Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp320736ybt; Mon, 6 Jul 2020 10:06:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyYKwPYQyoV8Ic29T5EjMPxomrFksT4A+MJe5PKp35g8OTVf/zuWAFJSaM70sdzLXKDqviD X-Received: by 2002:a17:906:384a:: with SMTP id w10mr45799253ejc.235.1594055202102; Mon, 06 Jul 2020 10:06:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594055202; cv=none; d=google.com; s=arc-20160816; b=PQ36DFYj2eIqzR/+9eNwKBgsyWgypqcrkT6tM68irB7eAkMKgN6IZ1QNIq3H7MvOkz tZQvu4fuKIj79Ls0+lMMmvmmYxt5T6GHvPGhKkBVAMA1VkbEWzdAmX1WipBaZL9o/wid FFk0AeXAAK6mC1K5ccwEQEoWbcla/+X5GOsvAEjPTpnwFZ3XiMorSEqQ8dBeuBvhGdAX p522Lts2Q7ClmG3gT1c3uOYmm0y2RGXerWx9dlQf/E+4ZmjRcEqrEMsb+HiYMs9SSxCm 2C2QIZldNZBrpyIZ+Xc9m08scDAPv/MNaOAxXC4lIcOnCSRPC4cgY9O/i7O7f2lWFz61 b5HA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=xIXpfX/Bwbw3zzsoLuqECm/MwE6l820KHBLQqcpwMXU=; b=Yt7kARdR1BxvE8+V6NxcAk2crrjUqAIAHnEDLztq1b2eNCPEZYbjuD0reAb2ZuRLW8 LkT3Pi2z+GVHg0KR90y/Ppk0ohC5pPKtZv4S+8AKcDsrQZ4WDWEmSjfRwu7Ln7fMl0cA 7DHf5llxaXNBP+r048rwUhMZcREsLZNfxgjNjbxzVzmXIb9BhxbUaFgIRdmyuiAxNstP zkzXurq4q+8fBydYanDoE44GaABaRHfOtDbBpddEj80RMlkC0S6/akVpWHqSxnBbdteb m63nBZl03W6JbslYYdc48mprk2B4OpyrtN5wqGPBDA2OLptFQBcez1UJ2qyKjQN2RcdB aAAw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v21si13136953edw.286.2020.07.06.10.06.19; Mon, 06 Jul 2020 10:06:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729572AbgGFRGD (ORCPT + 99 others); Mon, 6 Jul 2020 13:06:03 -0400 Received: from foss.arm.com ([217.140.110.172]:56840 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729495AbgGFRGC (ORCPT ); Mon, 6 Jul 2020 13:06:02 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id DD1A31FB; Mon, 6 Jul 2020 10:06:01 -0700 (PDT) Received: from arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 24A0A3F68F; Mon, 6 Jul 2020 10:05:59 -0700 (PDT) Date: Mon, 6 Jul 2020 18:05:57 +0100 From: Dave Martin To: "Paul E. McKenney" Cc: Mark Rutland , "Michael S. Tsirkin" , Peter Zijlstra , Catalin Marinas , Jason Wang , virtualization@lists.linux-foundation.org, Will Deacon , Alan Stern , Sami Tolvanen , Matt Turner , kernel-team@android.com, Marco Elver , Kees Cook , Arnd Bergmann , Boqun Feng , Josh Triplett , Ivan Kokshaysky , linux-arm-kernel@lists.infradead.org, Richard Henderson , Nick Desaulniers , linux-kernel@vger.kernel.org, linux-alpha@vger.kernel.org Subject: Re: [PATCH 18/18] arm64: lto: Strengthen READ_ONCE() to acquire when CLANG_LTO=y Message-ID: <20200706170556.GE10992@arm.com> References: <20200630173734.14057-1-will@kernel.org> <20200630173734.14057-19-will@kernel.org> <20200701170722.4rte5ssnmrn2uqzg@bakewell.cambridge.arm.com> <20200702072301.GA15963@willie-the-truck> <20200706160023.GB10992@arm.com> <20200706163455.GV9247@paulmck-ThinkPad-P72> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200706163455.GV9247@paulmck-ThinkPad-P72> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 06, 2020 at 09:34:55AM -0700, Paul E. McKenney wrote: > On Mon, Jul 06, 2020 at 05:00:23PM +0100, Dave Martin wrote: > > On Thu, Jul 02, 2020 at 08:23:02AM +0100, Will Deacon wrote: > > > On Wed, Jul 01, 2020 at 06:07:25PM +0100, Dave P Martin wrote: > > > > On Tue, Jun 30, 2020 at 06:37:34PM +0100, Will Deacon wrote: > > > > > When building with LTO, there is an increased risk of the compiler > > > > > converting an address dependency headed by a READ_ONCE() invocation > > > > > into a control dependency and consequently allowing for harmful > > > > > reordering by the CPU. > > > > > > > > > > Ensure that such transformations are harmless by overriding the generic > > > > > READ_ONCE() definition with one that provides acquire semantics when > > > > > building with LTO. > > > > > > > > > > Signed-off-by: Will Deacon > > > > > --- > > > > > arch/arm64/include/asm/rwonce.h | 63 +++++++++++++++++++++++++++++++ > > > > > arch/arm64/kernel/vdso/Makefile | 2 +- > > > > > arch/arm64/kernel/vdso32/Makefile | 2 +- > > > > > 3 files changed, 65 insertions(+), 2 deletions(-) > > > > > create mode 100644 arch/arm64/include/asm/rwonce.h > > > > > > > > > > diff --git a/arch/arm64/include/asm/rwonce.h b/arch/arm64/include/asm/rwonce.h > > > > > new file mode 100644 > > > > > index 000000000000..515e360b01a1 > > > > > --- /dev/null > > > > > +++ b/arch/arm64/include/asm/rwonce.h > > > > > @@ -0,0 +1,63 @@ > > > > > +/* SPDX-License-Identifier: GPL-2.0 */ > > > > > +/* > > > > > + * Copyright (C) 2020 Google LLC. > > > > > + */ > > > > > +#ifndef __ASM_RWONCE_H > > > > > +#define __ASM_RWONCE_H > > > > > + > > > > > +#ifdef CONFIG_CLANG_LTO > > > > > > > > Don't we have a generic option for LTO that's not specific to Clang. > > > > > > /me looks at the LTO series some more > > > > > > Oh yeah, there's CONFIG_LTO which is selected by CONFIG_LTO_CLANG, which is > > > the non-typoed version of the above. I can switch this to CONFIG_LTO. > > > > > > > Also, can you illustrate code that can only be unsafe with Clang LTO? > > > > > > I don't have a concrete example, but it's an ongoing concern over on the LTO > > > thread [1], so I cooked this to show one way we could deal with it. The main > > > concern is that the whole-program optimisations enabled by LTO may allow the > > > compiler to enumerate possible values for a pointer at link time and replace > > > an address dependency between two loads with a control dependency instead, > > > defeating the dependency ordering within the CPU. > > > > Why can't that happen without LTO? > > Because without LTO, the compiler cannot see all the pointers all at > the same time due to their being in different translation units. > > But yes, if the compiler could see all the pointer values and further > -know- that it was seeing all the pointer values, these optimizations > could happen even without LTO. But it is quite easy to make sure that > the compiler thinks that there are additional pointer values that it > does not know about. Yes of course, but even without LTO the compiler can still apply this optimisation to everything visible in the translation unit, and that can drift as people refactor code over time. Convincing the compiler there are other possible values doesn't help. Even in int foo(int *p) { asm ("" : "+r" (p)); return *p; } Can't the compiler still generate something like this: switch (p) { case &foo: return foo; case &bar: return bar; default: return *p; } ...in which case we still have the same lost ordering guarantee that we were trying to enforce. If foo and bar already happen to be in registers and profiling shows that &foo and &bar are the most likely value of p then this might be a reasonable optimisation in some situations, irrespective of LTO. The underlying problem here seems to be that the necessary ordering rule is not part of what passes for the C memory model prior to C11. If we want to control the data flow, don't we have to wrap the entire dereference in a macro? > > > We likely won't realise if/when this goes wrong, other than impossible to > > > debug, subtle breakage that crops up seemingly randomly. Ideally, we'd be > > > able to detect this sort of thing happening at build time, and perhaps > > > even prevent it with compiler options or annotations, but none of that is > > > close to being available and I'm keen to progress the LTO patches in the > > > meantime because they are a requirement for CFI. > > > > My concern was not so much why LTO makes things dangerous, as why !LTO > > makes things safe... > > Because ignorant compilers are safe compilers! ;-) AFAICT ignorance is no gurantee of ordering in general -- the compiler is free to speculatively invent knowledge any place that the language spec allows it to. !LTO doesn't stop this happening. Hopefully some of the knowledge I invented in my reply is valid... Cheers ---Dave