Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp732352pxb; Tue, 2 Feb 2021 17:01:47 -0800 (PST) X-Google-Smtp-Source: ABdhPJzgeTkGyfkdxDY5zS/q8AWo1KZ2lYd1t7nU+abjJ5wIedjdexkhrOEYnhyd7inf1kSxZXYK X-Received: by 2002:a17:906:555:: with SMTP id k21mr660077eja.148.1612314107571; Tue, 02 Feb 2021 17:01:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612314107; cv=none; d=google.com; s=arc-20160816; b=TiR/e4bzhe0tlewDY9etNFeP/pK8sTahn4NPrhTx9EukPB0gnlYKtFms9lCICwfpV1 IetWgwJF0gi+OcS3Y4EF7fDSI3kqnQzjNSodVZ2kyJHjCE4EaN1o0ot2FIJ26GBrYUfw gJ/GTqB0jD0wdz1WKdMNg3sgqbnODr7N3K7C3eXUUtElPqs4YU1Coq/nZ75xiXh9+bTo 0L0sBw1udvAqy7u/cKJMTAarrgGqWTjQUIfA0CR6yFZugrXs3NIm8Tg4+Po3Ex1V2pG6 bdGpJ4/gKo5gBcZ8qNxHbUlTnVPjWSSKGpPC9GnUQdkglUI8LAs6Z2aZpibkt4B/P5vu EP0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=SiaraPMcWlUGQ15HgWRnEvPFg5Cm3xwMPN0LwTOYT8c=; b=Mow64U6pZpZFJ0kpDEfbj073+ipS0mSw1PSGMX5vPGla8hrVgpehBwq4/VQG6TS8QX EXkfC9w+a+sG3HwhXNgkVrCSCM9SX8Rwqnr07rzQMqApXTYtT/pwEuYwW+bd83NWL7Zf 1yTaP1OW4C7JV7/l1+JM89ApE52nN2zGIGc1iz1Q9xOKBSU6xuruF/zJrhGlbHh+hJi9 J0NnVQmxLPRtHbQK5BdNt1LvjMmcS9E9nlHQxpZKKE6NMGHDarkmUBoVioNQi7ZqOGVZ eOnUbKHnvzSqyTup3E9vuBQqXgdIVao9IbHh+rc7OcOPQmX6G634UACmTnjIwdcgB/rJ Tm+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=fZkmIIkn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f19si327364ejb.315.2021.02.02.17.01.22; Tue, 02 Feb 2021 17:01:47 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=fZkmIIkn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231215AbhBCAQD (ORCPT + 99 others); Tue, 2 Feb 2021 19:16:03 -0500 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:31665 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229513AbhBCAQB (ORCPT ); Tue, 2 Feb 2021 19:16:01 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1612311270; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=SiaraPMcWlUGQ15HgWRnEvPFg5Cm3xwMPN0LwTOYT8c=; b=fZkmIIkn4Q8dL2+P2DOsZoiwofi6IgGwQp9iYDycPwjdY4gLuiFvDTrYA5jW2MNVLxwIdQ SYjuCK7z59m47Z/r4c5YlHhNz26B7LgwGZ7uDtWKjORB/bE6Aes99i8Gxl1xgMptkr/BDU UH2twDscAoO0un2NvkE5m68vPGd+qm0= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-566-6TM_tgRuO0-KZsWk2A-z2Q-1; Tue, 02 Feb 2021 19:14:28 -0500 X-MC-Unique: 6TM_tgRuO0-KZsWk2A-z2Q-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 59E9E801817; Wed, 3 Feb 2021 00:14:26 +0000 (UTC) Received: from treble (ovpn-120-118.rdu2.redhat.com [10.10.120.118]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 0CD7118993; Wed, 3 Feb 2021 00:14:21 +0000 (UTC) Date: Tue, 2 Feb 2021 18:14:14 -0600 From: Josh Poimboeuf To: Nick Desaulniers Cc: Julien Thierry , Ard Biesheuvel , Mark Brown , Catalin Marinas , Kees Cook , Linux ARM , linux-efi , linux-hardening@vger.kernel.org, LKML , Mark Rutland , Masahiro Yamada , Michal Marek , Peter Zijlstra , raphael.gault@arm.com, Will Deacon , clang-built-linux , Bill Wendling , swine@google.com, yonghyun@google.com Subject: Re: [RFC PATCH 12/17] gcc-plugins: objtool: Add plugin to detect switch table on arm64 Message-ID: <20210203001414.idjrcrki7wmhndre@treble> References: <20210120173800.1660730-13-jthierry@redhat.com> <20210127221557.1119744-1-ndesaulniers@google.com> <20210127232651.rj3mo7c2oqh4ytsr@treble> <20210201214423.dhsma73k7ccscovm@treble> <671f1aa9-975e-1bda-6768-259adbdc24c8@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 02, 2021 at 03:01:22PM -0800, Nick Desaulniers wrote: > > >> Thus far we've been able to successfully reverse engineer it on x86, > > >> though it hasn't been easy. > > >> > > >> There were some particulars for arm64 which made doing so impossible. > > >> (I don't remember the details.) > > > > The main issue is that the tables for arm64 have more indirection than x86. > > I wonder if PAC or BTI also make this slightly more complex? PAC at > least has implications for unwinders, IIUC. What is PAC/BTI? > > On x86, the dispatching jump instruction fetches the target address from > > a contiguous array of addresses based on a given offset. So