[PATCH v4][makedumpfile 4/7] Implement kernel module's kallsyms resolving

Stephen Brennan stephen.s.brennan at oracle.com
Thu Apr 2 16:54:20 PDT 2026


Tao Liu <ltao at redhat.com> writes:

> With kernel's kallsyms and btf ready, we can get any kernel types and
> symbol addresses. So we can iterate kernel modules' linked list, and
> parse each one of kernel module's structure to get its kallsyms data.
> At this time, kernel modules' kallsyms symbol defined within .init_ksyms
> section will be resolved.
>
> Suggested-by: Stephen Brennan <stephen.s.brennan at oracle.com>
> Signed-off-by: Tao Liu <ltao at redhat.com>

Reviewed-by: Stephen Brennan <stephen.s.brennan at oracle.com>

> ---
>  kallsyms.c | 125 ++++++++++++++++++++++++++++++++++++++++++++++++++++-
>  kallsyms.h |   3 ++
>  2 files changed, 127 insertions(+), 1 deletion(-)
>
> diff --git a/kallsyms.c b/kallsyms.c
> index f7737cb..f07b0ee 100644
> --- a/kallsyms.c
> +++ b/kallsyms.c
> @@ -3,6 +3,7 @@
>  #include <string.h>
>  #include "makedumpfile.h"
>  #include "kallsyms.h"
> +#include "btf_info.h"
>  
>  static uint32_t *kallsyms_offsets = NULL;
>  static uint16_t *kallsyms_token_index = NULL;
> @@ -347,4 +348,126 @@ out:
>  		kallsyms_names = NULL;
>  	}
>  	return ret;
> -}
> \ No newline at end of file
> +}
> +
> +INIT_KERN_SYM(modules);
> +
> +INIT_KERN_STRUCT_MEMBER(list_head, next);
> +INIT_KERN_STRUCT_MEMBER(module, list);
> +INIT_KERN_STRUCT_MEMBER(module, name);
> +INIT_KERN_STRUCT_MEMBER(module, core_kallsyms);
> +INIT_KERN_STRUCT_MEMBER(mod_kallsyms, symtab);
> +INIT_KERN_STRUCT_MEMBER(mod_kallsyms, num_symtab);
> +INIT_KERN_STRUCT_MEMBER(mod_kallsyms, strtab);
> +INIT_KERN_STRUCT_MEMBER(elf64_sym, st_name);
> +INIT_KERN_STRUCT_MEMBER(elf64_sym, st_value);
> +
> +#define MEMBER_OFF(S, M) \
> +	GET_KERN_STRUCT_MEMBER_MOFF(S, M) / 8
> +
> +uint64_t next_list(uint64_t list)
> +{
> +	uint64_t next = 0;
> +
> +	readmem(VADDR, list + MEMBER_OFF(list_head, next),
> +		&next, GET_KERN_STRUCT_MEMBER_MSIZE(list_head, next));
> +	return next;
> +}
> +
> +bool init_module_kallsyms(void)
> +{
> +	uint64_t modules, list, value = 0, symtab = 0, strtab = 0;
> +	uint32_t st_name = 0;
> +	int num_symtab, i, j;
> +	struct ksym_info **p;
> +	char symname[512], ch;
> +	char *modname = NULL;
> +	bool ret = false;
> +
> +	modules = GET_KERN_SYM(modules);
> +	if (!KERN_SYM_EXIST(modules)) {
> +		/* Not a failure if no module enabled */
> +		ret = true;
> +		goto out;
> +	}
> +
> +	if (!KERN_STRUCT_MEMBER_EXIST(list_head, next) ||
> +	    !KERN_STRUCT_MEMBER_EXIST(module, list) ||
> +	    !KERN_STRUCT_MEMBER_EXIST(module, name) ||
> +	    !KERN_STRUCT_MEMBER_EXIST(module, core_kallsyms) ||
> +	    !KERN_STRUCT_MEMBER_EXIST(mod_kallsyms, symtab) ||
> +	    !KERN_STRUCT_MEMBER_EXIST(mod_kallsyms, num_symtab) ||
> +	    !KERN_STRUCT_MEMBER_EXIST(mod_kallsyms, strtab) ||
> +	    !KERN_STRUCT_MEMBER_EXIST(elf64_sym, st_name) ||
> +	    !KERN_STRUCT_MEMBER_EXIST(elf64_sym, st_value)) {
> +		/* Fail when module enabled but any required types not found */
