check.c 99.3 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0-or-later
2 3 4 5 6 7
/*
 * Copyright (C) 2015-2017 Josh Poimboeuf <jpoimboe@redhat.com>
 */

#include <string.h>
#include <stdlib.h>
8
#include <inttypes.h>
P
Peter Zijlstra 已提交
9
#include <sys/mman.h>
10

11 12 13 14 15 16 17 18
#include <arch/elf.h>
#include <objtool/builtin.h>
#include <objtool/cfi.h>
#include <objtool/arch.h>
#include <objtool/check.h>
#include <objtool/special.h>
#include <objtool/warn.h>
#include <objtool/endianness.h>
19

20
#include <linux/objtool.h>
21 22
#include <linux/hashtable.h>
#include <linux/kernel.h>
23
#include <linux/static_call_types.h>
24 25 26 27

struct alternative {
	struct list_head list;
	struct instruction *insn;
P
Peter Zijlstra 已提交
28
	bool skip_orig;
29 30
};

P
Peter Zijlstra 已提交
31 32 33 34 35
static unsigned long nr_cfi, nr_cfi_reused, nr_cfi_cache;

static struct cfi_init_state initial_func_cfi;
static struct cfi_state init_cfi;
static struct cfi_state func_cfi;
36

37 38
struct instruction *find_insn(struct objtool_file *file,
			      struct section *sec, unsigned long offset)
39 40 41
{
	struct instruction *insn;

42
	hash_for_each_possible(file->insn_hash, insn, hash, sec_offset_hash(sec, offset)) {
43 44
		if (insn->sec == sec && insn->offset == offset)
			return insn;
45
	}
46 47 48 49 50 51 52 53 54

	return NULL;
}

static struct instruction *next_insn_same_sec(struct objtool_file *file,
					      struct instruction *insn)
{
	struct instruction *next = list_next_entry(insn, list);

55
	if (!next || &next->list == &file->insn_list || next->sec != insn->sec)
56 57 58 59 60
		return NULL;

	return next;
}

61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
static struct instruction *next_insn_same_func(struct objtool_file *file,
					       struct instruction *insn)
{
	struct instruction *next = list_next_entry(insn, list);
	struct symbol *func = insn->func;

	if (!func)
		return NULL;

	if (&next->list != &file->insn_list && next->func == func)
		return next;

	/* Check if we're already in the subfunction: */
	if (func == func->cfunc)
		return NULL;

	/* Move to the subfunction: */
	return find_insn(file, func->cfunc->sec, func->cfunc->offset);
}

81 82 83 84 85 86 87 88 89 90 91
static struct instruction *prev_insn_same_sym(struct objtool_file *file,
					       struct instruction *insn)
{
	struct instruction *prev = list_prev_entry(insn, list);

	if (&prev->list != &file->insn_list && prev->func == insn->func)
		return prev;

	return NULL;
}

92
#define func_for_each_insn(file, func, insn)				\
93 94 95 96
	for (insn = find_insn(file, func->sec, func->offset);		\
	     insn;							\
	     insn = next_insn_same_func(file, insn))

97 98
#define sym_for_each_insn(file, sym, insn)				\
	for (insn = find_insn(file, sym->sec, sym->offset);		\
99
	     insn && &insn->list != &file->insn_list &&			\
100 101
		insn->sec == sym->sec &&				\
		insn->offset < sym->offset + sym->len;			\
102 103
	     insn = list_next_entry(insn, list))

104
#define sym_for_each_insn_continue_reverse(file, sym, insn)		\
105 106
	for (insn = list_prev_entry(insn, list);			\
	     &insn->list != &file->insn_list &&				\
107
		insn->sec == sym->sec && insn->offset >= sym->offset;	\
108 109 110 111 112
	     insn = list_prev_entry(insn, list))

#define sec_for_each_insn_from(file, insn)				\
	for (; insn; insn = next_insn_same_sec(file, insn))

113 114 115
#define sec_for_each_insn_continue(file, insn)				\
	for (insn = next_insn_same_sec(file, insn); insn;		\
	     insn = next_insn_same_sec(file, insn))
116

117 118 119 120 121 122 123 124 125 126 127 128
static bool is_jump_table_jump(struct instruction *insn)
{
	struct alt_group *alt_group = insn->alt_group;

	if (insn->jump_table)
		return true;

	/* Retpoline alternative for a jump table? */
	return alt_group && alt_group->orig_group &&
	       alt_group->orig_group->first_insn->jump_table;
}

129 130
static bool is_sibling_call(struct instruction *insn)
{
131 132 133 134 135 136 137 138
	/*
	 * Assume only ELF functions can make sibling calls.  This ensures
	 * sibling call detection consistency between vmlinux.o and individual
	 * objects.
	 */
	if (!insn->func)
		return false;

139 140
	/* An indirect jump is either a sibling call or a jump to a table. */
	if (insn->type == INSN_JUMP_DYNAMIC)
141
		return !is_jump_table_jump(insn);
142 143

	/* add_jump_destinations() sets insn->call_dest for sibling calls. */
144
	return (is_static_jump(insn) && insn->call_dest);
145 146
}

147 148 149 150 151 152 153 154 155
/*
 * This checks to see if the given function is a "noreturn" function.
 *
 * For global functions which are outside the scope of this object file, we
 * have to keep a manual list of them.
 *
 * For local functions, we have to detect them manually by simply looking for
 * the lack of a return instruction.
 */
156 157
static bool __dead_end_function(struct objtool_file *file, struct symbol *func,
				int recursion)
158 159 160 161 162 163 164
{
	int i;
	struct instruction *insn;
	bool empty = true;

	/*
	 * Unfortunately these have to be hard coded because the noreturn
165
	 * attribute isn't provided in ELF data. Keep 'em sorted.
166 167
	 */
	static const char * const global_noreturns[] = {
168 169 170
		"__invalid_creds",
		"__module_put_and_kthread_exit",
		"__reiserfs_panic",
171
		"__stack_chk_fail",
172 173 174
		"__ubsan_handle_builtin_unreachable",
		"cpu_bringup_and_idle",
		"cpu_startup_entry",
175
		"do_exit",
176
		"do_group_exit",
177
		"do_task_dead",
178 179
		"ex_handler_msr_mce",
		"fortify_panic",
180
		"kthread_complete_and_exit",
181 182
		"kthread_exit",
		"kunit_try_catch_throw",
183
		"lbug_with_loc",
184
		"machine_real_restart",
185 186
		"make_task_dead",
		"panic",
187
		"rewind_stack_and_make_dead",
188 189
		"sev_es_terminate",
		"snp_abort",
190
		"stop_this_cpu",
191 192
		"usercopy_abort",
		"xen_start_kernel",
193 194
	};

195 196 197
	if (!func)
		return false;

198
	if (func->bind == STB_WEAK)
199
		return false;
200 201 202 203

	if (func->bind == STB_GLOBAL)
		for (i = 0; i < ARRAY_SIZE(global_noreturns); i++)
			if (!strcmp(func->name, global_noreturns[i]))
204
				return true;
205

206
	if (!func->len)
207
		return false;
208

209 210
	insn = find_insn(file, func->sec, func->offset);
	if (!insn->func)
211
		return false;
212

213
	func_for_each_insn(file, func, insn) {
214 215 216
		empty = false;

		if (insn->type == INSN_RETURN)
217
			return false;
218 219 220
	}

	if (empty)
221
		return false;
222 223 224 225 226 227

	/*
	 * A function can have a sibling call instead of a return.  In that
	 * case, the function's dead-end status depends on whether the target
	 * of the sibling call returns.
	 */
228
	func_for_each_insn(file, func, insn) {
229
		if (is_sibling_call(insn)) {
230 231 232 233
			struct instruction *dest = insn->jump_dest;

			if (!dest)
				/* sibling call to another file */
234
				return false;
235

236 237 238 239 240 241 242 243
			/* local sibling call */
			if (recursion == 5) {
				/*
				 * Infinite recursion: two functions have
				 * sibling calls to each other.  This is a very
				 * rare case.  It means they aren't dead ends.
				 */
				return false;
244 245
			}

246 247
			return __dead_end_function(file, dest->func, recursion+1);
		}
248 249
	}

250
	return true;
251 252
}

253
static bool dead_end_function(struct objtool_file *file, struct symbol *func)
254 255 256 257
{
	return __dead_end_function(file, func, 0);
}

258
static void init_cfi_state(struct cfi_state *cfi)
259 260 261
{
	int i;

262
	for (i = 0; i < CFI_NUM_REGS; i++) {
263 264
		cfi->regs[i].base = CFI_UNDEFINED;
		cfi->vals[i].base = CFI_UNDEFINED;
265
	}
266 267 268 269 270
	cfi->cfa.base = CFI_UNDEFINED;
	cfi->drap_reg = CFI_UNDEFINED;
	cfi->drap_offset = -1;
}

271 272
static void init_insn_state(struct objtool_file *file, struct insn_state *state,
			    struct section *sec)
273 274 275
{
	memset(state, 0, sizeof(*state));
	init_cfi_state(&state->cfi);
276 277 278 279 280 281

	/*
	 * We need the full vmlinux for noinstr validation, otherwise we can
	 * not correctly determine insn->call_dest->sec (external symbols do
	 * not have a section).
	 */
282
	if (opts.link && opts.noinstr && sec)
283
		state->noinstr = sec->noinstr;
284 285
}

P
Peter Zijlstra 已提交
286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347
static struct cfi_state *cfi_alloc(void)
{
	struct cfi_state *cfi = calloc(sizeof(struct cfi_state), 1);
	if (!cfi) {
		WARN("calloc failed");
		exit(1);
	}
	nr_cfi++;
	return cfi;
}

static int cfi_bits;
static struct hlist_head *cfi_hash;

static inline bool cficmp(struct cfi_state *cfi1, struct cfi_state *cfi2)
{
	return memcmp((void *)cfi1 + sizeof(cfi1->hash),
		      (void *)cfi2 + sizeof(cfi2->hash),
		      sizeof(struct cfi_state) - sizeof(struct hlist_node));
}

static inline u32 cfi_key(struct cfi_state *cfi)
{
	return jhash((void *)cfi + sizeof(cfi->hash),
		     sizeof(*cfi) - sizeof(cfi->hash), 0);
}

static struct cfi_state *cfi_hash_find_or_add(struct cfi_state *cfi)
{
	struct hlist_head *head = &cfi_hash[hash_min(cfi_key(cfi), cfi_bits)];
	struct cfi_state *obj;

	hlist_for_each_entry(obj, head, hash) {
		if (!cficmp(cfi, obj)) {
			nr_cfi_cache++;
			return obj;
		}
	}

	obj = cfi_alloc();
	*obj = *cfi;
	hlist_add_head(&obj->hash, head);

	return obj;
}

static void cfi_hash_add(struct cfi_state *cfi)
{
	struct hlist_head *head = &cfi_hash[hash_min(cfi_key(cfi), cfi_bits)];

	hlist_add_head(&cfi->hash, head);
}

static void *cfi_hash_alloc(unsigned long size)
{
	cfi_bits = max(10, ilog2(size));
	cfi_hash = mmap(NULL, sizeof(struct hlist_head) << cfi_bits,
			PROT_READ|PROT_WRITE,
			MAP_PRIVATE|MAP_ANON, -1, 0);
	if (cfi_hash == (void *)-1L) {
		WARN("mmap fail cfi_hash");
		cfi_hash = NULL;
348
	}  else if (opts.stats) {
P
Peter Zijlstra 已提交
349 350 351 352 353 354 355 356 357
		printf("cfi_bits: %d\n", cfi_bits);
	}

	return cfi_hash;
}

static unsigned long nr_insns;
static unsigned long nr_insns_visited;

358 359 360 361 362 363 364 365 366 367 368 369
/*
 * Call the arch-specific instruction decoder for all the instructions and add
 * them to the global instruction list.
 */
static int decode_instructions(struct objtool_file *file)
{
	struct section *sec;
	struct symbol *func;
	unsigned long offset;
	struct instruction *insn;
	int ret;

370
	for_each_sec(file, sec) {
371 372 373 374

		if (!(sec->sh.sh_flags & SHF_EXECINSTR))
			continue;

375 376 377 378 379
		if (strcmp(sec->name, ".altinstr_replacement") &&
		    strcmp(sec->name, ".altinstr_aux") &&
		    strncmp(sec->name, ".discard.", 9))
			sec->text = true;

380
		if (!strcmp(sec->name, ".noinstr.text") ||
381 382
		    !strcmp(sec->name, ".entry.text") ||
		    !strncmp(sec->name, ".text.__x86.", 12))
383 384
			sec->noinstr = true;

385
		for (offset = 0; offset < sec->sh.sh_size; offset += insn->len) {
386
			insn = malloc(sizeof(*insn));
387 388 389 390
			if (!insn) {
				WARN("malloc failed");
				return -1;
			}
391 392
			memset(insn, 0, sizeof(*insn));
			INIT_LIST_HEAD(&insn->alts);
393
			INIT_LIST_HEAD(&insn->stack_ops);
394
			INIT_LIST_HEAD(&insn->call_node);
395

396 397 398
			insn->sec = sec;
			insn->offset = offset;

399
			ret = arch_decode_instruction(file, sec, offset,
400
						      sec->sh.sh_size - offset,
401
						      &insn->len, &insn->type,
402
						      &insn->immediate,
403
						      &insn->stack_ops);
404
			if (ret)
405
				goto err;
406

P
Peter Zijlstra 已提交
407 408 409 410 411 412 413 414
			/*
			 * By default, "ud2" is a dead end unless otherwise
			 * annotated, because GCC 7 inserts it for certain
			 * divide-by-zero cases.
			 */
			if (insn->type == INSN_BUG)
				insn->dead_end = true;

415
			hash_add(file->insn_hash, &insn->hash, sec_offset_hash(sec, insn->offset));
416
			list_add_tail(&insn->list, &file->insn_list);
P
Peter Zijlstra 已提交
417
			nr_insns++;
418 419 420
		}

		list_for_each_entry(func, &sec->symbol_list, list) {
421
			if (func->type != STT_FUNC || func->alias != func)
422 423 424 425 426 427 428 429
				continue;

			if (!find_insn(file, sec, func->offset)) {
				WARN("%s(): can't find starting instruction",
				     func->name);
				return -1;
			}

430
			sym_for_each_insn(file, func, insn) {
431
				insn->func = func;
432
				if (insn->type == INSN_ENDBR && list_empty(&insn->call_node)) {
433
					if (insn->offset == insn->func->offset) {
434
						list_add_tail(&insn->call_node, &file->endbr_list);
435 436 437 438 439 440
						file->nr_endbr++;
					} else {
						file->nr_endbr_int++;
					}
				}
			}
441 442 443
		}
	}

444
	if (opts.stats)
P
Peter Zijlstra 已提交
445 446
		printf("nr_insns: %lu\n", nr_insns);

447
	return 0;
448 449 450 451

err:
	free(insn);
	return ret;
452 453
}

454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506
/*
 * Read the pv_ops[] .data table to find the static initialized values.
 */
static int add_pv_ops(struct objtool_file *file, const char *symname)
{
	struct symbol *sym, *func;
	unsigned long off, end;
	struct reloc *rel;
	int idx;

	sym = find_symbol_by_name(file->elf, symname);
	if (!sym)
		return 0;

	off = sym->offset;
	end = off + sym->len;
	for (;;) {
		rel = find_reloc_by_dest_range(file->elf, sym->sec, off, end - off);
		if (!rel)
			break;

		func = rel->sym;
		if (func->type == STT_SECTION)
			func = find_symbol_by_offset(rel->sym->sec, rel->addend);

		idx = (rel->offset - sym->offset) / sizeof(unsigned long);

		objtool_pv_add(file, idx, func);

		off = rel->offset + 1;
		if (off > end)
			break;
	}

	return 0;
}

/*
 * Allocate and initialize file->pv_ops[].
 */
static int init_pv_ops(struct objtool_file *file)
{
	static const char *pv_ops_tables[] = {
		"pv_ops",
		"xen_cpu_ops",
		"xen_irq_ops",
		"xen_mmu_ops",
		NULL,
	};
	const char *pv_ops;
	struct symbol *sym;
	int idx, nr;

507
	if (!opts.noinstr)
508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529
		return 0;

	file->pv_ops = NULL;

	sym = find_symbol_by_name(file->elf, "pv_ops");
	if (!sym)
		return 0;

	nr = sym->len / sizeof(unsigned long);
	file->pv_ops = calloc(sizeof(struct pv_state), nr);
	if (!file->pv_ops)
		return -1;

	for (idx = 0; idx < nr; idx++)
		INIT_LIST_HEAD(&file->pv_ops[idx].targets);

	for (idx = 0; (pv_ops = pv_ops_tables[idx]); idx++)
		add_pv_ops(file, pv_ops);

	return 0;
}

530 531 532 533 534
static struct instruction *find_last_insn(struct objtool_file *file,
					  struct section *sec)
{
	struct instruction *insn = NULL;
	unsigned int offset;
535
	unsigned int end = (sec->sh.sh_size > 10) ? sec->sh.sh_size - 10 : 0;
536

537
	for (offset = sec->sh.sh_size - 1; offset >= end && !insn; offset--)
538 539 540 541 542
		insn = find_insn(file, sec, offset);

	return insn;
}

543
/*
544
 * Mark "ud2" instructions and manually annotated dead ends.
545 546 547 548
 */
static int add_dead_ends(struct objtool_file *file)
{
	struct section *sec;
M
Matt Helsley 已提交
549
	struct reloc *reloc;
550 551
	struct instruction *insn;

552 553 554
	/*
	 * Check for manually annotated dead ends.
	 */
555 556
	sec = find_section_by_name(file->elf, ".rela.discard.unreachable");
	if (!sec)
557
		goto reachable;
558

M
Matt Helsley 已提交
559 560
	list_for_each_entry(reloc, &sec->reloc_list, list) {
		if (reloc->sym->type != STT_SECTION) {
561 562 563
			WARN("unexpected relocation symbol type in %s", sec->name);
			return -1;
		}
M
Matt Helsley 已提交
564
		insn = find_insn(file, reloc->sym->sec, reloc->addend);
565 566
		if (insn)
			insn = list_prev_entry(insn, list);
567
		else if (reloc->addend == reloc->sym->sec->sh.sh_size) {
M
Matt Helsley 已提交
568
			insn = find_last_insn(file, reloc->sym->sec);
569
			if (!insn) {
570
				WARN("can't find unreachable insn at %s+0x%" PRIx64,
M
Matt Helsley 已提交
571
				     reloc->sym->sec->name, reloc->addend);
572 573 574
				return -1;
			}
		} else {
575
			WARN("can't find unreachable insn at %s+0x%" PRIx64,
M
Matt Helsley 已提交
576
			     reloc->sym->sec->name, reloc->addend);
577 578 579 580 581 582
			return -1;
		}

		insn->dead_end = true;
	}

583 584 585 586 587 588 589 590 591 592 593
reachable:
	/*
	 * These manually annotated reachable checks are needed for GCC 4.4,
	 * where the Linux unreachable() macro isn't supported.  In that case
	 * GCC doesn't know the "ud2" is fatal, so it generates code as if it's
	 * not a dead end.
	 */
	sec = find_section_by_name(file->elf, ".rela.discard.reachable");
	if (!sec)
		return 0;

