From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 1827DC433EF for ; Mon, 30 May 2022 01:46:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:From:References:To:Subject: MIME-Version:Date:Message-ID:Reply-To:Cc:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=st0RHWK0XSlG/Jdgz4GF/0BFd8yZ11UlRitI5vaycuA=; b=lqaxSNEfb8QUsK eBop31Y/s8iKvmlsC/mIPqV3W5V6eO5Qp1S5Fdpzrqkp2Q9GQOeE2FUcgGbXaqdHwd3Dce6WM4+gd NvAGyEtNhjHFmu08GgmgPa7Su1G02JmEmg7mn10bUEBkq2gtf4+dnR9B+GEVPSelN1r4H/RQb6aLM YZ34ZzeWWS5AM65rC5xb8dvJzdhCQpZqS8kR6e6Z44PYuKQ4E11juMBqlgA4dpuWqqf1qzgxxuCCh z7Tjx85H865SN7vKi/5fwu65VYB+wXQkr2crXsr8RDlzLa8JLoUo2KwF2giNEPNbf15Yuf+mGry4G p1azXuXccy/XJlQIzDJA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1nvUSh-0055We-Oc; Mon, 30 May 2022 01:44:51 +0000 Received: from szxga01-in.huawei.com ([45.249.212.187]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1nvUSd-0055UV-Oa for linux-arm-kernel@lists.infradead.org; Mon, 30 May 2022 01:44:49 +0000 Received: from dggpemm500024.china.huawei.com (unknown [172.30.72.55]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4LBJ943d1tzjX4K; Mon, 30 May 2022 09:43:52 +0800 (CST) Received: from dggpemm500013.china.huawei.com (7.185.36.172) by dggpemm500024.china.huawei.com (7.185.36.203) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Mon, 30 May 2022 09:44:40 +0800 Received: from [127.0.0.1] (10.67.108.67) by dggpemm500013.china.huawei.com (7.185.36.172) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Mon, 30 May 2022 09:44:40 +0800 Message-ID: <28642a99-0b59-a5dd-aea4-6c1db65c0934@huawei.com> Date: Mon, 30 May 2022 09:44:37 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0 Subject: Re: [RFC PATCH v2 11/20] objtool: arm64: Walk instructions and compute CFI for each instruction Content-Language: en-US To: "Madhavan T. Venkataraman" , , , , , , , , , , , , References: <20220524001637.1707472-1-madvenka@linux.microsoft.com> <20220524001637.1707472-12-madvenka@linux.microsoft.com> <767e814c-b3cc-73a1-d283-82dbc0287cde@huawei.com> From: Chen Zhongjin In-Reply-To: X-Originating-IP: [10.67.108.67] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpemm500013.china.huawei.com (7.185.36.172) X-CFilter-Loop: Reflected X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220529_184448_180312_9BFE2A06 X-CRM114-Status: GOOD ( 20.55 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi, On 2022/5/29 23:18, Madhavan T. Venkataraman wrote: > > > On 5/24/22 08:45, Chen Zhongjin wrote: >> Hi, >> >> On 2022/5/24 8:16, madvenka@linux.microsoft.com wrote: >>> From: "Madhavan T. Venkataraman" >>> >>> Implement arch_initial_func_cfi_state() to initialize the CFI for a >>> function. >>> >>> Add code to fpv_decode() to walk the instructions in every function and >>> compute the CFI information for each instruction. >>> >>> Implement special handling for cases like jump tables. >>> >>> Signed-off-by: Madhavan T. Venkataraman >>> --- >>> tools/objtool/arch/arm64/decode.c | 15 +++ >>> tools/objtool/fpv.c | 204 ++++++++++++++++++++++++++++++ >>> 2 files changed, 219 insertions(+) >> ... >>> +static void update_cfi_state(struct cfi_state *cfi, struct stack_op *op) >>> +{ >>> + struct cfi_reg *cfa = &cfi->cfa; >>> + struct cfi_reg *regs = cfi->regs; >>> + >>> + if (op->src.reg == CFI_SP) { >>> + if (op->dest.reg == CFI_SP) >>> + cfa->offset -= op->src.offset; >>> + else >>> + regs[CFI_FP].offset = -cfa->offset + op->src.offset; >> Seems wrong here, we don't have any op->src.offset for [mov x29, sp] so here we >> get: fp->offset = -cfa->offset. The dumped info also proves this. > > > See the example below. > >> >>> + case UNWIND_HINT_TYPE_CALL: >>> + /* Normal call */ >>> + frame->cfa += orc->sp_offset; >>> + fp = frame->cfa + orc->fp_offset; >>> + break; >> Obviously this is not conform to the reliability check because we get >> frame->cfa == fp here. >> > > See the example below: > >> IIUC your sp_offset equals to stack length, and fp_offset is offset from next >> x29 to next CFA. So maybe here we should have >> regs[CFI_FP].offset = regs[CFI_SP].offset for [mov x29, sp]. >> >> Anyway, in original objtool sp_offset and fp_offset both represents the offset >> from CFA to REGs. I think it's better not spoiling their original meaning and >> just extending. >> >> > > I am not spoiling anything. > > > Let us take an example: > > ffff800008010000 : > ffff800008010000: d503201f nop > ffff800008010004: d503201f nop > ffff800008010008: d503233f paciasp > ffff80000801000c: a9be7bfd stp x29, x30, [sp, #-32]! > ffff800008010010: 910003fd mov x29, sp > ffff800008010014: f9000bf3 str x19, [sp, #16] > > > The stack pointer is first moved by -32 and the FP and LR are stored there. > At this point, SP is pointing to the frame. The CFA is: > > CFA = SP + 32 > > The frame pointer has been stored at the location pointed to by the SP. > So, FP should be: > > FP = CFA - 32 > > Therefore, at instruction address ffff800008010014: > > frame->cfa = SP + 32; > frame->fp = frame->cfa - 32 = SP; > > So, if a call/interrupt happens after this instruction, the frame pointer computed > from the above data will match with the actual frame pointer. > > I have verified this using the DWARF data generated by the compiler. It is correct. > I have also verified that the stack trace through such code passes the reliability > check. That is, it computes the frame pointer correctly which matches with the > actual frame pointer You are right, I think I mixed up frame of x86 and arm64. Apologize for that and thanks for explaining! Best, Chen _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel