Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1617284pxb; Wed, 9 Feb 2022 00:12:25 -0800 (PST) X-Google-Smtp-Source: ABdhPJwcP6Y5CwjPEGzKrGbcJ3umzrpOgSXA+EP8kr9G+qHcGFAtPCBhFAKtJSTQ1F2Gt0zAvK8i X-Received: by 2002:a17:903:404a:: with SMTP id n10mr987798pla.132.1644394345396; Wed, 09 Feb 2022 00:12:25 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1644394345; cv=pass; d=google.com; s=arc-20160816; b=tlHYBKkyHWvqI3EPwvwjziLA99R/SQD1rUJu8Tgo4fGSxIQFF1tGCWCSVPaMwE4Ipf Ef+cmQYXx+oi+GBsXusQnLU29BD620vTXM/47vd/ri3HaVJZn7yNu7Gy+4upvUgBSOgF TBZ8Kw1e+1XuPLtBC1TnfscfjV9OqDLbKvdsy6sa3ew3aFUj+t+HVPlCpx1su4jbK2A1 CLZORDRPK5hHAO6DtXGG+0BJtvkhWSc8Cbklyt5r/lymaHBt3y1bP5qokO39p05fzh1Z B9waGoxTHpVPcRwIu9G7si2ZJ4ynZBHrtaIiHHVpQxiVbYOVcWC1ck7dv19DJu1IrVdu XJsA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-signature; bh=CirLBKQAk+kqw/rFQuK3wh8l0X95JKJGfm1ou7/quDY=; b=AgR6twHfriVOFUNvDUpzEsjIvpmNCHcNSA1sz/Qchmsde3HjXt/XK0W7MqNQBZ0GGZ jhpaT+9ur4HxS/uT7a5EMDyKdNEoBKkGmzGCdHd1u4HJGlRsZ+Bp9m9Q8+IciNZm6bkS HUf2hk0Xo93snjMMd9ibIlFFSZhqdoOpUl+ZfgLzYbAmpC1/ZWPrmwhJJZpzKjoiniPy F7IAs6X2VTgRED+aaKpW4gEubFQRrlJBJ/rsYy0UsxQ9ArI65e2lIgQp11yUNZAa2LqA KVDLipOjGXDwQjlK4Zr9oyNqVaT7zevVWPtVymZBKDFvUX6O6YjaekiW/rrjD8nkKKfX vZCQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2021-07-09 header.b="qCPTtc/G"; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=pQ9xIFTk; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v6si4261185pjn.166.2022.02.09.00.12.11; Wed, 09 Feb 2022 00:12:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2021-07-09 header.b="qCPTtc/G"; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=pQ9xIFTk; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1385273AbiBHSpQ (ORCPT + 99 others); Tue, 8 Feb 2022 13:45:16 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40242 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1385359AbiBHSpB (ORCPT ); Tue, 8 Feb 2022 13:45:01 -0500 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 73E61C03FEEF; Tue, 8 Feb 2022 10:44:53 -0800 (PST) Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 218Gc5su007554; Tue, 8 Feb 2022 18:44:23 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : content-transfer-encoding : content-type : mime-version; s=corp-2021-07-09; bh=CirLBKQAk+kqw/rFQuK3wh8l0X95JKJGfm1ou7/quDY=; b=qCPTtc/GjLah0fGNzPV1zbDX6X71em6bnpb8vjETJpWtFXIRLbVb6npcR7iReLXkgN1H o4KSolmrjyz+nRx0npYhmW1f7cikzKGPn/nI/qk0VfMXjqVB9q/1K/TMDJw1qC+oq2Zd o1tj9pPI5chO+I+nwGFrZxQT77clLVP2Vv9slkTpPT7qZwKRzyINDEJxy2/UE0e4+ng/ H9PARHapOvBGtzRjLyEJN8L/SlIxHXVrDFwUOP3/fNNBdUOeTxluI1nT/msREZ11UG7I e91gECNG3R2ueQyENs3jyTBDP/NdUGsGJkeNbLvIt7yGs/02bRyhyRKqOi/XLW7DEaAe 6w== Received: from aserp3020.oracle.com (aserp3020.oracle.com [141.146.126.70]) by mx0b-00069f02.pphosted.com with ESMTP id 3e368tunk2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 08 Feb 2022 18:44:22 +0000 Received: from pps.filterd (aserp3020.oracle.com [127.0.0.1]) by aserp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 218IZYnX159440; Tue, 8 Feb 2022 18:44:18 GMT Received: from nam02-dm3-obe.outbound.protection.outlook.com (mail-dm3nam07lp2043.outbound.protection.outlook.com [104.47.56.43]) by aserp3020.oracle.com with ESMTP id 3e1h26thwd-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 08 Feb 2022 18:44:17 