M
Matt Helsley 已提交
594 595
	list_for_each_entry(reloc, &sec->reloc_list, list) {
		if (reloc->sym->type != STT_SECTION) {
596 597 598
			WARN("unexpected relocation symbol type in %s", sec->name);
			return -1;
		}
M
Matt Helsley 已提交
599
		insn = find_insn(file, reloc->sym->sec, reloc->addend);
600 601
		if (insn)
			insn = list_prev_entry(insn, list);
602
		else if (reloc->addend == reloc->sym->sec->sh.sh_size) {
M
Matt Helsley 已提交
603
			insn = find_last_insn(file, reloc->sym->sec);
604
			if (!insn) {
605
				WARN("can't find reachable insn at %s+0x%" PRIx64,
M
Matt Helsley 已提交
606
				     reloc->sym->sec->name, reloc->addend);
607 608 609
				return -1;
			}
		} else {
610
			WARN("can't find reachable insn at %s+0x%" PRIx64,
M
Matt Helsley 已提交
611
			     reloc->sym->sec->name, reloc->addend);
612 613 614 615 616 617
			return -1;
		}

		insn->dead_end = false;
	}

618 619 620
	return 0;
}

621 622
static int create_static_call_sections(struct objtool_file *file)
{
623
	struct section *sec;
624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640
	struct static_call_site *site;
	struct instruction *insn;
	struct symbol *key_sym;
	char *key_name, *tmp;
	int idx;

	sec = find_section_by_name(file->elf, ".static_call_sites");
	if (sec) {
		INIT_LIST_HEAD(&file->static_call_list);
		WARN("file already has .static_call_sites section, skipping");
		return 0;
	}

	if (list_empty(&file->static_call_list))
		return 0;

	idx = 0;
641
	list_for_each_entry(insn, &file->static_call_list, call_node)
642 643 644 645 646 647 648 649
		idx++;

	sec = elf_create_section(file->elf, ".static_call_sites", SHF_WRITE,
				 sizeof(struct static_call_site), idx);
	if (!sec)
		return -1;

	idx = 0;
650
	list_for_each_entry(insn, &file->static_call_list, call_node) {
651 652 653 654 655

		site = (struct static_call_site *)sec->data->d_buf + idx;
		memset(site, 0, sizeof(struct static_call_site));

		/* populate reloc for 'addr' */
656 657 658 659
		if (elf_add_reloc_to_insn(file->elf, sec,
					  idx * sizeof(struct static_call_site),
					  R_X86_64_PC32,
					  insn->sec, insn->offset))
660
			return -1;
661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677

		/* find key symbol */
		key_name = strdup(insn->call_dest->name);
		if (!key_name) {
			perror("strdup");
			return -1;
		}
		if (strncmp(key_name, STATIC_CALL_TRAMP_PREFIX_STR,
			    STATIC_CALL_TRAMP_PREFIX_LEN)) {
			WARN("static_call: trampoline name malformed: %s", key_name);
			return -1;
		}
		tmp = key_name + STATIC_CALL_TRAMP_PREFIX_LEN - STATIC_CALL_KEY_PREFIX_LEN;
		memcpy(tmp, STATIC_CALL_KEY_PREFIX_STR, STATIC_CALL_KEY_PREFIX_LEN);

		key_sym = find_symbol_by_name(file->elf, tmp);
		if (!key_sym) {
678
			if (!opts.module) {
679 680 681 682 683 684 685 686 687 688 689 690 691 692
				WARN("static_call: can't find static_call_key symbol: %s", tmp);
				return -1;
			}

			/*
			 * For modules(), the key might not be exported, which
			 * means the module can make static calls but isn't
			 * allowed to change them.
			 *
			 * In that case we temporarily set the key to be the
			 * trampoline address.  This is fixed up in
			 * static_call_add_module().
			 */
			key_sym = insn->call_dest;
693 694 695 696
		}
		free(key_name);

		/* populate reloc for 'key' */
697 698 699 700
		if (elf_add_reloc(file->elf, sec,
				  idx * sizeof(struct static_call_site) + 4,
				  R_X86_64_PC32, key_sym,
				  is_sibling_call(insn) * STATIC_CALL_SITE_TAIL))
701 702 703 704 705 706 707 708
			return -1;

		idx++;
	}

	return 0;
}

709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754
static int create_retpoline_sites_sections(struct objtool_file *file)
{
	struct instruction *insn;
	struct section *sec;
	int idx;

	sec = find_section_by_name(file->elf, ".retpoline_sites");
	if (sec) {
		WARN("file already has .retpoline_sites, skipping");
		return 0;
	}

	idx = 0;
	list_for_each_entry(insn, &file->retpoline_call_list, call_node)
		idx++;

	if (!idx)
		return 0;

	sec = elf_create_section(file->elf, ".retpoline_sites", 0,
				 sizeof(int), idx);
	if (!sec) {
		WARN("elf_create_section: .retpoline_sites");
		return -1;
	}

	idx = 0;
	list_for_each_entry(insn, &file->retpoline_call_list, call_node) {

		int *site = (int *)sec->data->d_buf + idx;
		*site = 0;

		if (elf_add_reloc_to_insn(file->elf, sec,
					  idx * sizeof(int),
					  R_X86_64_PC32,
					  insn->sec, insn->offset)) {
			WARN("elf_add_reloc_to_insn: .retpoline_sites");
			return -1;
		}

		idx++;
	}

	return 0;
}

755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800
static int create_return_sites_sections(struct objtool_file *file)
{
	struct instruction *insn;
	struct section *sec;
	int idx;

	sec = find_section_by_name(file->elf, ".return_sites");
	if (sec) {
		WARN("file already has .return_sites, skipping");
		return 0;
	}

	idx = 0;
	list_for_each_entry(insn, &file->return_thunk_list, call_node)
		idx++;

	if (!idx)
		return 0;

	sec = elf_create_section(file->elf, ".return_sites", 0,
				 sizeof(int), idx);
	if (!sec) {
		WARN("elf_create_section: .return_sites");
		return -1;
	}

	idx = 0;
	list_for_each_entry(insn, &file->return_thunk_list, call_node) {

		int *site = (int *)sec->data->d_buf + idx;
		*site = 0;

		if (elf_add_reloc_to_insn(file->elf, sec,
					  idx * sizeof(int),
					  R_X86_64_PC32,
					  insn->sec, insn->offset)) {
			WARN("elf_add_reloc_to_insn: .return_sites");
			return -1;
		}

		idx++;
	}

	return 0;
}

801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816
static int create_ibt_endbr_seal_sections(struct objtool_file *file)
{
	struct instruction *insn;
	struct section *sec;
	int idx;

	sec = find_section_by_name(file->elf, ".ibt_endbr_seal");
	if (sec) {
		WARN("file already has .ibt_endbr_seal, skipping");
		return 0;
	}

	idx = 0;
	list_for_each_entry(insn, &file->endbr_list, call_node)
		idx++;

817
	if (opts.stats) {
818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852
		printf("ibt: ENDBR at function start: %d\n", file->nr_endbr);
		printf("ibt: ENDBR inside functions:  %d\n", file->nr_endbr_int);
		printf("ibt: superfluous ENDBR:       %d\n", idx);
	}

	if (!idx)
		return 0;

	sec = elf_create_section(file->elf, ".ibt_endbr_seal", 0,
				 sizeof(int), idx);
	if (!sec) {
		WARN("elf_create_section: .ibt_endbr_seal");
		return -1;
	}

	idx = 0;
	list_for_each_entry(insn, &file->endbr_list, call_node) {

		int *site = (int *)sec->data->d_buf + idx;
		*site = 0;

		if (elf_add_reloc_to_insn(file->elf, sec,
					  idx * sizeof(int),
					  R_X86_64_PC32,
					  insn->sec, insn->offset)) {
			WARN("elf_add_reloc_to_insn: .ibt_endbr_seal");
			return -1;
		}

		idx++;
	}

	return 0;
}

853 854
static int create_mcount_loc_sections(struct objtool_file *file)
{
855
	struct section *sec;
856 857 858 859 860 861 862 863 864 865 866 867 868 869 870
	unsigned long *loc;
	struct instruction *insn;
	int idx;

	sec = find_section_by_name(file->elf, "__mcount_loc");
	if (sec) {
		INIT_LIST_HEAD(&file->mcount_loc_list);
		WARN("file already has __mcount_loc section, skipping");
		return 0;
	}

	if (list_empty(&file->mcount_loc_list))
		return 0;

	idx = 0;
871
	list_for_each_entry(insn, &file->mcount_loc_list, call_node)
872 873 874 875 876 877 878
		idx++;

	sec = elf_create_section(file->elf, "__mcount_loc", 0, sizeof(unsigned long), idx);
	if (!sec)
		return -1;

	idx = 0;
879
	list_for_each_entry(insn, &file->mcount_loc_list, call_node) {
880 881 882 883

		loc = (unsigned long *)sec->data->d_buf + idx;
		memset(loc, 0, sizeof(unsigned long));

884 885 886 887
		if (elf_add_reloc_to_insn(file->elf, sec,
					  idx * sizeof(unsigned long),
					  R_X86_64_64,
					  insn->sec, insn->offset))
888 889 890 891 892 893 894 895
			return -1;

		idx++;
	}

	return 0;
}

896 897 898 899 900 901 902 903
/*
 * Warnings shouldn't be reported for ignored functions.
 */
static void add_ignores(struct objtool_file *file)
{
	struct instruction *insn;
	struct section *sec;
	struct symbol *func;
M
Matt Helsley 已提交
904
	struct reloc *reloc;
905

P
Peter Zijlstra 已提交
906 907 908
	sec = find_section_by_name(file->elf, ".rela.discard.func_stack_frame_non_standard");
	if (!sec)
		return;
909

M
Matt Helsley 已提交
910 911
	list_for_each_entry(reloc, &sec->reloc_list, list) {
		switch (reloc->sym->type) {
P
Peter Zijlstra 已提交
912
		case STT_FUNC:
M
Matt Helsley 已提交
913
			func = reloc->sym;
P
Peter Zijlstra 已提交
914 915 916
			break;

		case STT_SECTION:
M
Matt Helsley 已提交
917
			func = find_func_by_offset(reloc->sym->sec, reloc->addend);
918
			if (!func)
919
				continue;
P
Peter Zijlstra 已提交
920
			break;
921

P
Peter Zijlstra 已提交
922
		default:
M
Matt Helsley 已提交
923
			WARN("unexpected relocation symbol type in %s: %d", sec->name, reloc->sym->type);
P
Peter Zijlstra 已提交
924
			continue;
925
		}
P
Peter Zijlstra 已提交
926

927
		func_for_each_insn(file, func, insn)
P
Peter Zijlstra 已提交
928
			insn->ignore = true;
929 930 931
	}
}

P
Peter Zijlstra 已提交
932 933 934 935 936 937 938 939 940 941
/*
 * This is a whitelist of functions that is allowed to be called with AC set.
 * The list is meant to be minimal and only contains compiler instrumentation
 * ABI and a few functions used to implement *_{to,from}_user() functions.
 *
 * These functions must not directly change AC, but may PUSHF/POPF.
 */
static const char *uaccess_safe_builtin[] = {
	/* KASAN */
	"kasan_report",
942
	"kasan_check_range",
P
Peter Zijlstra 已提交
943 944 945 946 947 948 949 950 951 952 953 954 955
	/* KASAN out-of-line */
	"__asan_loadN_noabort",
	"__asan_load1_noabort",
	"__asan_load2_noabort",
	"__asan_load4_noabort",
	"__asan_load8_noabort",
	"__asan_load16_noabort",
	"__asan_storeN_noabort",
	"__asan_store1_noabort",
	"__asan_store2_noabort",
	"__asan_store4_noabort",
	"__asan_store8_noabort",
	"__asan_store16_noabort",
956 957
	"__kasan_check_read",
	"__kasan_check_write",
P
Peter Zijlstra 已提交
958 959 960 961 962 963 964 965 966 967 968 969 970
	/* KASAN in-line */
	"__asan_report_load_n_noabort",
	"__asan_report_load1_noabort",
	"__asan_report_load2_noabort",
	"__asan_report_load4_noabort",
	"__asan_report_load8_noabort",
	"__asan_report_load16_noabort",
	"__asan_report_store_n_noabort",
	"__asan_report_store1_noabort",
	"__asan_report_store2_noabort",
	"__asan_report_store4_noabort",
	"__asan_report_store8_noabort",
	"__asan_report_store16_noabort",
971
	/* KCSAN */
972
	"__kcsan_check_access",
973 974 975 976
	"__kcsan_mb",
	"__kcsan_wmb",
	"__kcsan_rmb",
	"__kcsan_release",
977 978
	"kcsan_found_watchpoint",
	"kcsan_setup_watchpoint",
979
	"kcsan_check_scoped_accesses",
980 981
	"kcsan_disable_current",
	"kcsan_enable_current_nowarn",
982 983 984 985 986 987 988 989 990 991 992 993 994 995 996
	/* KCSAN/TSAN */
	"__tsan_func_entry",
	"__tsan_func_exit",
	"__tsan_read_range",
	"__tsan_write_range",
	"__tsan_read1",
	"__tsan_read2",
	"__tsan_read4",
	"__tsan_read8",
	"__tsan_read16",
	"__tsan_write1",
	"__tsan_write2",
	"__tsan_write4",
	"__tsan_write8",
	"__tsan_write16",
997 998 999 1000 1001
	"__tsan_read_write1",
	"__tsan_read_write2",
	"__tsan_read_write4",
	"__tsan_read_write8",
	"__tsan_read_write16",
1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051
	"__tsan_atomic8_load",
	"__tsan_atomic16_load",
	"__tsan_atomic32_load",
	"__tsan_atomic64_load",
	"__tsan_atomic8_store",
	"__tsan_atomic16_store",
	"__tsan_atomic32_store",
	"__tsan_atomic64_store",
	"__tsan_atomic8_exchange",
	"__tsan_atomic16_exchange",
	"__tsan_atomic32_exchange",
	"__tsan_atomic64_exchange",
	"__tsan_atomic8_fetch_add",
	"__tsan_atomic16_fetch_add",
	"__tsan_atomic32_fetch_add",
	"__tsan_atomic64_fetch_add",
	"__tsan_atomic8_fetch_sub",
	"__tsan_atomic16_fetch_sub",
	"__tsan_atomic32_fetch_sub",
	"__tsan_atomic64_fetch_sub",
	"__tsan_atomic8_fetch_and",
	"__tsan_atomic16_fetch_and",
	"__tsan_atomic32_fetch_and",
	"__tsan_atomic64_fetch_and",
	"__tsan_atomic8_fetch_or",
	"__tsan_atomic16_fetch_or",
	"__tsan_atomic32_fetch_or",
	"__tsan_atomic64_fetch_or",
	"__tsan_atomic8_fetch_xor",
	"__tsan_atomic16_fetch_xor",
	"__tsan_atomic32_fetch_xor",
	"__tsan_atomic64_fetch_xor",
	"__tsan_atomic8_fetch_nand",
	"__tsan_atomic16_fetch_nand",
	"__tsan_atomic32_fetch_nand",
	"__tsan_atomic64_fetch_nand",
	"__tsan_atomic8_compare_exchange_strong",
	"__tsan_atomic16_compare_exchange_strong",
	"__tsan_atomic32_compare_exchange_strong",
	"__tsan_atomic64_compare_exchange_strong",
	"__tsan_atomic8_compare_exchange_weak",
	"__tsan_atomic16_compare_exchange_weak",
	"__tsan_atomic32_compare_exchange_weak",
	"__tsan_atomic64_compare_exchange_weak",
	"__tsan_atomic8_compare_exchange_val",
	"__tsan_atomic16_compare_exchange_val",
	"__tsan_atomic32_compare_exchange_val",
	"__tsan_atomic64_compare_exchange_val",
	"__tsan_atomic_thread_fence",
	"__tsan_atomic_signal_fence",
P
Peter Zijlstra 已提交
1052 1053
	/* KCOV */
	"write_comp_data",
1054
	"check_kcov_mode",
P
Peter Zijlstra 已提交
1055 1056 1057 1058 1059 1060 1061 1062 1063
	"__sanitizer_cov_trace_pc",
	"__sanitizer_cov_trace_const_cmp1",
	"__sanitizer_cov_trace_const_cmp2",
	"__sanitizer_cov_trace_const_cmp4",
	"__sanitizer_cov_trace_const_cmp8",
	"__sanitizer_cov_trace_cmp1",
	"__sanitizer_cov_trace_cmp2",
	"__sanitizer_cov_trace_cmp4",
	"__sanitizer_cov_trace_cmp8",
1064
	"__sanitizer_cov_trace_switch",
P
Peter Zijlstra 已提交
1065 1066 1067 1068
	/* UBSAN */
	"ubsan_type_mismatch_common",
	"__ubsan_handle_type_mismatch",
	"__ubsan_handle_type_mismatch_v1",
1069
	"__ubsan_handle_shift_out_of_bounds",
P
Peter Zijlstra 已提交
1070 1071
	/* misc */
	"csum_partial_copy_generic",
1072 1073
	"copy_mc_fragile",
	"copy_mc_fragile_handle_tail",
1074
	"copy_mc_enhanced_fast_string",
P
Peter Zijlstra 已提交
1075 1076 1077 1078 1079 1080 1081 1082 1083
	"ftrace_likely_update", /* CONFIG_TRACE_BRANCH_PROFILING */
	NULL
};

static void add_uaccess_safe(struct objtool_file *file)
{
	struct symbol *func;
	const char **name;

1084
	if (!opts.uaccess)
P
Peter Zijlstra 已提交
1085 1086 1087 1088 1089 1090 1091
		return;

	for (name = uaccess_safe_builtin; *name; name++) {
		func = find_symbol_by_name(file->elf, *name);
		if (!func)
			continue;

1092
		func->uaccess_safe = true;
1093 1094 1095
	}
}

1096 1097 1098 1099 1100 1101
/*
 * FIXME: For now, just ignore any alternatives which add retpolines.  This is
 * a temporary hack, as it doesn't allow ORC to unwind from inside a retpoline.
 * But it at least allows objtool to understand the control flow *around* the
 * retpoline.
 */
1102
static int add_ignore_alternatives(struct objtool_file *file)
1103 1104
{
	struct section *sec;
M
Matt Helsley 已提交
1105
	struct reloc *reloc;
1106 1107
	struct instruction *insn;

1108
	sec = find_section_by_name(file->elf, ".rela.discard.ignore_alts");
1109 1110 1111
	if (!sec)
		return 0;

