741       return ip - map_start + GetKernelStartAddr();
742     }
743     return ip;
744   }
745 
IpToFileOffset(uint64_t ip,uint64_t map_start,uint64_t)746   std::optional<uint64_t> IpToFileOffset(uint64_t ip, uint64_t map_start, uint64_t) override {
747     if (map_start != 0 && GetKernelStartOffset() != 0) {
748       return ip - map_start + GetKernelStartOffset();
749     }
750     return std::nullopt;
751   }
752 
753  protected:
FindDebugFilePath() const754   std::string FindDebugFilePath() const override {
755     BuildId build_id = GetExpectedBuildId();
756     if (!vmlinux_.empty()) {
757       // Use vmlinux as the kernel debug file.
758       ElfStatus status;
759       if (ElfFile::Open(vmlinux_, &build_id, &status)) {
760         return vmlinux_;
761       }
762     }
763     return debug_elf_file_finder_.FindDebugFile(path_, false, build_id);
764   }
765 
LoadSymbolsImpl()766   std::vector<Symbol> LoadSymbolsImpl() override {
767     std::vector<Symbol> symbols;
768     ReadSymbolsFromDebugFile(&symbols);
769 
770     if (symbols.empty() && !kallsyms_.empty()) {
771       ReadSymbolsFromKallsyms(kallsyms_, &symbols);
772     }
773 #if defined(__linux__)
774     if (symbols.empty()) {
775       ReadSymbolsFromProc(&symbols);
776     }
777 #endif  // defined(__linux__)
778     SortAndFixSymbols(symbols);
779     if (!symbols.empty() && symbols.back().len == 0) {
780       symbols.back().len = std::numeric_limits<uint64_t>::max() - symbols.back().addr;
781     }
782     return symbols;
783   }
784 
785  private:
ReadSymbolsFromDebugFile(std::vector<Symbol> * symbols)786   void ReadSymbolsFromDebugFile(std::vector<Symbol>* symbols) {
787     ElfStatus status;
788     auto elf = ElfFile::Open(GetDebugFilePath(), &status);
789     if (!elf) {
790       return;
791     }
792 
793     if (!fix_kernel_address_randomization_) {
794       LOG(WARNING) << "Don't know how to fix addresses changed by kernel address randomization. So "
795                       "symbols in "
796                    << GetDebugFilePath() << " are not used";
797       return;
798     }
799     // symbols_ are kernel symbols got from /proc/kallsyms while recording. Those symbols are
800     // not fixed for kernel address randomization. So clear them to avoid mixing them with
801     // symbols in debug_file_path.
802     symbols_.clear();
803 
804     auto symbol_callback = [&](const ElfFileSymbol& symbol) {
805       if (symbol.is_func) {
806         symbols->emplace_back(symbol.name, symbol.vaddr, symbol.len);
807       }
808     };
809     status = elf->ParseSymbols(symbol_callback);
810     ReportReadElfSymbolResult(status, path_, GetDebugFilePath());
811   }
812 
ReadSymbolsFromKallsyms(std::string & kallsyms,std::vector<Symbol> * symbols)813   void ReadSymbolsFromKallsyms(std::string& kallsyms, std::vector<Symbol>* symbols) {
814     auto symbol_callback = [&](const KernelSymbol& symbol) {
815       if (strchr("TtWw", symbol.type) && symbol.addr != 0u) {
816         if (symbol.module == nullptr) {
817           symbols->emplace_back(symbol.name, symbol.addr, 0);
818         } else {
819           std::string name = std::string(symbol.name) + " [" + symbol.module + "]";
820           symbols->emplace_back(name, symbol.addr, 0);
821         }
822       }
823       return false;
824     };
825     ProcessKernelSymbols(kallsyms, symbol_callback);
826     if (symbols->empty()) {
827       LOG(WARNING) << "Symbol addresses in /proc/kallsyms on device are all zero. "
828                       "`echo 0 >/proc/sys/kernel/kptr_restrict` if possible.";
829     }
830   }
831 
832 #if defined(__linux__)
ReadSymbolsFromProc(std::vector<Symbol> * symbols)833   void ReadSymbolsFromProc(std::vector<Symbol>* symbols) {
834     BuildId build_id = GetExpectedBuildId();
835     if (!build_id.IsEmpty()) {
836       // Try /proc/kallsyms only when asked to do so, or when build id matches.
837       // Otherwise, it is likely to use /proc/kallsyms on host for perf.data recorded on device.
