From: Matthias Maennich <maennich@google.com>
To: libabigail@sourceware.org
Cc: dodji@seketeli.org, gprocida@google.com, kernel-team@android.com,
maennich@google.com
Subject: [PATCH v1 13/16] abg-elf-helpers: migrate ppc64 specific helpers
Date: Fri, 19 Jun 2020 23:43:02 +0200 [thread overview]
Message-ID: <20200619214305.562-14-maennich@google.com> (raw)
In-Reply-To: <20200619214305.562-1-maennich@google.com>
This migrates more helpers to abg-elf-helpers:
lookup_ppc64_elf_fn_entry_point_address with dependencies
read_uint64_from_array_of_bytes
read_int_from_array_of_bytes
address_is_in_opd_section with dependency
address_is_in_section
read_context::find_opd_section and read_context::opd_section_ are obsolete.
* src/abg-dwarf-reader.cc (read_context::opd_section_): Delete.
(read_context::find_opd_section): Delete.
(read_context::read_uint64_from_array_of_bytes): Delete.
(read_context::read_int_from_array_of_bytes): Delete.
(read_context::lookup_ppc64_elf_fn_entry_point_address): Delete.
(read_context::address_is_in_opd_section): Delete.
(read_context::address_is_in_section): Delete.
(read_context::load_symbol_maps_from_symtab_section): Adjust.
* src/abg-elf-helpers.cc (read_int_from_array_of_bytes): New.
(read_uint64_from_array_of_bytes): New.
(lookup_ppc64_elf_fn_entry_point_address): New.
(address_is_in_section): New.
(address_is_in_opd_section): New.
* src/abg-elf-helpers.h
(lookup_ppc64_elf_fn_entry_point_address): New declaration.
(address_is_in_opd_section): New declaration.
Reviewed-by: Giuliano Procida <gprocida@google.com>
Signed-off-by: Matthias Maennich <maennich@google.com>
---
src/abg-dwarf-reader.cc | 208 +---------------------------------------
src/abg-elf-helpers.cc | 186 +++++++++++++++++++++++++++++++++++
src/abg-elf-helpers.h | 8 ++
3 files changed, 198 insertions(+), 204 deletions(-)
diff --git a/src/abg-dwarf-reader.cc b/src/abg-dwarf-reader.cc
index 2d39596f2712..73069e844eba 100644
--- a/src/abg-dwarf-reader.cc
+++ b/src/abg-dwarf-reader.cc
@@ -2161,10 +2161,6 @@ public:
mutable Elf* elf_handle_;
string elf_path_;
mutable Elf_Scn* symtab_section_;
- // The "Official procedure descriptor section, aka .opd", used in
- // ppc64 elf v1 binaries. This section contains the procedure
- // descriptors on that platform.
- mutable Elf_Scn* opd_section_;
Dwarf_Die* cur_tu_die_;
mutable dwarf_expr_eval_context dwarf_expr_eval_context_;
// A set of maps (one per kind of die source) that associates a decl
@@ -2344,7 +2340,6 @@ public:
elf_handle_ = 0;
elf_path_ = elf_path;
symtab_section_ = 0;
- opd_section_ = 0;
cur_tu_die_ = 0;
exported_decls_builder_ = 0;
@@ -5020,19 +5015,6 @@ public:
return symtab_section_;
}
- /// Return the "Official Procedure descriptors section." This
- /// section is named .opd, and is usually present only on PPC64
- /// ELFv1 binaries.
- ///
- /// @return the .opd section, if found. Return nil otherwise.
- Elf_Scn*
- find_opd_section() const
- {
- if (!opd_section_)
- opd_section_ = elf_helpers::find_opd_section(elf_handle());
- return opd_section_;
- }
-
/// Lookup an elf symbol, referred to by its index, from the .symtab
/// section.
///
@@ -5144,152 +5126,6 @@ public:
return sym;
}
- /// Read 8 bytes and convert their value into an uint64_t.
- ///
- /// @param bytes the array of bytes to read the next 8 bytes from.