M
Matt Helsley 已提交
1112 1113
	list_for_each_entry(reloc, &sec->reloc_list, list) {
		if (reloc->sym->type != STT_SECTION) {
1114 1115 1116 1117
			WARN("unexpected relocation symbol type in %s", sec->name);
			return -1;
		}

M
Matt Helsley 已提交
1118
		insn = find_insn(file, reloc->sym->sec, reloc->addend);
1119
		if (!insn) {
1120
			WARN("bad .discard.ignore_alts entry");
1121 1122 1123 1124 1125 1126 1127 1128 1129
			return -1;
		}

		insn->ignore_alts = true;
	}

	return 0;
}

1130 1131 1132 1133 1134
__weak bool arch_is_retpoline(struct symbol *sym)
{
	return false;
}

1135 1136 1137 1138 1139
__weak bool arch_is_rethunk(struct symbol *sym)
{
	return false;
}

1140 1141 1142 1143 1144 1145 1146 1147
#define NEGATIVE_RELOC	((void *)-1L)

static struct reloc *insn_reloc(struct objtool_file *file, struct instruction *insn)
{
	if (insn->reloc == NEGATIVE_RELOC)
		return NULL;

	if (!insn->reloc) {
1148 1149 1150
		if (!file)
			return NULL;

1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161
		insn->reloc = find_reloc_by_dest_range(file->elf, insn->sec,
						       insn->offset, insn->len);
		if (!insn->reloc) {
			insn->reloc = NEGATIVE_RELOC;
			return NULL;
		}
	}

	return insn->reloc;
}

1162 1163 1164 1165 1166 1167 1168 1169 1170 1171
static void remove_insn_ops(struct instruction *insn)
{
	struct stack_op *op, *tmp;

	list_for_each_entry_safe(op, tmp, &insn->stack_ops, list) {
		list_del(&op->list);
		free(op);
	}
}

1172 1173
static void annotate_call_site(struct objtool_file *file,
			       struct instruction *insn, bool sibling)
1174 1175
{
	struct reloc *reloc = insn_reloc(file, insn);
1176
	struct symbol *sym = insn->call_dest;
1177

1178 1179 1180 1181 1182 1183 1184 1185 1186 1187
	if (!sym)
		sym = reloc->sym;

	/*
	 * Alternative replacement code is just template code which is
	 * sometimes copied to the original instruction. For now, don't
	 * annotate it. (In the future we might consider annotating the
	 * original instruction if/when it ever makes sense to do so.)
	 */
	if (!strcmp(insn->sec->name, ".altinstr_replacement"))
1188 1189
		return;

1190 1191 1192
	if (sym->static_call_tramp) {
		list_add_tail(&insn->call_node, &file->static_call_list);
		return;
1193 1194
	}

1195 1196 1197 1198 1199
	if (sym->retpoline_thunk) {
		list_add_tail(&insn->call_node, &file->retpoline_call_list);
		return;
	}

1200
	/*
1201 1202 1203
	 * Many compilers cannot disable KCOV or sanitizer calls with a function
	 * attribute so they need a little help, NOP out any such calls from
	 * noinstr text.
1204
	 */
1205
	if (opts.hack_noinstr && insn->sec->noinstr && sym->profiling_func) {
1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216
		if (reloc) {
			reloc->type = R_NONE;
			elf_write_reloc(file->elf, reloc);
		}

		elf_write_insn(file->elf, insn->sec,
			       insn->offset, insn->len,
			       sibling ? arch_ret_insn(insn->len)
			               : arch_nop_insn(insn->len));

		insn->type = sibling ? INSN_RETURN : INSN_NOP;
1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227

		if (sibling) {
			/*
			 * We've replaced the tail-call JMP insn by two new
			 * insn: RET; INT3, except we only have a single struct
			 * insn here. Mark it retpoline_safe to avoid the SLS
			 * warning, instead of adding another insn.
			 */
			insn->retpoline_safe = true;
		}

1228
		return;
1229 1230
	}

1231
	if (opts.mcount && sym->fentry) {
1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245
		if (sibling)
			WARN_FUNC("Tail call to __fentry__ !?!?", insn->sec, insn->offset);

		if (reloc) {
			reloc->type = R_NONE;
			elf_write_reloc(file->elf, reloc);
		}

		elf_write_insn(file->elf, insn->sec,
			       insn->offset, insn->len,
			       arch_nop_insn(insn->len));

		insn->type = INSN_NOP;

1246
		list_add_tail(&insn->call_node, &file->mcount_loc_list);
1247
		return;
1248
	}
P
Peter Zijlstra 已提交
1249 1250 1251

	if (!sibling && dead_end_function(file, sym))
		insn->dead_end = true;
1252 1253 1254 1255 1256 1257 1258 1259
}

static void add_call_dest(struct objtool_file *file, struct instruction *insn,
			  struct symbol *dest, bool sibling)
{
	insn->call_dest = dest;
	if (!dest)
		return;
1260 1261 1262 1263 1264 1265 1266 1267 1268

	/*
	 * Whatever stack impact regular CALLs have, should be undone
	 * by the RETURN of the called function.
	 *
	 * Annotated intra-function calls retain the stack_ops but
	 * are converted to JUMP, see read_intra_function_calls().
	 */
	remove_insn_ops(insn);
1269 1270

	annotate_call_site(file, insn, sibling);
1271 1272
}

1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305
static void add_retpoline_call(struct objtool_file *file, struct instruction *insn)
{
	/*
	 * Retpoline calls/jumps are really dynamic calls/jumps in disguise,
	 * so convert them accordingly.
	 */
	switch (insn->type) {
	case INSN_CALL:
		insn->type = INSN_CALL_DYNAMIC;
		break;
	case INSN_JUMP_UNCONDITIONAL:
		insn->type = INSN_JUMP_DYNAMIC;
		break;
	case INSN_JUMP_CONDITIONAL:
		insn->type = INSN_JUMP_DYNAMIC_CONDITIONAL;
		break;
	default:
		return;
	}

	insn->retpoline_safe = true;

	/*
	 * Whatever stack impact regular CALLs have, should be undone
	 * by the RETURN of the called function.
	 *
	 * Annotated intra-function calls retain the stack_ops but
	 * are converted to JUMP, see read_intra_function_calls().
	 */
	remove_insn_ops(insn);

	annotate_call_site(file, insn, false);
}
1306

P
Peter Zijlstra 已提交
1307
static void add_return_call(struct objtool_file *file, struct instruction *insn, bool add)
1308 1309 1310 1311 1312 1313 1314 1315
{
	/*
	 * Return thunk tail calls are really just returns in disguise,
	 * so convert them accordingly.
	 */
	insn->type = INSN_RETURN;
	insn->retpoline_safe = true;

P
Peter Zijlstra 已提交
1316 1317
	if (add)
		list_add_tail(&insn->call_node, &file->return_thunk_list);
1318 1319
}

1320 1321 1322 1323 1324
static bool same_function(struct instruction *insn1, struct instruction *insn2)
{
	return insn1->func->pfunc == insn2->func->pfunc;
}

1325
static bool is_first_func_insn(struct objtool_file *file, struct instruction *insn)
1326
{
1327 1328 1329
	if (insn->offset == insn->func->offset)
		return true;

1330
	if (opts.ibt) {
1331 1332 1333 1334 1335 1336 1337 1338
		struct instruction *prev = prev_insn_same_sym(file, insn);

		if (prev && prev->type == INSN_ENDBR &&
		    insn->offset == insn->func->offset + prev->len)
			return true;
	}

	return false;
1339 1340
}

1341 1342 1343 1344 1345
/*
 * Find the destination instructions for all jumps.
 */
static int add_jump_destinations(struct objtool_file *file)
{
1346
	struct instruction *insn, *jump_dest;
M
Matt Helsley 已提交
1347
	struct reloc *reloc;
1348 1349 1350 1351
	struct section *dest_sec;
	unsigned long dest_off;

	for_each_insn(file, insn) {
1352 1353 1354 1355 1356 1357 1358
		if (insn->jump_dest) {
			/*
			 * handle_group_alt() may have previously set
			 * 'jump_dest' for some alternatives.
			 */
			continue;
		}
1359
		if (!is_static_jump(insn))
1360 1361
			continue;

1362
		reloc = insn_reloc(file, insn);
M
Matt Helsley 已提交
1363
		if (!reloc) {
1364
			dest_sec = insn->sec;
1365
			dest_off = arch_jump_destination(insn);
M
Matt Helsley 已提交
1366 1367 1368
		} else if (reloc->sym->type == STT_SECTION) {
			dest_sec = reloc->sym->sec;
			dest_off = arch_dest_reloc_offset(reloc->addend);
P
Peter Zijlstra 已提交
1369
		} else if (reloc->sym->retpoline_thunk) {
1370
			add_retpoline_call(file, insn);
1371
			continue;
1372
		} else if (reloc->sym->return_thunk) {
P
Peter Zijlstra 已提交
1373
			add_return_call(file, insn, true);
1374
			continue;
1375
		} else if (insn->func) {
1376 1377 1378 1379
			/*
			 * External sibling call or internal sibling call with
			 * STT_FUNC reloc.
			 */
1380
			add_call_dest(file, insn, reloc->sym, true);
1381
			continue;
1382 1383 1384 1385 1386 1387 1388
		} else if (reloc->sym->sec->idx) {
			dest_sec = reloc->sym->sec;
			dest_off = reloc->sym->sym.st_value +
				   arch_dest_reloc_offset(reloc->addend);
		} else {
			/* non-func asm code jumping to another file */
			continue;
1389 1390
		}

1391 1392
		jump_dest = find_insn(file, dest_sec, dest_off);
		if (!jump_dest) {
P
Peter Zijlstra 已提交
1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407
			struct symbol *sym = find_symbol_by_offset(dest_sec, dest_off);

			/*
			 * This is a special case for zen_untrain_ret().
			 * It jumps to __x86_return_thunk(), but objtool
			 * can't find the thunk's starting RET
			 * instruction, because the RET is also in the
			 * middle of another instruction.  Objtool only
			 * knows about the outer instruction.
			 */
			if (sym && sym->return_thunk) {
				add_return_call(file, insn, false);
				continue;
			}

1408 1409 1410 1411 1412
			WARN_FUNC("can't find jump dest instruction at %s+0x%lx",
				  insn->sec, insn->offset, dest_sec->name,
				  dest_off);
			return -1;
		}
1413 1414

		/*
1415
		 * Cross-function jump.
1416
		 */
1417 1418
		if (insn->func && jump_dest->func &&
		    insn->func != jump_dest->func) {
1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432

			/*
			 * For GCC 8+, create parent/child links for any cold
			 * subfunctions.  This is _mostly_ redundant with a
			 * similar initialization in read_symbols().
			 *
			 * If a function has aliases, we want the *first* such
			 * function in the symbol table to be the subfunction's
			 * parent.  In that case we overwrite the
			 * initialization done in read_symbols().
			 *
			 * However this code can't completely replace the
			 * read_symbols() code because this doesn't detect the
			 * case where the parent function's only reference to a
1433
			 * subfunction is through a jump table.
1434
			 */
1435
			if (!strstr(insn->func->name, ".cold") &&
1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447
			    strstr(jump_dest->func->name, ".cold")) {
				insn->func->cfunc = jump_dest->func;
				jump_dest->func->pfunc = insn->func;

			} else if (!same_function(insn, jump_dest) &&
				   is_first_func_insn(file, jump_dest)) {
				/*
				 * Internal sibling call without reloc or with
				 * STT_SECTION reloc.
				 */
				add_call_dest(file, insn, jump_dest->func, true);
				continue;
1448
			}
1449
		}
1450 1451

		insn->jump_dest = jump_dest;
1452 1453 1454 1455 1456
	}

	return 0;
}

1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467
static struct symbol *find_call_destination(struct section *sec, unsigned long offset)
{
	struct symbol *call_dest;

	call_dest = find_func_by_offset(sec, offset);
	if (!call_dest)
		call_dest = find_symbol_by_offset(sec, offset);

	return call_dest;
}

1468 1469 1470 1471 1472 1473 1474
/*
 * Find the destination instructions for all calls.
 */
static int add_call_destinations(struct objtool_file *file)
{
	struct instruction *insn;
	unsigned long dest_off;
1475
	struct symbol *dest;
M
Matt Helsley 已提交
1476
	struct reloc *reloc;
1477 1478 1479 1480 1481

	for_each_insn(file, insn) {
		if (insn->type != INSN_CALL)
			continue;

1482
		reloc = insn_reloc(file, insn);
M
Matt Helsley 已提交
1483
		if (!reloc) {
1484
			dest_off = arch_jump_destination(insn);
1485 1486 1487
			dest = find_call_destination(insn->sec, dest_off);

			add_call_dest(file, insn, dest, false);
1488

1489 1490 1491 1492
			if (insn->ignore)
				continue;

			if (!insn->call_dest) {
1493
				WARN_FUNC("unannotated intra-function call", insn->sec, insn->offset);
1494 1495
				return -1;
			}
1496

1497 1498 1499 1500 1501 1502
			if (insn->func && insn->call_dest->type != STT_FUNC) {
				WARN_FUNC("unsupported call to non-function",
					  insn->sec, insn->offset);
				return -1;
			}

M
Matt Helsley 已提交
1503 1504
		} else if (reloc->sym->type == STT_SECTION) {
			dest_off = arch_dest_reloc_offset(reloc->addend);
1505 1506
			dest = find_call_destination(reloc->sym->sec, dest_off);
			if (!dest) {
1507
				WARN_FUNC("can't find call dest symbol at %s+0x%lx",
1508
					  insn->sec, insn->offset,
M
Matt Helsley 已提交
1509
					  reloc->sym->sec->name,
1510
					  dest_off);
1511 1512
				return -1;
			}
1513

1514 1515
			add_call_dest(file, insn, dest, false);

P
Peter Zijlstra 已提交
1516
		} else if (reloc->sym->retpoline_thunk) {
1517
			add_retpoline_call(file, insn);
1518

1519
		} else
1520
			add_call_dest(file, insn, reloc->sym, false);
1521 1522 1523 1524 1525 1526
	}

	return 0;
}

/*
1527 1528
 * The .alternatives section requires some extra special care over and above
 * other special sections because alternatives are patched in place.
1529 1530 1531 1532 1533 1534
 */
static int handle_group_alt(struct objtool_file *file,
			    struct special_alt *special_alt,
			    struct instruction *orig_insn,
			    struct instruction **new_insn)
{
1535
	struct instruction *last_orig_insn, *last_new_insn = NULL, *insn, *nop = NULL;
J
Josh Poimboeuf 已提交
1536
	struct alt_group *orig_alt_group, *new_alt_group;
1537 1538
	unsigned long dest_off;

J
Josh Poimboeuf 已提交
1539 1540 1541 1542 1543 1544

	orig_alt_group = malloc(sizeof(*orig_alt_group));
	if (!orig_alt_group) {
		WARN("malloc failed");
		return -1;
	}
1545 1546 1547 1548 1549 1550 1551
	orig_alt_group->cfi = calloc(special_alt->orig_len,
				     sizeof(struct cfi_state *));
	if (!orig_alt_group->cfi) {
		WARN("calloc failed");
		return -1;
	}

1552 1553 1554 1555 1556 1557
	last_orig_insn = NULL;
	insn = orig_insn;
	sec_for_each_insn_from(file, insn) {
		if (insn->offset >= special_alt->orig_off + special_alt->orig_len)
			break;

J
Josh Poimboeuf 已提交
1558
		insn->alt_group = orig_alt_group;
1559 1560
		last_orig_insn = insn;
	}
J
Josh Poimboeuf 已提交
1561 1562 1563
	orig_alt_group->orig_group = NULL;
	orig_alt_group->first_insn = orig_insn;
	orig_alt_group->last_insn = last_orig_insn;
1564

1565

1566 1567 1568 1569
	new_alt_group = malloc(sizeof(*new_alt_group));
	if (!new_alt_group) {
		WARN("malloc failed");
		return -1;
1570 1571
	}

1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582
	if (special_alt->new_len < special_alt->orig_len) {
		/*
		 * Insert a fake nop at the end to make the replacement
		 * alt_group the same size as the original.  This is needed to
		 * allow propagate_alt_cfi() to do its magic.  When the last
		 * instruction affects the stack, the instruction after it (the
		 * nop) will propagate the new state to the shared CFI array.
		 */
		nop = malloc(sizeof(*nop));
		if (!nop) {
			WARN("malloc failed");
1583 1584
			return -1;
		}
1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595
		memset(nop, 0, sizeof(*nop));
		INIT_LIST_HEAD(&nop->alts);
		INIT_LIST_HEAD(&nop->stack_ops);

		nop->sec = special_alt->new_sec;
		nop->offset = special_alt->new_off + special_alt->new_len;
		nop->len = special_alt->orig_len - special_alt->new_len;
		nop->type = INSN_NOP;
		nop->func = orig_insn->func;
		nop->alt_group = new_alt_group;
		nop->ignore = orig_insn->ignore_alts;
1596
	}
1597

1598 1599 1600
	if (!special_alt->new_len) {
		*new_insn = nop;
		goto end;
1601 1602 1603 1604
	}

	insn = *new_insn;
	sec_for_each_insn_from(file, insn) {
1605 1606
		struct reloc *alt_reloc;

1607 1608 1609 1610 1611
		if (insn->offset >= special_alt->new_off + special_alt->new_len)
			break;

		last_new_insn = insn;

1612
		insn->ignore = orig_insn->ignore_alts;
1613
		insn->func = orig_insn->func;
J
Josh Poimboeuf 已提交
1614
		insn->alt_group = new_alt_group;
1615

1616 1617 1618 1619 1620 1621 1622 1623
		/*
		 * Since alternative replacement code is copy/pasted by the
		 * kernel after applying relocations, generally such code can't
		 * have relative-address relocation references to outside the
		 * .altinstr_replacement section, unless the arch's
		 * alternatives code can adjust the relative offsets
		 * accordingly.
		 */
1624
		alt_reloc = insn_reloc(file, insn);
1625 1626
		if (alt_reloc &&
		    !arch_support_alt_relocation(special_alt, insn, alt_reloc)) {
1627 1628 1629 1630 1631 1632

			WARN_FUNC("unsupported relocation in alternatives section",
				  insn->sec, insn->offset);
			return -1;
		}

1633
		if (!is_static_jump(insn))
1634 1635 1636 1637 1638
			continue;

		if (!insn->immediate)
			continue;

1639
		dest_off = arch_jump_destination(insn);
1640
		if (dest_off == special_alt->new_off + special_alt->new_len) {
1641
			insn->jump_dest = next_insn_same_sec(file, last_orig_insn);
1642 1643 1644 1645 1646
			if (!insn->jump_dest) {
				WARN_FUNC("can't find alternative jump destination",
					  insn->sec, insn->offset);
				return -1;
			}
1647 1648 1649 1650 1651 1652 1653 1654 1655
		}
	}

	if (!last_new_insn) {
		WARN_FUNC("can't find last new alternative instruction",
			  special_alt->new_sec, special_alt->new_off);
		return -1;
	}

