From: Julien Thierry <jthierry@redhat.com> To: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Cc: jpoimboe@redhat.com, peterz@infradead.org, raphael.gault@arm.com, catalin.marinas@arm.com, will@kernel.org, Julien Thierry <jthierry@redhat.com> Subject: [RFC v5 18/57] objtool: Support multiple stack_op per instruction Date: Thu, 9 Jan 2020 16:02:21 +0000 [thread overview] Message-ID: <20200109160300.26150-19-jthierry@redhat.com> (raw) In-Reply-To: <20200109160300.26150-1-jthierry@redhat.com> Instruction sets can include more or less complex operations which might not fit the currently defined set of stack_ops. Combining more than one stack_op provides more flexibility to describe the behaviour of an instruction. This also reduces the need to define new stack_ops specific to a single instruction set. Allow instruction decoders to generate multiple stack_op per instruction. Signed-off-by: Julien Thierry <jthierry@redhat.com> --- tools/objtool/arch.h | 4 +- tools/objtool/arch/x86/decode.c | 13 +++++- tools/objtool/check.c | 79 +++++++++++++++++++++------------ tools/objtool/check.h | 2 +- 4 files changed, 67 insertions(+), 31 deletions(-) diff --git a/tools/objtool/arch.h b/tools/objtool/arch.h index a9a50a25ca66..f9883c431949 100644 --- a/tools/objtool/arch.h +++ b/tools/objtool/arch.h @@ -64,6 +64,7 @@ struct op_src { struct stack_op { struct op_dest dest; struct op_src src; + struct list_head list; }; struct instruction; @@ -73,7 +74,8 @@ void arch_initial_func_cfi_state(struct cfi_state *state); int arch_decode_instruction(struct elf *elf, struct section *sec, unsigned long offset, unsigned int maxlen, unsigned int *len, enum insn_type *type, - unsigned long *immediate, struct stack_op *op); + unsigned long *immediate, + struct list_head *ops_list); bool arch_callee_saved_reg(unsigned char reg); diff --git a/tools/objtool/arch/x86/decode.c b/tools/objtool/arch/x86/decode.c index 79ff33ffa6e0..650e5d021486 100644 --- a/tools/objtool/arch/x86/decode.c +++ b/tools/objtool/arch/x86/decode.c @@ -75,13 +75,15 @@ unsigned long arch_dest_rela_offset(int addend) int arch_decode_instruction(struct elf *elf, struct section *sec, unsigned long offset, unsigned int maxlen, unsigned int *len, enum insn_type *type, - unsigned long *immediate, struct stack_op *op) + unsigned long *immediate, + struct list_head *ops_list) { struct insn insn; int x86_64, sign; unsigned char op1, op2, rex = 0, rex_b = 0, rex_r = 0, rex_w = 0, rex_x = 0, modrm = 0, modrm_mod = 0, modrm_rm = 0, modrm_reg = 0, sib = 0; + struct stack_op *op; x86_64 = is_x86_64(elf); if (x86_64 == -1) @@ -122,6 +124,10 @@ int arch_decode_instruction(struct elf *elf, struct section *sec, if (insn.sib.nbytes) sib = insn.sib.bytes[0]; + op = calloc(1, sizeof(*op)); + if (!op) + return -1; + switch (op1) { case 0x1: @@ -483,6 +489,11 @@ int arch_decode_instruction(struct elf *elf, struct section *sec, *immediate = insn.immediate.nbytes ? insn.immediate.value : 0; + if (*type == INSN_STACK) + list_add_tail(&op->list, ops_list); + else + free(op); + return 0; } diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 04434cdbdab6..48aec56a7760 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -246,6 +246,7 @@ static int decode_instructions(struct objtool_file *file) } memset(insn, 0, sizeof(*insn)); INIT_LIST_HEAD(&insn->alts); + INIT_LIST_HEAD(&insn->stack_ops); clear_insn_state(&insn->state); insn->sec = sec; @@ -255,7 +256,7 @@ static int decode_instructions(struct objtool_file *file) sec->len - offset, &insn->len, &insn->type, &insn->immediate, - &insn->stack_op); + &insn->stack_ops); if (ret) goto err; @@ -735,6 +736,7 @@ static int handle_group_alt(struct objtool_file *file, } memset(fake_jump, 0, sizeof(*fake_jump)); INIT_LIST_HEAD(&fake_jump->alts); + INIT_LIST_HEAD(&fake_jump->stack_ops); clear_insn_state(&fake_jump->state); fake_jump->sec = special_alt->new_sec; @@ -1186,10 +1188,11 @@ static bool has_valid_stack_frame(struct insn_state *state) } #ifdef OBJTOOL_ORC -static int update_insn_state_regs(struct instruction *insn, struct insn_state *state) +static int update_insn_state_regs(struct instruction *insn, + struct insn_state *state, + struct stack_op *op) { struct cfi_reg *cfa = &state->cfa; - struct stack_op *op = &insn->stack_op; if (cfa->base != CFI_SP) return 0; @@ -1280,9 +1283,9 @@ static void restore_reg(struct insn_state *state, unsigned char reg) * 41 5d pop %r13 * c3 retq */ -static int update_insn_state(struct instruction *insn, struct insn_state *state) +static int update_insn_state(struct instruction *insn, struct insn_state *state, + struct stack_op *op) { - struct stack_op *op = &insn->stack_op; struct cfi_reg *cfa = &state->cfa; struct cfi_reg *regs = state->regs; @@ -1297,7 +1300,7 @@ static int update_insn_state(struct instruction *insn, struct insn_state *state) #ifdef OBJTOOL_ORC if (state->type == ORC_TYPE_REGS || state->type == ORC_TYPE_REGS_IRET) - return update_insn_state_regs(insn, state); + return update_insn_state_regs(insn, state, op); #endif switch (op->dest.type) { @@ -1653,6 +1656,42 @@ static int update_insn_state(struct instruction *insn, struct insn_state *state) return 0; } +static int handle_insn_ops(struct instruction *insn, struct insn_state *state) +{ + struct stack_op *op; + + list_for_each_entry(op, &insn->stack_ops, list) { + int res; + + res = update_insn_state(insn, state, op); + if (res) + return res; + + if (op->dest.type == OP_DEST_PUSHF) { + if (!state->uaccess_stack) { + state->uaccess_stack = 1; + } else if (state->uaccess_stack >> 31) { + WARN_FUNC("PUSHF stack exhausted", + insn->sec, insn->offset); + return 1; + } + state->uaccess_stack <<= 1; + state->uaccess_stack |= state->uaccess; + } + + if (op->src.type == OP_SRC_POPF) { + if (state->uaccess_stack) { + state->uaccess = state->uaccess_stack & 1; + state->uaccess_stack >>= 1; + if (state->uaccess_stack == 1) + state->uaccess_stack = 0; + } + } + } + + return 0; +} + static bool insn_state_match(struct instruction *insn, struct insn_state *state) { struct insn_state *state1 = &insn->state, *state2 = state; @@ -1965,29 +2004,8 @@ static int validate_branch_alt_safe(struct objtool_file *file, return 0; case INSN_STACK: - if (update_insn_state(insn, &state)) + if (handle_insn_ops(insn, &state)) return 1; - - if (insn->stack_op.dest.type == OP_DEST_PUSHF) { - if (!state.uaccess_stack) { - state.uaccess_stack = 1; - } else if (state.uaccess_stack >> 31) { - WARN_FUNC("PUSHF stack exhausted", sec, insn->offset); - return 1; - } - state.uaccess_stack <<= 1; - state.uaccess_stack |= state.uaccess; - } - - if (insn->stack_op.src.type == OP_SRC_POPF) { - if (state.uaccess_stack) { - state.uaccess = state.uaccess_stack & 1; - state.uaccess_stack >>= 1; - if (state.uaccess_stack == 1) - state.uaccess_stack = 0; - } - } - break; case INSN_STAC: @@ -2232,12 +2250,17 @@ static void cleanup(struct objtool_file *file) { struct instruction *insn, *tmpinsn; struct alternative *alt, *tmpalt; + struct stack_op *op, *tmpop; list_for_each_entry_safe(insn, tmpinsn, &file->insn_list, list) { list_for_each_entry_safe(alt, tmpalt, &insn->alts, list) { list_del(&alt->list); free(alt); } + list_for_each_entry_safe(op, tmpop, &insn->stack_ops, list) { + list_del(&op->list); + free(op); + } list_del(&insn->list); hash_del(&insn->hash); free(insn); diff --git a/tools/objtool/check.h b/tools/objtool/check.h index 843094cbae87..91adec42782c 100644 --- a/tools/objtool/check.h +++ b/tools/objtool/check.h @@ -43,7 +43,7 @@ struct instruction { struct rela *jump_table; struct list_head alts; struct symbol *func; - struct stack_op stack_op; + struct list_head stack_ops; struct insn_state state; struct orc_entry orc; bool intra_group_jump; -- 2.21.0
WARNING: multiple messages have this Message-ID (diff)
From: Julien Thierry <jthierry@redhat.com> To: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Cc: Julien Thierry <jthierry@redhat.com>, peterz@infradead.org, catalin.marinas@arm.com, raphael.gault@arm.com, jpoimboe@redhat.com, will@kernel.org Subject: [RFC v5 18/57] objtool: Support multiple stack_op per instruction Date: Thu, 9 Jan 2020 16:02:21 +0000 [thread overview] Message-ID: <20200109160300.26150-19-jthierry@redhat.com> (raw) In-Reply-To: <20200109160300.26150-1-jthierry@redhat.com> Instruction sets can include more or less complex operations which might not fit the currently defined set of stack_ops. Combining more than one stack_op provides more flexibility to describe the behaviour of an