[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20210120173800.1660730-14-jthierry@redhat.com>
Date: Wed, 20 Jan 2021 18:37:56 +0100
From: Julien Thierry <jthierry@...hat.com>
To: linux-kernel@...r.kernel.org, linux-arm-kernel@...ts.infradead.org
Cc: catalin.marinas@....com, will@...nel.org, ardb@...nel.org,
masahiroy@...nel.org, keescook@...omium.org,
michal.lkml@...kovi.net, jpoimboe@...hat.com, peterz@...radead.org,
mark.rutland@....com, broonie@...nel.org,
linux-efi@...r.kernel.org, linux-hardening@...r.kernel.org,
Julien Thierry <jthierry@...hat.com>,
Raphael Gault <raphael.gault@....com>
Subject: [RFC PATCH 13/17] objtool: arm64: Implement functions to add switch tables alternatives
This patch implements the functions required to identify and add as
alternatives all the possible destinations of the switch table.
This implementation relies on the new plugin introduced previously which
records information about the switch-table in a
.discard.switch_table_information section.
Signed-off-by: Raphael Gault <raphael.gault@....com>
[J.T.: Update arch implementation to new prototypes,
Update switch table information section name,
Do some clean up,
Use the offset sign information,
Use the newly added rela to find the corresponding jump instruction]
Signed-off-by: Julien Thierry <jthierry@...hat.com>
---
.../objtool/arch/arm64/include/arch/special.h | 2 +
tools/objtool/arch/arm64/special.c | 85 +++++++++++++++++++
2 files changed, 87 insertions(+)
diff --git a/tools/objtool/arch/arm64/include/arch/special.h b/tools/objtool/arch/arm64/include/arch/special.h
index a82a9b3e51df..b96bcee308cf 100644
--- a/tools/objtool/arch/arm64/include/arch/special.h
+++ b/tools/objtool/arch/arm64/include/arch/special.h
@@ -3,6 +3,8 @@
#ifndef _ARM64_ARCH_SPECIAL_H
#define _ARM64_ARCH_SPECIAL_H
+#include <linux/types.h>
+
#define EX_ENTRY_SIZE 8
#define EX_ORIG_OFFSET 0
#define EX_NEW_OFFSET 4
diff --git a/tools/objtool/arch/arm64/special.c b/tools/objtool/arch/arm64/special.c
index 45f283283091..396b9c5feebd 100644
--- a/tools/objtool/arch/arm64/special.c
+++ b/tools/objtool/arch/arm64/special.c
@@ -1,6 +1,26 @@
// SPDX-License-Identifier: GPL-2.0-or-later
+#include <stdlib.h>
+#include <string.h>
+
+#include <asm/aarch64-insn.h>
+
#include <objtool/special.h>
+#include <objtool/warn.h>
+#include <arch/special.h>
+
+/*
+ * The arm64_switch_table_detection_plugin generate an array of elements
+ * described by the following structure.
+ * Each jump table found in the compilation unit is associated with one of
+ * entries of the array.
+ */
+struct switch_table_info {
+ u64 padding;
+ u64 jump_ref;
+ u64 nb_entries;
+ u64 dest_relocations[];
+} __attribute__((__packed__));
void arch_handle_alternative(unsigned short feature, struct special_alt *alt)
{
@@ -14,8 +34,73 @@ bool arch_support_alt_relocation(struct special_alt *special_alt,
}
+/*
+ * Aarch64 jump tables are just arrays of offsets (of varying size/signess)
+ * representing the potential destination from a base address loaded by an adr
+ * instruction.
+ *
+ * Sadly, extracting the actual offset might require to consider multiple
+ * instructions and decoding them to understand what they do. To make life
+ * easier, the gcc plugin will generate a list of relocation entries for
+ * each jump table target, conforming to the format expected by
+ * add_jump_table().
+ *
+ * Aarch64 branches to jump tables are composed of multiple instructions:
+ *
+ * ldr<?> x_offset, [x_offsets_table, x_index, ...]
+ * adr x_dest_base, <addr>
+ * add x_dest, x_target_base, x_offset, ...
+ * br x_dest
+ *
+ * The arm64_switch_table_detection_plugin will make the connection between
+ * the instruction setting x_offsets_table (jump_ref) and the list of
+ * relocations.
+ */
struct reloc *arch_find_switch_table(struct objtool_file *file,
struct instruction *insn)
{
+ struct switch_table_info *sti;
+ struct section *table_info_sec;
+ void *sti_sec_start;
+ struct reloc *text_reloc;
+
+ table_info_sec = find_section_by_name(file->elf,
+ ".discard.switch_table_info");
+ if (!table_info_sec)
+ goto try_c_jmptbl;
+
+ sti_sec_start = table_info_sec->data->d_buf;
+ sti = sti_sec_start;
+
+ while ((char *)sti - (char *)sti_sec_start < table_info_sec->len) {
+ struct reloc *target_reloc = find_reloc_by_dest(file->elf,
+ table_info_sec,
+ (char *)&sti->jump_ref - (char *)sti_sec_start);
+
+ if (!target_reloc) {
+ WARN("Malformed switch table entry");
+ return NULL;
+ }
+
+ if (target_reloc->sym->sec == insn->sec &&
+ target_reloc->addend == insn->offset)
+ return find_reloc_by_dest(file->elf, table_info_sec,
+ (char *)&sti->dest_relocations[0] - (char *)sti_sec_start);
+
+ /* Get next jump table entry */
+ sti = (struct switch_table_info *) (&sti->dest_relocations[0] + sti->nb_entries);
+ }
+
+try_c_jmptbl:
+ text_reloc = find_reloc_by_dest(file->elf, insn->sec, insn->offset);
+ if (!text_reloc || text_reloc->sym->type != STT_SECTION ||
+ !text_reloc->sym->sec->rodata)
+ return NULL;
+
+ /* Handle C jump tables */
+ if (!strcmp(text_reloc->sym->sec->name, C_JUMP_TABLE_SECTION))
+ return find_reloc_by_dest(file->elf, text_reloc->sym->sec,
+ text_reloc->addend);
+
return NULL;
}
--
2.25.4
Powered by blists - more mailing lists