- /// Note that this array must be at least 8 bytes long.
- ///
- /// @param result where to store the resuting uint64_t that was read.
- ///
- /// @param is_big_endian if true, read the 8 bytes in Big Endian
- /// mode, otherwise, read them in Little Endian.
- ///
- /// @param true if the 8 bytes could be read, false otherwise.
- bool
- read_uint64_from_array_of_bytes(const uint8_t *bytes,
- bool is_big_endian,
- uint64_t &result) const
- {
- return read_int_from_array_of_bytes(bytes, 8, is_big_endian, result);
- }
-
- /// Read N bytes and convert their value into an integer type T.
- ///
- /// Note that N cannot be bigger than 8 for now. The type passed needs to be
- /// at least of the size of number_of_bytes.
- ///
- /// @param bytes the array of bytes to read the next 8 bytes from.
- /// Note that this array must be at least 8 bytes long.
- ///
- /// @param number_of_bytes the number of bytes to read. This number
- /// cannot be bigger than 8.
- ///
- /// @param is_big_endian if true, read the 8 bytes in Big Endian
- /// mode, otherwise, read them in Little Endian.
- ///
- /// @param result where to store the resuting integer that was read.
- ///
- ///
- /// @param true if the 8 bytes could be read, false otherwise.
- template<typename T>
- bool
- read_int_from_array_of_bytes(const uint8_t *bytes,
- unsigned char number_of_bytes,
- bool is_big_endian,
- T &result) const
- {
- if (!bytes)
- return false;
-
- ABG_ASSERT(number_of_bytes <= 8);
- ABG_ASSERT(number_of_bytes <= sizeof(T));
-
- T res = 0;
-
- const uint8_t *cur = bytes;
- if (is_big_endian)
- {
- // In Big Endian, the most significant byte is at the lowest
- // address.
- const uint8_t* msb = cur;
- res = *msb;
-
- // Now read the remaining least significant bytes.
- for (uint i = 1; i < number_of_bytes; ++i)
- res = (res << 8) | ((T)msb[i]);
- }
- else
- {
- // In Little Endian, the least significant byte is at the
- // lowest address.
- const uint8_t* lsb = cur;
- res = *lsb;
- // Now read the remaining most significant bytes.
- for (uint i = 1; i < number_of_bytes; ++i)
- res = res | (((T)lsb[i]) << i * 8);
- }
-
- result = res;
- return true;
- }
-
- /// Lookup the address of the function entry point that corresponds
- /// to the address of a given function descriptor.
- ///
- /// On PPC64, a function pointer is the address of a function
- /// descriptor. Function descriptors are located in the .opd
- /// section. Each function descriptor is a triplet of three
- /// addresses, each one on 64 bits. Among those three address only
- /// the first one is of any interest to us: the address of the entry
- /// point of the function.
- ///
- /// This function returns the address of the entry point of the
- /// function whose descriptor's address is given.
- ///
- /// http://refspecs.linuxfoundation.org/ELF/ppc64/PPC-elf64abi.html#FUNC-DES
- ///
- /// https://www.ibm.com/developerworks/community/blogs/5894415f-be62-4bc0-81c5-3956e82276f3/entry/deeply_understand_64_bit_powerpc_elf_abi_function_descriptors?lang=en
- ///
- /// @param fn_desc_address the address of the function descriptor to
- /// consider.
- ///
- /// @return the address of the entry point of the function whose
- /// descriptor has the address @p fn_desc_address. If there is no
- /// .opd section (e.g because we are not on ppc64) or more generally
- /// if the function descriptor could not be found then this function
- /// just returns the address of the fuction descriptor.
- GElf_Addr
- lookup_ppc64_elf_fn_entry_point_address(GElf_Addr fn_desc_address) const
- {
- if (!elf_handle())
- return fn_desc_address;
-
- if (!architecture_is_ppc64(elf_handle()))
- return fn_desc_address;
-
- bool is_big_endian = architecture_is_big_endian(elf_handle());
-
- Elf_Scn *opd_section = find_opd_section();
- if (!opd_section)
- return fn_desc_address;
-
- GElf_Shdr header_mem;
- // The section header of the .opd section.
- GElf_Shdr *opd_sheader = gelf_getshdr(opd_section, &header_mem);
-
- // The offset of the function descriptor entry, in the .opd
- // section.
- size_t fn_desc_offset = fn_desc_address - opd_sheader->sh_addr;
- Elf_Data *elf_data = elf_rawdata(opd_section, 0);
-
- // Ensure that the opd_section has at least 8 bytes, starting from
- // the offset we want read the data from.
- if (elf_data->d_size <= fn_desc_offset + 8)
- return fn_desc_address;
-
- // A pointer to the data of the .opd section, that we can actually
- // do something with.
- uint8_t * bytes = (uint8_t*) elf_data->d_buf;
-
- // The resulting address we are looking for is going to be formed
- // in this variable.
- GElf_Addr result = 0;
- ABG_ASSERT(read_uint64_from_array_of_bytes(bytes + fn_desc_offset,
- is_big_endian, result));
-
- return result;
- }
-
/// Test if a given function symbol has been exported.
///
/// @param symbol_address the address of the symbol we are looking
@@ -5599,13 +5435,15 @@ public:
// symbol that are in the .opd section.
GElf_Addr fn_desc_addr = sym->st_value;
GElf_Addr fn_entry_point_addr =
- lookup_ppc64_elf_fn_entry_point_address(fn_desc_addr);
+ lookup_ppc64_elf_fn_entry_point_address(
+ elf_handle(), fn_desc_addr);
addr_elf_symbol_sptr_map_type::const_iterator it2 =
fun_entry_addr_sym_map().find(fn_entry_point_addr);
if (it2 == fun_entry_addr_sym_map().end())
fun_entry_addr_sym_map()[fn_entry_point_addr] = symbol;
- else if (address_is_in_opd_section(fn_desc_addr))
+ else if (address_is_in_opd_section(elf_handle(),
+ fn_desc_addr))
{
// Either
//
@@ -5768,24 +5606,6 @@ public:
return true;
}
- /// Return true if an address is in the ".opd" section that is
- /// present on the ppc64 platform.
- ///
- /// @param addr the address to consider.
- ///
- /// @return true iff @p addr is designates a word that is in the
- /// ".opd" section.
- bool
- address_is_in_opd_section(Dwarf_Addr addr)
- {
- Elf_Scn * opd_section = find_opd_section();
- if (!opd_section)
- return false;
- if (address_is_in_section(addr, opd_section))
- return true;
- return false;
- }
-
/// Load the symbol maps if necessary.
///
/// @return true iff the symbol maps has been loaded by this
@@ -5936,26 +5756,6 @@ public:
return addr;
}
- /// Test if a given address is in a given section.
- ///
- /// @param addr the address to consider.
- ///
- /// @param section the section to consider.
- bool
- address_is_in_section(Dwarf_Addr addr, Elf_Scn* section) const
- {
- if (!section)
- return false;
-
- GElf_Shdr sheader_mem;
- GElf_Shdr* sheader = gelf_getshdr(section, &sheader_mem);
-
- if (sheader->sh_addr <= addr && addr <= sheader->sh_addr + sheader->sh_size)
- return true;
-
- return false;
- }
-
/// For a relocatable (*.o) elf file, this function expects an
/// absolute address, representing a global variable symbol. It
/// then extracts the address of the {.data,.data1,.rodata,.bss}
diff --git a/src/abg-elf-helpers.cc b/src/abg-elf-helpers.cc
index ed768d221d4f..6e2495af1ee0 100644
--- a/src/abg-elf-helpers.cc
+++ b/src/abg-elf-helpers.cc
@@ -863,6 +863,153 @@ architecture_is_big_endian(Elf* elf_handle)
return is_big_endian;
}
+/// Read N bytes and convert their value into an integer type T.
+///
+/// Note that N cannot be bigger than 8 for now. The type passed needs to be at
+/// least of the size of number_of_bytes.