838       bool can_read_kallsyms = true;
839       if (!build_id.IsEmpty()) {
840         BuildId real_build_id;
841         if (!GetKernelBuildId(&real_build_id) || build_id != real_build_id) {
842           LOG(DEBUG) << "failed to read symbols from /proc/kallsyms: Build id mismatch";
843           can_read_kallsyms = false;
844         }
845       }
846       if (can_read_kallsyms) {
847         std::string kallsyms;
848         if (LoadKernelSymbols(&kallsyms)) {
849           ReadSymbolsFromKallsyms(kallsyms, symbols);
850         }
851       }
852     }
853   }
854 #endif  // defined(__linux__)
855 
GetKernelStartAddr()856   uint64_t GetKernelStartAddr() {
857     if (!kernel_start_addr_) {
858       ParseKernelStartAddr();
859     }
860     return kernel_start_addr_.value();
861   }
862 
GetKernelStartOffset()863   uint64_t GetKernelStartOffset() {
864     if (!kernel_start_file_offset_) {
865       ParseKernelStartAddr();
866     }
867     return kernel_start_file_offset_.value();
868   }
869 
ParseKernelStartAddr()870   void ParseKernelStartAddr() {
871     kernel_start_addr_ = 0;
872     kernel_start_file_offset_ = 0;
873     ElfStatus status;
874     if (auto elf = ElfFile::Open(GetDebugFilePath(), &status); elf) {
875       for (const auto& section : elf->GetSectionHeader()) {
876         if (section.name == ".text") {
877           kernel_start_addr_ = section.vaddr;
878           kernel_start_file_offset_ = section.file_offset;
879           break;
880         }
881       }
882     }
883   }
884 
885   bool fix_kernel_address_randomization_ = false;
886   std::optional<uint64_t> kernel_start_addr_;
887   std::optional<uint64_t> kernel_start_file_offset_;
888 };
889 
890 class KernelModuleDso : public Dso {
891  public:
KernelModuleDso(const std::string & path,uint64_t memory_start,uint64_t memory_end,Dso * kernel_dso)892   KernelModuleDso(const std::string& path, uint64_t memory_start, uint64_t memory_end,
893                   Dso* kernel_dso)
894       : Dso(DSO_KERNEL_MODULE, path),
895         memory_start_(memory_start),
896         memory_end_(memory_end),
897         kernel_dso_(kernel_dso) {}
898 
SetMinExecutableVaddr(uint64_t min_vaddr,uint64_t memory_offset)899   void SetMinExecutableVaddr(uint64_t min_vaddr, uint64_t memory_offset) override {
900     min_vaddr_ = min_vaddr;
901     memory_offset_of_min_vaddr_ = memory_offset;
902   }
903 
GetMinExecutableVaddr(uint64_t * min_vaddr,uint64_t * memory_offset)904   void GetMinExecutableVaddr(uint64_t* min_vaddr, uint64_t* memory_offset) override {
905     if (!min_vaddr_) {
906       CalculateMinVaddr();
907     }
908     *min_vaddr = min_vaddr_.value();
909     *memory_offset = memory_offset_of_min_vaddr_.value();
910   }
911 
IpToVaddrInFile(uint64_t ip,uint64_t map_start,uint64_t)912   uint64_t IpToVaddrInFile(uint64_t ip, uint64_t map_start, uint64_t) override {
913     uint64_t min_vaddr;
914     uint64_t memory_offset;
915     GetMinExecutableVaddr(&min_vaddr, &memory_offset);
916     return ip - map_start - memory_offset + min_vaddr;
917   }
918 
919  protected:
FindDebugFilePath() const920   std::string FindDebugFilePath() const override {
921     BuildId build_id = GetExpectedBuildId();
922     return debug_elf_file_finder_.FindDebugFile(path_, false, build_id);
923   }
924 
LoadSymbolsImpl()925   std::vector<Symbol> LoadSymbolsImpl() override {
926     std::vector<Symbol> symbols;
927     BuildId build_id = GetExpectedBuildId();
928     auto symbol_callback = [&](const ElfFileSymbol& symbol) {
929       // We only know how to map ip addrs to symbols in text section.
930       if (symbol.is_in_text_section && (symbol.is_label || symbol.is_func)) {
931         symbols.emplace_back(symbol.name, symbol.vaddr, symbol.len);
932       }
933     };
934     ElfStatus status;
935     auto elf = ElfFile::Open(GetDebugFilePath(), &build_id, &status);
936     if (elf) {
937       status = elf->ParseSymbols(symbol_callback);
938     }
939     // Don't warn when a kernel module is missing. As a backup, we read symbols from /proc/kallsyms.
