From nobody Thu Dec 18 12:52:27 2025 Received: from mail-pf1-f202.google.com (mail-pf1-f202.google.com [209.85.210.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BEB7828DF5B for ; Wed, 7 May 2025 23:14:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.202 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746659656; cv=none; b=V0HnLllhPkXXLVpVTUJPXlOVQiVXK4Q90IkPN2QjQvmiStBvYKhDRjXtFl8WDTO0exwSrZKO6LGGENPVS8ITtq6N5Y3qq4dKGM6ARL+u/9ULSqKk2L4yh/FfxHzKln0MOK+TDaaOtnNPU51yjpGKCsLP/5MmkHWhr1KyFL8II5o= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746659656; c=relaxed/simple; bh=HgP0jMlO7dsRTimd8uO+TSE4jHCfEpiuqBa4mSyAxIA=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=O88Bbsaq2r3ylt4xftS8hi/mF94CwRvHGAR6356B6MAc7kJAKU7bOjyMKwPV7iqbnTe3y0/9TWi0PfYNlp+6hM/LLg6bp9EXfKW8rFmkQE2KVlAXm3badSk364vjr+wioWxgEPv9/orCedVAhJvm0Y6vUTn41npYRgN3zYind9o= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--samitolvanen.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=FMxsWVxO; arc=none smtp.client-ip=209.85.210.202 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--samitolvanen.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="FMxsWVxO" Received: by mail-pf1-f202.google.com with SMTP id d2e1a72fcca58-74041404f8dso282624b3a.0 for ; Wed, 07 May 2025 16:14:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1746659653; x=1747264453; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=d3FXF6C55XaC+/8qPK9kYbCADSFXqvOZhar+nxLyTg4=; b=FMxsWVxObjjKgVjOrQDfKUniaRF8igkdyCvabXKS4lAYmH7bxqasEnnZjmpgHRpB7F fFFfUCLQN1HY4CvdfJOIR5yNwtUCoizWTOH6D/7+b5vEFCViuUd+oFh0qf1fDmTtCzsv zvUBE4kR+AqKfyHDrT9p57F3vav7wOI58DBoIpBw9coFntIaXAUJfM2xIyQz3qFSCWod JjrsCNEwS+BlcO2n32v5ZN96QCQaffmAB4Vt9sjUbuBqUBTZwXWrIJke6wgQWMSi6ePg 8l6limzFzmEGKuKZXyreDz/BlWMmnfefFDrihczGcusZbiexlLYuxy2vyhq1bZkWExoI ClcQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1746659653; x=1747264453; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=d3FXF6C55XaC+/8qPK9kYbCADSFXqvOZhar+nxLyTg4=; b=i1aHqF80qrwZD2cIWSP3URUzbK1Y5YWSNBNCwpWx3oZ3wr/CydiCG0Q5MHWYZJ8L/8 dg1n3QQMhggY5sVnqmKjsg+kmRqKf/54H8TzV0F5AVaJyW01KzRrzsBxEWude8rvapnr eZjeWziM9PmImogCeLXmuLnfI4gXNzBebKaRKfpwUzs3yQu/NNgATX7DlpXut8Ykr8d4 X1PKJrdv7c0k29uVS3IPBpq5aJ9F5VCJj+f44tBqfwChask/UOvSj8zPEDYgiLRTLf+f wptpBUhB+6uT7RR7KlZ9SC2Qj3J+T6CACiQYn9+9KWQfeG2JApma9ZEjQ8+kocxE3MBR 3I0g== X-Forwarded-Encrypted: i=1; AJvYcCUBaChr74VQyTgSCYVMyVq0RRRN0BgAfoKsYNF8idxufCtCDjNSJRtLmnvvlf81nn8KPzA/CvaZS8teQJc=@vger.kernel.org X-Gm-Message-State: AOJu0Yw8ThPWKxA88n1mJv0R5CuDomfmzJ+rsUmKcxVUMicDASMl7OUD MixqjjSznJhrSDLjRR3eE2ORN52rY0dJYkptJgsOD5qq++CeN6wj+tPTa6+hgS3bmVsbxwN3Dru B7NTlwFpgKFnrj3455vwiYHZSgQ== X-Google-Smtp-Source: AGHT+IF3ZGlTveayJhKo5vhsFU98n/GWEz2r0LKJmBHPOc+IldJXAMZWxkwTENRItS5Z39RtE5JtYm54Q1LwDXbIPLY= X-Received: from