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L04uH9tKSIW9X0p6og1gegugxYfQmjXgtrT5CZdQ+I08odM4tH3CucjNHp2XXeNVt1uMib/jwRQgfF11YzsIEF8vp4GGZ4P7CGSq/NWUOm9sUJqQznqQZpGJKLDd87dfJQsqrekNMlFVT2SkbvaF5XypOvTaYtpZhWg2maQ3/LCuX8oHtox6Grbrzg3MFs/4Pm/yp/usWTH2Wh4qsvslZzM5vwRt8Bov/bVz4DKvysphs+oGadR5YH+4F60B55X8pNjhljROTAyOlXDn2pFtHPIB+ghqhfnJhr+lvFli9Cla9sntZ55dc7Wtr7ITXdWkNUdsgxMwRSGns49GMkHORw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=CirLBKQAk+kqw/rFQuK3wh8l0X95JKJGfm1ou7/quDY=; b=mxghW6EWJ0MkGuHP87Fb8dY3iuYYQugsc5D0BD7CEVWAny0LoM9qlkikNpZLEL9Bz8H0KoyNAdtLGThVMdgKMYIkkaiWN0ka50QQcyQyIkGQjGBnZHcwOSsxu5aQYipn9rpsmokWMT9gAlpLE9HYZGyO4fFrgZaMXP472I30GI1N2ZXUVH+9Cg4FzTQdDY8PMYnt344wXKaIPvDzyUVo59iyyVzZHHeN2lIVcaF36E3jWuuvXCCaFOHk/dIXkbJFl2teDcYHlkKB/xEB+vbvsUsFGcLGdKXoHIftyZDKnZCW8SqzOE1268NmwToOlBErZylOljAQGr+04WcW3db2hg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CirLBKQAk+kqw/rFQuK3wh8l0X95JKJGfm1ou7/quDY=; b=pQ9xIFTkVdvnOh+FdUXJ3y+0xu7EUxFTxZHHJot7kqgYCoBB/C5hCxmT2ZZ6wojhvm+cadSFIHy6YAtktiZmIATacRpuHkXLHv1rksRfvWl/o0QeXhDesoIuCr9Mc+8RfQnLEBE3qIfrt3wIMMf8yfMDVxfnrl7EqewjvDTXb6c= Received: from SA2PR10MB4715.namprd10.prod.outlook.com (2603:10b6:806:fb::10) by SA1PR10MB5781.namprd10.prod.outlook.com (2603:10b6:806:23e::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4930.19; Tue, 8 Feb 2022 18:44:16 +0000 Received: from SA2PR10MB4715.namprd10.prod.outlook.com ([fe80::644e:5828:a72c:c1de]) by SA2PR10MB4715.namprd10.prod.outlook.com ([fe80::644e:5828:a72c:c1de%3]) with mapi id 15.20.4951.019; Tue, 8 Feb 2022 18:44:15 +0000 From: Nick Alcock To: mcgrof@kernel.org, masahiroy@kernel.org Cc: jolsa@kernel.org, rostedt@goodmis.org, bas@baslab.org, tglozar@gmail.com, Ast-x64@protonmail.com, viktor.malik@gmail.com, dxu@dxuuu.xyz, acme@kernel.org, adrian.hunter@intel.com, ak@linux.intel.com, irogers@google.com, linux-kbuild@vger.kernel.org, linux-modules@vger.kernel.org, linux-kernel@vger.kernel.org, arnd@arndb.de, akpm@linux-foundation.org, eugene.loh@oracle.com, kris.van.hees@oracle.com Subject: [PATCH v8 4/6] kallsyms: introduce sections needed to map symbols to built-in modules Date: Tue, 8 Feb 2022 18:43:07 +0000 Message-Id: <20220208184309.148192-5-nick.alcock@oracle.com> X-Mailer: git-send-email 2.35.0.260.gb82b153193.dirty In-Reply-To: <20220208184309.148192-1-nick.alcock@oracle.com> References: <20220208184309.148192-1-nick.alcock@oracle.com> Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: LO2P123CA0088.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:138::21) To SA2PR10MB4715.namprd10.prod.outlook.com (2603:10b6:806:fb::10) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: ea166568-82bb-46ac-9044-08d9eb3301e5 X-MS-TrafficTypeDiagnostic: SA1PR10MB5781:EE_ X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:1923; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: EDX7zK//pOpXjKar0clQG4ALKk93B3GkiXUYGz2VWqtABv7JJ2fZK2llai724cJmgXoxEvS8maMkKZNzNB+5QzUS4FqxPbOpyxBt8TiipLUhQlWP3Fg0uLKR7VSBoyEve8xoF9YmElBK+Xk5g6Rab7E82MpNrEh38OQ+EZD5tGq3eApyDNupUB0n7DFk0Ztvku1EVsyxkbjfjpZY/b88RA+KkLhawi7+Ca8Spae2njKM4rICQx5u9wYylmJfpllTMatvj79+ZYd/Fik+a86utwFUS6hwqhxOq0kydKTJDstasQIyyb8Y0LlQiEkP5WErc9bWkgcyJ93agU+WmF9tD125K0TCW1FSYvBSlHIQL06NPj+EsLK8JGPpNceVDifepgxBwWIq3TWjQGq1hSSacFlvedIWpu6K4FE+bdmNE3E/FkeWUcsfMKrKpYmyvkcMRqwMxofmIxPn9lqUi44LHOZptZayenaqnsmiTpAOdvMBWiqdVyxJ1sh1sMBn5QZSj1rJPdmeQoRgaGC0lnBjun384Iltb1aey85Lq6058W5/fl9wJInRrqMFc9ceCksKGkxI1nf5UWyVSX4uOo2lua5A7nvA94CS40NaDUrq/3YrfSxE7CzdxXNgoqwvr2BM7dKubbCqcb5D21dMkkV3Yg== X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA2PR10MB4715.