1656 1657 1658
	if (nop)
		list_add(&nop->list, &last_new_insn->list);
end:
J
Josh Poimboeuf 已提交
1659 1660
	new_alt_group->orig_group = orig_alt_group;
	new_alt_group->first_insn = *new_insn;
1661 1662
	new_alt_group->last_insn = nop ? : last_new_insn;
	new_alt_group->cfi = orig_alt_group->cfi;
1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675
	return 0;
}

/*
 * A jump table entry can either convert a nop to a jump or a jump to a nop.
 * If the original instruction is a jump, make the alt entry an effective nop
 * by just skipping the original instruction.
 */
static int handle_jump_alt(struct objtool_file *file,
			   struct special_alt *special_alt,
			   struct instruction *orig_insn,
			   struct instruction **new_insn)
{
1676 1677
	if (orig_insn->type != INSN_JUMP_UNCONDITIONAL &&
	    orig_insn->type != INSN_NOP) {
1678

1679 1680 1681 1682 1683
		WARN_FUNC("unsupported instruction at jump label",
			  orig_insn->sec, orig_insn->offset);
		return -1;
	}

1684
	if (opts.hack_jump_label && special_alt->key_addend & 2) {
1685 1686 1687 1688 1689 1690 1691 1692 1693 1694
		struct reloc *reloc = insn_reloc(file, orig_insn);

		if (reloc) {
			reloc->type = R_NONE;
			elf_write_reloc(file->elf, reloc);
		}
		elf_write_insn(file->elf, orig_insn->sec,
			       orig_insn->offset, orig_insn->len,
			       arch_nop_insn(orig_insn->len));
		orig_insn->type = INSN_NOP;
1695 1696 1697 1698 1699 1700 1701 1702 1703
	}

	if (orig_insn->type == INSN_NOP) {
		if (orig_insn->len == 2)
			file->jl_nop_short++;
		else
			file->jl_nop_long++;

		return 0;
1704 1705
	}

1706 1707 1708 1709 1710
	if (orig_insn->len == 2)
		file->jl_short++;
	else
		file->jl_long++;

1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757
	*new_insn = list_next_entry(orig_insn, list);
	return 0;
}

/*
 * Read all the special sections which have alternate instructions which can be
 * patched in or redirected to at runtime.  Each instruction having alternate
 * instruction(s) has them added to its insn->alts list, which will be
 * traversed in validate_branch().
 */
static int add_special_section_alts(struct objtool_file *file)
{
	struct list_head special_alts;
	struct instruction *orig_insn, *new_insn;
	struct special_alt *special_alt, *tmp;
	struct alternative *alt;
	int ret;

	ret = special_get_alts(file->elf, &special_alts);
	if (ret)
		return ret;

	list_for_each_entry_safe(special_alt, tmp, &special_alts, list) {

		orig_insn = find_insn(file, special_alt->orig_sec,
				      special_alt->orig_off);
		if (!orig_insn) {
			WARN_FUNC("special: can't find orig instruction",
				  special_alt->orig_sec, special_alt->orig_off);
			ret = -1;
			goto out;
		}

		new_insn = NULL;
		if (!special_alt->group || special_alt->new_len) {
			new_insn = find_insn(file, special_alt->new_sec,
					     special_alt->new_off);
			if (!new_insn) {
				WARN_FUNC("special: can't find new instruction",
					  special_alt->new_sec,
					  special_alt->new_off);
				ret = -1;
				goto out;
			}
		}

		if (special_alt->group) {
1758 1759 1760 1761 1762 1763
			if (!special_alt->orig_len) {
				WARN_FUNC("empty alternative entry",
					  orig_insn->sec, orig_insn->offset);
				continue;
			}

1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774
			ret = handle_group_alt(file, special_alt, orig_insn,
					       &new_insn);
			if (ret)
				goto out;
		} else if (special_alt->jump_or_nop) {
			ret = handle_jump_alt(file, special_alt, orig_insn,
					      &new_insn);
			if (ret)
				goto out;
		}

1775 1776 1777 1778 1779 1780 1781
		alt = malloc(sizeof(*alt));
		if (!alt) {
			WARN("malloc failed");
			ret = -1;
			goto out;
		}

1782
		alt->insn = new_insn;
P
Peter Zijlstra 已提交
1783
		alt->skip_orig = special_alt->skip_orig;
P
Peter Zijlstra 已提交
1784
		orig_insn->ignore_alts |= special_alt->skip_alt;
1785 1786 1787 1788 1789 1790
		list_add_tail(&alt->list, &orig_insn->alts);

		list_del(&special_alt->list);
		free(special_alt);
	}

1791
	if (opts.stats) {
1792 1793 1794 1795 1796
		printf("jl\\\tNOP\tJMP\n");
		printf("short:\t%ld\t%ld\n", file->jl_nop_short, file->jl_short);
		printf("long:\t%ld\t%ld\n", file->jl_nop_long, file->jl_long);
	}

1797 1798 1799 1800
out:
	return ret;
}

1801
static int add_jump_table(struct objtool_file *file, struct instruction *insn,
M
Matt Helsley 已提交
1802
			    struct reloc *table)
1803
{
M
Matt Helsley 已提交
1804
	struct reloc *reloc = table;
1805
	struct instruction *dest_insn;
1806
	struct alternative *alt;
1807 1808
	struct symbol *pfunc = insn->func->pfunc;
	unsigned int prev_offset = 0;
1809

1810
	/*
M
Matt Helsley 已提交
1811
	 * Each @reloc is a switch table relocation which points to the target
1812 1813
	 * instruction.
	 */
M
Matt Helsley 已提交
1814
	list_for_each_entry_from(reloc, &table->sec->reloc_list, list) {
1815 1816

		/* Check for the end of the table: */
M
Matt Helsley 已提交
1817
		if (reloc != table && reloc->jump_table_start)
1818 1819
			break;

1820
		/* Make sure the table entries are consecutive: */
M
Matt Helsley 已提交
1821
		if (prev_offset && reloc->offset != prev_offset + 8)
1822 1823 1824
			break;

		/* Detect function pointers from contiguous objects: */
M
Matt Helsley 已提交
1825 1826
		if (reloc->sym->sec == pfunc->sec &&
		    reloc->addend == pfunc->offset)
1827 1828
			break;

M
Matt Helsley 已提交
1829
		dest_insn = find_insn(file, reloc->sym->sec, reloc->addend);
1830
		if (!dest_insn)
1831 1832
			break;

1833
		/* Make sure the destination is in the same function: */
1834
		if (!dest_insn->func || dest_insn->func->pfunc != pfunc)
1835
			break;
1836 1837 1838 1839 1840 1841 1842

		alt = malloc(sizeof(*alt));
		if (!alt) {
			WARN("malloc failed");
			return -1;
		}

1843
		alt->insn = dest_insn;
1844
		list_add_tail(&alt->list, &insn->alts);
M
Matt Helsley 已提交
1845
		prev_offset = reloc->offset;
1846 1847 1848 1849 1850 1851
	}

	if (!prev_offset) {
		WARN_FUNC("can't find switch jump table",
			  insn->sec, insn->offset);
		return -1;
1852 1853 1854 1855 1856 1857
	}

	return 0;
}

/*
1858 1859
 * find_jump_table() - Given a dynamic jump, find the switch jump table
 * associated with it.
1860
 */
M
Matt Helsley 已提交
1861
static struct reloc *find_jump_table(struct objtool_file *file,
1862 1863 1864
				      struct symbol *func,
				      struct instruction *insn)
{
1865
	struct reloc *table_reloc;
1866
	struct instruction *dest_insn, *orig_insn = insn;
1867

1868 1869 1870 1871 1872
	/*
	 * Backward search using the @first_jump_src links, these help avoid
	 * much of the 'in between' code. Which avoids us getting confused by
	 * it.
	 */
1873
	for (;
1874 1875
	     insn && insn->func && insn->func->pfunc == func;
	     insn = insn->first_jump_src ?: prev_insn_same_sym(file, insn)) {
1876

1877
		if (insn != orig_insn && insn->type == INSN_JUMP_DYNAMIC)
1878 1879 1880 1881 1882 1883 1884 1885 1886
			break;

		/* allow small jumps within the range */
		if (insn->type == INSN_JUMP_UNCONDITIONAL &&
		    insn->jump_dest &&
		    (insn->jump_dest->offset <= insn->offset ||
		     insn->jump_dest->offset > orig_insn->offset))
		    break;

1887
		table_reloc = arch_find_switch_table(file, insn);
M
Matt Helsley 已提交
1888
		if (!table_reloc)
1889
			continue;
M
Matt Helsley 已提交
1890
		dest_insn = find_insn(file, table_reloc->sym->sec, table_reloc->addend);
1891 1892
		if (!dest_insn || !dest_insn->func || dest_insn->func->pfunc != func)
			continue;
1893

M
Matt Helsley 已提交
1894
		return table_reloc;
1895 1896 1897 1898 1899
	}

	return NULL;
}

1900 1901 1902 1903 1904 1905
/*
 * First pass: Mark the head of each jump table so that in the next pass,
 * we know when a given jump table ends and the next one starts.
 */
static void mark_func_jump_tables(struct objtool_file *file,
				    struct symbol *func)
1906
{
1907
	struct instruction *insn, *last = NULL;
M
Matt Helsley 已提交
1908
	struct reloc *reloc;
1909

1910
	func_for_each_insn(file, func, insn) {
1911 1912 1913 1914 1915
		if (!last)
			last = insn;

		/*
		 * Store back-pointers for unconditional forward jumps such
1916
		 * that find_jump_table() can back-track using those and
1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927
		 * avoid some potentially confusing code.
		 */
		if (insn->type == INSN_JUMP_UNCONDITIONAL && insn->jump_dest &&
		    insn->offset > last->offset &&
		    insn->jump_dest->offset > insn->offset &&
		    !insn->jump_dest->first_jump_src) {

			insn->jump_dest->first_jump_src = insn;
			last = insn->jump_dest;
		}

1928 1929 1930
		if (insn->type != INSN_JUMP_DYNAMIC)
			continue;

M
Matt Helsley 已提交
1931 1932 1933 1934
		reloc = find_jump_table(file, func, insn);
		if (reloc) {
			reloc->jump_table_start = true;
			insn->jump_table = reloc;
1935 1936
		}
	}
1937 1938 1939 1940 1941 1942 1943 1944
}

static int add_func_jump_tables(struct objtool_file *file,
				  struct symbol *func)
{
	struct instruction *insn;
	int ret;

1945
	func_for_each_insn(file, func, insn) {
1946 1947
		if (!insn->jump_table)
			continue;
1948

1949
		ret = add_jump_table(file, insn, insn->jump_table);
1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961
		if (ret)
			return ret;
	}

	return 0;
}

/*
 * For some switch statements, gcc generates a jump table in the .rodata
 * section which contains a list of addresses within the function to jump to.
 * This finds these jump tables and adds them to the insn->alts lists.
 */
1962
static int add_jump_table_alts(struct objtool_file *file)
1963 1964 1965 1966 1967
{
	struct section *sec;
	struct symbol *func;
	int ret;

1968
	if (!file->rodata)
1969 1970
		return 0;

1971
	for_each_sec(file, sec) {
1972 1973 1974 1975
		list_for_each_entry(func, &sec->symbol_list, list) {
			if (func->type != STT_FUNC)
				continue;

1976
			mark_func_jump_tables(file, func);
1977
			ret = add_func_jump_tables(file, func);
1978 1979 1980 1981 1982 1983 1984 1985
			if (ret)
				return ret;
		}
	}

	return 0;
}

1986 1987 1988 1989 1990 1991 1992 1993
static void set_func_state(struct cfi_state *state)
{
	state->cfa = initial_func_cfi.cfa;
	memcpy(&state->regs, &initial_func_cfi.regs,
	       CFI_NUM_REGS * sizeof(struct cfi_reg));
	state->stack_size = initial_func_cfi.cfa.offset;
}

1994 1995
static int read_unwind_hints(struct objtool_file *file)
{
P
Peter Zijlstra 已提交
1996
	struct cfi_state cfi = init_cfi;
M
Matt Helsley 已提交
1997
	struct section *sec, *relocsec;
1998 1999
	struct unwind_hint *hint;
	struct instruction *insn;
P
Peter Zijlstra 已提交
2000
	struct reloc *reloc;
2001 2002 2003 2004 2005 2006
	int i;

	sec = find_section_by_name(file->elf, ".discard.unwind_hints");
	if (!sec)
		return 0;

M
Matt Helsley 已提交
2007 2008
	relocsec = sec->reloc;
	if (!relocsec) {
2009 2010 2011 2012
		WARN("missing .rela.discard.unwind_hints section");
		return -1;
	}

2013
	if (sec->sh.sh_size % sizeof(struct unwind_hint)) {
2014 2015 2016 2017 2018 2019
		WARN("struct unwind_hint size mismatch");
		return -1;
	}

	file->hints = true;

2020
	for (i = 0; i < sec->sh.sh_size / sizeof(struct unwind_hint); i++) {
2021 2022
		hint = (struct unwind_hint *)sec->data->d_buf + i;

M
Matt Helsley 已提交
2023 2024 2025
		reloc = find_reloc_by_dest(file->elf, sec, i * sizeof(*hint));
		if (!reloc) {
			WARN("can't find reloc for unwind_hints[%d]", i);
2026 2027 2028
			return -1;
		}

M
Matt Helsley 已提交
2029
		insn = find_insn(file, reloc->sym->sec, reloc->addend);
2030 2031 2032 2033 2034
		if (!insn) {
			WARN("can't find insn for unwind_hints[%d]", i);
			return -1;
		}

2035
		insn->hint = true;
2036

2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047
		if (hint->type == UNWIND_HINT_TYPE_SAVE) {
			insn->hint = false;
			insn->save = true;
			continue;
		}

		if (hint->type == UNWIND_HINT_TYPE_RESTORE) {
			insn->restore = true;
			continue;
		}

2048
		if (hint->type == UNWIND_HINT_TYPE_REGS_PARTIAL) {
2049 2050
			struct symbol *sym = find_symbol_by_offset(insn->sec, insn->offset);

2051 2052 2053 2054 2055 2056 2057
			if (sym && sym->bind == STB_GLOBAL) {
				if (opts.ibt && insn->type != INSN_ENDBR && !insn->noendbr) {
					WARN_FUNC("UNWIND_HINT_IRET_REGS without ENDBR",
						  insn->sec, insn->offset);
				}

				insn->entry = 1;
2058 2059 2060
			}
		}

2061 2062 2063 2064 2065
		if (hint->type == UNWIND_HINT_TYPE_ENTRY) {
			hint->type = UNWIND_HINT_TYPE_CALL;
			insn->entry = 1;
		}

2066
		if (hint->type == UNWIND_HINT_TYPE_FUNC) {
P
Peter Zijlstra 已提交
2067
			insn->cfi = &func_cfi;
2068 2069 2070
			continue;
		}

P
Peter Zijlstra 已提交
2071 2072 2073 2074
		if (insn->cfi)
			cfi = *(insn->cfi);

		if (arch_decode_hint_reg(hint->sp_reg, &cfi.cfa.base)) {
2075 2076 2077 2078 2079
			WARN_FUNC("unsupported unwind_hint sp base reg %d",
				  insn->sec, insn->offset, hint->sp_reg);
			return -1;
		}

P
Peter Zijlstra 已提交
2080 2081 2082 2083 2084
		cfi.cfa.offset = bswap_if_needed(hint->sp_offset);
		cfi.type = hint->type;
		cfi.end = hint->end;

		insn->cfi = cfi_hash_find_or_add(&cfi);
2085 2086 2087 2088 2089
	}

	return 0;
}

2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106
static int read_noendbr_hints(struct objtool_file *file)
{
	struct section *sec;
	struct instruction *insn;
	struct reloc *reloc;

	sec = find_section_by_name(file->elf, ".rela.discard.noendbr");
	if (!sec)
		return 0;

	list_for_each_entry(reloc, &sec->reloc_list, list) {
		insn = find_insn(file, reloc->sym->sec, reloc->sym->offset + reloc->addend);
		if (!insn) {
			WARN("bad .discard.noendbr entry");
			return -1;
		}

2107 2108 2109
		if (insn->type == INSN_ENDBR)
			WARN_FUNC("ANNOTATE_NOENDBR on ENDBR", insn->sec, insn->offset);

2110 2111 2112 2113 2114 2115
		insn->noendbr = 1;
	}

	return 0;
}

2116 2117
static int read_retpoline_hints(struct objtool_file *file)
{
J
Josh Poimboeuf 已提交
2118
	struct section *sec;
2119
	struct instruction *insn;
M
Matt Helsley 已提交
2120
	struct reloc *reloc;
2121

J
Josh Poimboeuf 已提交
2122
	sec = find_section_by_name(file->elf, ".rela.discard.retpoline_safe");
2123 2124 2125
	if (!sec)
		return 0;

M
Matt Helsley 已提交
2126 2127
	list_for_each_entry(reloc, &sec->reloc_list, list) {
		if (reloc->sym->type != STT_SECTION) {
J
Josh Poimboeuf 已提交
2128
			WARN("unexpected relocation symbol type in %s", sec->name);
2129 2130 2131
			return -1;
		}

M
Matt Helsley 已提交
2132
		insn = find_insn(file, reloc->sym->sec, reloc->addend);
2133
		if (!insn) {
J
Josh Poimboeuf 已提交
2134
			WARN("bad .discard.retpoline_safe entry");
2135 2136 2137 2138
			return -1;
		}

		if (insn->type != INSN_JUMP_DYNAMIC &&
2139
		    insn->type != INSN_CALL_DYNAMIC &&
2140 2141 2142
		    insn->type != INSN_RETURN &&
		    insn->type != INSN_NOP) {
			WARN_FUNC("retpoline_safe hint not an indirect jump/call/ret/nop",
2143 2144 2145 2146 2147 2148 2149 2150 2151 2152
				  insn->sec, insn->offset);
			return -1;
		}

		insn->retpoline_safe = true;
	}

	return 0;
}

2153 2154 2155 2156
static int read_instr_hints(struct objtool_file *file)
{
	struct section *sec;
	struct instruction *insn;
M
Matt Helsley 已提交
2157
	struct reloc *reloc;
2158 2159 2160 2161 2162

	sec = find_section_by_name(file->elf, ".rela.discard.instr_end");
	if (!sec)
		return 0;

M
Matt Helsley 已提交
2163 2164
	list_for_each_entry(reloc, &sec->reloc_list, list) {
		if (reloc->sym->type != STT_SECTION) {
2165 2166 2167 2168
			WARN("unexpected relocation symbol type in %s", sec->name);
			return -1;
		}