pfx51.prod.google.com ([2002:a05:6a00:a473:b0:730:796b:a54a]) (user=samitolvanen job=prod-delivery.src-stubby-dispatcher) by 2002:a05:6a00:410c:b0:736:a540:c9ad with SMTP id d2e1a72fcca58-7409cfdbdddmr7229190b3a.20.1746659653063; Wed, 07 May 2025 16:14:13 -0700 (PDT) Date: Wed, 7 May 2025 23:14:06 +0000 In-Reply-To: <20250507231403.377725-7-samitolvanen@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20250507231403.377725-7-samitolvanen@google.com> X-Developer-Key: i=samitolvanen@google.com; a=openpgp; fpr=35CCFB63B283D6D3AEB783944CB5F6848BBC56EE X-Developer-Signature: v=1; a=openpgp-sha256; l=7598; i=samitolvanen@google.com; h=from:subject; bh=HgP0jMlO7dsRTimd8uO+TSE4jHCfEpiuqBa4mSyAxIA=; b=owGbwMvMwCEWxa662nLh8irG02pJDBnSL22uCPrkq/502c3883ekm9e/6qN64dwaki/+OPQsD f/ildDcUcrCIMbBICumyNLydfXW3d+dUl99LpKAmcPKBDKEgYtTACbSeZPhJ2OtuxfDpnP9jpzZ P9axfdpaJaHKyLpkVsTnJZYTs1rVZzAynP+eaMWpMDVIoV6pQc3ijcjiQI81Pad5vS9bb36SsG4 qDwA= X-Mailer: git-send-email 2.49.0.987.g0cc8ee98dc-goog Message-ID: <20250507231403.377725-9-samitolvanen@google.com> Subject: [PATCH v3 2/5] gendwarfksyms: Add a kABI rule to override byte_size attributes From: Sami Tolvanen To: Masahiro Yamada Cc: Luis Chamberlain , Petr Pavlu , Daniel Gomez , linux-modules@vger.kernel.org, linux-kbuild@vger.kernel.org, linux-kernel@vger.kernel.org, Sami Tolvanen Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" A data structure can be partially opaque to modules if its allocation is handled by the core kernel, and modules only need to access some of its members. In this situation, it's possible to append new members to the structure without breaking the ABI, as long as the layout for the original members remains unchanged. For example, consider the following struct: struct s { unsigned long a; void *p; }; gendwarfksyms --stable --dump-dies produces the following type expansion: variable structure_type s { member base_type long unsigned int byte_size(8) encoding(7) a data_member_location(0) , member pointer_type { base_type void } byte_size(8) p data_member_location(8) } byte_size(16) To append new members, we can use the KABI_IGNORE() macro to hide them from gendwarfksyms --stable: struct s { /* old members with unchanged layout */ unsigned long a; void *p; /* new members not accessed by modules */ KABI_IGNORE(0, unsigned long n); }; However, we can't hide the fact that adding new members changes the struct size, as seen in the updated type string: variable structure_type s { member base_type long unsigned int byte_size(8) encoding(7) a data_member_location(0) , member pointer_type { base_type void } byte_size(8) p data_member_location(8) } byte_size(24) In order to support this use case, add a kABI rule that makes it possible to override the byte_size attribute for types: /* * struct s allocation is