[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [XEN][PATCH v2] coverage: extend coverage on .init and lib code


  • To: Grygorii Strashko <grygorii_strashko@xxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Sat, 6 Dec 2025 14:15:48 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6ivIEuREOIO0mD7wrOvOTjjNYENWVLuORsUJDgoePr0=; b=R9UMjY8/Q2SFLA7PTo2A6yEaLuR2wO0AelqjaAxuDdD9Jbpo6YmBNCS+7e6f8hQlmoBAhLMu2lVsDtaJvLmBgMhEJv+vJrU1YiS2+4LeEzgBQCdvhNH+f+mEl13eWexcSV0V/Wf+Krxze1sLbLNOheqJPCQ7OwQ2/bUDJeUuN1r6uvS12XQV3FbiX1vBWz1OGBpdcAZhlgPbXOJ/p41mVR0OslOMd28KA+We8Z8y2Ha1SI+Omb5q9dvMo+UbFnOl8nKIfQPHdXlBfG9o0Ug/BnDUhpma5r2dU/J/Weq/wjDl3UXyR7eMXC3DmRQZpofFmww/AgqDjrshQ4l/Ta8m5g==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=BXjBvQZsjvJzaE5c4VmY0wnTMCDLW2TL9flhRkG6bHnH1QZ0xQJzOO6JCEvApJmTQWtCfUHgbx1GXowbJR+6o9wzhPd+f8EElM8Gbr/VvZiFKt/7wzwkAKhgm8oRBJ2m6mwTTKchRPXwazD8UzDqhqfQ3nwlbztpyhm7Zoio6iu7OujVdyQaglT2i5eir/MBz+m+UKo49ui2RiVHmXEmxIgEzzSXJl39o0OtjSL3Lj3bSN75YxgDhtrtdQ1Z143DgM+lh9Qiv1/j1Zr0YlUKrSLFEdw8+zsM+pm0ars3dt+aLn/A9BJHHA02i8wl5St5VB3TVu59cpc+uzlY1AkdEg==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: andrew.cooper3@xxxxxxxxxx, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Julien Grall <julien@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Jason Andryuk <jason.andryuk@xxxxxxx>, Victor Lira <victorm.lira@xxxxxxx>
  • Delivery-date: Sat, 06 Dec 2025 14:16:25 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 06/12/2025 9:10 am, Grygorii Strashko wrote:
>
>
> On 05.12.25 22:00, Andrew Cooper wrote:
>> On 05/12/2025 7:34 pm, Grygorii Strashko wrote:
>>> From: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
>>>
>>> Extend coverage support on .init and lib code.
>>> Add two hidden Kconfig options:
>>> - RELAX_INIT_CHECK "Relax strict check for .init sections only in
>>> %.init.o
>>> files"
>>> - DO_NOT_FREE_INIT_MEMORY "Prevent freeing of .init sections at the
>>> end of
>>> Xen boot."
>>>
>>> Both selected selected when COVERAGE=y, as getting coverage report for
>>> ".init" code is required:
>>> - to bypass strict check for .init sections only in %.init.o files;
>>> - the .init code stay in memory after Xen boot.
>>>
>>> RELAX_INIT_CHECK/DO_NOT_FREE_INIT_MEMORY could be used by other debug
>>> features in the future.
>>>
>>> Signed-off-by: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
>>> ---
>>> changes in v2:
>>>   - add RELAX_INIT_CHECK and DO_NOT_FREE_INIT_MEMORY, those are two
>>> different things,
>>>     both potentially reusable
>>>   - enable coverage for libfdt/libelf always
>>>   - enable colverage for .init always
>>
>> This is a lot nicer (i.e. more simple).
>>
>> But, I still don't know why we need to avoid freeing init memory to make
>> this work.  What explodes if we dont?
>>
>
> It will just crash when coverage data is collected.
>
> First I made changes in make file to get .init covered
> then I hit a crash
> then I checked %.init.o
> conclusion was obvious.
>
> For example:
> objdump -x bzimage.init.o | grep gcov
>
> 0000000000000010 l     O .bss    0000000000000028 __gcov0.bzimage_check
> 0000000000000040 l     O .bss    0000000000000040
> __gcov0.bzimage_headroom
> 0000000000000000 l     O .bss    0000000000000008 __gcov0.output_length
> 0000000000000080 l     O .bss    0000000000000060 __gcov0.bzimage_parse
> 0000000000000098 l     O .init.data.rel.local    0000000000000028
> __gcov_.bzimage_parse
> 0000000000000070 l     O .init.data.rel.local    0000000000000028
> __gcov_.bzimage_headroom
> 0000000000000048 l     O .init.data.rel.local    0000000000000028
> __gcov_.bzimage_check
> 0000000000000020 l     O .init.data.rel.local    0000000000000028
> __gcov_.output_length
> 0000000000000000         *UND*    0000000000000000 __gcov_init
> 0000000000000000         *UND*    0000000000000000 __gcov_exit
> 0000000000000000         *UND*    0000000000000000 __gcov_merge_add
> 0000000000000008 R_X86_64_PLT32    __gcov_init-0x0000000000000004
> 0000000000000012 R_X86_64_PLT32    __gcov_exit-0x0000000000000004
> 0000000000000020 R_X86_64_64       __gcov_merge_add
>

Aah, we should exclude the OJBCOPY too.  That's what's moving
.data.rel.local amongst other sections we target with attributes directly.

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.