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(107886003)(86362001)(6486002)(36756003)(52116002)(5660300002)(6512007)(30864003)(1076003)(508600001)(6506007)(7416002)(186003)(6666004)(8676002)(44832011)(66556008)(316002)(2906002)(8936002)(66476007)(4326008)(2616005)(38100700002)(66946007);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?ootrgJI0Ou9l8EbbkalnpvwBMiL7OFTHBUERh2wQc1jWVMjKqRxBWtI+B9KE?= =?us-ascii?Q?zXGVw/BKE+youJ3DDHETVspGmRd70YKjlX9JJ3IFIczuo++HjJ/3z1wTCIZr?= =?us-ascii?Q?kwDcwLlVdQpjZSltKH9a/WZxJHlWWEhgUIdTX1j1SOzEazgRw9hQsQUQcNBi?= =?us-ascii?Q?lk7HCueocrjKymhj7BONYMDzDmYndfcPixVKTBgrLwwkQj10qsszsTjCYNv3?= =?us-ascii?Q?u1b0EcyTfZeeaXEw7eb8mPHF+VLuXwK3jcJ1M/ZIs4JFAaHbZIG5bMkgPp9V?= =?us-ascii?Q?ryVOQYak+NngEX95nKr2VuYE5xgJuevh8rzo4jhLXBTNlbsyPhdN/E5kmesu?= =?us-ascii?Q?lLXwAtLcVNUmBO3nG7vHZq7ogOhOUtFb+eUO5w2+W4CEAw+mrP5BTpSrRRtM?= =?us-ascii?Q?UlziP4f72M1oN/AvRzVc7hpyXtHNxCOCrhNgHi+FA/34ZvgD37c6hkzXIk0Q?= =?us-ascii?Q?KoAA6PVEsOCqCBSHuE5KiBaM8AOe1LKg8gqJ2k0CZW0gU95oiq9jNuQoR5Lm?= =?us-ascii?Q?m4mNM3+Mt65OZ43xoWUUYtPba54pxa/du1qiCGb83o1KVdXPn4hSEJfOwElo?= =?us-ascii?Q?wmaXHHf5I10uMZLMh0330WA5HdxmZ77ASEilnM1wrcJT7KKeGzFSyz1EnmSK?= =?us-ascii?Q?KlNneCXfSKKYfcILsZVRb0DQJGZE8VVNaMw4lZgqw07/GTlItAhnlmKF/twk?= =?us-ascii?Q?VmfCKvJECLytBqr7Pityqa8q9P/pnntjpQMVdSIfzNgHUJboHyNO7ah+UScp?= =?us-ascii?Q?WCRLFwHf3Tml0OyrubEYCtpcdlbeZKZaBO7rJcn8ppwBMNZkwoCtX5ib4rUj?= =?us-ascii?Q?yANNpj+Ltl1WJjnr1F/2tOxW0RyoiHoIba33XsLkgWC1Po3RxI7AGnOy6Kk9?= =?us-ascii?Q?36pxeXzKh5lkAV14eNvulhw94wvtWu/K1/lJEvjXqEzBMNs4J5wKto8l3HVg?= =?us-ascii?Q?qytBtwr623ORdDrnd2qv34aHAqG9DzMibFJ92OhnZPZBfYw8VYsRyMITc6M+?= =?us-ascii?Q?MK0O2lA7u2soFSyPDWBrSlFQgHkSMmpIC/570NYzUeLTF8ehEyUR06zT02Fl?= =?us-ascii?Q?OkNLz6S163mxuZAtzlJ/bvZGtKvXPqn1ivBTgGqSCGsOxnKOoAn9zLL6Zs2U?= =?us-ascii?Q?0owhzgFyCZYZ8E1DL7RmfoZjWYNJQjdrFe6kAuemm6aBzfw9lBL1LXEnGRd+?= =?us-ascii?Q?tHcmlRuHBERo9Eh6l4PaWI/3oAdIlFHn5+aSSVCq5Or0n/fkzsuqbZWw6QTv?= =?us-ascii?Q?jfVd7h6UID6DrcCfDdnezP/OMWbA0gpMaw9K/w2VNaGCnITAhYRyIHrZ2PPU?= =?us-ascii?Q?prKKnTuWfoLPGyggZLOM54brrBZFHRPQ2WIZjJbVzouQ7ibyEKJIvde7YL4p?= =?us-ascii?Q?KuBzLbxDxouJvWbOV9wO3Dr/zw/meooDBqA6YBJxahD9XIyxVqWDuvn1ABMu?= =?us-ascii?Q?eBIKkVsJCmtMnGBkVW5qkPw38Z3/Hrla7jcr4EYt1mmwY8rr/MZMSpW4Iurn?= =?us-ascii?Q?F15rKzlaPR363eqvCXJ/YDL2GOw6/iYiYlkOSCvU+hnkUI9sDsfLvLvnB3S5?= =?us-ascii?Q?stXU2MLO3M2n8nu5yrFnSeGHmE556MRdvYznQuBBe+qsp+xtmyqJw9YQfidY?= =?us-ascii?Q?bURmgSw2Mg1pH9OgAPC4kYt5MzNOODhl8n/l9RE+m0FN?= X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: ea166568-82bb-46ac-9044-08d9eb3301e5 X-MS-Exchange-CrossTenant-AuthSource: SA2PR10MB4715.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Feb 2022 18:44:15.8955 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: udsjD8THGRaiXlSVo7i05gjNdmnhqjSQecgU3dE2Gk/kdMegzEqeftiJ0Fjc0AIRx1YISR2yZKyM19FHwYlkXA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR10MB5781 X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10252 signatures=673431 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 mlxscore=0 bulkscore=0 phishscore=0 malwarescore=0 mlxlogscore=999 adultscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000 definitions=main-2202080109 X-Proofpoint-ORIG-GUID: 5tGzvZ0u-74UbeNCZC4idTwX_QkD7yLj X-Proofpoint-GUID: 5tGzvZ0u-74UbeNCZC4idTwX_QkD7yLj X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The mapping consists of three new symbols, computed by integrating the information in the (just-added) .tmp_vmlinux.ranges and modules_thick.builtin: taken together, they map address ranges (corresponding to object files on the input) to the names of zero or more modules containing those address ranges. - kallsyms_module_addresses/kallsyms_module_offsets encodes the address/offset of each object file (derived from the linker map), in exactly the same way as kallsyms_addresses/kallsyms_offsets does for symbols. There is no size: instead, the object files are assumed to tile the address space. (This is slightly more space-efficient than using a size). Non-text-section addresses are skipped: for now, all the users of this interface only need module/non-module information for instruction pointer addresses, not absolute-addressed symbols and the like. This restriction can easily be lifted in future. (Regarding the name: right now the entries correspond pretty closely to object files, so we could call the section kallsyms_objfiles or something, but the optimizer added in the next commit will change this.) - kallsyms_module_names encodes the name of each module in a modified form of strtab: notably, if an object file appears in *multiple* modules, all of which are built in, this is encoded via a zero byte, a one-byte module count, then a series of that many null-terminated strings. As a special case, the table starts with a single zero byte which does *not* represent the start of a multi-module list. - kallsyms_modules connects the two, encoding a table associated 1:1 with kallsyms_module_addresses / kallsyms_module_offsets, pointing at an offset in kallsyms_module_names describing which module (or modules, for a multi-module list) the code occupying this address range is part of. If an address range is part of no module (always built-in) it points at 0 (the null byte at the start of the kallsyms_module_names list). There is no optimization yet: kallsyms_modules and kallsyms_module_names will almost certainly contain many duplicate entries, and kallsyms_module_{addresses,offsets} may contain consecutive entries that point to the same place. The size hit is fairly substantial as a result, though still much less than a naive implementation mapping each symbol to a module name would be: 50KiB or so. Signed-off-by: Nick Alcock Reviewed-by: Kris Van Hees --- Makefile | 2 +- init/Kconfig | 8 + scripts/Makefile | 6 + scripts/kallsyms.c | 366 +++++++++++++++++++++++++++++++++++++++++++-- 4 files changed, 371 insertions(+), 11 deletions(-) diff --git a/Makefile b/Makefile index 5e823fe8390f..b719244cb571 100644 --- a/Makefile +++ b/Makefile @@ -1151,7 +1151,7 @@ cmd_link-vmlinux = \ $(CONFIG_SHELL) $< "$(LD)" "$(KBUILD_LDFLAGS)" "$(LDFLAGS_vmlinux)"; \ $(if $(ARCH_POSTLINK), $(MAKE) -f $(ARCH_POSTLINK) $@, true) -vmlinux: scripts/link-vmlinux.sh autoksyms_recursive $(vmlinux-deps) FORCE +vmlinux: scripts/link-vmlinux.sh autoksyms_recursive $(vmlinux-deps) modules_thick.builtin FORCE +$(call if_changed_dep,link-vmlinux) targets := vmlinux diff --git a/init/Kconfig