Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp869530ybl; Fri, 16 Aug 2019 05:25:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqwOCN9gkss+x0SFjpBSGFE38mQK63My8rhyNJ5dzntoY3KF9t50ZpNbkyRLmPd3p+Qhk3p7 X-Received: by 2002:a63:e44b:: with SMTP id i11mr7368830pgk.297.1565958353276; Fri, 16 Aug 2019 05:25:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565958353; cv=none; d=google.com; s=arc-20160816; b=ffEbnxNJTam2oP4c+aooRwNWbCS/zhMjWt+UIoDl8wmHFNbZ0SIBpflS4VE/89iJmR wl8yc52bj0DXz4wc/eZVG0Sx5AU+x09gSyrvYrAELVKaMv0HMoN9krecyjwaiumSM1C8 G3OogG8FbRX/c75mcH7VlZ7Ok8/h5ZnC42WTiF53Zb+Tq6E1lVH7Q5ioZcXNYflBSwDe IXp4TrB39WsyiPuY4AsT4AuQMsZRQUWIoGHVrWjtnp9vlk3jCSveEIh1OeMkjXakr880 D9HPk7gtqyBsDFhZ/XbYmB28Dx+M9Q6W5gM3aerf361to1aqS/9Byu0mgiwwzUr+P19S 6ccQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=hDZM7s5yn6htild4KGL1xxK2cGJItR5yPOQILReNusk=; b=CNNExzA9M264jcVK737w5mnXHDtUjcXkzrKMaXC2bI+q4Pl0CX21nAlCB7faVxBKCL vbENaVtsETB1BGYgnJXQWBxFJOIMBMdd2IxOcfbt4ocyVrlR5u8wnX/xZ0bS/coXGFQi SdVXRwDNLfI8RdPDv5odE56XYOCD/uo8YMXHXKBc9ILkuYvWh+cALz01wJ6/vALe8nOr iTAzwbQgNFEw1Uy+LoBJQqpnNFoQTxjXyMyu0axv6/wHVjktIjMgL0DtZGgtDTYpBvHA 7A33/8sy0DfFL7jD5Vg0jkvYpe+9L60baDpozOL6gOq/icULO5CBmo90Ogl76GElAXu5 ytXw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n124si3728099pga.214.2019.08.16.05.25.35; Fri, 16 Aug 2019 05:25:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727329AbfHPMYt (ORCPT + 99 others); Fri, 16 Aug 2019 08:24:49 -0400 Received: from foss.arm.com ([217.140.110.172]:55796 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727315AbfHPMYr (ORCPT ); Fri, 16 Aug 2019 08:24:47 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 147AC360; Fri, 16 Aug 2019 05:24:47 -0700 (PDT) Received: from e121650-lin.cambridge.arm.com (e121650-lin.cambridge.arm.com [10.1.196.120]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id CF0CD3F706; Fri, 16 Aug 2019 05:24:45 -0700 (PDT) From: Raphael Gault To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, jpoimboe@redhat.com Cc: peterz@infradead.org, catalin.marinas@arm.com, will.deacon@arm.com, julien.thierry.kdev@gmail.com, raph.gault+kdev@gmail.com, Raphael Gault Subject: [RFC v4 05/18] objtool: special: Adapt special section handling Date: Fri, 16 Aug 2019 13:23:50 +0100 Message-Id: <20190816122403.14994-6-raphael.gault@arm.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20190816122403.14994-1-raphael.gault@arm.com> References: <20190816122403.14994-1-raphael.gault@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch abstracts the few architecture dependent tests that are perform when handling special section and switch tables. It enables any architecture to ignore a particular CPU feature or not to handle switch tables. Signed-off-by: Raphael Gault --- tools/objtool/arch/arm64/Build | 1 + tools/objtool/arch/arm64/arch_special.c | 22 +++++++++++++++ .../objtool/arch/arm64/include/arch_special.h | 10 +++++-- tools/objtool/arch/x86/Build | 1 + tools/objtool/arch/x86/arch_special.c | 28 +++++++++++++++++++ tools/objtool/arch/x86/include/arch_special.h | 9 ++++++ tools/objtool/check.c | 24 ++++++++++++++-- tools/objtool/special.c | 9 ++---- tools/objtool/special.h | 3 ++ 9 files changed, 96 insertions(+), 11 deletions(-) create mode 100644 tools/objtool/arch/arm64/arch_special.c create mode 100644 tools/objtool/arch/x86/arch_special.c diff --git a/tools/objtool/arch/arm64/Build b/tools/objtool/arch/arm64/Build index bf7a32c2b9e9..3d09be745a84 100644 --- a/tools/objtool/arch/arm64/Build +++ b/tools/objtool/arch/arm64/Build @@ -1,3 +1,4 @@ +objtool-y += arch_special.o objtool-y += decode.o objtool-y += orc_dump.o objtool-y += orc_gen.o diff --git a/tools/objtool/arch/arm64/arch_special.c b/tools/objtool/arch/arm64/arch_special.c new file mode 100644 index 000000000000..a21d28876317 --- /dev/null +++ b/tools/objtool/arch/arm64/arch_special.c @@ -0,0 +1,22 @@ +/* + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, see . + */ +#include "../../special.h" +#include "arch_special.h" + +void arch_force_alt_path(unsigned short feature, + bool uaccess, + struct special_alt *alt) +{ +} diff --git a/tools/objtool/arch/arm64/include/arch_special.h b/tools/objtool/arch/arm64/include/arch_special.h index 63da775d0581..185103be8a51 100644 --- a/tools/objtool/arch/arm64/include/arch_special.h +++ b/tools/objtool/arch/arm64/include/arch_special.h @@ -30,7 +30,13 @@ #define ALT_ORIG_LEN_OFFSET 10 #define ALT_NEW_LEN_OFFSET 11 -#define X86_FEATURE_POPCNT (4 * 32 + 23) -#define X86_FEATURE_SMAP (9 * 32 + 20) +static inline bool arch_should_ignore_feature(unsigned short feature) +{ + return false; +} +static inline bool arch_support_switch_table(void) +{ + return false; +} #endif /* _ARM64_ARCH_SPECIAL_H */ diff --git a/tools/objtool/arch/x86/Build b/tools/objtool/arch/x86/Build index 1f11b45999d0..63e167775bc8 100644 --- a/tools/objtool/arch/x86/Build +++ b/tools/objtool/arch/x86/Build @@ -1,3 +1,4 @@ +objtool-y += arch_special.o objtool-y += decode.o objtool-y += orc_dump.o objtool-y += orc_gen.o diff --git a/tools/objtool/arch/x86/arch_special.c b/tools/objtool/arch/x86/arch_special.c new file mode 100644 index 000000000000..6583a1770bb2 --- /dev/null +++ b/tools/objtool/arch/x86/arch_special.c @@ -0,0 +1,28 @@ +/* + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, see . + */ +#include "../../special.h" +#include "arch_special.h" + +void arch_force_alt_path(unsigned short feature, + bool uaccess, + struct special_alt *alt) +{ + if (feature == X86_FEATURE_SMAP) { + if (uaccess) + alt->skip_orig = true; + else + alt->skip_alt = true; + } +} diff --git a/tools/objtool/arch/x86/include/arch_special.h b/tools/objtool/arch/x86/include/arch_special.h index 424ce47013e3..fce2b1193194 100644 --- a/tools/objtool/arch/x86/include/arch_special.h +++ b/tools/objtool/arch/x86/include/arch_special.h @@ -33,4 +33,13 @@ #define X86_FEATURE_POPCNT (4 * 32 + 23) #define X86_FEATURE_SMAP (9 * 32 + 20) +static inline bool arch_should_ignore_feature(unsigned short feature) +{ + return feature == X86_FEATURE_POPCNT; +} + +static inline bool arch_support_switch_table(void) +{ + return true; +} #endif /* _X86_ARCH_SPECIAL_H */ diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 30e147391dcb..4af6422d3428 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -729,7 +729,7 @@ static int handle_group_alt(struct objtool_file *file, last_orig_insn = insn; } - if (next_insn_same_sec(file, last_orig_insn)) { + if (last_orig_insn && next_insn_same_sec(file, last_orig_insn)) { fake_jump = malloc(sizeof(*fake_jump)); if (!fake_jump) { WARN("malloc failed"); @@ -1061,6 +1061,26 @@ static struct rela *find_jump_table(struct objtool_file *file, table_rela = find_rela_by_dest(table_sec, table_offset); if (!table_rela) continue; + /* + * If we are on arm64 architecture, we now that we + * are in presence of a switch table thanks to + * the `br ` insn. but we can't retrieve it yet. + * So we just ignore unreachable for this file. + */ + if (!arch_support_switch_table()) { + file->ignore_unreachables = true; + return NULL; + } + + rodata_rela = find_rela_by_dest(rodata_sec, table_offset); + if (rodata_rela) { + /* + * Use of RIP-relative switch jumps is quite rare, and + * indicates a rare GCC quirk/bug which can leave dead + * code behind. + */ + if (text_rela->type == R_X86_64_PC32) + file->ignore_unreachables = true; /* * Use of RIP-relative switch jumps is quite rare, and @@ -1864,7 +1884,7 @@ static int validate_branch(struct objtool_file *file, struct symbol *func, insn = first; sec = insn->sec; - if (insn->alt_group && list_empty(&insn->alts)) { + if (!insn->visited && insn->alt_group && list_empty(&insn->alts)) { WARN_FUNC("don't know how to handle branch to middle of alternative instruction group", sec, insn->offset); return 1; diff --git a/tools/objtool/special.c b/tools/objtool/special.c index b8ccee1b5382..7a0092d6e5b3 100644 --- a/tools/objtool/special.c +++ b/tools/objtool/special.c @@ -81,7 +81,7 @@ static int get_alt_entry(struct elf *elf, struct special_entry *entry, * feature path which is a "very very small percentage of * machines". */ - if (feature == X86_FEATURE_POPCNT) + if (arch_should_ignore_feature(feature)) alt->skip_orig = true; /* @@ -93,12 +93,7 @@ static int get_alt_entry(struct elf *elf, struct special_entry *entry, * find paths that see the STAC but take the NOP instead of * CLAC and the other way around. */ - if (feature == X86_FEATURE_SMAP) { - if (uaccess) - alt->skip_orig = true; - else - alt->skip_alt = true; - } + arch_force_alt_path(feature, uaccess, alt); } orig_rela = find_rela_by_dest(sec, offset + entry->orig); diff --git a/tools/objtool/special.h b/tools/objtool/special.h index 35061530e46e..90626a7e41cf 100644 --- a/tools/objtool/special.h +++ b/tools/objtool/special.h @@ -27,5 +27,8 @@ struct special_alt { }; int special_get_alts(struct elf *elf, struct list_head *alts); +void arch_force_alt_path(unsigned short feature, + bool uaccess, + struct special_alt *alt); #endif /* _SPECIAL_H */ -- 2.17.1