instruction. This also reduces the need to define new stack_ops specific to a single instruction set. Allow instruction decoders to generate multiple stack_op per instruction. Signed-off-by: Julien Thierry <jthierry@redhat.com> --- tools/objtool/arch.h | 4 +- tools/objtool/arch/x86/decode.c | 13 +++++- tools/objtool/check.c | 79 +++++++++++++++++++++------------ tools/objtool/check.h | 2 +- 4 files changed, 67 insertions(+), 31 deletions(-) diff --git a/tools/objtool/arch.h b/tools/objtool/arch.h index a9a50a25ca66..f9883c431949 100644 --- a/tools/objtool/arch.h +++ b/tools/objtool/arch.h @@ -64,6 +64,7 @@ struct op_src { struct stack_op { struct op_dest dest; struct op_src src; + struct list_head list; }; struct instruction; @@ -73,7 +74,8 @@ void arch_initial_func_cfi_state(struct cfi_state *state); int arch_decode_instruction(struct elf *elf, struct section *sec, unsigned long offset, unsigned int maxlen, unsigned int *len, enum insn_type *type, - unsigned long *immediate, struct stack_op *op); + unsigned long *immediate, + struct list_head *ops_list); bool arch_callee_saved_reg(unsigned char reg); diff --git a/tools/objtool/arch/x86/decode.c b/tools/objtool/arch/x86/decode.c index 79ff33ffa6e0..650e5d021486 100644 --- a/tools/objtool/arch/x86/decode.c +++ b/tools/objtool/arch/x86/decode.c @@ -75,13 +75,15 @@ unsigned long arch_dest_rela_offset(int addend) int arch_decode_instruction(struct elf *elf, struct section *sec, unsigned long offset, unsigned int maxlen, unsigned int *len, enum insn_type *type, - unsigned long *immediate, struct stack_op *op) + unsigned long *immediate, + struct list_head *ops_list) { struct insn insn; int x86_64, sign; unsigned char op1, op2, rex = 0, rex_b = 0, rex_r = 0, rex_w = 0, rex_x = 0, modrm = 0, modrm_mod = 0, modrm_rm = 0, modrm_reg = 0, sib = 0; + struct stack_op *op; x86_64 = is_x86_64(elf); if (x86_64 == -1) @@ -122,6 +124,10 @@ int arch_decode_instruction(struct elf *elf, struct section *sec, if (insn.sib.nbytes) sib = insn.sib.bytes[0]; + op = calloc(1, sizeof(*op)); + if (!op) + return -1; + switch (op1) { case 0x1: @@ -483,6 +489,11 @@ int arch_decode_instruction(struct elf *elf, struct section *sec, *immediate = insn.immediate.nbytes ? insn.immediate.value : 0; + if (*type == INSN_STACK) + list_add_tail(&op->list, ops_list); + else + free(op); + return 0; } diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 04434cdbdab6..48aec56a7760 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -246,6 +246,7 @@ static int decode_instructions(struct objtool_file *file) } memset(insn, 0, sizeof(*insn)); INIT_LIST_HEAD(&insn->alts); + INIT_LIST_HEAD(&insn->stack_ops); clear_insn_state(&insn->state); insn->sec = sec; @@ -255,7 +256,7 @@ static int decode_instructions(struct objtool_file *file) sec->len - offset, &insn->len, &insn->type, &insn->immediate, - &insn->stack_op); + &insn->stack_ops); if (ret) goto err; @@ -735,6 +736,7 @@ static int handle_group_alt(struct objtool_file *file, } memset(fake_jump, 0, sizeof(*fake_jump)); INIT_LIST_HEAD(&fake_jump->alts); + INIT_LIST_HEAD(&fake_jump->stack_ops); clear_insn_state(&fake_jump->state); fake_jump->sec = special_alt->new_sec; @@ -1186,10 +1188,11 @@ static bool has_valid_stack_frame(struct insn_state *state) } #ifdef OBJTOOL_ORC -static int update_insn_state_regs(struct instruction *insn, struct insn_state *state) +static int update_insn_state_regs(struct instruction *insn, + struct insn_state *state, + struct stack_op *op) { struct cfi_reg *cfa = &state->cfa; - struct stack_op *op = &insn->stack_op; if (cfa->base != CFI_SP) return 0; @@ -1280,9 +1283,9 @@ static void restore_reg(struct insn_state *state, unsigned char reg) * 41 5d pop %r13 * c3 retq */ -static int update_insn_state(struct instruction *insn, struct insn_state *state) +static int update_insn_state(struct instruction *insn, struct insn_state *state, + struct stack_op *op) { - struct stack_op *op = &insn->stack_op; struct cfi_reg *cfa = &state->cfa; struct cfi_reg *regs = state->regs; @@ -1297,7 +1300,7 @@ static int update_insn_state(struct instruction *insn, struct insn_state *state) #ifdef OBJTOOL_ORC if (state->type == ORC_TYPE_REGS || state->type == ORC_TYPE_REGS_IRET) - return update_insn_state_regs(insn, state); + return