diff options
| author | Linus Torvalds <[email protected]> | 2021-11-01 13:24:43 -0700 | 
|---|---|---|
| committer | Linus Torvalds <[email protected]> | 2021-11-01 13:24:43 -0700 | 
| commit | 43aa0a195f06101bcb5d8d711bba0dd24b33a1a0 (patch) | |
| tree | 0236661db875f519cc80e11fde210fdfc9b2be76 /tools/objtool/objtool.c | |
| parent | 595b28fb0c8949463d8ec1e485f36d17c870ddb2 (diff) | |
| parent | 87c87ecd00c54ecd677798cb49ef27329e0fab41 (diff) | |
Merge tag 'objtool-core-2021-10-31' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull objtool updates from Thomas Gleixner:
 - Improve retpoline code patching by separating it from alternatives
   which reduces memory footprint and allows to do better optimizations
   in the actual runtime patching.
 - Add proper retpoline support for x86/BPF
 - Address noinstr warnings in x86/kvm, lockdep and paravirtualization
   code
 - Add support to handle pv_opsindirect calls in the noinstr analysis
 - Classify symbols upfront and cache the result to avoid redundant
   str*cmp() invocations.
 - Add a CFI hash to reduce memory consumption which also reduces
   runtime on a allyesconfig by ~50%
 - Adjust XEN code to make objtool handling more robust and as a side
   effect to prevent text fragmentation due to placement of the
   hypercall page.
* tag 'objtool-core-2021-10-31' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: (41 commits)
  bpf,x86: Respect X86_FEATURE_RETPOLINE*
  bpf,x86: Simplify computing label offsets
  x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
  x86/alternative: Add debug prints to apply_retpolines()
  x86/alternative: Try inline spectre_v2=retpoline,amd
  x86/alternative: Handle Jcc __x86_indirect_thunk_\reg
  x86/alternative: Implement .retpoline_sites support
  x86/retpoline: Create a retpoline thunk array
  x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
  x86/asm: Fixup odd GEN-for-each-reg.h usage
  x86/asm: Fix register order
  x86/retpoline: Remove unused replacement symbols
  objtool,x86: Replace alternatives with .retpoline_sites
  objtool: Shrink struct instruction
  objtool: Explicitly avoid self modifying code in .altinstr_replacement
  objtool: Classify symbols
  objtool: Support pv_opsindirect calls for noinstr
  x86/xen: Rework the xen_{cpu,irq,mmu}_opsarrays
  x86/xen: Mark xen_force_evtchn_callback() noinstr
  x86/xen: Make irq_disable() noinstr
  ...
Diffstat (limited to 'tools/objtool/objtool.c')
| -rw-r--r-- | tools/objtool/objtool.c | 22 | 
1 files changed, 22 insertions, 0 deletions
diff --git a/tools/objtool/objtool.c b/tools/objtool/objtool.c index e21db8bce493..c90c7084e45a 100644 --- a/tools/objtool/objtool.c +++ b/tools/objtool/objtool.c @@ -135,6 +135,28 @@ struct objtool_file *objtool_open_read(const char *_objname)  	return &file;  } +void objtool_pv_add(struct objtool_file *f, int idx, struct symbol *func) +{ +	if (!noinstr) +		return; + +	if (!f->pv_ops) { +		WARN("paravirt confusion"); +		return; +	} + +	/* +	 * These functions will be patched into native code, +	 * see paravirt_patch(). +	 */ +	if (!strcmp(func->name, "_paravirt_nop") || +	    !strcmp(func->name, "_paravirt_ident_64")) +		return; + +	list_add(&func->pv_target, &f->pv_ops[idx].targets); +	f->pv_ops[idx].clean = false; +} +  static void cmd_usage(void)  {  	unsigned int i, longest = 0;  |