perf tools: Decompress kernel module when reading DSO data
authorNamhyung Kim <namhyung@kernel.org>
Thu, 8 Jun 2017 07:31:05 +0000 (16:31 +0900)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 13 Apr 2018 17:48:25 +0000 (19:48 +0200)
[ Upstream commit 1d6b3c9ba756a5134fd7ad1959acac776d17404b ]

Currently perf decompresses kernel modules when loading the symbol table
but it missed to do it when reading raw data.

Signed-off-by: Namhyung Kim <namhyung@kernel.org>
Acked-by: Jiri Olsa <jolsa@kernel.org>
Cc: Adrian Hunter <adrian.hunter@intel.com>
Cc: David Ahern <dsahern@gmail.com>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
Cc: Wang Nan <wangnan0@huawei.com>
Cc: kernel-team@lge.com
Link: http://lkml.kernel.org/r/20170608073109.30699-6-namhyung@kernel.org
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: Sasha Levin <alexander.levin@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
tools/perf/util/dso.c

index d2c6cdd9d42b72a194d913bdc1840d5ff72bb281..4bc58822416cf9c204f435bab52a0df6889a76b1 100644 (file)
@@ -366,7 +366,23 @@ static int __open_dso(struct dso *dso, struct machine *machine)
        if (!is_regular_file(name))
                return -EINVAL;
 
+       if (dso__needs_decompress(dso)) {
+               char newpath[KMOD_DECOMP_LEN];
+               size_t len = sizeof(newpath);
+
+               if (dso__decompress_kmodule_path(dso, name, newpath, len) < 0) {
+                       free(name);
+                       return -dso->load_errno;
+               }
+
+               strcpy(name, newpath);
+       }
+
        fd = do_open(name);
+
+       if (dso__needs_decompress(dso))
+               unlink(name);
+
        free(name);
        return fd;
 }