update_insn_state_regs(insn, state, op); #endif switch (op->dest.type) { @@ -1653,6 +1656,42 @@ static int update_insn_state(struct instruction *insn, struct insn_state *state) return 0; } +static int handle_insn_ops(struct instruction *insn, struct insn_state *state) +{ + struct stack_op *op; + + list_for_each_entry(op, &insn->stack_ops, list) { + int res; + + res = update_insn_state(insn, state, op); + if (res) + return res; + + if (op->dest.type == OP_DEST_PUSHF) { + if (!state->uaccess_stack) { + state->uaccess_stack = 1; + } else if (state->uaccess_stack >> 31) { + WARN_FUNC("PUSHF stack exhausted", + insn->sec, insn->offset); + return 1; + } + state->uaccess_stack <<= 1; + state->uaccess_stack |= state->uaccess; + } + + if (op->src.type == OP_SRC_POPF) { + if (state->uaccess_stack) { + state->uaccess = state->uaccess_stack & 1; + state->uaccess_stack >>= 1; + if (state->uaccess_stack == 1) + state->uaccess_stack = 0; + } + } + } + + return 0; +} + static bool insn_state_match(struct instruction *insn, struct insn_state *state) { struct insn_state *state1 = &insn->state, *state2 = state; @@ -1965,29 +2004,8 @@ static int validate_branch_alt_safe(struct objtool_file *file, return 0; case INSN_STACK: - if (update_insn_state(insn, &state)) + if (handle_insn_ops(insn, &state)) return 1; - - if (insn->stack_op.dest.type == OP_DEST_PUSHF) { - if (!state.uaccess_stack) { - state.uaccess_stack = 1; - } else if (state.uaccess_stack >> 31) { - WARN_FUNC("PUSHF stack exhausted", sec, insn->offset); - return 1; - } - state.uaccess_stack <<= 1; - state.uaccess_stack |= state.uaccess; - } - - if (insn->stack_op.src.type == OP_SRC_POPF) { - if (state.uaccess_stack) { - state.uaccess = state.uaccess_stack & 1; - state.uaccess_stack >>= 1; - if (state.uaccess_stack == 1) - state.uaccess_stack = 0; - } - } - break; case INSN_STAC: @@ -2232,12 +2250,17 @@ static void cleanup(struct objtool_file *file) { struct instruction *insn, *tmpinsn; struct alternative *alt, *tmpalt; + struct stack_op *op, *tmpop; list_for_each_entry_safe(insn, tmpinsn, &file->insn_list, list) { list_for_each_entry_safe(alt, tmpalt, &insn->alts, list) { list_del(&alt->list); free(alt); } + list_for_each_entry_safe(op, tmpop, &insn->stack_ops, list) { + list_del(&op->list); + free(op); + } list_del(&insn->list); hash_del(&insn->hash); free(insn); diff --git a/tools/objtool/check.h b/tools/objtool/check.h index 843094cbae87..91adec42782c 100644 --- a/tools/objtool/check.h +++ b/tools/objtool/check.h @@ -43,7 +43,7 @@ struct instruction { struct rela *jump_table; struct list_head alts; struct symbol *func; - struct stack_op stack_op; + struct list_head stack_ops; struct insn_state state; struct orc_entry orc; bool intra_group_jump; -- 2.21.0 _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
next prev parent reply other threads:[~2020-01-09 16:05 UTC|newest] Thread overview: 189+ messages / expand[flat|nested] mbox.gz Atom feed top 2020-01-09 16:02 [RFC v5 00/57] objtool: Add support for arm64 Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 01/57] objtool: check: Remove redundant checks on operand type Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 02/57] objtool: check: Clean instruction state before each function validation Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 03/57] objtool: check: Use arch specific values in restore_reg() Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 04/57] objtool: check: Ignore empty alternative groups Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-21 16:30 ` Josh Poimboeuf 2020-01-21 16:30 ` Josh Poimboeuf 2020-01-23 11:45 ` Julien Thierry 2020-01-23 11:45 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 05/57] objtool: Add abstraction for computation of symbols offsets Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 06/57] objtool: Give ORC functions consistent name Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 07/57] objtool: orc: Refactor ORC API for other architectures to implement Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 08/57] objtool: Make ORC support optional Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-21 16:37 ` Josh Poimboeuf 2020-01-21 16:37 ` Josh Poimboeuf 2020-01-23 11:45 ` Julien