Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp3791599imm; Mon, 8 Oct 2018 09:33:30 -0700 (PDT) X-Google-Smtp-Source: ACcGV62GEeUqJaJ+LnL08qDHAaWjbR6pV4MWHtAeAlufbYd3UuAXN4Php+OmetYyGhlaCYycaptg X-Received: by 2002:a17:902:5602:: with SMTP id h2-v6mr24738773pli.220.1539016410784; Mon, 08 Oct 2018 09:33:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539016410; cv=none; d=google.com; s=arc-20160816; b=a0pVII/S2d2quOeVRZ7nDL42dZO4I5slxexfdREXXDQNli5oEMPDTMxo+yj0w/jrv4 WTNJl/ZVuC8qKa7I4lGi8zCdlOSCPEJ7f9Ob8RIvR+O4m+6Pdra0FIRajKkqiHg54hYz M8tlNvYomGGTbMQRdkEngTvSzm/E5oSkQRUmvA3oy6kJmT8fNazQHnoMoXxzp6cEhDAR 8p67LLiXGOfjky/seWqhb/ZYRu7jpHdTm6u+hYz4HTXh3Fcp31xWvj1KBCgOeSybbNpJ 2wd8XMFLdshzFJMIy4vyFAOgct+9XWmyjxTjq8Nz2UZmQRl8hMpY2I8OYtsFktekP1tv kkgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=PbGj5ZCc9+PReCwRp9J8m0m9Oj0AOrc2twZnbX47FiQ=; b=XaWBf9ozT7QFlEzos7Otyc8yn6AdzHQnR+z49SpHJzc8L0CmYYpLazn5lfANk8Z1ox 5wQNRMC0doQktxiRP/6m8Iy6yMXfl0XSPkEWvlGbOV4q55oOPzUBVGIcwwNZkg5Me54o Igs+OLL+0QQsqliNDzHPcAm9AYpAtZy0b4H5HgNUh1NwngdMyf4qfDQ+Z65FEi+lwm+c AZMYqC3CroUFrwxlY+UQrJlJlLT1Fl9r2AMUEwPLgaW+02imnEXHX29nNivSfl8/w10A hTAkmwWmr1dVS3I6uXzWuLQeruM+W9q+tV+CNSRK38CHXqrpwduByL42P5dEsrz+5T/v TScA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w3-v6si18721566plb.355.2018.10.08.09.33.15; Mon, 08 Oct 2018 09:33:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726559AbeJHXoR convert rfc822-to-8bit (ORCPT + 99 others); Mon, 8 Oct 2018 19:44:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:39754 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726415AbeJHXoR (ORCPT ); Mon, 8 Oct 2018 19:44:17 -0400 Received: from gandalf.local.home (cpe-66-24-56-78.stny.res.rr.com [66.24.56.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 38C912089D; Mon, 8 Oct 2018 16:31:43 +0000 (UTC) Date: Mon, 8 Oct 2018 12:31:40 -0400 From: Steven Rostedt To: Peter Zijlstra Cc: Andy Lutomirski , linux-kernel@vger.kernel.org, Linus Torvalds , Ingo Molnar , Andrew Morton , Thomas Gleixner , Masami Hiramatsu , Mathieu Desnoyers , Matthew Helsley , "Rafael J . Wysocki" , David Woodhouse , Paolo Bonzini , Josh Poimboeuf , Jason Baron , Jiri Kosina , ard.biesheuvel@linaro.org, Andy Lutomirski Subject: Re: [POC][RFC][PATCH 1/2] jump_function: Addition of new feature "jump_function" Message-ID: <20181008123140.666fa405@gandalf.local.home> In-Reply-To: <20181008155757.GC5663@hirez.programming.kicks-ass.net> References: <20181006015110.653946300@goodmis.org> <20181006015720.634688468@goodmis.org> <20181006121211.GA5663@hirez.programming.kicks-ass.net> <20181006093905.46276505@vmware.local.home> <20181008072134.GB5663@hirez.programming.kicks-ass.net> <20181008155757.GC5663@hirez.programming.kicks-ass.net> X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 8 Oct 2018 17:57:57 +0200 Peter Zijlstra wrote: > On Mon, Oct 08, 2018 at 01:33:14AM -0700, Andy Lutomirski wrote: > > > Can't we hijack the relocation records for these functions before they > > > get thrown out in the (final) link pass or something? > > > > I could be talking out my arse here, but I thought we could do this, > > too, then changed my mind. The relocation records give us the > > location of the call or jump operand, but they don’t give the address > > of the beginning of the instruction. > > But that's like 1 byte before the operand, right? We could even double check > this by reading back that byte and ensuring it is in fact 0xE8 (CALL). > > AFAICT there is only the _1_ CALL encoding, and that is the 5 byte: E8 , > so if we have the PLT32 location, we also have the instruction location. Or am > I missing something? Yes, this is exactly what I was thinking of doing. All we need to do is have objtool (or a modification of whatever we come up with), to find the call sites of a specific function (we can have a table to look up for), that creates a section listing all these call sites, and on boot up, we can confirm that they are indeed calls (e8 operations). -- Steve