M
Matt Helsley 已提交
2169
		insn = find_insn(file, reloc->sym->sec, reloc->addend);
2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181
		if (!insn) {
			WARN("bad .discard.instr_end entry");
			return -1;
		}

		insn->instr--;
	}

	sec = find_section_by_name(file->elf, ".rela.discard.instr_begin");
	if (!sec)
		return 0;

M
Matt Helsley 已提交
2182 2183
	list_for_each_entry(reloc, &sec->reloc_list, list) {
		if (reloc->sym->type != STT_SECTION) {
2184 2185 2186 2187
			WARN("unexpected relocation symbol type in %s", sec->name);
			return -1;
		}

M
Matt Helsley 已提交
2188
		insn = find_insn(file, reloc->sym->sec, reloc->addend);
2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199
		if (!insn) {
			WARN("bad .discard.instr_begin entry");
			return -1;
		}

		insn->instr++;
	}

	return 0;
}

2200 2201 2202 2203
static int read_intra_function_calls(struct objtool_file *file)
{
	struct instruction *insn;
	struct section *sec;
M
Matt Helsley 已提交
2204
	struct reloc *reloc;
2205 2206 2207 2208 2209

	sec = find_section_by_name(file->elf, ".rela.discard.intra_function_calls");
	if (!sec)
		return 0;

M
Matt Helsley 已提交
2210
	list_for_each_entry(reloc, &sec->reloc_list, list) {
2211 2212
		unsigned long dest_off;

M
Matt Helsley 已提交
2213
		if (reloc->sym->type != STT_SECTION) {
2214 2215 2216 2217 2218
			WARN("unexpected relocation symbol type in %s",
			     sec->name);
			return -1;
		}

M
Matt Helsley 已提交
2219
		insn = find_insn(file, reloc->sym->sec, reloc->addend);
2220 2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250
		if (!insn) {
			WARN("bad .discard.intra_function_call entry");
			return -1;
		}

		if (insn->type != INSN_CALL) {
			WARN_FUNC("intra_function_call not a direct call",
				  insn->sec, insn->offset);
			return -1;
		}

		/*
		 * Treat intra-function CALLs as JMPs, but with a stack_op.
		 * See add_call_destinations(), which strips stack_ops from
		 * normal CALLs.
		 */
		insn->type = INSN_JUMP_UNCONDITIONAL;

		dest_off = insn->offset + insn->len + insn->immediate;
		insn->jump_dest = find_insn(file, insn->sec, dest_off);
		if (!insn->jump_dest) {
			WARN_FUNC("can't find call dest at %s+0x%lx",
				  insn->sec, insn->offset,
				  insn->sec->name, dest_off);
			return -1;
		}
	}

	return 0;
}

2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275
/*
 * Return true if name matches an instrumentation function, where calls to that
 * function from noinstr code can safely be removed, but compilers won't do so.
 */
static bool is_profiling_func(const char *name)
{
	/*
	 * Many compilers cannot disable KCOV with a function attribute.
	 */
	if (!strncmp(name, "__sanitizer_cov_", 16))
		return true;

	/*
	 * Some compilers currently do not remove __tsan_func_entry/exit nor
	 * __tsan_atomic_signal_fence (used for barrier instrumentation) with
	 * the __no_sanitize_thread attribute, remove them. Once the kernel's
	 * minimum Clang version is 14.0, this can be removed.
	 */
	if (!strncmp(name, "__tsan_func_", 12) ||
	    !strcmp(name, "__tsan_atomic_signal_fence"))
		return true;

	return false;
}

P
Peter Zijlstra 已提交
2276
static int classify_symbols(struct objtool_file *file)
2277 2278 2279 2280 2281 2282
{
	struct section *sec;
	struct symbol *func;

	for_each_sec(file, sec) {
		list_for_each_entry(func, &sec->symbol_list, list) {
P
Peter Zijlstra 已提交
2283 2284 2285 2286
			if (func->bind != STB_GLOBAL)
				continue;

			if (!strncmp(func->name, STATIC_CALL_TRAMP_PREFIX_STR,
2287 2288
				     strlen(STATIC_CALL_TRAMP_PREFIX_STR)))
				func->static_call_tramp = true;
P
Peter Zijlstra 已提交
2289 2290 2291 2292

			if (arch_is_retpoline(func))
				func->retpoline_thunk = true;

2293 2294 2295
			if (arch_is_rethunk(func))
				func->return_thunk = true;

P
Peter Zijlstra 已提交
2296 2297 2298
			if (!strcmp(func->name, "__fentry__"))
				func->fentry = true;

2299 2300
			if (is_profiling_func(func->name))
				func->profiling_func = true;
2301 2302 2303 2304 2305 2306
		}
	}

	return 0;
}

2307 2308 2309 2310 2311 2312
static void mark_rodata(struct objtool_file *file)
{
	struct section *sec;
	bool found = false;

	/*
2313 2314 2315 2316 2317 2318 2319 2320
	 * Search for the following rodata sections, each of which can
	 * potentially contain jump tables:
	 *
	 * - .rodata: can contain GCC switch tables
	 * - .rodata.<func>: same, if -fdata-sections is being used
	 * - .rodata..c_jump_table: contains C annotated jump tables
	 *
	 * .rodata.str1.* sections are ignored; they don't contain jump tables.
2321 2322
	 */
	for_each_sec(file, sec) {
2323 2324
		if (!strncmp(sec->name, ".rodata", 7) &&
		    !strstr(sec->name, ".str1.")) {
2325 2326 2327 2328 2329 2330 2331 2332
			sec->rodata = true;
			found = true;
		}
	}

	file->rodata = found;
}

2333 2334 2335 2336
static int decode_sections(struct objtool_file *file)
{
	int ret;

2337 2338
	mark_rodata(file);

2339 2340 2341 2342
	ret = init_pv_ops(file);
	if (ret)
		return ret;

2343 2344 2345 2346 2347
	ret = decode_instructions(file);
	if (ret)
		return ret;

	add_ignores(file);
P
Peter Zijlstra 已提交
2348
	add_uaccess_safe(file);
2349

2350
	ret = add_ignore_alternatives(file);
2351 2352 2353
	if (ret)
		return ret;

2354 2355 2356
	/*
	 * Must be before read_unwind_hints() since that needs insn->noendbr.
	 */
2357 2358 2359 2360
	ret = read_noendbr_hints(file);
	if (ret)
		return ret;

2361 2362 2363
	/*
	 * Must be before add_{jump_call}_destination.
	 */
P
Peter Zijlstra 已提交
2364
	ret = classify_symbols(file);
P
Peter Zijlstra 已提交
2365 2366 2367
	if (ret)
		return ret;

2368
	/*
2369 2370
	 * Must be before add_jump_destinations(), which depends on 'func'
	 * being set for alternatives, to enable proper sibling call detection.
2371
	 */
2372
	ret = add_special_section_alts(file);
2373 2374 2375
	if (ret)
		return ret;

2376
	ret = add_jump_destinations(file);
2377 2378 2379
	if (ret)
		return ret;

2380 2381 2382 2383
	/*
	 * Must be before add_call_destination(); it changes INSN_CALL to
	 * INSN_JUMP.
	 */
2384 2385 2386 2387
	ret = read_intra_function_calls(file);
	if (ret)
		return ret;

2388
	ret = add_call_destinations(file);
2389 2390 2391
	if (ret)
		return ret;

P
Peter Zijlstra 已提交
2392 2393 2394 2395 2396 2397 2398 2399
	/*
	 * Must be after add_call_destinations() such that it can override
	 * dead_end_function() marks.
	 */
	ret = add_dead_ends(file);
	if (ret)
		return ret;

2400
	ret = add_jump_table_alts(file);
2401 2402 2403
	if (ret)
		return ret;

2404 2405 2406 2407
	ret = read_unwind_hints(file);
	if (ret)
		return ret;

2408 2409 2410 2411
	ret = read_retpoline_hints(file);
	if (ret)
		return ret;

2412 2413 2414 2415
	ret = read_instr_hints(file);
	if (ret)
		return ret;

2416 2417 2418 2419 2420
	return 0;
}

static bool is_fentry_call(struct instruction *insn)
{
P
Peter Zijlstra 已提交
2421 2422 2423
	if (insn->type == INSN_CALL &&
	    insn->call_dest &&
	    insn->call_dest->fentry)
2424 2425 2426 2427 2428
		return true;

	return false;
}

2429
static bool has_modified_stack_frame(struct instruction *insn, struct insn_state *state)
2430
{
2431
	struct cfi_state *cfi = &state->cfi;
2432 2433
	int i;

2434
	if (cfi->cfa.base != initial_func_cfi.cfa.base || cfi->drap)
2435 2436
		return true;

2437
	if (cfi->cfa.offset != initial_func_cfi.cfa.offset)
2438 2439
		return true;

2440
	if (cfi->stack_size != initial_func_cfi.cfa.offset)
2441 2442 2443
		return true;

	for (i = 0; i < CFI_NUM_REGS; i++) {
2444 2445
		if (cfi->regs[i].base != initial_func_cfi.regs[i].base ||
		    cfi->regs[i].offset != initial_func_cfi.regs[i].offset)
2446
			return true;
2447
	}
2448 2449 2450 2451

	return false;
}

2452 2453 2454 2455 2456 2457 2458
static bool check_reg_frame_pos(const struct cfi_reg *reg,
				int expected_offset)
{
	return reg->base == CFI_CFA &&
	       reg->offset == expected_offset;
}

2459 2460
static bool has_valid_stack_frame(struct insn_state *state)
{
2461 2462
	struct cfi_state *cfi = &state->cfi;

2463 2464 2465
	if (cfi->cfa.base == CFI_BP &&
	    check_reg_frame_pos(&cfi->regs[CFI_BP], -cfi->cfa.offset) &&
	    check_reg_frame_pos(&cfi->regs[CFI_RA], -cfi->cfa.offset + 8))
2466 2467
		return true;

2468
	if (cfi->drap && cfi->regs[CFI_BP].base == CFI_BP)
2469 2470 2471
		return true;

	return false;
2472 2473
}

2474 2475
static int update_cfi_state_regs(struct instruction *insn,
				  struct cfi_state *cfi,
2476
				  struct stack_op *op)
2477
{
2478
	struct cfi_reg *cfa = &cfi->cfa;
2479

2480
	if (cfa->base != CFI_SP && cfa->base != CFI_SP_INDIRECT)
2481 2482 2483
		return 0;

	/* push */
P
Peter Zijlstra 已提交
2484
	if (op->dest.type == OP_DEST_PUSH || op->dest.type == OP_DEST_PUSHF)
2485 2486 2487
		cfa->offset += 8;

	/* pop */
P
Peter Zijlstra 已提交
2488
	if (op->src.type == OP_SRC_POP || op->src.type == OP_SRC_POPF)
2489 2490 2491 2492 2493 2494 2495 2496 2497 2498
		cfa->offset -= 8;

	/* add immediate to sp */
	if (op->dest.type == OP_DEST_REG && op->src.type == OP_SRC_ADD &&
	    op->dest.reg == CFI_SP && op->src.reg == CFI_SP)
		cfa->offset -= op->src.offset;

	return 0;
}

2499
static void save_reg(struct cfi_state *cfi, unsigned char reg, int base, int offset)
2500
{
2501
	if (arch_callee_saved_reg(reg) &&
2502 2503 2504
	    cfi->regs[reg].base == CFI_UNDEFINED) {
		cfi->regs[reg].base = base;
		cfi->regs[reg].offset = offset;
2505
	}
2506 2507
}

2508
static void restore_reg(struct cfi_state *cfi, unsigned char reg)
2509
{
2510 2511
	cfi->regs[reg].base = initial_func_cfi.regs[reg].base;
	cfi->regs[reg].offset = initial_func_cfi.regs[reg].offset;
2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549 2550 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566
}

/*
 * A note about DRAP stack alignment:
 *
 * GCC has the concept of a DRAP register, which is used to help keep track of
 * the stack pointer when aligning the stack.  r10 or r13 is used as the DRAP
 * register.  The typical DRAP pattern is:
 *
 *   4c 8d 54 24 08		lea    0x8(%rsp),%r10
 *   48 83 e4 c0		and    $0xffffffffffffffc0,%rsp
 *   41 ff 72 f8		pushq  -0x8(%r10)
 *   55				push   %rbp
 *   48 89 e5			mov    %rsp,%rbp
 *				(more pushes)
 *   41 52			push   %r10
 *				...
 *   41 5a			pop    %r10
 *				(more pops)
 *   5d				pop    %rbp
 *   49 8d 62 f8		lea    -0x8(%r10),%rsp
 *   c3				retq
 *
 * There are some variations in the epilogues, like:
 *
 *   5b				pop    %rbx
 *   41 5a			pop    %r10
 *   41 5c			pop    %r12
 *   41 5d			pop    %r13
 *   41 5e			pop    %r14
 *   c9				leaveq
 *   49 8d 62 f8		lea    -0x8(%r10),%rsp
 *   c3				retq
 *
 * and:
 *
 *   4c 8b 55 e8		mov    -0x18(%rbp),%r10
 *   48 8b 5d e0		mov    -0x20(%rbp),%rbx
 *   4c 8b 65 f0		mov    -0x10(%rbp),%r12
 *   4c 8b 6d f8		mov    -0x8(%rbp),%r13
 *   c9				leaveq
 *   49 8d 62 f8		lea    -0x8(%r10),%rsp
 *   c3				retq
 *
 * Sometimes r13 is used as the DRAP register, in which case it's saved and
 * restored beforehand:
 *
 *   41 55			push   %r13
 *   4c 8d 6c 24 10		lea    0x10(%rsp),%r13
 *   48 83 e4 f0		and    $0xfffffffffffffff0,%rsp
 *				...
 *   49 8d 65 f0		lea    -0x10(%r13),%rsp
 *   41 5d			pop    %r13
 *   c3				retq
 */
2567 2568 2569
static int update_cfi_state(struct instruction *insn,
			    struct instruction *next_insn,
			    struct cfi_state *cfi, struct stack_op *op)
2570
{
2571 2572
	struct cfi_reg *cfa = &cfi->cfa;
	struct cfi_reg *regs = cfi->regs;
2573 2574 2575 2576 2577 2578 2579 2580 2581 2582

	/* stack operations don't make sense with an undefined CFA */
	if (cfa->base == CFI_UNDEFINED) {
		if (insn->func) {
			WARN_FUNC("undefined stack state", insn->sec, insn->offset);
			return -1;
		}
		return 0;
	}

2583 2584
	if (cfi->type == UNWIND_HINT_TYPE_REGS ||
	    cfi->type == UNWIND_HINT_TYPE_REGS_PARTIAL)
2585
		return update_cfi_state_regs(insn, cfi, op);
2586

2587 2588 2589 2590 2591 2592
	switch (op->dest.type) {

	case OP_DEST_REG:
		switch (op->src.type) {

		case OP_SRC_REG:
2593 2594
			if (op->src.reg == CFI_SP && op->dest.reg == CFI_BP &&
			    cfa->base == CFI_SP &&
2595
			    check_reg_frame_pos(&regs[CFI_BP], -cfa->offset)) {
2596 2597 2598

				/* mov %rsp, %rbp */
				cfa->base = op->dest.reg;
2599
				cfi->bp_scratch = false;
2600
			}
2601

2602
			else if (op->src.reg == CFI_SP &&
2603
				 op->dest.reg == CFI_BP && cfi->drap) {
2604

2605 2606
				/* drap: mov %rsp, %rbp */
				regs[CFI_BP].base = CFI_BP;
2607 2608
				regs[CFI_BP].offset = -cfi->stack_size;
				cfi->bp_scratch = false;
2609
			}
2610

2611 2612 2613 2614 2615 2616 2617 2618 2619 2620 2621 2622
			else if (op->src.reg == CFI_SP && cfa->base == CFI_SP) {

				/*
				 * mov %rsp, %reg
				 *
				 * This is needed for the rare case where GCC
				 * does:
				 *
				 *   mov    %rsp, %rax
				 *   ...
				 *   mov    %rax, %rsp
				 */
2623 2624
				cfi->vals[op->dest.reg].base = CFI_CFA;
				cfi->vals[op->dest.reg].offset = -cfi->stack_size;
2625 2626
			}

J
Josh Poimboeuf 已提交
2627
			else if (op->src.reg == CFI_BP && op->dest.reg == CFI_SP &&
P
Peter Zijlstra 已提交
2628
				 (cfa->base == CFI_BP || cfa->base == cfi->drap_reg)) {
J
Josh Poimboeuf 已提交
2629 2630 2631 2632 2633 2634

				/*
				 * mov %rbp, %rsp
				 *
				 * Restore the original stack pointer (Clang).
				 */
2635
				cfi->stack_size = -cfi->regs[CFI_BP].offset;
J
Josh Poimboeuf 已提交
2636 2637
			}

2638 2639 2640 2641
			else if (op->dest.reg == cfa->base) {

				/* mov %reg, %rsp */
				if (cfa->base == CFI_SP &&
2642
				    cfi->vals[op->src.reg].base == CFI_CFA) {
2643 2644 2645 2646 2647 2648 2649 2650 2651

					/*
					 * This is needed for the rare case
					 * where GCC does something dumb like:
					 *
					 *   lea    0x8(%rsp), %rcx
					 *   ...
					 *   mov    %rcx, %rsp
					 */
2652 2653
					cfa->offset = -cfi->vals[op->src.reg].offset;
					cfi->stack_size = cfa->offset;
2654

P
Peter Zijlstra 已提交
2655 2656 2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671 2672 2673 2674 2675 2676 2677 2678 2679 2680 2681 2682 2683 2684 2685 2686
				} else if (cfa->base == CFI_SP &&
					   cfi->vals[op->src.reg].base == CFI_SP_INDIRECT &&
					   cfi->vals[op->src.reg].offset == cfa->offset) {

					/*
					 * Stack swizzle:
					 *
					 * 1: mov %rsp, (%[tos])
					 * 2: mov %[tos], %rsp
					 *    ...
					 * 3: pop %rsp
					 *
					 * Where:
					 *
					 * 1 - places a pointer to the previous
					 *     stack at the Top-of-Stack of the
					 *     new stack.
					 *
					 * 2 - switches to the new stack.
					 *
					 * 3 - pops the Top-of-Stack to restore
					 *     the original stack.
					 *
					 * Note: we set base to SP_INDIRECT
					 * here and preserve offset. Therefore
					 * when the unwinder reaches ToS it
					 * will dereference SP and then add the
					 * offset to find the next frame, IOW:
					 * (%rsp) + offset.
					 */
					cfa->base = CFI_SP_INDIRECT;

2687 2688 2689 2690
				} else {
					cfa->base = CFI_UNDEFINED;
					cfa->offset = 0;
				}
2691 2692
			}

2693 2694 2695 2696 2697 2698 2699 2700 2701 2702 2703 2704 2705 2706
			else if (op->dest.reg == CFI_SP &&
				 cfi->vals[op->src.reg].base == CFI_SP_INDIRECT &&
				 cfi->vals[op->src.reg].offset == cfa->offset) {

