[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230809143409.5rs4jjvgsk64np6h@treble>
Date: Wed, 9 Aug 2023 10:34:09 -0400
From: Josh Poimboeuf <jpoimboe@...nel.org>
To: Peter Zijlstra <peterz@...radead.org>
Cc: x86@...nel.org, linux-kernel@...r.kernel.org, David.Kaplan@....com,
Andrew.Cooper3@...rix.com, gregkh@...uxfoundation.org
Subject: Re: [RFC][PATCH 13/17] objtool/x86: Add arch_is_offset_insn()
On Wed, Aug 09, 2023 at 09:12:31AM +0200, Peter Zijlstra wrote:
> Add a little wrappery to identify the magic symbols that are actually
> inside another instruction -- yay for variable length instruction
> encoding.
>
> Signed-off-by: Peter Zijlstra (Intel) <peterz@...radead.org>
> ---
> tools/objtool/arch/x86/decode.c | 6 ++++++
> tools/objtool/check.c | 13 ++++++++++---
> tools/objtool/include/objtool/arch.h | 1 +
> tools/objtool/include/objtool/elf.h | 1 +
> 4 files changed, 18 insertions(+), 3 deletions(-)
>
> --- a/tools/objtool/arch/x86/decode.c
> +++ b/tools/objtool/arch/x86/decode.c
> @@ -826,3 +826,9 @@ bool arch_is_rethunk(struct symbol *sym)
> {
> return !strcmp(sym->name, "__x86_return_thunk");
> }
> +
> +bool arch_is_offset_insn(struct symbol *sym)
> +{
> + return !strcmp(sym->name, "zen_return_thunk") ||
> + !strcmp(sym->name, "srso_safe_ret");
> +}
arch_is_embedded_in_insn()?
--
Josh
Powered by blists - more mailing lists