Thierry 2020-01-23 11:45 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 09/57] objtool: Move registers and control flow to arch-dependent code Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 10/57] objtool: Split generic and arch specific CFI definitions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 11/57] objtool: Abstract alternative special case handling Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-20 14:54 ` Peter Zijlstra 2020-01-20 14:54 ` Peter Zijlstra 2020-01-23 11:45 ` Julien Thierry 2020-01-23 11:45 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 12/57] objtool: check: Allow jumps from an alternative group to itself Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-20 14:56 ` Peter Zijlstra 2020-01-20 14:56 ` Peter Zijlstra 2020-01-21 10:30 ` Will Deacon 2020-01-21 10:30 ` Will Deacon 2020-01-21 17:33 ` Josh Poimboeuf 2020-01-21 17:33 ` Josh Poimboeuf 2020-01-23 13:42 ` Julien Thierry 2020-01-23 13:42 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 13/57] objtool: Refactor switch-tables code to support other architectures Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 14/57] objtool: Do not look for STT_NOTYPE symbols Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-11 18:49 ` kbuild test robot 2020-01-13 10:20 ` Julien Thierry 2020-01-13 10:20 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 15/57] objtool: Support addition to set frame pointer Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 16/57] objtool: Support restoring BP from the stack without POP Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 17/57] objtool: Make stack validation more generic Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` Julien Thierry [this message] 2020-01-09 16:02 ` [RFC v5 18/57] objtool: Support multiple stack_op per instruction Julien Thierry 2020-01-09 16:02 ` [RFC v5 19/57] objtool: arm64: Add required implementation for supporting the aarch64 architecture in objtool Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 20/57] objtool: arm64: Decode unknown instructions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 21/57] objtool: arm64: Decode simple data processing instructions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 22/57] objtool: arm64: Decode add/sub immediate instructions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 23/57] objtool: arm64: Decode logical data processing instructions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 24/57] objtool: arm64: Decode system instructions not affecting the flow Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 25/57] objtool: arm64: Decode calls to higher EL Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 26/57] objtool: arm64: Decode brk instruction Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 27/57] objtool: arm64: Decode instruction triggering context switch Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 28/57] objtool: arm64: Decode branch instructions with PC relative immediates Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 29/57] objtool: arm64: Decode branch to register instruction Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 30/57] objtool: arm64: Decode basic load/stores Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 31/57] objtool: arm64: Decode load/store with register offset Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 32/57] objtool: arm64: Decode load/store register pair instructions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 33/57] objtool: arm64: Decode FP/SIMD load/store instructions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 34/57] objtool: arm64: Decode load/store exclusive Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 35/57] objtool: arm64: Decode atomic load/store Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 36/57] objtool: arm64: Decode pointer auth load instructions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 37/57] objtool: arm64: Decode load acquire/store release Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 38/57] objtool: arm64: Decode load/store with memory tag Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 39/57] objtool: arm64: Decode load literal Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 