				/*
				 * The same stack swizzle case 2) as above. But
				 * because we can't change cfa->base, case 3)
				 * will become a regular POP. Pretend we're a
				 * PUSH so things don't go unbalanced.
				 */
				cfi->stack_size += 8;
			}


2707 2708 2709 2710 2711 2712
			break;

		case OP_SRC_ADD:
			if (op->dest.reg == CFI_SP && op->src.reg == CFI_SP) {

				/* add imm, %rsp */
2713
				cfi->stack_size -= op->src.offset;
2714 2715 2716 2717 2718 2719 2720 2721
				if (cfa->base == CFI_SP)
					cfa->offset -= op->src.offset;
				break;
			}

			if (op->dest.reg == CFI_SP && op->src.reg == CFI_BP) {

				/* lea disp(%rbp), %rsp */
2722
				cfi->stack_size = -(op->src.offset + regs[CFI_BP].offset);
2723 2724 2725
				break;
			}

2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736
			if (!cfi->drap && op->src.reg == CFI_SP &&
			    op->dest.reg == CFI_BP && cfa->base == CFI_SP &&
			    check_reg_frame_pos(&regs[CFI_BP], -cfa->offset + op->src.offset)) {

				/* lea disp(%rsp), %rbp */
				cfa->base = CFI_BP;
				cfa->offset -= op->src.offset;
				cfi->bp_scratch = false;
				break;
			}

2737
			if (op->src.reg == CFI_SP && cfa->base == CFI_SP) {
2738 2739

				/* drap: lea disp(%rsp), %drap */
2740
				cfi->drap_reg = op->dest.reg;
2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751

				/*
				 * lea disp(%rsp), %reg
				 *
				 * This is needed for the rare case where GCC
				 * does something dumb like:
				 *
				 *   lea    0x8(%rsp), %rcx
				 *   ...
				 *   mov    %rcx, %rsp
				 */
2752 2753 2754
				cfi->vals[op->dest.reg].base = CFI_CFA;
				cfi->vals[op->dest.reg].offset = \
					-cfi->stack_size + op->src.offset;
2755

2756 2757 2758
				break;
			}

2759 2760
			if (cfi->drap && op->dest.reg == CFI_SP &&
			    op->src.reg == cfi->drap_reg) {
2761 2762 2763

				 /* drap: lea disp(%drap), %rsp */
				cfa->base = CFI_SP;
2764 2765 2766
				cfa->offset = cfi->stack_size = -op->src.offset;
				cfi->drap_reg = CFI_UNDEFINED;
				cfi->drap = false;
2767 2768 2769
				break;
			}

2770
			if (op->dest.reg == cfi->cfa.base && !(next_insn && next_insn->hint)) {
2771 2772 2773 2774 2775 2776 2777 2778 2779
				WARN_FUNC("unsupported stack register modification",
					  insn->sec, insn->offset);
				return -1;
			}

			break;

		case OP_SRC_AND:
			if (op->dest.reg != CFI_SP ||
2780 2781
			    (cfi->drap_reg != CFI_UNDEFINED && cfa->base != CFI_SP) ||
			    (cfi->drap_reg == CFI_UNDEFINED && cfa->base != CFI_BP)) {
2782 2783 2784 2785 2786
				WARN_FUNC("unsupported stack pointer realignment",
					  insn->sec, insn->offset);
				return -1;
			}

2787
			if (cfi->drap_reg != CFI_UNDEFINED) {
2788
				/* drap: and imm, %rsp */
2789 2790 2791
				cfa->base = cfi->drap_reg;
				cfa->offset = cfi->stack_size = 0;
				cfi->drap = true;
2792 2793 2794 2795 2796 2797 2798 2799 2800 2801
			}

			/*
			 * Older versions of GCC (4.8ish) realign the stack
			 * without DRAP, with a frame pointer.
			 */

			break;

		case OP_SRC_POP:
P
Peter Zijlstra 已提交
2802
		case OP_SRC_POPF:
P
Peter Zijlstra 已提交
2803 2804 2805 2806 2807 2808 2809
			if (op->dest.reg == CFI_SP && cfa->base == CFI_SP_INDIRECT) {

				/* pop %rsp; # restore from a stack swizzle */
				cfa->base = CFI_SP;
				break;
			}

2810
			if (!cfi->drap && op->dest.reg == cfa->base) {
2811 2812 2813 2814 2815

				/* pop %rbp */
				cfa->base = CFI_SP;
			}

2816 2817 2818
			if (cfi->drap && cfa->base == CFI_BP_INDIRECT &&
			    op->dest.reg == cfi->drap_reg &&
			    cfi->drap_offset == -cfi->stack_size) {
2819

2820
				/* drap: pop %drap */
2821
				cfa->base = cfi->drap_reg;
2822
				cfa->offset = 0;
2823
				cfi->drap_offset = -1;
2824

P
Peter Zijlstra 已提交
2825
			} else if (cfi->stack_size == -regs[op->dest.reg].offset) {
2826

2827
				/* pop %reg */
2828
				restore_reg(cfi, op->dest.reg);
2829 2830
			}

2831
			cfi->stack_size -= 8;
2832 2833 2834 2835 2836 2837
			if (cfa->base == CFI_SP)
				cfa->offset -= 8;

			break;

		case OP_SRC_REG_INDIRECT:
2838 2839 2840 2841 2842 2843 2844 2845
			if (!cfi->drap && op->dest.reg == cfa->base &&
			    op->dest.reg == CFI_BP) {

				/* mov disp(%rsp), %rbp */
				cfa->base = CFI_SP;
				cfa->offset = cfi->stack_size;
			}

2846 2847
			if (cfi->drap && op->src.reg == CFI_BP &&
			    op->src.offset == cfi->drap_offset) {
2848 2849

				/* drap: mov disp(%rbp), %drap */
2850
				cfa->base = cfi->drap_reg;
2851
				cfa->offset = 0;
2852
				cfi->drap_offset = -1;
2853 2854
			}

2855
			if (cfi->drap && op->src.reg == CFI_BP &&
2856 2857 2858
			    op->src.offset == regs[op->dest.reg].offset) {

				/* drap: mov disp(%rbp), %reg */
2859
				restore_reg(cfi, op->dest.reg);
2860 2861 2862 2863 2864 2865

			} else if (op->src.reg == cfa->base &&
			    op->src.offset == regs[op->dest.reg].offset + cfa->offset) {

				/* mov disp(%rbp), %reg */
				/* mov disp(%rsp), %reg */
2866
				restore_reg(cfi, op->dest.reg);
2867 2868 2869 2870 2871 2872

			} else if (op->src.reg == CFI_SP &&
				   op->src.offset == regs[op->dest.reg].offset + cfi->stack_size) {

				/* mov disp(%rsp), %reg */
				restore_reg(cfi, op->dest.reg);
2873 2874 2875 2876 2877 2878 2879 2880 2881 2882 2883 2884 2885
			}

			break;

		default:
			WARN_FUNC("unknown stack-related instruction",
				  insn->sec, insn->offset);
			return -1;
		}

		break;

	case OP_DEST_PUSH:
P
Peter Zijlstra 已提交
2886
	case OP_DEST_PUSHF:
2887
		cfi->stack_size += 8;
2888 2889 2890 2891 2892 2893
		if (cfa->base == CFI_SP)
			cfa->offset += 8;

		if (op->src.type != OP_SRC_REG)
			break;

2894 2895
		if (cfi->drap) {
			if (op->src.reg == cfa->base && op->src.reg == cfi->drap_reg) {
2896 2897 2898

				/* drap: push %drap */
				cfa->base = CFI_BP_INDIRECT;
2899
				cfa->offset = -cfi->stack_size;
2900

2901
				/* save drap so we know when to restore it */
2902
				cfi->drap_offset = -cfi->stack_size;
2903

2904
			} else if (op->src.reg == CFI_BP && cfa->base == cfi->drap_reg) {
2905 2906

				/* drap: push %rbp */
2907
				cfi->stack_size = 0;
2908

2909
			} else {
2910 2911

				/* drap: push %reg */
2912
				save_reg(cfi, op->src.reg, CFI_BP, -cfi->stack_size);
2913 2914 2915 2916 2917
			}

		} else {

			/* push %reg */
2918
			save_reg(cfi, op->src.reg, CFI_CFA, -cfi->stack_size);
2919 2920 2921
		}

		/* detect when asm code uses rbp as a scratch register */
2922
		if (opts.stackval && insn->func && op->src.reg == CFI_BP &&
2923
		    cfa->base != CFI_BP)
2924
			cfi->bp_scratch = true;
2925 2926 2927 2928
		break;

	case OP_DEST_REG_INDIRECT:

2929 2930
		if (cfi->drap) {
			if (op->src.reg == cfa->base && op->src.reg == cfi->drap_reg) {
2931 2932 2933 2934 2935

				/* drap: mov %drap, disp(%rbp) */
				cfa->base = CFI_BP_INDIRECT;
				cfa->offset = op->dest.offset;

2936
				/* save drap offset so we know when to restore it */
2937
				cfi->drap_offset = op->dest.offset;
2938
			} else {
2939 2940

				/* drap: mov reg, disp(%rbp) */
2941
				save_reg(cfi, op->src.reg, CFI_BP, op->dest.offset);
2942 2943 2944 2945 2946 2947
			}

		} else if (op->dest.reg == cfa->base) {

			/* mov reg, disp(%rbp) */
			/* mov reg, disp(%rsp) */
2948 2949
			save_reg(cfi, op->src.reg, CFI_CFA,
				 op->dest.offset - cfi->cfa.offset);
2950 2951 2952 2953 2954 2955

		} else if (op->dest.reg == CFI_SP) {

			/* mov reg, disp(%rsp) */
			save_reg(cfi, op->src.reg, CFI_CFA,
				 op->dest.offset - cfi->stack_size);
P
Peter Zijlstra 已提交
2956 2957 2958 2959 2960 2961

		} else if (op->src.reg == CFI_SP && op->dest.offset == 0) {

			/* mov %rsp, (%reg); # setup a stack swizzle. */
			cfi->vals[op->dest.reg].base = CFI_SP_INDIRECT;
			cfi->vals[op->dest.reg].offset = cfa->offset;
2962 2963 2964 2965 2966
		}

		break;

	case OP_DEST_MEM:
P
Peter Zijlstra 已提交
2967
		if (op->src.type != OP_SRC_POP && op->src.type != OP_SRC_POPF) {
2968 2969 2970 2971 2972 2973
			WARN_FUNC("unknown stack-related memory operation",
				  insn->sec, insn->offset);
			return -1;
		}

		/* pop mem */
2974
		cfi->stack_size -= 8;
2975 2976 2977 2978 2979 2980 2981 2982 2983 2984 2985 2986 2987 2988
		if (cfa->base == CFI_SP)
			cfa->offset -= 8;

		break;

	default:
		WARN_FUNC("unknown stack-related instruction",
			  insn->sec, insn->offset);
		return -1;
	}

	return 0;
}

2989 2990 2991 2992 2993 2994 2995 2996 2997 2998
/*
 * The stack layouts of alternatives instructions can sometimes diverge when
 * they have stack modifications.  That's fine as long as the potential stack
 * layouts don't conflict at any given potential instruction boundary.
 *
 * Flatten the CFIs of the different alternative code streams (both original
 * and replacement) into a single shared CFI array which can be used to detect
 * conflicts and nicely feed a linear array of ORC entries to the unwinder.
 */
static int propagate_alt_cfi(struct objtool_file *file, struct instruction *insn)
2999
{
3000 3001
	struct cfi_state **alt_cfi;
	int group_off;
3002

3003 3004
	if (!insn->alt_group)
		return 0;
3005

P
Peter Zijlstra 已提交
3006 3007 3008 3009 3010
	if (!insn->cfi) {
		WARN("CFI missing");
		return -1;
	}

3011 3012
	alt_cfi = insn->alt_group->cfi;
	group_off = insn->offset - insn->alt_group->first_insn->offset;
3013

3014
	if (!alt_cfi[group_off]) {
P
Peter Zijlstra 已提交
3015
		alt_cfi[group_off] = insn->cfi;
3016
	} else {
P
Peter Zijlstra 已提交
3017
		if (cficmp(alt_cfi[group_off], insn->cfi)) {
3018 3019
			WARN_FUNC("stack layout conflict in alternatives",
				  insn->sec, insn->offset);
3020 3021
			return -1;
		}
3022 3023 3024 3025 3026
	}

	return 0;
}

3027 3028 3029
static int handle_insn_ops(struct instruction *insn,
			   struct instruction *next_insn,
			   struct insn_state *state)
3030 3031 3032 3033 3034
{
	struct stack_op *op;

	list_for_each_entry(op, &insn->stack_ops, list) {

3035
		if (update_cfi_state(insn, next_insn, &state->cfi, op))
3036
			return 1;
3037

3038 3039 3040
		if (!insn->alt_group)
			continue;

3041 3042 3043 3044 3045 3046 3047 3048 3049 3050 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065
		if (op->dest.type == OP_DEST_PUSHF) {
			if (!state->uaccess_stack) {
				state->uaccess_stack = 1;
			} else if (state->uaccess_stack >> 31) {
				WARN_FUNC("PUSHF stack exhausted",
					  insn->sec, insn->offset);
				return 1;
			}
			state->uaccess_stack <<= 1;
			state->uaccess_stack  |= state->uaccess;
		}

		if (op->src.type == OP_SRC_POPF) {
			if (state->uaccess_stack) {
				state->uaccess = state->uaccess_stack & 1;
				state->uaccess_stack >>= 1;
				if (state->uaccess_stack == 1)
					state->uaccess_stack = 0;
			}
		}
	}

	return 0;
}

3066
static bool insn_cfi_match(struct instruction *insn, struct cfi_state *cfi2)
3067
{
P
Peter Zijlstra 已提交
3068
	struct cfi_state *cfi1 = insn->cfi;
3069 3070
	int i;

P
Peter Zijlstra 已提交
3071 3072 3073 3074 3075
	if (!cfi1) {
		WARN("CFI missing");
		return false;
	}

3076 3077
	if (memcmp(&cfi1->cfa, &cfi2->cfa, sizeof(cfi1->cfa))) {

3078 3079
		WARN_FUNC("stack state mismatch: cfa1=%d%+d cfa2=%d%+d",
			  insn->sec, insn->offset,
3080 3081
			  cfi1->cfa.base, cfi1->cfa.offset,
			  cfi2->cfa.base, cfi2->cfa.offset);
3082

3083
	} else if (memcmp(&cfi1->regs, &cfi2->regs, sizeof(cfi1->regs))) {
3084
		for (i = 0; i < CFI_NUM_REGS; i++) {
3085
			if (!memcmp(&cfi1->regs[i], &cfi2->regs[i],
3086 3087 3088 3089 3090
				    sizeof(struct cfi_reg)))
				continue;

			WARN_FUNC("stack state mismatch: reg1[%d]=%d%+d reg2[%d]=%d%+d",
				  insn->sec, insn->offset,
3091 3092
				  i, cfi1->regs[i].base, cfi1->regs[i].offset,
				  i, cfi2->regs[i].base, cfi2->regs[i].offset);
3093 3094 3095
			break;
		}

3096 3097
	} else if (cfi1->type != cfi2->type) {

3098
		WARN_FUNC("stack state mismatch: type1=%d type2=%d",
3099 3100 3101 3102 3103
			  insn->sec, insn->offset, cfi1->type, cfi2->type);

	} else if (cfi1->drap != cfi2->drap ||
		   (cfi1->drap && cfi1->drap_reg != cfi2->drap_reg) ||
		   (cfi1->drap && cfi1->drap_offset != cfi2->drap_offset)) {
3104

3105
		WARN_FUNC("stack state mismatch: drap1=%d(%d,%d) drap2=%d(%d,%d)",
3106
			  insn->sec, insn->offset,
3107 3108
			  cfi1->drap, cfi1->drap_reg, cfi1->drap_offset,
			  cfi2->drap, cfi2->drap_reg, cfi2->drap_offset);
3109 3110 3111 3112 3113

	} else
		return true;

	return false;
3114 3115
}

P
Peter Zijlstra 已提交
3116 3117 3118
static inline bool func_uaccess_safe(struct symbol *func)
{
	if (func)
3119
		return func->uaccess_safe;
P
Peter Zijlstra 已提交
3120 3121 3122 3123

	return false;
}

3124
static inline const char *call_dest_name(struct instruction *insn)
P
Peter Zijlstra 已提交
3125
{
3126
	static char pvname[19];
3127 3128 3129
	struct reloc *rel;
	int idx;

P
Peter Zijlstra 已提交
3130 3131 3132
	if (insn->call_dest)
		return insn->call_dest->name;

3133 3134 3135 3136 3137 3138 3139
	rel = insn_reloc(NULL, insn);
	if (rel && !strcmp(rel->sym->name, "pv_ops")) {
		idx = (rel->addend / sizeof(void *));
		snprintf(pvname, sizeof(pvname), "pv_ops[%d]", idx);
		return pvname;
	}

P
Peter Zijlstra 已提交
3140 3141 3142
	return "{dynamic}";
}

3143 3144 3145 3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157 3158 3159 3160 3161 3162 3163 3164 3165 3166 3167 3168 3169 3170 3171 3172
static bool pv_call_dest(struct objtool_file *file, struct instruction *insn)
{
	struct symbol *target;
	struct reloc *rel;
	int idx;

	rel = insn_reloc(file, insn);
	if (!rel || strcmp(rel->sym->name, "pv_ops"))
		return false;

	idx = (arch_dest_reloc_offset(rel->addend) / sizeof(void *));

	if (file->pv_ops[idx].clean)
		return true;

	file->pv_ops[idx].clean = true;

	list_for_each_entry(target, &file->pv_ops[idx].targets, pv_target) {
		if (!target->sec->noinstr) {
			WARN("pv_ops[%d]: %s", idx, target->name);
			file->pv_ops[idx].clean = false;
		}
	}

	return file->pv_ops[idx].clean;
}

static inline bool noinstr_call_dest(struct objtool_file *file,
				     struct instruction *insn,
				     struct symbol *func)
3173 3174 3175 3176 3177
{
	/*
	 * We can't deal with indirect function calls at present;
	 * assume they're instrumented.
	 */
3178 3179 3180 3181
	if (!func) {
		if (file->pv_ops)
			return pv_call_dest(file, insn);

3182
		return false;
3183
	}
3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199 3200 3201

	/*
	 * If the symbol is from a noinstr section; we good.
	 */
	if (func->sec->noinstr)
		return true;