b/init/Kconfig index e9119bf54b1f..e1ca3d70cb1c 100644 --- a/init/Kconfig +++ b/init/Kconfig @@ -1530,6 +1530,14 @@ config POSIX_TIMERS If unsure say y. +config KALLMODSYMS + default y + bool "Enable support for /proc/kallmodsyms" if EXPERT + depends on KALLSYMS + help + This option enables the /proc/kallmodsyms file, which maps symbols + to addresses and their associated modules. + config PRINTK default y bool "Enable support for printk" if EXPERT diff --git a/scripts/Makefile b/scripts/Makefile index ce5aa9030b74..c5cc4ac3d660 100644 --- a/scripts/Makefile +++ b/scripts/Makefile @@ -29,6 +29,12 @@ ifdef CONFIG_BUILDTIME_MCOUNT_SORT HOSTCFLAGS_sorttable.o += -DMCOUNT_SORT_ENABLED endif +kallsyms-objs := kallsyms.o + +ifdef CONFIG_KALLMODSYMS +kallsyms-objs += modules_thick.o +endif + # The following programs are only built on demand hostprogs += unifdef diff --git a/scripts/kallsyms.c b/scripts/kallsyms.c index 54ad86d13784..8f87b724d0fa 100644 --- a/scripts/kallsyms.c +++ b/scripts/kallsyms.c @@ -5,7 +5,10 @@ * This software may be used and distributed according to the terms * of the GNU General Public License, incorporated herein by reference. * - * Usage: nm -n vmlinux | scripts/kallsyms [--all-symbols] > symbols.S + * Usage: nm -n vmlinux + * | scripts/kallsyms [--all-symbols] [--absolute-percpu] + * [--base-relative] [--builtin=modules_thick.builtin] + * > symbols.S * * Table compression uses all the unused char codes on the symbols and * maps these to the most used substrings (tokens). For instance, it might @@ -24,6 +27,10 @@ #include #include #include +#include +#include "modules_thick.h" + +#include "../include/generated/autoconf.h" #define ARRAY_SIZE(arr) (sizeof(arr) / sizeof(arr[0])) @@ -67,11 +74,116 @@ static int token_profit[0x10000]; static unsigned char best_table[256][2]; static unsigned char best_table_len[256]; +#ifdef CONFIG_KALLMODSYMS +static unsigned int strhash(const char *s) +{ + /* fnv32 hash */ + unsigned int hash = 2166136261U; + + for (; *s; s++) + hash = (hash ^ *s) * 0x01000193; + return hash; +} + +#define OBJ2MOD_BITS 10 +#define OBJ2MOD_N (1 << OBJ2MOD_BITS) +#define OBJ2MOD_MASK (OBJ2MOD_N - 1) +struct obj2mod_elem { + char *obj; + char *mods; /* sorted module name strtab */ + size_t nmods; /* number of modules in "mods" */ + size_t mods_size; /* size of all mods together */ + int mod_offset; /* offset in .kallsyms_module_names */ + struct obj2mod_elem *obj2mod_next; +}; + +/* + * Map from object files to obj2mod entries (a unique mapping). + */ + +static struct obj2mod_elem *obj2mod[OBJ2MOD_N]; +static size_t num_objfiles; + +/* + * An ordered list of address ranges and the objfile that occupies that range. + */ +struct addrmap_entry { + unsigned long long addr; + struct obj2mod_elem *objfile; +}; +static struct addrmap_entry *addrmap; +static int addrmap_num, addrmap_alloced; + +static void obj2mod_init(void) +{ + memset(obj2mod, 0, sizeof(obj2mod)); +} + +static struct obj2mod_elem *obj2mod_get(const char *obj) +{ + int i = strhash(obj) & OBJ2MOD_MASK; + struct obj2mod_elem *elem; + + for (elem = obj2mod[i]; elem; elem = elem->obj2mod_next) { + if (strcmp(elem->obj, obj) == 0) + return elem; + } + return NULL; +} + +/* + * Note that a given object file is found in some module, interning it in the + * obj2mod hash. Should not be called