Received: by 10.192.165.148 with SMTP id m20csp5279582imm; Wed, 9 May 2018 02:19:18 -0700 (PDT) X-Google-Smtp-Source: AB8JxZosezl6CR2/ARmVxwHikcF2vl72bkuUcEcCVcNWSLQ4uhSxkxDEKwC84o7gZ2qAkJXdUUNg X-Received: by 2002:a17:902:9689:: with SMTP id n9-v6mr13882720plp.363.1525857557948; Wed, 09 May 2018 02:19:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525857557; cv=none; d=google.com; s=arc-20160816; b=ykym7gcKkEnTOwmH0nZU0Ey+RKse4Rjq/UoHsYpbfiunZsx7/VrF1jQ+DEcPpyZCDT zDccoGPDGUtnGMkYGV7vBDHaNU4Dwl5k0y0RPt6gch/4oGFT8uX5aE/4Sj1CXFjxS1S6 S0TY9mrEnOb0spVVm5ZaxhWYGipS475uoCYSx2j2Rk/DfIfFVjdnmosrAsX+CE6mCkEt KKED9zDnHXHPv6quqtLm3ctGUpqMAqfxUCKZPPcOzFKXTigrqbXRYPIWlNs0U1yFvvDM WESSCi4MWYmoPLLIkPzHJzFz3dmIj1UXwvUvDm8PoSpPIpGlCLWWwNcwSH+u3iUuriZG jTzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:arc-authentication-results; bh=RDGLv/6a+qd4+/YoGyxtqQMbIPF4+JXYyARaHA1sXvc=; b=ulzSkWdm1I2Fk6ZaTzNq+YQ+ZaRIH7EH08Dpm5sxNIpCcwqkI7aJMv677lpFLE2Byj KGTkUCrL0C2lpSKUJS1xmwP7WQN+dGMB8TE0cH+Z5rEQbGAUMf7gBqYsbV/2249nr3ql yns1hTEur7QroajcvDZROHQYEBVCJDNi3OBR1Oqgxm6sLtzA9bCGSQZKl+eCos8UAhU7 457WzuV/k2+rilaQaVzt9CCsJ+1/O/OAGDN4aegl7JlDUSEH7f5QGDSGk7T/bjbx0r2h KJiF4ZBpkh1+qIl+4Lq4jW5zsojW7/NKBstGj2afdLixtXtfMzL1kqBsyxodoO8eCyj7 pgHg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=s0apAPXs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k18si26041299pfe.13.2018.05.09.02.19.02; Wed, 09 May 2018 02:19:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=s0apAPXs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934584AbeEIJSc (ORCPT + 99 others); Wed, 9 May 2018 05:18:32 -0400 Received: from mail-wm0-f67.google.com ([74.125.82.67]:54314 "EHLO mail-wm0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934203AbeEIJS3 (ORCPT ); Wed, 9 May 2018 05:18:29 -0400 Received: by mail-wm0-f67.google.com with SMTP id f6so23312952wmc.4 for ; Wed, 09 May 2018 02:18:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=from:to:cc:subject:date:message-id; bh=RDGLv/6a+qd4+/YoGyxtqQMbIPF4+JXYyARaHA1sXvc=; b=s0apAPXsAZQDK1GDFTBh/aYLw3DqI6BTxU84Jlmw4PT3cqnvUC0cEAHOevcpMf525t m6FEFv+Ozwfd/TWUJXugB7kWXDD4Ux1r1EgbKby4yAU7q4qwIs3coM5sy/59wePQzZn+ btqYBdA/wLD4ir7MEv/IZYRt6fpBktr4QtvV+lJzvV+//zsqb/pOWefK/ZOnvhTEn/qv Q4lT3v2Oh5Rf67nt1H87QNxg3vxFw650S4v6YUerSdBjXlmEwgRZxSoDj8eqyyzpCAvQ vP1u2h8MfNuO5vRhvbgBTZY+UK/0sJvFY9HeQ+J5uib5mhehB5HA8nzYmMN38VTq808j 182w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=RDGLv/6a+qd4+/YoGyxtqQMbIPF4+JXYyARaHA1sXvc=; b=txl2tp1ZWAfHrAjKwvLGZj3Kn1qi7m9CUk8eszd1mbIr/TtomPTttv5YkAtyYtNpFr uCTPpoyoGX7Z6xbyc+ytCZnBqeH10Wc0N1XkRW/mt2NwbqY6TJffn1rTMR/yGaCgnZRX zpmf+UTYgAZJCBXRvnB0YbL2zOJnX2bHKKxwBPgh/SAeco8PGBolFGQDw94wTfDwt8O3 zN0JHydZYxBEvlsf5mVtnmsHc5ssDtD3Bgot+qRhd1xv4PRkydyka2MnSgJ1Z09xDMiZ 8LZKPVabGoKqtK603Ua7fAlNWZNKuCLObEauEwdW6+DvhzpleXCLwYvAV/N5+XyfK3Ay kb6A== X-Gm-Message-State: ALKqPwcvjh1EEThj1E8RzbnSMQORjbk5m3DWvniCqvWrC9Nmr4+pEylw Q5QF/f7m+3C4WDJ1IqVBlL0qxA== X-Received: by 