Received: by 2002:ab2:784b:0:b0:1fd:adc2:8405 with SMTP id m11csp288894lqp; Mon, 10 Jun 2024 04:27:38 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCX2WySCaNabRQXFRl9+0fS99CgR1aEkHazhQ/7XIKNXhyXSlLTPBN5ND5aUS+tTepCksJ5RUk7ZqKvi1IMl/LDTGFsDQ4YjG82Ve0Sbqw== X-Google-Smtp-Source: AGHT+IHS6RC0q0oFAyTtPOBjxNCrbNwSSTdim/VsET8dAMStNvc4ZseiI0iAfFGz1SXRo6sZzOlb X-Received: by 2002:a05:6a21:81a2:b0:1b5:ba37:9dbe with SMTP id adf61e73a8af0-1b5ba37d4e3mr3975406637.55.1718018857844; Mon, 10 Jun 2024 04:27:37 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718018857; cv=pass; d=google.com; s=arc-20160816; b=u3HfIvq+WbPjOKeH4e7V7AJ+KTwixnFEkYlBxVeco0CdcQikb+4NUcN0MAEGM5bLFe As2lBiZLlyfXPMcZA0xqNlH37T4Mo+hqlmcjozFzjLdCJ1XDiBNlw7HtEIhlg2PzvnE3 fT/olC8ryEbQ/oYhtc7siesl5zZHOlglxISJN/9eBzMKU7ApvnX8WP4Xlb8io0w2g5Aq GWPgBUS2p8gBMHGEAUMpibTo2kIghiAkJGCkAwnqi13FWel3x5q+eZeaNd+BgSsrGbkJ zfeiZAkZ3fJFUVOe/DczKq1PRLkdBlZyI11aYtLHVYMIAvO/0W5ccM0+KrMWpr8hGAxw eFMA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=zFrUcW4gFQ3tkKb161grLTEUDcD5tBDCvJ2C6jFUW0s=; fh=Holx/gsvO+HQsywX+F3JNZNWvkftjXvD+Yg8VWBHNAk=; b=Qh39BLOkh0Q7rqZlrkESU3GH/hHv/uYvEsA7Cq4UKDoWtXt4C406udybPA20qlmjDj vVcUHHUBsP+LIM8OtmtSVJfb2I5+NLFXuEDZCcDf7SCNfPdeiGhM+UQoyeDrn9PIOGTR vyS2c1OiYeRqxm7XWqSGf6zLNQJGYJVSM5TimG5xUse/0dhLA2osnkXZNoZ2qiqFPAZY RNynGDPO0XSBk9N2SoCTnW9ruldu2hyEflLKC0JBd0yr4J2cm1D34vf5BdKYAE9Nb1EO fyEbUulabdDu9AMafT9aHCZrQVDFJb9FxO7j3XZH5y6YYofUktYSakUcnmiSbnB9zOT8 +bJA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=uHTBZFa8; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-208076-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-208076-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id 98e67ed59e1d1-2c2d0e2b246si4854916a91.36.2024.06.10.04.27.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 10 Jun 2024 04:27:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-208076-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=uHTBZFa8; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-208076-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-208076-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 34F74283B9B for ; Mon, 10 Jun 2024 11:27:22 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id DEA507E576; Mon, 10 Jun 2024 11:27:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="uHTBZFa8" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CF2767D40D; Mon, 10 Jun 2024 11:27:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718018825; cv=none; b=UJmTRKmvo5NCk9UBMpiidUfmfGRpl5ecvXRuQ1ctqmO8MjYAzwZBRKEDta97My1dJJqHuqY4TPEUNmMkIFYa3JT3t5B+Hv0QzqpxavVkVHo9PF5Tns3eEgjGvdh94bnHKfLdLMJZbPezzRkkoWZpPaeBpXMzNMwEJIXm0wmtzGM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718018825; c=relaxed/simple; bh=JeN7fLysNAJOql5RK7Rc3wYp9917JPhNU11jbCuBpOc=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=arKT2YCKkIN0a9app6OSui9mO51gnQ5WAfaClTIQqiFAa9O5U8BetCRN5swEEcPmlC0gah8bPoLDp+5a1xfI4mVAUxHnpJRAaSLAZ6DN+U4fwlTFNWYWhc/DsFgrEUHQJ5/GD878SbRjOQDUN6MXIdwMN6AKyq7HnTfVxcUd/Hc= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=uHTBZFa8; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 358CBC4AF48; Mon, 10 Jun 2024 