[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20200325084203.17005-8-jthierry@redhat.com>
Date: Wed, 25 Mar 2020 08:42:00 +0000
From: Julien Thierry <jthierry@...hat.com>
To: linux-kernel@...r.kernel.org
Cc: jpoimboe@...hat.com, peterz@...radead.org, raphael.gault@....com,
Julien Thierry <jthierry@...hat.com>
Subject: [PATCH 07/10] objtool: check: Allow save/restore hint in non standard function symbols
The kernel code base provides CODE_SYM_START/END to declare assembly
code sequences that don't follow function standard calling conventions.
As non-C/non-standard code, these sequences can very much benefit from
unwind hints. However, when a restore unwind_hint is used in a
non-function code sequence, objtool will crash when looking for the
corresponding save hint.
Record the code symbol an instruction belongs to and look for save hints
belonging to the same code symbol as the restore hint.
Signed-off-by: Julien Thierry <jthierry@...hat.com>
---
tools/objtool/check.c | 27 +++++++++++++++++++--------
tools/objtool/check.h | 1 +
2 files changed, 20 insertions(+), 8 deletions(-)
diff --git a/tools/objtool/check.c b/tools/objtool/check.c
index 7bf4dbc2e31f..90d3db00352d 100644
--- a/tools/objtool/check.c
+++ b/tools/objtool/check.c
@@ -236,7 +236,7 @@ static void clear_insn_state(struct insn_state *state)
static int decode_instructions(struct objtool_file *file)
{
struct section *sec;
- struct symbol *func;
+ struct symbol *sym;
unsigned long offset;
struct instruction *insn;
int ret;
@@ -276,18 +276,22 @@ static int decode_instructions(struct objtool_file *file)
list_add_tail(&insn->list, &file->insn_list);
}
- list_for_each_entry(func, &sec->symbol_list, list) {
- if (func->type != STT_FUNC || func->alias != func)
+ list_for_each_entry(sym, &sec->symbol_list, list) {
+ if ((sym->type != STT_FUNC && sym->type != STT_NOTYPE) ||
+ sym->alias != sym)
continue;
- if (!find_insn(file, sec, func->offset)) {
+ if (!find_insn(file, sec, sym->offset)) {
WARN("%s(): can't find starting instruction",
- func->name);
+ sym->name);
return -1;
}
- func_for_each_insn(file, func, insn)
- insn->func = func;
+ func_for_each_insn(file, sym, insn) {
+ insn->code_sym = sym;
+ if (sym->type == STT_FUNC)
+ insn->func = sym;
+ }
}
}
@@ -771,6 +775,7 @@ static int handle_group_alt(struct objtool_file *file,
fake_jump->type = INSN_JUMP_UNCONDITIONAL;
fake_jump->jump_dest = list_next_entry(last_orig_insn, list);
fake_jump->func = orig_insn->func;
+ fake_jump->code_sym = orig_insn->code_sym;
}
if (!special_alt->new_len) {
@@ -2043,9 +2048,15 @@ static int validate_branch(struct objtool_file *file, struct symbol *func,
if (insn->restore) {
struct instruction *save_insn, *i;
+ if (!insn->code_sym) {
+ WARN_FUNC("restore instruction doesn't belong to any symbol",
+ insn->sec, insn->offset);
+ return 1;
+ }
+
i = insn;
save_insn = NULL;
- func_for_each_insn_continue_reverse(file, func, i) {
+ func_for_each_insn_continue_reverse(file, insn->code_sym, i) {
if (i->save) {
save_insn = i;
break;
diff --git a/tools/objtool/check.h b/tools/objtool/check.h
index 6d875ca6fce0..0cfdad839b76 100644
--- a/tools/objtool/check.h
+++ b/tools/objtool/check.h
@@ -42,6 +42,7 @@ struct instruction {
struct rela *jump_table;
struct list_head alts;
struct symbol *func;
+ struct symbol *code_sym;
struct stack_op stack_op;
struct insn_state state;
struct orc_entry orc;
--
2.21.1
Powered by blists - more mailing lists