+///
+/// @param bytes the array of bytes to read the next 8 bytes from.
+/// Note that this array must be at least 8 bytes long.
+///
+/// @param number_of_bytes the number of bytes to read. This number
+/// cannot be bigger than 8.
+///
+/// @param is_big_endian if true, read the 8 bytes in Big Endian
+/// mode, otherwise, read them in Little Endian.
+///
+/// @param result where to store the resuting integer that was read.
+///
+///
+/// @param true if the 8 bytes could be read, false otherwise.
+template <typename T>
+bool
+read_int_from_array_of_bytes(const uint8_t* bytes,
+ unsigned char number_of_bytes,
+ bool is_big_endian,
+ T& result)
+{
+ if (!bytes)
+ return false;
+
+ ABG_ASSERT(number_of_bytes <= 8);
+ ABG_ASSERT(number_of_bytes <= sizeof(T));
+
+ T res = 0;
+
+ const uint8_t* cur = bytes;
+ if (is_big_endian)
+ {
+ // In Big Endian, the most significant byte is at the lowest
+ // address.
+ const uint8_t* msb = cur;
+ res = *msb;
+
+ // Now read the remaining least significant bytes.
+ for (uint i = 1; i < number_of_bytes; ++i)
+ res = (res << 8) | ((T)msb[i]);
+ }
+ else
+ {
+ // In Little Endian, the least significant byte is at the
+ // lowest address.
+ const uint8_t* lsb = cur;
+ res = *lsb;
+ // Now read the remaining most significant bytes.
+ for (uint i = 1; i < number_of_bytes; ++i)
+ res = res | (((T)lsb[i]) << i * 8);
+ }
+
+ result = res;
+ return true;
+}
+
+/// Read 8 bytes and convert their value into an uint64_t.
+///
+/// @param bytes the array of bytes to read the next 8 bytes from.
+/// Note that this array must be at least 8 bytes long.
+///
+/// @param result where to store the resuting uint64_t that was read.
+///
+/// @param is_big_endian if true, read the 8 bytes in Big Endian
+/// mode, otherwise, read them in Little Endian.
+///
+/// @param true if the 8 bytes could be read, false otherwise.
+bool
+read_uint64_from_array_of_bytes(const uint8_t* bytes,
+ bool is_big_endian,
+ uint64_t& result)
+{
+ return read_int_from_array_of_bytes(bytes, 8, is_big_endian, result);
+}
+
+
+/// Lookup the address of the function entry point that corresponds
+/// to the address of a given function descriptor.
+///
+/// On PPC64, a function pointer is the address of a function
+/// descriptor. Function descriptors are located in the .opd
+/// section. Each function descriptor is a triplet of three
+/// addresses, each one on 64 bits. Among those three address only
+/// the first one is of any interest to us: the address of the entry
+/// point of the function.
+///
+/// This function returns the address of the entry point of the
+/// function whose descriptor's address is given.
+///
+/// http://refspecs.linuxfoundation.org/ELF/ppc64/PPC-elf64abi.html#FUNC-DES
+///
+/// https://www.ibm.com/developerworks/community/blogs/5894415f-be62-4bc0-81c5-3956e82276f3/entry/deeply_understand_64_bit_powerpc_elf_abi_function_descriptors?lang=en
+///
+/// @param fn_desc_address the address of the function descriptor to
+/// consider.
+///
+/// @return the address of the entry point of the function whose
+/// descriptor has the address @p fn_desc_address. If there is no
+/// .opd section (e.g because we are not on ppc64) or more generally
+/// if the function descriptor could not be found then this function
+/// just returns the address of the fuction descriptor.
+GElf_Addr
+lookup_ppc64_elf_fn_entry_point_address(Elf* elf_handle, GElf_Addr fn_desc_address)
+{
+ if (!elf_handle)
+ return fn_desc_address;
+
+ if (!architecture_is_ppc64(elf_handle))
+ return fn_desc_address;
+
+ bool is_big_endian = architecture_is_big_endian(elf_handle);
+
+ Elf_Scn* opd_section = find_opd_section(elf_handle);
+ if (!opd_section)
+ return fn_desc_address;
+
+ GElf_Shdr header_mem;
+ // The section header of the .opd section.
