Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752901AbbHFEb7 (ORCPT ); Thu, 6 Aug 2015 00:31:59 -0400 Received: from szxga03-in.huawei.com ([119.145.14.66]:4038 "EHLO szxga03-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750793AbbHFEb6 (ORCPT ); Thu, 6 Aug 2015 00:31:58 -0400 Message-ID: <55C2E31E.7060407@huawei.com> Date: Thu, 6 Aug 2015 12:31:26 +0800 From: "Wangnan (F)" User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0 MIME-Version: 1.0 To: Alexei Starovoitov , He Kuang CC: Alexei Starovoitov , pi3orama , , "linux-kernel@vger.kernel.org" Subject: Re: [llvm-dev] [LLVMdev] Cc llvmdev: Re: llvm bpf debug info. Re: [RFC PATCH v4 3/3] bpf: Introduce function for outputing data to perf event References: <55A88449.3030008@plumgrid.com> <55B0D5FC.6050406@huawei.com> <55B1535E.8090406@plumgrid.com> <55B1AEE9.1080207@plumgrid.com> <55B1BC03.9020708@huawei.com> <55B35F42.70803@huawei.com> <55B6E685.30905@plumgrid.com> <55B89F04.5030304@huawei.com> <55B909B2.2080606@plumgrid.com> <55C1D055.2050205@huawei.com> <20150806034125.GB52057@Alexeis-MBP.westell.com> In-Reply-To: <20150806034125.GB52057@Alexeis-MBP.westell.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.111.66.109] X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020203.55C2E334.007E,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0, ip=0.0.0.0, so=2013-05-26 15:14:31, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: 060b5ec085d8f3a31903626168e75762 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2888 Lines: 70 On 2015/8/6 11:41, Alexei Starovoitov wrote: > On Wed, Aug 05, 2015 at 04:59:01PM +0800, He Kuang wrote: >> Hi, Alexei >> >> On 2015/7/30 1:13, Alexei Starovoitov wrote: >>> On 7/29/15 2:38 AM, He Kuang wrote: >>>> Hi, Alexei >>>> >>>> On 2015/7/28 10:18, Alexei Starovoitov wrote: >>>>> On 7/25/15 3:04 AM, He Kuang wrote: >>>>>> I noticed that for 64-bit elf format, the reloc sections have >>>>>> 'Addend' in the entry, but there's no 'Addend' info in bpf elf >>>>>> file(64bit). I think there must be something wrong in the process >>>>>> of .s -> .o, which related to 64bit/32bit. Anyway, we can parse out the >>>>>> AT_name now, DW_AT_LOCATION still missed and need your help. >> Another thing about DW_AT_name, we've already found that the name >> string is stored indirectly and needs relocation which is >> architecture specific, while the e_machine info in bpf obj file >> is "unknown", both objdump and libdw cannot parse DW_AT_name >> correctly. >> >> Should we just use a known architeture for bpf object file >> instead of "unknown"? If so, we can use the existing relocation >> codes in libdw and get DIE name by simply invoking >> dwarf_diename(). The drawback of this method is that, e.g. we >> use "x86-64" instead, is hard to distinguish bpf obj file with >> x86-64 elf file. Do you think this is ok? > The only clean way would be to register bpf as an architecture > with elf standards committee. I have no idea who is doing that and > how much such new e_machine registration may cost. > So far using EM_NONE is a hack to avoid bureaucracy. > Are dwarf relocation processor specific? > Then simple hack to elfutils/libdw to treat EM_NONE as X64 > should do the trick, right? > If that indeed works, we can tweak bpf backend to use EM_X86_64, > but then the danger that such .o file will be wrongly > recognized by elf utils. imo it's safer to keep it as EM_NONE > until real number is assigned, but even after it's assigned it > will take time to propagate that value. So for now I would try > to find a solution keeping EM_NONE hack. > What about hacking ELF binary in memory? 1. load the object into memory; 2. twist the machine code to EM_X86_64; 3. load it using elf_begin; 4. return the twested elf memory image using libdwfl's find_elf callback. Then libdw will recognise BPF's object file as a X86_64 object file. If required, relocation sections can also be twisted in this way. Should not very hard since we can only consider one relocation type. Then let's start thinking how to introduce EM_BPF. We can rely on the hacking until EM_BPF symbol reaches elfutils in perf. What do you think? Thank you. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/