1. 18 2月, 2015 1 次提交
    • J
      scripts/gdb: add infrastructure · 3ee7b3fa
      Jan Kiszka 提交于
      This provides the basic infrastructure to load kernel-specific python
      helper scripts when debugging the kernel in gdb.
      
      The loading mechanism is based on gdb loading for <objfile>-gdb.py when
      opening <objfile>.  Therefore, this places a corresponding link to the
      main helper script into the output directory that contains vmlinux.
      
      The main scripts will pull in submodules containing Linux specific gdb
      commands and functions.  To avoid polluting the source directory with
      compiled python modules, we link to them from the object directory.
      
      Due to gdb.parse_and_eval and string redirection for gdb.execute, we
      depend on gdb >= 7.2.
      
      This feature is enabled via CONFIG_GDB_SCRIPTS.
      Signed-off-by: NJan Kiszka <jan.kiszka@siemens.com>
      Acked-by: Michal Marek <mmarek@suse.cz>		[kbuild stuff]
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Cc: Jason Wessel <jason.wessel@windriver.com>
      Cc: Andi Kleen <andi@firstfloor.org>
      Cc: Ben Widawsky <ben@bwidawsk.net>
      Cc: Borislav Petkov <bp@suse.de>
      Signed-off-by: NAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      3ee7b3fa
  2. 17 2月, 2015 1 次提交
  3. 14 2月, 2015 22 次提交
  4. 06 2月, 2015 1 次提交
    • R
      module: set ksymtab/kcrctab* section addresses to 0x0 · 5d8591bc
      Rabin Vincent 提交于
      These __ksymtab*/__kcrctab* sections currently have non-zero addresses.
      Non-zero section addresses in a relocatable ELF confuse GDB and it ends
      up not relocating all symbols when add-symbol-file is used on modules
      which have exports.  The kernel's module loader does not care about
      these addresses, so let's just set them to zero.
      
       Before:
      
        $ readelf -S lib/notifier-error-inject.ko   | grep 'Name\| __ksymtab_gpl'
          [Nr] Name              Type            Addr     Off    Size   ES Flg Lk Inf Al
          [ 8] __ksymtab_gpl     PROGBITS        0000000c 0001b4 000010 00   A  0   0  4
      
        (gdb) add-symbol-file lib/notifier-error-inject.ko 0x500000 -s .bss 0x700000
        add symbol table from file "lib/notifier-error-inject.ko" at
           .text_addr = 0x500000
           .bss_addr = 0x700000
        (gdb) p &notifier_err_inject_dir
        $3 = (struct dentry **) 0x0
      
       After:
      
        $ readelf -S lib/notifier-error-inject.ko   | grep 'Name\| __ksymtab_gpl'
          [Nr] Name              Type            Addr     Off    Size   ES Flg Lk Inf Al
          [ 8] __ksymtab_gpl     PROGBITS        00000000 0001b4 000010 00   A  0   0  4
      
        (gdb) add-symbol-file lib/notifier-error-inject.ko 0x500000 -s .bss 0x700000
        add symbol table from file "lib/notifier-error-inject.ko" at
           .text_addr = 0x500000
           .bss_addr = 0x700000
        (gdb) p &notifier_err_inject_dir
        $3 = (struct dentry **) 0x700000
      Signed-off-by: NRabin Vincent <rabin.vincent@axis.com>
      Signed-off-by: NRusty Russell <rusty@rustcorp.com.au>
      5d8591bc
  5. 29 1月, 2015 2 次提交
  6. 23 1月, 2015 1 次提交
  7. 20 1月, 2015 1 次提交
  8. 02 1月, 2015 1 次提交
  9. 20 12月, 2014 1 次提交
  10. 11 12月, 2014 9 次提交