Re: [PATCH v2 03/24] objtool: Handle __sanitize_cov*() tail calls

From: Steven Rostedt
Date: Mon Jun 28 2021 - 21:08:05 EST


On Sat, 26 Jun 2021 10:18:12 +0200
Peter Zijlstra <peterz@xxxxxxxxxxxxx> wrote:

> > > + if (mcount && !strcmp(insn->call_dest->name, "__fentry__")) {
> > > + if (sibling)
> > > + WARN_FUNC("Tail call to __fentry__ !?!?", insn->sec, insn->offset);
> >
> > Have you ever triggered the above?
>
> No, that would be really daft. But since this function is to be called
> for both regular and tail calls, I figured I'd at least pretend to
> handle the case.

OK. I thought this was like one of those weird laws that were made
because you know that someone did something really stupid once.

-- Steve