handled by the kernel, so * appending new members without changing the original * layout won't break the ABI. */ KABI_BYTE_SIZE(s, 16); This results in a type string that's unchanged from the original and therefore, won't change versions for symbols that reference the changed structure. Signed-off-by: Sami Tolvanen Reviewed-by: Petr Pavlu --- scripts/gendwarfksyms/dwarf.c | 14 ++++++++++++- scripts/gendwarfksyms/examples/kabi.h | 7 +++++++ scripts/gendwarfksyms/examples/kabi_ex.c | 2 ++ scripts/gendwarfksyms/examples/kabi_ex.h | 22 +++++++++++++++++++++ scripts/gendwarfksyms/gendwarfksyms.h | 1 + scripts/gendwarfksyms/kabi.c | 25 ++++++++++++++++++++++++ 6 files changed, 70 insertions(+), 1 deletion(-) diff --git a/scripts/gendwarfksyms/dwarf.c b/scripts/gendwarfksyms/dwarf.c index eed247d8abfc..13ea7bf1ae7d 100644 --- a/scripts/gendwarfksyms/dwarf.c +++ b/scripts/gendwarfksyms/dwarf.c @@ -228,12 +228,24 @@ static void process_fqn(struct die *cache, Dwarf_Die = *die) DEFINE_PROCESS_UDATA_ATTRIBUTE(accessibility) DEFINE_PROCESS_UDATA_ATTRIBUTE(alignment) DEFINE_PROCESS_UDATA_ATTRIBUTE(bit_size) -DEFINE_PROCESS_UDATA_ATTRIBUTE(byte_size) DEFINE_PROCESS_UDATA_ATTRIBUTE(encoding) DEFINE_PROCESS_UDATA_ATTRIBUTE(data_bit_offset) DEFINE_PROCESS_UDATA_ATTRIBUTE(data_member_location) DEFINE_PROCESS_UDATA_ATTRIBUTE(discr_value) =20 +static void process_byte_size_attr(struct die *cache, Dwarf_Die *die) +{ + Dwarf_Word value; + unsigned long override; + + if (get_udata_attr(die, DW_AT_byte_size, &value)) { + if (stable && kabi_get_byte_size(cache->fqn, &override)) + value =3D override; + + process_fmt(cache, " byte_size(%" PRIu64 ")", value); + } +} + /* Match functions -- die_match_callback_t */ #define DEFINE_MATCH(type) \ static bool match_##type##_type(Dwarf_Die *die) \ diff --git a/scripts/gendwarfksyms/examples/kabi.h b/scripts/gendwarfksyms/= examples/kabi.h index 97a5669b083d..86f4428e0479 100644 --- a/scripts/gendwarfksyms/examples/kabi.h +++ b/scripts/gendwarfksyms/examples/kabi.h @@ -89,6 +89,13 @@ #define KABI_ENUMERATOR_VALUE(fqn, field, value) \ __KABI_RULE(enumerator_value, fqn field, value) =20 +/* + * KABI_BYTE_SIZE(fqn, value) + * Set the byte_size attribute for the struct/union/enum fqn to + * value bytes. + */ +#define KABI_BYTE_SIZE(fqn, value) __KABI_RULE(byte_size, fqn, value) + /* * KABI_RESERVE * Reserve some "padding" in a structure for use by LTS backports. diff --git a/scripts/gendwarfksyms/examples/kabi_ex.c b/scripts/gendwarfksy= ms/examples/kabi_ex.c index 0b7ffd830541..b73ee5399a59 100644 --- a/scripts/gendwarfksyms/examples/kabi_ex.c +++ b/scripts/gendwarfksyms/examples/kabi_ex.c @@ -28,3 +28,5 @@ struct ex2c ex2c; struct ex3a ex3a; struct ex3b ex3b; struct ex3c ex3c; + +struct ex4a ex4a; diff --git a/scripts/gendwarfksyms/examples/kabi_ex.h