more than once for any given (module, + * object) pair. + */ +static void obj2mod_add(char *obj, char *mod) +{ + int i = strhash(obj) & OBJ2MOD_MASK; + struct obj2mod_elem *elem; + + elem = obj2mod_get(obj); + if (!elem) { + elem = malloc(sizeof(struct obj2mod_elem)); + if (!elem) + goto oom; + memset(elem, 0, sizeof(struct obj2mod_elem)); + elem->obj = strdup(obj); + if (!elem->obj) + goto oom; + elem->mods = strdup(mod); + if (!elem->mods) + goto oom; + + elem->obj2mod_next = obj2mod[i]; + obj2mod[i] = elem; + num_objfiles++; + } else { + elem->mods = realloc(elem->mods, elem->mods_size + + strlen(mod) + 1); + if (!elem->mods) + goto oom; + strcpy(elem->mods + elem->mods_size, mod); + } + + elem->mods_size += strlen(mod) + 1; + elem->nmods++; + if (elem->nmods > 255) { + fprintf(stderr, "kallsyms: %s: too many modules associated with this object file\n", + obj); + exit(EXIT_FAILURE); + } + return; +oom: + fprintf(stderr, "kallsyms: out of memory\n"); + exit(1); +} +#endif /* CONFIG_KALLMODSYMS */ static void usage(void) { - fprintf(stderr, "Usage: kallsyms [--all-symbols] " - "[--base-relative] < in.map > out.S\n"); + fprintf(stderr, "Usage: kallsyms [--all-symbols] [--absolute-percpu] " + "[--base-relative] [--builtin=modules_thick.builtin] " + "< nm_vmlinux.out > symbols.S\n"); exit(1); } @@ -95,10 +207,16 @@ static bool is_ignored_symbol(const char *name, char type) "kallsyms_offsets", "kallsyms_relative_base", "kallsyms_num_syms", + "kallsyms_num_modules", "kallsyms_names", "kallsyms_markers", "kallsyms_token_table", "kallsyms_token_index", + "kallsyms_module_offsets", + "kallsyms_module_addresses", + "kallsyms_modules", + "kallsyms_module_names", + "kallsyms_module_names_len", /* Exclude linker generated symbols which vary between passes */ "_SDA_BASE_", /* ppc */ "_SDA2_BASE_", /* ppc */ @@ -246,8 +364,8 @@ static struct sym_entry *read_symbol(FILE *in) return sym; } -static int symbol_in_range(const struct sym_entry *s, - const struct addr_range *ranges, int entries) +static int addr_in_range(unsigned long long addr, + const struct addr_range *ranges, int entries) { size_t i; const struct addr_range *ar; @@ -255,7 +373,7 @@ static int symbol_in_range(const struct sym_entry *s, for (i = 0; i < entries; ++i) { ar = &ranges[i]; - if (s->addr >= ar->start && s->addr <= ar->end) + if (addr >= ar->start && addr <= ar->end) return 1; } @@ -269,8 +387,8 @@ static int symbol_valid(const struct sym_entry *s) /* if --all-symbols is not specified, then symbols outside the text * and inittext sections are discarded */ if (!all_symbols) { - if (symbol_in_range(s, text_ranges, - ARRAY_SIZE(text_ranges)) == 0) + if (addr_in_range(s->addr, text_ranges, + ARRAY_SIZE(text_ranges)) == 0) return 0; /* Corner case. Discard any symbols with the same value as * _etext _einittext; they can move between pass 1 and 2 when @@ -352,6 +470,121 @@ static void output_address(unsigned long long addr) printf("\tPTR\t_text - %#llx\n", _text - addr); } +#ifdef CONFIG_KALLMODSYMS +/* Output the .kallmodsyms_modules symbol content. */ +static void output_kallmodsyms_modules(void) +{ + struct obj2mod_elem *elem; + size_t offset = 1; + size_t i; + + /* + * Traverse and emit, updating mod_offset accordingly. + * Emit a single \0 at the start, to encode non-modular objfiles. + */ + output_label("kallsyms_module_names"); + printf("\t.byte\t0\n"); + for (i = 0; i < OBJ2MOD_N; i++) { + for (elem = obj2mod[i]; elem; + elem = elem->obj2mod_next) { + const char *onemod; + size_t i; + + elem->mod_offset = offset; + onemod = elem->mods; + + /* + * Technically this is a waste of space: we could just + * as well implement multimodule entries by pointing one + * byte further back, to the trailing \0 of the previous + * entry, but doing it this way makes it more obvious + * when an entry is a multimodule entry. + */ + if (elem->nmods != 1) { + printf("\t.byte\t0\n"); + printf("\t.byte\t%zi\n", elem->nmods); + offset += 2; + } + + for (i = elem->nmods; i > 0; i--) { + printf("\t.asciz\t\"%s\"\n", onemod); + offset += strlen(onemod) + 1; + onemod += strlen(onemod) + 1; + } + } + } + printf("\n"); + output_label("kallsyms_module_names_len"); + printf("\t.long\t%zi\n", offset); +} + +static void output_kallmodsyms_objfiles(void) +{ + size_t i = 0; + size_t emitted_offsets = 0; + size_t emitted_objfiles = 0; + + if (base_relative) + output_label("kallsyms_module_offsets"); + else + output_label("kallsyms_module_addresses"); + + for (i = 0; i < addrmap_num; i++) { + long long offset; + int overflow; + + if (base_relative) { + if (!absolute_percpu) { + offset = addrmap[i].addr - relative_base; + overflow = (offset < 0 || offset > UINT_MAX); + } else { + offset = relative_base - addrmap[i].addr - 1; + overflow = (offset < INT_MIN || offset >= 0); + } + if (overflow) { + fprintf(stderr, "kallsyms failure: " + "objfile %s at address %#llx out of range in relative mode\n", + addrmap[i].objfile ? addrmap[i].objfile->obj : + "in always-built-in object", table[i]->addr); + exit(EXIT_FAILURE); + } + printf("\t.long\t0x%x\n", (int)offset); + } else + printf("\tPTR\t%#llx\n", addrmap[i].addr); + emitted_offsets++; + } + + output_label("kallsyms_modules"); + + for (i = 0; i < addrmap_num; i++) { + struct obj2mod_elem *elem = addrmap[i].objfile; + /* + * Address range cites no object file: point at 0, the built-in + * module. + */ + if (addrmap[i].objfile == NULL) { + printf("\t.long\t0x0\n"); + emitted_objfiles++; + continue; + } + + /* + * Zero offset is the initial \0, there to catch uninitialized + * obj2mod entries, and is forbidden. + */ + assert (elem->mod_offset != 0); + + printf("\t.long\t0x%x\n", elem->mod_offset); + emitted_objfiles++; + } + + assert (emitted_offsets == emitted_objfiles); + output_label("kallsyms_num_modules"); + printf("\t.long\t%zi\n", emitted_objfiles); + printf("\n"); +} +#endif /* CONFIG_KALLMODSYMS */ + /* uncompress a compressed symbol. When this function is called, the best table * might still be compressed itself, so the function needs to be recursive */ static int expand_symbol(const unsigned char *data, int len, char *result) @@ -451,6 +684,11 @@ static void write_src(void) printf("\n"); } +#ifdef CONFIG_KALLMODSYMS + output_kallmodsyms_modules(); + output_kallmodsyms_objfiles(); +#endif + output_label("kallsyms_num_syms"); printf("\t.long\t%u\n", table_cnt); printf("\n"); @@ -735,7 +973,7 @@ static void make_percpus_absolute(void) unsigned int i; for (i = 0; i < table_cnt; i++) - if (symbol_in_range(table[i], &percpu_range, 1)) { + if (addr_in_range(table[i]->addr, &percpu_range, 1)) { /* * Keep the 'A' override for percpu symbols to * ensure consistent behavior compared to older @@ -762,17 +1000,124 @@ static void record_relative_base(void) } } +#ifdef CONFIG_KALLMODSYMS +/* + * Read the linker map. + */ +static void read_linker_map(void) +{ + unsigned long long addr, size; + char obj[PATH_MAX+1]; + FILE *f = fopen(".tmp_vmlinux.ranges", "r"); + + if (!f) { + fprintf(stderr, "Cannot open '.tmp_vmlinux.ranges'.