940     ReportReadElfSymbolResult(status, path_, GetDebugFilePath(), android::base::DEBUG);
941     SortAndFixSymbols(symbols);
942     return symbols;
943   }
944 
945  private:
CalculateMinVaddr()946   void CalculateMinVaddr() {
947     min_vaddr_ = 0;
948     memory_offset_of_min_vaddr_ = 0;
949 
950     // min_vaddr and memory_offset are used to convert an ip addr of a kernel module to its
951     // vaddr_in_file, as shown in IpToVaddrInFile(). When the kernel loads a kernel module, it
952     // puts ALLOC sections (like .plt, .text.ftrace_trampoline, .text) in memory in order. The
953     // text section may not be at the start of the module memory. To do address conversion, we
954     // need to know its relative position in the module memory. There are two ways:
955     // 1. Read the kernel module file to calculate the relative position of .text section. It
956     // is relatively complex and depends on both PLT entries and the kernel version.
957     // 2. Find a module symbol in .text section, get its address in memory from /proc/kallsyms,
958     // and its vaddr_in_file from the kernel module file. Then other symbols in .text section can
959     // be mapped in the same way. Below we use the second method.
960 
961     if (!IsRegularFile(GetDebugFilePath())) {
962       return;
963     }
964 
965     // 1. Select a module symbol in /proc/kallsyms.
966     kernel_dso_->LoadSymbols();
967     const auto& kernel_symbols = kernel_dso_->GetSymbols();
968     auto it = std::lower_bound(kernel_symbols.begin(), kernel_symbols.end(), memory_start_,
969                                CompareSymbolToAddr);
970     const Symbol* kernel_symbol = nullptr;
971     while (it != kernel_symbols.end() && it->addr < memory_end_) {
972       if (strlen(it->Name()) > 0 && it->Name()[0] != '$') {
973         kernel_symbol = &*it;
974         break;
975       }
976       ++it;
977     }
978     if (kernel_symbol == nullptr) {
979       return;
980     }
981 
982     // 2. Find the symbol in .ko file.
983     std::string symbol_name = kernel_symbol->Name();
984     if (auto pos = symbol_name.rfind(' '); pos != std::string::npos) {
985       symbol_name.resize(pos);
986     }
987     LoadSymbols();
988     for (const auto& symbol : symbols_) {
989       if (symbol_name == symbol.Name()) {
990         min_vaddr_ = symbol.addr;
991         memory_offset_of_min_vaddr_ = kernel_symbol->addr - memory_start_;
992         return;
993       }
994     }
995   }
996 
997   uint64_t memory_start_;
998   uint64_t memory_end_;
999   Dso* kernel_dso_;
1000   std::optional<uint64_t> min_vaddr_;
1001   std::optional<uint64_t> memory_offset_of_min_vaddr_;
1002 };
1003 
1004 class SymbolMapFileDso : public Dso {
1005  public:
SymbolMapFileDso(const std::string & path)1006   SymbolMapFileDso(const std::string& path) : Dso(DSO_SYMBOL_MAP_FILE, path) {}
1007 
IpToVaddrInFile(uint64_t ip,uint64_t,uint64_t)1008   uint64_t IpToVaddrInFile(uint64_t ip, uint64_t, uint64_t) override { return ip; }
1009 
1010  protected:
LoadSymbolsImpl()1011   std::vector<Symbol> LoadSymbolsImpl() override { return {}; }
1012 };
1013 
1014 class UnknownDso : public Dso {
1015  public:
UnknownDso(const std::string & path)1016   UnknownDso(const std::string& path) : Dso(DSO_UNKNOWN_FILE, path) {}
1017 
IpToVaddrInFile(uint64_t ip,uint64_t,uint64_t)1018   uint64_t IpToVaddrInFile(uint64_t ip, uint64_t, uint64_t) override { return ip; }
1019 
1020  protected:
LoadSymbolsImpl()1021   std::vector<Symbol> LoadSymbolsImpl() override { return std::vector<Symbol>(); }
1022 };
1023 
CreateDso(DsoType dso_type,const std::string & dso_path,bool force_64bit)1024 std::unique_ptr<Dso> Dso::CreateDso(DsoType dso_type, const std::string& dso_path,
1025                                     bool force_64bit) {
1026   switch (dso_type) {
1027     case DSO_ELF_FILE:
1028       return std::unique_ptr<Dso>(new ElfDso(dso_path, force_64bit));
1029     case DSO_KERNEL:
1030       return std::unique_ptr<Dso>(new KernelDso(dso_path));
1031     case DSO_DEX_FILE:
1032       return std::unique_ptr<Dso>(new DexFileDso(dso_path));
1033     case DSO_SYMBOL_MAP_FILE:
1034       return std::unique_ptr<Dso>(new SymbolMapFileDso(dso_path));
1035     case DSO_UNKNOWN_FILE:
1036       return std::unique_ptr<Dso>(new UnknownDso(dso_path));
1037     default:
1038       LOG(ERROR) << "Unexpected dso_type " << static_cast<int>(dso_type);
1039       return nullptr;
1040   }
1041 }
1042 
CreateDsoWithBuildId(DsoType dso_type,const std::string & dso_path,BuildId & build_id)1043 std::unique_ptr<Dso> Dso::CreateDsoWithBuildId(DsoType dso_type, const std::string& dso_path,
1044                                                BuildId& build_id) {
1045   std::unique_ptr<Dso> dso;
1046   switch (dso_type) {
1047     case DSO_ELF_FILE:
1048       dso.reset(new ElfDso(dso_path, false));
1049       break;
1050     case DSO_KERNEL:
1051       dso.reset(new KernelDso(dso_path));
1052       break;
1053     case DSO_KERNEL_MODULE:
1054       dso.reset(new KernelModuleDso(dso_path, 0, 0, nullptr));
1055       break;
1056     default:
1057       LOG(ERROR) << "Unexpected dso_type " << static_cast<int>(dso_type);
1058       return nullptr;
1059   }
1060   dso->debug_file_path_ = debug_elf_file_finder_.FindDebugFile(dso_path, false, build_id);
1061   return dso;
1062 }
1063 
CreateKernelModuleDso(const std::string & dso_path,uint64_t memory_start,uint64_t memory_end,Dso * kernel_dso)1064 std::unique_ptr<Dso> Dso::CreateKernelModuleDso(const std::string& dso_path, uint64_t memory_start,
1065                                                 uint64_t memory_end, Dso* kernel_dso) {
1066   return std::unique_ptr<Dso>(new KernelModuleDso(dso_path, memory_start, memory_end, kernel_dso));
1067 }
1068 
DsoTypeToString(DsoType dso_type)1069 const char* DsoTypeToString(DsoType dso_type) {
1070   switch (dso_type) {
1071     case DSO_KERNEL:
1072       return "dso_kernel";
1073     case DSO_KERNEL_MODULE:
1074       return "dso_kernel_module";
1075     case DSO_ELF_FILE:
1076       return "dso_elf_file";
1077     case DSO_DEX_FILE:
1078       return "dso_dex_file";
1079     case DSO_SYMBOL_MAP_FILE:
1080       return "dso_symbol_map_file";
1081     default:
1082       return "unknown";
1083   }
1084 }
1085 
GetBuildIdFromDsoPath(const std::string & dso_path,BuildId * build_id)1086 bool GetBuildIdFromDsoPath(const std::string& dso_path, BuildId* build_id) {
1087   ElfStatus status;
1088   auto elf = ElfFile::Open(dso_path, &status);
1089   if (status == ElfStatus::NO_ERROR && elf->GetBuildId(build_id) == ElfStatus::NO_ERROR) {
1090     return true;
1091   }
1092   return false;
1093 }
1094 
GetBuildId(const Dso & dso,BuildId & build_id)1095 bool GetBuildId(const Dso& dso, BuildId& build_id) {
1096   if (dso.type() == DSO_KERNEL) {
1097     if (GetKernelBuildId(&build_id)) {
1098       return true;
1099     }
1100   } else if (dso.type() == DSO_KERNEL_MODULE) {
1101     bool has_build_id = false;
1102     if (android::base::EndsWith(dso.Path(), ".ko")) {
1103       return GetBuildIdFromDsoPath(dso.Path(), &build_id);
1104     }
1105     if (const std::string& path = dso.Path();
1106         path.size() > 2 && path[0] == '[' && path.back() == ']') {
1107       // For kernel modules that we can't find the corresponding file, read build id from /sysfs.
1108       return GetModuleBuildId(path.substr(1, path.size() - 2), &build_id);
1109     }
1110   } else if (dso.type() == DSO_ELF_FILE) {
1111     if (dso.Path() == DEFAULT_EXECNAME_FOR_THREAD_MMAP || dso.IsForJavaMethod()) {
1112       return false;
1113     }
1114     if (GetBuildIdFromDsoPath(dso.Path(), &build_id)) {
1115       return true;
1116     }
1117   }
1118   return false;
1119 }
1120 
1121 }  // namespace simpleperf
1122