	/*
	 * The __ubsan_handle_*() calls are like WARN(), they only happen when
	 * something 'BAD' happened. At the risk of taking the machine down,
	 * let them proceed to get the message out.
	 */
	if (!strncmp(func->name, "__ubsan_handle_", 15))
		return true;

	return false;
}

3202 3203 3204
static int validate_call(struct objtool_file *file,
			 struct instruction *insn,
			 struct insn_state *state)
P
Peter Zijlstra 已提交
3205
{
3206
	if (state->noinstr && state->instr <= 0 &&
3207
	    !noinstr_call_dest(file, insn, insn->call_dest)) {
3208 3209 3210 3211 3212
		WARN_FUNC("call to %s() leaves .noinstr.text section",
				insn->sec, insn->offset, call_dest_name(insn));
		return 1;
	}

P
Peter Zijlstra 已提交
3213 3214
	if (state->uaccess && !func_uaccess_safe(insn->call_dest)) {
		WARN_FUNC("call to %s() with UACCESS enabled",
3215
				insn->sec, insn->offset, call_dest_name(insn));
P
Peter Zijlstra 已提交
3216 3217 3218
		return 1;
	}

3219 3220
	if (state->df) {
		WARN_FUNC("call to %s() with DF set",
3221
				insn->sec, insn->offset, call_dest_name(insn));
3222 3223 3224
		return 1;
	}

P
Peter Zijlstra 已提交
3225 3226 3227
	return 0;
}

3228 3229 3230
static int validate_sibling_call(struct objtool_file *file,
				 struct instruction *insn,
				 struct insn_state *state)
3231
{
3232
	if (has_modified_stack_frame(insn, state)) {
3233 3234 3235 3236 3237
		WARN_FUNC("sibling call from callable instruction with modified stack frame",
				insn->sec, insn->offset);
		return 1;
	}

3238
	return validate_call(file, insn, state);
3239 3240
}

3241 3242
static int validate_return(struct symbol *func, struct instruction *insn, struct insn_state *state)
{
3243 3244 3245 3246 3247 3248
	if (state->noinstr && state->instr > 0) {
		WARN_FUNC("return with instrumentation enabled",
			  insn->sec, insn->offset);
		return 1;
	}

3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266
	if (state->uaccess && !func_uaccess_safe(func)) {
		WARN_FUNC("return with UACCESS enabled",
			  insn->sec, insn->offset);
		return 1;
	}

	if (!state->uaccess && func_uaccess_safe(func)) {
		WARN_FUNC("return with UACCESS disabled from a UACCESS-safe function",
			  insn->sec, insn->offset);
		return 1;
	}

	if (state->df) {
		WARN_FUNC("return with DF set",
			  insn->sec, insn->offset);
		return 1;
	}

3267
	if (func && has_modified_stack_frame(insn, state)) {
3268 3269 3270 3271 3272
		WARN_FUNC("return with modified stack frame",
			  insn->sec, insn->offset);
		return 1;
	}

3273
	if (state->cfi.bp_scratch) {
3274 3275
		WARN_FUNC("BP used as a scratch register",
			  insn->sec, insn->offset);
3276 3277 3278 3279 3280 3281
		return 1;
	}

	return 0;
}

3282 3283
static struct instruction *next_insn_to_validate(struct objtool_file *file,
						 struct instruction *insn)
3284
{
J
Josh Poimboeuf 已提交
3285
	struct alt_group *alt_group = insn->alt_group;
3286

3287 3288 3289 3290 3291 3292 3293 3294 3295
	/*
	 * Simulate the fact that alternatives are patched in-place.  When the
	 * end of a replacement alt_group is reached, redirect objtool flow to
	 * the end of the original alt_group.
	 */
	if (alt_group && insn == alt_group->last_insn && alt_group->orig_group)
		return next_insn_same_sec(file, alt_group->orig_group->last_insn);

	return next_insn_same_sec(file, insn);
3296 3297
}

3298 3299 3300 3301
/*
 * Follow the branch starting at the given instruction, and recursively follow
 * any other branches (jumps).  Meanwhile, track the frame pointer state at
 * each instruction and validate all the rules described in
3302
 * tools/objtool/Documentation/objtool.txt.
3303
 */
3304
static int validate_branch(struct objtool_file *file, struct symbol *func,
P
Peter Zijlstra 已提交
3305
			   struct instruction *insn, struct insn_state state)
3306 3307
{
	struct alternative *alt;
P
Peter Zijlstra 已提交
3308
	struct instruction *next_insn, *prev_insn = NULL;
3309
	struct section *sec;
3310
	u8 visited;
3311 3312 3313 3314 3315
	int ret;

	sec = insn->sec;

	while (1) {
3316
		next_insn = next_insn_to_validate(file, insn);
3317

3318
		if (func && insn->func && func != insn->func->pfunc) {
3319 3320 3321
			WARN("%s() falls through to next function %s()",
			     func->name, insn->func->name);
			return 1;
3322 3323
		}

3324 3325 3326
		if (func && insn->ignore) {
			WARN_FUNC("BUG: why am I validating an ignored function?",
				  sec, insn->offset);
3327
			return 1;
3328 3329
		}

3330 3331
		visited = VISITED_BRANCH << state.uaccess;
		if (insn->visited & VISITED_BRANCH_MASK) {
3332
			if (!insn->hint && !insn_cfi_match(insn, &state.cfi))
3333 3334
				return 1;

3335
			if (insn->visited & visited)
P
Peter Zijlstra 已提交
3336
				return 0;
P
Peter Zijlstra 已提交
3337 3338
		} else {
			nr_insns_visited++;
3339 3340
		}

3341 3342 3343
		if (state.noinstr)
			state.instr += insn->instr;

P
Peter Zijlstra 已提交
3344
		if (insn->hint) {
3345 3346 3347 3348 3349 3350 3351 3352 3353 3354 3355 3356 3357 3358 3359 3360 3361 3362 3363 3364 3365 3366 3367 3368 3369 3370 3371 3372 3373
			if (insn->restore) {
				struct instruction *save_insn, *i;

				i = insn;
				save_insn = NULL;

				sym_for_each_insn_continue_reverse(file, func, i) {
					if (i->save) {
						save_insn = i;
						break;
					}
				}

				if (!save_insn) {
					WARN_FUNC("no corresponding CFI save for CFI restore",
						  sec, insn->offset);
					return 1;
				}

				if (!save_insn->visited) {
					WARN_FUNC("objtool isn't smart enough to handle this CFI save/restore combo",
						  sec, insn->offset);
					return 1;
				}

				insn->cfi = save_insn->cfi;
				nr_cfi_reused++;
			}

P
Peter Zijlstra 已提交
3374 3375 3376 3377 3378 3379 3380 3381 3382 3383 3384
			state.cfi = *insn->cfi;
		} else {
			/* XXX track if we actually changed state.cfi */

			if (prev_insn && !cficmp(prev_insn->cfi, &state.cfi)) {
				insn->cfi = prev_insn->cfi;
				nr_cfi_reused++;
			} else {
				insn->cfi = cfi_hash_find_or_add(&state.cfi);
			}
		}
3385

3386
		insn->visited |= visited;
3387

3388 3389 3390
		if (propagate_alt_cfi(file, insn))
			return 1;

3391
		if (!insn->ignore_alts && !list_empty(&insn->alts)) {
P
Peter Zijlstra 已提交
3392 3393
			bool skip_orig = false;

3394
			list_for_each_entry(alt, &insn->alts, list) {
P
Peter Zijlstra 已提交
3395 3396 3397
				if (alt->skip_orig)
					skip_orig = true;

3398
				ret = validate_branch(file, func, alt->insn, state);
3399
				if (ret) {
3400
					if (opts.backtrace)
3401 3402 3403
						BT_FUNC("(alt)", insn);
					return ret;
				}
3404
			}
P
Peter Zijlstra 已提交
3405 3406 3407

			if (skip_orig)
				return 0;
3408 3409
		}

3410
		if (handle_insn_ops(insn, next_insn, &state))
3411 3412
			return 1;

3413 3414 3415
		switch (insn->type) {

		case INSN_RETURN:
3416
			return validate_return(func, insn, &state);
3417 3418

		case INSN_CALL:
P
Peter Zijlstra 已提交
3419
		case INSN_CALL_DYNAMIC:
3420
			ret = validate_call(file, insn, &state);
P
Peter Zijlstra 已提交
3421 3422
			if (ret)
				return ret;
3423

3424
			if (opts.stackval && func && !is_fentry_call(insn) &&
3425
			    !has_valid_stack_frame(&state)) {
3426 3427 3428 3429
				WARN_FUNC("call without frame pointer save/setup",
					  sec, insn->offset);
				return 1;
			}
3430

P
Peter Zijlstra 已提交
3431
			if (insn->dead_end)
3432 3433
				return 0;

3434 3435 3436 3437
			break;

		case INSN_JUMP_CONDITIONAL:
		case INSN_JUMP_UNCONDITIONAL:
3438
			if (is_sibling_call(insn)) {
3439
				ret = validate_sibling_call(file, insn, &state);
3440
				if (ret)
3441
					return ret;
3442

3443
			} else if (insn->jump_dest) {
3444 3445
				ret = validate_branch(file, func,
						      insn->jump_dest, state);
3446
				if (ret) {
3447
					if (opts.backtrace)
3448 3449 3450
						BT_FUNC("(branch)", insn);
					return ret;
				}
3451
			}
3452 3453 3454 3455 3456 3457 3458

			if (insn->type == INSN_JUMP_UNCONDITIONAL)
				return 0;

			break;

		case INSN_JUMP_DYNAMIC:
3459
		case INSN_JUMP_DYNAMIC_CONDITIONAL:
3460
			if (is_sibling_call(insn)) {
3461
				ret = validate_sibling_call(file, insn, &state);
3462 3463
				if (ret)
					return ret;
3464 3465
			}

3466 3467 3468 3469
			if (insn->type == INSN_JUMP_DYNAMIC)
				return 0;

			break;
3470

3471 3472 3473 3474 3475 3476 3477 3478
		case INSN_CONTEXT_SWITCH:
			if (func && (!next_insn || !next_insn->hint)) {
				WARN_FUNC("unsupported instruction in callable function",
					  sec, insn->offset);
				return 1;
			}
			return 0;

P
Peter Zijlstra 已提交
3479 3480 3481 3482 3483 3484 3485 3486 3487 3488
		case INSN_STAC:
			if (state.uaccess) {
				WARN_FUNC("recursive UACCESS enable", sec, insn->offset);
				return 1;
			}

			state.uaccess = true;
			break;

		case INSN_CLAC:
3489
			if (!state.uaccess && func) {
P
Peter Zijlstra 已提交
3490 3491 3492 3493 3494 3495 3496 3497 3498 3499
				WARN_FUNC("redundant UACCESS disable", sec, insn->offset);
				return 1;
			}

			if (func_uaccess_safe(func) && !state.uaccess_stack) {
				WARN_FUNC("UACCESS-safe disables UACCESS", sec, insn->offset);
				return 1;
			}

			state.uaccess = false;
3500 3501
			break;

3502
		case INSN_STD:
3503
			if (state.df) {
3504
				WARN_FUNC("recursive STD", sec, insn->offset);
3505 3506
				return 1;
			}
3507 3508 3509 3510 3511

			state.df = true;
			break;

		case INSN_CLD:
3512
			if (!state.df && func) {
3513
				WARN_FUNC("redundant CLD", sec, insn->offset);
3514 3515
				return 1;
			}
3516 3517

			state.df = false;
3518 3519
			break;

3520 3521 3522 3523 3524 3525 3526
		default:
			break;
		}

		if (insn->dead_end)
			return 0;

3527
		if (!next_insn) {
3528
			if (state.cfi.cfa.base == CFI_UNDEFINED)
3529
				return 0;
3530 3531 3532
			WARN("%s: unexpected end of section", sec->name);
			return 1;
		}
3533

P
Peter Zijlstra 已提交
3534
		prev_insn = insn;
3535
		insn = next_insn;
3536 3537 3538 3539 3540
	}

	return 0;
}

3541
static int validate_unwind_hints(struct objtool_file *file, struct section *sec)
3542 3543 3544
{
	struct instruction *insn;
	struct insn_state state;
3545
	int ret, warnings = 0;
3546 3547 3548 3549

	if (!file->hints)
		return 0;

3550
	init_insn_state(file, &state, sec);
3551

3552 3553 3554 3555 3556 3557 3558 3559 3560
	if (sec) {
		insn = find_insn(file, sec, 0);
		if (!insn)
			return 0;
	} else {
		insn = list_first_entry(&file->insn_list, typeof(*insn), list);
	}

	while (&insn->list != &file->insn_list && (!sec || insn->sec == sec)) {
3561
		if (insn->hint && !insn->visited && !insn->ignore) {
3562
			ret = validate_branch(file, insn->func, insn, state);
3563
			if (ret && opts.backtrace)
3564
				BT_FUNC("<=== (hint)", insn);
3565 3566
			warnings += ret;
		}
3567 3568

		insn = list_next_entry(insn, list);
3569 3570 3571 3572 3573
	}

	return warnings;
}

3574 3575 3576 3577 3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590 3591 3592 3593 3594 3595 3596 3597 3598 3599 3600 3601 3602 3603 3604 3605 3606 3607 3608 3609 3610 3611 3612 3613 3614 3615 3616 3617 3618 3619 3620 3621 3622 3623 3624 3625 3626 3627 3628 3629 3630 3631 3632 3633 3634 3635 3636 3637 3638 3639 3640 3641 3642 3643 3644 3645 3646 3647 3648 3649 3650 3651 3652 3653 3654 3655 3656 3657 3658 3659 3660 3661 3662 3663 3664 3665 3666 3667 3668 3669 3670 3671 3672 3673 3674 3675 3676 3677 3678 3679 3680 3681 3682 3683 3684 3685 3686 3687 3688 3689 3690 3691 3692 3693 3694 3695 3696 3697 3698 3699 3700 3701 3702 3703 3704 3705 3706 3707 3708 3709 3710 3711 3712
/*
 * Validate rethunk entry constraint: must untrain RET before the first RET.
 *
 * Follow every branch (intra-function) and ensure ANNOTATE_UNRET_END comes
 * before an actual RET instruction.
 */
static int validate_entry(struct objtool_file *file, struct instruction *insn)
{
	struct instruction *next, *dest;
	int ret, warnings = 0;

	for (;;) {
		next = next_insn_to_validate(file, insn);

		if (insn->visited & VISITED_ENTRY)
			return 0;

		insn->visited |= VISITED_ENTRY;

		if (!insn->ignore_alts && !list_empty(&insn->alts)) {
			struct alternative *alt;
			bool skip_orig = false;

			list_for_each_entry(alt, &insn->alts, list) {
				if (alt->skip_orig)
					skip_orig = true;

				ret = validate_entry(file, alt->insn);
				if (ret) {
				        if (opts.backtrace)
						BT_FUNC("(alt)", insn);
					return ret;
				}
			}

			if (skip_orig)
				return 0;
		}

		switch (insn->type) {

		case INSN_CALL_DYNAMIC:
		case INSN_JUMP_DYNAMIC:
		case INSN_JUMP_DYNAMIC_CONDITIONAL:
			WARN_FUNC("early indirect call", insn->sec, insn->offset);
			return 1;

		case INSN_JUMP_UNCONDITIONAL:
		case INSN_JUMP_CONDITIONAL:
			if (!is_sibling_call(insn)) {
				if (!insn->jump_dest) {
					WARN_FUNC("unresolved jump target after linking?!?",
						  insn->sec, insn->offset);
					return -1;
				}
				ret = validate_entry(file, insn->jump_dest);
				if (ret) {
					if (opts.backtrace) {
						BT_FUNC("(branch%s)", insn,
							insn->type == INSN_JUMP_CONDITIONAL ? "-cond" : "");
					}
					return ret;
				}

				if (insn->type == INSN_JUMP_UNCONDITIONAL)
					return 0;

				break;
			}

			/* fallthrough */
		case INSN_CALL:
			dest = find_insn(file, insn->call_dest->sec,
					 insn->call_dest->offset);
			if (!dest) {
				WARN("Unresolved function after linking!?: %s",
				     insn->call_dest->name);
				return -1;
			}

			ret = validate_entry(file, dest);
			if (ret) {
				if (opts.backtrace)
					BT_FUNC("(call)", insn);
				return ret;
			}
			/*
			 * If a call returns without error, it must have seen UNTRAIN_RET.
			 * Therefore any non-error return is a success.
			 */
			return 0;

		case INSN_RETURN:
			WARN_FUNC("RET before UNTRAIN", insn->sec, insn->offset);
			return 1;

		case INSN_NOP:
			if (insn->retpoline_safe)
				return 0;
			break;

		default:
			break;
		}

		if (!next) {
			WARN_FUNC("teh end!", insn->sec, insn->offset);
			return -1;
		}
		insn = next;
	}

	return warnings;
}

/*
 * Validate that all branches starting at 'insn->entry' encounter UNRET_END
 * before RET.
 */
static int validate_unret(struct objtool_file *file)
{
	struct instruction *insn;
	int ret, warnings = 0;

	for_each_insn(file, insn) {
		if (!insn->entry)
			continue;

		ret = validate_entry(file, insn);
		if (ret < 0) {
			WARN_FUNC("Failed UNRET validation", insn->sec, insn->offset);
			return ret;
		}
		warnings += ret;
	}

	return warnings;
}

3713 3714 3715 3716 3717 3718 3719
static int validate_retpoline(struct objtool_file *file)
{
	struct instruction *insn;
	int warnings = 0;

	for_each_insn(file, insn) {
		if (insn->type != INSN_JUMP_DYNAMIC &&
3720 3721
		    insn->type != INSN_CALL_DYNAMIC &&
		    insn->type != INSN_RETURN)
3722 3723 3724 3725 3726
			continue;

		if (insn->retpoline_safe)
			continue;

3727 3728 3729 3730 3731 3732
		/*
		 * .init.text code is ran before userspace and thus doesn't
		 * strictly need retpolines, except for modules which are
		 * loaded late, they very much do need retpoline in their
		 * .init.text
		 */
3733
		if (!strcmp(insn->sec->name, ".init.text") && !opts.module)
3734 3735
			continue;

3736
		if (insn->type == INSN_RETURN) {
3737 3738 3739 3740 3741
			if (opts.rethunk) {
				WARN_FUNC("'naked' return found in RETHUNK build",
					  insn->sec, insn->offset);
			} else
				continue;
3742 3743 3744 3745 3746
		} else {
			WARN_FUNC("indirect %s found in RETPOLINE build",
				  insn->sec, insn->offset,
				  insn->type == INSN_JUMP_DYNAMIC ? "jump" : "call");
		}
3747 3748 3749 3750 3751 3752 3753

		warnings++;
	}

	return warnings;
}

3754 3755 3756 3757 3758 3759 3760 3761 3762 3763 3764 3765 3766
static bool is_kasan_insn(struct instruction *insn)
{
	return (insn->type == INSN_CALL &&
		!strcmp(insn->call_dest->name, "__asan_handle_no_return"));
}

static bool is_ubsan_insn(struct instruction *insn)
{
	return (insn->type == INSN_CALL &&
		!strcmp(insn->call_dest->name,
			"__ubsan_handle_builtin_unreachable"));
}