+ GElf_Shdr* opd_sheader = gelf_getshdr(opd_section, &header_mem);
+
+ // The offset of the function descriptor entry, in the .opd
+ // section.
+ size_t fn_desc_offset = fn_desc_address - opd_sheader->sh_addr;
+ Elf_Data* elf_data = elf_rawdata(opd_section, 0);
+
+ // Ensure that the opd_section has at least 8 bytes, starting from
+ // the offset we want read the data from.
+ if (elf_data->d_size <= fn_desc_offset + 8)
+ return fn_desc_address;
+
+ // A pointer to the data of the .opd section, that we can actually
+ // do something with.
+ uint8_t* bytes = (uint8_t*)elf_data->d_buf;
+
+ // The resulting address we are looking for is going to be formed
+ // in this variable.
+ GElf_Addr result = 0;
+ ABG_ASSERT(read_uint64_from_array_of_bytes(bytes + fn_desc_offset,
+ is_big_endian, result));
+
+ return result;
+}
+
/// Test if the ELF binary denoted by a given ELF handle is a Linux
/// Kernel Module.
///
@@ -1027,5 +1174,44 @@ maybe_adjust_et_rel_sym_addr_to_abs_addr(Elf* elf_handle, GElf_Sym* sym)
return addr + section_header.sh_addr;
}
+/// Test if a given address is in a given section.
+///
+/// @param addr the address to consider.
+///
+/// @param section the section to consider.
+bool
+address_is_in_section(Dwarf_Addr addr, Elf_Scn* section)
+{
+ if (!section)
+ return false;
+
+ GElf_Shdr sheader_mem;
+ GElf_Shdr* sheader = gelf_getshdr(section, &sheader_mem);
+
+ if (sheader->sh_addr <= addr && addr <= sheader->sh_addr + sheader->sh_size)
+ return true;
+
+ return false;
+}
+
+/// Return true if an address is in the ".opd" section that is
+/// present on the ppc64 platform.
+///
+/// @param addr the address to consider.
+///
+/// @return true iff @p addr is designates a word that is in the
+/// ".opd" section.
+bool
+address_is_in_opd_section(Elf* elf_handle, Dwarf_Addr addr)
+{
+ Elf_Scn * opd_section = find_opd_section(elf_handle);
+ if (!opd_section)
+ return false;
+ if (address_is_in_section(addr, opd_section))
+ return true;
+ return false;
+}
+
+
} // end namespace elf_helpers
} // end namespace abigail
diff --git a/src/abg-elf-helpers.h b/src/abg-elf-helpers.h
index 647c92703dfa..2046648569a7 100644
--- a/src/abg-elf-helpers.h
+++ b/src/abg-elf-helpers.h
@@ -27,6 +27,7 @@
#include "config.h"
+#include <elfutils/libdwfl.h>
#include <gelf.h>
#include <string>
@@ -148,6 +149,10 @@ architecture_is_ppc64(Elf* elf_handle);
bool
architecture_is_big_endian(Elf* elf_handle);
+GElf_Addr
+lookup_ppc64_elf_fn_entry_point_address(Elf* elf_handle,
+ GElf_Addr fn_desc_address);
+
//
// Helpers for Linux Kernel Binaries
//
@@ -177,6 +182,9 @@ is_dso(Elf* elf_handle);
GElf_Addr
maybe_adjust_et_rel_sym_addr_to_abs_addr(Elf* elf_handle, GElf_Sym* sym);
+bool
+address_is_in_opd_section(Elf* elf_handle, Dwarf_Addr addr);
+
} // end namespace elf_helpers
} // end namespace abigail
--
2.27.0.111.gc72c7da667-goog
next prev parent reply other threads:[~2020-06-19 21:43 UTC|newest]
Thread overview: 91+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-06-19 21:42 [PATCH v1 00/16] Refactor (k)symtab reader Matthias Maennich
2020-06-19 21:42 ` [PATCH v1 01/16] abg-cxx-compat: add simplified version of std::optional Matthias Maennich
2020-06-19 21:42 ` [PATCH v1 02/16] abg-cxx-compat: more <functional> support: std::bind and friends Matthias Maennich
2020-06-19 21:42 ` [PATCH v1 03/16] abg-ir: elf_symbol: add is_in_ksymtab field Matthias Maennich
2020-06-19 21:42 ` [PATCH v1 04/16] abg-ir: elf_symbol: add is_suppressed field Matthias Maennich
2020-06-22 9:46 ` Giuliano Procida
2020-06-19 21:42 ` [PATCH v1 05/16] dwarf-reader split: create abg-symtab-reader.{h, cc} and test case Matthias Maennich
2020-06-19 21:42 ` [PATCH v1 06/16] Refactor ELF symbol table reading by adding a new symtab reader Matthias Maennich
