当前位置: 首页 > news >正文

Linux 给 vmlinux 添加符号

文章目录

  • 前言
  • 一、centos7 给 vmlinux 添加符号
  • 二、ubuntu22.04 给 vmlinux 添加符号

前言

使用内核源码下的script文件:scripts/extract-vmlinux 可以从/boot/vmlinuz 提取出来 内核镜像文件vmlinux:

# ./extract-vmlinux vmlinuz-3.10.0-693.el7.x86_64 > vmlinux
# nm vmlinux
nm: vmlinux:无符号

Linux 给 vmlinux 添加符号 这里有两个开源的项目,这里我分别已centos7 和 ubuntu22.04演示。

一、centos7 给 vmlinux 添加符号

# cat /etc/os-release
NAME="CentOS Linux"
VERSION="7 (Core)"
ID="centos"# uname -r
3.10.0-693.el7.x86_64

参考:https://github.com/elfmaster/kdress

# git clone https://github.com/elfmaster/kdress
# cd kdress/
# make
gcc -O2 build_ksyms.c -o build_ksyms
gcc -O2 kunpress.c -o kunpress
# ./kdress vmlinuz-3.10.0-693.el7.x86_64 vmlinux System.map-3.10.0-693.el7.x86_64[+] vmlinux has been successfully extracted
[+] vmlinux has been successfully instrumented with a complete ELF symbol table.
# nm vmlinux | grep '\<sys_call_table\>'
ffffffff816beee0 R sys_call_table
# cat /boot/System.map-3.10.0-693.el7.x86_64 | grep '\<sys_call_table\>'
ffffffff816beee0 R sys_call_table
# gdb -q vmlinux
Reading symbols from /root/vmlinux/kdress/vmlinux...(no debugging symbols found)...done.
(gdb) print &sys_call_table
$1 = (<data variable, no debug info> *) 0xffffffff816beee0 <sys_call_table>
(gdb) x/gx 0xffffffff816beee0
0xffffffff816beee0 <sys_call_table>:    0xffffffff812019e0
(gdb) x/10i 0xffffffff812019e00xffffffff812019e0 <sys_read>:       callq  0xffffffff816b6c80 <__fentry__>0xffffffff812019e5 <sys_read+5>:     push   %rbp0xffffffff812019e6 <sys_read+6>:     mov    %rsp,%rbp0xffffffff812019e9 <sys_read+9>:     push   %r140xffffffff812019eb <sys_read+11>:    mov    %rdx,%r140xffffffff812019ee <sys_read+14>:    push   %r130xffffffff812019f0 <sys_read+16>:    mov    %rsi,%r130xffffffff812019f3 <sys_read+19>:    lea    -0x30(%rbp),%rsi0xffffffff812019f7 <sys_read+23>:    push   %r120xffffffff812019f9 <sys_read+25>:    push   %rbx
(gdb) x/gx 0xffffffff816beee0+8
0xffffffff816beee8 <sys_call_table+8>:  0xffffffff81201ac0
(gdb) x/10i 0xffffffff81201ac00xffffffff81201ac0 <sys_write>:      callq  0xffffffff816b6c80 <__fentry__>0xffffffff81201ac5 <sys_write+5>:    push   %rbp0xffffffff81201ac6 <sys_write+6>:    mov    %rsp,%rbp0xffffffff81201ac9 <sys_write+9>:    push   %r140xffffffff81201acb <sys_write+11>:   mov    %rdx,%r140xffffffff81201ace <sys_write+14>:   push   %r130xffffffff81201ad0 <sys_write+16>:   mov    %rsi,%r130xffffffff81201ad3 <sys_write+19>:   lea    -0x30(%rbp),%rsi0xffffffff81201ad7 <sys_write+23>:   push   %r120xffffffff81201ad9 <sys_write+25>:   push   %rbx

系统调用编号请参考:https://elixir.bootlin.com/linux/v3.10/source/arch/x86/syscalls/syscall_64.tbl