10.28.74.13 with SMTP id x13mr5001977wma.150.1525857508252; Wed, 09 May 2018 02:18:28 -0700 (PDT) Received: from glider0.muc.corp.google.com ([2a00:79e0:15:10:e0c7:92b9:c022:f69b]) by smtp.gmail.com with ESMTPSA id t46-v6sm35350140wrc.95.2018.05.09.02.18.27 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 09 May 2018 02:18:27 -0700 (PDT) From: Alexander Potapenko To: dave.hansen@linux.intel.com, mingo@kernel.org, kirill.shutemov@linux.intel.com Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, mka@chromium.org, dvyukov@google.com, md@google.com Subject: [PATCH v3] x86/boot/64/clang: Use fixup_pointer() to access '__supported_pte_mask' Date: Wed, 9 May 2018 11:18:22 +0200 Message-Id: <20180509091822.191810-1-glider@google.com> X-Mailer: git-send-email 2.17.0.441.gb46fe60e1d-goog Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Clang builds with defconfig started crashing after commit fb43d6cb91ef ("x86/mm: Do not auto-massage page protections") This was caused by introducing a new global access in __startup_64(). Code in __startup_64() can be relocated during execution, but the compiler doesn't have to generate PC-relative relocations when accessing globals from that function. Clang actually does not generate them, which leads to boot-time crashes. To work around this problem, every global pointer must be adjusted using fixup_pointer(). Signed-off-by: Alexander Potapenko Fixes: fb43d6cb91ef ("x86/mm: Do not auto-massage page protections") --- v3: removed unnecessary cast v2: better patch description, added a comment to __startup_64() --- arch/x86/kernel/head64.c | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/arch/x86/kernel/head64.c b/arch/x86/kernel/head64.c index 0c408f8c4ed4..5ea28e9a0250 100644 --- a/arch/x86/kernel/head64.c +++ b/arch/x86/kernel/head64.c @@ -104,6 +104,13 @@ static bool __head check_la57_support(unsigned long physaddr) } #endif + +/* Code in __startup_64() can be relocated during execution, but the compiler + * doesn't have to generate PC-relative relocations when accessing globals from + * that function. Clang actually does not generate them, which leads to + * boot-time crashes. To work around this problem, every global pointer must + * be adjusted using fixup_pointer(). + */ unsigned long __head __startup_64(unsigned long physaddr, struct boot_params *bp) { @@ -113,6 +120,7 @@ unsigned long __head __startup_64(unsigned long physaddr, p4dval_t *p4d; pudval_t *pud; pmdval_t *pmd, pmd_entry; + pteval_t *mask_ptr; bool la57; int i; unsigned int *next_pgt_ptr; @@ -196,7 +204,8 @@ unsigned long __head __startup_64(unsigned long physaddr, pmd_entry = __PAGE_KERNEL_LARGE_EXEC & ~_PAGE_GLOBAL; /* Filter out unsupported __PAGE_KERNEL_* bits: */ - pmd_entry &= __supported_pte_mask; + mask_ptr = fixup_pointer(&__supported_pte_mask, physaddr); + pmd_entry &= *mask_ptr; pmd_entry += sme_get_me_mask(); pmd_entry += physaddr; -- 2.17.0.441.gb46fe60e1d-goog