2020-06-19 21:42 ` [PATCH v1 07/16] Integrate new symtab reader into corpus and read_context Matthias Maennich
2020-06-19 21:42 ` [PATCH v1 08/16] corpus: make get_(undefined_)?_(var|fun)_symbols use the new symtab Matthias Maennich
2020-06-22 9:53 ` Giuliano Procida
2020-06-19 21:42 ` [PATCH v1 09/16] corpus: make get_unreferenced_(function|variable)_symbols " Matthias Maennich
2020-06-19 21:42 ` [PATCH v1 10/16] abg-reader: avoid using the (var|function)_symbol_map Matthias Maennich
2020-06-19 21:43 ` [PATCH v1 11/16] dwarf-reader: read_context: use new symtab in *_symbols_is_exported Matthias Maennich
2020-06-19 21:43 ` [PATCH v1 12/16] Switch kernel stuff over to new symtab and drop unused code Matthias Maennich
2020-06-19 21:43 ` Matthias Maennich [this message]
2020-06-19 21:43 ` [PATCH v1 14/16] symtab_reader: add support for ppc64 ELFv1 binaries Matthias Maennich
2020-06-19 21:43 ` [PATCH v1 15/16] abg-corpus: remove symbol maps and their setters Matthias Maennich
2020-06-19 21:43 ` [PATCH v1 16/16] dwarf reader: drop (now) unused code related symbol table reading Matthias Maennich
2020-06-22 9:56 ` Giuliano Procida
2020-07-03 16:46 ` [PATCH v2 00/21] Refactor (k)symtab reader Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 01/21] abg-cxx-compat: add simplified version of std::optional Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 02/21] abg-cxx-compat: more <functional> support: std::bind and friends Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 03/21] abg-ir: elf_symbol: add is_in_ksymtab field Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 04/21] abg-ir: elf_symbol: add is_suppressed field Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 05/21] dwarf-reader split: create abg-symtab-reader.{h, cc} and test case Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 06/21] Refactor ELF symbol table reading by adding a new symtab reader Matthias Maennich
2020-07-20 15:39 ` Dodji Seketeli
2020-07-03 16:46 ` [PATCH v2 07/21] Integrate new symtab reader into corpus and read_context Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 08/21] corpus: make get_(undefined_)?_(var|fun)_symbols use the new symtab Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 09/21] corpus: make get_unreferenced_(function|variable)_symbols " Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 10/21] abg-reader: avoid using the (var|function)_symbol_map Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 11/21] dwarf-reader: read_context: use new symtab in *_symbols_is_exported Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 12/21] Switch kernel stuff over to new symtab and drop unused code Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 13/21] abg-elf-helpers: migrate ppc64 specific helpers Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 14/21] symtab_reader: add support for ppc64 ELFv1 binaries Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 15/21] abg-corpus: remove symbol maps and their setters Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 16/21] dwarf reader: drop now-unused code related to symbol table reading Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 17/21] test-symtab: add tests for whitelisted functions Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 18/21] symtab/dwarf-reader: allow hinting of main symbols for aliases Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 19/21] dwarf-reader/writer: consider aliases when dealing with suppressions Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 20/21] symtab: Add support for MODVERSIONS (CRC checksums) Matthias Maennich
2020-07-03 16:46 ` [PATCH v2 21/21] reader/symtab: Improve handling for suppressed aliases Matthias Maennich