11:27:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1718018825; bh=JeN7fLysNAJOql5RK7Rc3wYp9917JPhNU11jbCuBpOc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uHTBZFa8uTb3UbnXWY7AY6XJGwQ7FmTfeq66iWinD/tn+YivZkTbzsgzZHOmxaC/B pRicWKluWwNnjLsEHYOfUabC0WZDcAjUOI0wOCi90z0xIAZ92UzkPzyiEAEvpLmub2 sG7lUEagOXXjI5Rhr5fGaXbM46C65IuAYPJL38Wt/5q8i0ed2nI2TQdw6RozAL0omY XIH+3hN43QiB46G7v6DfqJ62KQU1F1+o1h6MkXtAvvTpZnXB2WKbUidOtEsn5QS09i XciAsI7ue//FuQFFniuTheO4ziLewr3Px94FXXeYz9TS9XpSjSR3TG2WTgrZIl7OTL brMtGbdWkSK2w== From: Masahiro Yamada To: linux-kbuild@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Masahiro Yamada , Nathan Chancellor , Nicolas Schier Subject: [PATCH v3 1/3] kbuild: refactor variables in scripts/link-vmlinux.sh Date: Mon, 10 Jun 2024 20:25:16 +0900 Message-ID: <20240610112657.602958-2-masahiroy@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240610112657.602958-1-masahiroy@kernel.org> References: <20240610112657.602958-1-masahiroy@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Clean up the variables in scripts/link-vmlinux.sh - Specify the extra objects directly in vmlinux_link() - Move the AS rule to kallsyms() - Set kallsymso and btf_vmlinux_bin_o where they are generated - Remove unneeded variable, kallsymso_prev - Introduce the btf_data variable - Introduce the strip_debug flag instead of checking the output name No functional change intended. Signed-off-by: Masahiro Yamada --- Changes in v3: - Use ${strip_debug} for cleanup scripts/link-vmlinux.sh | 67 +++++++++++++++++++++-------------------- 1 file changed, 35 insertions(+), 32 deletions(-) diff --git a/scripts/link-vmlinux.sh b/scripts/link-vmlinux.sh index 518c70b8db50..3d9d7257143a 100755 --- a/scripts/link-vmlinux.sh +++ b/scripts/link-vmlinux.sh @@ -45,7 +45,6 @@ info() # Link of vmlinux # ${1} - output file -# ${2}, ${3}, ... - optional extra .o files vmlinux_link() { local output=${1} @@ -90,7 +89,7 @@ vmlinux_link() ldflags="${ldflags} ${wl}--script=${objtree}/${KBUILD_LDS}" # The kallsyms linking does not need debug symbols included. - if [ "$output" != "${output#.tmp_vmlinux.kallsyms}" ] ; then + if [ -n "${strip_debug}" ] ; then ldflags="${ldflags} ${wl}--strip-debug" fi @@ -101,7 +100,7 @@ vmlinux_link() ${ld} ${ldflags} -o ${output} \ ${wl}--whole-archive ${objs} ${wl}--no-whole-archive \ ${wl}--start-group ${libs} ${wl}--end-group \ - $@ ${ldlibs} + ${kallsymso} ${btf_vmlinux_bin_o} ${ldlibs} } # generate .BTF typeinfo from DWARF debuginfo @@ -110,6 +109,7 @@ vmlinux_link() gen_btf() { local pahole_ver + local btf_data=${2} if ! [ -x "$(command -v ${PAHOLE})" ]; then echo >&2 "BTF: ${1}: pahole (${PAHOLE}) is not available" @@ -124,16 +124,16 @@ gen_btf() vmlinux_link ${1} - info "BTF" ${2} + info BTF "${btf_data}" LLVM_OBJCOPY="${OBJCOPY}" ${PAHOLE} -J ${PAHOLE_FLAGS} ${1} - # Create ${2} which contains just .BTF section but no symbols. Add + # Create ${btf_data} which contains just .BTF section but no symbols. Add # SHF_ALLOC because .BTF will be part of the vmlinux image. --strip-all # deletes all symbols including __start_BTF and __stop_BTF, which will # be redefined in the linker script. Add 2>/dev/null to suppress GNU # objcopy warnings: "empty loadable segment detected at ..." ${OBJCOPY} --only-section=.BTF --set-section-flags .BTF=alloc,readonly \ - --strip-all ${1} ${2} 