b/scripts/gendwarfksy= ms/examples/kabi_ex.h index 1736e0f65208..092c8cb7bcd7 100644 --- a/scripts/gendwarfksyms/examples/kabi_ex.h +++ b/scripts/gendwarfksyms/examples/kabi_ex.h @@ -260,4 +260,26 @@ _Static_assert(sizeof(struct ex3a) =3D=3D sizeof(struc= t ex3c), "ex3a size doesn't ma * STABLE-NEXT: } byte_size(16) */ =20 +/* + * Example: An ignored field added to an end of a partially opaque struct, + * while keeping the byte_size attribute unchanged. + */ + +struct ex4a { + unsigned long a; + KABI_IGNORE(0, unsigned long b); +}; + +/* + * This may be safe if the structure allocation is managed by the core ker= nel + * and the layout remains unchanged except for appended new members. + */ +KABI_BYTE_SIZE(ex4a, 8); + +/* + * STABLE: variable structure_type ex4a { + * STABLE-NEXT: member base_type [[ULONG]] byte_size(8) encoding(7) a da= ta_member_location(0) + * STABLE-NEXT: } byte_size(8) + */ + #endif /* __KABI_EX_H__ */ diff --git a/scripts/gendwarfksyms/gendwarfksyms.h b/scripts/gendwarfksyms/= gendwarfksyms.h index 2feec168bf73..2db49c2ad50e 100644 --- a/scripts/gendwarfksyms/gendwarfksyms.h +++ b/scripts/gendwarfksyms/gendwarfksyms.h @@ -287,6 +287,7 @@ void generate_symtypes_and_versions(FILE *file); * kabi.c */ =20 +bool kabi_get_byte_size(const char *fqn, unsigned long *value); bool kabi_is_enumerator_ignored(const char *fqn, const char *field); bool kabi_get_enumerator_value(const char *fqn, const char *field, unsigned long *value); diff --git a/scripts/gendwarfksyms/kabi.c b/scripts/gendwarfksyms/kabi.c index badf8d46b154..61620ff647bd 100644 --- a/scripts/gendwarfksyms/kabi.c +++ b/scripts/gendwarfksyms/kabi.c @@ -54,11 +54,19 @@ */ #define KABI_RULE_TAG_ENUMERATOR_VALUE "enumerator_value" =20 +/* + * Rule: byte_size + * - For the fqn_field in the target field, set the byte_size + * attribute to the value in the value field. + */ +#define KABI_RULE_TAG_BYTE_SIZE "byte_size" + enum kabi_rule_type { KABI_RULE_TYPE_UNKNOWN, KABI_RULE_TYPE_DECLONLY, KABI_RULE_TYPE_ENUMERATOR_IGNORE, KABI_RULE_TYPE_ENUMERATOR_VALUE, + KABI_RULE_TYPE_BYTE_SIZE, }; =20 #define RULE_HASH_BITS 7 @@ -127,6 +135,10 @@ void kabi_read_rules(int fd) .type =3D KABI_RULE_TYPE_ENUMERATOR_VALUE, .tag =3D KABI_RULE_TAG_ENUMERATOR_VALUE, }, + { + .type =3D KABI_RULE_TYPE_BYTE_SIZE, + .tag =3D KABI_RULE_TAG_BYTE_SIZE, + }, }; =20 if (!stable) @@ -308,6 +320,19 @@ bool kabi_get_enumerator_value(const char *fqn, const = char *field, return false; } =20 +bool kabi_get_byte_size(const char *fqn, unsigned long *value) +{ + struct rule *rule; + + rule =3D find_rule(KABI_RULE_TYPE_BYTE_SIZE, fqn); + if (rule) { + *value =3D get_ulong_value(rule->value); + return true; + } + + return false; +} + void kabi_free(void) { struct hlist_node *tmp; --=20 2.49.0.987.g0cc8ee98dc-goog