> +		fprintf(stderr, "%s: Missing required module syms/types!", __func__);
> +		goto out;
> +	}
> +
> +	modname = (char *)malloc(GET_KERN_STRUCT_MEMBER_MSIZE(module, name));
> +	if (!modname)
> +		goto no_mem;
> +
> +	for (list = next_list(modules); list != modules; list = next_list(list)) {
> +		readmem(VADDR, list - MEMBER_OFF(module, list) +
> +				MEMBER_OFF(module, name),
> +			modname, GET_KERN_STRUCT_MEMBER_MSIZE(module, name));
> +		if (!check_ksyms_require_modname(modname, NULL))
> +			continue;
> +		readmem(VADDR, list - MEMBER_OFF(module, list) +
> +				MEMBER_OFF(module, core_kallsyms) +
> +				MEMBER_OFF(mod_kallsyms, num_symtab),
> +			&num_symtab, GET_KERN_STRUCT_MEMBER_MSIZE(mod_kallsyms, num_symtab));
> +		readmem(VADDR, list - MEMBER_OFF(module, list) +
> +				MEMBER_OFF(module, core_kallsyms) +
> +				MEMBER_OFF(mod_kallsyms, symtab),
> +			&symtab, GET_KERN_STRUCT_MEMBER_MSIZE(mod_kallsyms, symtab));
> +		readmem(VADDR, list - MEMBER_OFF(module, list) +
> +				MEMBER_OFF(module, core_kallsyms) +
> +				MEMBER_OFF(mod_kallsyms, strtab),
> +			&strtab, GET_KERN_STRUCT_MEMBER_MSIZE(mod_kallsyms, strtab));
> +		for (i = 0; i < num_symtab; i++) {
> +			j = 0;
> +			readmem(VADDR, symtab + i * GET_KERN_STRUCT_MEMBER_SSIZE(elf64_sym, st_value) +
> +					MEMBER_OFF(elf64_sym, st_value),
> +				&value, GET_KERN_STRUCT_MEMBER_MSIZE(elf64_sym, st_value));
> +			readmem(VADDR, symtab + i * GET_KERN_STRUCT_MEMBER_SSIZE(elf64_sym, st_name) +
> +					MEMBER_OFF(elf64_sym, st_name),
> +				&st_name, GET_KERN_STRUCT_MEMBER_MSIZE(elf64_sym, st_name));
> +			do {
> +				readmem(VADDR, strtab + st_name + j++, &ch, 1);
> +			} while (ch != '\0');
> +			if (j == 1 || j > sizeof(symname))
> +				/* Skip empty or too long string */
> +				continue;
> +			readmem(VADDR, strtab + st_name, symname, j);
> +
> +			for (j = 0; j < sr_len; j++) {
> +				for (p = (struct ksym_info **)(sr[j]->start);
> +				     p < (struct ksym_info **)(sr[j]->stop);
> +				     p++) {
> +					if (!strcmp((*p)->modname, modname) &&
> +					    !strcmp((*p)->symname, symname)) {
> +						(*p)->value = value;
> +						(*p)->index = i;
> +					}
> +				}
> +			}
> +		}
> +	}
> +	ret = true;
> +	goto out;
> +no_mem:
> +	fprintf(stderr, "%s: Not enough memory!\n", __func__);
> +out:
> +	if (modname)
> +		free(modname);
> +	return ret;
> +}
> +
> +void cleanup_kallsyms(void)
> +{
> +	cleanup_ksyms_section_range();
> +	cleanup_ksyms_modname();
> +}
> diff --git a/kallsyms.h b/kallsyms.h
> index 3791284..897bcdd 100644
> --- a/kallsyms.h
> +++ b/kallsyms.h
> @@ -88,4 +88,7 @@ bool check_ksyms_require_modname(char *modname, int *total);
>  bool register_ksym_section(char *start, char *stop);
>  bool read_vmcoreinfo_kallsyms(void);
>  bool init_kernel_kallsyms(void);
> +uint64_t next_list(uint64_t list);
> +bool init_module_kallsyms(void);
> +void cleanup_kallsyms(void);
>  #endif /* _KALLSYMS_H */
> \ No newline at end of file
> -- 
> 2.47.0



More information about the kexec mailing list