\n"); + exit(1); + } + + addrmap_num = 0; + addrmap_alloced = 4096; + addrmap = malloc(sizeof(*addrmap) * addrmap_alloced); + if (!addrmap) + goto oom; + + /* + * For each address range, add to addrmap the address and the objfile + * entry to which the range maps. Only add entries relating to text + * ranges. (We assume that the text ranges are tightly packed, because + * in any reasonable object file format they will be, so we can ignore + * the size.) + * + * Ranges that do not correspond to a built-in module, but to an + * always-built-in object file, have no obj2mod_elem and point at NULL + * instead. + */ + + while (fscanf(f, "%llx %llx %s\n", &addr, &size, obj) == 3) { + struct obj2mod_elem *elem = obj2mod_get(obj); + + if (addr == 0 || size == 0 || + !addr_in_range(addr, text_ranges, ARRAY_SIZE(text_ranges))) + continue; + + if (addrmap_num >= addrmap_alloced) { + addrmap_alloced *= 2; + addrmap = realloc(addrmap, + sizeof(*addrmap) * addrmap_alloced); + if (!addrmap) + goto oom; + } + + addrmap[addrmap_num].addr = addr; + addrmap[addrmap_num].objfile = elem; + addrmap_num++; + } + fclose(f); + return; + +oom: + fprintf(stderr, "kallsyms: out of memory\n"); + exit(1); +} + +/* + * Read "modules_thick.builtin" (the list of built-in modules). Construct the + * obj2mod hash to track objfile -> module mappings. Read ".tmp_vmlinux.ranges" + * (the linker map) and build addrmap[], which maps address ranges to built-in + * module names (using obj2mod). + */ +static void read_modules(const char *modules_builtin) +{ + struct modules_thick_iter *i; + char *module_name = NULL; + char **module_paths; + + obj2mod_init(); + /* + * Iterate over all modules in modules_thick.builtin and add each. + */ + i = modules_thick_iter_new(modules_builtin); + if (i == NULL) { + fprintf(stderr, "Cannot iterate over builtin modules.\n"); + exit(1); + } + + while ((module_paths = modules_thick_iter_next(i, &module_name))) { + char **walk = module_paths; + while (*walk) { + obj2mod_add(*walk, module_name); + walk++; + } + free(module_paths); + } + + free(module_name); + modules_thick_iter_free(i); + + /* + * Read linker map. + */ + read_linker_map(); +} +#else +static void read_modules(const char *unused) {} +#endif /* CONFIG_KALLMODSYMS */ + int main(int argc, char **argv) { + const char *modules_builtin = "modules_thick.builtin"; + if (argc >= 2) { int i; for (i = 1; i < argc; i++) { - if(strcmp(argv[i], "--all-symbols") == 0) + if (strcmp(argv[i], "--all-symbols") == 0) all_symbols = 1; else if (strcmp(argv[i], "--absolute-percpu") == 0) absolute_percpu = 1; else if (strcmp(argv[i], "--base-relative") == 0) base_relative = 1; + else if (strncmp(argv[i], "--builtin=", 10) == 0) + modules_builtin = &argv[i][10]; else usage(); } @@ -780,6 +1125,7 @@ int main(int argc, char **argv) usage(); read_map(stdin); + read_modules(modules_builtin); shrink_table(); if (absolute_percpu) make_percpus_absolute(); -- 2.35.0.260.gb82b153193.dirty