2>/dev/null + --strip-all ${1} "${btf_data}" 2>/dev/null # Change e_type to ET_REL so that it can be used to link final vmlinux. # GNU ld 2.35+ and lld do not allow an ET_EXEC input. if is_enabled CONFIG_CPU_BIG_ENDIAN; then @@ -141,10 +141,12 @@ gen_btf() else et_rel='\1\0' fi - printf "${et_rel}" | dd of=${2} conv=notrunc bs=1 seek=16 status=none + printf "${et_rel}" | dd of="${btf_data}" conv=notrunc bs=1 seek=16 status=none + + btf_vmlinux_bin_o=${btf_data} } -# Create ${2} .S file with all symbols from the ${1} object file +# Create ${2}.o file with all symbols from the ${1} object file kallsyms() { local kallsymopt; @@ -165,27 +167,25 @@ kallsyms() kallsymopt="${kallsymopt} --lto-clang" fi - info KSYMS ${2} - scripts/kallsyms ${kallsymopt} ${1} > ${2} + info KSYMS "${2}.S" + scripts/kallsyms ${kallsymopt} "${1}" > "${2}.S" + + info AS "${2}.o" + ${CC} ${NOSTDINC_FLAGS} ${LINUXINCLUDE} ${KBUILD_CPPFLAGS} \ + ${KBUILD_AFLAGS} ${KBUILD_AFLAGS_KERNEL} -c -o "${2}.o" "${2}.S" + + kallsymso=${2}.o } # Perform one step in kallsyms generation, including temporary linking of # vmlinux. kallsyms_step() { - kallsymso_prev=${kallsymso} kallsyms_vmlinux=.tmp_vmlinux.kallsyms${1} - kallsymso=${kallsyms_vmlinux}.o - kallsyms_S=${kallsyms_vmlinux}.S - vmlinux_link ${kallsyms_vmlinux} "${kallsymso_prev}" ${btf_vmlinux_bin_o} - mksysmap ${kallsyms_vmlinux} ${kallsyms_vmlinux}.syms - kallsyms ${kallsyms_vmlinux}.syms ${kallsyms_S} - - info AS ${kallsymso} - ${CC} ${NOSTDINC_FLAGS} ${LINUXINCLUDE} ${KBUILD_CPPFLAGS} \ - ${KBUILD_AFLAGS} ${KBUILD_AFLAGS_KERNEL} \ - -c -o ${kallsymso} ${kallsyms_S} + vmlinux_link "${kallsyms_vmlinux}" + mksysmap "${kallsyms_vmlinux}" "${kallsyms_vmlinux}.syms" + kallsyms "${kallsyms_vmlinux}.syms" "${kallsyms_vmlinux}" } # Create map file with all symbols from ${1} @@ -223,19 +223,18 @@ fi ${MAKE} -f "${srctree}/scripts/Makefile.build" obj=init init/version-timestamp.o -btf_vmlinux_bin_o="" +btf_vmlinux_bin_o= +kallsymso= +strip_debug= + if is_enabled CONFIG_DEBUG_INFO_BTF; then - btf_vmlinux_bin_o=.btf.vmlinux.bin.o - if ! gen_btf .tmp_vmlinux.btf $btf_vmlinux_bin_o ; then + if ! gen_btf .tmp_vmlinux.btf .btf.vmlinux.bin.o ; then echo >&2 "Failed to generate BTF for vmlinux" echo >&2 "Try to disable CONFIG_DEBUG_INFO_BTF" exit 1 fi fi -kallsymso="" -kallsymso_prev="" -kallsyms_vmlinux="" if is_enabled CONFIG_KALLSYMS; then # kallsyms support @@ -261,11 +260,13 @@ if is_enabled CONFIG_KALLSYMS; then # a) Verify that the System.map from vmlinux matches the map from # ${kallsymso}. - kallsyms_step 1 - kallsyms_step 2 + # The kallsyms linking does not need debug symbols included. + strip_debug=1 - # step 3 - size1=$(${CONFIG_SHELL} "${srctree}/scripts/file-size.sh" ${kallsymso_prev}) + kallsyms_step 1 + size1=$(${CONFIG_SHELL} "${srctree}/scripts/file-size.sh" ${kallsymso}) + + kallsyms_step 2 size2=$(${CONFIG_SHELL} "${srctree}/scripts/file-size.sh" ${kallsymso}) if [ $size1 -ne $size2 ] || [ -n "${KALLSYMS_EXTRA_PASS}" ]; then @@ -273,7 +274,9 @@ if is_enabled CONFIG_KALLSYMS; then fi fi -vmlinux_link vmlinux "${kallsymso}" ${btf_vmlinux_bin_o} +strip_debug= + +vmlinux_link vmlinux # fill in BTF IDs if is_enabled CONFIG_DEBUG_INFO_BTF && is_enabled CONFIG_BPF; then -- 2.43.0