二、ubuntu22.04 给 vmlinux 添加符号

# cat /etc/os-release
PRETTY_NAME="Ubuntu 22.04.4 LTS"
NAME="Ubuntu"
VERSION_ID="22.04"# uname -r
5.15.0-122-generic

参考项目:https://github.com/marin-m/vmlinux-to-elf

sudo apt install python3-pip liblzo2-dev
sudo pip3 install --upgrade lz4 zstandard git+https://github.com/clubby789/python-lzo@b4e39df
sudo pip3 install --upgrade git+https://github.com/marin-m/vmlinux-to-elf
Usage:
./vmlinux-to-elf <input_kernel.bin> <output_kernel.elf>
# whereis vmlinux-to-elf
vmlinux-to-elf: /usr/local/bin/vmlinux-to-elf
x# vmlinux-to-elf vmlinuz-5.15.0-122-generic vmlinux_sym
[+] Kernel successfully decompressed in-memory (the offsets that follow will be given relative to the decompressed binary)
[+] Version string: Linux version 5.15.0-122-generic (buildd@lcy02-amd64-034) (gcc (Ubuntu 11.4.0-1ubuntu1~22.04) 11.4.0, GNU ld (GNU Binutils for Ubuntu) 2.38) #132-Ubuntu SMP Thu Aug 29 13:45:52 UTC 2024 (Ubuntu 5.15.0-122.132-generic 5.15.163)
[+] Guessed architecture: x86_64 successfully in 9.65 seconds
[+] Found kallsyms_token_table at file offset 0x017b69d0
[+] Found kallsyms_token_index at file offset 0x017b6d80
[+] Found kallsyms_markers at file offset 0x017b60c0
[+] Found kallsyms_names at file offset 0x015e3c98
[+] Found kallsyms_num_syms at file offset 0x015e3c90
[i] Negative offsets overall: 99.736 %
[i] Null addresses overall: 0.00135036 %
[+] Found kallsyms_offsets at file offset 0x01553250
[+] Successfully wrote the new ELF kernel to vmlinux_sym
# nm vmlinux_sym | grep '\<sys_call_table\>'
ffffffff82200320 D sys_call_table
# cat /boot/System.map-5.15.0-122-generic | grep '\<sys_call_table\>'
ffffffff82200320 D sys_call_table
http://www.lryc.cn/news/442096.html

相关文章:

  • 【mac】MacOS无法打开XXX文件,因为无法验证开发者的问题解决
  • Docker 无法拉取雷池 WAF 的解决方法
  • 进制转换,原码,反码,补码,二进制位运算及应用
  • node.js居家养老服务系统—计算机毕业设计源码35247
  • OpenHarmony(鸿蒙南向开发)——小型系统芯片移植指南(二)
  • Live800:从心出发,以情动人:构建深度客户服务文化
  • 分布式事务一致性:本地消息表设计与实践
  • 深入浅出Docker
  • Flink 与 Kubernetes (K8s)、YARN 和 Mesos集成对比
  • Python 集合的魔法:解锁高效数据处理的秘密
  • Go必知必会:构建复杂数据模型的基石
  • 大数据Flink(一百一十七):Flink SQL的窗口操作
  • 【西电电装实习】6. 手装无人机的蓝牙断连debug
  • AIGC实战之如何构建出更好的大模型RAG系统
  • 【数据结构-差分】力扣1589. 所有排列中的最大和
  • Spark部署文档
  • Broadcast:Android中实现组件及进程间通信
  • 5分钟熟练上手ES的具体使用
  • lambda 自调用递归
  • mac中git操作账号的删除
  • AI Agent的20个趋势洞察
  • Spring Boot-定时任务问题
  • 从混乱到清晰!借助Kimi掌握螺旋型论文结构的秘诀!
  • 中国电子学会202306青少年软件编程(Python)等级考试试卷(二级)真题
  • 样本册3D翻页电子版和印刷版同时拥有是一种什么体验
  • 8586 括号匹配检验
  • 案例精选 | 聚铭助力河北省某市公安局筑牢网络安全防护屏障
  • VBS学习2:问题解决(文件中含义中文运行报错或者中文乱码)
  • 首次揭秘行业内幕!范罗士、希喂、有哈、小米、安德迈宠物空气净化器实测分析
  • 1267:【例9.11】01背包问题(信奥一本通)