2020-07-20 14:27 ` [PATCH v2 00/21] Refactor (k)symtab reader Dodji Seketeli
2021-01-27 12:58 ` [PATCH 00/20] " Matthias Maennich
2021-01-27 12:58 ` [PATCH 01/20] abg-cxx-compat: add simplified version of std::optional Matthias Maennich
2021-03-09 9:43 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 02/20] abg-ir: elf_symbol: add is_in_ksymtab field Matthias Maennich
2021-03-09 14:05 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 03/20] abg-ir: elf_symbol: add is_suppressed field Matthias Maennich
2021-03-09 18:03 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 04/20] dwarf-reader split: create abg-symtab-reader.{h, cc} and test case Matthias Maennich
2021-03-10 18:00 ` [PATCH 04/20] dwarf-reader split: create abg-symtab-reader.{h,cc} " Dodji Seketeli
2021-01-27 12:58 ` [PATCH 05/20] Refactor ELF symbol table reading by adding a new symtab reader Matthias Maennich
2021-03-12 11:18 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 06/20] Integrate new symtab reader into corpus and read_context Matthias Maennich
2021-03-12 15:04 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 07/20] corpus: make get_(undefined_)?_(var|fun)_symbols use the new symtab Matthias Maennich
2021-03-15 10:05 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 08/20] corpus: make get_unreferenced_(function|variable)_symbols " Matthias Maennich
2021-03-15 12:06 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 09/20] abg-reader: avoid using the (var|function)_symbol_map Matthias Maennich
2021-03-15 14:23 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 10/20] dwarf-reader: read_context: use new symtab in *_symbols_is_exported Matthias Maennich
2021-03-15 18:13 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 11/20] Switch kernel stuff over to new symtab and drop unused code Matthias Maennich
2021-03-16 10:38 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 12/20] abg-elf-helpers: migrate ppc64 specific helpers Matthias Maennich
2021-03-16 10:59 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 13/20] symtab_reader: add support for ppc64 ELFv1 binaries Matthias Maennich
2021-03-16 11:39 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 14/20] abg-corpus: remove symbol maps and their setters Matthias Maennich
2021-03-16 18:08 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 15/20] dwarf reader: drop (now) unused code related to symbol table reading Matthias Maennich
2021-03-16 18:42 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 16/20] test-symtab: add tests for whitelisted functions Matthias Maennich
2021-03-17 11:07 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 17/20] symtab/dwarf-reader: allow hinting of main symbols for aliases Matthias Maennich
2021-03-17 13:40 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 18/20] dwarf-reader/writer: consider aliases when dealing with suppressions Matthias Maennich
2021-03-17 15:44 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 19/20] abg-writer.cc: fix write_elf_symbol_reference loop Matthias Maennich
2021-03-17 16:11 ` Dodji Seketeli
2021-01-27 12:58 ` [PATCH 20/20] symtab: Add support for MODVERSIONS (CRC checksums) Matthias Maennich
2021-03-17 17:13 ` Dodji Seketeli
2021-03-17 23:29 ` Giuliano Procida
2021-03-18 22:10 ` Matthias Maennich
2021-03-19 16:55 ` Dodji Seketeli
2021-03-19 18:15 ` Dodji Seketeli
2021-03-29 13:19 ` [GIT PULL] Refactor (k)symtab reader Matthias Maennich
2021-04-02 14:28 ` Dodji Seketeli
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200619214305.562-14-maennich@google.com \
--to=maennich@google.com \
--cc=dodji@seketeli.org \
--cc=gprocida@google.com \
--cc=kernel-team@android.com \
--cc=libabigail@sourceware.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).