the list of > > potential targets of the jump is neatly organized in a table (and sure, > > before link time these are just relocation, but still processable). > > > > On arm64 (with GCC at least), what is stored in a table is an array of > > candidate offsets from the jump instruction. And because arm64 is > > limited to 32bit instructions, the encoding often requires multiple > > instructions to compute the target address: > > > > ldr<*> x_offset, [x_offsets_table, x_index, ...] // load offset > > adr x_dest_base, // load target branch for offset 0 > > add x_dest, x_target_base, x_offset, ... // compute final address > > br x_dest // jump > > > > Where this gets trickier is that (with GCC) the offsets stored in the > > table might or might not be signed constants (and this can be seen in > > GCC intermediate representations, but I do not believe this information > > is output in the final object file). And on top of that, GCC might > > decide to use offsets that are seen as unsigned during intermediate > > representation as signed offset by sign extending them in the add > > instruction. > > > > So, to handle this we'd have to track the different operation done with > > the offset, from the load to the final jump, decoding the instructions > > and deducing the potential target instructions from the table of offsets. > > > > But that is error prone as we don't really know how many instructions > > can be between the ones doing the address computation, and I remember > > some messy case of a jump table inside a jump table where tracking the > > instruction touching one or the other offset would need a lot of corner > > case handling. > > > > And this of course is just for GCC, I haven't looked at what it all > > looks like on Clang's end. > > Sure, but this is what production unwinders do, and they don't require > compiler plugins, right? What do you mean by "production unwinders"? Generally unwinders rely on either frame pointers or DWARF, but (without validation) those aren't robust enough for live patching in the kernel, so I'm not sure how this is relevant. > > > I think the details are pertinent to finding a portable solution. The > > > commit message of this commit in particular doesn't document such > > > details, such as why such an approach is necessary or how the data is > > > laid out for objtool to consume it. > > > > > > > Sorry, I will need to make that clearer. The next patch explains it a > > bit [1] > > > > Basically, for simplicity, the plugin creates a new section containing > > Right, this takes a focus on simplicity, at the cost of alienating a toolchain. > > Ard's point about 3193c0836f20 relating to -fgcse is that when > presented with tricky cases to unwind, the simplest approach is taken. > There it was disabling a compiler specific compiler optimization, here > it's either a compiler specific compiler plugin (or disabling another > compiler optimization). The pattern seems to be "Objtool isn't smart > enough" ... "compiler optimization disabled" or "compiler plugin > dependency." You're taking the two absolute worst case scenarios (one of which is just a patch which doesn't look like it's going to get merged anyway) and drawing a false narrative. In this case the simplest approach would have been to just give up and disable jump tables. We try as hard as possible (beyond turning objtool into a full emulator) to avoid doing that kind of thing because objtool isn't supposed to dictate kernel optimizations. Otherwise we would have disabled jump tables (even for non-retpolines) a long time ago, because that's been a serious PITA. You might not like the plugin -- I don't like it either -- but the goal was to avoid penalizing the kernel with "objtool-friendly" optimizations. That said, jump tables are such a pain for objtool (and currently impossible to deal with for arm64) that I'm completely open to just disabling them if they're shown to have negligible benefit for the kernel. -- Josh