40/57] objtool: arm64: Decode register data processing instructions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 41/57] objtool: arm64: Decode FP/SIMD " Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 42/57] objtool: arm64: Decode SVE instructions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 43/57] gcc-plugins: objtool: Add plugin to detect switch table on arm64 Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 44/57] objtool: arm64: Implement functions to add switch tables alternatives Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-15 16:37 ` Raphael Gault 2020-01-15 16:37 ` Raphael Gault 2020-01-17 8:28 ` Julien Thierry 2020-01-17 8:28 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 45/57] objtool: arm64: Enable stack validation for arm64 Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-11 14:42 ` kbuild test robot 2020-01-11 20:30 ` kbuild test robot 2020-01-09 16:02 ` [RFC v5 46/57] arm64: alternative: Mark .altinstr_replacement as containing executable instructions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-12 11:08 ` kbuild test robot 2020-01-13 3:38 ` kbuild test robot 2020-01-09 16:02 ` [RFC v5 47/57] arm64: assembler: Add macro to annotate asm function having non standard stack-frame Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-21 10:30 ` Will Deacon 2020-01-21 10:30 ` Will Deacon 2020-01-23 13:45 ` Julien Thierry 2020-01-23 13:45 ` Julien Thierry 2020-01-23 14:40 ` Will Deacon 2020-01-23 14:40 ` Will Deacon 2020-01-09 16:02 ` [RFC v5 48/57] arm64: sleep: Prevent stack frame warnings from objtool Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 49/57] arm64: kvm: Annotate non-standard stack frame functions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 50/57] arm64: kernel: Add exception on kuser32 to prevent stack analysis Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 51/57] arm64: crypto: Add exceptions for crypto object " Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 52/57] arm64: kernel: Annotate non-standard stack frame functions Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 53/57] arm64: Generate no-ops to pad executable section Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 54/57] arm64: Move constant to rodata Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 55/57] arm64: Mark sigreturn32.o as containing non standard code Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:02 ` [RFC v5 56/57] arm64: entry: Avoid empty alternatives entries Julien Thierry 2020-01-09 16:02 ` Julien Thierry 2020-01-09 16:51 ` Mark Rutland 2020-01-09 16:51 ` Mark Rutland 2020-01-21 10:30 ` Will Deacon 2020-01-21 10:30 ` Will Deacon 2020-01-09 16:03 ` [RFC v5 57/57] arm64: crypto: Remove redundant branch Julien Thierry 2020-01-09 16:03 ` Julien Thierry 2020-01-12 8:42 ` [RFC v5 00/57] objtool: Add support for arm64 Nathan Chancellor 2020-01-12 8:42 ` Nathan Chancellor 2020-01-13 7:57 ` Julien Thierry 2020-01-13 7:57 ` Julien Thierry 2020-01-21 10:31 ` Will Deacon 2020-01-21 10:31 ` Will Deacon 2020-01-21 17:08 ` Nick Desaulniers 2020-01-21 17:08 ` Nick Desaulniers 2020-01-21 18:06 ` Will Deacon 2020-01-21 18:06 ` Will Deacon 2020-01-21 18:30 ` Josh Poimboeuf 2020-01-21 18:30 ` Josh Poimboeuf 2020-01-22 14:47 ` Will Deacon 2020-01-22 14:47 ` Will Deacon 2020-01-13 17:18 ` Nick Desaulniers 2020-01-13 17:18 ` Nick Desaulniers 2020-01-20 15:07 ` Peter Zijlstra 2020-01-20 15:07 ` Peter Zijlstra 2020-01-21 17:50 ` Josh Poimboeuf 2020-01-21 17:50 ` Josh Poimboeuf 2020-01-23 13:56 ` Julien Thierry 2020-01-23 13:56 ` Julien Thierry 2020-01-21 10:30 ` Will Deacon 2020-01-21 10:30 ` Will Deacon 2020-01-23 13:52 ` Julien Thierry 2020-01-23 13:52 ` Julien Thierry 2020-01-23 14:35 ` Will Deacon 2020-01-23 14:35 ` Will Deacon 2020-01-23 15:11 ` Julien Thierry 2020-01-23 15:11 ` Julien Thierry
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20200109160300.26150-19-jthierry@redhat.com \ --to=jthierry@redhat.com \ --cc=catalin.marinas@arm.com \ --cc=jpoimboe@redhat.com \ --cc=linux-arm-kernel@lists.infradead.org \ --cc=linux-kernel@vger.kernel.org \ --cc=peterz@infradead.org \ --cc=raphael.gault@arm.com \ --cc=will@kernel.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.