Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp2876471pxb; Tue, 21 Sep 2021 09:30:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx96AYI7G9JJN7oa4WEaPsyztxxTGs07w8pOLmG0gUfrSC1mLr1b/Upx9vMr/84M7c70Ful X-Received: by 2002:a92:c24f:: with SMTP id k15mr16843091ilo.3.1632241831125; Tue, 21 Sep 2021 09:30:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632241831; cv=none; d=google.com; s=arc-20160816; b=Tn2u8xVtt219n20nhu8aP8DH7kiM28fnnis34Z7V2JTjM1MeB2BkCZ1Ctnp8UUZEVw 9LD6PxN+02LzYV3g8j9VNVXYulcyRO7Zcpq6cX9ne7ZUnc7H1r5T2ge/o0bDfMLbvNWB 5ti4vRq4GQmdSynmLFIbEwQPmbB7PVicaGk8FQTjyby6zzZF1+apcWCxikjFdYPYTIJu h0LfrfjD3b4vPx2+YaTHv49AzG3RuHHxcKqaUMAsdUo5Me/HDOEugp96K/qu+8ePGoAy CTu5Dhfn5rwim4QSnMfYgt0G3k2XVw2Np2F4ddurwCu4ouanU1WjFR+5gHYbGz6R+N4O 7kvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=Fpk0q22Y6ELb/DwlPP4MeBesZxXzUOqWukgZ9BkBvog=; b=Pp6gG3UB8KbnsevnhYlumtwVMeFAjyubieo4eh6HjCPWyeAb+InGz9oVTYJMSL3wnq Jzv9EQ9gfYW34SU963bDjBZlCbaHKSYzjm11oHbcc/+Oe68PutnHYPDshWMj6XLjnBws BNB82cchB1lVIISGirpCpr47NtjQpLs/g1kePoBJ1KK8gPK3onq5ko7qEnir5+VajZX1 iP0OhxrfLjy5UmLUyTma0qmezGrO5Wf8baThCcek8wLKnHOqHLFJjt3hym8lRm3mLZ65 IHgisqEJY3CVn9+STguhC16O931LCc2fQRGIYVAnhiVH0FvvpceQkUnloklu7l8dIVFv eIHg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z6si4801220iom.65.2021.09.21.09.30.18; Tue, 21 Sep 2021 09:30:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231875AbhIUQ3h (ORCPT + 99 others); Tue, 21 Sep 2021 12:29:37 -0400 Received: from foss.arm.com ([217.140.110.172]:36200 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229465AbhIUQ3h (ORCPT ); Tue, 21 Sep 2021 12:29:37 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 5EC87113E; Tue, 21 Sep 2021 09:28:08 -0700 (PDT) Received: from C02TD0UTHF1T.local (unknown [10.57.23.155]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D13C53F718; Tue, 21 Sep 2021 09:28:06 -0700 (PDT) Date: Tue, 21 Sep 2021 17:28:04 +0100 From: Mark Rutland To: Ard Biesheuvel Cc: Peter Zijlstra , Frederic Weisbecker , Catalin Marinas , Will Deacon , LKML , James Morse , Quentin Perret , Christophe Leroy Subject: Re: [PATCH 2/4] arm64: implement support for static call trampolines Message-ID: <20210921162804.GD35846@C02TD0UTHF1T.local> References: <20210920233237.90463-1-frederic@kernel.org> <20210920233237.90463-3-frederic@kernel.org> <20210921153352.GC35846@C02TD0UTHF1T.local> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 21, 2021 at 05:55:11PM +0200, Ard Biesheuvel wrote: > On Tue, 21 Sept 2021 at 17:33, Mark Rutland wrote: > > > > On Tue, Sep 21, 2021 at 04:44:56PM +0200, Ard Biesheuvel wrote: > > > On Tue, 21 Sept 2021 at 09:10, Peter Zijlstra wrote: > ... > > > > > > > > So I like what Christophe did for PPC32: > > > > > > > > https://lkml.kernel.org/r/6ec2a7865ed6a5ec54ab46d026785bafe1d837ea.1630484892.git.christophe.leroy@csgroup.eu > > > > > > > > Where he starts with an unconditional jmp and uses that IFF the offset > > > > fits and only does the data load when it doesn't. Ard, woulnd't that > > > > also make sense on ARM64? I'm thinking most in-kernel function pointers > > > > would actually fit, it's just the module muck that gets to have too > > > > large pointers, no? > > > > > > > > > > Yeah, I'd have to page that back in. But it seems like the following > > > > > > bti c > > > > > > adrp x16, > > > ldr x16, [x16, ...] > > > br x16 > > > > > > with either set to 'b target' for the near targets, 'ret' for > > > the NULL target, and 'nop' for the far targets should work, and the > > > architecture permits patching branches into NOPs and vice versa > > > without special synchronization. > > > > I think so, yes. We can do sligntly better with an inline literal pool > > and a PC-relative LDR to fold the ADRP+LDR, e.g. > > > > .align 3 > > tramp: > > BTI C > > {B | RET | NOP} > > LDR X16, 1f > > BR X16 > > 1: .quad > > > > Since that's in the .text, it's RO for regular accesses anyway. > > > > I tried to keep the literal in .rodata to avoid inadvertent gadgets > and/or anticipate exec-only mappings of .text, but that may be a bit > overzealous. I think that in practice the risk of gadgetisation is minimal, and having it inline means we only need to record a single address per trampoline, so there's less risk that we get the patching wrong. > > > But I must be missing something here, or why did we have that long > > > discussion before? > > > > I think the long discussion was because v2 had some more complex options > > (mostly due to trying to use ADRP+ADD) and atomicity/preemption issues > > meant we could only transition between some of those one-way, and it was > > subtle/complex: > > > > https://lore.kernel.org/linux-arm-kernel/20201028184114.6834-1-ardb@kernel.org/ > > > > Ah yes, I was trying to use ADRP/ADD to avoid the load, and this is > what created all the complexity. > > > For v3, that was all gone, but we didn't have a user. > > > > Since the common case *should* be handled by {B | RET | NOP }, I > > reckon it's fine to have just that and the literal pool fallback (which > > I'll definitely need for the sorts of kernel I run when fuzzing, where > > the kernel Image itself can be 100s of MiBs). > > Ack. So I'll respin this along these lines. Sounds good! > Do we care deeply about the branch and the literal being transiently > out of sync? I don't think we care about the tranisent window, since even if we just patched a branch, a thread could be preempted immediately after the branch and sit around blocked for a while. So it's always necessary to either handle such threads taking stale branches, or to flip the branch such that this doesn't matter (e.g. done once at boot time). That said, I'd suggest that we always patch the literal, then patch the {B| RET | NOP}, so that outside of patch times those are consistent with one another and we can't accidentally get into a state were we use a stale/bogus target after multiple patches. We can align the trampoline such that we know it falls within a single page, so that we only need to map/unmap it once (and the cost of the extra STR will be far smaller than the map/unmap anyhow). Thanks, Mark.