3767
static bool ignore_unreachable_insn(struct objtool_file *file, struct instruction *insn)
3768 3769
{
	int i;
3770
	struct instruction *prev_insn;
3771

3772
	if (insn->ignore || insn->type == INSN_NOP || insn->type == INSN_TRAP)
3773 3774 3775
		return true;

	/*
P
Peter Zijlstra 已提交
3776
	 * Ignore alternative replacement instructions.  This can happen
3777
	 * when a whitelisted function uses one of the ALTERNATIVE macros.
3778
	 */
P
Peter Zijlstra 已提交
3779
	if (!strcmp(insn->sec->name, ".altinstr_replacement") ||
3780
	    !strcmp(insn->sec->name, ".altinstr_aux"))
3781 3782
		return true;

3783
	/*
3784
	 * Whole archive runs might encounter dead code from weak symbols.
3785 3786 3787 3788 3789 3790
	 * This is where the linker will have dropped the weak symbol in
	 * favour of a regular symbol, but leaves the code in place.
	 *
	 * In this case we'll find a piece of code (whole function) that is not
	 * covered by a !section symbol. Ignore them.
	 */
3791
	if (opts.link && !insn->func) {
3792 3793 3794 3795 3796 3797 3798 3799 3800 3801 3802 3803 3804 3805 3806 3807 3808 3809 3810 3811 3812 3813 3814 3815 3816 3817 3818 3819 3820 3821 3822 3823 3824 3825
		int size = find_symbol_hole_containing(insn->sec, insn->offset);
		unsigned long end = insn->offset + size;

		if (!size) /* not a hole */
			return false;

		if (size < 0) /* hole until the end */
			return true;

		sec_for_each_insn_continue(file, insn) {
			/*
			 * If we reach a visited instruction at or before the
			 * end of the hole, ignore the unreachable.
			 */
			if (insn->visited)
				return true;

			if (insn->offset >= end)
				break;

			/*
			 * If this hole jumps to a .cold function, mark it ignore too.
			 */
			if (insn->jump_dest && insn->jump_dest->func &&
			    strstr(insn->jump_dest->func->name, ".cold")) {
				struct instruction *dest = insn->jump_dest;
				func_for_each_insn(file, dest->func, dest)
					dest->ignore = true;
			}
		}

		return false;
	}

3826 3827 3828
	if (!insn->func)
		return false;

3829 3830 3831
	if (insn->func->static_call_tramp)
		return true;

3832 3833 3834 3835 3836
	/*
	 * CONFIG_UBSAN_TRAP inserts a UD2 when it sees
	 * __builtin_unreachable().  The BUG() macro has an unreachable() after
	 * the UD2, which causes GCC's undefined trap logic to emit another UD2
	 * (or occasionally a JMP to UD2).
3837 3838
	 *
	 * It may also insert a UD2 after calling a __noreturn function.
3839
	 */
3840 3841
	prev_insn = list_prev_entry(insn, list);
	if ((prev_insn->dead_end || dead_end_function(file, prev_insn->call_dest)) &&
3842 3843 3844 3845 3846
	    (insn->type == INSN_BUG ||
	     (insn->type == INSN_JUMP_UNCONDITIONAL &&
	      insn->jump_dest && insn->jump_dest->type == INSN_BUG)))
		return true;

3847 3848 3849 3850 3851 3852 3853 3854 3855 3856 3857
	/*
	 * Check if this (or a subsequent) instruction is related to
	 * CONFIG_UBSAN or CONFIG_KASAN.
	 *
	 * End the search at 5 instructions to avoid going into the weeds.
	 */
	for (i = 0; i < 5; i++) {

		if (is_kasan_insn(insn) || is_ubsan_insn(insn))
			return true;

3858 3859 3860 3861 3862 3863 3864 3865
		if (insn->type == INSN_JUMP_UNCONDITIONAL) {
			if (insn->jump_dest &&
			    insn->jump_dest->func == insn->func) {
				insn = insn->jump_dest;
				continue;
			}

			break;
3866 3867
		}

3868
		if (insn->offset + insn->len >= insn->func->offset + insn->func->len)
3869
			break;
3870

3871 3872 3873 3874 3875 3876
		insn = list_next_entry(insn, list);
	}

	return false;
}

3877 3878
static int validate_symbol(struct objtool_file *file, struct section *sec,
			   struct symbol *sym, struct insn_state *state)
3879 3880
{
	struct instruction *insn;
3881 3882 3883 3884 3885 3886 3887 3888 3889 3890 3891 3892 3893 3894 3895 3896 3897
	int ret;

	if (!sym->len) {
		WARN("%s() is missing an ELF size annotation", sym->name);
		return 1;
	}

	if (sym->pfunc != sym || sym->alias != sym)
		return 0;

	insn = find_insn(file, sec, sym->offset);
	if (!insn || insn->ignore || insn->visited)
		return 0;

	state->uaccess = sym->uaccess_safe;

	ret = validate_branch(file, insn->func, insn, *state);
3898
	if (ret && opts.backtrace)
3899 3900 3901 3902 3903 3904
		BT_FUNC("<=== (sym)", insn);
	return ret;
}

static int validate_section(struct objtool_file *file, struct section *sec)
{
3905
	struct insn_state state;
3906 3907
	struct symbol *func;
	int warnings = 0;
3908

3909 3910 3911
	list_for_each_entry(func, &sec->symbol_list, list) {
		if (func->type != STT_FUNC)
			continue;
3912

3913
		init_insn_state(file, &state, sec);
3914
		set_func_state(&state.cfi);
3915

3916
		warnings += validate_symbol(file, sec, func, &state);
3917 3918 3919 3920 3921
	}

	return warnings;
}

3922
static int validate_noinstr_sections(struct objtool_file *file)
3923 3924
{
	struct section *sec;
3925
	int warnings = 0;
3926 3927

	sec = find_section_by_name(file->elf, ".noinstr.text");
3928 3929 3930 3931
	if (sec) {
		warnings += validate_section(file, sec);
		warnings += validate_unwind_hints(file, sec);
	}
3932

3933 3934 3935 3936 3937
	sec = find_section_by_name(file->elf, ".entry.text");
	if (sec) {
		warnings += validate_section(file, sec);
		warnings += validate_unwind_hints(file, sec);
	}
3938 3939

	return warnings;
3940 3941
}

3942 3943 3944 3945 3946
static int validate_functions(struct objtool_file *file)
{
	struct section *sec;
	int warnings = 0;

3947 3948 3949 3950
	for_each_sec(file, sec) {
		if (!(sec->sh.sh_flags & SHF_EXECINSTR))
			continue;

3951
		warnings += validate_section(file, sec);
3952
	}
3953 3954 3955 3956

	return warnings;
}

3957
static void mark_endbr_used(struct instruction *insn)
3958
{
3959 3960 3961 3962 3963 3964 3965
	if (!list_empty(&insn->call_node))
		list_del_init(&insn->call_node);
}

static int validate_ibt_insn(struct objtool_file *file, struct instruction *insn)
{
	struct instruction *dest;
3966
	struct reloc *reloc;
3967 3968
	unsigned long off;
	int warnings = 0;
3969

3970 3971 3972 3973 3974 3975 3976 3977 3978 3979 3980 3981 3982 3983 3984 3985 3986
	/*
	 * Looking for function pointer load relocations.  Ignore
	 * direct/indirect branches:
	 */
	switch (insn->type) {
	case INSN_CALL:
	case INSN_CALL_DYNAMIC:
	case INSN_JUMP_CONDITIONAL:
	case INSN_JUMP_UNCONDITIONAL:
	case INSN_JUMP_DYNAMIC:
	case INSN_JUMP_DYNAMIC_CONDITIONAL:
	case INSN_RETURN:
	case INSN_NOP:
		return 0;
	default:
		break;
	}
3987

3988 3989 3990 3991 3992
	for (reloc = insn_reloc(file, insn);
	     reloc;
	     reloc = find_reloc_by_dest_range(file->elf, insn->sec,
					      reloc->offset + 1,
					      (insn->offset + insn->len) - (reloc->offset + 1))) {
3993

3994 3995 3996 3997 3998
		/*
		 * static_call_update() references the trampoline, which
		 * doesn't have (or need) ENDBR.  Skip warning in that case.
		 */
		if (reloc->sym->static_call_tramp)
3999 4000
			continue;

4001 4002 4003 4004 4005 4006 4007 4008
		off = reloc->sym->offset;
		if (reloc->type == R_X86_64_PC32 || reloc->type == R_X86_64_PLT32)
			off += arch_dest_reloc_offset(reloc->addend);
		else
			off += reloc->addend;

		dest = find_insn(file, reloc->sym->sec, off);
		if (!dest)
4009 4010
			continue;

4011 4012
		if (dest->type == INSN_ENDBR) {
			mark_endbr_used(dest);
4013
			continue;
4014
		}
4015

4016 4017 4018 4019 4020 4021 4022 4023 4024 4025 4026 4027 4028 4029 4030 4031
		if (dest->func && dest->func == insn->func) {
			/*
			 * Anything from->to self is either _THIS_IP_ or
			 * IRET-to-self.
			 *
			 * There is no sane way to annotate _THIS_IP_ since the
			 * compiler treats the relocation as a constant and is
			 * happy to fold in offsets, skewing any annotation we
			 * do, leading to vast amounts of false-positives.
			 *
			 * There's also compiler generated _THIS_IP_ through
			 * KCOV and such which we have no hope of annotating.
			 *
			 * As such, blanket accept self-references without
			 * issue.
			 */
4032
			continue;
4033
		}
4034

4035
		if (dest->noendbr)
4036 4037
			continue;

4038 4039 4040 4041 4042 4043 4044 4045 4046 4047 4048 4049 4050 4051 4052 4053 4054 4055 4056 4057 4058 4059 4060 4061 4062 4063 4064 4065 4066 4067 4068 4069 4070 4071 4072 4073 4074 4075 4076 4077 4078 4079 4080 4081 4082 4083 4084 4085 4086 4087 4088 4089 4090 4091
		WARN_FUNC("relocation to !ENDBR: %s",
			  insn->sec, insn->offset,
			  offstr(dest->sec, dest->offset));

		warnings++;
	}

	return warnings;
}

static int validate_ibt_data_reloc(struct objtool_file *file,
				   struct reloc *reloc)
{
	struct instruction *dest;

	dest = find_insn(file, reloc->sym->sec,
			 reloc->sym->offset + reloc->addend);
	if (!dest)
		return 0;

	if (dest->type == INSN_ENDBR) {
		mark_endbr_used(dest);
		return 0;
	}

	if (dest->noendbr)
		return 0;

	WARN_FUNC("data relocation to !ENDBR: %s",
		  reloc->sec->base, reloc->offset,
		  offstr(dest->sec, dest->offset));

	return 1;
}

/*
 * Validate IBT rules and remove used ENDBR instructions from the seal list.
 * Unused ENDBR instructions will be annotated for sealing (i.e., replaced with
 * NOPs) later, in create_ibt_endbr_seal_sections().
 */
static int validate_ibt(struct objtool_file *file)
{
	struct section *sec;
	struct reloc *reloc;
	struct instruction *insn;
	int warnings = 0;

	for_each_insn(file, insn)
		warnings += validate_ibt_insn(file, insn);

	for_each_sec(file, sec) {

		/* Already done by validate_ibt_insn() */
		if (sec->sh.sh_flags & SHF_EXECINSTR)
4092 4093
			continue;

4094 4095
		if (!sec->reloc)
			continue;
4096

4097 4098 4099 4100
		/*
		 * These sections can reference text addresses, but not with
		 * the intent to indirect branch to them.
		 */
4101 4102
		if ((!strncmp(sec->name, ".discard", 8) &&
		     strcmp(sec->name, ".discard.ibt_endbr_noseal"))	||
4103 4104 4105 4106 4107 4108 4109 4110 4111 4112 4113 4114 4115
		    !strncmp(sec->name, ".debug", 6)			||
		    !strcmp(sec->name, ".altinstructions")		||
		    !strcmp(sec->name, ".ibt_endbr_seal")		||
		    !strcmp(sec->name, ".orc_unwind_ip")		||
		    !strcmp(sec->name, ".parainstructions")		||
		    !strcmp(sec->name, ".retpoline_sites")		||
		    !strcmp(sec->name, ".smp_locks")			||
		    !strcmp(sec->name, ".static_call_sites")		||
		    !strcmp(sec->name, "_error_injection_whitelist")	||
		    !strcmp(sec->name, "_kprobe_blacklist")		||
		    !strcmp(sec->name, "__bug_table")			||
		    !strcmp(sec->name, "__ex_table")			||
		    !strcmp(sec->name, "__jump_table")			||
4116
		    !strcmp(sec->name, "__mcount_loc"))
4117
			continue;
4118

4119 4120
		list_for_each_entry(reloc, &sec->reloc->reloc_list, list)
			warnings += validate_ibt_data_reloc(file, reloc);
4121 4122
	}

4123
	return warnings;
4124 4125
}

4126 4127 4128 4129 4130 4131 4132 4133 4134 4135 4136 4137 4138 4139 4140 4141 4142 4143 4144 4145 4146 4147 4148 4149 4150 4151 4152 4153 4154 4155 4156 4157 4158 4159 4160
static int validate_sls(struct objtool_file *file)
{
	struct instruction *insn, *next_insn;
	int warnings = 0;

	for_each_insn(file, insn) {
		next_insn = next_insn_same_sec(file, insn);

		if (insn->retpoline_safe)
			continue;

		switch (insn->type) {
		case INSN_RETURN:
			if (!next_insn || next_insn->type != INSN_TRAP) {
				WARN_FUNC("missing int3 after ret",
					  insn->sec, insn->offset);
				warnings++;
			}

			break;
		case INSN_JUMP_DYNAMIC:
			if (!next_insn || next_insn->type != INSN_TRAP) {
				WARN_FUNC("missing int3 after indirect jump",
					  insn->sec, insn->offset);
				warnings++;
			}
			break;
		default:
			break;
		}
	}

	return warnings;
}

4161
static int validate_reachable_instructions(struct objtool_file *file)
4162 4163
{
	struct instruction *insn;
4164 4165 4166

	if (file->ignore_unreachables)
		return 0;
4167 4168

	for_each_insn(file, insn) {
4169
		if (insn->visited || ignore_unreachable_insn(file, insn))
4170 4171 4172 4173
			continue;

		WARN_FUNC("unreachable instruction", insn->sec, insn->offset);
		return 1;
4174 4175
	}

4176
	return 0;
4177 4178
}

4179
int check(struct objtool_file *file)
4180 4181 4182
{
	int ret, warnings = 0;

4183
	arch_initial_func_cfi_state(&initial_func_cfi);
P
Peter Zijlstra 已提交
4184 4185 4186 4187 4188 4189 4190 4191 4192
	init_cfi_state(&init_cfi);
	init_cfi_state(&func_cfi);
	set_func_state(&func_cfi);

	if (!cfi_hash_alloc(1UL << (file->elf->symbol_bits - 3)))
		goto out;

	cfi_hash_add(&init_cfi);
	cfi_hash_add(&func_cfi);
4193

4194
	ret = decode_sections(file);
4195 4196
	if (ret < 0)
		goto out;
P
Peter Zijlstra 已提交
4197

4198 4199
	warnings += ret;

4200
	if (list_empty(&file->insn_list))
4201 4202
		goto out;

4203
	if (opts.retpoline) {
4204
		ret = validate_retpoline(file);
4205 4206 4207 4208 4209
		if (ret < 0)
			return ret;
		warnings += ret;
	}

4210
	if (opts.stackval || opts.orc || opts.uaccess) {
4211 4212 4213 4214
		ret = validate_functions(file);
		if (ret < 0)
			goto out;
		warnings += ret;
4215

4216
		ret = validate_unwind_hints(file, NULL);
4217 4218 4219
		if (ret < 0)
			goto out;
		warnings += ret;
4220 4221 4222 4223 4224 4225 4226

		if (!warnings) {
			ret = validate_reachable_instructions(file);
			if (ret < 0)
				goto out;
			warnings += ret;
		}
4227 4228 4229 4230 4231 4232

	} else if (opts.noinstr) {
		ret = validate_noinstr_sections(file);
		if (ret < 0)
			goto out;
		warnings += ret;
4233 4234
	}

4235 4236 4237 4238 4239 4240 4241 4242 4243 4244 4245
	if (opts.unret) {
		/*
		 * Must be after validate_branch() and friends, it plays
		 * further games with insn->visited.
		 */
		ret = validate_unret(file);
		if (ret < 0)
			return ret;
		warnings += ret;
	}

4246 4247
	if (opts.ibt) {
		ret = validate_ibt(file);
4248 4249
		if (ret < 0)
			goto out;
4250 4251 4252 4253 4254 4255 4256
		warnings += ret;
	}

	if (opts.sls) {
		ret = validate_sls(file);
		if (ret < 0)
			goto out;
4257 4258 4259
		warnings += ret;
	}

4260 4261 4262 4263 4264 4265
	if (opts.static_call) {
		ret = create_static_call_sections(file);
		if (ret < 0)
			goto out;
		warnings += ret;
	}
4266

4267
	if (opts.retpoline) {
4268 4269 4270 4271 4272 4273
		ret = create_retpoline_sites_sections(file);
		if (ret < 0)
			goto out;
		warnings += ret;
	}

4274
	if (opts.rethunk) {
4275 4276 4277 4278
		ret = create_return_sites_sections(file);
		if (ret < 0)
			goto out;
		warnings += ret;
4279 4280
	}

4281
	if (opts.mcount) {
4282 4283 4284 4285 4286 4287
		ret = create_mcount_loc_sections(file);
		if (ret < 0)
			goto out;
		warnings += ret;
	}

4288
	if (opts.ibt) {
4289 4290 4291 4292 4293 4294
		ret = create_ibt_endbr_seal_sections(file);
		if (ret < 0)
			goto out;
		warnings += ret;
	}

J
Josh Poimboeuf 已提交
4295 4296 4297 4298 4299 4300 4301 4302
	if (opts.orc && !list_empty(&file->insn_list)) {
		ret = orc_create(file);
		if (ret < 0)
			goto out;
		warnings += ret;
	}


4303
	if (opts.stats) {
P
Peter Zijlstra 已提交
4304 4305 4306 4307 4308 4309
		printf("nr_insns_visited: %ld\n", nr_insns_visited);
		printf("nr_cfi: %ld\n", nr_cfi);
		printf("nr_cfi_reused: %ld\n", nr_cfi_reused);
		printf("nr_cfi_cache: %ld\n", nr_cfi_cache);
	}

4310
out:
4311 4312 4313 4314 4315
	/*
	 *  For now, don't fail the kernel build on fatal warnings.  These
	 *  errors are still fairly common due to the growing matrix of
	 *  supported toolchains and their recent pace of change.
	 */
4316 4317
	return 0;
}